configuration guide - lan access and man access(v600r003c00_02)

971
HUAWEI NetEngine80E/40E Router V600R003C00 Configuration Guide - LAN Access and MAN Access Issue 02 Date 2011-09-10 HUAWEI TECHNOLOGIES CO., LTD.

Upload: vietvtnet

Post on 20-Jul-2016

33 views

Category:

Documents


5 download

DESCRIPTION

cau hinh LAN va WAN

TRANSCRIPT

  • HUAWEI NetEngine80E/40E RouterV600R003C00

    Configuration Guide - LAN Accessand MAN Access

    Issue 02Date 2011-09-10

    HUAWEI TECHNOLOGIES CO., LTD.

  • Copyright Huawei Technologies Co., Ltd. 2011. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior writtenconsent of Huawei Technologies Co., Ltd. Trademarks and Permissions

    and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders. NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and thecustomer. All or part of the products, services and features described in this document may not be within thepurchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees or representationsof any kind, either express or implied.

    The information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but all statements, information, andrecommendations in this document do not constitute the warranty of any kind, express or implied. Huawei Technologies Co., Ltd.Address: Huawei Industrial Base

    Bantian, LonggangShenzhen 518129People's Republic of China

    Website: http://www.huawei.comEmail: [email protected]

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    i

  • About This Document

    PurposeThis manual describes LAN access and MAN access technologies, including principles,configuration steps, and configuration examples of MAC address, Ethernet, LACP, VLAN,QinQ, MSTP, BPDU tunnel, and RRPP.

    NOTE

    l This document takes interface numbers and link types of the NE40E-X8 as an example. In workingsituations, the actual interface numbers and link types may be different from those used in thisdocument.

    l In NE80E/40E series (except for the NE40E-X1/X2), line processing boards are called Line ProcessingUnits (LPUs) and switching fabric boards are called Switching Fabric Units (SFUs). The NE40E- X1/X2 has no LPU and SFU, and packet switching and forwarding are centrally performed by the NetworkProcessing Unit (NPU).

    Related VersionsThe following table lists the product versions related to this document.

    Product Name VersionHUAWEI NetEngine80E/40ERouter

    V600R003C00

    Intended AudienceThis document is intended for:l Commissioning engineerl Data configuration engineerl Network monitoring engineerl System maintenance engineer

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access About This Document

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    ii

  • Symbol ConventionsThe symbols that may be found in this document are defined as follows.

    Symbol Description

    DANGERAlerts you to a high risk hazard that could, if not avoided,result in serious injury or death.

    WARNINGAlerts you to a medium or low risk hazard that could, ifnot avoided, result in moderate or minor injury.

    CAUTIONAlerts you to a potentially hazardous situation that could,if not avoided, result in equipment damage, data loss,performance deterioration, or unanticipated results.

    TIP Provides a tip that may help you solve a problem or savetime.

    NOTE Provides additional information to emphasize orsupplement important points in the main text.

    Command ConventionsThe command conventions that may be found in this document are defined as follows.

    Convention DescriptionBoldface The keywords of a command line are in boldface.Italic Command arguments are in italics.[ ] Items (keywords or arguments) in brackets [ ] are optional.{ x | y | ... } Optional items are grouped in braces and separated by

    vertical bars. One item is selected.[ x | y | ... ] Optional items are grouped in brackets and separated by

    vertical bars. One item is selected or no item is selected.{ x | y | ... }* Optional items are grouped in braces and separated by

    vertical bars. A minimum of one item or a maximum of allitems can be selected.

    [ x | y | ... ]* Optional items are grouped in brackets and separated byvertical bars. Several items or no item can be selected.

    & The parameter before the & sign can be repeated 1 to n times.# A line starting with the # sign is comments.

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access About This Document

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    iii

  • Change HistoryChanges between document issues are cumulative. The latest document issue contains all thechanges made in earlier issues.

    Changes in Issue 02 (2011-09-10)This is the second release.

    Changes in Issue 01 (2011-06-30)This is the first release.

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access About This Document

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    iv

  • Contents

    About This Document.....................................................................................................................ii1 MAC Address Table Configuration...........................................................................................1

    1.1 MAC Address Table Introduction......................................................................................................................21.1.1 MAC Address Table Overview.................................................................................................................21.1.2 MAC Addresses Learning Limit Supported by the NE80E/40E...............................................................2

    1.2 Configuring the MAC Address Table Based on the VLAN and Layer 2 Interface...........................................21.2.1 Establishing the Configuration Task.........................................................................................................31.2.2 Configuring MAC Address Entries...........................................................................................................31.2.3 Configuring MAC Address Entries Based on the Layer 2 VE Interface...................................................41.2.4 Checking the Configuration.......................................................................................................................5

    1.3 Configuring the MAC Address Table Based on the VSI and Layer 3 Interface................................................61.3.1 Establishing the Configuration Task.........................................................................................................61.3.2 Configuring MAC Address Entries...........................................................................................................71.3.3 Configuring MAC Address Entries Based on the VLANIF Interface.......................................................81.3.4 Checking the Configuration.......................................................................................................................9

    1.4 Configuring the Aging Time of a MAC Address Table...................................................................................101.4.1 Establishing the Configuration Task.......................................................................................................111.4.2 Setting the Aging Time of a MAC Address Table..................................................................................111.4.3 Checking the Configuration.....................................................................................................................12

    1.5 Maintaining MAC Address Table....................................................................................................................121.5.1 Clearing the Dynamic MAC Address......................................................................................................12

    1.6 Configuration Examples...................................................................................................................................131.6.1 Example for Configuring the MAC Address Table Based on the Interface and VLAN.........................131.6.2 Example for Configuring the MAC Address Table Based on the dot1q Termination Sub-interface andVSI....................................................................................................................................................................171.6.3 Example for Configuring the MAC Address Table Based on the QinQ Termination Sub-interface andVSI....................................................................................................................................................................241.6.4 Example for Configuring the MAC Address Table Based on the VLANIF Interface and VSI..............331.6.5 Example for Configuring the MAC Address Table Based on the VLAN and Layer 2 VE Interface..........................................................................................................................................................................411.6.6 Example for Configuring the MAC Address Table Based on the Interface and VSI..............................44

    2 Ethernet Interface Configuration.............................................................................................462.1 Ethernet Interface Introduction.........................................................................................................................47

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    v

  • 2.1.1 Introduction to Ethernet Interfaces..........................................................................................................472.1.2 Features of Ethernet Interfaces Supported by the NE80E/40E...............................................................47

