00367766-ma5600t configuration guide-(v800r005c06_02)

828
SmartAX MA5600T Multi-service Access Module V800R005C06 Configuration Guide Issue 02 Date 2008-04-25 Part Number 00367766 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd

Upload: waqassiddiqi123

Post on 12-Nov-2014

685 views

Category:

Documents


11 download

DESCRIPTION

User Guide

TRANSCRIPT

SmartAX MA5600T Multi-service Access Module V800R005C06 Configuration Guide

Issue Date Part Number

02 2008-04-25 00367766

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd

Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any assistance, please contact our local office or company headquarters.

Huawei Technologies Co., Ltd.Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China http://www.huawei.com [email protected]

Website: Email:

Copyright Huawei Technologies Co., Ltd. 2008. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissionsand other Huawei trademarks are the property of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders.

NoticeThe information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd

SmartAX MA5600T Multi-service Access Module

Contents

ContentsAbout This Document.....................................................................................................................1 1 Maintenance Terminal Configuration...................................................................................1-11.1 Overview.........................................................................................................................................................1-2 1.2 Configuring the Terminal Through the Local Serial Port...............................................................................1-3 1.3 Configuring the Terminal Through the Remote Serial Port............................................................................1-7 1.4 Configuring the Terminal Through the Outband Management Channel .....................................................1-12 1.5 Configuring the Terminal Through the Inband Management Channel.........................................................1-16 1.6 Configuring the Terminal Through SSH.......................................................................................................1-20

2 Getting Started With CLI..........................................................................................................2-12.1 Overview.........................................................................................................................................................2-2 2.2 CLI Characteristics..........................................................................................................................................2-2 2.2.1 Command Modes...................................................................................................................................2-3 2.2.2 Intelligent Matching...............................................................................................................................2-5 2.2.3 Edit Characteristics................................................................................................................................2-6 2.2.4 Interaction Function...............................................................................................................................2-7 2.2.5 Parameter Prompt...................................................................................................................................2-7 2.2.6 Display Characteristics...........................................................................................................................2-8 2.2.7 Saving and Querying History Commands..............................................................................................2-9 2.2.8 CLI Error Prompts................................................................................................................................2-10 2.3 Basic Operations Through CLI.....................................................................................................................2-10 2.3.1 Obtaining the Online Help Information...............................................................................................2-11 2.3.2 Enabling the Interactive Command Execution Mode..........................................................................2-13 2.3.3 Enabling the CLI Trap Reporting.........................................................................................................2-14 2.3.4 Searching for a Keyword......................................................................................................................2-15 2.3.5 Switching the Terminal Language.......................................................................................................2-15 2.3.6 Setting the System Time......................................................................................................................2-16 2.3.7 Setting the System Name.....................................................................................................................2-17 2.3.8 Setting the Terminal Type....................................................................................................................2-17 2.3.9 Setting the Timeout Exit Time.............................................................................................................2-18 2.3.10 Locking the Terminal.........................................................................................................................2-18 2.3.11 Clearing the Terminal Screen.............................................................................................................2-19 2.3.12 Querying the Version.........................................................................................................................2-19 Issue 02 (2008-04-25) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd i

Contents

SmartAX MA5600T Multi-service Access Module 2.3.13 Querying the CPU Usage...................................................................................................................2-20 2.3.14 Querying the Memory Usage.............................................................................................................2-21 2.3.15 Testing the Network State..................................................................................................................2-21

3 Network Management Configuration....................................................................................3-13.1 Overview.........................................................................................................................................................3-3 3.2 Basic Concepts................................................................................................................................................3-3 3.3 Configuration Example of an Outband NMS..................................................................................................3-4 3.4 Configuration Example of an Inband NMS....................................................................................................3-7 3.5 SNMP Agent Configuration..........................................................................................................................3-10 3.5.1 Setting the SNMP Version...................................................................................................................3-11 3.5.2 Adding a Community Name and Setting Its Read/Write Authorities..................................................3-12 3.5.3 Enabling the Trap Sending...................................................................................................................3-13 3.5.4 Setting the IP address of a Destination Host for Receiving Traps.......................................................3-13 3.5.5 Setting the Source Interface for Sending Traps....................................................................................3-14 3.5.6 Setting the System Contact Information..............................................................................................3-15 3.5.7 Setting the System Location Information.............................................................................................3-16 3.5.8 Configuring an SNMP V3 User...........................................................................................................3-16 3.5.9 Configuring an SNMP V3 Group.........................................................................................................3-17 3.5.10 Configuring an SNMP MIB View.....................................................................................................3-18 3.5.11 Configuring the Local SNMP Engine ID...........................................................................................3-19 3.5.12 Enabling the Timely Handshake Function between the MA5600T and the N2000..........................3-20 3.5.13 Setting the Handshake Interval..........................................................................................................3-21 3.6 Configuring the IP Address of the Outband NMS Interface.........................................................................3-22 3.7 Configuring an NMS Route..........................................................................................................................3-23 3.8 Configuring the IP Address of the Inband NMS Interface............................................................................3-24

4 Log Host Configuration............................................................................................................4-14.1 Overview.........................................................................................................................................................4-2 4.2 Configuration Example of a Log Host............................................................................................................4-2 4.3 Configuring a Log Host...................................................................................................................................4-4 4.4 Deleting a Log Host........................................................................................................................................4-5 4.5 Deactivating a Log Host..................................................................................................................................4-6 4.6 Querying Logs.................................................................................................................................................4-7

5 User Management...................................................................................................................... 5-15.1 Overview.........................................................................................................................................................5-2 5.2 Adding a User Profile......................................................................................................................................5-2 5.3 Adding a User..................................................................................................................................................5-5 5.4 Modifying the User Attributes........................................................................................................................5-7 5.4.1 Modifying the Profile Bound with a User..............................................................................................5-7 5.4.2 Modifying the User Login Mode...........................................................................................................5-8 5.4.3 Modifying a User Level.......................................................................................................................5-10 5.4.4 Changing a User Password...................................................................................................................5-11 ii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd Issue 02 (2008-04-25)

