h3c sr8800 series 10g core routers operation manual(release3238 v3.04)

2160
H3C SR8800 Series 10G Core Routers Operation Manual Hangzhou H3C Technologies Co., Ltd. Manual Version: 20091027-C-3.04 Product Version: SR8800-CMW520-R3238

Upload: xenxis

Post on 31-Dec-2015

52 views

Category:

Documents


0 download

TRANSCRIPT

  • H3C SR8800 Series 10G Core Routers

    Operation Manual

    Hangzhou H3C Technologies Co., Ltd.

    Manual Version: 20091027-C-3.04

    Product Version: SR8800-CMW520-R3238

  • Copyright 2007-2009, Hangzhou H3C Technologies Co., Ltd. and its licensors

    H3C Technologies Co., Ltd., a subsidiary of 3Com Corporation.

    All Rights Reserved

    No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd.

    Trademarks

    H3C, , Aolynk, , H3Care,

    , TOP G, , IRF, NetPilot, Neocean, NeoVTL, SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V2G, VnG, PSPT, XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co., Ltd.

    All other trademarks that may be mentioned in this manual are the property of their respective owners.

    Notice

    The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.

  • About This Manual

    Organization

    H3C SR88 Series 10G Core Routers Operation Manual is organized as follows:

    Volume Features

    Product Overview includes Obtaining the Documentation, Product Features, and Features.

    CPOS Interface POS Interface Ethernet Interface WAN Interface

    GVRP HDLC Link Aggregation Port Mirroring

    PPP RPR MSTP VLAN

    QinQ BPDU Tunneling Port Isolation Logical Interface

    Access Volume

    Ethernet OAM ATM VLAN Termination

    ARP DHCP DNS IP Addressing

    IP Performance UDP Helper URPF IPv6 Basics

    Dual Stack Tunneling GRE Adjacency Table IP Services Volume

    DHCPv6

    IP Routing Overview BGP IS-IS OSPF

    RIP Route Policy Static Routing IPv6 BGP

    IPv6 IS-IS IPv6 OSPFv3 IPv6 RIPng IPv6 Static Routing

    IP Routing Volume

    BFD

    Multicast Overview

    Multicast Routing and Forwarding IGMP Snooping IGMP

    MSDP PIM Multicast VLAN IPv6 Multicast Routing and Forwarding

    MLD Snooping MLD IPv6 PIM IPv6 Multicast VLAN

    IP Multicast Volume

    Multicast VPN MBGP IPv6 MBGP

    MPLS Basics MPLS TE VPLS MPLS L2VPN MPLS VPN Volume MPLS L3VPN

    QoS Volume QoS HQoS

    802.1x AAA MAC Authentication Portal Security Volume

    IP Source Guard ACL Password Control SSH2.0

    GR Overview VRRP HA Device Management System Volume

    NQA NTP RMON SNMP

  • Volume Features

    File System Management

    System Maintaining and Debugging

    Basic System Configuration

    Information Center

    User Interface MAC Address Table Management

    Clock Monitoring Track

    OAA OAP Module ACSEI

    Acronyms Offers the acronyms used in this manual.

    ConventionsThe manual uses the following conventions:

    Command conventions

    Convention Description

    Boldface The keywords of a command line are in Boldface.

    italic Command arguments are in italic.

    [ ] Items (keywords or arguments) in square brackets [ ] are optional.

    { x | y | ... } Alternative items are grouped in braces and separated by vertical bars. One is selected.

    [ x | y | ... ] Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected.

    { x | y | ... } * Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected.

    [ x | y | ... ] * Optional alternative items are grouped in square brackets and separated by vertical bars. Many or none can be selected.

    & The argument(s) before the ampersand (&) sign can be entered 1 to n times.

    # A line starting with the # sign is comments.

    GUI conventions

    Convention Description

    Boldface Window names, button names, field names, and menu items are in Boldface. For example, the New User window appears; click OK.

    > Multi-level menus are separated by angle brackets. For example, File > Create > Folder.

    Convention Description

    < > Button names are inside angle brackets. For example, click .

    [ ] Window names, menu items, data table and field names are inside square brackets. For example, pop up the [New User] window.

    / Multi-level menus are separated by forward slashes. For example, [File/Create/Folder].

  • Symbols

    Convention Description

    Means reader be extremely careful. Improper operation may cause bodily injury.

    Means reader be careful. Improper operation may cause data loss or damage to equipment.

    Means an action or information that needs special attention to ensure successful configuration or good performance.

    Means a complementary description.

    Means techniques helpful for you to make configuration with ease.

    Related Documentation

    In addition to this manual, each H3C SR8800 Series 10G Core Routers documentation set includes the following:

    Manual Description

    H3C SR8800 Series 10G Core Routers Installation Manual

    It introduces the installation procedure, startup, hardware and software maintenance and monitoring of the SR8800 series 10G core routers.

    H3C SR8800 Series 10G Core Routers Command Manual

    It includes Access Volume, IP Services Volume, IP Routing Volume, IP Multicast Volume, MPLS Volume, QoS Volume, Security Volume, System Volume, List of Unsupported Commands, and Command Index.

    Obtaining Documentation and Technical Support

    To obtain up-to-date documentation and technical support, go to http://www.h3c.com and select your country or region. Depending on your selection, you will be redirected to either of the following websites:

    At http://www.h3c.com

    Documentation

    Go to the following columns for different categories of product documentation:

    [Products & Solutions]: Provides information about products and technologies, as well as solutions.

    [Technical Support & Document > Technical Documents]: Provides several categories of product documentation, such as installation, configuration, and maintenance.

    [Technical Support & Document > Software Download]: Provides the documentation released with the software version.

    Technical Support

    [email protected]

    http://www.h3c.com

    At http://www.h3cnetworks.com

  • Documentation

    Select Drivers & Downloads in the Support area. Select Documentation for Type of File and select Product Category.

    Technical Support

    Please see the appendix Obtaining Support for Your Product.

    Documentation Feedback

    You can e-mail your comments about product documentation to [email protected].

    We appreciate your comments.

  • i

    Table of Contents

    Obtaining the Documentation 1 CD-ROMs Shipped with the Devices 1 Website 1

    At http://www.h3c.com1

    At http://www.h3cnetworks.com1

    Documentation Feedback1 Software Release Notes 2

    Product Features 1 Introduction to Product 1 Feature Lists 1

    Features1 Access Volume 1 IP Services Volume3 IP Routing Volume 4 IP Multicast Volume 6 MPLS Volume 7 QoS Volume8 Security Volume9 System Volume 10 OAA Volume 12

  • 1

    Obtaining the Documentation

    H3C Technologies Co., Ltd. provides various ways for you to obtain documentation, through which you can obtain the product documentations and those concerning newly added new features. The documentations are available in one of the following ways:

    z CD-ROMs shipped with the devices z H3C website z Software release notes

    CD-ROMs Shipped with the Devices

    H3C delivers a CD-ROM together with each device. The CD-ROM contains a complete product document set, including the operation manual and command manual.

    The contents in the manual are subject to update on an irregular basis due to product version upgrade or some other reasons. Therefore, the contents in the CD-ROM may not be the latest version. For the latest software documentation, go to the H3C website.

    Website To obtain up-to-date documentation and technical support, go to http://www.h3c.com and select your country or region. Depending on your selection, you will be redirected to either of the following websites:

    At http://www.h3c.com

    Documentation

    Go to the following columns for different categories of product documentation: [Products & Solutions]: Provides information about products and technologies, as well as solutions. [Technical Support & Document > Technical Documents]: Provides several categories of product documentation, such as installation, configuration, and maintenance. [Technical Support & Document > Software Download]: Provides the documentation released with the software version.

    Technical Support

    [email protected] http://www.h3c.com

    At http://www.h3cnetworks.com

    Documentation

    Select Drivers & Downloads in the Support area. Select Documentation for Type of File and select Product Category.

    Technical Support

    Please see the appendix Obtaining Support for Your Product.

    Documentation Feedback You can e-mail your comments about product documentation to [email protected]. We appreciate your comments.

  • 2

    Software Release Notes

    With software upgrade, new software features may be added. You can acquire the information about the newly added software features through software release notes.

  • 1

    Product Features

    Introduction to Product

    H3C SR8800 Series 10G Core Routers (hereinafter referred to as the SR8800 series) are high end network devices developed by Hangzhou H3C Technologies Co., Ltd. It can be used on the core and distribution layers of large MANs, the core layer of industry IP networks, point of presence (POP), and the distribution layer of carrier networks.

    Feature Lists

    The SR8800 series support abundant features and the related documents are divided into the volumes as listed in -1.

    -1 Feature list

    Volume Features

    CPOS Interface POS Interface Ethernet Interface WAN Interface

    GVRP HDLC Link Aggregation Port Mirroring

    PPP RPR MSTP VLAN

    QinQ BPDU Tunneling Port Isolation Logical Interface

    Access Volume

    Ethernet OAM ATM VLAN Termination

    ARP DHCP DNS IP Addressing

    IP Performance UDP Helper URPF IPv6 Basics

    Dual Stack Tunneling GRE Adjacency Table IP Services Volume

    DHCPv6

    IP Routing Overview BGP IS-IS OSPF

    RIP Route Policy Static Routing IPv6 BGP

    IPv6 IS-IS IPv6 OSPFv3 IPv6 RIPng IPv6 Static Routing

    IP Routing Volume

    BFD

    Multicast Overview

    Multicast Routing and Forwarding

    IGMP Snooping IGMP

    MSDP PIM Multicast VLAN IPv6 Multicast Routing and Forwarding

    MLD Snooping MLD IPv6 PIM IPv6 Multicast VLAN

    IP Multicast Volume

    Multicast VPN MBGP IPv6 MBGP

    MPLS Basics MPLS TE VPLS MPLS L2VPN MPLS VPN Volume MPLS L3VPN

    QoS Volume QoS HQoS

  • 2

    802.1x AAA MAC Authentication Portal Security Volume

    IP Source Guard ACL Password Control SSH2.0

    GR Overview VRRP HA Device Management

    NQA NTP RMON SNMP

    File System Management

    System Maintaining and Debugging

    Basic System Configuration Information Center

    System Volume

    User Interface MAC Address Table Management

    Clock Monitoring Track

    OAA OAP Module ACSEI

  • 1

    Features

    The following sections provide an overview of the main features of each module supported by the SR8800 series.