    2.2 Configuring Ethernet Interfaces of the Interface Board...................................................................................512.2.1 Establishing the Configuration Task.......................................................................................................512.2.2 Configuring the MTU of an Ethernet Interface.......................................................................................512.2.3 Configuring the Working Mode of an Ethernet Interface.......................................................................532.2.4 Configuring the Speed of an Ethernet Electrical Interface......................................................................532.2.5 Configuring the GE/FE Optical/Electrical Interface...............................................................................542.2.6 Configuring LAN/WAN Transmission Mode for a 10 GE Interface......................................................552.2.7 Configuring Overhead Bytes of the 10GE WAN Interface.....................................................................562.2.8 Configuring Flow Control on the GE Interface.......................................................................................562.2.9 Configuring Self-Loop Detection on the GE Interface............................................................................572.2.10 Switching the Working Mode of an Ethernet Interface.........................................................................582.2.11 Checking the Configuration...................................................................................................................58

    2.3 Configuring Ethernet Interfaces of the SRU....................................................................................................602.3.1 Establishing the Configuration Task.......................................................................................................602.3.2 Assigning an IP Address to an Ethernet Interface...................................................................................602.3.3 Configuring the Working Mode of an Ethernet Electrical Interface.......................................................612.3.4 Configuring the Speed of an Ethernet Electrical Interface......................................................................622.3.5 Configuring the Promiscuity Mode.........................................................................................................62

    2.4 Configuring Ethernet Interfaces Layer 2 Parameters.......................................................................................632.4.1 Establishing the Configuration Task.......................................................................................................632.4.2 Configuring Link Layer Type of an Ethernet Interface...........................................................................64

    2.5 Configuring SmartLink Flush Function...........................................................................................................642.5.1 Establishing the Configuration Task.......................................................................................................652.5.2 Enabling a Port to Process SmartLink Flush Packets..............................................................................65

    2.6 Maintaining Ethernet Interfaces.......................................................................................................................662.6.1 Testing the Loop of Ethernet Interfaces..................................................................................................66

    2.7 Configuration Examples...................................................................................................................................672.7.1 Example for Configuring a Layer 3 Ethernet Interface...........................................................................672.7.2 Example for Configuring VLANs to Communicate Through Ethernet Sub-interfaces..........................692.7.3 Example for Configuring a Device to Handle Smartlink Flush Packets.................................................69

    3 Eth-Trunk Interface Configuration..........................................................................................743.1 Eth-Trunk Interface Introduction......................................................................................................................76

    3.1.1 Introduction to Eth-Trunk Interfaces and LACP.....................................................................................763.1.2 Eth-Trunk Interface and LACP Features Supported by the NE80E/40E................................................77

    3.2 Configuring an Eth-Trunk Interface in Manual Load Balancing Mode...........................................................803.2.1 Establishing the Configuration Task.......................................................................................................803.2.2 Creating an Eth-Trunk Interface..............................................................................................................813.2.3 (Optional) Configuring a Working Mode for an Eth-Trunk Interface....................................................823.2.4 Configuring an Eth-Trunk Interface to Work in Manual Load Balancing Mode....................................823.2.5 Adding Interfaces to an Eth-Trunk Interface...........................................................................................83

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    vi

  • 3.2.6 Checking the Configuration.....................................................................................................................853.3 Configuring an Eth-Trunk Interface in 1:1 Active/Standby Mode...................................................................85

    3.3.1 Establishing the Configuration Task.......................................................................................................853.3.2 Configuring an Eth-Trunk Interface to Work in 1:1 Active/Standby Mode...........................................863.3.3 Adding Interfaces to an Eth-Trunk Interface and Setting the Master Interface......................................873.3.4 Enabling the Function of Sending Flush Packets....................................................................................883.3.5 Creating a Control VLAN.......................................................................................................................893.3.6 Enabling an Interface to Receive Packets from a Control VLAN...........................................................893.3.7 Enabling an Interface to Receive Flush Packets......................................................................................903.3.8 Checking the Configuration.....................................................................................................................90

    3.4 Configuring an Eth-Trunk Interface in Static LACP Mode.............................................................................913.4.1 Establishing the Configuration Task.......................................................................................................913.4.2 Creating an Eth-Trunk Interface..............................................................................................................923.4.3 (Optional) Configuring a Working Mode for an Eth-Trunk Interface....................................................933.4.4 Configuring an Eth-Trunk Interface to Work in Static LACP Mode......................................................943.4.5 Adding Interfaces to an Eth-Trunk Interface...........................................................................................943.4.6 (Optional) Setting an LACP System Priority..........................................................................................963.4.7 (Optional) Setting the Maximum Number of Active Member Interfaces...............................................963.4.8 (Optional) Setting an LACP Interface Priority........................................................................................973.4.9 (Optional) Configuring the Mode for Selecting Active Member Interfaces...........................................983.4.10 (Optional) Enabling LACP Preemption and Setting an LACP Preemption Delay...............................983.4.11 (Optional) Setting a Timeout Period for Receiving LACPDUs............................................................993.4.12 Checking the Configuration.................................................................................................................100

    3.5 Associating an Eth-Trunk Interface in Static LACP Mode with an mVRRP Backup Group........................1013.5.1 Establishing the Configuration Task.....................................................................................................1013.5.2 Configuring VRRP to Track the Status of a Member Interface of an Eth-Trunk Interface in Static LACPMode...............................................................................................................................................................1043.5.3 Associating an Eth-Trunk Interface in Static LACP Mode with an mVRRP Backup Group...............1053.5.4 Checking the Configuration...................................................................................................................105

    3.6 Configuring Layer 2 Attributes for an Eth-Trunk Interface...........................................................................1063.6.1 Establishing the Configuration Task.....................................................................................................1073.6.2 (Optional) Configuring the Minimum Number of Up Member Links..................................................1073.6.3 (Optional) Configuring the Maximum Number of Up Member Links.................................................1083.6.4 (Optional) Configuring an Eth-Trunk Interface to Carry Out Load Balancing.....................................1093.6.5 (Optional) Configuring Weights for Member Interfaces.......................................................................1103.6.6 (Optional) Configuring the Mode for Eth-Trunk Member Interfaces to Send Traps............................1103.6.7 Checking the Configuration...................................................................................................................111