SmartAX MA5600T Multi-service Access Module

Contents

5.4.5 Modifying the Permitted Number of Reenters.....................................................................................5-12 5.4.6 Modifying the Appended Information.................................................................................................5-13 5.5 Disconnecting an Online User.......................................................................................................................5-14 5.6 Deleting a User..............................................................................................................................................5-14

6 Device Management..................................................................................................................6-16.1 Overview.........................................................................................................................................................6-2 6.2 Setting the Description of a Shelf...................................................................................................................6-3 6.3 Resetting the Control Boards..........................................................................................................................6-3 6.4 Adding a Service Board Offline......................................................................................................................6-5 6.5 Confirming a Service Board............................................................................................................................6-6 6.6 Deleting a Service Board.................................................................................................................................6-6 6.7 Resetting a Service Board...............................................................................................................................6-7 6.8 Prohibiting a Service Board............................................................................................................................6-8

7 Remote User Authentication Configuration.........................................................................7-17.1 Overview.........................................................................................................................................................7-3 7.2 Related Concepts.............................................................................................................................................7-3 7.2.1 Introduction to AAA..............................................................................................................................7-3 7.2.2 Introduction to RADIUS........................................................................................................................7-4 7.2.3 Introduction to SSH................................................................................................................................7-4 7.2.4 Introduction to 802.1x............................................................................................................................7-5 7.3 Configuration Example of Remote User Authentication................................................................................7-6 7.4 Configuring the RADIUS..............................................................................................................................7-10 7.4.1 Overview..............................................................................................................................................7-11 7.4.2 Creating a RADIUS Server Template..................................................................................................7-11 7.4.3 Setting the IP Address and Port Number of a RADIUS Server...........................................................7-12 7.4.4 Setting the Shared Key of the RADIUS Server...................................................................................7-14 7.4.5 Setting the Response Timeout Interval of a RADIUS Server..............................................................7-14 7.4.6 Setting the Maximum Number of Transmissions for the RADIUS Request Packets..........................7-16 7.4.7 Setting the Format of the User Name Sent to a RADIUS Server........................................................7-17 7.5 Configuring 802.1x.......................................................................................................................................7-18 7.5.1 Configuring an 802.1x Template.........................................................................................................7-19 7.5.2 Enabling the 802.1x Authentication on a Port.....................................................................................7-21 7.5.3 Configuring the Control Mode of a Port..............................................................................................7-22 7.5.4 Enabling the 802.1x Authentication Globally......................................................................................7-23 7.5.5 Enabling the DHCP-Triggered Authentication....................................................................................7-24 7.6 Configuring AAA..........................................................................................................................................7-25 7.6.1 Configuring an Authentication Scheme...............................................................................................7-26 7.6.2 Configuring an Accounting Scheme....................................................................................................7-27 7.6.3 Configure an Accounting Mode...........................................................................................................7-28 7.6.4 Configuring the Interval for the Real-time Accounting.......................................................................7-29 7.6.5 Creating a Domain...............................................................................................................................7-31 7.6.6 Binding a RADIUS Server Template...................................................................................................7-32 Issue 02 (2008-04-25) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd iii

Contents

SmartAX MA5600T Multi-service Access Module 7.6.7 Specifying an Authentication Scheme.................................................................................................7-33 7.6.8 Specifying an Accounting Scheme......................................................................................................7-34 7.6.9 Referencing an 802.1x Template..........................................................................................................7-35

7.7 Configuring SSH...........................................................................................................................................7-36 7.7.1 Creating the Local RSA Key Pair........................................................................................................7-36 7.7.2 Configuring the SSH User Public Key.................................................................................................7-37 7.7.3 Configuring an SSH User.....................................................................................................................7-39

8 VLAN Configuration.................................................................................................................8-18.1 Overview.........................................................................................................................................................8-3 8.2 Configuration Example of a VLAN................................................................................................................8-5 8.3 Configuration Example of a MUX VLAN......................................................................................................8-7 8.4 Creating a VLAN..........................................................................................................................................8-10 8.5 Configuring the VLAN Attribute..................................................................................................................8-12 8.6 Setting the Inner and Outer Ethernet Protocols Type of a VLAN Stacking.................................................8-13 8.7 Setting the Inner VLAN Priority of the Service Port in a Stacking VLAN..................................................8-14 8.8 Adding an Upstream Port to a VLAN...........................................................................................................8-14 8.9 Adding a Service Port to a VLANAdding Service Port(s) to a VLAN.........................................................8-15 8.10 Adding Service Ports in Batches.................................................................................................................8-17 8.11 Configuring the Description of a Service Port............................................................................................8-18

9 DHCP Relay Configuration.....................................................................................................9-19.1 Overview.........................................................................................................................................................9-4 9.2 Configuration Example of DHCP Standard Mode..........................................................................................9-5 9.3 Configuration Example of DHCP Option60 Mode.........................................................................................9-8 9.4 Configuration Example of DHCP MAC Address Segment Mode................................................................9-11 9.5 Enabling the DHCP Proxy Function.............................................................................................................9-14 9.6 Creating a DHCP Server Group....................................................................................................................9-15 9.7 Setting the Working Mode of a DHCP Server..............................................................................................9-16 9.8 Setting the DHCP Relay Mode.....................................................................................................................9-17 9.9 Binding a DHCP Server Group with a VLAN Interface...............................................................................9-18 9.10 Creating an Option60 Domain....................................................................................................................9-19 9.11 Binding a DHCP Server Group with a DHCP Option60 Domain..............................................................9-20 9.12 Configuring the Gateway of a DHCP Option60 Domain...........................................................................9-21 9.13 Creating a DHCP MAC Address Segment.................................................................................................9-22 9.14 Setting the Range of a DHCP MAC Address Segment..............................................................................9-23 9.15 Binding a DHCP Server Group with a DHCP MAC Address Segment.....................................................9-24 9.16 Configuring the Gateway of a DHCP MAC Address Segment..................................................................9-25 9.17 Setting the DHCP Proxy Lease-Time.........................................................................................................9-26 9.18 Kicking Off a DHCP User..........................................................................................................................9-27

