0105 Ethernet Switching Configuration Commands PDF
0105 Ethernet Switching Configuration Commands PDF
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The display bridge mac-address command displays the bridge MAC address of a device.
Format
display bridge mac-address
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When you need to view the bridge MAC address of a device, run the display bridge mac-
address command.
Example
# Display the bridge MAC address of a device.
<HUAWEI> display bridge mac-address
System bridge MAC address: 00e0-f74b-6d00
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display mac-address [ mac-address ] [ vlan vlan-id | vsi vsi-name ] [ verbose ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table of the switch stores MAC addresses of other devices. When
forwarding an Ethernet frame, the switch searches the MAC address table for the outbound
interface according to the destination MAC address and VLAN ID in the Ethernet frame.
The display mac-address command displays all MAC address entries, such as dynamic MAC
address entries, static MAC address entries, and blackhole MAC address entries. A MAC
address entry contains the destination MAC address, VLAN ID or VSI, outbound interface,
and entry type.
Follow-up Procedure
If any MAC address entry in the command output is incorrect, run the undo mac-address
command to delete the entry or run the mac-address static command to add a correct one.
Precautions
If you run the display mac-address command without parameters, all MAC address entries
are displayed.
When the switch has a large number of MAC address entries, it is recommended that you
specify parameters in the command to filter the output information. Otherwise, the following
problems may occur due to excessive output information:
l The displayed information is repeatedly refreshed, so you cannot find the required
information.
l The system traverses and retrieves information for a long time, and does not respond to
any request.
Example
# Display all MAC address entries.
<HUAWEI> display mac-address
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
0000-0000-0033 100/- GE0/0/1 dynamic
0000-0000-0001 200/- GE0/0/2 static
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
-------------------------------------------------------------------------------
Total items displayed = 2
# Display detailed information about all MAC address entries in VLAN 10.
<HUAWEI> display mac-address vlan 10 verbose
-------------------------------------------------------------------------------
MAC Address : 0000-0000-0001 VLAN : 10
Learned-From: GE0/0/2 Type : dynamic
-------------------------------------------------------------------------------
Total items displayed = 1
VLAN/VSI ID of the VLAN or name of the VSI that a MAC address belongs
to.
Related Topics
5.1.12 display mac-address summary
5.1.13 display mac-address total-number
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display mac-address aging-time
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
This command displays the aging time of dynamic MAC address entries on the switch. You
can check whether the aging time is suitable for network requirements and device
performance.
Follow-up Procedure
If the aging time is unsuitable for requirements or device performance, run the mac-address
aging-time command to set the aging time properly.
Precautions
If the aging time is 0, dynamic MAC addresses will not be aged out. In this case, MAC
address entries increase sharply and the MAC address table will be full quickly.
Example
# Display the aging time of dynamic MAC address entries.
<HUAWEI> display mac-address aging-time
Aging time: 300 second(s)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.1.19 mac-address aging-time
Format
display mac-address blackhole [ vlan vlan-id | vsi vsi-name ] [ verbose ]
Parameters
Parameter Description Value
vlan vlan-id Displays blackhole MAC address entries The value is an integer that ranges
in a specified VLAN. from 1 to 4094.
vsi vsi-name Displays blackhole MAC address entries The value is a string of 1 to 31
of a specified virtual switch instance case-sensitive characters, spaces
(VSI). vsi-name specifies the name of a not supported. When double
VSI. quotation marks are used around
NOTE the string, spaces are allowed in
Only the S5720EI, S5720HI, S6720EI, and
the string.
S6720S-EI support this parameter.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The MAC address table of the switch stores MAC addresses of other devices. When
forwarding an Ethernet frame, the switch searches the MAC address table for the outbound
interface according to the destination MAC address and VLAN ID in the Ethernet frame.
The MAC address table contains the following MAC address entries:
l Blackhole MAC address entries that are used to discard packets with the specified MAC
addresses or destination MAC addresses. Blackhole MAC address entries are manually
configured and will not be aged out.
l Static MAC entries that are manually configured and will not be aged out.
l Dynamic MAC address entries that are learned by the switch and will be aged out when
the aging time expires.
To check whether blackhole MAC address entries are configured correctly, run this command.
These entries ensure communication between authorized users.
Follow-up Procedure
If any blackhole MAC address entry in the command output is incorrect, run the undo mac-
address command to delete the entry or run the mac-address blackhole command to add a
correct one.
Precautions
If you run the display mac-address blackhole command without parameters, all blackhole
MAC address entries are displayed.
If the MAC address table does not contain any blackhole MAC address, no information is
displayed.
Example
# Display all blackhole MAC address entries.
<HUAWEI> display mac-address blackhole
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
0022-0022-0033 100/- - blackhole
0000-0000-0001 200/- - blackhole
-------------------------------------------------------------------------------
Total items displayed = 2
-------------------------------------------------------------------------------
Total items displayed = 2
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
VLAN/VSI ID of the VLAN or name of the VSI that a MAC address belongs
to.
Related Topics
5.1.12 display mac-address summary
5.1.13 display mac-address total-number
5.1.20 mac-address blackhole
Function
The display mac-address dynamic command displays dynamic MAC address entries.
Format
display mac-address dynamic [ [ slot ] slot-id ] [ vlan vlan-id | interface-type interface-
number ] * [ verbose ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table needs to be updated constantly because the network topology always
changes. You can use this command to view learned MAC addresses in real time.
Follow-up Procedure
If the displayed dynamic MAC address entries are invalid, run the undo mac-address
command to delete dynamic MAC address entries.
Precautions
If you run the display mac-address dynamic command without parameters, all dynamic
MAC address entries are displayed.
If the MAC address table does not contain any dynamic MAC address entry, no information is
displayed.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
When the switch has a large number of dynamic MAC address entries, it is recommended that
you specify parameters in the command to filter the output information. Otherwise, the
following problems may occur due to excessive output information:
l The displayed information is repeatedly refreshed, so you cannot find the required
information.
l The system traverses and retrieves information for a long time, and does not respond to
any request.
Example
# Display all dynamic MAC address entries.
<HUAWEI> display mac-address dynamic
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
0022-0022-0033 100/- GE0/0/1 dynamic
0000-0000-0001 200/- GE0/0/2 dynamic
-------------------------------------------------------------------------------
Total items displayed = 2
-------------------------------------------------------------------------------
Total items displayed = 3
# Display detailed information about all dynamic MAC address entries in VLAN 9.
<HUAWEI> display mac-address dynamic vlan 9 verbose
-------------------------------------------------------------------------------
MAC Address : 0000-0007-0117 VLAN: 9
Learned-From: GE0/0/1 Type: dynamic
-------------------------------------------------------------------------------
Total items displayed = 3
Item Description
VLAN/VSI ID of the VLAN or name of the VSI that a MAC address belongs
to.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.1.12 display mac-address summary
5.1.13 display mac-address total-number
5.1.50 undo mac-address
Function
The display mac-address flapping command displays the configuration of MAC address
flapping detection.
Format
display mac-address flapping
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After MAC address flapping detection is configured, you can run the display mac-address
flapping command to check the configuration.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display the configuration of MAC address flapping detection.
<HUAWEI> display mac-address flapping
MAC address Flapping
Configurations :
----------------------------------------------------------------------------
Flapping detection :
Enable
Aging time(sec) :
300
----------------------------------------------------------------------------
Quit VLAN Recover Delay time before the interface joins a VLAN again after it is
time(min) removed from the VLAN.
The default value is 10. If the value is 0, the interface cannot
join a VLAN again after it is removed from the VLAN.
Exclude VLAN list VLAN that does not require MAC address flapping detection.
If such a VLAN is specified, the VLAN ID is displayed. If the
VLAN is not specified, this field is displayed as -.
Low level VLAN list List of VLANs of low security level defined for MAC address
flapping detection.
Middle level VLAN list List of VLANs of middle security level defined for MAC
address flapping detection
High level VLAN list List of VLANs of high security level defined for MAC address
flapping detection
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.1.7 display mac-address flapping record
5.1.24 mac-address flapping aging-time
5.1.26 mac-address flapping detection exclude vlan
5.1.47 reset mac-address flapping record
Format
display mac-address flapping record [ slot slot-id ] [ begin YYYY/MM/DD HH:MM:SS ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display mac-address flapping record command output helps locate the position where
MAC address flapping occurs.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
The command output is displayed only when MAC address flapping has occurred.
Example
# Display all MAC address flapping records.
<HUAWEI> display mac-address flapping record
S : start time
E : end time
(Q) : quit VLAN
(D) : error down
------------------------------------------------------------------------------
Move-Time VLAN MAC-Address Original-Port Move-Ports MoveNum
-------------------------------------------------------------------------------
S:2011-08-31 17:22:36 300 0000-0000-0007 Eth-Trunk1 Eth-Trunk2 81
E:2011-08-31 17:22:44
-------------------------------------------------------------------------------
Total items on slot 0: 1
# Display MAC address flapping records generated from 2012/06/04 09:00:00 to the current
time.
<HUAWEI> display mac-address flapping record begin 2012/06/04 09:00:00
S : start time
E : end time
(Q) : quit VLAN
(D) : error down
-------------------------------------------------------------------------------
Move-Time VLAN MAC-Address Original-Port Move-Ports MoveNum
-------------------------------------------------------------------------------
S:2012-06-04 17:22:38 300 0000-0000-0007 Eth-Trunk2 Eth-Trunk1 5
E:2012-06-04 17:22:42
-------------------------------------------------------------------------------
Total items on slot 0: 1
Table 5-7 Description of the display mac-address flapping record command output
Item Description
Move-Time Start time and end time MAC address flapping occurs. If the DST is
configured, the DST plus the flapping start time or end time is
displayed,for example: StartTime: 2012-02-02 15:54:10 DST.
MoveNum Number of times the MAC address has flapped. The maximum
value is 65535. When the number of times the MAC address has
flapped exceeds 65535, the MoveNum field still displays 65535.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.1.6 display mac-address flapping
5.1.25 mac-address flapping detection
5.1.47 reset mac-address flapping record
Function
The display mac-address hash-mode command displays the running hash mode and
configured hash mode on the device.
NOTE
Format
display mac-address hash-mode
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After a hash mode is configured, you can run the display mac-address hash-mode command
to check the configuration.
Precautions
After the hash algorithm is changed, restart the device for the configuration to take effect.
Example
# Display the running hash mode and configured hash mode on the device.
<HUAWEI> display mac-address hash-mode
MAC address hash mode status:
--------------------------------------------
Slot CurMode CfgMode
--------------------------------------------
0 crc16-lower crc32-lower
--------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.1.29 mac-address hash-mode
Function
The display mac-address mux command displays MUX MAC address entries.
Format
display mac-address mux [ vlan vlan-id | interface-type interface-number ] * [ verbose ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MUX VLAN function isolates Layer 2 traffic between interfaces in a VLAN. A MUX
MAC address entry is learned by a MUX VLAN enabled interface. The learned MUX MAC
address entries are deleted after the switch restarts.
After configuring the MUX VLAN function, you can run the display mac-address mux
command to check whether the learned MUX MAC address entries are correct.
Follow-up Procedure
If the displayed MUX MAC address entries are invalid, run the undo mac-address command
to delete MUX MAC address entries.
Precautions
If you run the display mac-address mux command without parameters, all MUX MAC
address entries are displayed.
If the MAC address table does not contain any MUX MAC address entry, no information is
displayed.
When the switch has a large number of MUX MAC address entries, it is recommended that
you specify parameters in the command to filter the output information. Otherwise, the
following problems may occur due to excessive output information:
l The displayed information is repeatedly refreshed, so you cannot find the required
information.
l The system traverses and retrieves information for a long time, and does not respond to
any request.
Example
# Display all MUX MAC address entries.
<HUAWEI> display mac-address mux
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
0022-0022-0033 100/- GE0/0/2 mux
-------------------------------------------------------------------------------
Total items displayed = 1
# Display detailed information about all MUX MAC address entries in VLAN 10.
<HUAWEI> display mac-address mux vlan 10 verbose
-------------------------------------------------------------------------------
MAC Address : 0000-0000-0001 VLAN : 10
Learned-From: GE0/0/2 Type : mux
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
-------------------------------------------------------------------------------
Total items displayed = 1
VLAN/VSI ID of the VLAN or name of the virtual switch instance (VSI) that a
MAC address belongs to.
Related Topics
5.5.1 display mux-vlan
5.1.12 display mac-address summary
5.1.13 display mac-address total-number
Function
The display mac-address oam command displays information about MAC address entries of
the OAM type.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
display mac-address oam
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
VPLS data forwarding depends on MAC address learning. Data packets in a VPLS domain
can be correctly forwarded only when the MAC addresses of the data packets are correctly
learned by PEs.
VPLS MAC diagnostic tools can be used to check whether MAC address learning works
properly on the devices in a VPLS domain. VPLS MAC diagnostic tools include MAC
populate and MAC purge.
l MAC populate is used to check whether MAC addresses can be learned by devices in a
VSI by populating an OAM MAC address into the VPLS domain.
If the devices in a specified VSI in the VPLS domain have learned the populated MAC
address, running the display mac-address oam command can display detailed
information about the populated OAM MAC address.
l MAC purge is used to purge the populated OAM MAC address.
If the learned OAM MAC address is purged on the device, running the display mac-
address oam command can show that the learned OAM MAC address has been purged.
Prerequisites
l Configuring the diagnosis of the OAM MAC address learning capacity is completed
before you check detailed information about the populated OAM MAC address.
l Purging the OAM MAC address learned by the devices on the VPLS network is
completed before you check whether the OAM MAC has been purged.
Example
# Display MAC address entries of the OAM type in the MAC address table.
<HUAWEI> display mac-address oam
----------------------------------------------------------------------------------
--------
MAC Address VLAN/VSI Learned-From Type
----------------------------------------------------------------------------------
--------
0000-0000-0010 -/vsi1 GigabitEthernet0/0/1 OAM-PU
0000-0000-0020 -/vsi1 GigabitEthernet0/0/1 OAM-PO
----------------------------------------------------------------------------------
--------
Total items displayed = 2
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Function
The display mac-address static command displays static MAC address entries.
Format
display mac-address static [ vsi vsi-name ] [ verbose ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table of the switch stores MAC addresses of other devices. When
forwarding an Ethernet frame, the switch searches the MAC address table for the outbound
interface according to the destination MAC address and VLAN ID in the Ethernet frame.
The MAC address table contains the following MAC address entries:
l Static MAC entries that are manually configured and will not be aged out.
l Blackhole MAC address entries that are used to discard packets with the specified source
MAC addresses or destination MAC addresses. Blackhole MAC address entries are
manually configured and will not be aged out.
l Dynamic MAC address entries that are learned by the switch and will be aged out when
the aging time expires.
To improve network security, configure static MAC address entries to ensure that packets
destined for specified MAC addresses are forwarded by the specified interfaces. This prevents
attack packets with bogus MAC addresses and guarantees communication between the switch
and the upstream device or server. After configuring static MAC address entries, you can run
the display mac-address static command to verify the configuration.
Follow-up Procedure
If any static MAC address entry is incorrect, run the undo mac-address command to delete it.
Precautions
If you run the display mac-address static command without parameters, all static MAC
address entries are displayed.
If the MAC address table does not contain any static MAC address entry, no information is
displayed.
Example
# Display all static MAC address entries.
<HUAWEI> display mac-address static
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
0000-0000-0033 100/- GE0/0/1 static
0000-0000-0001 200/- GE0/0/2 static
-------------------------------------------------------------------------------
Total items displayed = 2
# Display detailed information about all static MAC address entries in VLAN 10.
<HUAWEI> display mac-address static vlan 10 verbose
-------------------------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
-------------------------------------------------------------------------------
Total items displayed = 1
VLAN/VSI ID of the VLAN or name of the VSI that a MAC address belongs
to.
Related Topics
5.1.12 display mac-address summary
5.1.13 display mac-address total-number
5.1.32 mac-address static vlan
Function
The display mac-address summary command displays statistics on MAC address entries.
Format
display mac-address summary [ slot slot-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
The MAC address table of the device stores MAC addresses of other devices. When
forwarding an Ethernet frame, the switch searches the MAC address table for the outbound
interface according to the destination MAC address and VLAN ID in the Ethernet frame.
When the switch has many MAC address entries of different types.
Precautions
If slot slot-id is specified, this command displays statistics on MAC address entries on the
specified board. If this parameter is not specified, this command displays statistics on MAC
address entries on all boards.
Example
# View statistics on all MAC address entries in the system.
<HUAWEI> display mac-address summary
Summary information of slot 0:
-----------------------------------
Static : 2
Blackhole : 0
Dyn-Local : 0
Dyn-Remote : 0
Dyn-Trunk : 0
Sticky : 0
Security : 0
Sec-config : 0
Authen : 0
Guest : 0
Mux : 0
Snooping : 0
Pre-Mac : 0
In-used : 5
Capacity : 32768
-----------------------------------
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Capacity Capacity of the MAC address table. The actual value varies
according to device models.
Related Topics
5.1.2 display mac-address
5.1.13 display mac-address total-number
Function
The display mac-address total-number command displays the number of MAC address
entries of a specified type.
Format
display mac-address total-number [ slot slot-id ]
display mac-address total-number [ vsi vsi-name ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table of the switch stores MAC addresses of other devices. When
forwarding an Ethernet frame, the switch searches the MAC address table for the outbound
interface according to the destination MAC address and VLAN ID in the Ethernet frame.
When the switch has many MAC address entries of different types, you can use the display
mac-address total-number command to view statistics on MAC address entries of a
specified type.
Precautions
If no parameter is specified, the total number of MAC address entries in the system is
displayed.
If vlan vlan-id is not specified, the total number of MAC addresses in all VLANs is
displayed.
Example
# Display the number of dynamic MAC address entries.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Total number of MAC address Total number of MAC address entries in the system.
Related Topics
5.1.12 display mac-address summary
5.1.2 display mac-address
Function
The display mac-limit command displays the rules that limit the number of learned MAC
addresses.
Format
display mac-limit [ interface-type interface-number | vlan vlan-id | vsi vsi-name ]
Parameters
Parameter Description Value
vlan vlan-id Displays the MAC address The value is an integer that
limiting rules in a specified ranges from 1 to 4094.
VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To check whether MAC address limiting rules are configured correctly, run the display mac-
limit command. If a rule is incorrect, run the mac-limit command to modify the rule or run
the undo mac-limit all command to delete it.
Precautions
If no parameter is specified, MAC address learning limit rules of all interfaces, VSIs, and
VLANs are displayed.
Example
# Display the MAC address limiting rule on GigabitEthernet0/0/1.
<HUAWEI> display mac-limit GigabitEthernet 0/0/1
GigabitEthernet0/0/1 MAC limit:
Maximum MAC count 1000, used count 0
Action: forward, Alarm: enable
Item Description
Maximum MAC count Maximum number of MAC addresses that can be learned.
Total MAC Limit rule Number of configured MAC address limiting rules.
count
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.1.42 mac-limit
Function
The display snmp-agent trap feature-name l2if all command displays all trap messages of
the L2IF module.
Format
display snmp-agent trap feature-name l2if all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
After the trap function of a specified feature is enabled, you can run the display snmp-agent
trap feature-name l2if all command to check the status of all traps of l2if. You can use the
snmp-agent trap enable feature-name l2if command to enable the trap function of l2if.
Prerequisites
SNMP has been enabled. See snmp-agent.