    3.7 Configuring Layer 3 Attributes for an Eth-Trunk Interface...........................................................................1123.7.1 Establishing the Configuration Task.....................................................................................................1123.7.2 Configuring an IP address for an Eth-Trunk Interface..........................................................................1133.7.3 (Optional) Configuring a MAC Address for an Eth-Trunk Interface....................................................1133.7.4 (Optical) Configuring the MTU for an Eth-Trunk Interface.................................................................1143.7.5 (Optional) Configuring the Minimum Number of Up Member Links..................................................115

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    vii

  • 3.7.6 (Optional) Configuring a Load Balancing Mode for an Eth-Trunk Interface.......................................1153.7.7 (Optional) Configuring Weights for Member Interfaces.......................................................................1163.7.8 (Optional) Configuring the Load Balancing Mode for Access Users on an Eth-Trunk Interface.........1173.7.9 (Optional) Configuring the Mode for Eth-Trunk Member Interfaces to Send Traps............................1173.7.10 Checking the Configuration.................................................................................................................118

    3.8 Configuring an Eth-Trunk Sub-interface........................................................................................................1203.8.1 Establishing the Configuration Task.....................................................................................................1203.8.2 Creating an Eth-Trunk Sub-interface.....................................................................................................1213.8.3 Configuring an IP address for an Eth-Trunk Sub-interface...................................................................1213.8.4 Configuring the Encapsulation Type for an Eth-Trunk Sub-interface..................................................1223.8.5 (Optical) Configuring the MTU for an Eth-Trunk Sub-interface..........................................................1233.8.6 (Optional) Configuring the Rate for Eth-Trunk Sub-interfaces to Send Gratuitous ARP Packets.......1233.8.7 Checking the Configuration...................................................................................................................124

    3.9 Configuring E-Trunk......................................................................................................................................1253.9.1 Establishing the Configuration Task.....................................................................................................1253.9.2 Configuring the LACP System ID and Priority for E-Trunk................................................................1263.9.3 Creating an E-Trunk Group and Configuring the E-Trunk Priority......................................................1273.9.4 Configuring Local and Peer IP Addresses.............................................................................................1273.9.5 (Optional)Binding an E-Trunk Group to a BFD Session......................................................................1283.9.6 Adding an Eth-Trunk Interface to an E-Trunk Group...........................................................................1293.9.7 (Optional) Configuring the Working Mode for an Eth-Trunk Interface...............................................1293.9.8 (Optional) Configuring a Password.......................................................................................................1303.9.9 (Optional) Configuring a Timeout Period.............................................................................................1313.9.10 (Optional) Setting a Revert Delay.......................................................................................................1323.9.11 Checking the Configuration.................................................................................................................133

    3.10 Maintaining Eth-Trunk Interfaces................................................................................................................1333.10.1 Clearing Statistics About an Eth-Trunk Interface...............................................................................133

    3.11 Configuration Examples...............................................................................................................................1343.11.1 Example for Configuring Eth-Trunk Interfaces in Manual Load Balancing Mode............................1343.11.2 Example for Configuring an Eth-Trunk Interface in 1:1 Active/Standby Mode.................................1373.11.3 Example for Configuring Eth-Trunk Interfaces in Static LACP Mode...............................................1423.11.4 Example for Associating an Eth-Trunk Interface in Static LACP Mode with an mVRRP Backup Group........................................................................................................................................................................1463.11.5 Example for Configuring Eth-Trunk Interfaces in Static LACP Mode to Communicate over a VLLNetwork..........................................................................................................................................................1573.11.6 Example for Configuring a Layer 2 Eth-Trunk Interface to Allow VLAN Frames to Pass Through........................................................................................................................................................................1663.11.7 Example for Configuring a Layer 3 Eth-Trunk Interface in Manual Load Balancing Mode..............1683.11.8 Example for Configuring Inter-VLAN Communication by Using Eth-Trunk Sub-interfaces............1713.11.9 Example for Connecting an E-Trunk to a VPLS Network..................................................................1753.11.10 Example for Connecting an E-Trunk to PW Redundancy.................................................................187

    4 VLAN Configuration................................................................................................................2014.1 VLAN Introduction........................................................................................................................................203

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    viii

  • 4.1.1 Introduction...........................................................................................................................................2034.1.2 VLAN Features Supported by the NE80E/40E.....................................................................................210

    4.2 Configuring a VLAN Based on Ports.............................................................................................................2154.2.1 Establishing the Configuration Task.....................................................................................................2154.2.2 Creating a VLAN...................................................................................................................................2164.2.3 Configuring the Type of a Layer 2 Ethernet Port..................................................................................2164.2.4 Adding a Port to a VLAN......................................................................................................................2194.2.5 Checking the Configuration...................................................................................................................220

    4.3 Creating a VLANIF Interface.........................................................................................................................2204.3.1 Establishing the Configuration Task.....................................................................................................2204.3.2 Creating a VLANIF Interface................................................................................................................2214.3.3 Assigning an IP Address to a VLANIF Interface..................................................................................2214.3.4 (Optional) Setting a Delay After Which a VLANIF Interface Goes Down..........................................2224.3.5 (Optional) Configuring Bandwidth for a VLANIF Interface................................................................2234.3.6 Checking the Configuration...................................................................................................................223

    4.4 Configuring Inter-VLAN Communication.....................................................................................................2244.4.1 Establishing the Configuration Task.....................................................................................................2244.4.2 Configuring Sub-interfaces for Inter-VLAN Communication..............................................................2264.4.3 Configuring VLANIF Interfaces for Inter-VLAN Communication......................................................2284.4.4 Configuring VLAN Mapping for Inter-VLAN Communication...........................................................2294.4.5 Checking the Configuration...................................................................................................................231

    4.5 Configuring VLAN Security Attributes.........................................................................................................2334.5.1 Establishing the Configuration Task.....................................................................................................2334.5.2 Disabling a Port from Broadcasting Packets to Other Ports in the Same VLAN..................................2354.5.3 Disabling MAC Address Learning in a VLAN.....................................................................................2364.5.4 Enabling Flexible MAC Address Learning in a VLAN........................................................................2374.5.5 (Optional) Disabling an Interface from Sending Unknown Unicast Packets to Other Interfaces in a VLAN........................................................................................................................................................................2384.5.6 Checking the Configuration...................................................................................................................239