10 ARP & ARP Proxy Configuration.......................................................................................10-110.1 Overview.....................................................................................................................................................10-2 10.2 ARP Proxy Configuration Example............................................................................................................10-2 iv Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd Issue 02 (2008-04-25)

SmartAX MA5600T Multi-service Access Module

Contents

10.3 Adding a Static ARP Entry.........................................................................................................................10-5 10.4 Enabling the ARP Proxy.............................................................................................................................10-6

11 RIP Routing Protocol Configuration..................................................................................11-111.1 Overview.....................................................................................................................................................11-3 11.2 Configuration Example of the Static Route................................................................................................11-3 11.3 Configuration Example of RIP....................................................................................................................11-6 11.4 Configuration Example of a Routing Policy...............................................................................................11-9 11.5 Adding a Static Route...............................................................................................................................11-12 11.6 Configuring RIP........................................................................................................................................11-14 11.6.1 Enabling the RIP Process.................................................................................................................11-14 11.6.2 Setting the RIP Version....................................................................................................................11-15 11.6.3 Enabling an Interface to Receive/Transmit RIP Packets..................................................................11-16 11.7 Controlling the RIP Routing Information.................................................................................................11-17 11.7.1 Setting the Cost of the Default Route...............................................................................................11-18 11.7.2 Specifying the Default Routing Metric............................................................................................11-19 11.7.3 Setting the Additional Metric of a Route.........................................................................................11-20 11.7.4 Enabling the Route Summarization..................................................................................................11-20 11.7.5 Configuring a Summary Route IP Address......................................................................................11-21 11.7.6 Disabling Receiving Host Routes....................................................................................................11-22 11.7.7 Configuring the RIP Preference.......................................................................................................11-23 11.7.8 Importing the Routes of Other Protocols.........................................................................................11-24 11.7.9 Configuring the Route Filtering Policy............................................................................................11-25 11.7.10 Verifying the Source IP Address of a RIP Route Update..............................................................11-26 11.8 Adjusting and Optimizing RIP..................................................................................................................11-27 11.8.1 Configuring the RIP Timer..............................................................................................................11-27 11.8.2 Configuring the Zero Field Check for RIP-I Packets.......................................................................11-28 11.8.3 Configuring the RIP-2 Authentication Mode...................................................................................11-30 11.8.4 Enabling the Split Horizon Function................................................................................................11-30 11.8.5 Enabling the Poison Reverse Function.............................................................................................11-31 11.9 Configuring a Routing Policy...................................................................................................................11-32 11.9.1 Defining a Routing Policy................................................................................................................11-32 11.9.2 Defining the If-match Clause of a Route Policy..............................................................................11-34 11.9.3 Defining the Apply Clause of a Route Policy..................................................................................11-34 11.10 Enabling the Transparent Transmission function of the RIP Packet Based on the VLAN.....................11-36

12 OSPF Routing Protocol Configuration..............................................................................12-112.1 Overview.....................................................................................................................................................12-2 12.2 Configuration Example of OSPF................................................................................................................12-2 12.3 Configuring OSPF.......................................................................................................................................12-6 12.3.1 Enabling the OSPF Process................................................................................................................12-7 12.3.2 Configuring the DR Priority...............................................................................................................12-8 12.3.3 Setting an OSPF Router ID................................................................................................................12-8 12.3.4 Disabling the OSPF Packet Transmission on an Interface.................................................................12-9 Issue 02 (2008-04-25) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd v

Contents

SmartAX MA5600T Multi-service Access Module 12.3.5 Entering OSPF Area Config Mode..................................................................................................12-10 12.3.6 Configuring the Subnets for an Area................................................................................................12-11 12.3.7 Configuring the OSPF Stub Area.....................................................................................................12-11 12.3.8 Configuring an NBMA Adjacent Router.........................................................................................12-12 12.3.9 Enabling the OSPF Logging Function.............................................................................................12-13 12.3.10 Configuring the Network Type on an OSPF Interface...................................................................12-13 12.3.11 Configuring the MTU of the DD Packet........................................................................................12-15

12.4 Controlling the OSPF Routing Information..............................................................................................12-15 12.4.1 Setting the OSPF Preference............................................................................................................12-16 12.4.2 Configuring the Maximum OSPF Route Count...............................................................................12-17 12.4.3 Configuring the OSPF Packet Authentication.................................................................................12-18 12.4.4 Configuring the OSPF Cost..............................................................................................................12-18 12.4.5 Configuring the Route Summarization Between Areas...................................................................12-19 12.4.6 Configuring the Aggregation of Routes Imported by OSPF............................................................12-20 12.4.7 Importing Routes from Other Protocols into OSPF.........................................................................12-21 12.4.8 Setting the Default Parameters of OSPF Imported Routes..............................................................12-21 12.5 Adjusting and Optimizing OSPF...............................................................................................................12-22 12.5.1 Setting the Interval for Sending the Hello Packets..........................................................................12-23 12.5.2 Setting the Dead Time Between Adjacent Routers..........................................................................12-24 12.5.3 Setting the Hello Packet Poll Interval..............................................................................................12-24 12.5.4 Setting the LSA Transmit Delay......................................................................................................12-25 12.5.5 Setting the LSA Retransmit Interval between Adjacent Routers.....................................................12-26 12.5.6 Setting the SPF Calculation Interval for OSPF................................................................................12-27