    Access Volume

    -1 Features in Access volume

    Features Description

    CPOS Interface

    CPOS, the channelized POS interface, enhances aggregation of low-speed ports, and improves the capacity of leased-line access. z CPOS interface overview z CPOS interface configuration z E1 channel configuration z T1 channel configuration

    POS Interface

    Packet over SONET/SDH (POS) is a technology popular in WAN and MAN. It can support packet data such as IP packets. z POS port overview z POS port configuration

    Ethernet Interface

    The volume describes Layer 2 and Layer 3 Ethernet interfaces. z General Ethernet interface configuration z Layer 2 Ethernet interface configuration z Layer 3 Ethernet interface/subinterface configuration

    WAN Interface The volume describes the CE1 and CT1 WAN interfaces.

    GVRP The GARP VLAN Registration Protocol (GVRP) is a GARP application. z GVRP configuration z GARP timer configuration

    HDLC

    High-level Data Link Control (HDLC) is a bit-oriented link layer protocol. Its most prominent feature is that it can transmit any types of bit stream transparently. z HDLC overview z HDLC configuration

    Link Aggregation

    Link aggregation aggregates multiple physical Ethernet ports into one logical link, also called a logical group z Link aggregation overview and types z Link aggregation configuration

    Port Mirroring

    Port mirroring allows you to duplicate packets passing through a specific port (source port) to another port (destination port) connected with a data monitoring device for network monitoring and diagnosis. z Local port mirroring configuration z Remote port mirroring configuration

    PPP

    Point-to-Point Protocol (PPP) is a link layer protocol that carries network layer packets over point-to-point links. z PPP configuration z MP configuration

  • 2

    RPR

    Resilient Packet Ring (RPR) is a new MAC layer protocol designed for transferring mass data services over MANs. It provides flexible and efficient networking schemes for broadband IP MANs carriers. z RPR overview z Protection mode configuration z Bandwidth reservation and rate limiting z Port type configuration

    MSTP

    The multiple spanning tree protocol (MSTP) overcomes the shortcomings of STP and RSTP. It provides a better load sharing mechanism for redundant links. z Root bridge configuration z Leaf node configuration z Performing mCheck z Digest snooping configuration z No Agreement Check configuration z Protection function configuration

    VLAN

    The volume describes VLAN (Virtual Local Area Network) configuration. z Basic VLAN configuration z Basic VLAN interface configuration z Port-based VLAN configuration

    QinQ

    QinQ enables a service provider to serve customer networks comprising multiple VLANs by using a single VLAN. z QinQ overview z Basic QinQ configuration z TPID value for QinQ frame configuration

    BPDU Tunneling

    z BPDU tunneling overview z BPDU transparent transmission configuration z Configuration of destination multicast MAC address for BPDU tunnel

    frames

    Port Isolation

    To save VLAN resources, port isolation is introduced to isolate ports within a VLAN, allowing for great flexibility and security. z Port isolation overview z Isolation group configuration

    Logical Interface

    Logical interfaces are virtual interfaces capable of data exchange but do not exist physically. z Loopback interface configuration z Null interface configuration z RPR logical interface configuration z Subinterface configuration z MP-group interface configuration

    Ethernet OAM

    Ethernet OAM (operation, administration, and maintenance) is a network monitoring tool. z Basic Ethernet OAM functions configuration z Configuration of periods and thresholds for Ethernet OAM link error

    event detection z OAM loopback testing configuration

    ATM

    Asynchronous Transfer Mode (ATM) is a technology based on packet transmission mode while incorporating the high speed of circuit transmission mode. z ATM interface configuration z ATM subinterface configuration z PVC parameters configuration z Configuration of applications carried by ATM

  • 3

    VLAN Termination

    VLAN termination is mainly used for communication between different VLANs, and communication between LANs and WANs. z VLAN termination overview z TPID configuration for VLAN packets z Configuration of QinQ termination

    IP Services Volume

    -2 Features in the IP Services volume

    Features Description

    ARP

    Address Resolution Protocol (ARP) is used to resolve an IP address into a data link layer address. z ARP configuration z Gratuitous ARP configuration z ARP source suppression configuration z Proxy ARP configuration

    DHCP

    DHCP is built on a client-server model, in which the client sends a configuration request and then the server returns a reply to send configuration parameters such as an IP address to the client. z DHCP server configuration z DHCP relay configuration

    DNS

    Domain Name System (DNS) is a distributed database used by TCP/IP applications to translate domain names into corresponding IP addresses. z Configuration of static domain name resolution z Configuration of dynamic domain name resolution z DNS proxy configuration

    IP Addressing z IP address configuration z Configuration of IP unnumbered

    IP Performance

    In some network environments, you need to adjust the IP parameters to achieve best network performance. z Configuration of the maximum TCP segment size (MSS) of the interfacez Configuration of SYN cookie feature and protection against Naptha

    attack z TCP optional parameters configuration z Configuration of ICMP to send error packets

    UDP Helper

    UDP Helper is to relay specified UDP packets. In other words, UDP Helper functions as a relay agent that converts UDP broadcast packets into unicast packets and forwards them to a specified destination server. z UDP Helper configuration

    URPF

    Unicast Reverse Path Forwarding (URPF) protects a network against attacks based on source address spoofing. z Introduction to basic URPF concepts z URPF processing flow z URPF configuration

  • 4

    IPv6 Basics

    Internet Protocol Version 6 (IPv6), also called IP next generation (IPng), was designed by the Internet Engineering Task Force (IETF) as the successor to Internet Protocol Version 4 (IPv4). z Basic IPv6 functions configuration z IPv6 Neighbor Discovery Protocol (NDP) configuration z PMTU discovery configuration z IPv6 TCP properties configuration z Configuration of IPv6 FIB-based forwarding z Configuration of ICMPv6 packets sending z IPv6 DNS configuration

    Dual Stack

    A network node that supports both IPv4 and IPv6 is called a dual stack node. A dual stack node configured with an IPv4 address and an IPv6 address can have both IPv4 and IPv6 packets transmitted. z Dual stack configuration

    Tunneling

    Tunneling is an encapsulation technology, which utilizes one network transport protocol to encapsulate packets of another network transport protocol and transfer them over the network. z Configuration of IPv6 manual tunnel z Configuration of automatic IPv4-compatible IPv6 tunnel z 6to4 tunnel configuration z ISAPTAP tunnel configuration z IPv4 over IPv4 tunnel configuration

    GRE

    Generic Routing Encapsulation (GRE) is a protocol designed for performing encapsulation of one network layer protocol (for example, IP or IPX) over another network layer protocol (for example, IP). z GRE tunnel configuration

    Adjacency Table An adjacency table manages the information on the neighbors that are both connected and active.

    DHCPv6

    DHCPv6 was designed based on IPv6 addressing scheme and is used for assigning IPv6 addresses and other configuration parameters to hosts. The volume describes:

    z DHCPv6 overview z DHCPv6 relay agent configuration

    IP Routing Volume

    -3 Features in the IP Routing volume

    Features Description

    IP Routing Overview This volume introduces basic IP routing concepts. z Routing protocol overview z IP routing and routing table

    BGP

    The Border Gateway Protocol (BGP) is a dynamic inter-AS route discovery protocol. z BGP basic functions configuration z Configuration of route distribution and reception z BGP route attributes configuration z Large scale BGP network configuration z BGP GR configuration

  • 5

    IS-IS

    IS-IS is an Interior Gateway Protocol (IGP) used within an Autonomous System. It adopts the Shortest Path First (SPF) algorithm for route calculation. z IS-IS basic functions configuration z IS-IS routing information control configuration z Tuning and optimization of IS-IS z IS-IS GR configuration

    OSPF

    Open Shortest Path First (OSPF) is a link state interior gateway protocol developed by the OSPF working group of the Internet Engineering Task Force (IETF). z OSPF basic functions configuration z OSPF area parameters configuration z OSPF network types configuration z OSPF route control configuration z OSPF GR configuration

    RIP

    RIP is a simple Interior Gateway Protocol (IGP), mainly used in small-sized networks, such as academic networks and simple LANs. z RIP basic functions configuration z RIP route control configuration

    Routing Policy

    A routing policy is used on a router for route inspection, filtering, attributes modification when routes are received, advertised, or redistributed. z Filtering list configuration z Routing policy configuration

    Static Routing

    A static route is a special route that is manually configured by the network administrator. The proper configuration and usage of static routes can improve network performance and ensure bandwidth for important network applications. z Static route configuration z Detection reachability of the static route's next hop

    IPv6 BGP

    IPv6 BGP utilizes BGP multiprotocol extensions for application in IPv6 networks. The original messaging and routing mechanisms of BGP are not changed. z IPv6 BGP configuration z Configuration of route distribution and reception z Configuration of IPv6 BGP route attributes z Tuning and optimization of IPv6 BGP networks