Example
# Display all trap messages of the L2IF module.
<HUAWEI> display snmp-agent trap feature-name l2if all
------------------------------------------------------------------------------
Feature name: L2IF
Trap number : 6
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwSlotMacLimitNumRaisingThreshold
off
off
hwSlotMacLimitNumFallingThreshold
off
off
hwMuxVlanGroupCountExceedThreshold
off
off
hwMuxVlanGroupCountExceedThresholdResume
off
off
hwVlantransCountExceedThreshold
off
off
hwVlantransCountExceedThresholdResume
off off
Table 5-15 Description of the display snmp-agent trap feature-name l2if all command
output
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.1.48 snmp-agent trap enable feature-name l2if
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display snmp-agent trap feature-name l2ifppi all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the trap function of a specified feature is enabled, you can run the display snmp-agent
trap feature-name l2ifppi all command to check the status of all traps of l2ifppi. You can use
the snmp-agent trap enable feature-name l2ifppi command to enable the trap function of
l2ifppi.
Prerequisites
SNMP has been enabled. See snmp-agent.
Example
# Display all the traps of the l2ifppi module.
<HUAWEI>display snmp-agent trap feature-name l2ifppi all
------------------------------------------------------------------------------
Feature name:
L2IFPPI
Trap number :
15
------------------------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
hwMacLimitOverThresholdAlarm on
on
hwMacLimitOverThresholdAlarmResume
on
on
hwRecIllegalMacPktAlarm on
on
hwPortStickyReachMaxAlarm on
on
hwMflpQuitVlanAlarm on
on
hwMflpQuitVlanResume on
on
hwPortVlanSecureMacAlarm on
on
hwMacTrapAlarm on
on
hwSlotMacUsageRaisingThreshold on
on
hwSlotMacUsageFallingThreshold on
on
hwBoardPowerOff on
on
hwMacTrapHashConflictAlarm on on
Table 5-16 Description of the display snmp-agent trap feature-name l2ifppi all command
output
Item Specification
Feature name Name of the module that the trap belongs to.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Specification
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Specification
Related Topics
5.1.49 snmp-agent trap enable feature-name l2ifppi
Function
The drop illegal-mac alarm command configures the switch to send a trap to the network
management system (NMS) when receiving a packet with an all-0 MAC address.
By default, the switch does not send a trap to the NMS when receiving a packet with an all-0
MAC address.
Format
drop illegal-mac alarm
Parameters
None
Views
System view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
Some legacy computers or network devices may send packets with an all-0 source or
destination MAC address when their network adapters fail. The drop illegal-mac alarm
command configures the switch to send a trap to the NMS when receiving a packet with an
all-0 MAC address. You can locate the faulty network adapter according to the trap message.
Precautions
If the alarm function is disabled on the switch, the NMS cannot receive any trap message.
After you run the drop illegal-mac alarm command, the switch sends a trap only once after
receiving packets with an all 0 MAC address. To configure the switch to send traps
continuously, run the drop illegal-mac alarm command repeatedly.
This command and IPv6 over IPv4 cannot be configured simultaneously on the S5720SI and
S5720S-SI.
Example
# Configure the switch to send a trap to the NMS when receiving a packet with an all-0 MAC
address.
<HUAWEI> system-view
[HUAWEI] drop illegal-mac alarm
Related Topics
5.1.18 drop illegal-mac enable
Format
drop illegal-mac enable
undo drop illegal-mac enable
Parameters
None
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Some legacy computers or network devices may send packets with an all-0 source or
destination MAC address when their network adapters fail. You can run the drop illegal-mac
enable command to configure the switch to discard such packets. After receiving the packets
with an all-0 source or destination MAC address, the switch discards the packets.
This command reduces incorrect MAC address entries on the device.
Precautions
If the alarm function is disabled on the device, the network management system cannot
receive any alarm message.
Example
# Configure the switch to discard packets with an all-0 invalid MAC address.
<HUAWEI> system-view
[HUAWEI] drop illegal-mac enable
Related Topics
5.1.17 drop illegal-mac alarm
Format
mac-address aging-time aging-time
undo mac-address aging-time
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The network topology changes frequently, and the switch will learn many MAC addresses.
You can run the mac-address aging-time command to set a proper aging time for dynamic
MAC address entries so that aged MAC address entries are deleted from the MAC address
table. This reduces MAC address entries in the MAC address table.
The system starts an aging timer for each dynamic MAC address entry. If a dynamic MAC
address entry is not updated within a certain period (twice the aging time), the entry is
deleted. If the entry is updated within this period, the aging timer of this entry is reset. If the
aging time is short, the switch is sensitive to network changes.
When setting the aging time of dynamic MAC address entries, follow these rules:
l Set a longer aging time on a stable network and a shorter aging time on an unstable
network.
l The capacity of the MAC address table on a low end device is small; therefore, set a
relatively short aging time on low end devices to save the MAC address table space.
Precautions
Dynamic MAC address entries are lost after system restart. Static MAC address entries and
blackhole MAC address entries are not aged or lost.
If the aging time is 0, dynamic MAC addresses will not be aged out. In this case, MAC
address entries increase sharply and the MAC address table will be full quickly.
If you run the mac-address aging-time command multiple times, only the latest
configuration takes effect.
Example
# Set the aging time of dynamic MAC address entries to 500 seconds.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] mac-address aging-time 500
Related Topics
5.1.3 display mac-address aging-time
Function
The mac-address blackhole command configures a blackhole MAC address entry.
The undo mac-address blackhole command deletes a blackhole MAC address entry.
Format
mac-address blackhole mac-address [ vlan vlan-id | vsi vsi-name ]
Parameters
Parameter Description Value
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To protect a device or network against MAC address attacks, configure MAC addresses of
untrusted users as blackhole MAC addresses. The device then directly discards the received
packets of which the source or destination MAC addresses match the blackhole MAC address
entries.
Precautions
l Blackhole MAC address entries fall into global and VLAN- or VSI-based blackhole
MAC address entries. Global blackhole MAC address entries are configured using the
mac-address blackhole command with only a MAC address specified. They do not
occupy the MAC address table space.
l If you configure a VLAN ID or VSI-based blackhole MAC address entry when the MAC
address table is full, the device processes the MAC address entry as follows:
– If a dynamic MAC address entry with the same MAC address and VLAN ID or VSI
name exists in the MAC address table, the blackhole MAC address entry replaces
the dynamic MAC address entry.
– If no dynamic MAC address entry with the same MAC address and VLAN ID or
VSI name exists in the MAC address table, the blackhole MAC address entry
cannot be added to the MAC address table.
l You can run the mac-address blackhole command multiple times to configure multiple
blackhole MAC address entries.
Example
# Add a blackhole MAC address entry to the MAC address table. In the blackhole MAC
address entry, the MAC address is 0004-0004-0004 and the VLAN ID is VLAN 5.
<HUAWEI> system-view
[HUAWEI] vlan 5
[HUAWEI-vlan5] quit
[HUAWEI] mac-address blackhole 0004-0004-0004 vlan 5
# Configure a global blackhole MAC address entry in which the MAC address is
0005-0005-0005.
<HUAWEI> system-view
[HUAWEI] mac-address blackhole 0005-0005-0005
# Add a blackhole MAC address entry in which the MAC address is 0011-2233-4455 to VSI
a2. The device directly discards the received frame in which the source or destination MAC
address is 0011-2233-4455 and the VSI name is a2.
<HUAWEI> system-view
[HUAWEI] mac-address blackhole 0011-2233-4455 vsi a2
Related Topics
5.1.2 display mac-address
5.1.4 display mac-address blackhole
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The mac-address destination hit aging enable command configures the device to age MAC
address entries no matter whether the entries match destination MAC addresses of packets.
The undo mac-address destination hit aging enable command restores the default
configuration.
By default, if MAC address entries match destination MAC addresses of packets, the system
recalculates the aging time.
Format
mac-address destination hit aging enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a user uses one-way services such as the video on demand service, packets are
transmitted unidirectionally from the server to the user terminal. When the user terminal is
shut down, the server still sends packets. Therefore, the dynamic MAC address entry with the
destination MAC address of the packets remains in the MAC address table.
To delete MAC address entries matching one-way service packets after user terminals are shut
down, run the mac-address destination hit aging enable command to enable the device to
age dynamic MAC address entries matching dynamic MAC addresses of received packets.
Configuration Impact
This command is used only when one-way services are deployed on a network.
Precautions
This command only free up space in the MAC address table but cannot save system resources.
If the device cannot find the matching entry in the MAC address table, it broadcasts the
packets.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Configure the device to age MAC address entries no matter whether the entries match
destination MAC addresses of packets.
<HUAWEI> system-view
[HUAWEI] mac-address destination hit aging enable
Related Topics
5.1.5 display mac-address dynamic
Function
The mac-address flapping action command configures the action to perform on an interface
when MAC address flapping is detected on the interface.
By default, the system does not perform any action when detecting MAC address flapping on
an interface.
Format
mac-address flapping action { error-down | quit-vlan }
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
When the switch connects to a user network that does not support loop prevention protocols,
configure a loop prevention action for the switch to perform when detecting MAC address
flapping. This reduces the impact of MAC address flapping on the user network.
When MAC address flapping occurs on an interface with a loop prevention action configured,
the switch performs the configured action. When the action is set to error-down, the switch
shuts down the interface. When the action is set to quit-VLAN, the switch removes the
interface from the VLAN where MAC address flapping occurs. Only one interface can be shut
down during one aging time configured by the mac-address flapping aging-time command.
Follow-up Procedure
By default, an interface cannot automatically restore to Up state after it is shut down. To
restore the interface, run the shutdown and undo shutdown commands on the interface in
sequence. Alternatively, run the restart command on the interface to restart the interface.
To enable the interface to go Up automatically, you must run the error-down auto-recovery
cause mac-address-flapping command in the system view before the interface enters the
error-down state. This command enables an interface in error-down state to go Up and sets a
recovery delay. The interface goes Up automatically after the delay.
Precautions
Do not run the mac-address flapping action command on uplink interfaces.
MAC address flapping detection can only detect loops on interfaces, but cannot obtain the
entire network topology. If the user network connected to the switch supports loop prevention
protocols, use the loop prevention protocols instead of MAC address flapping detection.
If you run the mac-address flapping action command multiple times in the same interface
view, only the latest configuration takes effect.
Example
# Configure the switch to shut down GE0/0/1 when detecting MAC address flapping on the
interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-address flapping action error-down
Info: This command may shut down the interface after MAC address flapping is
detected.
# Configure the switch to remove GE0/0/1 from the VLAN where MAC address flapping
occurs.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-address flapping action quit-vlan
Related Topics
5.1.6 display mac-address flapping
5.1.7 display mac-address flapping record
5.1.25 mac-address flapping detection
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The mac-address flapping action priority command sets the priority for the action against
MAC address flapping on an interface.
The undo mac-address flapping action priority command restores the default configuration.
Format
mac-address flapping action priority priority
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the switch connects to a user network that does not support loop prevention protocols,
configure a loop prevention action for the switch to perform when detecting MAC address
flapping. This reduces the impact of MAC address flapping on the user network. The mac-
address flapping action priority command sets the priority of the action.
When a MAC address flaps between two interfaces and both the interfaces have an action and
priority configured, the switch performs the action (error-down or quit-VLAN) configured on
the interface with lower priority. If the two interfaces have the same priority, the switch
performs the action on the interface that learns the MAC address later. If the later interface
has no action configured, the switch performs the action on the interface that learns the MAC
address earlier.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
The switch compares priorities of the interfaces only when the interfaces have the same action
configured. If one interface is configured with the error-down action, and the other is configured with
the quit-VLAN action, the switch performs the actions on both interfaces even if their priorities are
same.
Precautions
If you run the mac-address flapping action priority command multiple times in the same
interface view, only the latest configuration takes effect.
Example
# Set the priority of the action against MAC address flapping on GE0/0/1 to 3.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-address flapping action priority 3
Related Topics
5.1.6 display mac-address flapping
5.1.7 display mac-address flapping record
5.1.25 mac-address flapping detection
5.1.22 mac-address flapping action
Function
The mac-address flapping aging-time command sets the aging time of flapping MAC
addresses.
The undo mac-address flapping aging-time command restores the default aging time of
flapping MAC addresses.
Format
mac-address flapping aging-time aging-time
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Increasing the aging time of flapping MAC addresses will cause MAC address flapping again
and increase the error-down time. To ensure that the system performs MAC address flapping
detection in a timely manner, run the mac-address flapping aging-time command to shorten
the aging time of flapping MAC addresses.
Precautions
If you run the mac-address flapping aging-time command multiple times, only the latest
configuration takes effect.
Example
# Set the aging time of flapping MAC addresses to 500 seconds.
<HUAWEI> system-view
[HUAWEI] mac-address flapping aging-time 500
Related Topics
5.1.6 display mac-address flapping
5.1.7 display mac-address flapping record
5.1.25 mac-address flapping detection
5.1.22 mac-address flapping action
5.1.47 reset mac-address flapping record
Function
The mac-address flapping detection command enables global MAC address flapping
detection.
The undo mac-address flapping detection command disables global MAC address flapping
detection.
Format
mac-address flapping detection
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
MAC address flapping occurs when a MAC address is learned by two interfaces in the same
VLAN. The MAC address entry learned later replaces the earlier one.
MAC address flapping occurs in the following situations:
l Network cables of switches are connected incorrectly or switches use incorrect
configurations.
l Unauthorized users simulate MAC address of valid network devices to attack the
network.
Global MAC address flapping detection enables the Switch to check all MAC addresses.
When MAC address flapping occurs, the Switch sends a trap message to the NMS. You can
locate the fault according to the trap message. You can also run the display mac-address
flapping record command to view MAC address flapping records.
Example
# Enable global MAC address flapping detection.
<HUAWEI> system-view
[HUAWEI] mac-address flapping detection
Related Topics
5.1.6 display mac-address flapping
5.1.7 display mac-address flapping record
5.1.24 mac-address flapping aging-time
5.1.26 mac-address flapping detection exclude vlan
5.1.22 mac-address flapping action
5.1.47 reset mac-address flapping record
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
By default, the system performs MAC address flapping detection in all VLANs.
Format
mac-address flapping detection exclude vlan { vlan-id1 [ to vlan-id2 ] } &<1-10>
undo mac-address flapping detection exclude vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> |
all }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, the system performs MAC address flapping detection in all VLANs. When a
switch connected to a load balancing server with dual network adapters, the server's MAC
address may be learned by two interfaces on the switch. This is a normal situation where
MAC address flapping detection is not required.
You can run the mac-address flapping detection exclude vlan command to exclude a VLAN
from MAC address flapping detection. If MAC address flapping occurs in this VLAN, the
system does not send a trap message or record this event.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If you run the mac-address flapping detection exclude vlan command multiple times,
multiple VLANs are configured.
Example
# Exclude VLAN 5 from MAC address flapping detection.
<HUAWEI> system-view
[HUAWEI] mac-address flapping detection exclude vlan 5
Related Topics
5.1.6 display mac-address flapping
5.1.7 display mac-address flapping record
5.1.25 mac-address flapping detection
5.1.22 mac-address flapping action
Format
mac-address flapping detection vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> | all } security-
level { high | middle | low }
undo mac-address flapping detection vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> | all }
security-level [ high | middle | low ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, the switch considers that a MAC address flapping occurs when a MAC address
moves between interfaces 10 times. On an unstable network, it may be a normal situation
when a MAC address moves between interfaces 10 times. You can set the security level for
VLANs according to the actual situation of your network. The switch reports a MAC address
flapping when a MAC address moves between interfaces for the specified number of times.
Example
# Set the security level of VLAN 5 to high for MAC address flapping.
<HUAWEI> system-view
[HUAWEI] mac-address flapping detection vlan 5 security-level high
Related Topics
5.1.6 display mac-address flapping
5.1.25 mac-address flapping detection
Format
mac-address flapping quit-vlan recover-time time-value
undo mac-address flapping quit-vlan recover-time
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If an interface is removed from a VLAN because MAC address flapping occurs in the VLAN,
the interface can automatically join the VLAN again after a delay.
Precautions
If an interface is removed from multiple VLANs due to MAC address flapping, the system
counts the delay time since the interface is removed from the last VLAN.
Example
# Set the delay time before an interface joins a VLAN again to 15 minutes.
<HUAWEI> system-view
[HUAWEI] mac-address flapping quit-vlan recover-time 15
Related Topics
5.1.6 display mac-address flapping
Function
The mac-address hash-mode command configures a MAC hash algorithm on the device.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo mac-address hash-mode command restores the default MAC hash algorithm on
the device.
By default, the hash algorithm on the S1720GFR, S2720, S2750, S5700LI, S5700S-LI,
S5710-X-LI, S5720SI, and S5720S-SI is crc. The hash algorithm on other models is crc32-
lower.
NOTE
Format
On the S1720GFR, S2720, S2750, S5700LI, S5700S-LI, S5710-X-LI, S5720SI, and S5720S-
SI:
mac-address hash-mode { xor | crc } slot slot-id
undo mac-address hash-mode [ xor | crc ] slot slot-id
On devices except S1720GFR, S2720, S2750, S5700LI, S5700S-LI, S5710-X-LI, S5720SI,
and S5720S-SI:
mac-address hash-mode { crc16-lower | crc16-upper | crc32-lower | crc32-upper | lsb }
slot slot-id
undo mac-address hash-mode [ crc16-lower | crc16-upper | crc32-lower | crc32-upper |
lsb ] slot slot-id
Parameters
Parameter Description Value
slot slot-id Indicates the hash algorithm The value is an integer and
on the stacked switch. is the stack ID of the switch.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device uses a hash algorithm to improve MAC address forwarding performance. If
multiple MAC addresses match a key value, a hash conflict occurs.
When a hash conflict occurs, the device may fail to learn many MAC addresses and some
traffic can only be broadcast. This results in heavy broadcast traffic on the device. If such a
problem occurs, use an appropriate hash algorithm to reduce the hash conflict.
Precautions
l MAC addresses are distributed on a network randomly, so the system cannot determine
the best hash algorithm. Generally, the default hash algorithm is the best one, so do not
change the hash algorithm unless you have special requirement.
l An appropriate hash algorithm can only reduce hash conflicts, but cannot prevent them.
l After changing the hash algorithm and saving the configuration, restart the device for the
configuration to take effect.
l If you run the mac-address hash-mode command multiple times, only the latest
configuration takes effect.
Example
# Set the hash algorithm on the device to crc.
<HUAWEI> system-view
[HUAWEI] mac-address hash-mode crc slot 0
Related Topics
5.1.8 display mac-address hash-mode
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo mac-address learning disable command enables MAC address learning.
By default, MAC address learning is enabled.
Format
mac-address learning disable [ action { discard | forward } ] (Interface view)
mac-address learning disable (VLAN view)
undo mac-address learning disable
Parameters
Parameter Description Value
Views
VLAN view, Ethernet interface view, GE interface view, XGE interface view, 40GE interface
view, MultiGE interface view, Eth-Trunk interface view, port group view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If you want an interface to forward only packets with certain MAC addresses, use this
command. For example, if an interface is connected to a server, configure a static MAC
address entry with the MAC address of the server, and then disable MAC address learning and
set the action to discard on the interface. The configuration prevents other servers or terminals
from accessing the interface and improves network stability and security.
When an switch with MAC address learning enabled receives an Ethernet frame, it records the
source MAC address and inbound interface of the Ethernet frame in a MAC address entry.
When receiving other Ethernet frames destined for this MAC address, the switch forwards the
frames through the corresponding outbound interface according to the MAC address entry.
MAC address learning reduces broadcast packets on a network.