    4.6 Configuring VLAN Aggregation to Save IP Addresses.................................................................................2394.6.1 Establishing the Configuration Task.....................................................................................................2404.6.2 Creating a Sub-VLAN...........................................................................................................................2414.6.3 Creating a Super-VLAN........................................................................................................................2414.6.4 Assigning an IP Address to the VLANIF Interface of a Super-VLAN.................................................2424.6.5 (Optional) Configuring an IP Address Pool for a Sub-VLAN..............................................................2424.6.6 (Optional) Enabling Proxy ARP on the VLANIF Interface of a Super-VLAN....................................2434.6.7 Checking the Configuration...................................................................................................................244

    4.7 Configuring VLAN Policy-based VPN Access..............................................................................................2454.7.1 Establishing the Configuration Task.....................................................................................................2454.7.2 Configuring a VLAN Policy..................................................................................................................2474.7.3 Configuring a VPN................................................................................................................................2494.7.4 Checking the Configuration...................................................................................................................250

    4.8 Configuring Interface Isolation in a VLAN...................................................................................................251

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    ix

  • 4.8.1 Establishing the Configuration Task.....................................................................................................2514.8.2 Configuring Interface Isolation in a VLAN..........................................................................................2524.8.3 Enabling ARP Proxy in a VLAN..........................................................................................................253

    4.9 Configuring the Isolation Based on Interface Groups in a VLAN.................................................................2534.9.1 Establishing the Configuration Task.....................................................................................................2544.9.2 Adding an Interface to the Group to Be Isolated...................................................................................2544.9.3 Checking the Configuration...................................................................................................................255

    4.10 Configuring Ethernet Loop Detection for a VLAN......................................................................................2554.10.1 Establishing the Configuation Task.....................................................................................................2564.10.2 Configuring Ethernet Loop Detection for a VLAN.............................................................................2564.10.3 (Optional) Configuring the Block Priority for an Interface.................................................................2574.10.4 Checking the Configuration.................................................................................................................258

    4.11 Maintaining VLAN.......................................................................................................................................2584.11.1 Clearing the Statistics of VLAN Packets............................................................................................259

    4.12 Configuration Examples...............................................................................................................................2594.12.1 Example for Configuring Users in a VLAN to Communicate by Using a Trunk Link.......................2594.12.2 Example for Configuring Inter-VLAN Communication by Using Sub-interfaces.............................2644.12.3 Example for Configuring VLAN and Non-VLAN Users to Communicate by Using Sub-interfaces........................................................................................................................................................................2684.12.4 Example for Configuring Inter-VLAN Communication by Using VLANIF Interfaces.....................2714.12.5 Example for Configuring 1 to 1 VLAN Mapping for Inter-VLAN Communication..........................2754.12.6 Example for Configuring Communication Between VLANs Through VLAN Aggregation..............2794.12.7 Example for Configuring VLAN+802.1p for L2VPN Access (on a Common Sub-interface)...........2834.12.8 Example for Configuring VLAN+DSCP for L2VPN Access (on a Common Sub-interface)............2894.12.9 Example for Configuring VLAN+EthType for L2VPN Access (on a Common Sub-interface)........2954.12.10 Example for Configuring VLAN+DSCP for L3VPN Access (on a Common Sub-interface)..........3014.12.11 Example for Configuring VLAN+802.1p for L3VPN Access (on a Common Sub-interface).........3104.12.12 Example for Configuring Untagged+DSCP for L3VPN Access.......................................................3194.12.13 Example for Configuring Interface Isolation in a VLAN..................................................................3284.12.14 Example for Configuring the Isolation Based on Interface Groups in a VLAN...............................3304.12.15 Example for Configuring Ethernet Loop Detection for a VLAN......................................................333

    5 QinQ Configuration..................................................................................................................3375.1 QinQ Introduction...........................................................................................................................................339

    5.1.1 QinQ Overview......................................................................................................................................3395.1.2 QinQ Feature Supported by the NE80E/40E.........................................................................................340

    5.2 Configuring the QinQ Tunnel Function.........................................................................................................3495.2.1 Establishing the Configuration Task.....................................................................................................3505.2.2 Creating the Outer VLAN Tag for a Layer 2 Interface.........................................................................3505.2.3 Configuring QinQ for a Layer 2 Interface.............................................................................................3515.2.4 (Optional) Configuring the Protocol Type for the Outer Tag................................................................3515.2.5 (Optional) Configuring the Protocol Type for the InnerTag.................................................................3525.2.6 Checking the Configuration...................................................................................................................352

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    x

  • 5.3 Configuring Selective QinQ on a Layer 2 Interface.......................................................................................3535.3.1 Establishing the Configuration Task.....................................................................................................3535.3.2 Creating the Outer VLAN Tag for a Layer 2 Interface.........................................................................3545.3.3 Configuring Selective QinQ on a Layer 2 Interface..............................................................................3545.3.4 (Optional) Configuring the Protocol Type for the Outer Tag................................................................3555.3.5 (Optional) Configuring the Protocol Type for the InnerTag.................................................................3565.3.6 Checking the Configuration...................................................................................................................356

    5.4 Configuring the Sub-interface for VLAN Tag Termination to Access the IP Service...................................3575.4.1 Establishing the Configuration Task.....................................................................................................3575.4.2 Configuring the Interface Mode as the User-Termination Mode..........................................................3595.4.3 Configuring the Sub-interface for dot1q VLAN Tag Termination.......................................................3595.4.4 Configuring the Sub-interface for QinQ VLAN Tag Termination........................................................3605.4.5 Configuring the IP Service....................................................................................................................3605.4.6 Checking the Configuration...................................................................................................................361

    5.5 Configuring the Sub-interface for VLAN Tag Termination to Access the Multicast Service.......................3625.5.1 Establishing the Configuration Task.....................................................................................................3625.5.2 Configuring the Interface Mode as the User-Termination Mode..........................................................3635.5.3 Configuring the Sub-interface for dot1q VLAN Tag Termination.......................................................3645.5.4 Configuring the Sub-interface for QinQ VLAN Tag Termination........................................................3655.5.5 Configuring the Multicast Service.........................................................................................................3655.5.6 Checking the Configuration...................................................................................................................366

    5.6 Configuring the Sub-interface for VLAN Tag Termination to Access the VPN Service..............................3685.6.1 Establishing the Configuration Task.....................................................................................................3685.6.2 Configuring the Interface Mode as the User-Termination Mode..........................................................3695.6.3 Configuring the Sub-interface for dot1q VLAN Tag Termination.......................................................3705.6.4 Configuring the Sub-interface for QinQ VLAN Tag Termination........................................................3715.6.5 Configuring the VPN Service................................................................................................................3735.6.6 Checking the Configuration...................................................................................................................374