    IPv6 IS-IS

    The IS-IS routing protocol supports multiple network protocols, including IPv6. Two type-length-values (TLVs) and a new network layer protocol identifier (NLPID) are defined to enable IPv6 support for IS-IS. z IPv6-ISIS basic functions configuration z IPv6-ISIS routing information control configuration

    IPv6 OSPFv3

    OSPFv3 is OSPF (Open Shortest Path First) version 3 for short, supporting IPv6. z OSPFv3 basic functions configuration z OSPFv3 area parameters configuration z OSPFv3 routing information control configuration

    IPv6 RIPng z RIP next generation (RIPng) is an extension of RIP-2 for IPv4. RIPng

    basic functions configuration z RIPng route control configuration

  • 6

    IPv6 Static Routing Similar to IPv4 static routes, IPv6 static routes work well in simple IPv6 network environments. z IPv6 static route configuration

    BFD

    Bidirectional forwarding detection (BFD) provides a single mechanism to quickly detect and monitor the connectivity of links or IP forwarding paths in networks. z BFD basic functions configuration z Protocol-based BFD configuration z BFD trap configuration

    IP Multicast Volume

    -4 Features in IP Multicast volume

    Features Description

    Multicast Overview

    The volume gives multicast technology overview. z Multicast models z Multicast architecture z Multicast packet forwarding mechanism

    Multicast Routing and Forwarding

    The multicast routing protocol uses the reverse path forwarding (RPF) check mechanism to ensure multicast data delivery along the correct path. z Introduction to multicast routing and forwarding z Multicast routing and forwarding configuration

    IGMP Snooping

    Internet Group Management Protocol Snooping (IGMP Snooping) is a multicast constraining mechanism that runs on Layer 2 devices to manage and control multicast groups. z Basic functions configuration of IGMP Snooping z IGMP Snooping port functions configuration z IGMP Snooping querier configuration z IGMP Snooping policy configuration

    IGMP

    As a TCP/IP protocol responsible for IP multicast group member management, the Internet Group Management Protocol (IGMP) is used by IP hosts to establish and maintain their multicast group memberships to immediately neighboring multicast routers. z IGMP basic functions configuration z IGMP performance adjustment

    MSDP

    Multicast source discovery protocol (MSDP) is an inter-domain multicast solution developed to address the interconnection of protocol independent multicast sparse mode (PIM-SM) domains. z MSDP basic functions configuration z MSDP peer connection configuration z SA message configuration

    PIM

    Protocol Independent Multicast (PIM) provides IP multicast forwarding by leveraging static routes or unicast routing tables generated by any unicast routing protocol. z PIM-DM configuration z PIM-SM configuration z PIM-SSM configuration z PIM common features configuration

    Multicast VLAN This manual describes multicast VLAN configuration.

  • 7

    IPv6 Multicast Routing and Forwarding

    The IPv6 multicast routing protocol uses the reverse path forwarding (RPF) to ensure IPv6 multicast data delivery along the correct path. z Introduction to IPv6 multicast routing and forwarding z IPV6 multicast routing and forwarding configuration

    MLD Snooping

    Multicast Listener Discovery Snooping (MLD Snooping) is an IPv6 multicast constraining mechanism that runs on Layer 2 devices to manage and control IPv6 multicast groups. z MLD Snooping basic functions configuration z MLD Snooping port functions configuration z MLD Snooping querier configuration z MLD Snooping policy configuration

    MLD

    The Multicast Listener Discovery protocol (MLD) is used by an IPv6 router to discover the presence of multicast listeners on the directly attached subnets.z MLD basic functions configuration z MLD performance adjustment

    IPv6 PIM

    IPv6 PIM is short for Protocol Independent Multicast for IPv6. z IPv6 PIM-DM configuration z IPv6 PIM-SM configuration z IPv6 PIM-SSM configuration z IPv6 PIM common features configuration

    IPv6 Multicast VLAN Configuration of IPv6 multicast VLANs.

    Multicast VPN

    z Multicast VPN overview z MD VPN mechanism z MD VPN configuration tasks z MD VPN configuration

    MBGP

    Multi-protocol BGP for IP multicast is referred to as Multicast BGP (MBGP) for short. It carries routing information for multiple network layer protocols. z MBGP basic functions configuration z MBGP route attributes configuration z Large scale MBGP network configuration

    IPv6 MBGP

    Multi-protocol BGP for IPv6 multicast is referred to as IPv6 multicast BGP (IPv6 MBGP). It carries routing information for multiple network layer protocols. z IPv6 MBGP basic functions configuration z IPv6 MBGP route attributes configuration z Large scale IPv6 MBGP network configuration

    MPLS Volume

    -5 Features in MPLS volume

    Features Description

    MPLS Basics

    z MPLS configuration basics z LDP overview z MPLS basic capability z PHP configuration z Static LSP configuration z MPLS LDP configuration z LDP instance configuration z Configuration of MPLS IP TTL processing

  • 8

    MPLS TE

    z MPLS traffic engineering z MPLS TE basic capabilities configuration z Configuration of creating MPLS TE tunnel over static CR-LSP z Configuration of MPLS TE tunnel with dynamic signaling protocol z RSVP-TE advanced features configuration z CR-LSP setup tuning z MPLS TE tunnel setup tuning z Traffic forwarding configuration z Traffic forwarding tuning parameters configuration z CR-LSP backup configuration z Fast reroute configuration

    VPLS

    Virtual Private LAN Service (VPLS), also called Transparent LAN Service (TLS) or virtual private switched network service, can deliver a point-to-multipoint L2VPN service over public networks. z VPLS overview z Remote LDP session configuration z BGP extensions configuration z VPLS instance configuration

    MPLS L2VPN

    MPLS L2VPN provides Layer 2 VPN services on the MPLS network. It allows carriers to establish L2VPNs on different data link layer protocols. z MPLS L2VPN configuration z CCC MPLS L2VPN configuration z SVC MPLS L2VPN configuration z Martini MPLS L2VPN configuration z Kompella MPLS L2VPN configuration

    MPLS L3VPN

    MPLS L3VPN is a kind of PE-based L3VPN technology for service provider VPN solutions. z VPN instance configuration z Basic MPLS L3VPN configuration z Inter-provider VPN configuration z HoVPN configuration z OSPF sham link configuration z Multi-VPN-instance CE configuration z BGP AS number substitution

    QoS Volume

    -6 Features in QoS volume

    Features Description

    QoS

    In an internet, QoS refers to the ability of the network to forward packets. z Traffic classification and traffic shaping configuration z QoS policy configuration z Hardware congestion management configuration z Priority mapping configuration z Congestion avoidance z Aggregation CAR configuration z Traffic mirroring configuration

  • 9

    HQoS

    Hierarchical Quality of Service (HQoS) uniformly manages and hierarchically schedules traffic of multiple users and services. z HQoS basic configuration z Copy of forwarding groups and scheduler policies z Configuration of traffic accounting for HQoS

    Security Volume

    -7 Features in Security volume

    Features Description

    802.1x

    As a port-based access control protocol, 802.1x authenticates and controls accessing devices at the port level. z 802.1x configuration z Guest VLAN configuration

    AAA

    Authentication, Authorization, and Accounting (AAA) provides a uniform framework for configuring these three security functions to implement the network security management. z AAA configuration z RADIUS configuration z HWTACACS configuration

    MAC Authentication

    MAC authentication provides a way for authenticating users based on ports and MAC addresses. z MAC authentication overview z MAC authentication configuration

    Portal

    The manual introduces the portal authentication. z Basic portal configuration z Portal-free rule configuration z Authentication subnet configuration z Configuration of logging out users

    IP Source Guard

    By filtering packets on a per-port basis, IP source guard prevents illegal packets from traveling through, thus improving the network security. z Introduction to IP source guard z Dynamic binding configuration

    ACL

    An ACL is a set of rules (or a set of permit or deny statements) for determining which packets can pass and which should be rejected based on matching criteria such as source address, destination address, and port number. Flow templates are not supported. z Creating of a time range z Basic IPv4 ACL configuration z Advanced IPv4 ACL configuration z Configuration of Ethernet frame header ACL z Basic IPv6 ACL configuration z Advanced IPv6 ACL configuration

    Password Control

    Password control refers to a set of functions provided by the local authentication server to achieve password security based on predefined policies. z Global password control management z Local user password control management z Super password control management

  • 10

    SSH2.0

    Secure Shell (SSH) offers an approach to securely logging in to a remote device. By encryption and strong authentication, it protects devices against attacks such as IP spoofing and plain text password interception. z Configuration of a device as an SSH server z Configuration of a device as an SSH client z SFTP configuration z SFTP client configuration

    System Volume

    -8 Features in System volume

    Features Description

    GR Overview

    Graceful Restart ensures the continuity of packet forwarding when a routing protocol restarts. z Basic concepts in GR z GR communication procedure z GR mechanism for several commonly used protocols

    VRRP

    Deploying VRRP on multicast and broadcast LANs such as Ethernet, you can ensure that the system can still provide highly reliable default links without changing configurations when a device fails and prevent network interruption due to a single link failure. z VRRP configuration for IPv4 z VRRP configuration for IPv6

    HA

    High Availability (HA) feature can be used to achieve a higher degree of system availability. z Introduction to HA z HA configuration

    Device Management

    Through the device management function, you can view the current working state of a device, configure running parameters, and perform daily device maintenance and management. z Device management configuration

    NQA

    Network Quality Analyzer (NQA) analyzes network performance, services and service quality through sending test packets, and provides you with network performance and service quality parameters. z NQA server configuration z Enabling the NQA client z NQA test group configuration z Collaboration function configuration z Scheduling of NQA test group