You can use the mac-address learning disable command to disable MAC address learning
on an interface. The action performed on received packets can be set to discard or forward.
l When the action is set to forward, the switch forwards packets according to the MAC
address table. If a packet does not match any MAC address entry, the switch broadcasts
the packet.
l When the action is set to discard, the switch searches for the source MAC address of the
packet in the MAC address table. If the source MAC address is found in the MAC
address table, the switch forwards the packet according to the MAC address entry. If the
source MAC address is not found, the switch discards the packet. The default action is
forward.
Precautions
After MAC address learning is disabled on an interface, the device does not learn new MAC
addresses on the interface, but untrusted terminals can still access the network.
Example
# Disable MAC address learning in VLAN 2.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] mac-address learning disable
Function
The mac-address learning disable command disables MAC address learning in a traffic
behavior.
The undo mac-address learning disable command enables MAC address learning in a traffic
behavior.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Product Support
S6700 Supported
Format
mac-address learning disable
undo mac-address learning disable
Parameters
None
Views
Traffic behavior view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The mac-address learning disable command is used in the following scenarios:
l When a network is running stably and the MAC address of packets is fixed, a device
does not need to learn MAC addresses of other packets. To save MAC addresses and
improve device efficiency, apply a traffic policy and disable MAC address learning in all
the traffic classifiers bound to the traffic policy.
l Some unauthorized users may change MAC addresses frequently to attack the network.
To prevent MAC address overflow and protect device performance, apply a traffic policy
and disable MAC address learning in all the traffic classifiers bound to the traffic policy.
Follow-up Procedure
Run the traffic policy command to create a traffic policy and run the classifier behavior
command in the traffic policy view to bind the traffic classifier to the traffic behavior
containing the action of disabling MAC address learning.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
After the traffic behavior containing mac-address learning disable is bound to the specified
traffic classifier, the source MAC addresses of packets matching the traffic classifier are not
learned. The source MAC addresses of packets that do not match the traffic classifier are still
learned by default.
The mac-address learning disable command is similar to the mac-address learning disable
command in the interface view or VLAN view. The difference is that the mac-address
learning disable command is valid for the packets matching the user-defined traffic classifier
and is applied to the system, an interface, or a VLAN by using the traffic policy. The mac-
address learning disable command is used in the interface view, port group view, or VLAN
view and is valid for all the packets in the corresponding view.
To disable MAC address learning on an interface, in a port group, or in a VLAN, run the mac-
address learning disable command in the corresponding view. To disable MAC address
learning for a specified traffic classifier, run the mac-address learning disable command in
the traffic behavior view.
Example
# Disable MAC address learning in the traffic behavior test.
<HUAWEI> system-view
[HUAWEI] traffic behavior test
[HUAWEI-behavior-test] mac-address learning disable
Related Topics
15.1.1 classifier behavior
5.1.30 mac-address learning disable (Interface view and VLAN view)
15.1.30 traffic behavior
15.1.31 traffic classifier
15.1.32 traffic policy
Function
The mac-address static vlan command configures a static MAC address entry.
The undo mac-address static vlan command deletes a static MAC address entry.
Format
mac-address static mac-address interface-type interface-number vlan vlan-id
NOTE
For details on how to configure a VSI-based static MAC address entry, see mac-address static vlanif
and mac-address static vsi.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Static MAC address entries are used for the following purposes:
l Improve security. The device directly discards packets sent from unauthorized users
using authorized users' MAC addresses.
l Guide unicast forwarding and save bandwidth.
Precautions
l The VLAN in a static MAC address entry must have been created and the outbound
interface in the same static MAC address entry has been added to the VLAN.
l If you configure a static MAC address entry when the MAC address table is full, the
device processes the MAC address entry as follows:
– If a dynamic MAC address entry with the same MAC address and VLAN ID exists
in the MAC address table, the static MAC address entry replaces the dynamic MAC
address entry.
– If no dynamic MAC address entry with the same MAC address and VLAN ID
exists in the MAC address table, the static MAC address entry cannot be added to
the MAC address table.
l You can run the mac-address static command multiple times to configure multiple static
MAC address entries.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Add a static MAC address entry to the MAC address table. In the MAC address entry, the
destination MAC address is 0003-0003-0003, the VLAN ID is 4, and the outbound interface
is gigabitethernet0/0/2. That is, the device forwards packets with the destination MAC address
of 0003-0003-0003 from VLAN 4 through gigabitethernet0/0/2.
<HUAWEI> system-view
[HUAWEI] vlan 4
[HUAWEI-vlan4] quit
[HUAWEI] interface gigabitethernet 0/0/2
[HUAWEI-GigabitEthernet0/0/2] port link-type access
[HUAWEI-GigabitEthernet0/0/2] port default vlan 4
[HUAWEI-GigabitEthernet0/0/2] quit
[HUAWEI] mac-address static 0003-0003-0003 gigabitethernet 0/0/2 vlan 4
Related Topics
5.1.2 display mac-address
5.1.11 display mac-address static
Format
mac-address threshold-alarm upper-limit upper-limit-value lower-limit lower-limit-value
undo mac-address threshold-alarm
Parameters
Parameter Description Value
upper-limit upper-limit- Specifies the upper alarm The value is an integer that
value threshold for the MAC ranges from 1 to 100. The
address usage, in default value is 80.
percentage.
lower-limit lower-limit- Specifies the lower alarm The value is an integer that
value threshold for the MAC ranges from 1 to 100. The
address usage, in default value is 70. lower-
percentage. limit-value must be smaller
than upper-limit-value.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MAC address resources are core resources of the device and the device supports limited MAC
addresses. The MAC address usage affects device running. You can run the mac-address
threshold-alarm command to configure upper and lower alarm thresholds for the MAC
address usage. When the MAC address usage is larger than the upper alarm threshold or
smaller than the lower alarm threshold, an alarm is generated to notify the administrator. The
administrator then can learn the MAC address usage in a timely manner.
Precautions
When you run the mac-address threshold-alarm command multiple times, only the latest
configuration takes effect.
Example
# Set upper and lower alarm thresholds for the MAC address usage to 90% and 20%
respectively.
<HUAWEI> system-view
[HUAWEI] mac-address threshold-alarm upper-limit 90 lower-limit 20
Function
The mac-address trap hash-conflict enable command enables the trap function for the MAC
address hash conflict.
The undo mac-address trap hash-conflict enable command disables the trap function for
the MAC address hash conflict.
By default, the trap function for the MAC address hash conflict is disabled.
Format
mac-address trap hash-conflict enable
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To improve the MAC address forwarding performance, the MAC address table of the device
is saved using a hash link. When the same key value is obtained for multiple MAC addresses
according to the hash algorithm, some MAC addresses may be not learned. That is, the MAC
address hash conflict occurs.
In this situation, the MAC address table space is not full but the MAC address entry cannot be
learned. When the MAC address hash conflict occurs, traffic with this destination MAC
address can be only broadcast. This occupies device bandwidth and resources. You can
replace the device or network adapter of the terminal.
After the trap function for the MAC address hash conflict is configured, the administrator can
immediately discover MAC address hash conflicts.
Example
# Enable the trap function for the MAC address hash conflict.
<HUAWEI> system-view
[HUAWEI] mac-address trap hash-conflict enable
Related Topics
5.1.35 mac-address trap hash-conflict history
5.1.36 mac-address trap hash-conflict interval
Function
The mac-address trap hash-conflict history command sets the number of alarms reported at
an interval when the MAC address hash conflict occurs.
The undo mac-address trap hash-conflict history command restores the default number of
alarms reported at an interval when the MAC address hash conflict occurs.
By default, 10 alarms are reported at an interval when the MAC address hash conflict occurs.
Format
mac-address trap hash-conflict history history-number
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the trap function for the MAC address hash conflict is enabled, the device reports a
maximum of 10 alarms every 60s. Each alarm carries a MAC address for which the hash
conflict occurs.
If hash values of more than 10 MAC addresses conflict, reports about subsequent MAC
address hash conflicts cannot be reported. You can run this command to set the number of
alarms reported at an interval.
Precautions
When you run the mac-address trap hash-conflict history command multiple times, only
the latest configuration takes effect.
Example
# Set the number of alarms reported at an interval to 12 when the MAC address hash conflict
occurs.
<HUAWEI> system-view
[HUAWEI] mac-address trap hash-conflict history 12
Related Topics
5.1.34 mac-address trap hash-conflict enable
5.1.36 mac-address trap hash-conflict interval
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo mac-address trap hash-conflict interval command restores the default interval at
which alarms are reported when the MAC address hash conflict occurs.
By default, alarms are reported at intervals of 60s when the MAC address hash conflict
occurs.
Format
mac-address trap hash-conflict interval interval-time
undo mac-address trap hash-conflict interval
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the trap function for the MAC address hash conflict is enabled, the device reports a
maximum of 10 alarms every 60s. Each alarm carries a MAC address for which the hash
conflict occurs.
If a small interval is used, alarms about MAC address hash conflicts are reported immediately.
When there are many MAC address hash conflicts, many alarms are reported.
If a long interval is used and many MAC address hash conflicts occur, alarms will be
suppressed. You can adjust the interval according to the requirements.
Precautions
When you run the mac-address trap hash-conflict interval command multiple times, only
the latest configuration takes effect.
Example
# Set the interval at which alarms are reported to 90s when the MAC address hash conflict
occurs.
<HUAWEI> system-view
[HUAWEI] mac-address trap hash-conflict interval 90
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.1.34 mac-address trap hash-conflict enable
5.1.35 mac-address trap hash-conflict history
Format
mac-address trap notification { aging | learn | all }
undo mac-address trap notification
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To learn MAC address change in a timely manner, run the mac-address trap notification
command to enable the trap function for MAC address learning or aging.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
When you run the mac-address trap notification command multiple times, only the latest
configuration takes effect.
The trap function for MAC address learning or aging is not supported for the MAC address
entries in a VSI.
Example
# Enable the trap function for MAC address learning on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface GigabitEthernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-address trap notification learn
Related Topics
5.1.38 mac-address trap notification interval
Function
The mac-address trap notification interval command sets the interval at which the device
checks MAC address learning or aging.
The undo mac-address trap notification interval command restores the default interval at
which the device checks MAC address learning or aging.
By default, the device checks MAC address learning or aging at intervals of 10s.
Format
mac-address trap notification interval interval-time
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
After the mac-address trap notification command is used to enable the trap function when
the device learns MAC addresses or MAC addresses are aged, the device periodically checks
whether MAC addresses are learned or aged. You can run the mac-address trap notification
interval command to set the interval.
Example
# Set the interval at which the device checks MAC address learning or aging to 20s.
<HUAWEI> system-view
[HUAWEI] mac-address trap notification interval 20
Related Topics
5.1.37 mac-address trap notification
Format
mac-address update arp
undo mac-address update arp
NOTE
Only the S5720EI, S5720SI, S5720S-SI, S5720HI, S6720EI, and S6720S-EI support this command.
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
On the Ethernet, MAC address entries are used to guide Layer 2 data forwarding. The ARP
entries that define the mapping between IP addresses and MAC addresses guide
communication between devices on different network segments.
The outbound interface in a MAC address entry is updated by packets, whereas the outbound
interface in an ARP entry is updated after the aging time is reached. In this case, the outbound
interfaces in the MAC address entry and ARP entry may be different. To address this issue,
run the mac-address update arp command to enable the Switch to update outbound
interfaces in ARP entries when outbound interfaces in MAC address entries change.
Precautions
This command takes effect only for dynamic ARP entries. Static ARP entries are not updated
when the corresponding MAC address entries change.
The mac-address update arp command does not take effect after ARP entry fixing is
enabled by using the arp anti-attack entry-check { fixed-mac | fixed-all | send-ack } enable
command.
After the mac-address update arp command is run, the Switchupdates an ARP entry only if
the outbound interface in the corresponding MAC address entry changes.
After this command is executed, the arp anti-attack gratuitous-arp drop command
becomes invalid and the Switch cannot drop gratuitous ARP packets.
Example
# Enable the MAC address-triggered ARP entry update function.
<HUAWEI> system-view
[HUAWEI] mac-address update arp
Related Topics
6.2.23 display arp
Function
The mac-learning priority command sets the MAC address learning priority of an interface.
The undo mac-learning priority command restores the default MAC learning priority of an
interface.
NOTE
Only the S5720HI, S5720EI, S6720EI, and S6720S-EI support this configuration.
Format
mac-learning priority priority-id
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
priority priority-id Specifies the MAC address The value is an integer that
learning priority of an ranges from 0 to 3. A larger
interface. value indicates a higher
priority.
Views
GE interface view, XGE interface view, 40GE interface view, Eth-Trunk interface view, port
group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An uplink interface of the switch is connected to a server, and downlink interfaces are
connected to users. To prevent unauthorized users from using the server MAC address to
connect to the switch, run the mac-learning priority command to set the priority of the
uplink interface to be higher than the user-side interfaces. When these interfaces learn the
same MAC address, the MAC address entry learned by the uplink interface overrides MAC
address entries learned by the user-side interfaces. Therefore, the switch will not learn MAC
addresses of unauthorized users, and authorized users can access the server and use network
resources.
You can run the undo mac-learning priority allow-flapping command to forbid MAC
address flapping between interfaces with the same priority.
Both the undo mac-learning priority allow-flapping command and the mac-learning
priority command can prevent MAC address flapping. The difference between the two
commands is as follows:
l The undo mac-learning priority allow-flapping command prevents MAC address
flapping between interfaces with the same priority. If an attacker uses the server MAC
address to connect to the S1720&S2700&S5700&S6720 after the server is powered off,
the switch learns the MAC address of the forged server. After the real server is powered
on, the switch cannot learn the correct server MAC address.
l The mac-learning priority command prevents MAC address flapping between
interfaces with different priorities. If an attacker uses the server MAC address to connect
to the switch after the server is powered off, the switch learns the MAC address of the
forged server. After the real server is powered on, the switch can learn the correct server
MAC address.
Precautions
If you run the mac-learning priority command multiple times in the same interface view,
only the latest configuration takes effect.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The function is not supported for the MAC address entries in a VSI.
Example
# Set the MAC address learning priority of GigabitEthernet0/0/2 to 3.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/2
[HUAWEI-GigabitEthernet0/0/2] mac-learning priority 3
Related Topics
5.1.41 mac-learning priority allow-flapping
Function
The mac-learning priority allow-flapping command allows MAC address flapping between
interfaces with the same priority.
The undo mac-learning priority allow-flapping command prevents MAC address flapping
between interfaces with the same priority.
By default, MAC address flapping between interfaces with the same priority is allowed.
NOTE
Only the S5720HI, S5720EI, S6720EI, and S6720S-EI support this configuration.
Format
mac-learning priority priority-id allow-flapping
Parameters
Parameter Description Value
priority priority-id Specifies the MAC address The value is an integer that
learning priority of an ranges from 0 to 3. A larger
interface. value indicates a higher
priority.
Views
System view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
An uplink interface of the switch is connected to a server, and downlink interfaces are
connected to users. To prevent unauthorized users from using the server MAC address to
connect to the switch, you can run the undo mac-learning priority allow-flapping command
to forbid MAC address flapping between interfaces with the same priority. MAC address then
will not be learned by multiple interfaces. This prevents attackers from using the MAC
addresses of valid devices to attack the switch.
Both the mac-learning priority command and the undo mac-learning priority allow-
flapping command can prevent MAC address flapping. The difference between the two
commands is as follows:
l The undo mac-learning priority allow-flapping command prevents MAC address
flapping between interfaces with the same priority. If an attacker uses the server MAC
address to connect to the switch after the server is powered off, the switch learns the
MAC address of the forged server. After the real server is powered on, the switch cannot
learn the correct server MAC address.
l The mac-learning priority command prevents MAC address flapping between
interfaces with different priorities. If an attacker uses the server MAC address to connect
to the switch after the server is powered off, the switch learns the MAC address of the
forged server. After the real server is powered on, the switch can learn the correct server
MAC address.
Precautions
The function is not supported for the MAC address entries in a VSI.
Example
# Forbid MAC address flapping between interfaces with priority 1.
<HUAWEI> system-view
[HUAWEI] undo mac-learning priority 1 allow-flapping
Related Topics
5.1.40 mac-learning priority
5.1.42 mac-limit
Function
The mac-limit command configures a rule to limit the number of MAC addresses that can be
learned.
The undo mac-limit command deletes the rule.
By default, the number of learned MAC addresses is not limited.
Format
mac-limit { maximum max-num | action { discard | forward } | alarm { disable |
enable } } * (Interface view)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
mac-limit { maximum max-num | alarm { disable | enable } } * (VLAN view, except the
S5720EI)
undo mac-limit
Parameters
Parameter Description Value
alarm { disable | enable } Indicates whether the system If you do not set this
generates an alarm when the parameter in the command,
number of learned MAC the alarm function is enabled
address entries reaches the by default.
limit.
l disable: indicates that no
alarm is generated when
the number of learned
MAC addresses reaches
the limit.
l enable: indicates that an
alarm is generated when
the number of learned
MAC addresses reaches
the limit.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
VLAN view, Ethernet interface view, GE interface view, XGE interface view, 40GE interface
view, MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The mac-limit command limits the number of access users and prevents attacks to the MAC
address tables. You can enable the function to improve network security.
Precautions
When the number of learned MAC addresses reaches the limit, the switch forwards the
packets with new source MAC addresses but does not add the new MAC addresses to the
MAC address table.
After the port-security enable command is configured on an interface, mac-limit cannot take
effect. Do not configure mac-limit and port-security enable simultaneously.
Example
# Set the maximum number of MAC addresses that can be learned by GigabitEthernet0/0/2 to
30. Configure the device to generate an alarm when the number learned of MAC addresses
reaches the limit.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/2
[HUAWEI-GigabitEthernet0/0/2] mac-limit maximum 30 alarm enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
S1720GFR Yes
S2720 Yes
S2750 Yes
S6700 No
Format
mac-spoofing-defend enable
undo mac-spoofing-defend enable
Parameters
None
Views
GE interface view, Ethernet interface view, XGE interface view, MultiGE interface view,
Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
User behaviors are uncontrollable; therefore, a user device may send bogus packets with the
server MAC address to prevent other users from accessing the real server. To prevent such
attacks, you can use the mac-spoofing-defend enable command to configure the network-
side interface connected to the server as a trusted interface. The MAC address learned by the
interface will not be learned by other interfaces. This prevents the attacks of bogus packets
with the server MAC address.
Prerequisites
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The MAC spoofing defense function has been enabled by using the mac-spoofing-defend
enable command in the system view.
Precautions
After the device connected to the trusted interface is powered off, the MAC address entry
matching the device MAC address is aged out after a certain period. After another device is
connected to the interface, the MAC address of this device will not be learned by other
interfaces.
On the S1720GFR, S2720, S2750, S5700LI, , S5720SI, S5720S-SI and S5700S-LI, when the
TPID configured by the qinq protocol command on the inbound interface is different from
the TPID in received packets and the mac-spoofing-defend enable command is also used on
the inbound interface, the MAC address of packets in the VLAN specified by the PVID is
learned, but not the MAC address-based VLAN, protocol-based VLAN, IP subnet-based
VLAN, or policy VLAN. For example, the TPID on port A is 0x9100, the PVID is 10, MAC
address-based VLAN is VLAN 20, received packet A contains VLAN 30 and TPID of
0x8100 that matches the MAC address-based VLAN. Because TPID values are different, the
interface considers that packet A is untagged and adds VLAN 20 to packet A. The MAC
address in VLAN 20 is therefore learned. If the mac-spoofing-defend enable command is
configured on port A, the MAC address in VLAN 10 is incorrectly learned.