13 IS-IS Routing Protocol Configuration...............................................................................13-113.1 Overview.....................................................................................................................................................13-2 13.2 Configuration Example of IS-IS.................................................................................................................13-3 13.3 Configuring IS-IS........................................................................................................................................13-6 13.3.1 Enabling the IS-IS Process.................................................................................................................13-6 13.3.2 Configuring the Network Entity Title................................................................................................13-7 13.3.3 Configuring the Router Level............................................................................................................13-9 13.3.4 Enabling the IS-IS Function on an Interface....................................................................................13-10 13.4 Controlling the IS-IS Routing Information...............................................................................................13-11 13.4.1 Configuring the IS-IS Priority..........................................................................................................13-12 13.4.2 Configuring the Cost of an IS-IS Interface......................................................................................13-13 13.4.3 Configuring IS-IS Route Aggregation.............................................................................................13-16 13.4.4 Generating IS-IS Default Routes......................................................................................................13-16 13.4.5 Configuring IS-IS to Filter the Received or Advertised Routing Information.................................13-17 13.4.6 Setting the State of IS-IS Interface to Suppressed...........................................................................13-18 13.4.7 Configuring IS-IS to Import External Routes..................................................................................13-19 13.4.8 Configuring the IS-IS Route Leaking..............................................................................................13-20 13.5 Adjusting and Optimizing IS-IS................................................................................................................13-21 13.5.1 Configuring Network Type of an IS-IS Interface............................................................................13-22 vi Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd Issue 02 (2008-04-25)

SmartAX MA5600T Multi-service Access Module

Contents

13.5.2 Configuring the Level of an IS-IS Interface.....................................................................................13-22 13.5.3 Configuring DIS Priority of an IS-IS Interface................................................................................13-23 13.5.4 Configuring IS-IS for Not Checking IP Addresses of Received Hello Packets...............................13-24 13.5.5 Configuring the IS-IS Packet Timer.................................................................................................13-25 13.5.6 Configuring LSP Parameters............................................................................................................13-27 13.5.7 Enabling LSP Fast Flooding............................................................................................................13-30 13.5.8 Configuring SPF Parameters............................................................................................................13-30 13.5.9 Configuring IS-IS Host Name Mapping..........................................................................................13-31 13.5.10 Configuring IS-IS Authentication..................................................................................................13-33 13.5.11 Configuring LSDB Overload Flag Bit...........................................................................................13-35 13.5.12 Enabling Output of the Adjacency State........................................................................................13-35

14 BGP Routing Protocol Configuration................................................................................14-114.1 Overview ....................................................................................................................................................14-2 14.2 Configuration Example of BGP..................................................................................................................14-2 14.3 Configuring Basic BGP Functions..............................................................................................................14-6 14.3.1 Configuring BGP Basic Description..................................................................................................14-6 14.3.2 Configuring BGP to Advertise the Local Routes...............................................................................14-7 14.3.3 Configuring the Local Interface Used for a BGP Connection...........................................................14-8 14.3.4 Configuring the Maximum Number of Hops in an EBGP Connection...........................................14-10 14.4 Configuring BGP Route Attributes...........................................................................................................14-11 14.4.1 Configuring the BGP Route Preference...........................................................................................14-11 14.4.2 Configuring the Default Local_Pref Attribute.................................................................................14-12 14.4.3 Configuring the MED Attribute.......................................................................................................14-12 14.4.4 Configuring the Next_Hop Attribute...............................................................................................14-13 14.4.5 Configuring the AS-Path Attribute..................................................................................................14-14 14.5 Controlling the BGP Routing Information................................................................................................14-15 14.5.1 Configuring BGP to Import Routes.................................................................................................14-16 14.5.2 Filtering the Routes Imported by BGP.............................................................................................14-17 14.5.3 Configuring BGP Route Aggregation..............................................................................................14-17 14.5.4 Configuring a Router to Advertise the Default Route to Its Peer....................................................14-18 14.5.5 Configuring BGP Access List..........................................................................................................14-19 14.5.6 Configuring a BGP Routing Policy..................................................................................................14-20 14.5.7 Configuring the Policy for Advertising the BGP Routing Information...........................................14-22 14.5.8 Configuring the Policy for Receiving the BGP Routing Information..............................................14-24 14.6 Adjusting and Optimizing BGP................................................................................................................14-26 14.6.1 Configuring the BGP Timers...........................................................................................................14-27 14.6.2 Configuring the Interval for Sending the Update Messages............................................................14-28 14.6.3 Configuring BGP Soft Reset............................................................................................................14-29 14.6.4 Enabling Quick Reset of an EBGP Connection...............................................................................14-30 14.6.5 Configuring MD5 Authentication....................................................................................................14-31 14.6.6 Configuring the Maximum Number of Equal-Cost Routes.............................................................14-32 14.6.7 Configuring EBGP Neighbor Split Horizon....................................................................................14-33 Issue 02 (2008-04-25) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd vii