    NTP

    Network Time Protocol (NTP) synchronizes timekeeping among distributed time servers and clients. z NTP operation mode configuration z Configuration of local clock as a reference source z NTP optional parameters configuration z Access-control rights configuration z NTP authentication configuration

    RMON

    Remote Monitoring (RMON) provides an efficient means of monitoring subnets and allows SNMP to monitor remote network devices in a more proactive and effective way. It reduces traffic between network management station (NMS) and agent, facilitating large network management. z RMON configuration

  • 11

    SNMP

    Simple Network Management Protocol (SNMP) offers a framework to monitor network devices through TCP/IP protocol suite. It provides a set of basic operations in monitoring and maintaining the Internet. z SNMP basic functions configuration z Trap configuration

    File System Management

    A major function of the file system is to manage storage devices. z File system management configuration z FTP configuration z TFTP configuration

    System Maintaining and Debugging

    For the majority of protocols and features supported, the system provides corresponding debugging information to help users diagnose errors. z Introduction to system maintaining and debugging z System maintaining and debugging operations z System maintaining examples

    Basic System Configuration z Basic system configuration

    Information Center Acting as the system information hub, information center classifies and manages system information. z Information center configuration

    User Interface

    User interface view is a feature that allows you to manage asynchronous serial interfaces that work in flow mode. By operating under user interface view, you can centralize the management of various configurations. z Asynchronous serial interface attributes configuration z Terminal attributes configuration z Modem attributes configuration z Auto-execute command configuration z User privilege level configuration z Configuration of access restriction on VTY user interfaces z Configuration of authentication mode at login

    MAC Address Table Management

    Each entry in the MAC address table indicates the MAC address of a connected device, to which interface this device is connected and to which VLAN the interface belongs. z MAC address table management configuration

    Clock Monitoring

    Clock monitoring module is responsible for providing highly-precise, highly-reliable SDH (synchronous digital hierarchy) line interface 38.88 MHz clock signals for different LPUs (line processing unit). It implements such functions as input clock source automatic selection, software phase-lock, and real-time monitoring of the clock status of the interface card. The module supports hardware reset of the clock card. z Configuration of clock monitoring module of the SRPU z SSM reference source configuration z Input port of the line clock configuration

    Track

    The Track module is used to implement collaboration between different modules. The collaboration here involves three parts: the application modules, the Track module, and the detection modules. z Track overview z Configuration of collaboration between the track module and the

    detection modules z Configuration of collaboration between the track module and the

    application modules

  • 12

    OAA Volume

    Table 1-1 Features in the OAA volume

    Features (operation manual) Description

    OAP Module

    Open Application Platform (OAP) is developed based on Open Application Architecture (OAA). The volume describes: z OAP overview z Logging In to the Operating System of an OAP Module z Configuring the Management IP Address of an OAP Module z Resetting the System of an OAP Module

    ACSEI Server

    As a private protocol, ACSEI provides a method for exchanging information between ACFP clients and ACFP server. The volume describes: z ACSEI overview z ACSEI Server configuration

  • Manual Version

    20091027-C-3.04

    Product Version

    SR8800-CMW520-R3238

    Organization

    The Access Volume is organized as follows:

    Features Description

    CPOS Interface

    CPOS, the channelized POS interface, enhances aggregation of low-speed ports, and improves the capacity of leased-line access.

    z CPOS interface overview z CPOS interface configuration z E1 channel configuration z T1 channel configuration

    POS Interface

    Packet over SONET/SDH (POS) is a technology popular in WAN and MAN. It can support packet data such as IP packets.

    z POS port overview z POS port configuration

    Ethernet Interface

    The volume describes Layer 2 and Layer 3 Ethernet interfaces.

    z General Ethernet interface configuration z Layer 2 Ethernet interface configuration z Layer 3 Ethernet interface/subinterface

    configuration

    WAN Interface The volume describes the CE1 and CT1 WAN interfaces.

    GVRP

    The GARP VLAN Registration Protocol (GVRP) is a GARP application.

    z GVRP configuration z GARP timer configuration

    HDLC

    High-level Data Link Control (HDLC) is a bit-oriented link layer protocol. Its most prominent feature is that it can transmit any types of bit stream transparently.

    z HDLC overview z HDLC configuration

    Link Aggregation

    Link aggregation aggregates multiple physical Ethernet ports into one logical link, also called a logical group

    z Link aggregation overview and types z Link aggregation configuration

  • Features Description

    Port Mirroring

    Port mirroring allows you to duplicate packets passing through a specific port (source port) to another port (destination port) connected with a data monitoring device for network monitoring and diagnosis.

    z Local port mirroring configuration z Remote port mirroring configuration

    PPP

    Point-to-Point Protocol (PPP) is a link layer protocol that carries network layer packets over point-to-point links.

    z PPP configuration z MP configuration

    RPR

    Resilient Packet Ring (RPR) is a new MAC layer protocol designed for transferring mass data services over MANs. It provides flexible and efficient networking schemes for broadband IP MANs carriers.

    z RPR overview z Protection mode configuration z Bandwidth reservation and rate limiting z Port type configuration

    MSTP

    The multiple spanning tree protocol (MSTP) overcomes the shortcomings of STP and RSTP. It provides a better load sharing mechanism for redundant links.

    z Root bridge configuration z Leaf node configuration z Performing mCheck z Digest snooping configuration z No Agreement Check configuration z Protection function configuration

    VLAN

    The volume describes VLAN (Virtual Local Area Network) configuration.

    z Basic VLAN configuration z Basic VLAN interface configuration z Port-based VLAN configuration

    QinQ

    QinQ enables a service provider to serve customer networks comprising multiple VLANs by using a single VLAN.

    z QinQ overview z Basic QinQ configuration z TPID value for QinQ frame configuration

    BPDU Tunneling

    z BPDU tunneling overview z BPDU transparent transmission

    configuration z Configuration of destination multicast MAC

    address for BPDU tunnel frames

  • Features Description

    Port Isolation

    To save VLAN resources, port isolation is introduced to isolate ports within a VLAN, allowing for great flexibility and security.

    z Port isolation overview z Isolation group configuration

    Logical Interface

    Logical interfaces are virtual interfaces capable of data exchange but do not exist physically.

    z Loopback interface configuration z Null interface configuration z RPR logical interface configuration z Subinterface configuration z MP-group interface configuration

    Ethernet OAM

    Ethernet OAM (operation, administration, and maintenance) is a network monitoring tool.

    z Basic Ethernet OAM functions configurationz Configuration of periods and thresholds for

    Ethernet OAM link error event detection z OAM loopback testing configuration

    ATM

    Asynchronous Transfer Mode (ATM) is a technology based on packet transmission mode while incorporating the high speed of circuit transmission mode.

    z ATM interface configuration z ATM subinterface configuration z PVC parameters configuration z Configuration of applications carried by

    ATM

    VLAN Termination

    VLAN termination is mainly used for communication between different VLANs, and communication between LANs and WANs.

    z VLAN termination overview z TPID configuration for VLAN packets z Configuration of QinQ termination

  • i

    Table of Contents

    1 CPOS Interface Configuration1-1 Overview 1-1

    SONET/SDH1-1 CPOS1-1 SDH Frame Structure 1-1 Terms1-2 Multiplexing E1/T1 Channels to Form STM-1 1-2 Calculating E1/T1 Channel Sequence Numbers1-3 Overhead Bytes1-4

    Configuring a CPOS Interface 1-5 Configuring an E1 Channel1-6 Configuring a T1 Channel 1-7 Displaying and Maintaining CPOS Interfaces1-8 CPOS Interface Configuration Example 1-9

    Application Scenario1-9 CPOS Interface Configuration Example1-9

    Troubleshooting CPOS Interfaces 1-11

  • 1-1

    1 CPOS Interface Configuration When configuring CPOS interfaces, go to these sections for information you are interested in:

    z Overview z Configuring a CPOS Interface z Configuring an E1 Channel z Configuring a T1 Channel z Displaying and Maintaining CPOS Interfaces z CPOS Interface Configuration Example z Troubleshooting CPOS Interfaces

    Overview

    This section covers these topics:

    z SONET/SDH z CPOS z SDH Frame Structure z Terms z Multiplexing E1/T1 Channels to Form STM-1 z Calculating E1/T1 Channel Sequence Numbers z Overhead Bytes

    SONET/SDH

    Synchronous Optical Network (SONET), a synchronous transmission system defined by the ANSI, is an international standard transmission protocol. It adopts optical transmission.

    Synchronous Digital Hierarchy (SDH), defined by the CCITT (todays ITU-T), uses a SONET rate subset. As SDH adopts synchronous multiplexing and a flexible mapping structure, you can add to or drop from an SDH signal low-speed tributary signals without having to use a large amount of multiplexing/demultiplexing devices. This reduces signal attenuation and investment in devices.

    CPOS

    The Low-speed tributary signals multiplexed to form an SDH signal are called channels. The channelized POS (CPOS) interface makes full use of SDH to provide precise bandwidth division, reduce the number of low-speed physical interfaces on devices, enhance their redistribution capacity, and improve the access capacity of leased lines.

    The CPOS interface operates at the rate of STM-1 or STM-16.

    SDH Frame Structure

    To understand the benefits of CPOS, you should first understand the frame structure of SDH signal STM-N.