Example
# Configure GigabitEthernet0/0/1 as a trusted interface.
<HUAWEI> system-view
[HUAWEI] interface GigabitEthernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-spoofing-defend enable
Related Topics
5.1.44 mac-spoofing-defend enable (system view)
Function
The mac-spoofing-defend enable command enables global MAC spoofing defense.
The undo mac-spoofing-defend enable command disables global MAC spoofing defense.
S1720GFR Yes
S2720 Yes
S2750 Yes
S6700 No
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
mac-spoofing-defend enable
undo mac-spoofing-defend enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
User behaviors are uncontrollable; therefore, a user device may send bogus packets with the
server MAC address to prevent other users from accessing the real server. To prevent such
attacks, you can use the mac-spoofing-defend enable command to configure the network-
side interface connected to the server as a trusted interface. The MAC address learned by the
interface will not be learned by other interfaces. This prevents the attacks of bogus packets
with the server MAC address.
Before configuring an interface as a trusted interface, you must use the mac-spoofing-defend
enable command to enable global MAC spoofing defense.
Precautions
After you run the undo mac-spoofing-defend enable command in the system view to disable
global MAC spoofing defense, the mac-spoofing-defend enable command cannot be used in
the interface view.
Example
# Enable global MAC spoofing defense.
<HUAWEI> system-view
[HUAWEI] mac-spoofing-defend enable
Related Topics
5.1.43 mac-spoofing-defend enable (interface view)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo port bridge enable command disables the port bridge function.
Format
port bridge enable
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
By default, an interface does not forward packets whose source and destination MAC
addresses are both learned by this interface. When the interface receives such a packet, it
discards the packet as an invalid packet.
After the port bridge function is enabled on the interface, the interface forwards such a packet
if the destination MAC address of the packet is in the MAC address table.
l The switch connects to devices that do not support Layer 2 forwarding. When users
connected to the devices need to communicate, the devices send packets of the users to
the switch for packet forwarding. Because source and destination MAC addresses of the
packets are learned on the same interface, the port bridge function needs to be enabled on
the interface so that the interface can forward such packets.
l The switch is used as an access device in a data center and is connected to servers. Each
server is configured with multiple virtual machines. The virtual machines need to
transmit data to each other. If servers perform data switching for virtual machines, the
data switching speed and server performance are reduced. To improve the data
transmission rate and server performance, enable the port bridge function on the
interfaces connected to the servers so that the switch forwards data packets between the
virtual machines.
Example
# Enable the port bridge function on GigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] interface GigabitEthernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port bridge enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
2.1.9 display this
Product Support
S6700 Supported
Format
remark destination-mac mac-address
undo remark destination-mac
Parameters
Parameter Description Value
Views
Traffic behavior view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
You can use the remark destination-mac command to re-mark the destination MAC address
in packets in a traffic behavior so that the downstream device can identify packets and provide
differentiated services.
Follow-up Procedure
Run the traffic policy command to create a traffic policy and run the classifier behavior
command in the traffic policy view to bind the traffic classifier to the traffic behavior
containing destination MAC address re-marking.
Precautions
In a traffic behavior, the remark destination-mac command cannot be used with the redirect
ip-nexthop or redirect ip-multihop command.
If you run the remark destination-mac command in the same traffic classifier view multiple
times, only the latest configuration takes effect.
Example
# Configure the traffic behavior b1: The destination MAC address of packets is re-marked to
0050-b007-bed3.
<HUAWEI> system-view
[HUAWEI] traffic behavior b1
[HUAWEI-behavior-b1] remark destination-mac 0050-b007-bed3
Related Topics
7.11.1 redirect ip-multihop
7.11.2 redirect ip-nexthop
15.1.30 traffic behavior
Function
The reset mac-address flapping record command clears MAC address flapping records.
Format
reset mac-address flapping record
Parameters
None
Views
All views
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before collecting MAC address flapping statistics, run the reset mac-address flapping
record command to clear the current statistics.
Precautions
The reset mac-address flapping record command deletes only historical MAC address
flapping records, and does not delete records about ongoing MAC address flapping.
After clearing MAC address flapping records, you can run the display mac-address flapping
record command to view current MAC address flapping records.
The cleared MAC address flapping records cannot be restored.
Example
# Clear MAC address flapping records.
<HUAWEI> reset mac-address flapping record
Related Topics
5.1.7 display mac-address flapping record
Format
snmp-agent trap enable feature-name l2if [ trap-name
{ hwslotmaclimitnumfallingthreshold | hwslotmaclimitnumraisingthreshold |
hwMuxVlanGroupCountExceedThreshold |
hwMuxVlanGroupCountExceedThresholdResume |
hwVlantransCountExceedThreshold | hwVlantransCountExceedThresholdResume } ]
undo snmp-agent trap enable feature-name l2if [ trap-name
{ hwslotmaclimitnumfallingthreshold | hwslotmaclimitnumraisingthreshold |
hwMuxVlanGroupCountExceedThreshold |
hwMuxVlanGroupCountExceedThresholdResume |
hwVlantransCountExceedThreshold | hwVlantransCountExceedThresholdResume } ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Only the S1720GFR, S2720, S2750, S5700LI, S5700S-LI, and S5710-X-LI support
hwMuxVlanGroupCountExceedThreshold, hwMuxVlanGroupCountExceedThresholdResume,
hwVlantransCountExceedThreshold, and hwVlantransCountExceedThresholdResume.
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the trap function is enabled, the device generates traps during running and sends traps
to the NMS through SNMP. When the trap function is not enabled, the device does not
generate traps and the SNMP module does not send traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the device to send traps when the number of MAC entries on a card falls below the
lower limit.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name l2if trap-name
hwslotmaclimitnumfallingthreshold
Related Topics
5.1.15 display snmp-agent trap feature-name l2if all
Function
The snmp-agent trap enable feature-name l2ifppi command enables the trap function for
the l2ifppi module.
The undo snmp-agent trap enable feature-name l2ifppi command disables the trap
function for the l2ifppi module.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
snmp-agent trap enable feature-name l2ifppi [ trap-name
{ hwportsecrcvinsecurepktalarm | hwmflpvlanalarm | hwmflpvsialarm |
hwmaclimitoverthresholdalarm | hwmaclimitoverthresholdalarmresume |
hwrecillegalmacpktalarm |hwportstickyreachmaxalarm | hwmflpquitvlanalarm |
hwmflpquitvlanresume | hwportvlansecuremacalarm | hwmactrapalarm |
hwslotmacusageraisingthreshold | hwslotmacusagefallingthreshold | hwboardpoweroff |
hwmactraphashconflictalarm } ]
undo snmp-agent trap enable feature-name l2ifppi [ trap-name
{ hwportsecrcvinsecurepktalarm | hwmflpvlanalarm | hwmflpvsialarm |
hwmaclimitoverthresholdalarm | hwmaclimitoverthresholdalarmresume |
hwrecillegalmacpktalarm |hwportstickyreachmaxalarm | hwmflpquitvlanalarm |
hwmflpquitvlanresume | hwportvlansecuremacalarm | hwmactrapalarm |
hwslotmacusageraisingthreshold | hwslotmacusagefallingthreshold | hwboardpoweroff |
hwmactraphashconflictalarm } ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the trap function is enabled, the device generates traps during running and sends traps
to the NMS through SNMP. When the trap function is not enabled, the device does not
generate traps and the SNMP module does not send traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the trap function for MAC address entry change.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name l2ifppi trap-name hwmactrapalarm
Related Topics
5.1.16 display snmp-agent trap feature-name l2ifppi all
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
undo mac-address [ all | dynamic ] [ interface-type interface-number | vlan vlan-id ] *
undo mac-address { all | dynamic } [ vsi vsi-name ]
undo mac-address mac-address [ vlan vlan-id | vsi vsi-name ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
A MAC address table saves a limited number of MAC addresses. If the MAC address table is
full, the device cannot learn new MAC address entries until old MAC addresses are aged out.
Packets matching no MAC address entry are broadcast, wasting bandwidth resources. This
command can delete useless MAC address entries to release the MAC address table space.
You can delete some of MAC address entries as required. For example:
l If you do not specify interface-type interface-number, the command deletes MAC
address entries of the specified type on all interfaces.
l If you do not specify vlan vlan-id, the command deletes MAC address entries of the
specified type in all VLANs.
Example
# Delete all MAC address entries.
<HUAWEI> system-view
[HUAWEI] undo mac-address all
# Delete all MAC address entries in which the MAC address is 0004-0004-0004.
<HUAWEI> system-view
[HUAWEI] undo mac-address 0004-0004-0004
Related Topics
5.1.2 display mac-address
5.1.5 display mac-address dynamic
5.1.12 display mac-address summary
14.7.11 undo mac-address security
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
undo mac-address temporary
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the interface card is pulled out, the static MAC address entries configured on the
interfaces are reserved as temporary MAC address entries. After the interface card is plugged
again, the static MAC address entries are restored.
If the interface card is not plugged after being pulled out, the temporary MAC address entries
become unnecessary and occupy the system resources. In this case, you can run the undo
mac-address temporary command to delete all the temporary MAC address entries in the
system.
Example
# Delete all the temporary MAC address entries in the system.
<HUAWEI> system-view
[HUAWEI] undo mac-address temporary
Function
The undo mac-limit all command deletes all MAC address limiting rules.
Format
undo mac-limit all
Parameters
None
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command deletes all the rules configured by the mac-limit command.
Precautions
Before using this command, run the display mac-limit command to check the MAC address
limiting rules and confirm your operation.
Example
# Delete all MAC address limiting rules.
<HUAWEI> system-view
[HUAWEI] undo mac-limit all
Related Topics
5.1.42 mac-limit
Function
The authentication-mode command configures the E-Trunk authentication and encryption
mode.
The undo authentication-mode command restores the default E-Trunk authentication and
encryption mode.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
authentication-mode { hmac-sha1 | hmac-sha256 | enhanced-hmac-sha256 }
undo authentication-mode
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To improve system security, run the authentication-mode command to configure the E-Trunk
authentication and encryption mode.
Precautions
Two devices in an E-Trunk must have the same E-Trunk authentication and encryption mode.
Example
# Configure the E-Trunk authentication and encryption mode as enhanced-hmac-sha256.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] authentication-mode enhanced-hmac-sha256
Related Topics
5.2.56 security-key
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Format
assign trunk { trunk-group group-number | trunk-member member-number } *
undo assign trunk
Parameters
Parameter Description Value
trunk-group Specifies the number of The value is an integer that ranges from 32
group-number LAGs. to 128. By default, the value is 128. The
value multiplied by member-number
cannot exceed 2048.
trunk-member Specifies the maximum The value is an integer that can be 8, 16,
member-number number of member 32, or 64. The default value is 8.
interfaces in each LAG.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Generally, a switch supports a fixed maximum number of LAGs and a fixed maximum
number of member interfaces in each LAG. On the S6720EI and S6720S-EI, you can run the
assign trunk command to set the maximum number of LAGs and the maximum number of
member interfaces in each LAG, implementing flexible networking and meeting various
service requirements.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l When more than 128 Eth-Trunks or 16 member interfaces are configured using the
assign trunk { trunk-group group-number | trunk-member member-number } *
command, the enhanced mode is used for load balance known unicast packets by default.
If the enhanced mode is not used, problems such as packet loss and uneven load
balancing may occur. The switch load balances non-known unicast packets based on
source and destination MAC addresses by default.
l If you use the assign trunk command to modify Eth-Trunk specifications, the existing
Eth-Trunk configuration will become invalid or be lost. Exercise caution when you run
the assign trunk command.
l After the Eth-Trunk specifications are modified, save the configuration and restart the
device to make the modification take effect.
Example
# Set the maximum number of LAGs to 64 and the maximum number of member interfaces in
each LAG to 16.
<HUAWEI> system-view
[HUAWEI] assign trunk trunk-group 64 trunk-member 16
Related Topics
5.2.5 display trunk configuration
Function
The collect forward-path command configures the device to collect traffic information.
The undo collect forward-path command configures the device not to collect traffic
information.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
collect forward-path { { sip source-ip-address dip destination-ip-address [ sport source-
port dport destination-port [ protocol { protocol-number | gre | icmp | igmp | ip | ipinip |
ospf | tcp | udp } ] ] } | { smac source-mac-address | dmac dest-mac-address | vlan vlan-id |
l2-protocol { protocol-value | arp | ip | ipv6 | mpls | rarp } } * } { ingress | egress | both }
[ interval interval-time ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
sport source-port Specifies the source port The value is an integer that
number. ranges from 0 to 65535.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The packet information contains the source and destination IP addresses, source and
destination port numbers, source and destination MAC addresses, and protocol type. Traffic
transmitted on each device interface contains different information. You can run this
command to configure the device to collect traffic information, which helps you locate faults
and understand the traffic forwarding path.
Precautions
The device can collect inbound and outbound interfaces and traffic information of a maximum
of 8 flows.
When the device restarts or an active/standby switchover occurs in a CSS, the collection
information and report configured by the collect forward-path command will be deleted.
Example
# Configure the device to collect traffic information with source IP address 10.1.1.1 and
destination IP address 10.2.2.2.
<HUAWEI> system-view
[HUAWEI] collect forward-path sip 10.1.1.1 dip 10.2.2.2 both
Related Topics
5.2.10 display forward-path
5.2.11 display forward-path report
Format
display eth-trunk [ trunk-id [ interface interface-type interface-number | verbose ] ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
trunk-id Specifies the ID of an Eth- The value is an integer. The value varies
Trunk. according to device model:
l S1720GFR, S2720, S2750EI,
S5700LI, S5700S-LI, and S5710-X-
LI: 0-63
l S5720SI, and S5720S-SI: 0-119
l S5720EI, S5720HI, S6720EI, and
S6720S-EI: 0-127
On the S6720EI, and S6720S-EI,, you
can run the assign trunk command to set
the value, and run the display trunk
configuration command to check the
configuration.
Views
All views
Default Level
1 : Monitoring level
Usage Guidelines
Usage Scenario
After configuring an Eth-Trunk on a device, you can run the display eth-trunk command to
check whether the Eth-Trunk configuration is correct.
When using the display eth-trunk command, pay attention to the following points:
l If no parameter is specified, the display eth-trunk command displays the configurations
of all Eth-Trunks.
l If only trunk-id is specified, the display eth-trunk command displays the configuration
of a specified Eth-Trunk.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display the configurations of all Eth-Trunks.
<HUAWEI> display eth-trunk
Eth-Trunk10's state information is:
Local:
LAG ID: 10 WorkingMode: LACP
Preempt Delay Time: 10 Hash arithmetic: According to SIP-XOR-DIP
System Priority: 120 System ID: 0018-82d4-04c3
Least Active-linknumber: 1 Max Active-linknumber: 2
Operate status: up Number Of Up Port In Trunk: 2
--------------------------------------------------------------------------------
ActorPortName Status PortType PortPri PortNo PortKey
PortState Weight
GigabitEthernet0/0/2 Selected 1GE 10 262 2609
10111100 1
GigabitEthernet0/0/3 Selected 1GE 10 263 2609
10111100 1
GigabitEthernet0/0/4 Unselect 1GE 32768 264 2609
10100000 1
Partner:
--------------------------------------------------------------------------------
ActorPortName SysPri SystemID PortPri PortNo PortKey
PortState
GigabitEthernet0/0/2 32768 00e0-fc6e-bb11 32768 262 2609
10111100
GigabitEthernet0/0/3 32768 00e0-fc6e-bb11 32768 263 2609
10111100
GigabitEthernet0/0/4 32768 00e0-fc6e-bb11 32768 264 2609
10110000
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Partner:
--------------------------------------------------------------------------------
ActorPortName SysPri SystemID PortPri PortNo PortKey
PortState
GigabitEthernet0/0/2 32768 00e0-fc6e-bb11 32768 262 2609
10111100
GigabitEthernet0/0/3 32768 00e0-fc6e-bb11 32768 263 2609
10111100
GigabitEthernet0/0/4 32768 00e0-fc6e-bb11 32768 264 2609
10110000
Flow statistic
Interface GigabitEthernet0/0/1
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 drops
0 packets output, 0 bytes, 0 drops
Interface Eth-Trunk11
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 drops
0 packets output, 0 bytes, 0 drops
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
--------------------------------------------------------------------------------
ActorPortName Status PortType PortPri PortNo PortKey
PortState Weight
GigabitEthernet0/0/2 Selected 1GE 10 262 2609
10111100 1
GigabitEthernet0/0/3 Selected 1GE 10 263 2609
10111100 1
GigabitEthernet0/0/4 Unselect 1GE 32768 264 2609
10100000 1
Partner:
--------------------------------------------------------------------------------
ActorPortName SysPri SystemID PortPri PortNo PortKey
PortState
GigabitEthernet0/0/2 32768 00e0-fc6e-bb11 32768 262 2609
10111100
GigabitEthernet0/0/3 32768 00e0-fc6e-bb11 32768 263 2609
10111100
GigabitEthernet0/0/4 32768 00e0-fc6e-bb11 32768 264 2609
10110000
Flow statistic
Interface GigabitEthernet0/0/2
Last 300 seconds input rate 32 bits/sec, 0 packets/sec
Last 300 seconds output rate 32 bits/sec, 0 packets/sec
148 packets input, 18944 bytes, 0 drops
246 packets output, 31488 bytes, 0 drops
Interface GigabitEthernet0/0/3
Last 300 seconds input rate 32 bits/sec, 0 packets/sec
Last 300 seconds output rate 32 bits/sec, 0 packets/sec
147 packets input, 18816 bytes, 0 drops
246 packets output, 31488 bytes, 0 drops
Interface GigabitEthernet0/0/4
Last 300 seconds input rate 56 bits/sec, 0 packets/sec
Last 300 seconds output rate 48 bits/sec, 0 packets/sec
144 packets input, 18432 bytes, 0 drops
174 packets output, 22272 bytes, 0 drops
Interface Eth-Trunk10
Last 300 seconds input rate 96 bits/sec, 0 packets/sec
Last 300 seconds output rate 96 bits/sec, 0 packets/sec
439 packets input, 56192 bytes, 0 drops
666 packets output, 85248 bytes, 0 drops
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Last 300 seconds input/output rate Rates for sending and receiving bits and packets
on the interface in the last 300 seconds.
Related Topics
5.2.23 eth-trunk
5.2.44 least active-linknumber
5.2.45 load-balance
NOTE
Format
display trunk configuration
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To facilitate flexible networking, run the assign trunk command to set the maximum number
of LAGs and the maximum number of member interfaces in each LAG. You can run the
display trunk configuration command to view the configuration.
Example
# Display the maximum number of LAGs and the maximum number of member interfaces in
each LAG.
<HUAWEI> display trunk configuration
--------------------------------------------------
Item Default Current Configured
--------------------------------------------------
trunk-group 128 64 64
trunk-member 8 16 16
--------------------------------------------------
Item Description
Related Topics
5.2.2 assign trunk
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The display eth-trunk load-balance command displays the load balancing mode of an Eth-
Trunk.
Format
display eth-trunk [ trunk-id ] load-balance
Parameters
Parameter Description Value
trunk-id Displays the load The value is an integer. The value varies according
balancing mode of a to device model:
specified Eth-Trunk.
trunk-id specifies the ID l S1720GFR, S2720, S2750EI, S5700LI, S5700S-
of the Eth-Trunk. LI, and S5710-X-LI: 0-63
l S5720SI, and S5720S-SI: 0-119
l S5720EI, S5720HI, S6720EI, and S6720S-EI:
0-127
On the S6720EI, and S6720S-EI,, you can run the
assign trunk command to set the value, and run the
display trunk configuration command to check the
configuration.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the load balancing mode of an Eth-Trunk is configured, you can run this command to
view the load balancing mode of the Eth-Trunk. If trunk-id is not specified, the load balancing
modes of all Eth-Trunks are displayed.