    5.7 Configuring the Sub-interface for VLAN Tag Termination to Access the MPLS Service............................3785.7.1 Establishing the Configuration Task.....................................................................................................3785.7.2 Configuring the Interface Mode as the User-Termination Mode..........................................................3795.7.3 Configuring the Sub-interface for dot1q VLAN Tag Termination.......................................................3805.7.4 Configuring the Sub-interface for QinQ VLAN Tag Termination........................................................3805.7.5 Configuring the MPLS Service.............................................................................................................3815.7.6 Checking the Configuration...................................................................................................................382

    5.8 Configuring the Sub-interface for QinQ VLAN Tag Termination to Support 802.1p Mapping...................3825.8.1 Establishing the Configuration Task.....................................................................................................3825.8.2 Configuring the Interface Mode as the User-Termination Mode..........................................................3835.8.3 Configuring the Sub-interface for QinQ VLAN Tag Termination to Support 802.1p Mapping..........3845.8.4 Checking the Configuration...................................................................................................................385

    5.9 Configuring the Sub-interface for QinQ Stacking to Access an L2VPN.......................................................3855.9.1 Establishing the Configuration Task.....................................................................................................385

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xi

  • 5.9.2 Configuring the Interface Mode as the User-Termination Mode..........................................................3865.9.3 Configuring the Sub-interface for VLAN Stacking..............................................................................3875.9.4 Configuring the L2VPN........................................................................................................................3885.9.5 Checking the Configuration...................................................................................................................389

    5.10 Configuring Dynamic QinQ.........................................................................................................................3935.10.1 Establishing the Configuration Task...................................................................................................3935.10.2 Configuring the Interface Mode as the User-Termination Mode........................................................3945.10.3 Configuring Dynamic QinQ................................................................................................................3945.10.4 Configuring DHCP Snooping..............................................................................................................3955.10.5 Checking the Configuration.................................................................................................................396

    5.11 Configuring the Sub-interface for QinQ VLAN Tag Termination to Support URPF..................................3975.11.1 Establishing the Configuration Task...................................................................................................3975.11.2 Configuring the Ethernet Interface of the PE......................................................................................3985.11.3 Configuring the Ethernet Sub-interface of the PE...............................................................................3985.11.4 Configuring URPF on the Sub-interface for QinQ VLAN Tag Termination......................................3995.11.5 Checking the Configuration.................................................................................................................399

    5.12 Configuring the User-Side QinQ..................................................................................................................4005.12.1 Establishing the Configuration Task...................................................................................................4005.12.2 Creating a User-Side VLAN................................................................................................................4005.12.3 Checking the Configuration.................................................................................................................401

    5.13 Maintaining QinQ.........................................................................................................................................4025.13.1 Clearing QinQ Statistics......................................................................................................................4025.13.2 Monitoring the Operating Status of the Termination Sub-interface....................................................402

    5.14 Configuration Examples...............................................................................................................................4035.14.1 Example for Configuring the QinQ Tunnel.........................................................................................4035.14.2 Example for Configuring Selective QinQ on a Layer 2 Interface.......................................................4075.14.3 Example for Configuring Compatibility of the EthType Field in the Outer Tag of QinQ Packets........................................................................................................................................................................4105.14.4 Example for Configuring the Sub-interface for dot1q VLAN Tag Termination to Support Proxy ARP........................................................................................................................................................................4115.14.5 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support Proxy ARP........................................................................................................................................................................4145.14.6 Example for Configuring the Sub-interface for dot1q VLAN Tag Termination to Support VRRP........................................................................................................................................................................4185.14.7 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support VRRP........................................................................................................................................................................4265.14.8 Example for Configuring the Sub-interface for dotlq and QinQ VLAN Tag Termination to Access anL3VPN............................................................................................................................................................4385.14.9 Example for Configuring the Dot1q Termination Sub-interface to Access the VLL..........................4515.14.10 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Access a VLL........................................................................................................................................................................4605.14.11 Example for Configuring the Sub-interface for dot1q and QinQ VLAN Tag Termination to Access aVPLS..............................................................................................................................................................4695.14.12 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Access a VPLSNetwork..........................................................................................................................................................480

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xii

  • 5.14.13 Example for Configuring a Sub-interface for QinQ VLAN Tag Termination to Support the LocalConnection......................................................................................................................................................4945.14.14 Example for Configuring the Sub-interface for dot1q VLAN Tag Termination to Support the DHCPRelay Function................................................................................................................................................4995.14.15 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support the DHCPRelay Function................................................................................................................................................5035.14.16 Example for Configuring Dynamic QinQ.........................................................................................5085.14.17 Example for Configuring the Sub-interface for VLAN Stacking to Access a VLL..........................5165.14.18 Example for Configuring the Sub-interface for QinQ VLAN Stacking to Access a VPLS Network........................................................................................................................................................................5265.14.19 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support URPF........................................................................................................................................................................5395.14.20 Example for Configuring the dot1q Termination Sub-interface in a VSI to Support IGMP Snooping........................................................................................................................................................................5415.14.21 Example for Configuring the QinQ Termination Sub-interface in a VSI to Support IGMP Snooping........................................................................................................................................................................5495.14.22 Example for Configuring the dot1q Termination Sub-interface to Support IGMP and Access an L3VPN........................................................................................................................................................................5575.14.23 Example for Configuring the QinQ Termination Sub-interface to Support IGMP and Access an L3VPN........................................................................................................................................................................5675.14.24 Example for Configuring the QinQ Termination Sub-interface to Support Single-AS MD VPN........................................................................................................................................................................5755.14.25 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support MPLS TE........................................................................................................................................................................5865.14.26 Example for Configuring the User-Side QinQ..................................................................................5945.14.27 Example for Configuring VLAN+802.1p for L2VPN Access (on a Sub-interface for Dot1q VLAN TagTermination)...................................................................................................................................................5955.14.28 Example for Configuring VLAN+EthType for L2VPN Access (on a Sub-interface for Dot1q VLANTag Termination)............................................................................................................................................6025.14.29 Example for Configuring VLAN+DSCP for L2VPN Access (on a Sub-interface for Dot1q VLAN TagTermination)...................................................................................................................................................6105.14.30 Example for Configuring QinQ Stacking Sub-interface+802.1p for L2VPN Access.......................6175.14.31 Example for Configuring Stacking Sub-interface+EthType for L2VPN Access..............................6245.14.32 Example for Configuring Stacking Sub-interface+DSCP for L2VPN Access..................................6315.14.33 Example for Configuring VLAN+802.1p for L3VPN Access (on a Sub-interface for Dot1q VLAN TagTermination)...................................................................................................................................................6385.14.34 Example for Configuring VLAN+DSCP for L3VPN Access (on a Sub-interface for Dot1q VLAN TagTermination)...................................................................................................................................................649