Contents

SmartAX MA5600T Multi-service Access Module

15 MSTP Configuration.............................................................................................................15-115.1 Overview.....................................................................................................................................................15-3 15.2 Enabling the MSTP Function......................................................................................................................15-3 15.3 Setting the Working Mode of MSTP..........................................................................................................15-5 15.4 Setting the MST Region Parameters...........................................................................................................15-6 15.4.1 Setting the MD5-Key for the MD5 Encryption Algorithm Configured on the MST Region............15-7 15.4.2 Configuring the MST Region Name..................................................................................................15-8 15.4.3 Mapping the Specified VLAN to the Specified MSTP Instance........................................................15-9 15.4.4 Mapping All VLANs to the MSTP Instances by Modular Arithmetic............................................15-10 15.4.5 Setting the MSTP Revision Level....................................................................................................15-12 15.4.6 Restoring the Default Settings for All Parameters of the MST Region...........................................15-13 15.5 Activating the Configuration of the MST Region.....................................................................................15-13 15.6 Specifying the Device as a Root Bridge or a Backup Root Bridge...........................................................15-14 15.7 Setting the Priority of the Device in the Specified Spanning Tree Instance.............................................15-16 15.8 Setting the Maximum Number of Hops of the MST Region....................................................................15-17 15.9 Setting the Diameter of the Switching Fabric...........................................................................................15-18 15.10 Setting the Calculation Standard for the Path Cost.................................................................................15-19 15.11 Setting the Time Parameters of the Specified Network Bridge..............................................................15-20 15.11.1 Setting the Forward Delay of the Specified Network Bridge........................................................15-21 15.11.2 Setting the Hello Time of the Specified Network Bridge..............................................................15-22 15.11.3 Setting the Max Age of the Specified Network Bridge.................................................................. 15-23 15.11.4 Setting the Timeout Time Factor of the Specified Network Bridge..............................................15-25 15.12 Setting the Parameters of the Specified Port...........................................................................................15-26 15.12.1 Setting the Maximum Transmission Rate of the Specified Port....................................................15-26 15.12.2 Setting the Specified Port as an Edge Port.....................................................................................15-28 15.12.3 Setting the Path Cost of a Specified Port.......................................................................................15-29 15.12.4 Setting the Priority of the Specified Port.......................................................................................15-30 15.12.5 Setting the Point-to-Point Link Connection of the Specified Port.................................................15-31 15.13 Setting the mCheck Variable...................................................................................................................15-32 15.14 Configuring the Device Protection Function..........................................................................................15-33 15.14.1 Enabling the BPDU Protection Function of the Device.................................................................15-33 15.14.2 Enabling the Loop Protection Function of the Device...................................................................15-34 15.14.3 Enabling the Root Protection Function of the Device....................................................................15-36 15.15 Clear the MSTP Protocol Statistics.........................................................................................................15-37

16 NTP Configuration................................................................................................................16-116.1 Overview.....................................................................................................................................................16-3 16.2 Configuration Example of NTP Broadcast Mode.......................................................................................16-3 16.3 Configuration Example of NTP Multicast Mode........................................................................................16-7 16.4 Configuration Example of NTP Server/Client Mode................................................................................16-10 16.5 Configuration Example of NTP Peer Mode..............................................................................................16-13 16.6 Configuring the NTP ID Authentication...................................................................................................16-17 16.7 Configuring the NTP Master Clock..........................................................................................................16-19 viii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd Issue 02 (2008-04-25)

SmartAX MA5600T Multi-service Access Module

Contents

16.8 Configuring the NTP Broadcast Mode......................................................................................................16-20 16.8.1 Configuring the NTP Broadcast Server Mode.................................................................................16-20 16.8.2 Configuring the NTP Broadcast Client Mode..................................................................................16-21 16.9 Configuring the NTP Multicast Mode......................................................................................................16-22 16.10 Configuring the NTP Server/Client Mode..............................................................................................16-24 16.11 Configuring the NTP Peer Mode............................................................................................................16-25 16.12 Configuring the Authority of Access to an NTP Service of a Local Device..........................................16-26 16.13 Configuring an Interface for Transmitting/Receiving NTP Packets.......................................................16-27

17 System Clock Configuration................................................................................................17-117.1 Overview.....................................................................................................................................................17-2 17.2 Configuration Example of the System Clock..............................................................................................17-3 17.3 Configuring a Clock Source........................................................................................................................17-5 17.4 Setting the Priority of a Clock Source.........................................................................................................17-6

18 MAC Address Management.................................................................................................18-118.1 Overview.....................................................................................................................................................18-2 18.2 Adding a Static MAC Address....................................................................................................................18-2 18.3 Setting the Maximum MAC Address Number Learned by a Service Port.................................................18-3 18.4 Configuring the Aging Time of a Dynamic MAC Address........................................................................18-4 18.5 Binding the MAC Address..........................................................................................................................18-5 18.6 Configuring the MAC Address Filtering....................................................................................................18-6 18.7 Configuring the MAC Address Pool...........................................................................................................18-7

19 TCP/IP Connection Configuration......................................................................................19-119.1 Overview.....................................................................................................................................................19-2 19.2 Basic Concepts............................................................................................................................................19-2 19.3 Configuring the Synwait Timer...................................................................................................................19-2 19.4 Configuring the Finwait Timer...................................................................................................................19-3 19.5 Configuring the Socket Buffer....................................................................................................................19-4 19.6 Enabling the TCP Debugging.....................................................................................................................19-4 19.7 Enabling the IP Packets Debugging............................................................................................................19-5

20 ACL Configuration................................................................................................................20-120.1 Overview.....................................................................................................................................................20-3 20.2 Configuring the Basic ACL.........................................................................................................................20-5 20.3 Configuring the Advanced ACL.................................................................................................................20-7 20.4 Configuring the L2 ACL.............................................................................................................................20-8 20.5 Configuration Example of the User-Defined ACL...................................................................................20-11 20.6 Creating an ACL.......................................................................................................................................20-12 20.7 Configuring a Time Range........................................................................................................................20-14 20.8 Setting the Step..........................................................................................................................................20-15 20.9 Creating a Basic ACL Rule.......................................................................................................................20-15 20.10 Creating an Advanced ACL Rule............................................................................................................20-16 20.11 Creating an L2 ACL Rule.......................................................................................................................20-17 Issue 02 (2008-04-25) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd ix

Contents

SmartAX MA5600T Multi-service Access Module

20.12 Creating a Customized ACL Rule...........................................................................................................20-18 20.13 Activating an ACL..................................................................................................................................20-20