Example
# Display the load balancing mode of Eth-Trunk 1.
<HUAWEI> display eth-trunk 1 load-balance
Eth-Trunk1's load-balance information:
Load-balance Configuration: SIP-XOR-DIP
Load-balance options used per-protocol:
L2 : Source XOR Destination MAC address, Vlan ID, Ethertype, Ingress-port
IPv4: Source XOR Destination IP address, Source XOR Destination TCP/UDP port
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
IPv6: Source XOR Destination IP address, Source XOR Destination TCP/UDP port
MPLS: Source XOR Destination IP address, Source XOR Destination TCP/UDP port
Related Topics
5.2.45 load-balance
Format
display e-trunk { brief | e-trunk-id }
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Parameters
Parameter Description Value
brief Displays brief E-Trunk information. -
e-trunk-id Specifies the ID of an E-Trunk. The value is an integer that ranges from 1
to 16.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After an E-Trunk is configured, you can run the display e-trunk command to view
information about the E-Trunk.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display information about E-Trunk 1.
<HUAWEI> display e-trunk 1
The E-Trunk information
E-TRUNK-ID : 1 Revert-Delay-Time (s) : 120
Priority : 10 System-ID : 4c1f-cc64-a1a0
Peer-IP : 10.1.1.2 Source-IP : 10.1.1.1
State : Master Causation : TIMEOUT
Send-Period (100ms) : 10 Fail-Time (100ms) : 27
Receive : 1 Send : 1006
RecDrop : 0 SndDrop : 0
Peer-Priority : - Peer-System-ID : -
Peer-Fail-Time (100ms) : - BFD-Session : 1
Description : -
Sequence : Enable
--------------------------------------------------------------------------------
The Member
information
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
ID Member ID.
To add Eth-Trunks with different IDs on two devices to
the same E-Trunk, run the e-trunk e-trunk-id remote-eth-
trunk eth-trunk-id command on the two devices to
specify remote Eth-Trunk IDs to ensure that the E-Trunk
works properly.
Related Topics
5.2.24 e-trunk (Eth-Trunk interface view)
5.2.25 e-trunk mode
5.2.28 e-trunk track bfd-session
5.2.27 e-trunk (system view)
5.2.52 priority (E-Trunk view)
5.2.51 peer-address source-address
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
display e-trunk packet-statistics [ e-trunk-id e-trunk-id ]
Parameters
Parameter Description Value
e-trunk-id e-trunk-id Display packet statistics about an E-
The value is an integer
Trunk. e-trunk-id specified the ID of the
that ranges from 1 to 16.
E-Trunk.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After an E-Trunk is successfully configured, you can run the display e-trunk packet-
statistics command to check packet statistics about the E-Trunk. The command output helps
you to determine whether data is normal and to locate faults.
Example
# Display E-Trunk packet statistics on the device.
<HUAWEI> display e-trunk packet-statistics
E-Trunk-ID errors : 0
Length errors : 0
E-TRUNK-ID : 10
Sent packets : 355
Failed to send packets : 355
Received packets : 0
Received packets with priority errors : 0
Received packets with fail-time errors : 0
Received packets with state errors : 0
Received packets with state reason errors : 0
Received packets with peer-ip errors : 0
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Received packets with priority Number of received E-Trunk packets with incorrect
errors priorities.
Received packets with fail- Number of received E-Trunk packets with timeout errors.
time errors
Received packets with state Number of received E-Trunk packets with incorrect states.
errors
Received packets with state Number of received E-Trunk packets with incorrect state
reason errors reasons.
Received packets with peer-ip Number of received E-Trunk packets with incorrect
errors remote IP addresses.
Received packets with TLV Number of received E-Trunk packets with TLV check
check errors errors.
Dropped packets with BFD Number of E-Trunk packets dropped during the active/
protection standby switchover because BFD is used.
Received packets with Number of packets generated when the switch detects that
member errors Eth-Trunk member interfaces at both ends are different.
Received packets with Number of received E-Trunk packets failing the sequence
sequence check errors number check.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
display e-trunk e-trunk-id state-change member-interface interface-type interface-number
Parameters
Parameter Description Value
e-trunk-id Displays the latest 10 status changes of a The value is an
specified E-Trunk. integer that ranges
from 1 to 16.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After an E-Trunk is configured, you can run the display e-trunk state-change command to
check the status changes of an E-Trunk member interface.
Prerequisites
An Eth-Trunk has been added to the E-Trunk.
Example
# Display the status changes of Eth-Trunk 10 in E-Trunk 1.
<HUAWEI> display e-trunk 1 state-change member-interface Eth-Trunk 10
Time SourceState DestState Reason
---------------------------------------------------------------------------
2013-07-25 10:41:30-08:00 Backup Master PEER_MEMBER_DOWN
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Function
The display forward-path command displays collected traffic information.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
display forward-path
Parameters
None
Views
All views
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To locate faults and understand the traffic forwarding path, run the collect forward-path
command to configure the device to collect traffic information. To check collected packet
information, run the display forward-path command.
Prerequisites
The device has been configured to collect traffic information.
Example
# Display collected traffic information.
<HUAWEI> display forward-path
The brief information of forward-path(s) for
L3:
Id : Report
id
SIP : Source IP
address
DIP : Destination IP
address
Sport : Source
port
Dport : Destination
port
Dir :
Direction
Interval : Interval time (in minutes), 0 means that the system keeps
collecting
-------------------------------------------------------------------------------
Id : Report
id
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
VLAN : VLAN
id
Dir :
Direction
Interval : Interval time (in minutes), 0 means that the system keeps
collecting
-------------------------------------------------------------------------------
Id Report ID, that is, number of collected flows. You can run the
display forward-path report command to view detailed
information about inbound and outbound interfaces according to
the specified report ID.
The IDs are displayed according to the sequence in which the
collect forward-path command was executed. If an ID is deleted,
the existing IDs remain unchanged. The ID configured later is
displayed in the position of the deleted ID. For example, IDs 1
and 2 exist on the device. If ID 1 is deleted, ID 2 remains
unchanged. If the collect forward-path command is used, the
new ID is displayed in the position of deleted ID 1.
The device can collect inbound and outbound interfaces and
traffic information of a maximum of 8 flows.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.2.3 collect forward-path
5.2.11 display forward-path report
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
display forward-path report report-id
Parameters
Parameter Description Value
report-id Specifies the ID The value is an integer that ranges from 1 to 8.
of collected
traffic. The IDs are displayed according to the sequence in which
the collect forward-path command was executed. If an ID
is deleted, the existing IDs remain unchanged. The ID
configured later is displayed in the position of the deleted
ID. For example, IDs 1 and 2 exist on the device. If ID 1 is
deleted, ID 2 remains unchanged. If the collect forward-
path command is used, the new ID is displayed in the
position of deleted ID 1.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
To locate faults and understand the traffic forwarding path, run the collect forward-path
command to configure the device to collect traffic information. Then run the display
forward-path report command to check the collection result.
Prerequisites
The device has been configured to collect traffic information.
Example
# Display traffic statistics of the report ID 1.
<HUAWEI> display forward-path report 1
Source IP address :
10.1.1.1
Destination IP address :
10.2.2.2
Source port :
-
Destination port :
-
Protocol type :
-
Direction :
both
Interval time : 10
minute(s)
Status :
doing
End time :
-
--------------------------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.2.3 collect forward-path
5.2.10 display forward-path
Format
display interface eth-trunk [ trunk-id | main ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support trunk-id.subnumber parameter.
Parameters
Parameter Description Value
trunk-id Specifies the ID of an Eth- The value is an integer. The value varies
Trunk. according to device model:
l S1720GFR, S2720, S2750EI, S5700LI,
S5700S-LI, and S5710-X-LI: 0-63
l S5720SI, and S5720S-SI: 0-119
l S5720EI, S5720HI, S6720EI, and S6720S-EI:
0-127
On the S6720EI, and S6720S-EI,, you can run the
assign trunk command to set the value, and run
the display trunk configuration command to
check the configuration.
subnumber Specifies the number of an The value is an integer that ranges from 1 to 4096.
Eth-Trunk sub-interface.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display interface eth-trunk command to view the status and weight of each
Eth-Trunk member interface.
To monitor the status of an interface or locate an interface fault, you can use the display
interface eth-trunk command to collect the status of and traffic statistics on the interface.
You can collect traffic statistics and locate faults on the interface according to the command
output.
Example
# Display status information about Eth-Trunk 10.
<HUAWEI> display interface Eth-Trunk 10
Eth-Trunk10 current state : UP
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Total Error: 0
CRC: 0, Giants: 0
Jabbers: 0, Fragments: 0
Runts: 0, DropEvents: 0
Alignments: 0, Symbols: 0
Ignoreds: 0, Frames: 0
Total Error: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Buffers Purged: 0
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Hash arithmetic Hash algorithm used for load balancing among Eth-Trunk
member interfaces. The hash algorithm depends on the load
balancing mode configured by using the load-balance
command.
IP Sending Frames' Format of frames sent through the IP protocol, which can be
Format PKTFMT_ETHNT_2, Ethernet_802.3, or Ethernet_SNAP.
Last 300 seconds input Received packet rate (bits per second and packets per second)
rate within the last 300 seconds.
Last 300 seconds output Sent packet rate (bits per second and packets per second) within
rate the last 300 seconds.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Giants Number of jumbo frames with the correct FCS received by the
Eth-Trunk.
DropEvents Number of received packets that are discarded due to GBP full
or back pressure.
Buffers Purged Number of packets aged in the cache because packets sent by
the Eth-Trunk have been stored in the queue buffer for a long
time.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.2.23 eth-trunk
4.1.17 reset counters interface
Format
display lacp brief
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Devices at both ends of an Eth-Trunk compare LACP system priorities and system IDs to
determine the Actor during LACP negotiation.
l By default, the LACP system priority is 32768, and the device with the smaller LACP
system ID is used as the Actor.
l If LACP system priorities are changed using the lacp priority command, the device with
the smaller LACP system priority is used as the Actor.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The display eth-trunk command can be used to check the LACP system priority and system
ID only after an Eth-Trunk in LACP mode has been configured. This is inconvenient for
network planning. To facilitate network planning, you can run the display lacp brief
command to check the LACP system priority and system ID when no Eth-Trunk in LACP
mode is configured.
Precautions
When two PEs join an E-Trunk, run the lacp e-trunk system-id command on the PEs to
configure the same E-Trunk LACP system ID so that the CE considers the PEs to be one
device. The E-Trunk LACP system ID configurations do not affect LACP system IDs of Eth-
Trunks in LACP mode. The LACP system ID of an Eth-Trunk in LACP mode is the MAC
address of the Ethernet interface on the main control board.
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support the E-
Trunk.
Example
# Display brief LACP information.
<HUAWEI> display lacp brief
System Priority:32768
System ID :00e0-5958-ef00
System Priority LACP system priority. To configure the LACP system priority,
run the lacp priority command.
System ID System ID, which is the bridge MAC address of the device.
Format
display lacp statistics eth-trunk [ trunk-id [ interface interface-type interface-number ] ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command can be used only when the Eth-Trunk works in LACP mode. To change the
working mode of an Eth-Trunk to the LACP mode, run the mode lacp command in the Eth-
Trunk interface view.
To view the statistics on a specific Eth-Trunk, ensure that the Eth-Trunk has been created. To
view the statistics on a specified Eth-Trunk member interface, ensure that the interface is
added to the Eth-Trunk.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display the statistics on LACPDUs sent and received by member interface
GigabitEthernet0/0/1 of Eth-Trunk 4.
<HUAWEI> display lacp statistics eth-trunk 4
Eth-Trunk4's PDU statistic is:
------------------------------------------------------------------------------
Port LacpRevPdu LacpSentPdu MarkerRevPdu MarkerSentPdu
GigabitEthernet0/0/2 20683 830 0 0
GigabitEthernet0/0/3 16356 677 0 0
GigabitEthernet0/0/1 7213 7213 0 0
Table 5-27 Description of the display lacp statistics eth-trunk command output
Item Description
Related Topics
5.2.54 reset lacp statistics eth-trunk
Function
The display load-balance-profile command displays detailed information about a specified
load balancing profile.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
display load-balance-profile [ profile-name ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays detailed information about a specified load balancing profile,
including the load balancing mode of IPv4, IPv6, Layer 2, and MPLS packets.
Example
# Display detailed information about a specified load balancing profile.
<HUAWEI> display load-balance-profile abc
Load-balance-profile : abc
Packet HashField
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
IPV4 sip dip
IPV6 sip dip
L2 smac l2-protocol vlan sport
MPLS top-label 2nd-label
Trunk interface
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Eth-Trunk100
Related Topics
5.2.46 load-balance-profile
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The display snmp-agent trap feature-name etrunk all command displays the status of all
traps on the E-Trunk module.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
display snmp-agent trap feature-name etrunk all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the trap function of a specified feature is enabled, you can run the display snmp-agent
trap feature-name etrunk all command to check the status of all traps of E-Trunk. You can
use the snmp-agent trap enable feature-name etrunk command to enable the trap function
of etrunk.
Prerequisites
SNMP has been enabled. See snmp-agent.
Example
# Display all the traps of the E-Trunk module.
<HUAWEI>display snmp-agent trap feature-name etrunk all
------------------------------------------------------------------------------
Feature name:
etrunk
Trap number :
2
------------------------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
off
hwETrunkMemberStatusChange off off
Table 5-29 Description of the display snmp-agent trap feature-name etrunk all command
output
Item Specification
Feature name Name of the module that the trap belongs to.
Related Topics
5.2.58 snmp-agent trap enable feature-name etrunk
Format
display snmp-agent trap feature-name lacp all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
The Simple Network Management Protocol (SNMP) is a standard network management
protocol widely used on TCP/IP networks. It uses a central computer (a network management
station) that runs network management software to manage network elements. The SNMP
agent reports trap messages to the network management station so that the network
management station can obtain the network status in a timely manner, and the network
administrator can take measures accordingly.
The display snmp-agent trap feature-name lacp all command displays whether all trap
functions of the LACP module are enabled.
Example
# Display all trap messages of the LACP module.
<HUAWEI> display snmp-agent trap feature-name lacp all
------------------------------------------------------------------------------
Feature name: LACP
Trap number : 7
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwLacpNegotiateFailed off on
hwLacpTotalLinkLoss off on
hwLacpPartialLinkLoss off on
hwLacpNegotiateResume off on
hwLacpTotalLinkLossResume off on
hwLacpPartialLinkLossResume off on
hwLacpPartnerExpiredLoss off on
Table 5-30 Description of the display snmp-agent trap feature-name lacp all command
output
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.2.59 snmp-agent trap enable feature-name lacp
Function
The display snmp-agent trap feature-name trunk all command displays all trap messages
of the Trunk module.
Format
display snmp-agent trap feature-name trunk all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The Simple Network Management Protocol (SNMP) is a standard network management
protocol widely used on TCP/IP networks. It uses a central computer (a network management
station) that runs network management software to manage network elements. The
management agent on the network element automatically reports traps to the network
management station. After that, the network administrator immediately takes measures to
resolve the problem.
The display snmp-agent trap feature-name trunk all command displays whether all trap
functions of the Trunk module are enabled.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display all trap messages of the Trunk module.
<HUAWEI>display snmp-agent trap feature-name trunk all
------------------------------------------------------------------------------
Feature name: TRUNK
Trap number : 4
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwExtLinkDown off off
hwExtLinkUp off off
hwExtAllMemberDownNotify off off
hwExtAllMemberDownResume off off
Table 5-31 Description of the display snmp-agent trap feature-name trunk all command
output
Item Description
Related Topics
5.2.60 snmp-agent trap enable feature-name trunk
Function
The display trunk index-map command displays the mapping between Eth-Trunk IDs and
internal indexes.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display trunk index-map
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
An ID is manually allocated to an Eth-Trunk during Eth-Trunk creation. For example, the ID
of Eth-Trunk 1 is 1. In addition, the device also allocates an internal number, also called the
index, to each Eth-Trunk. When allocating indexes, the device traverses indexes in ascending
order. The unallocated index is used as the index of an Eth-Trunk; therefore, the mapping
between Eth-Trunk IDs and indexes is unordered. You can use display trunk index-map to
check the mapping between Eth-Trunk IDs and indexes.
Example
# Display the mapping between Eth-Trunk IDs and internal indexes.
<HUAWEI> display trunk index-map
Index Interface Name
-----------------------------
1 Eth-Trunk10
2 Eth-Trunk20
3 Eth-Trunk5
Item Description
Function
The display trunk resource command displays trunk resources that have been used on a
device.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display trunk resource
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To view the number of trunk interfaces configured on a device and the number of member
interfaces added to the trunk interfaces, run the display trunk resource command. The
command output helps you learn about used trunk resources.
Example
# Display trunk resources used on a device.
<HUAWEI> display trunk resource
Number of configured trunk interfaces is : 4
Interface Member Count
-----------------------------------------------------------
Eth-Trunk1 2
Eth-Trunk10 0
Eth-Trunk30 0
Eth-Trunk55 0
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display trunkfwdtbl eth-trunk trunk-id
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
An Eth-Trunk supports a maximum of eight physical member interfaces, which correspond to
eight entries in the forwarding table. The eight entries correspond to HASH-KEY values 0 to
7. The system searches for outbound interfaces among active links based on HASH-KEY
values.
Example
# Display the forwarding table of Eth-Trunk 1. Eth-Trunk 1 has three active links.
<HUAWEI> display trunkfwdtbl eth-trunk 1
Eth-Trunk1's forwarding table is:
GigabitEthernet0/0/1
GigabitEthernet0/0/2
GigabitEthernet0/0/3
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
GigabitEthernet0/0/1
GigabitEthernet0/0/2
GigabitEthernet0/0/3
GigabitEthernet0/0/1
GigabitEthernet0/0/2
Related Topics
5.2.23 eth-trunk
Function
The display trunkmembership eth-trunk command displays information about Eth-Trunk
member interfaces.
Format
display trunkmembership eth-trunk trunk-id
Parameters
Parameter Description Value
Views
All views
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After an Eth-Trunk is successfully configured, you can run the display trunkmembership
eth-trunk command to view the configuration of the Eth-Trunk and its member interfaces.
To monitor the status of an interface or locate an interface fault, you can use the display
trunkmembership eth-trunk command to view detailed information about an Eth-Trunk and
its member interfaces. The command output helps you can troubleshoot faults and check the
member interface configuration.
Prerequisites
An Eth-Trunk has been correctly configured. If the Eth-Trunk is not created, the system
displays an error when you run the display trunkmembership eth-trunk command.
Precautions
Before running the display trunkmembership eth-trunk command to view the configuration
of the Eth-Trunk in LACP mode, ensure that the Eth-Trunk has been configured to work in
LACP mode using the mode lacp command.
Example
# Display information about member interfaces of Eth-Trunk 2.
<HUAWEI> display trunkmembership eth-trunk 2
Trunk ID: 2
Used status: VALID
TYPE: ethernet
Working Mode : Normal
Number Of Ports in Trunk = 2
Number Of Up Ports in Trunk = 2
Operate status: up
Interface GigabitEthernet0/0/1, valid, operate up, weight=1
Interface GigabitEthernet0/0/2, valid, operate up, weight=1
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.2.23 eth-trunk
5.2.29 interface eth-trunk
5.2.23 eth-trunk
Function
The eth-trunk command adds an interface to an Eth-Trunk.