    6 STP/RSTP Configuration.........................................................................................................6606.1 STP/RSTP Overview......................................................................................................................................661

    6.1.1 STP/RSTP Overview.............................................................................................................................6616.1.2 STP/RSTP Features Supported by the NE80E/40E..............................................................................666

    6.2 Configuring Basic STP/RSTP Functions.......................................................................................................6686.2.1 Establishing the Configuration Task.....................................................................................................6686.2.2 Configuring the STP/RSTP Mode.........................................................................................................6706.2.3 (Optional) Configuring Switching Device Priorities.............................................................................670

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xiii

  • 6.2.4 (Optional) Setting the Path Cost for a Port............................................................................................6716.2.5 (Optional) Configuring Port Priorities...................................................................................................6726.2.6 Enabling STP/RSTP..............................................................................................................................6736.2.7 Checking the Configuration...................................................................................................................674

    6.3 Configuring STP/RSTP Parameters on an Interface......................................................................................6756.3.1 Establishing the Configuration Task.....................................................................................................6776.3.2 Setting System Parameters....................................................................................................................6786.3.3 Setting Port Parameters.........................................................................................................................6796.3.4 Checking the Configuration...................................................................................................................681

    6.4 Configuring RSTP Protection Functions........................................................................................................6826.4.1 Establishing the Configuration Task.....................................................................................................6826.4.2 Configuring BPDU Protection on a Switching Device.........................................................................6846.4.3 Configuring TC Protection on a Switching Device...............................................................................6856.4.4 Configuring Root Protection on a Port..................................................................................................6866.4.5 Configuring Loop Protection on a Port.................................................................................................6876.4.6 Checking the Configuration...................................................................................................................688

    6.5 Configuring STP/RSTP Interoperability Between Huawei Devices and Non-Huawei Devices....................6896.5.1 Establishing the Configuration Task.....................................................................................................6896.5.2 Configuring the BPDU Format on a Switching Device........................................................................6896.5.3 Configuring the Proposal/Agreement Mechanism................................................................................6906.5.4 Checking the Configuration...................................................................................................................691

    6.6 Maintaining STP/RSTP..................................................................................................................................6926.6.1 Clearing STP/RSTP Statistics...............................................................................................................692

    6.7 Configuration Examples.................................................................................................................................6936.7.1 Example for Configuring Basic STP Functions....................................................................................6936.7.2 Example for Configuring Basic RSTP Functions..................................................................................700

    7 MSTP Configuration.................................................................................................................7077.1 MSTP Overview.............................................................................................................................................709

    7.1.1 MSTP Introduction................................................................................................................................7097.1.2 MSTP Features Supported by the NE80E/40E......................................................................................717

    7.2 Configuring Basic MSTP Functions...............................................................................................................7227.2.1 Establishing the Configuration Task.....................................................................................................7227.2.2 Configuring the MSTP Mode................................................................................................................7247.2.3 Configuring and Activating an MST Region........................................................................................7247.2.4 (Optional) Setting a Priority for a Switching Device in an MSTI.........................................................7267.2.5 (Optional) Setting a Path Cost of a Port in an MSTI.............................................................................7277.2.6 (Optional) Setting a Port Priority in an MSTI.......................................................................................7287.2.7 Enabling MSTP.....................................................................................................................................7297.2.8 Checking the Configuration...................................................................................................................730

    7.3 Configuring MSTP Multi-process..................................................................................................................7317.3.1 Establishing the Configuration Task.....................................................................................................7317.3.2 Creating an MSTP Process....................................................................................................................732

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xiv

  • 7.3.3 Adding an Interface to an MSTP Process - Access Links.....................................................................7337.3.4 Adding an Interface to an MSTP Process - Share Link.........................................................................7347.3.5 Configuring Priorities and Root Protection in MSTP Multi-process....................................................7347.3.6 Configuring TC Notification in MSTP Multi-process..........................................................................7357.3.7 Checking the Configuration...................................................................................................................735

    7.4 Configuring MSTP Parameters on an Interface.............................................................................................7367.4.1 Establishing the Configuration Task.....................................................................................................7367.4.2 Configuring System Parameters............................................................................................................7377.4.3 Configuring Port Parameters.................................................................................................................7397.4.4 Checking the Configuration...................................................................................................................741

    7.5 Configuring MSTP Protection Functions.......................................................................................................7427.5.1 Establishing the Configuration Task.....................................................................................................7427.5.2 Configuring BPDU Protection on a Switching Device.........................................................................7457.5.3 Configuring TC Protection on a Switching Device...............................................................................7457.5.4 Configuring Root Protection on an Interface........................................................................................7467.5.5 Configuring Loop Protection on an Interface........................................................................................7477.5.6 Configuring Share-Link Protection on a Switching Device..................................................................7487.5.7 Checking the Configuration...................................................................................................................749

    7.6 Configuring MSTP Interoperability Between Huawei Devices and Non-Huawei Devices...........................7507.6.1 Establishing the Configuration Task.....................................................................................................7507.6.2 Configuring the BPDU Format on a Switching Device........................................................................7517.6.3 Configuring a Proposal/Agreement Mechanism...................................................................................7517.6.4 Configuring the MSTP Protocol Packet Format on an Interface...........................................................7537.6.5 Binding VLANs for an Interface to an MSTP Process.........................................................................7547.6.6 Enabling the Digest Snooping Function................................................................................................7547.6.7 Checking the Configuration...................................................................................................................755

    7.7 Maintaining MSTP.........................................................................................................................................7567.7.1 Clearing MSTP Statistics.......................................................................................................................756

    7.8 Configuration Examples.................................................................................................................................7577.8.1 Example for Configuring Basic MSTP Functions.................................................................................7577.8.2 Example for Configuring MSTP Multi-process....................................................................................7667.8.3 Example for Configuring MSTP Multi-process for Layer 2 Single-Access Rings and Layer 2 Multi-AccessRings...............................................................................................................................................................7767.8.4 Example for Configuring E-STP - Inter-AS Option A (Martini Mode)................................................7837.8.5 Example for Configuring E-STP - Inter-AS PW Interconnection (Martini Mode)...............................7977.8.6 Example for Configuring E-STP for CE Dual-Homing........................................................................812