21 QoS Configuration.................................................................................................................21-121.1 Overview.....................................................................................................................................................21-3 21.2 Configuration Example of Queue Scheduling............................................................................................21-3 21.3 Configuration Example of Traffic Management Based on service streams................................................21-6 21.4 Configuration Example of Traffic Management Based on ACL rules.......................................................21-9 21.5 Configuring the Traffic Management Based on service streams..............................................................21-11 21.5.1 Configure the IP Traffic Profile.......................................................................................................21-12 21.5.2 Configure the ATM Traffic Profile..................................................................................................21-14 21.6 Configuring the Traffic Management Based on Port + CoS.....................................................................21-17 21.7 Configuring Queue Scheduling ................................................................................................................21-18 21.7.1 Configuring the Queue Scheduling Mode........................................................................................21-19 21.7.2 Mapping the 802.1p Priority to Queues...........................................................................................21-21 21.7.3 Configuring the Queue Buffer of a Service Board...........................................................................21-22 21.8 Configuring Traffic Management Based on ACL rules............................................................................21-24 21.8.1 Enabling Traffic Limit.....................................................................................................................21-24 21.8.2 Adding a Priority Tag to Packets.....................................................................................................21-25 21.8.3 Enabling the Traffic Statistics..........................................................................................................21-26 21.8.4 Enabling the Traffic Mirroring.........................................................................................................21-27 21.8.5 Enabling the Traffic Redirection......................................................................................................21-28 21.9 Enabling the Line Rate Limit on an Upstream Port..................................................................................21-29

22 User Security Configuration................................................................................................22-122.1 Overview.....................................................................................................................................................22-3 22.2 Enabling PITP.............................................................................................................................................22-3 22.3 Setting the RAIO Working Mode...............................................................................................................22-4 22.4 Setting the Ethernet Encapsulation Type....................................................................................................22-5 22.5 Enabling the DHCP Option82 Function......................................................................................................22-6 22.6 Setting the Maximum Length of DHCP Packets........................................................................................22-7 22.7 Binding the IP Address...............................................................................................................................22-8 22.8 Binding the MAC Address..........................................................................................................................22-9 22.9 Enabling the Anti MAC Spoofing.............................................................................................................22-10 22.10 Enabling the Anti IP Spoofing................................................................................................................22-11

23 System Security Configuration...........................................................................................23-123.1 Overview.....................................................................................................................................................23-3 23.2 Enabling the Anti DoS Attack.....................................................................................................................23-3 23.3 Enabling the Anti IP Attack........................................................................................................................23-4 23.4 Enabling Anti ICMP Attack........................................................................................................................23-5 23.5 Enabling the Source Route Filtering...........................................................................................................23-5 23.6 Configuring the MAC Address Filtering....................................................................................................23-6 23.7 Setting the Time to Detect Exceptional Disconnection of the PPPoE Users..............................................23-7 x Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd Issue 02 (2008-04-25)

SmartAX MA5600T Multi-service Access Module

Contents

23.8 Configuring the Black List..........................................................................................................................23-8 23.9 Configuring the Firewall Function..............................................................................................................23-9 23.10 Configuring an Accessible Address Segment.........................................................................................23-11 23.11 Configuring the Inaccessible Address Segment......................................................................................23-12

24 P2P Fiber Access Service Configuration............................................................................24-124.1 Overview.....................................................................................................................................................24-2 24.2 Configuration Example of Fiber Access Service-Single Port for Single Service.......................................24-2 24.3 Configuration Example of Fiber Access Service-Single Port for Multi-service.........................................24-4 24.4 Setting the Port Auto-negotiation Mode...................................................................................................24-10 24.5 Setting the Port Duplex Mode...................................................................................................................24-10 24.6 Setting the Port Rate..................................................................................................................................24-11

25 GPON Service Configuration..............................................................................................25-125.1 Overview.....................................................................................................................................................25-3 25.2 Configuration Example of the GPON Service............................................................................................25-3 25.3 Adding a DBA Profile.................................................................................................................................25-8 25.4 Binding a DBA Profile..............................................................................................................................25-10 25.5 Adding an Alarm Profile...........................................................................................................................25-11 25.6 Adding a GEM Port...................................................................................................................................25-13 25.7 Configuring a GPON Port.........................................................................................................................25-14 25.7.1 Enabling the FEC Function on a PON Port......................................................................................25-14 25.7.2 Disabling the Laser on a PON Port..................................................................................................25-15 25.8 Configuring a GPON ONT.......................................................................................................................25-16 25.8.1 Adding a GPON ONT......................................................................................................................25-16 25.8.2 Activating a GPON ONT.................................................................................................................25-17 25.8.3 Enabling the ONT Auto-find Function of a GPON Port..................................................................25-18 25.8.4 Setting the Aging Time of the ONT Auto-find Function.................................................................25-19 25.8.5 Confirming an Automatically Found ONT......................................................................................25-20 25.8.6 Setting the Minimum and Maximum Logical Reach.......................................................................25-22

26 Protection Configuration for Upstream Link...................................................................26-126.1 Overview.....................................................................................................................................................26-2 26.2 Configuration Example of the Upstream Link Protection...........................................................................26-2 26.3 Configuring a Protection Group..................................................................................................................26-5

27 Device Subtending Configuration......................................................................................27-127.1 Overview.....................................................................................................................................................27-3 27.2 Configuration Example of a Subtended Network Through the ETHA Board............................................27-4 27.3 Configuring the Physical Attributes of an Ethernet Port.............................................................................27-6 27.3.1 Setting the Auto-negotiation Mode of an Ethernet Port.....................................................................27-6 27.3.2 Setting the Duplex Mode of an Ethernet Port....................................................................................27-7 27.3.3 Setting the Rate of an Ethernet Port...................................................................................................27-8 27.3.4 Setting the Network Cable Type of an Ethernet Port.........................................................................27-8 27.4 Enabling the Flow Control on an Ethernet Port..........................................................................................27-9 Issue 02 (2008-04-25) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd xi

Contents

SmartAX MA5600T Multi-service Access Module

27.5 Enabling the Traffic Suppression..............................................................................................................27-10 27.6 Enabling the Ethernet Port Aggregation...................................................................................................27-13 27.7 Mirroring an Ethernet Port........................................................................................................................27-14 27.8 Adding an Ethernet Port to a VLAN.........................................................................................................27-14 27.9 Setting the Native VLAN for an Ethernet Port.........................................................................................27-15