  • 1-2

    Low-speed tributary signals should distribute in one frame regularly and evenly for the convenience of adding them to or dropping them from high-speed signals. The ITU-T stipulates that STM-N frames adopt the structure of rectangle blocks in bytes, as illustrated in the following figure:

    Figure 1-1 STM-N frame structure

    RegeneratorSection

    Overhead

    Payload

    9N

    1

    9270N bytes)

    AU-PTR

    MultiplexSection

    Overhead

    261N

    23

    54

    6

    87

    9

    STM-N is a rectangle-block frame structure of 9 rows x 270 x N columns, where the N in STM-N equals the N columns. N takes the value 1, 4, 16, and so on, indicating the number of STM-1 signals that form SDH signal.

    The STM-N frame structure consists of three parts: the section overhead (SOH), which includes the regenerator section overhead (RSOH) and the multiplex section overhead (MSOH); the administration unit pointer (AU-PTR); and payload. AU-PTR is the pointer that indicates the location of the first byte of the payload in an STM-N frame so that the receiving end can correctly extract the payload.

    Terms

    z Multiplex unit: A basic SDH multiplex unit includes multiple containers (C-n), virtual containers (VC-n), tributary units (TU-n), tributary unit groups (TUG-n), administrative units (AU-n) and administrative unit groups (AUG-n), where n is the hierarchical sequence number of unit level.

    z Container: Information structure unit that carries service signals at different rates. G.709 defines the criteria for five standard containers: C-11, C-12, C-2, C-3 and C-4.

    z Virtual container (VC): Information structure unit supporting channel layer connection of SDH. It terminates an SDH channel. VC is divided into lower-order and higher-order VCs. VC-4 and VC-3 in AU-3 are higher-order virtual containers.

    z Tributary unit (TU) and tributary unit group (TUG): TU is the information structure that provides adaptation between higher-order and lower-order channel layers. TUG is a set of one or more TUs whose location is fixed in higher-order VC payload.

    z Administrative unit (AU) and administrative unit group (AUG): AU is the information structure that provides adaptation between higher-order channel layer and multiplex section layer. AUG is a set of one or more AUs whose locations are fixed in the payload of STM-N.

    Multiplexing E1/T1 Channels to Form STM-1

    In the SDH multiplexing recommended by G.709, more than one path is available for a valid payload to be multiplexed to form STM-N. The following figures illustrate the multiplexing processes from E1 and T1 to STM-1.

  • 1-3

    Figure 1-2 Process of multiplexing E1 channels to form STM-1

    Figure 1-3 Process of multiplexing T1 channels to form STM-1

    STM-1

    TU-11TUG-2VC-3AU-3

    TUG-3VC-4AU-4AUG-1

    VC-11C-11

    1 1 3

    3

    7

    7

    4

    C-11: 1.544 Mbps

    Multiplexing

    Mapping

    Aligning

    In actual applications, different countries and regions may adopt different multiplexing structures. To ensure interoperability, the multiplex mode command is provided on CPOS interfaces. This allows you to select the AU-3 or AU-4 multiplexing structure.

    Calculating E1/T1 Channel Sequence Numbers

    Since CPOS interfaces adopt the byte interleaved multiplexing mode, the lower-order VCs are not arranged in order in a higher-order VC. To understand how TU numbers are calculated, see the following example where E1 channels are multiplexed to form STM-1 through the AU-4.

    As shown in Figure 1-2, when the AU-4 path is used, the multiplexing structure for 2 Mbps is 3-7-3. The formula for calculating the TU-12 sequence numbers of different locations in the same VC-4 is as follows:

    Sequence number of TU-12 = TUG-3 number + (TUG-2 number 1) x 3 + (TU-12 Number 1) x 21

    The two TU-12s are adjacent to each other, if they have the same TUG-3 number and TUG-2 number but different TU-12 numbers with a discrepancy of 1.

    The numbers in the aforementioned formula refer to the location numbers in a VC-4 frame. TUG-3 can be numbered in the range 1 to 3; TUG-2 in the range 1 to 7 and TU-12 in the range 1 to 3. TU-12 numbers indicate the order in which the 63 TU-12s in a VC-4 frame are multiplexed, that is, E1 channel numbers.

  • 1-4

    Figure 1-4 Order of TUG-3s, TUG-2s, and TU-12s in a VC-4 frame

    VC-4 TUG-3

    TUG-3

    TUG-3

    TUG-2

    TU-12

    TU-12

    TU-12

    TUG-2

    TU-12

    TU-12

    TU-12

    TUG-2

    TU-12

    TU-12

    TU-12

    1

    2

    3

    1

    2

    7

    .

    .

    .

    1

    2

    3

    1

    2

    3

    1

    2

    3

    You can calculate TU-12 numbers in the same way when the AU-3 path is used.

    When 63 E1 channels or 84 T1 channels are configured on a CPOS interface, you can reference E1 or T1 channels by referencing the numbers in the range 1 to 63 or 1 to 84. When connecting your device to channelized STM-1 interfaces on devices of other vendors, you should consider the possible numbering differences due to different channel referencing approaches.

    Overhead Bytes

    SDH provides layered monitoring and management of precise division.

    It provides monitoring at section and channel levels, where sections are subdivided into regenerator and multiplex sections, and channels are subdivided into higher-order and lower-order paths. These monitoring functions are implemented using overhead bytes.

    SDH provides a variety of overhead bytes, but only those involved in CPOS configuration are discussed in this section.

    z SOH

    Section overhead (SOH) consists of regenerator section overhead (RSOH) and multiplex section overhead (MSOH).

    The regeneration section trace message J0 is included in RSOH to send the section access point identifier repeatedly. Based on the identifier, the receiver can make sure that it is in continuous connection with the sender. This byte can be any character in the network of the same operator. If the networks of two operators are involved, the sending and receiving devices at network borders must use the same J0 byte. With the j0 byte, operators can detect and troubleshoot faults in advance or use less time to recover networks.

  • 1-5

    z POH

    The payload of an STM-N frame includes path overhead (POH), which monitors low-speed tributary signals.

    While the SOH monitors the section layer, the POH monitors the path layer. The POH is divided into the higher-order path overhead and the lower-order path overhead.

    Higher-order path overhead monitors paths at the VC-4/VC-3 level.

    Similar to the J0 byte, the higher-order VC-N path trace byte J1 is included in the higher-order path overhead to send the higher-order path access point identifier repeatedly. Based on the identifier, the receiving end of the path can make sure that it is in continuous connection with the specified sending end. The J1 byte at the receiving and transmission ends should be matched.

    In addition, the path signal label byte C2 is also included in the higher-order path overhead to indicate the multiplexing structure of VC frames and the property of payload, for instance, whether the path is carrying services, what type of services are carried, and how they are mapped. The sender and receiver must use the same C2 byte.

    Configuring a CPOS Interface

    Follow these steps to configure a CPOS interface:

    To do... Use the command... Remarks

    Enter system view system-view

    Enter CPOS interface view controller cpos cpos-number Required

    Set the framing format frame-format { sdh | sonet } Optional The default is SDH.

    Set the clock mode clock { master | slave } Optional The default is slave.

    Set the loopback mode loopback { local | remote } Optional Disabled by default

    Configure the AUG multiplexing mode multiplex mode { au-3 | au-4 }

    Optional Available only in SDH framing. The default is AU-4.

    Configure the regeneration section trace message J0

    flag j0 sdh j0-string-15 flag j0 sonet j0-value-hex

    Optional J0 is a section overhead byte used for checking the continuity of the connection between two interfaces at the section level. J0 takes the value SR8800 by default.

    Configure the channel trace byte J1

    flag j1 highpathnumber sdh j1-string-15 flag j1 highpathnumber sonet j1-string-62

    Optional J1 and C2 are high-order path overhead bytes. J1 is used for checking the continuity of the

  • 1-6

    To do... Use the command... Remarks

    Configure the signal label byte C2

    flag c2 highpathnumber c2-value- hex

    connection between two interfaces at the path level; C2 indicates the multiplexing structure of VC frames and the property of payload. By default, J1 takes the value SR8800, and C2 is 0x02 (hexadecimal).

    Configure the path trace byte S1S0

    flag s1s0 highpathnumber s1s0-value

    Optional The default S1S0 is 0 for SONET and 2 for SDH.

    Configure the signal label byte S1 flag s1 s1-value-hex

    Optional The default is 0x0F.

    Shut down the CPOS interface shutdown Optional By default, a CPOS interface is up.

    Bring up the CPOS interface undo shutdown Optional By default, a CPOS interface is up.

    Configure the signal degrade (SD) threshold and the signal fail (SF) threshold

    threshold { sd | sf } value

    Optional By default, the SD threshold value is 10e-6, and the SF threshold is 10e-3.

    Configure E1 or T1 channel attributes

    See Configuring an E1 Channel or Configuring a T1 Channel. Optional

    z If no cable is connected to a physical interface, shut down the interface with the shutdown command to avoid anomalies resulting from interference.

    z As the shutdown command can disable an interface, use it with caution.

    Configuring an E1 Channel

    Follow these steps to configure an E1 channel:

    To do... Use the command... Remarks

    Enter system view system-view

    Enter CPOS interface view controller cpos cpos-number Required

    Set the E1 framing format e1 e1-number set frame-format { crc4 | no-crc4 }

    Optional The default is no-CRC4.

    Set the clock mode for E1 e1 e1-number set clock { master | slave } Optional The default is slave.

  • 1-7

    To do... Use the command... Remarks

    Set the loopback mode for E1 e1 e1-number set loopback { local | payload | remote } Optional Disabled by default

    Set the overhead bytes for E1

    e1 e1-number set flag c2 c2-value e1 e1-number set flag j2 { sdh | sonet } j2-string

    Optional By default, C2 is set to 0x02 and J2 is SR8800.

    Configure E1 to operate in unframed mode

    e1 e1-number unframed Required By default, an E1 channel is not channelized.

    undo e1 e1-number unframedOptional The default is framed mode (CE1 mode).