    8 BPDU Tunnel Configuration..................................................................................................8248.1 BPDU Tunnel Overview................................................................................................................................825

    8.1.1 Introduction to BPDU............................................................................................................................8258.1.2 BPDU Tunnel Features Supported by the NE80E/40E.........................................................................826

    8.2 Configuring Interface-based BPDU Tunnels.................................................................................................8318.2.1 Establishing the Configuration Task.....................................................................................................831

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xv

  • 8.2.2 Enabling STP function on the PEs and the CEs....................................................................................8328.2.3 Adding the Interfaces of the PE Connected with the CE to a Specified VLAN...................................8328.2.4 Configuring Interface-based BPDU Tunnel..........................................................................................8338.2.5 Configuring PE Interfaces Connecting PSNs to Permit Packets with Specified Tags..........................8348.2.6 Checking the Configuration...................................................................................................................835

    8.3 Configuring VLAN-based BPDU Tunnels.....................................................................................................8368.3.1 Establishing the Configuration Task.....................................................................................................8368.3.2 Enabling the STP Function on CEs and PEs.........................................................................................8378.3.3 Configuring BPDUs from CEs to PEs to Carry Specified Tags............................................................8378.3.4 Configuring VLAN-based BPDU Tunnel.............................................................................................8388.3.5 Configuring PE Interfaces Connecting PSN to Permit Packets with Specified Tags............................8408.3.6 Checking the Configuration...................................................................................................................840

    8.4 Configuring QinQ-based BPDU Tunnels.......................................................................................................8428.4.1 Establishing the Configuration Task.....................................................................................................8428.4.2 Enabling the STP Function on CEs and PEs.........................................................................................8438.4.3 Configuring the BPDUs from CEs to PEs to Carry the Specified Tags................................................8438.4.4 Configuring QinQ-based BPDU Tunnel...............................................................................................8448.4.5 Configuring PE Interfaces Connecting PSNs to Permit the Packets with Specified Tags....................8468.4.6 Checking the Configuration...................................................................................................................846

    8.5 Configuration Examples.................................................................................................................................8488.5.1 Example for Configuring Interface-based BPDU Tunnel (Devices of Different Roles).......................8498.5.2 Example for Configuring Interface-based BPDU Tunnel (Devices of the Same Role)........................8558.5.3 Example for Configuring VLAN-based Tunnel of BPDUs..................................................................8628.5.4 Example for Configuring Tunnel of BPDUs Based on QinQ...............................................................869

    9 RRPP Configuration.................................................................................................................8779.1 RRPP Introduction..........................................................................................................................................879

    9.1.1 Overview of RRPP................................................................................................................................8799.1.2 RRPP Features Supported by the NE80E/40E......................................................................................879

    9.2 Configuring RRPP Functions.........................................................................................................................8839.2.1 Establishing the Configuration Task.....................................................................................................8839.2.2 Creating the RRPP Domain...................................................................................................................8849.2.3 Creating the Control VLAN..................................................................................................................8859.2.4 (Optional) Setting the Values of RRPP Domain Timers.......................................................................8859.2.5 Configuring the Ports on a RRPP Ring.................................................................................................8869.2.6 Creating the RRPP Ring........................................................................................................................8879.2.7 Enabling the RRPP Ring.......................................................................................................................8889.2.8 Enabling RRPP......................................................................................................................................8899.2.9 Checking the Configuration...................................................................................................................889

    9.3 Configuring the Monitoring Interface............................................................................................................8919.3.1 Establishing the Configuration Task.....................................................................................................8919.3.2 Configuring the Monitoring Interface...................................................................................................8929.3.3 Checking the Configuration...................................................................................................................893

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xvi

  • 9.4 Configuring RRPP Snooping..........................................................................................................................8939.4.1 Establishing the Configuration Task.....................................................................................................8949.4.2 Enabling RRPP Snooping......................................................................................................................8959.4.3 (Optional) Configuring the VSI Associated with the RRPP Snooping.................................................8969.4.4 Checking the Configuration...................................................................................................................896

    9.5 Maintaining RRPP..........................................................................................................................................8979.5.1 Clearing RRPP Running Information....................................................................................................897

    9.6 Configuration Examples.................................................................................................................................8979.6.1 Example for Configuring a Single RRPP Ring.....................................................................................8989.6.2 Example for Configuring a Crossed RRPP Ring...................................................................................9029.6.3 Example for Configuring a Tangent RRPP Ring..................................................................................9119.6.4 Example for Configuring a Crossed RRPP Ring to Connect Dual NPE...............................................9189.6.5 Example for Configuring the RRPP Snooping......................................................................................934

    A Glossary......................................................................................................................................943B Acronyms and Abbreviations.................................................................................................950

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access Contents

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    xvii

  • 1 MAC Address Table ConfigurationAbout This Chapter

    Each workstation or server that is connected to the Ethernet interface on a device has a uniqueMedium Access Control (MAC) address. The MAC address table on the device contains theMAC addresses of all the other devices that are connected to this device. The MAC address tableis used for data forwarding.

    1.1 MAC Address Table IntroductionA MAC address table is an interface-based Layer 2 forwarding table. It stores information aboutthe MAC addresses learned by the device.1.2 Configuring the MAC Address Table Based on the VLAN and Layer 2 InterfaceIf user networks are connected through Layer 2 devices and do not forward data through Layer3 routing, you can configure a MAC address table based on Layer 2 interfaces and VLANs fordata forwarding. Thus, user networks can communicate with each other.1.3 Configuring the MAC Address Table Based on the VSI and Layer 3 InterfaceIf user networks are connected through a Virtual Private LAN Service (VPLS) network, you canconfigure a MAC address table based on Layer 3 interfaces and Virtual Switch Instances (VSIs).Thus, user networks can communicate with each other.1.4 Configuring the Aging Time of a MAC Address TableAfter the network topology changes, dynamic MAC address entries are not automaticallyupdated in time. As a result, a device cannot learn new MAC addresses and thus user trafficcannot be normally forwarded. To addresses this problem, you need to configure the aging timeof MAC address entries.1.5 Maintaining MAC Address TableThis section provides commands used to maintain MAC address tables, including the commandthat is used to delete dynamic MAC address tables.1.6 Configuration ExamplesThis section lists networking requirements, configuration roadmap, and data preparation todescribe the typical application scenarios of MAC address tables, and provides relatedconfiguration files.