The undo eth-trunk command removes an interface from an Eth-Trunk.
By default, an interface does not belong to any Eth-Trunk.
Format
eth-trunk trunk-id [ mode { active | passive } ]
undo eth-trunk
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
To improve the connection reliability and increase the bandwidth, you can use the eth-trunk
command to bind multiple interfaces into an Eth-Trunk.
You can add an interface to an Eth-Trunk only after you run the interface Eth-Trunk
command to create the Eth-Trunk.
When you add an Ethernet interface to an Eth-Trunk, the interface must use default settings of
some attributes. Otherwise, the interface cannot be added to the Eth-Trunk. The attributes
include:
l Link type
l Maximum percentage of broadcast traffic
l Maximum percentage of multicast traffic
l Maximum percentage of unknown unicast traffic
l VLAN that the interface belongs to
l VLAN mapping
l VLAN stacking
l QinQ protocol number
l Interface priority
l Whether the interface allows BPDUs to pass through
l MAC address learning
l Adding the interface to a multicast group statically
l Discarding broadcast packets
l Discarding unknown multicast packets
l Discarding unknown unicast packets
l Controllable multicast profile bound to the interface
The attributes on all member interfaces of an Eth-Trunk must be consistent and cannot be
changed separately. If the preceding attributes of an Eth-Trunk are changed, the attributes of
all the member interfaces are changed accordingly.
It is recommended that you run the shutdown (interface view) command to disable an
interface before adding the interface to an Eth-Trunk. After adding interfaces at both ends of a
link to an Eth-Trunk, run the undo shutdown (interface view) command to enable the
interfaces. Otherwise, traffic interruption or broadcast storms may occur.
It is recommended that you run the shutdown (interface view) command to disable a
member interface before running the undo eth-trunk command to remove the member
interface from an Eth-Trunk.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The number of member interfaces of the Eth-Trunk on devices at both ends must be the same.
The interfaces at both ends must be connected with straight-through cables.
NOTE
Example
# Add GigabitEthernet0/0/1 to Eth-Trunk 2.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] eth-trunk 2
Related Topics
5.2.4 display eth-trunk
5.2.22 display trunkmembership eth-trunk
5.2.29 interface eth-trunk
4.1.21 shutdown (interface view)
Function
The e-trunk command adds an Eth-Trunk in LACP mode to a specified E-Trunk.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
e-trunk e-trunk-id [ remote-eth-trunk eth-trunk-id ]
undo e-trunk
Parameters
Parameter Description Value
e-trunk-id Specifies the ID of an E-Trunk. The value is an integer
that ranges from 1 to 16.
remote-eth- Specifies the Eth-Trunk ID of the remote PE. The value is an integer
trunk eth-trunk- that ranges from 0 to
id If the ID of the Eth-Trunk created on a PE is 4294967295.
different from the ID of the Eth-Trunk created
on the other PE, you must configure remote-
eth-trunk when adding different Eth-Trunks in
LACP mode to an E-Trunk so that the E-Trunk
can work properly.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Only Eth-Trunks in LACP mode can be added to an E-Trunk, and an Eth-Trunk can be added
to only one E-Trunk. If an Eth-Trunk is already added to an E-Trunk, you must delete it from
the E-Trunk before adding it to another E-Trunk.
NOTE
Example
# Add Eth-Trunk 1 to E-Trunk 1.
<HUAWEI> system-view
[HUAWEI] interface Eth-Trunk 1
[HUAWEI-Eth-Trunk1] e-trunk 1
Related Topics
5.2.7 display e-trunk
Function
The e-trunk mode command configures a working mode of an Eth-Trunk in an E-Trunk.
The undo e-trunk mode command restores the default working mode of an Eth-Trunk in an
E-Trunk.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
e-trunk mode { auto | force-master | force-backup }
Parameters
Parameter Description Value
auto Indicates the automatic mode. -
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
The e-trunk mode command is valid only for the Eth-Trunks added to an E-Trunk. When the
Eth-Trunk is deleted from the E-Trunk, the configuration is cancelled.
When the E-Trunk works properly, changing the interval for sending packets or timeout of
hello packets will cause the E-Trunk to alternate between the master state and the backup
state. You are advised to set the working mode of a member Eth-Trunk to forcible master/
backup before changing the interval for sending packets or the timeout of hello packets. After
the new configuration takes effect, restore the working mode to automatic.
Example
# Set the working mode of Eth-Trunk 1 in an E-Trunk to forcible master.
<HUAWEI> system-view
[HUAWEI] interface Eth-Trunk 1
[HUAWEI-Eth-Trunk1] e-trunk mode force-master
Related Topics
5.2.24 e-trunk (Eth-Trunk interface view)
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
e-trunk port port-number
undo e-trunk port
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
port-number Specifies the UDP port number used to send and receive E- The value is an
Trunk packets. integer that
ranges from
If the UDP port number in the range of 1025 to 65535 is 1025 to 65535.
used by another protocol, the port number cannot be used to
send or receive E-Trunk packets.
NOTE
UDP port numbers 49152 to 65535 are allocated randomly by the
socket. Do not configure the UDP port number in this range;
otherwise, the E-Trunk cannot work properly.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
E-Trunk is a Huawei proprietary protocol. UDP port 1025 used to send and receive E-Trunk
packets may conflict with the UDP port used by another protocol. To ensure that E-Trunk
packets are forwarded correctly, run the e-trunk port command to change the UDP port
number used to send and receive E-Trunk packets.
Precautions
The port numbers at both ends of an E-Trunk must be consistent. When the E-Trunk works
properly, you must change the UDP port number within the timeout of E-Trunk negotiation.
If you change the UDP port number during E-Trunk running, devices at both ends of an E-
Trunk may be unable to communicate. If E-Trunk negotiation times out, both devices in the
E-Trunk may become master devices.
Example
# Configure the UDP port number used to send and receive E-Trunk packets.
<HUAWEI> system-view
[HUAWEI] e-trunk port 1026
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
e-trunk e-trunk-id
undo e-trunk e-trunk-id
Parameters
Parameter Description Value
e-trunk-id Specifies the ID of an E-Trunk. The value is an integer that ranges from 1 to
16.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If the specified E-Trunk already exists, this command directly displays the view of the
specified E-Trunk.
At most 16 E-Trunks can be created on a device.
After an E-Trunk is created, it does not send protocol packets until the remote IP address is
configured.
Example
# Create an E-Trunk with the ID of 1.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1]
Related Topics
5.2.7 display e-trunk
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
e-trunk track bfd-session session-name bfd-session-name
undo e-trunk track bfd-session
Parameters
Parameter Description Value
session-name bfd- Specifies the name of The value is a string of 1 to 15 case-
session-name a BFD session. insensitive characters without spaces. When
the string is enclosed with double quotation
marks (""), spaces are allowed in the string.
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
PE1 and PE2 are connected through an E-Trunk. PE1 is in master state and PE2 is in slave
state. When PE1 fails and PE2 does not receive any E-Trunk protocol packets from PE1 after
the timer expires, PE2 switches from the slave state to the master state.
The status of PE2 changes after the timer expires. During the timeout, user traffic is
interrupted. To enable PE2 to rapidly detect the fault and switch its status, run this command
to bind a BFD session to an E-Trunk.
After the BFD session is bound to the E-Trunk, the BFD session can rapidly detect the link
between PE1 and PE2. If the link fails, the BFD session becomes Down. PE2 then can detect
the BFD session status and switch its status to master so that traffic is correctly forwarded.
NOTE
In this scenario, the Eth-Trunk on PE1 and PE2 supports only one member interface.
Prerequisites
Before using this command, pay attention to the following points:
l An E-Trunk and a BFD session must have been configured. BFD for IP must be used;
otherwise, the E-Trunk cannot rapidly detect the fault through the BFD session.
l The IP addresses of both ends of the E-Trunk must be reachable; otherwise, the BFD
session cannot go Up. That is, the BFD session cannot detect the link between PE1 and
PE2.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
After a BFD session is bound to an E-Trunk and AC interfaces on both devices of the E-Trunk
are associated with the BFD session, if the AC interface of the master device fails, the BFD
session goes Down and traffic is switched to the standby link. If the AC interface recovers
within 60 seconds, traffic is immediately switched back to the active link.
Example
# Bind a BFD session named hello to E-Trunk 1.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] e-trunk track bfd-session session-name hello
Related Topics
5.2.7 display e-trunk
Function
The interface eth-trunk command displays the view of an existing Eth-Trunk or creates an
Eth-Trunk and displays its view.
Format
interface eth-trunk trunk-id[.subnumber ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If the specified Eth-Trunk already exists, the interface eth-trunk command directly displays
the view of the specified Eth-Trunk.
You can delete an Eth-Trunk only when the Eth-Trunk does not contain any member interface.
NOTE
Example
# Create Eth-Trunk 2.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 2
[HUAWEI-Eth-Trunk2]
Related Topics
4.1.8 display interface
5.2.22 display trunkmembership eth-trunk
5.2.23 eth-trunk
4.1.14 interface
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The ipv4 field command configures a load balancing mode of IPv4 packets in a load
balancing profile.
The undo ipv4 field command deletes a load balancing mode of IPv4 packets or restores the
default load balancing mode of IPv4 packets.
By default, load balancing of IPv4 packets is based on the source IP address (sip) and
destination IP address (dip).
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
ipv4 field [ dip | l4-dport | l4-sport | protocol | sip | sport | vlan ] *
undo ipv4 field [ dip | l4-dport | l4-sport | protocol | sip | sport | vlan ] *
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Load balancing profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The undo ipv4 field command with no parameter specified restores the default load balancing
mode of IPv4 packets. The undo ipv4 field command with a parameter specified deletes a
specified load balancing mode of IPv4 packets.
Precautions
If you run the ipv4 field command multiple times, only the latest configuration takes effect.
Example
# In the load balancing profile a, set the load balancing mode of IPv4 packets to sip and
protocol, that is, load balancing based on source IP addresses and protocol types of IPv4
packets.
<HUAWEI> system-view
[HUAWEI] load-balance-profile a
[HUAWEI-load-balance-profile-a] ipv4 field sip protocol
Related Topics
5.2.15 display load-balance-profile
5.2.46 load-balance-profile
Function
The ipv6 field command configures a load balancing mode of IPv6 packets in a load
balancing profile.
The undo ipv6 field command deletes the load balancing mode of IPv6 packets or restores
the default load balancing mode of IPv6 packets.
By default, load balancing of IPv6 packets is based on the source IP address (sip) and
destination IP address (dip).
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
ipv6 field [ dip | l4-dport | l4-sport | protocol | sip | sport | vlan ] *
undo ipv6 field [ dip | l4-dport | l4-sport | protocol | sip | sport | vlan ] *
Parameters
Parameter Description Value
Views
Load balancing profile view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
The undo ipv6 field command with no parameter specified restores the default load balancing
mode of IPv6 packets. The undo ipv6 field command with a parameter specified deletes a
specified load balancing mode of IPv6 packets.
Precautions
If you run the ipv6 field command multiple times, only the latest configuration takes effect.
Example
# In the load balancing profile a, set the load balancing mode of IPv6 packets to sip and
protocol, that is, load balancing based on source IP addresses and protocol types of IPv6
packets.
<HUAWEI> system-view
[HUAWEI] load-balance-profile a
[HUAWEI-load-balance-profile-a] ipv6 field sip protocol
Related Topics
5.2.15 display load-balance-profile
5.2.46 load-balance-profile
5.2.32 l2 field
Function
The l2 field command configures a load balancing mode of Layer 2 packets in a load
balancing profile.
The undo l2 field command deletes the load balancing mode of Layer 2 packets or restores
the default load balancing mode of Layer 2 packets.
By default, load balancing of Layer 2 packets is based on the source MAC address (smac) and
destination MAC address (dmac).
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
l2 field [ dmac | l2-protocol | smac | sport | vlan ] *
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
Load balancing profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The undo l2 field command with no parameter specified restores the default load balancing
mode of Layer 2 packets. The undo l2 field command with a parameter specified deletes a
specified load balancing mode of Layer 2 packets.
Precautions
If you run the l2 field command multiple times, only the latest configuration takes effect.
Example
# In the load balancing profile a, set the load balancing mode of Layer 2 packets to smac, that
is, load balancing based on the source MAC addresses of Layer 2 packets.
<HUAWEI> system-view
[HUAWEI] load-balance-profile a
[HUAWEI-load-balance-profile-a] l2 field smac
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.2.15 display load-balance-profile
5.2.46 load-balance-profile
Format
lacp collector delay delay-time
undo lacp collector delay
Parameters
Parameter Description Value
delay-time Specifies the value of the The value is an integer that ranges
CollectorMaxDelay field in an from 0 to 65535, in 10 microseconds.
LACPDU.
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The default value of the CollectorMaxDelay field in LACPDUs sent by the device of
different versions to the connected non-Huawei device is different. This may cause high CPU
usage. You can run the lacp collector delay command to set the value of the
CollectorMaxDelay field in LACPDUs.
Prerequisites
The Eth-Trunk has been configured to work in LACP mode using the mode lacp command.
Precautions
For a Huawei device, the valid value range of the CollectorMaxDelay field is 0 to 65535.
Even though the member interfaces of the same Eth-Trunk receive LACPDUs with different
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
CollectorMaxDelay values, the device can process the LACPDUs without deteriorating its
CPU performance.
Example
# Set the value of the CollectorMaxDelay field to 65535.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] mode lacp
[HUAWEI-Eth-Trunk1] lacp collector delay 65535
Function
The lacp e-trunk priority command sets the LACP priority of an E-Trunk.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
lacp e-trunk priority priority
Parameters
Parameter Description Value
priority Specifies the LACP priority of The value is an integer that ranges from 0 to
an E-Trunk. 65535. A smaller value indicates a higher
LACP priority.
Views
System view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
The lacp e-trunk priority command sets the LACP priority of an E-Trunk. If the LACP
priority is set, a member Eth-Trunk sends LACPDUs by using this LACP priority. If the
LACP priority is not set, the default LACP priority 32768 is used.
The master and backup devices in an E-Trunk must use the same LACP priority.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
When multiple E-Trunks are configured on the device, different LAGs can use different
LACP priorities. You need to set the LACP priorities in the Eth-Trunk interface view.
The LACP priority configured in the system view is valid for all Eth-Trunks added to the E-
Trunk. The LACP priority configured in the Eth-Trunk view takes effect only on the
corresponding Eth-Trunk. If the LACP priorities are configured in both the Eth-Trunk
interface view and system view, the LACP priority configured in the interface view takes
effect.
NOTE
Ensure that the Eth-Trunk has been added to the E-Trunk before you run the lacp e-trunk priority
command in the Eth-Trunk interface view.
Example
# Set the LACP priority of the E-Trunk to 1.
<HUAWEI> system-view
[HUAWEI] lacp e-trunk priority 1
Related Topics
5.2.4 display eth-trunk
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
lacp e-trunk system-id mac-address
undo lacp e-trunk system-id
Parameters
Parameter Description Value
system-id mac- Specifies the LACP The value is in the format of H-H-H. An H contains
address system ID of an E- 1 to 4 hexadecimal numbers, such as 00e0 and fc01.
Trunk. If you enter less than four digits, 0s are prefixed to
the input digits. For example, if you enter e0, the
system changes e0 to 00e0. The LACP system ID
cannot be all 0s or all Fs.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
The lacp e-trunk system-id command sets the LACP system ID of an E-Trunk. If the system
ID is set, a member Eth-Trunk sends LACPDUs by using this system ID. If the LACP system
ID is not set, the MAC address of the Ethernet interface is used as the system ID.
The master and backup devices in an E-Trunk must use the same LACP system ID.
When multiple E-Trunks are configured on the device, the LAGs can use different LACP
system IDs. In this case, you need to set the system IDs in the Eth-Trunk interface view.
The LACP system ID configured in the system view is valid for all Eth-Trunks added to the
E-Trunk. The LACP system ID configured in the Eth-Trunk interface view takes effect only
on the corresponding Eth-Trunk. If the system IDs are configured in both the Eth-Trunk
interface view and system view, the system ID configured in the interface view takes effect.
NOTE
Ensure that the Eth-Trunk has been added to the E-Trunk before you run the lacp e-trunk system-id
command in the Eth-Trunk interface view.
Example
# Set the LACP system ID of the E-Trunk to 00E0-FC00-0000.
<HUAWEI> system-view
[HUAWEI] lacp e-trunk system-id 00E0-FC00-0000
Related Topics
5.2.4 display eth-trunk
Function
The lacp preempt delay command sets the LACP preemption delay.
The undo lacp preempt delay command restores the default LACP preemption delay.
Format
lacp preempt delay delay-time
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
To use this command, ensure that the following conditions are met:
l The Eth-Trunk has been configured to work in LACP mode using the mode lacp
command in the Eth-Trunk interface view.
l Priority preemption has been enabled on the Eth-Trunk using the lacp preempt enable
command in the Eth-Trunk interface view.
Link A replaces link B and becomes active after the preemption delay n the following
situation:
1. LACP priority preemption is enabled and the lacp preempt delay command is used.
2. The faulty link (link A) with higher priority than that of the current active link (link B)
recovers.
3. The number of current active links reaches the upper threshold.
If both devices of an Eth-Trunk use different preemption delays, a longer preemption delay is
used. If priority preemption is enabled but the preemption delay is not set, the interface with a
higher priority preempts the interface with a lower priority according to the default
preemption delay.
Example
# Set the LACP preemption delay of Eth-Trunk 1 to 20 seconds.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] mode lacp
[HUAWEI-Eth-Trunk1] lacp preempt delay 20
Related Topics
5.2.37 lacp preempt enable
5.2.49 mode
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The lacp preempt enable command enables priority preemption for an Eth-Trunk in LACP
mode.
The undo lacp preempt enable command disables priority preemption for an Eth-Trunk in
LACP mode.
Format
lacp preempt enable
Parameters
None
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
In LACP mode, when one of the active links fails, the system selects the link with the highest
priority from backup links to replace the faulty one. When the faulty link recovers, the priority
of this link is higher than the priority of the link that replaces itself, and priority preemption is
enabled, the link becomes active again.
If priority preemption is disabled, the system does not re-select any active interface. The
recovered link functions as the backup one.
When priority preemption is enabled, the system selects an active interface based on the
LACP interface priority on the Actor.
Prerequisites
The LACP mode must have been configured using the mode lacp command in the Eth-Trunk
interface view.
Precautions
To ensure that an Eth-Trunk works properly, enable or disable LACP preemption on both ends
of the Eth-Trunk.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Enable priority preemption on Eth-Trunk 1.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] mode lacp
[HUAWEI-Eth-Trunk1] lacp preempt enable
Related Topics
5.2.36 lacp preempt delay
Function
The lacp priority command sets the LACP system or interface priority.
The undo lacp priority command restores the default LACP system or interface priority.
Format
lacp priority priority
Parameters
Parameter Description Value
Views
System view, Ethernet interface view, GE interface view, XGE interface view, MultiGE
interface view, 40GE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The LACP system priority is used to differentiate the local device and the remote device. The
device of a higher LACP system priority is selected as the Actor of the link aggregate group
(LAG), and active interfaces are selected according to interfaces of the Actor.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The LACP interface priority is used to differentiate interfaces on a device. The interface of a
higher priority is selected as the active interface.
If devices at both ends of an Eth-Trunk are not configured with LACP system priorities, the
devices use the default LACP system priority 32768 and the device with a smaller MAC
address is selected as the Actor.