    Configure the E1 operating mode (in either approach)

    Configure E1 to operate in framed mode and perform timeslot bundling to generate a serial interface

    e1 e1-number channel-set set-number timeslot-list range

    Required By default, an E1 channel is not channelized.

    Shut down an E1 channel e1 e1-number shutdown Optional By default, an E1 channel is up.

    Bring up an E1 channel undo e1 e1-number shutdownOptional By default, an E1 channel is up.

    Configuring a T1 Channel

    Follow these steps to configure a T1 channel:

    To do... Use the command... Remarks

    Enter system view system-view

    Enter CPOS interface view controller cpos cpos-number Required

    Set the T1 framing format t1 t1-number set frame-format { esf | sf } Optional The default is ESF.

    Set the clock mode for T1 t1 t1-number set clock { master | slave } Optional The default is slave.

    Set the loopback mode for T1 t1 t1-number set loopback { local | payload | remote } Optional Disabled by default

    Set the overhead bytes for T1

    t1 t1-number set flag c2 c2-value t1 t1-number set flag j2 { sdh | sonet } j2-string

    Optional By default, C2 is set to 0x02 and J2 is SR8800.

    Configure T1 to operate in unframed mode

    t1 t1-number unframed Required By default, a T1 channel is not channelized.

    Configure the T1 operating mode (in either approach)

    Configure T1 to operate in

    undo t1 t1-number unframed Optional The default is framed mode

  • 1-8

    To do... Use the command... Remarks unframed mode and perform timeslot bundling to generate a serial interface

    t1 t1-number channel-set set-number timeslot-list range [ speed { 56k | 64k } ]

    Required By default, a T1 channel is not channelized.

    Shut down a T1 channel t1 t1-number shutdown Optional By default, a T1 channel is up.

    Bring up a T1 channel undo t1 t1-number shutdown Optional By default, a T1 channel is up.

    Displaying and Maintaining CPOS Interfaces

    To do... Use the command... Remarks

    Display information about channels on a specified or all CPOS interfaces

    display controller cpos [ cpos-number ] Available in any view

    Display information about a specified E1 channel on a CPOS interface

    display controller cpos cpos-number e1 e1-number Available in any view

    Display information about a specified T1 channel on a CPOS interface

    display controller cpos cpos-number t1 t1-number Available in any view

    Display information about an E1/T1 serial interface

    display interface serial [ interface-number:set-number ]

    Available in any view

    Shut down the CPOS physical interface shutdown

    Available in CPOS interface view

    Bring the CPOS physical interface up. undo shutdown

    Available in CPOS interface view

    Shut down an E1 channel e1 e1-number shutdown Available in CPOS interface view

    Bring an E1 channel up undo e1 e1-number shutdown Available in CPOS interface view

    Shut down a T1 channel t1 t1-number shutdown Available in CPOS interface view

    Bring a T1 channel up undo t1 t1-number shutdown Available in CPOS interface view

    Clear the controller counter of a CPOS interface

    reset counters controller cpos interface-number Available in user view

  • 1-9

    z For information about the display interface command, refer to Ethernet Interface Commands in the Access Volume.

    z For information about the display interface serial command, refer to WAN Interface Commands in the Access Volume.

    CPOS Interface Configuration Example

    Application Scenario

    CPOS is used to enhance the capability of a device in low-speed access redistribution. STM-1 CPOS is especially suitable for aggregating E1/T1 channels.

    At present, some government agencies and enterprises use low-end and mid-range devices to access transmission networks through E1/T1 leased lines. Users who require bandwidth between E1 and T3 (44 Mbps), for a data center for example, lease multiple E1/T1 lines.

    The bandwidth of all these users is aggregated across a transmission network to one or more channelized POS interfaces, which are then connected to a high-end router. On the high-end router, the low-end routers are uniquely identified by channels.

    In actual applications, the connection between these low-end routers and the channelized POS interfaces may span more than one transmission network and as such, may require relay. This is similar to the scenario where low-end devices are connected to Router A through one or multiple E1/T1 leased lines, as shown in Figure 1-5.

    Figure 1-5 Network diagram for a CPOS application

    CPOS Interface Configuration Example

    Network requirements

    As shown in Figure 1-6, Branch nodes Router B through Router H are uplinked to the central node Router A through E1 links and Router A aggregates these E1 links with a CPOS interface.

    Add one more E1 link on Router B to expand its capacity. In addition, bind the two E1 links through an MP-group interface.

  • 1-10

    Figure 1-6 Network diagram for CPOS interface configuration

    Configuration procedure

    This configuration example provides only the key CPOS and E1 interface configuration steps.

    1) Configuration on Router A

    # Configure the clock mode of CPOS 3/1/9 and its channelized E1 interfaces E1 1 and E1 2 as master.

    system-view [Sysname] controller cpos 3/1/9 [Sysname-Cpos3/1/9] clock master [Sysname-Cpos3/1/9] e1 1 unframed [Sysname-Cpos3/1/9] e1 1 set clock master [Sysname-Cpos3/1/9] e1 2 unframed [Sysname-Cpos3/1/9] e1 2 set clock master

    # Create MP-group interface 3/1/28 and assign an IP address for it.

    [Sysname] interface mp-group 3/1/28 [Sysname-Mp-group3/1/28] ip address 10.1.1.1 30 [Sysname-Mp-group3/1/28] quit

    # Configure interfaces Serial 3/1/9/1:1 and Serial 3/1/9/2:1.

    [Sysname] interface serial3/1/9/1:1 [Sysname-Serial3/1/9/1:1] ppp mp mp-group 3/1/28 [Sysname-Serial3/1/9/1:1] quit [Sysname] interface serial3/1/9/2:1 [Sysname-Serial3/1/9/2:1] ppp mp mp-group 3/1/28 [Sysname-Serial3/1/9/2:1] quit 2) Configuration on Router B

    The configuration on Router B is similar to that on other branch nodes.

    system-view [Sysname] controller e1 3/1/9 [Sysname-E13/1/9] using e1

  • 1-11

    [Sysname-E13/1/9] quit [Sysname] controller e1 3/1/10 [Sysname-E13/1/10] using e1 [Sysname-E13/1/10] quit

    # Create MP-group 3/1/28 and assign an IP address for it.

    [Sysname] interface mp-group 3/1/28 [Sysname-Mp-group3/1/28] ip address 10.1.1.2 30 [Sysname-Mp-group3/1/28] quit

    # Configure Serial 3/1/9/1:1 and Serial 3/1/9/2:1.

    [Sysname] interface serial3/1/9/1:1 [Sysname-Serial3/1/9/1:1] ppp mp mp-group 3/1/28 [Sysname-Serial3/1/9/1:1] quit [Sysname] interface serial3/1/9/2:1 [Sysname-Serial3/1/9/2:1] ppp mp mp-group 3/1/28 [Sysname-Serial3/1/9/2:1] quit

    You can use the display interface serial 3/1/9/1:1 command, the display interface mp-group 3/1/28 command, and the display ppp mp command to display the connection status, and use the ping command to check network reachability.

    Troubleshooting CPOS Interfaces

    Symptom

    Connect the CPOS interface of a device to that of another vendor through SDH, bundle E1 channels on the interface to form a serial interface and encapsulate it with PPP.

    Perform the display interface serial command to check information on interface status. It shows that the physical state of the interface is UP, but the link protocol is DOWN; and loopback, though not configured, is detected on some interfaces.

    Solution

    The fault is very likely caused if the multiplex unit configurations on the SDH transmission device mismatch the E1 channel numbers on the CPOS interface on your device. This can result in timeslot inconsistency at the two ends of transmission and as such, PPP negotiation failures and LCP anomalies.

    Besides, if an idle timeslot on a loopback serial interface on the transmission device is used in transmission, the information that loopback is detected is displayed. Use the debugging ppp lcp error command to check loopback information.

    Follow these steps to solve the problem:

    z Use the display controller cpos e1 command to view the multiplexing paths of the E1 channels or calculate the multiplexing path as shown in Calculating E1/T1 Channel Sequence Numbers.

    z Check the configurations on the transmission devices against the calculating result in the last step to make sure the same E1 multiplexing path is configured.

  • i

    Table of Contents

    1 POS Interface Configuration 1-1 Overview 1-1

    SONET/SDH1-1 POS 1-1

    Configuring a POS Interface 1-1 Configuring a POS Interface 1-2 Switching Interface Type Between POS and Layer-3 GE1-3

    Displaying and Maintaining POS Interfaces1-3 POS Interface Configuration Example1-4

    Directly Connecting Routers Through POS Interfaces1-4 Troubleshooting POS Interfaces1-4

  • 1-1

    1 POS Interface Configuration When configuring POS interfaces, go to these sections for information you are interested in:

    z Overview z Configuring a POS Interface z Displaying and Maintaining POS Interfaces z POS Interface Configuration Example z Troubleshooting POS Interfaces

    Overview

    SONET/SDH

    Synchronous Optical Network (SONET), a synchronous transmission system defined by ANSI, is an international standard transmission protocol. It adopts optical transmission where transmission rates form a sequence of STM-1, STM-4, and STM-16, each four times the immediate lower level. Because signals are synchronous, SDH can multiplex multiple signals conveniently.

    Synchronous Digital Hierarchy (SDH), defined by the CCITT (the ITU-T at present), uses a SONET rate subset.

    POS

    Packet over SONET/SDH (POS) is a technology popular on WAN and MAN. It can support packet data such as IP packets.

    POS maps length-variable packets directly to SONET synchronous payloads and uses the SONET physical layer transmission standard. It offers high-speed, reliable, and point-to-point data connectivity.