28 VLAN Stacking Wholesale Service Configuration......................................................... 28-128.1 Overview.....................................................................................................................................................28-2 28.2 Configuration Example of VLAN Stacking Multi-ISP Wholesale Access ................................................28-2

29 QinQ VLAN Private Line Service Configuration............................................................29-129.1 Overview.....................................................................................................................................................29-2 29.2 Configuration Example of the QinQ VLAN...............................................................................................29-2 29.3 Configuration Example of the QinQ VLAN Private Line Service.............................................................29-5 29.4 Enabling the Transparent Transmission of BPDUs....................................................................................29-8

30 Multicast Service Configuration.........................................................................................30-130.1 Overview.....................................................................................................................................................30-3 30.2 Configuration Example of the IGMP Proxy Multicast Service..................................................................30-3 30.3 Configuration Example of the IGMP Snooping Multicast Service.............................................................30-8 30.4 Configuration Example of the IGMP Snooping Multicast Service ..........................................................30-11 30.5 Configuration Example of the Multicast Service in Subtending Mode....................................................30-16 30.6 Configuring the Multicast Service in MSTP Networking.........................................................................30-21 30.7 Configuration Example of the Multicast Service Through the PIM-SSM Protocol.................................30-28 30.8 Setting the IGMP Mode............................................................................................................................30-33 30.9 Configuring the IGMP Upstream Port......................................................................................................30-33 30.10 Setting the Multicast Mode of an Upstream Port....................................................................................30-35 30.11 Enabling the Multicast Routing Function...............................................................................................30-36 30.12 Specifying a Subtending Port..................................................................................................................30-36 30.13 Configuring a Program for a Static Subtending Port..............................................................................30-37 30.14 Configuring IGMP Global Parameters....................................................................................................30-38 30.14.1 Enabling the IGMP Proxy Authorization.......................................................................................30-39 30.14.2 Setting the Robustness Variable.....................................................................................................30-40 30.14.3 Setting the General Query Interval.................................................................................................30-41 30.14.4 Setting the Maximum Response Time to the General Query.........................................................30-42 30.14.5 Setting the Number of Specific Queries.........................................................................................30-44 30.14.6 Setting the Group-Specific Query Interval.....................................................................................30-45 30.14.7 Setting the Maximum Response Time to the Group-Specific Query.............................................30-46 30.14.8 Setting the TTL for a V2 Router....................................................................................................30-47 30.14.9 Setting the Preview Recognition Time...........................................................................................30-48 30.14.10 Enabling the User Action Report Function..................................................................................30-49 30.14.11 Set the Permitted Encapsulation Mode of IGMP Packets............................................................30-51 30.14.12 Enabling the IGMP Echo Function..............................................................................................30-51 30.15 Configuring the IGMP VLAN Parameters..............................................................................................30-52 xii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd Issue 02 (2008-04-25)

SmartAX MA5600T Multi-service Access Module

Contents

30.15.1 Setting the IGMP Mode.................................................................................................................30-53 30.15.2 Configuring the IGMP Version......................................................................................................30-54 30.15.3 Configuring the Multicast Program................................................................................................30-55 30.15.4 Setting the Unsolicited Report Interval .........................................................................................30-58 30.15.5 Enabling the Proxy of the IGMP Leave Packet.............................................................................30-59 30.15.6 Enabling the Proxy of the IGMP Report Packet............................................................................30-60 30.15.7 Enabling the Function of Sending the Global-leave Packet...........................................................30-61 30.15.8 Setting the Priority of the IGMP Packet.........................................................................................30-62 30.15.9 Configuring the Multicast VLAN Member....................................................................................30-63 30.15.10 Enabling the Logging Function ...................................................................................................30-64 30.15.11 Setting the IP Address Range of the Multicast VLAN to Generate the Program Group Dynamically .....................................................................................................................................................................30-65 30.15.12 Enabling the Program Matching Mode of the Multicast VLAN .................................................30-66 30.15.13 Configuring the Virtual Upstream Port........................................................................................30-67 30.16 Configuring the PIM-SSM Protocol Parameters.....................................................................................30-69 30.16.1 Enabling the PIM-SSM Function...................................................................................................30-69 30.16.2 Setting the DR Priority of a PIM Router........................................................................................30-70 30.16.3 Setting the Interval for a PIM Router to Send Hello Messages.....................................................30-73 30.16.4 Setting the Holdtime for Receiving the Hello Messages...............................................................30-75 30.16.5 Setting the Longest Delay for Triggering the Transmission of the Hello Message.......................30-77 30.16.6 Setting the Specifications of the Join/Prune Messages..................................................................30-79 30.16.7 Setting the Interval for Sending the Join/Prune Messages.............................................................30-80 30.16.8 Setting the Delay for a PIM Router to Perform Pruning................................................................30-82 30.16.9 Setting the Interval for a PIM Router to Override Pruning............................................................30-84 30.16.10 Setting the Holdtime for a PIM Router to Maintain the Join Status of a Downstream Interface .....................................................................................................................................................................30-87 30.16.11 Setting the Range of the PIM-SSM Multicast Addresses............................................................30-89 30.17 Managing Multicast Bandwidth..............................................................................................................30-90 30.17.1 Enabling the Bandwidth Management Function............................................................................30-91 30.17.2 Setting the Program Bandwidth.....................................................................................................30-92 30.18 Configuring an Authority Profile............................................................................................................30-92 30.18.1 Modifying an Authority Profile......................................................................................................30-92 30.18.2 Renaming an Authority Profile......................................................................................................30-93 30.19 Configuring Multicast Users...................................................................................................................30-94 30.19.1 Adding a BTV User........................................................................................................................30-94 30.19.2 Modifying the Attributes of a User................................................................................................30-96 30.19.3 Blocking a BTV User.....................................................................................................................30-97 30.19.4 Binding a User with an Authority Profile......................................................................................30-98 30.19.5 Enabling the Switch of Monitoring the BTV User........................................................................30-99 30.20 Configuring the Preview Function........................................................................................................30-100 30.20.1 Configuring the Preview Profile .................................................................................................30-100 30.20.2 Enabling the Preview Function....................................................................................................30-101 30.20.3 Setting the Preview Auto Reset Time..........................................................................................30-102 Issue 02 (2008-04-25) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd xiii