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access 1 MAC Address Table Configuration

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    1

  • 1.1 MAC Address Table IntroductionA MAC address table is an interface-based Layer 2 forwarding table. It stores information aboutthe MAC addresses learned by the device.

    1.1.1 MAC Address Table OverviewMAC address entries can be classified into dynamic entries, static entries, and blackhole entries.All workstations and servers connected by the Ethernet interfaces of a device have unique MAC(Medium Access Control) address. The MAC address table on the device contains theinformation about the MAC addresses of all the devices connected by this device.MAC address entries are classified into the following types: l Dynamic entries

    Dynamic entries are learned and stored on interface boards. The dynamic entries expireand are lost after hot swapping or interface-board resetting, or device rebooting.

    l Static entriesStatic entries are configured by users. They are automatically delivered to each interfaceboard. Static entries do not expire and are not lost after device rebooting, hot swapping, orinterface-board resetting.

    l Blackhole entriesBlackhole entries, configured by users, are used to discard frames containing specifiedMAC address. They are delivered to each interface board. The blackhole entries do notexpire and are not lost after device rebooting, hot swapping or interface-board resetting.

    1.1.2 MAC Addresses Learning Limit Supported by the NE80E/40EAs the capacity of a MAC address table is limited, it is necessary to specify the maximum numberof MAC addresses to be learned and limit the rate at which MAC addresses are learned. In thismanner, you can control the number of access users and prevent malicious users from attackinguser devices and networks through MAC addresses.For the MAC address learning limit, refer to the HUAWEI NetEngine80E/40E RouterConfiguration Guide - Security.

    1.2 Configuring the MAC Address Table Based on theVLAN and Layer 2 Interface

    If user networks are connected through Layer 2 devices and do not forward data through Layer3 routing, you can configure a MAC address table based on Layer 2 interfaces and VLANs fordata forwarding. Thus, user networks can communicate with each other.

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access 1 MAC Address Table Configuration

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    2

  • 1.2.1 Establishing the Configuration TaskBefore configuring a MAC address table based on Layer 2 interfaces and VLANs, familiarizeyourself with the applicable environment, complete the pre-configuration tasks, and obtain therequired data. This can help you complete the configuration task quickly and accurately.

    Applicable EnvironmentNOTE

    The ATM interface cannot be configured on the X1 and X2 models of the NE80E/40E.

    Generally, a device automatically creates MAC address tables by learning source addresses.To enhance the security of an interface, network administrators can manually bind a MACaddress and an interface in the table. This can prevent malicious users with counterfeit MACaddress from logging in to the local device through other switches.To discard the frames to the specified destination MAC address, configure blackhole entries.

    Pre-configuration TasksBefore configuring the MAC address table based on the VLAN and Layer 2 interface, completethe following tasks:l Creating a VLANl Ensuring that the Layer 2 ports in the MAC address entries are added to the VLANl Ensuring that the mapping between the VE interface and the PVC of the ATM interface is

    established if the outbound interface is a VE interfaceNOTE

    For the configuration of the mapping between the VE interface and the PVC of the ATM interface, referto the HUAWEI NetEngine80E/40E Router Configuration Guide - WAN Access.

    Data PreparationTo configure the MAC address table based on the VLAN and Layer 2 interface, you need thefollowing data.

    No. Data1 MAC address2 Port number3 VLAN ID

    1.2.2 Configuring MAC Address EntriesTo enhance the security of an interface and to prevent the invalid users from accessing theinterface, the network administrator can manually configure static MAC address entries and bindMAC addresses to the interface, or discard the packets with specified destination MACaddresses. The interface to which the MAC addresses are bound must be a switched interface,

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access 1 MAC Address Table Configuration

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    3

  • and must be added to a specified VLAN, or the interface allows the packets with specified VLANIDs to pass through.

    ProcedureStep 1 Run:

    system-view

    The system view is displayed.Step 2 Run:

    mac-address static mac-address interface-type interface-number vlan vlan-id [ ce-vlan ce-vlan]

    MAC address entries are added.Note the following:l You can add only unicast MAC addresses rather than multicast MAC addresses and special

    MAC addresses to a MAC address table. Special MAC addresses are reserved for specialusage, such as MAC addresses of special packets.

    l The interface type can be physical interface such as Ethernet interface and GE interface, orlogical interface such as Eth-Trunk interface and MAC-Tunnel. The interface specified inthe mac-address static command must be a switched interface, serving as an outboundinterface for Layer 2 forwarding.

    l The vlan-id must be associated with ports. That is, the VLAN contains the port. Alternatively,this interface allows the VLAN to pass through.

    l When ce-vlan is used, it indicates that the interface specified by interface-type interface-number is added to the specified VLAN in VLAN mapping mode. The parameter ce-vlanindicates the exterior VLAN ID in frames received by the port.

    l When ce-vlan is not used, it indicates that the interface specified by interface-type interface-number is added to the specified VLAN in port default, trunk, or VLAN stacking mode.

    l A maximum of 1024 non-dynamic entries can be added.Step 3 Run:

    mac-address blackhole mac-address vlan vlan-id

    The blackhole MAC address entry is configured.----End

    1.2.3 Configuring MAC Address Entries Based on the Layer 2 VEInterface

    If the interface bound to the MAC address of a user device is a Virtual Ethernet (VE) interface,you can configure a MAC address table based on Layer 2 VE interfaces. In this manner, thepackets with specific destination MAC addresses are forwarded by specified interfaces.

    ContextNOTE

    The ATM interface cannot be configured on the X1 and X2 models of the NE80E/40E.

    Do as follows on the router where the VLAN is created:

    HUAWEI NetEngine80E/40E RouterConfiguration Guide - LAN Access and MAN Access 1 MAC Address Table Configuration

    Issue 02 (2011-09-10) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    4

  • ProcedureStep 1 Run:

    system-view

    The system view is displayed.Step 2 Run:

    mac-address static mac-address virtual-ethernet interface-number atm interface-number pvc { pvc-name [ vpi | vci ] | vpi | vci } vlan vlan-id

    MAC address entries are added. Note the following:l You can add only unicast MAC addresses rather than multicast MAC addresses and special

    MAC addresses to a MAC address table. Special MAC addresses are reserved for specialusage, such as MAC addresses of special packets.

    l The VE interface must be a switched interface. In addition, the VE interface must beassociated with the VLAN specified by vlan-id. That is, the VLAN contains this VE interface;or this VE interface is added to VLAN by default.

    l T