    The POS interfaces on your device support PPP and HDLC at the data link layer and IP at the network layer. Its transmission rate can vary with devices.

    Configuring a POS Interface

    Before you configure the link layer and network layer protocols on a POS interface, you must configure its physical parameters.

  • 1-2

    Configuring a POS Interface

    Follow these steps to configure a POS interface:

    To do... Use the command... Remarks

    Enter system view system-view

    Enter POS interface view interface pos interface-number Required

    Set the clock mode clock { master | slave } Optional The default is slave.

    Set the CRC length crc { 16 | 32 } Optional The default is 32 bits.

    Set the loopback mode loopback { local | remote }

    Optional Loopback is disabled by default. Enable it only when special test is desired.

    flag c2 flag-value Optional The default is hexadecimal 16 for C2.

    Configure the overhead bytes

    flag { j0 | j1 } { sdh | sonet } flag-value

    Optional By default, SDH framing applies. In SDH framing, the defaults are null for both J0 and J1.

    Set the framing format frame-format { sdh | sonet } Optional The default is SDH.

    Configure scrambling scramble Optional Enabled by default.

    Specify the link layer protocol link-protocol { ppp | hdlc } Optional The default is PPP.

    Set the interface MTU mtu size

    Optional The MTU in bytes ranges from 46 to 10240 and defaults to 1500. Currently, the maximum MTU for POS interfaces is 1560 bytes.

    Set the SD/SF threshold for the interface threshold { sd | sf } value

    Optional The SD threshold defaults to 10e-6. The SF threshold defaults to 10e-4.

    Set the rate of the POS interface speed speed-value

    Optional By default, the rate of a POS interface on a super subcard is 155 Mbps.

    Shut down the POS interface shutdown Optional By default, a POS interface is enabled.

  • 1-3

    z The POS interface can work in the master clock mode only when the SRPU (or the main control board) is installed with a clock daughter card.

    z IPv6CP of PPP cannot get the peer IPv6 address through auto negotiation. Therefore, when a POS interface is used for IPv6 hardware forwarding, you need to configure static routes or routing protocols on it.

    z If no cable is connected to a physical interface, shut down the interface with the shutdown command to avoid anomalies resulting from interference. As the shutdown command can disable an interface, use it with caution.

    z Currently, you cannot add a POS interface to an MP group, that is, you cannot configure the ppp mp { mp-group mp-number | short-sequence } command on a POS interface.

    Switching Interface Type Between POS and Layer-3 GE

    On a super (TCP8L) sub-card, you can switch the interface type of a POS interface to Layer-3 gigabit Ethernet (GE) and vice versa to adapt to different circumstances.

    Follow these steps to switch the type of an interface:

    To do Use the command Remarks

    Enter system view system-view

    Enter POS interface view

    interface pos interface-number

    Enter interface view

    Enter Layer-3 GE interface view

    interface GigabitEthernet interface-number

    Required Use either command. In POS interface view you can switch the type of the interface from POS to Layer-3 GE, and in Layer-3 GE interface view from Layer-3 GE to POS.

    Switch the interface type port-type switch interface-type Required

    Displaying and Maintaining POS Interfaces

    To do... Use the command... Remarks

    Display the status and configuration information of one or all POS interfaces

    display interface pos [ interface-number ]

    Available in any view

    Display IP-related configurations and statistics for one or all POS interfaces

    display ip interface pos [ interface-number ]

    Available in any view

    Display IPv6-related configurations and statistics for one or all POS interfaces

    display ipv6 interface pos [ interface-number ]

    Available in any view

  • 1-4

    POS Interface Configuration Example

    Directly Connecting Routers Through POS Interfaces

    Network requirements

    z Use a pair of single mode optic fiber (respectively for receiving and sending data) to connect the POS interfaces on Router A and Router B, as shown in Figure 1-1.

    z Encapsulate the interfaces with PPP.

    Figure 1-1 Network diagram for connecting two POS interfaces through fiber

    Router A Router B

    POS2/1/110.110.1.10/24

    POS2/1/110.110.1.11/24

    Configuration procedure

    1) Configure Router A

    # Configure interface POS 2/1/1, setting its physical parameters to defaults.

    system-view [RouterA] interface pos 2/1/1 [RouterA-Pos2/1/1] ip address 10.110.1.10 255.255.255.0 [RouterA-Pos2/1/1] link-protocol ppp [RouterA-Pos2/1/1] mtu 1500 [RouterA-Pos2/1/1] shutdown [RouterA-Pos2/1/1] undo shutdown 2) Configure Router B

    # Configure interface POS 2/1/1.

    system-view [RouterB] interface pos 2/1/1

    # Set the clock mode to master and other physical parameters to defaults.

    [RouterB-Pos2/1/1] clock master [RouterB-Pos2/1/1] ip address 10.110.1.11 255.255.255.0 [RouterB-Pos2/1/1] link-protocol ppp [RouterB-Pos2/1/1] mtu 1500 [RouterB-Pos2/1/1] shutdown [RouterB-Pos2/1/1] undo shutdown

    You can check the interface connectivity between the POS interfaces with the display interface pos command and test network connectivity with the ping command.

    Troubleshooting POS Interfaces

    Symptom 1:

    The physical state of POS interface is down.

    Solution:

  • 1-5

    z Check that the transmitting and receiving fibers-optic are correctly connected to the POS interface. If you connect the two ends of a fiber-optic to the transmitting end and the receiving end of the same POS interface, you can see the message loopback detected on the screen when executing the display interface command even if you have not enabled loopback.

    z If the two routers are directly connected back to back, check that the internal clock is enabled on either of the two POS interfaces. POS interfaces use line clock by default; but when two routers are directly connected, one side must use the internal clock.

    Symptom 2:

    The physical layer is up but the link is down.

    Solution:

    Check that:

    z The configurations of clock, scrambling and other physical parameters are consistent on the connected two POS interfaces.

    z The same link layer protocol is configured on two sides.

    Symptom 3:

    A great amount of IP packets are dropped.

    Solution:

    Check that:

    z The correct clock mode is configured on the POS interface. If not, enormous amount of CRC errors can be generated.

    z The traffic over the POS interface is within the bandwidth of the interface.

  • i

    Table of Contents

    1 Ethernet Interface Configuration 1-1 Ethernet Interface Overview 1-1 General Ethernet Interface Configuration 1-1

    Configuring LAN/WAN Mode for a 10 GE Interface 1-1 Basic Ethernet Interface/Subinterface Configuration 1-2 Configuring Physical State Change Suppression on an Ethernet Interface1-4 Configuring Loopback Test on an Ethernet Interface1-4 Setting the Interval for Collecting Ethernet Interface Statistics 1-5 Configuring the Operating Mode of an Ethernet Interface 1-5

    Configuring a Layer 2 Ethernet Interface1-6 Layer 2 Ethernet Interface Configuration Task List1-6 Configuring a Port Group1-6 Configuring Storm Suppression for an Ethernet Interface 1-7 Enabling Forwarding of Jumbo Frames 1-7 Configuring the MDI Mode for an Ethernet Interface 1-8

    Configuring a Layer 3 Ethernet Interface/Subinterface1-8 Layer 3 Ethernet Interface/Subinterface Configuration Task List 1-8 Setting the MTU for an Ethernet Interface/Subinterface 1-9 Configuring Physical State Change Suppression on an Ethernet Interface1-9

    Displaying and Maintaining an Ethernet Interface/Subinterface1-10

  • 1-1

    1 Ethernet Interface Configuration When configuring Ethernet interfaces, go to these sections for information you are interested in:

    z Ethernet Interface Overview z General Ethernet Interface Configuration z Configuring a Layer 2 Ethernet Interface z Configuring a Layer 3 Ethernet Interface/Subinterface z Displaying and Maintaining an Ethernet Interface/Subinterface

    Ethernet Interface Overview

    Four types of Ethernet interfaces are available:

    z Layer 2 Ethernet interfaces. They are physical interfaces operating on the data link layer for forwarding Layer 2 protocol packets.

    z Layer 3 Ethernet interfaces. They are physical interfaces operating on the network layer for routing Layer 3 protocol packets. You can assign an IP address to a Layer 3 Ethernet interface.

    z Layer 2/Layer 3 Ethernet interfaces. They are physical interfaces that can operate on both the data link layer and the network layer. When operating on the data link layer, a Layer 2/Layer 3 Ethernet interface acts as a Layer 2 Ethernet interface; when operating on the network layer, a Layer 2/Layer 3 Ethernet interface acts as a Layer 3 Ethernet interface.

    z Layer 3 Ethernet subinterfaces. They are logical interfaces operating on the network layer. You can assign an IP address to a Layer 3 Ethernet subinterface. A Layer 3 Ethernet subinterface only sends and receives packets for a particular VLAN. By creating subinterfaces on a Layer 3 Ethernet interface, you can enable the interface to carry packets for multiple VLANs.

    General Ethernet Interface Configuration

    Configuring LAN/WAN Mode for a 10 GE Interface

    Introduction to LAN/WAN mode

    According to its physical characteristics, a 10 GigabitEthernet (10 GE) interface can operate in LAN or WAN mode.

    z LAN mode. 10 GE interfaces operating in LAN mode transfer Ethernet packets and are used to connect Ethernets.

    z WAN mode: 10 GE interfaces operating in WAN mode transfer Synchronous Digital Hierarchy (SDH) packets and are used to connect SDH networks. They only support point-to-point packet transfer.