Contents

SmartAX MA5600T Multi-service Access Module 30.20.4 Clearing the Preview Records Manually......................................................................................30-103

30.21 Configuring the Logging Function........................................................................................................30-104 30.21.1 Enabling the Logging Function on the Multicast VLAN.............................................................30-105 30.21.2 Setting the Logging Interval.........................................................................................................30-106 30.21.3 Configuring the Log Reporting....................................................................................................30-107 30.21.4 Collecting the Log Statistics........................................................................................................30-108 30.22 Setting the Automatic CDR Reporting..................................................................................................30-108

31 Triple Play Service Configuration......................................................................................31-131.1 Overview.....................................................................................................................................................31-3 31.2 Configuration Example of Triple Play - Multiple PVCs for Multiple Services..........................................31-4 31.3 Configuration Example of Triple Play - .....................................................................................................31-9 31.4 Configuration Example of Triple Play - Based on 802.1p........................................................................31-14 31.5 Configuration Example of Triple Play - Based on the Service Encapsulation Type................................31-19 31.6 Configuration Example of Triple Play......................................................................................................31-24

32 ONT Management.................................................................................................................32-132.1 Overview.....................................................................................................................................................32-3 32.2 Configuration Example of the GPON ONT................................................................................................32-3 32.3 Configuring an GPON ONT Capability Set Profile....................................................................................32-7 32.4 Configuring the Attributes of a GPON ONT Port.....................................................................................32-11 32.5 Binding an ONT T-CONT with GEM Ports.............................................................................................32-12 32.6 Configuring the Mapping Between ONT Services and GEM Ports.........................................................32-13 32.7 Configuring a VLAN for a GPON ONT Port...........................................................................................32-14 32.8 Managing the IP Address of a GPON ONT..............................................................................................32-15

33 Ethernet OAM Configuration..............................................................................................33-133.1 Overview.....................................................................................................................................................33-3 33.2 Configuration Example of Ethernet OAM..................................................................................................33-3 33.3 Creating an MD...........................................................................................................................................33-6 33.4 Creating an MA...........................................................................................................................................33-7 33.5 Creating an MEP.........................................................................................................................................33-8 33.6 Creating an RMEP...................................................................................................................................... 33-9 33.7 Enabling the CFM Globally......................................................................................................................33-10 33.8 Enabling the CFM Alarm Globally...........................................................................................................33-11 33.9 Enabling the Administration Function of an MEP....................................................................................33-12 33.10 Enabling the CC Transmission of an MEP.............................................................................................33-13 33.11 Enabling the Global Detection Function of an RMEP............................................................................33-14 33.12 Enabling the RMEP Detection Function.................................................................................................33-15 33.13 Configuring Priorities for Transmitting CCMs/LTMs ...........................................................................33-16 33.14 Configuring the Interval for an MA to Transmit a CC...........................................................................33-17 33.15 Configuring the Base Address of Multicast Destination MAC Addresses of CCMs/LTMs..................33-18 33.16 Configuring the Loop Detection Function..............................................................................................33-19 33.17 Configuring the Link Trace Function......................................................................................................33-20 xiv Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd Issue 02 (2008-04-25)

SmartAX MA5600T Multi-service Access Module

Contents

34 Environment Monitoring Configuration ..........................................................................34-134.1 Overview.....................................................................................................................................................34-3 34.2 Configuration Example of the H801ESC....................................................................................................34-6 34.3 Configuration Example of FAN..................................................................................................................34-9 34.4 Adding an EMU........................................................................................................................................34-11 34.5 Configuring a POWER4845 EMU............................................................................................................34-12 34.6 Configuring the H801ESC Analog Parameters.........................................................................................34-15 34.7 Configuring H801ESC Digital Parameters...............................................................................................34-17 34.8 Configuring the FAN Alarm Report ........................................................................................................34-19 34.9 Setting the FAN Speed Adjustment Mode................................................................................................34-20 34.10 Configuring the FAN Speed Level..........................................................................................................34-21

35 Acronyms and Abbreviations..............................................................................................35-1

Issue 02 (2008-04-25)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd

xv

SmartAX MA5600T Multi-service Access Module

Figures

FiguresFigure 1-1 Example network for configuring the MA5600T through the local serial port..................................1-3 Figure 1-2 Flowchart for configuring the MA5600T through the local serial port..............................................1-4 Figure 1-3 Setting parameters of the terminal......................................................................................................1-5 Figure 1-4 Setting the terminal emulation type....................................................................................................1-6 Figure 1-5 Setting ASCII Code............................................................................................................................1-7 Figure 1-6 Example network for configuring the MA5600T through the remote serial port..............................1-8 Figure 1-7 Flowchart for configuring the MA5600T through the remote serial port..........................................1-9 Figure 1-8 Setting the parameters of the HyperTerminal...................................................................................1-11 Figure 1-9 Example network for configuring the outband management in a LAN by Telnet...........................1-13 Figure 1-10 Example network for configuring the outband management in a WAN by Telnet........................1-14 Figure 1-11 Flowchart for configuring the outband management in a WAN by Telnet....................................1-15 Figure 1-12 Running the telnet application........................................................................................................1-16 Figure 1-13 Example network for maintenance through the GE port in a LAN................................................1-17 Figure 1-14 Example networ