If priorities of different interfaces on a switch are not set, the default priority of interfaces are
all 32768. Active interfaces are selected based on interface numbers and interfaces with
smaller interface numbers are preferred.
Prerequisites
You can run the mode lacp command in the Eth-Trunk interface view to change the working
mode of an Eth-Trunk to LACP.
Precautions
If the max active-linknumber command is executed in LACP mode to set the upper
threshold for the number of active interfaces, you need to determine the active interfaces
when the number of interfaces manually added to an LAG exceeds the upper threshold.
Setting the LACP interface priority ensures that interfaces with higher priorities become
active ones in LACP mode.
If the max active-linknumber command is not used, the upper threshold for the number of
active interfaces is 8. When the number of interfaces manually added to an LAG is smaller
than 8, you do not need to select active interfaces because all interfaces are active.
Example
# Set the LACP system priority to 1.
<HUAWEI> system-view
[HUAWEI] lacp priority 1
Related Topics
5.2.48 max active-linknumber
Function
The lacp priority-command-mode command sets a Link Aggregation Control Protocol
(LACP) system priority configuration mode.
The undo lacp priority-command-mode command restores the default LACP system
priority configuration mode.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
lacp priority-command-mode { default | system-priority }
undo lacp priority-command-mode
Parameters
Parameter Description Value
default Sets the LACP system priority configuration mode to default. -
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A change in the LACP system priority will cause LACP renegotiation. During the
renegotiation process, Eth-Trunk interfaces in LACP mode will go Down until the
renegotiation succeeds, which may interrupt services. If the lacp priority command used to
set the LACP interface priority is executed in the system view, the Eth-Trunk in LACP mode
may alternate between Up and Down. To prevent this situation, run the lacp priority-
command-mode command in the system view to set the configuration mode of the LACP
system priority to system-priority. This mode can be used to differentiate the LACP system
priority and LACP interface priority.
Precautions
When running the lacp priority-command-mode command, note the following points:
l If you specify default in the command, the LACP system priority and LACP interface
priority configurations still use the same command (lacp priority priority).
l If you specify system-priority in the command, run the lacp system-priority priority
command to configure the LACP system priority and run the lacp priority priority
command to configure the LACP interface priority.
Example
# Set the LACP system priority configuration mode to system-priority.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] lacp priority-command-mode system-priority
Function
The lacp selected command configures a mode for selecting active interfaces of an Eth-Trunk
in LACP mode.
The undo lacp selected command restores the default mode for selecting active interfaces of
an Eth-Trunk in LACP mode.
By default, active interfaces are selected based on the LACP interface priority.
Format
lacp selected { priority | speed }
Parameters
Parameter Description Value
priority Indicates that active interfaces are selected based on the LACP -
interface priority. The interfaces with high priorities are preferentially
selected as active interfaces.
speed Indicates that active interfaces are selected based on the interface rate. -
High-speed interfaces are preferentially selected as active interfaces.
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
As defined in LACP, active interfaces are selected based on the LACP interface priority by
default. If member interfaces of an Eth-Trunk in LACP mode work at different rates, low-
speed interfaces may be selected as active interfaces. To enable the device to select high-
speed interfaces as active interfaces, run the lacp selected command to set the mode of
selecting active interfaces to speed.
To enable the device to select active interface based on the LACP interface priority, run the
lacp selected priority command to set the mode of selecting active interfaces to priority.
Prerequisites
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The Eth-Trunk has been configured to work in LACP mode using the mode lacp command in
the Eth-Trunk interface view.
Precautions
Active interfaces are selected based on the LACP interface priority by default. Changing the
mode for selecting active interfaces may cause service interruptions for a short time. You are
advised not to change the mode for selecting active interfaces during service transmission.
You are advised not to bundle interfaces working at different rates into an Eth-Trunk in LACP
mode because the priority preemption function may become ineffective.
Example
# Configure Eth-Trunk 1 in LACP mode and configure the device to select active interfaces
based on the interface rate.
<HUAWEI> system-view
[HUAWEI] interface Eth-Trunk 1
[HUAWEI-Eth-Trunk1] mode lacp
[HUAWEI-Eth-Trunk1] lacp selected speed
Related Topics
5.2.49 mode
Function
The lacp src-mac command configures an interface or system MAC address as an LACPDU's
source MAC address.
The undo lacp src-mac command restores the default source MAC address.
By default, the system MAC address is used as an LACPDU's source MAC address.
Format
lacp src-mac { bridge | port }
undo lacp src-mac
Parameters
Parameter Description Value
bridge Configures the system MAC address as an LACPDU's source MAC -
address.
port Configures an interface MAC address as an LACPDU's source MAC -
address.
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
When a Huawei device connects to a non-Huawei device through Eth-Trunk interfaces in
static LACP mode, if the Huawei device uses the default system MAC address, whereas the
non-Huawei device uses the MAC addresses of the Eth-Trunk member interfaces as
LACPDUs' source MAC addresses, the non-Huawei device may consider the received
LACPDUs with the same MAC address invalid and therefore discard them, leading to an
LACP negotiation failure.
To ensure a successful LACP negotiation, run the lacp src-mac port command to configure
the Huawei device to use interface MAC addresses as LACPDUs' source MAC addresses.
Example
# Configure interface MAC addresses as LACPDUs' source MAC addresses.
<HUAWEI> system-view
[HUAWEI] lacp src-mac port
Function
The lacp system-priority command configures a Link Aggregation Control Protocol (LACP)
system priority.
The undo lacp system-priority command restores the default LACP system priority.
The default LACP system priority is 32768.
Format
lacp system-priority priority
undo lacp system-priority
Parameters
Parameter Description Value
priority Specifies an LACP system The value is an integer ranging from 0 to 65535.
priority. A smaller value indicates a higher LACP priority.
Views
System view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
The system priority is set to differentiate the priority of the local device and the peer device.
The system of a higher priority is selected as the Actor of the link aggregate group (LAG),
and active interfaces are selected according to interfaces of the Actor.
If the devices on both ends of the Eth-Trunk are not configured with system priorities, the
devices use the default priority 32768. In this case, the Actor is selected according to the
system MAC. The system with a smaller MAC is selected as the Actor.
A change in the LACP system priority will cause LACP renegotiation. During the
renegotiation process, Eth-Trunk interfaces in LACP mode will go Down until the
renegotiation succeeds, which may interrupt services. If the lacp priority command used to
set the LACP interface priority is executed in the system view, the Eth-Trunk in LACP mode
may alternate between Up and Down. To prevent this situation, run the lacp priority-
command-mode command in the system view to set the configuration mode of the LACP
system priority to system-priority. This mode can be used to differentiate the LACP system
priority and LACP interface priority.
When running the lacp priority-command-mode command, note the following points:
l If you specify default in the command, the LACP system priority and LACP interface
priority configurations still use the same command (lacp priority priority).
l If you specify system-priority in the command, run the lacp system-priority priority
command to configure the LACP system priority and run the lacp priority priority
command to configure the LACP interface priority.
Prerequisites
The lacp priority-command-mode system-priority command has been executed in the
system view to set the configuration mode of the LACP system priority to system-priority.
Example
# Set the LACP system priority to 10.
<HUAWEI> system-view
[HUAWEI] lacp priority-command-mode system-priority
[HUAWEI] lacp system-priority 10
Format
lacp timeout { fast [ user-defined user-defined ] | slow }
undo lacp timeout
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
fast Indicates that the timeout interval for an Eth-Trunk in -
LACP mode to receive LACPDUs is 3 seconds.
If fast is specified, the remote device sends an LACPDU
every 1 second. In this mode, the local device can quickly
respond to LACPDUs from the remote device but
consumes more system resources compared with the slow
mode.
user-defined Specifies the timeout interval for an Eth-Trunk to receive The value is an
user-defined LACPDUs when fast is specified. integer that
ranges from 3
to 90, in
seconds. The
default value is
3.
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If two devices are connected through three GE interfaces at each end and the three GE
interfaces are bundled into an Eth-Trunk, you can run the mode lacp command to configure
the Eth-Trunk to work in LACP mode and run the least active-linknumber link-number
command to set the lower threshold for the number of active interfaces to 2.
If the Eth-Trunk on the local device cannot detect a self-loop or fault that occurred on a
member interface in the LAG on the remote device, the local Eth-Trunk still has three
member interfaces in Up state and the three member interfaces still load balance data, causing
packet loss. To ensure reliable data transmission, run the lacp timeout command to set the
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
timeout interval for the Eth-Trunk to receive LACPDUs. If a local member interface does not
receive any LACPDU within the configured timeout interval, it becomes Down immediately
and no longer forwards data.
The number of Up member interfaces does not fall below the configured lower threshold for
the number of active interfaces, so the Eth-Trunk is still Up. In this case, data is load balanced
between the two member interfaces in Up state and reliably transmitted to the remote end.
Prerequisites
The Eth-Trunk has been configured to work in LACP mode using the mode lacp command in
the Eth-Trunk interface view.
Precautions
After the timeout interval is successfully configured, pay attention to the following points:
The timeout interval configured on an Eth-Trunk takes effect on all its member interfaces.
Example
# Set the timeout interval for Eth-Trunk 1 to receive LACPDUs to 3 seconds.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] mode lacp
[HUAWEI-Eth-Trunk1] lacp timeout fast
Related Topics
5.2.49 mode
5.2.44 least active-linknumber
Function
The least active-linknumber command sets the lower threshold for the number of active
interfaces in an Eth-Trunk.
The undo least active-linknumber command restores the default lower threshold for the
number of active interfaces in an Eth-Trunk.
By default, the lower threshold for the number of active interfaces in an Eth-Trunk is 1.
Format
least active-linknumber link-number
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
link-number Specifies the lower The value is an integer that ranges from 1 to 32 on
threshold for the the S5720HI and 1 to 8 on other models.
number of active
interfaces in an Eth- On the S6720EI, and S6720S-EI,, you can run the
Trunk. assign trunk command to set the value, and run the
display trunk configuration command to check the
configuration.
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The number of active interfaces in an Eth-Trunk affects the status and bandwidth of the Eth-
Trunk. The bandwidth of an Eth-Trunk is equal to the total bandwidth of all member
interfaces in Up state.
The number of Up member links affects the status and bandwidth of an Eth-Trunk. To ensure
that the Eth-Trunk functions properly and is less affected by member link status changes, set
the following thresholds.
l Lower threshold for the number of active interfaces
When the number of active interfaces falls below this threshold, the Eth-Trunk goes
Down. This guarantees the Eth-Trunk a minimum available bandwidth.
For example, if the Eth-Trunk is required to provide a minimum bandwidth of 2 Gbit/s
and each member link's bandwidth is 1 Gbit/s, the lower threshold for the number of
active interfaces must be set to 2 or larger.
l Upper threshold for the number of active interfaces
When the number of active interfaces reaches this threshold, the bandwidth of the Eth-
Trunk will not increase even if more member links go Up. This guarantees higher
network reliability.
To set the upper threshold for the number of active interfaces, use the max active-
linknumber command.
To delete the configured lower threshold or restore the default lower threshold, use the undo
least active-linknumber or least active-linknumber 1 command.
Prerequisites
The Eth-Trunk has been correctly configured.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If you run the least active-linknumber command multiple times, only the latest configuration
takes effect.
After the upper threshold for the number of active interfaces is configured, the following
situations may occur:
l The Eth-Trunk goes Down when the number of active interfaces falls below the
configured lower threshold.
l The Eth-Trunk goes Up when the number of active interfaces reaches the configured
lower threshold.
If the max active-linknumber command has been configured before you run the least active-
linknumber command, ensure that the lower threshold for the number of active interface is
smaller than or equal to the upper threshold for the number of active interfaces.
Example
# Set the lower threshold for the number of active interfaces to 3.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] least active-linknumber 3
Related Topics
5.2.4 display eth-trunk
5.2.48 max active-linknumber
5.2.45 load-balance
Function
The load-balance command sets a load balancing mode of an Eth-Trunk.
The undo load-balance command restores the default load balancing mode of an Eth-Trunk.
The default load balancing mode is src-dst-ip.
Format
load-balance { dst-ip | dst-mac | src-ip | src-mac | src-dst-ip | src-dst-mac | enhanced
profile profile-name }
undo load-balance
NOTE
Only S5720EI, S5720HI, S6720EI, and S6720S-EI support enhanced profile profile-name.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure proper load balancing between physical links of an Eth-Trunk and avoid link
congestion, use the load-balance command to set the load balancing mode of the Eth-Trunk.
Load balancing is valid only for outgoing traffic; therefore, the load balancing modes for the
interfaces at both ends of the link can be different and do not affect each other.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
You can set the load balancing mode based on traffic models. When a parameter of traffic
changes frequently, you can set the load balancing mode based on this parameter to ensure
that the traffic is load balanced evenly. For example, if IP addresses in packets change
frequently, use the load balancing mode based on dst-ip, src-ip, or src-dst-ip so that traffic
can be properly load balanced among physical links. If MAC addresses in packets change
frequently and IP addresses are fixed, use the load balancing mode based on dst-mac, src-
mac, or src-dst-mac so that traffic can be properly load balanced among physical links.
l dst-ip: load balancing based on destination IP address. In this mode, the system obtains
the specified three bits from each of the destination IP address and the TCP or UDP port
number in outgoing packets to perform the Exclusive-OR calculation, and then selects
the outgoing interface from the Eth-Trunk table according to the calculation result.
l dst-mac: load balancing based on destination MAC address. In this mode, the system
obtains the specified three bits from each of the destination MAC address, VLAN ID,
Ethernet type, and incoming interface information to perform the Exclusive-OR
calculation, and then selects the outgoing interface from the Eth-Trunk table according to
the calculation result.
l src-ip: load balancing based on source IP address. In this mode, the system obtains the
specified three bits from each of the source IP address and the TCP or UDP port number
in incoming packets to perform the Exclusive-OR calculation, and then selects the
outgoing interface from the Eth-Trunk table according to the calculation result.
l src-mac: load balancing based on source MAC address. In this mode, the system obtains
the specified three bits from each of the source MAC address, VLAN ID, Ethernet type,
and incoming interface information to perform the Exclusive-OR calculation, and then
selects the outgoing interface from the Eth-Trunk table according to the calculation
result.
l src-dst-ip: load balancing based on the Exclusive-OR result of the source IP address and
destination IP address. In this mode, the system performs the Exclusive-OR calculation
between the Exclusive-OR results of the source IP and destination IP modes, and then
selects the outgoing interface from the Eth-Trunk table according to the calculation
result.
l src-dst-mac: load balancing based on the Exclusive-OR result of the source MAC
address and destination MAC address. In this mode, the system obtains three bits from
each of the source MAC address, destination MAC address, VLAN ID, Ethernet type,
and incoming interface information to perform the Exclusive-OR calculation, and then
selects the outgoing interface from the Eth-Trunk table according to the calculation
result.
l Enhanced load balancing: The device selects interfaces to forward packets according to
the load balancing mode defined for different packets by the enhanced load balancing
profile.
Prerequisites
Ensure that the load-balance-profile profile-name command has been executed to create a
load balancing profile before you run the load-balance enhanced profile profile-name
command.
Precautions
If you run the load-balance command multiple times, only the latest configuration takes
effect.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
On the S6720EI and S6720S-EI, when more than 16 member interfaces are configured using
the assign trunk { trunk-group group-number | trunk-member member-number } *
command, only the enhanced mode can be used for load balancing. If the enhanced mode is
not used, problems such as packet loss and uneven load balancing may occur.
NOTE
The S1720GFR, S2720, S2750EI, S5700LI, S5700S-LI, S5710-X-LI, S5720SI, and S5720S-SI use the
src-dst-ip in the HASH algorithm for load balancing regardless of whether you configure this parameter.
On S1720GFR, S2720, S2750EI, S5700LI, S5700S-LI, S5710-X-LI, S5720SI, and S5720S-SI, when the
load balancing mode of an Eth-Trunk is modified, the modification takes effect on all Eth-Trunks. The
load balancing mode will be set to the default mode when a new Eth-Trunk is created.
Example
# Set the load balancing mode of Eth-Trunk 1 to dst-mac.
<HUAWEI> system-view
[HUAWEI] interface Eth-Trunk 1
[HUAWEI-Eth-Trunk1] load-balance dst-mac
Related Topics
5.2.12 display interface eth-trunk
5.2.46 load-balance-profile
5.2.46 load-balance-profile
Function
The load-balance-profile command creates a load balancing profile and displays the load
balancing profile view.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
load-balance-profile profile-name
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Before setting the load balancing mode, create a load balancing profile.
Only one load balancing profile can be created.
NOTE
If VLAN mapping or VLAN stacking is configured on an inter-device Eth-Trunk, you are advised not to
choose the VLAN-based load balancing mode when running the mpls field, l2 field, ipv4 field, and ipv6
field commands.
Example
# Create a load balancing profile named a.
<HUAWEI> system-view
[HUAWEI] load-balance-profile a
[HUAWEI-load-balance-profile-a]
Related Topics
5.2.15 display load-balance-profile
Function
The local-preference enable command configures an Eth-Trunk to preferentially forward
local traffic.
The undo local-preference enable command configures an Eth-Trunk not to preferentially
forward local traffic.
By default, an Eth-Trunk is enabled to preferentially forward local traffic.
NOTE
Format
local-preference { enable | disable }
undo local-preference enable
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To solve the problem, run the local-preference enable command to enable the Eth-Trunk to
preferentially forward local traffic. Then traffic arriving at the local device is preferentially
forwarded through member interfaces of the local device. If there is no member interface on
the local device, member interfaces on another device are used to forward traffic. This
forwarding mode effectively saves inter-device bandwidth resources and improves traffic
forwarding efficiency.
l When the local device has Eth-Trunk member interfaces and the member interfaces
function properly, the Eth-Trunk forwarding table of the local device contains only local
Eth-Trunk member interfaces. Therefore, the hash algorithm selects a local member
interface, and traffic is forwarded through the local device.
l When the local device does not have any Eth-Trunk member interfaces or all member
interfaces fail, the Eth-Trunk forwarding table of the local device contains all available
Eth-Trunk member interfaces. The hash algorithm selects a member interface on another
device, and traffic is forwarded through this device.
Precaution
Member interfaces of the local Eth-Trunk have sufficient bandwidth to forward local interface
traffic, which prevents packet loss.
This function is only valid for known unicast packets, and is invalid for unknown unicast
packets.
Example
# Configure an Eth-Trunk not to preferentially forward local traffic.
<HUAWEI> system-view
[HUAWEI] interface Eth-Trunk 10
[HUAWEI-Eth-Trunk10] undo local-preference enable
Related Topics
5.2.29 interface eth-trunk
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The max active-linknumber command sets the upper threshold for the number of active
interfaces in an Eth-Trunk.
The undo max active-linknumber command restores the default upper threshold for the
number of active interfaces in an Eth-Trunk.
By default, the upper threshold for the number of active interfaces in an Eth-Trunk is 32 on
the S5720HI and 8 on other models.
Format
max active-linknumber link-number
Parameters
Parameter Description Value
link-number Specifies the upper threshold The value is an integer that ranges
for the number of active from 1 to 32 on the S5720HI and 1
interfaces. to 8 on other models.
On the S6720EI, and S6720S-EI,,
you can run the assign trunk
command to set the value, and run
the display trunk configuration
command to check the configuration.
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The number of active interfaces in an Eth-Trunk affects the status and bandwidth of the Eth-
Trunk. The bandwidth of an Eth-Trunk is equal to the total bandwidth of all member
interfaces in Up state.