  • 1-2

    A 10 GE interface operating in WAN mode encapsulates Ethernet packets as SDH frames, while a 10G packet over SDH (POS) interface encapsulates PPP packets as SDH frames. Because the SDH frame format of Ethernet packets is different from that of PPP packets, a 10 GE interface operating in WAN mode cannot communicate with a 10G POS interface.

    Introduction to J0/J1 overhead byte

    SDH frames have diversified overhead bytes, which accomplish the operation and maintenance functions such as hierarchical management of the transport network. J0 and J1 are used to provide internetworking support between different countries, regions, or devices of different manufacturers.

    The regenerator section trace byte J0 is usually set to a section access point identifier. The sending end keeps connected with the receiving end by sending this byte repeatedly.

    The path trace byte J1, usually set to a high-order path access point identifier, functions in a similar way to keep connected with the receiving end of the path.

    To ensure smooth communication, the J0 and J1 bytes should be matched respectively at the sending and receiving ends. For details about SDH and SDH overhead bytes, refer to related documents.

    Configure a 10 GE interface to operate in LAN/WAN mode

    Follow these steps to configure a 10 GE interface to operate in LAN/WAN mode:

    To do Use the command Remarks

    Enter system view system-view

    Enter ten-GigabitEthernet interface view

    interface ten-gigabitethernet interface-number

    Configure a 10 GE interface to operate in LAN/WAN mode port-mode { lan | wan }

    Optional By default, a 10 GE interface operates in LAN mode.

    Configure a value for J0/J1 bytes when the 10 GE interface operates in WAN mode

    flag { j0 | j1 } sdh value Optional By default, the value of the J0/J1 bytes is 0.

    The flag command can only take effect on 10 GE interfaces operating in WAN mode.

    Basic Ethernet Interface/Subinterface Configuration

    Configuring an Ethernet interface

    Three types of duplex modes are available to Ethernet interfaces:

  • 1-3

    z Full-duplex mode (full). Interfaces operating in this mode can send and receive packets simultaneously.

    z Half-duplex mode (half). Interfaces operating in this mode can either send or receive packets at a given time.

    z Auto-negotiation mode (auto). Interfaces operating in this mode determine their duplex mode through auto-negotiation.

    Similarly, if you configure the transmission rate for an Ethernet interface by using the speed command with the auto keyword specified, the transmission rate is determined through auto-negotiation too.

    Follow these steps to configure an Ethernet interface:

    To do Use the command Remarks

    Enter system view system-view

    Enter Ethernet interface view interface interface-type interface-number

    Set the description description text

    Optional By default, the description is interface index + interface, for example, M-Ethernet0/0/0 Interface.

    Set the duplex mode duplex { auto | full | half }

    Optional By default, the duplex mode is auto for an Ethernet electrical port and full for an Ethernet optical port.

    Set the transmission rate speed { 10 | 100 | 1000 | auto }Optional auto by default.

    Shut down the Ethernet interface shutdown

    Optional By default, an Ethernet interface is in up state. To bring up an Ethernet interface, use the undo shutdown command.

    After you modify the rate or duplex mode of an interface, you need to use the shutdown command to disable the interface and then use the undo shutdown command to enable it again, so as to start a new auto-negotiation process to make the new configuration take effect.

    Configuring an Ethernet subinterface

    Follow these steps to configure an Ethernet subinterface:

    To do Use the command Remarks

    Enter system view system-view

  • 1-4

    To do Use the command Remarks

    Create an Ethernet subinterface

    interface interface-type interface-number.subnumber

    Required This command also leads you to Ethernet subinterface view.

    Set the description string of the Ethernet subinterface description text

    Optional By default, the description string is interface index + interface, for example, GigabitEthernet2/1/7.20 Interface.

    Shut down the Ethernet subinterface shutdown

    Optional By default, an Ethernet subinterface is in up state.

    Configuring Physical State Change Suppression on an Ethernet Interface

    An Ethernet interface operates in one of the two physical link states: up or down. During the suppression time, physical-link-state changes will not be propagated to the system. Only after the suppression time has elapsed will the system be notified of the physical-link-state changes by the physical layer. This functionality reduces the extra overhead occurred due to frequent physical-link-state changes within a short period of time.

    Follow these steps to configure physical state change suppression on an Ethernet interface:

    To do Use the command Remarks

    Enter system view system-view

    Enter Ethernet interface view interface interface-type interface-number

    Configure the up/down suppression time of physical-link-state changes

    link-delay delay-time Required One second by default.

    Configuring Loopback Test on an Ethernet Interface

    You can enable loopback test on an Ethernet interface to check whether the Ethernet interface is functioning properly. During the test, no data packets can be forwarded. Loopback test falls into the following two categories:

    z Internal loopback test: During internal loopback test on an interface, packets sent from the interface are internally looped back to the interface without being sent onto the line. If the internal operation of the interface is normal, the interface should be able to receive the self-sent packets.

    z External loopback test: to perform external loopback test on an Ethernet interface, you need to insert a loopback plug into the Ethernet interface. During the test, the packets passing through the interface loops over the loopback plug and returns to the interface. If the interface is operating normally, it should be able to receive the packets.

    Follow these steps to enable loopback test on an Ethernet interface:

  • 1-5

    To do Use the command Remarks

    Enter system view system-view

    Enter Ethernet interface view interface interface-type interface-number

    Enable loopback test loopback { external | internal } Optional Disabled by default.

    z Currently, the device does not support the loopback external command. z As for the internal loopback test and external loopback test, if an interface is down, only the former

    is available on it; if the interface is shut down, both are unavailable. z The speed, duplex, mdi, and shutdown commands are not applicable during loopback test. z With loopback test enabled, the Ethernet interface operates in full duplex mode. With loopback test

    disabled, the original configurations will be restored. z After configuring the loopback internal command and then the undo loopback command on an

    Ethernet interface, you should re-enable the interface with the shutdown command and then the undo shutdown command to trigger an auto-negotiation on the interface.

    Setting the Interval for Collecting Ethernet Interface Statistics

    Follow these steps to configure the interval for collecting interface statistics:

    To do Use the command Remarks

    Enter system view system-view

    Configure the interval for collecting interface statistics flow-interval interval Optional

    Configuring the Operating Mode of an Ethernet Interface

    According to the layer at which the device processes received data packets, Ethernet interfaces can operate in bridge or route mode. When an Ethernet interface operates in bridge mode, data on it is forwarded through device hardware (you cannot configure an IP address for the interface); when an Ethernet interface operates in route mode, data on it is forwarded through Layer 3 IP routes. For a device, some interfaces can operate only in bridge mode, some can operate only in route mode, and others can operate in either bridge mode or route mode. This command is only applicable to Ethernet interfaces whose operating mode can be changed.

    Follow these steps to change the operating mode of an Ethernet interface:

    To do Use the command Remarks

    Enter system view system-view

    Enter Ethernet interface view interface interface-type interface-number

  • 1-6

    To do Use the command Remarks

    Change the operating mode of an Ethernet interface

    port link-mode { bridge | route } Required

    After you change the operating mode of an Ethernet interface, all the settings of the Ethernet interface are restored to their defaults.

    Configuring a Layer 2 Ethernet Interface

    Layer 2 Ethernet Interface Configuration Task List

    Complete the following tasks to configure an Ethernet interface operating in bridge mode:

    Task Remarks

    Configuring a Port Group Optional

    Configuring Storm Suppression for an Ethernet Interface Optional

    Enabling Forwarding of Jumbo Frames Optional

    Configuring the MDI Mode for an Ethernet Interface Optional

    Configuring a Port Group

    The SR8800 series allow you to configure some functions on multiple interfaces at a time by assigning the interfaces to a port group in addition to configuring them on a per-interface basis. This is helpful when you have to configure a feature in the same way on multiple interfaces.

    A port group is created manually and the settings you made on it apply to all group member interfaces. Note that even though the settings are made on the port group, they are saved on an interface basis rather than on a port group basis. Thus, you can only view the settings in the view of each interface with the display current-configuration command or the display this command.

    Follow these steps to configure a manual port group:

    To do Use the command Remarks

    Enter system view system-view

    Create a manual port group and enter manual port group view

    port-group manual port-group-name Required

    Add Ethernet interfaces to the manual port group group-member interface-list Required

  • 1-7

    Configuring Storm Suppression for an Ethernet Interface

    You can use the following commands to suppress the broadcast traffic on an Ethernet interface:

    In interface view, the suppression ratio indicates the maximum broadcast traffic that is allowed to pass through an interface. When the broadcast traffic on the interface exceeds the limit, the system will discard the extra packets so that the broadcast traffic ratio can drop below the limit to ensure that the network functions properly.

    Follow these steps to set storm suppression ratios for one or multiple Ethernet interfaces:

    To do Use the command Remarks

    Enter system view system-view

    Enter Ethernet interface view

    interface interface-type interface-number Enter

    Ethernet interface view or port group view Enter port

    group view port-group manual port-group-name

    Use either command. If configured in Ethernet interface view, this feature takes effect on the current port only; if configured in port group view, this feature takes effect on all ports in the port group.

    Configure broadcast storm suppression broadcast-suppression ratio

    Optional By default, all broadcast traffic is allowed to pass through an interface, that is, broadcast traffic is not suppressed.

    If you set storm suppression ratios in Ethernet interface view or port group view repeatedly for an Ethernet interface that belongs to a port group, only the latest settings take effect.

    Enabling Forwarding of Jumbo Frames

    Due to tremendous amount of traffic occurring in Ethernet, it is likely that some frames might have a frame size greater than the standard Ethernet frame size. If you have not configured the system to allow such frames (called jumbo frames) to pass through Ethernet interfaces, the system will drop these frames. After you enable this function in the system, the sys