The number of Up member links affects the status and bandwidth of an Eth-Trunk. To ensure
that the Eth-Trunk functions properly and is less affected by member link status changes, set
the following thresholds.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Prerequisites
Precautions
l If you run the max active-linknumber command multiple times, only the latest
configuration takes effect.
l The max active-linknumber command is valid only in LACP mode.
l If the number of member interfaces added to an Eth-Trunk is less than the upper
threshold, there is no backup interface.
l After you run this command, if the number of current active interfaces reaches the upper
threshold, new member interfaces function as the backup interfaces.
l If the least active-linknumber command has been configured before you run the max
active-linknumber command, ensure that the maximum number of active member links
is larger than or equal to the minimum number of active member links.
l The upper thresholds configured by the max active-linknumber command on both ends
must be the same; otherwise, the Eth-Trunk status flaps if an active interface fails.
l In the scenario where the Eth-Trunk in 1:1 LACP mode is used, the upper threshold for
the number of Eth-Trunk member links in Up state is 1. After the active link becomes
Down and before the backup link switches to the active link, the Down event of the
original active link is not reported to the Eth-Trunk. To prevent route re-calculation
caused by the Eth-Trunk Down event, the Down event of the original active link is
reported to the Eth-Trunk in any of the following situations:
– The timeout interval (60s) for reporting the Down event has been expired.
– The backup link goes Up and becomes the active link.
– The backup link fails and cannot go Up.
The preceding implementation is inapplicable to scenarios where association between
Eth-Trunk in E-Trunk or LACP mode and VRRP is configured.
l When a Huawei switch connects to a non-Huawei device, if the maximum number of
active links at both ends is smaller than the number of all active interfaces of the Eth-
Trunk, a link is interrupted suddenly especially in 1:1 mode. As a result, LACP
negotiation results at both ends are different and the Eth-Trunk in Down state cannot be
restored. It is recommended that LACP preemption be enabled and the same preemption
delay be set at both ends or the maximum number of active links be not set at both ends.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
The 1:1 mode indicates that the maximum number of active links at both ends of an Eth-Trunk is 1
and two member interfaces join an Eth-Trunk at both ends.
Example
# Set the upper threshold for the number of active interfaces in Eth-Trunk 1 to 3.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] mode lacp
[HUAWEI-Eth-Trunk1] max active-linknumber 3
Related Topics
5.2.4 display eth-trunk
5.2.44 least active-linknumber
5.2.49 mode
Function
The mode command configures a working mode of an Eth-Trunk.
The undo mode command restores the default working mode of an Eth-Trunk.
By default, an Eth-Trunk works in manual load balancing mode.
Format
mode { lacp | manual load-balance }
undo mode
Parameters
Parameter Description Value
lacp Indicates the LACP mode. -
manual load-balance Indicates the manual load balancing mode. -
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
An Eth-Trunk can use the following working modes:
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l LACP mode
When the devices that are directly connected through an Eth-Trunk support LACP, you
can run the mode lacp command to configure the Eth-Trunk to work in LACP mode.
This mode can implement both load balancing and redundancy.
In LACP mode, you must manually create an Eth-Trunk and add member interfaces to
the Eth-Trunk. The difference between the LACP mode and manual load balancing mode
is that active member interfaces are selected by sending LACP data units (LACPDUs).
That is, when a group of interfaces are added to an Eth-Trunk, devices at both ends
determine active and inactive interfaces by sending LACPDUs to each other.
l Manual load balancing mode
When one of the devices at the two ends of an Eth-Trunk does not support LACP, run the
mode manual load-balance command to configure the Eth-Trunk to work in manual
load balancing mode. In addition, you can add multiple member interfaces to the Eth-
Trunk to increase the bandwidth between the two devices and improve reliability.
The manual load balancing mode is a basic link aggregation mode. In this mode, you
must manually create an Eth-Trunk and add interfaces to the Eth-Trunk. LACP is not
used.
In manual load balancing mode, all active interfaces of the Eth-Trunk forward data and
load balance traffic.
Precautions
If you run the mode command multiple times, only the latest configuration takes effect.
When an Eth-Trunk changes from manual load balancing mode to LACP mode, the Eth-
Trunk can contain member interfaces. When an Eth-Trunk changes from LACP mode to
manual load balancing mode, ensure that the Eth-Trunk has no member interface.
If an Eth-Trunk interface has member interfaces, you can switch the Eth-Trunk interface's
working mode between manual mode and LACP mode. However, if the Eth-Trunk interface is
added to an E-Trunk, you cannot change its working mode.
Example
# Configure Eth-Trunk 1 to work in LACP mode.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] mode lacp
Related Topics
5.2.4 display eth-trunk
Function
The mpls field configures a load balancing mode of MPLS packets in a load balancing
profile.
The undo mpls field command deletes the load balancing mode of MPLS packets or restores
the default load balancing mode of MPLS packets.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
By default, load balancing of MPLS packets is based on the two outer labels (top-label and
2nd-label) of each packet.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
mpls field [ 2nd-label | dip | dmac | sip | smac | sport | top-label | vlan ] *
undo mpls field [ 2nd-label | dip | dmac | sip | smac | sport | top-label | vlan ] *
Parameters
Parameter Description Value
Views
Load balancing profile view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
The undo mpls field command with no parameter specified restores the default load
balancing mode of MPLS packets. The undo mpls field command with a parameter specified
deletes a specified load balancing mode of MPLS packets.
Precautions
If you run the mpls field command multiple times, only the latest configuration takes effect.
Only the S5720EI, S6720EI, and S6720S-EI support the smac and dmac load balancing
mode .
Load balancing based on MPLS labels takes effect for only labeled packets on the ingress.
Example
# In the load balancing profile a, set the load balancing mode of MPLS packets to 2nd-label,
that is, load balancing based on the second label of MPLS packets.
<HUAWEI> system-view
[HUAWEI] load-balance-profile a
[HUAWEI-load-balance-profile-a] mpls field 2nd-label
Related Topics
5.2.15 display load-balance-profile
5.2.46 load-balance-profile
Function
The peer-address source-address command configures the local and remote IP addresses of
an E-Trunk.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
peer-address peer-ip-address source-address source-ip-address
undo peer-address
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
peer-address peer-ip- Specifies the remote IP address of The value is in dotted
address an E-Trunk. decimal notation.
source-address source-ip- Specifies the local IP address of an The value is in dotted
address E-Trunk. decimal notation.
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
The remote IP address of the local device is the local IP address of the remote device. For
example, an E-Trunk is created between device A and device B. On device A, the remote IP
address is 10.2.2.2 and the local IP address is 10.1.1.1. On device B, the remote IP address is
10.1.1.1 and the local IP address is 10.2.2.2.
When changing the local or remote IP address on a device, you must change the
corresponding address on the remote device. Otherwise, LACPDUs are discarded.
Example
# Set the remote IP address of E-Trunk 1 to 10.2.2.2 and the local IP address to 10.1.1.1.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] peer-address 10.2.2.2 source-address 10.1.1.1
Related Topics
5.2.27 e-trunk (system view)
5.2.7 display e-trunk
Function
The priority command sets the priority of an E-Trunk.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
priority priority
undo priority
Parameters
Parameter Description Value
priority priority Specifies the priority of an The value is an integer that ranges from 1 to
E-Trunk. 254. The default value is 100. A smaller
value indicates a higher priority.
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
An E-Trunk determines the master/backup status of the two devices according to the priority
and system ID. The device with a higher priority is the master.
If the two devices have the same priority, the device with a smaller system ID is the master.
If the two devices have the same priority and system ID, the E-Trunk considers the
configuration incorrect and discards LACPDUs.
Example
# Set the priority of E-Trunk 1 to 10.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] priority 10
Related Topics
5.2.27 e-trunk (system view)
5.2.7 display e-trunk
Function
The reset e-trunk packet-statistics command clears packet statistics about an E-Trunk.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
reset e-trunk packet-statistics [ e-trunk-id e-trunk-id ]
Parameters
Views
User view
Default Level
3: Management level
Usage Guidelines
Before collecting packet statistics about an E-Trunk in a given period, run the reset e-trunk
packet-statistics command to clear the existing statistics. Then run display e-trunk
command to view packet statistics.
Example
# Clear packet statistics about E-Trunk 1.
<HUAWEI> reset e-trunk packet-statistics e-trunk-id 1
Related Topics
5.2.7 display e-trunk
Function
The reset lacp statistics eth-trunk command clears statistics about LACPDUs on all Eth-
Trunks in LACP mode, a specified Eth-Trunk in LACP mode, or a specified member
interface.
Format
reset lacp statistics eth-trunk [ trunk-id [ interface interface-type interface-number ] ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before collecting statistics about LACPDUs on a specific interface within a given period of
time, you need to run the reset lacp statistics eth-trunk command to clear the existing
statistics about LACPDUs on the interface.
When using the reset lacp statistics eth-trunk command, pay attention to the following
points:
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Prerequisites
l The Eth-Trunk has been created and configured to work in LACP mode.
l Member interfaces have been added to the Eth-Trunk.
Precautions
The reset lacp statistics eth-trunk command clears statistics about sent and received
LACPDUs on all Eth-Trunks in LACP mode, a specified Eth-Trunk in LACP mode, or a
specified member interface. The cleared statistics cannot be restored. Exercise caution when
you run this command.
Example
# Clear statistics about LACPDUs on all Eth-Trunks in LACP mode.
<HUAWEI> reset lacp statistics eth-trunk
# Clear the statistics about LACPDUs on the member interface GigabitEthernet0/0/1 of Eth-
Trunk 1 in LACP mode.
<HUAWEI> reset lacp statistics eth-trunk 1 interface gigabitethernet 0/0/1
Function
The revert disable command disables revertive switching on an E-Trunk.
By default, revertive switching is enabled on an E-Trunk and the revertive switching delay is
120s.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
revert disable
Parameters
None
Views
E-Trunk view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On devices of an E-Trunk, when the faulty master device recovers, to prevent loss of traffic
that is switched back, run the revert disable command to disable revertive switching on the
E-Trunk.
Prerequisites
The E-Trunk has been correctly configured.
Follow-up Procedure
Run the undo revert disable command to enable revertive switching on an E-Trunk. When
the faulty master device recovers, services are switched back to the original active device after
120s by default. Run the timer revert delay delay-value command to set the revertive
switching delay.
Example
# Disable revertive switching on the E-Trunk.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] revert disable
5.2.56 security-key
Function
The security-key command sets an encrypted password for an E-Trunk.
The undo security-key command restores the default password of an E-Trunk.
By default, the password in plain text is 00E0FC0000000000.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
security-key { simple simple-key | cipher cipher-key }
undo security-key
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
NOTICE
If simple is specified, the password is saved in the configuration file in plain text. This brings
security risks. Therefore, it is recommended that you specify cipher to save the password in
cipher text.
You can encrypt the password with the plain text or cipher text.
l When the password is encrypted in plain text, it can be displayed in the configuration
file.
l When the password is encrypted in cipher text, it is displayed as unidentifiable
characters.
An encrypted password can be configured to enhance the system security. The encrypted
passwords configured on the two devices of an E-Trunk must be the same.
Example
# Set the password of E-Trunk 1 to 00E0FC000000 and encrypt the password in cipher mode.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] security-key cipher 00E0FC000000
Related Topics
5.2.27 e-trunk (system view)
Function
The sequence enable command enables the E-Trunk sequence number check function.
The undo sequence enable command disables the E-Trunk sequence number check function.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
sequence enable
undo sequence enable
Parameters
None
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the master device in an E-Trunk fails, an attacker can obtain the E-Trunk packet sent by the
master device and attack the backup device, causing service interruptions. To resolve this
problem, run the sequence enable command to enable the E-Trunk sequence number check
function.
Configuration Impact
After the E-Trunk sequence number check function is enabled, the E-Trunk sequence number
of packets is checked to protect against attacks and enhance E-Trunk security.
Precautions
The sequence enable command must be run on both the master and backup devices in an E-
Trunk. Otherwise, the E-Trunk sequence number check function fails, causing dual master
devices in the E-Trunk.
Example
# Enable the E-Trunk sequence number check function on E-Trunk 1.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] sequence enable
Function
The snmp-agent trap enable feature-name etrunk command enables the trap function for
the E-Trunk module.
The undo snmp-agent trap enable feature-name etrunk command disables the trap
function for the E-Trunk module.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
By default, you can check whether the trap function of the E-Trunk module is enabled by
checking the Default switch status field in the display snmp-agent trap feature-name
etrunk all command output.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
snmp-agent trap enable feature-name etrunk [ trap-name { hwetrunkstatuschange |
hwetrunkmemberstatuschange } ]
undo snmp-agent trap enable feature-name etrunk [ trap-name { hwetrunkstatuschange
| hwetrunkmemberstatuschange } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the trap function is enabled, the device generates traps during running and sends traps
to the NMS through SNMP. When the trap function is not enabled, the device does not
generate traps and the SNMP module does not send traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the hwetrunkstatuschange of the E-Trunk module.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name etrunk trap-name hwetrunkstatuschange
Related Topics
5.2.16 display snmp-agent trap feature-name etrunk all
Function
The snmp-agent trap enable feature-name lacp command enables the trap function for the
LACP module.
The undo snmp-agent trap enable feature-name lacp command disables the trap function
for the LACP module.
Format
snmp-agent trap enable feature-name lacp [ trap-name { hwlacpnegotiatefailed |
hwlacpnegotiateresume | hwlacppartiallinkloss | hwlacppartiallinklossresume |
hwlacppartnerexpiredloss | hwlacptotallinkloss | hwlacptotallinklossresume } ]
Parameters
Parameter Description Value
trap-name Enables the traps of LACP events of specified -
types.
hwlacpnegotiatefailed Enables the device to send trap when the link -
negotiation of the LACP module fails.
hwlacpnegotiateresume Enables the device to send a trap when the link -
negotiation of the LACP module is restored.
hwlacppartiallinkloss Enables the device to send trap when the link -
bandwidth of the LACP module is partially lost.
hwlacppartiallinklossresume Enables the device to send a trap when the link -
bandwidth of the LACP module is partially
restored.
hwLacpPartnerExpiredLoss Enables the device to send a trap when the local end -
received a timeout packet from the remote end.
hwlacptotallinkloss Enables the device to send a trap when the link -
bandwidth of the LACP module is totally lost.
hwlacptotallinklossresume Enables the device to send a trap when the link -
bandwidth of the LACP module is totally restored.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
No parameter is available to enable all LACP traps. To enable the trap function of one or
more events, specify type-name.
Example
# Enable the device to send traps when the link negotiation of the LACP module fails.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name lacp trap-name hwlacpnegotiatefailed
Related Topics
5.2.17 display snmp-agent trap feature-name lacp all
Format
snmp-agent trap enable feature-name trunk [ trap-name { hwextallmemberdownnotify |
hwextallmemberdownresume | hwextlinkdown | hwextlinkup } ]
undo snmp-agent trap enable feature-name trunk [ trap-name
{ hwextallmemberdownnotify | hwextallmemberdownresume | hwextlinkdown |
hwextlinkup } ]
Parameters
Parameter Description Value
trap-name Enables the traps of Trunk events of specified -
types.
hwextallmemberdownnotify Enables the device to send trap when the all -
member interfaces of a Trunk interface become
Down.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The Trunk module is not configured with the function of excessive traps. To enable the traps
of one or more events, you can specify trap-name.
Example
# Enables the device to send trap when the status of the link protocol on the interface became
Down.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name trunk trap-name hwextlinkdown
Related Topics
5.2.18 display snmp-agent trap feature-name trunk all
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
timer hello hello-times
undo timer hello
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
hello hello-times Specifies the interval for The value is an integer that ranges from 5 to
sending hello packets. 100. The unit is 100 ms. The default value
is 10.
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
The timer hello command sets the interval at which the master and backup devices of an E-
Trunk send hello packet. If the backup device receives no hello packet from the master device
after certain number of intervals (specified by the timer hold-on-failure multiplier command
for detecting hello packets), the backup device becomes the master.
Configuring a timeout period longer than 5 minutes is recommended, so that the Eth-Trunk
packets can be sent to the peer device within the timeout period when a master/backup
switchover is performed.
Example
# Set the interval for sending hello packets to 9.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] timer hello 9
Related Topics
5.2.62 timer hold-on-failure multiplier
5.2.7 display e-trunk
Function
The timer hold-on-failure multiplier command sets the time multiplier for an E-Trunk to
detect hello packets.
The undo timer hold-on-failure multiplier command restores the default time multiplier.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
timer hold-on-failure multiplier multiplier
undo timer hold-on-failure multiplier
Parameters
Parameter Description Value
multiplier Specifies the time multiplier The value is an integer that ranges
multiplier for detecting hello packets. from 3 to 300. The default value is 20.
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
After the time multiplier for detecting hello packets is set, the local device is triggered to send
hello packets. The remote device checks the timeout of the local device according to the
timeout interval in the received packet. If the remote device is the backup device and does not
receive hello packets from the local device within the timeout interval, the remote device
becomes the master device.
Timeout interval = Interval for sending hello packets x Time multiplier
It is recommended that you set the time multiplier to 3 or larger.
The timeout interval configured on the local device is used by the remote device to check the
timeout of the local device. If the hello packet from the remote device does not contain the
timeout interval, the timeout interval of the local device is used.
Example
# Set the time multiplier for detecting hello packets to 3.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] timer hold-on-failure multiplier 3
Related Topics
5.2.61 timer hello (E-Trunk view)
5.2.7 display e-trunk
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo timer revert delay command restores the default revertive switching delay of an
E-Trunk.
NOTE
Only the S5720SI, S5720S-SI, S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
timer revert delay delay-value
Parameters
Views
E-Trunk view
Default Level
2: Configuration level
Usage Guidelines
When the member Eth-Trunk on the master device goes Down, the member Eth-Trunk on the
remote device becomes Up after LACP negotiation. Then the remote device becomes the
master device, and the local device becomes the backup device. When the local device
recovers, it becomes the master device again in the subsequent LACP negotiation.
If an E-Trunk works with other services, after the master device recovers from a fault, the
status of the member Eth-Trunk on the master device may be restored before other services
are restored. If traffic is immediately switched back to the master device, service traffic will
be interrupted. To solve this problem, you need to set the revertive switching delay for the E-
Trunk.
After you run the timer revert delay command to set the revertive switching delay for an E-
Trunk, the local Eth-Trunk can become Up only after the delay timer times out. This delays
the revertive switching of the service traffic, ensuring nonstop services.
Example
# Set the revertive switching delay of E-Trunk 1 to 100 seconds.
<HUAWEI> system-view
[HUAWEI] e-trunk 1
[HUAWEI-e-trunk-1] timer revert delay 100
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.2.7 display e-trunk
5.2.64 trunkport
Function
The trunkport command adds a member interface in the Eth-Trunk interface view.
The undo trunkport command deletes a member interface in the Eth-Trunk interface view.
By default, no member interface is added to an Eth-Trunk.
Format
trunkport interface-type { interface-number1 [ to interface-number2 ] } &<1-16> [ mode
{ active | passive } ]
undo trunkport interface-type { interface-number1 [ to interface-number2 ] } &<1-16>
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
An Eth-Trunk contains a maximum of 32 member interfaces on the S5720HI and 8 member
interfaces on other models.
NOTE
On the S6720EI, and S6720S-EI,, you can run the assign trunk command to set the value, and run the
display trunk configuration command to check the configuration.
Example
# Add GigabitEthernet0/0/1 to Eth-Trunk 1.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] trunkport gigabitethernet 0/0/1
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.2.4 display eth-trunk
5.2.23 eth-trunk
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this command.
Format
unknown-unicast load-balance { dmac | smac | smacxordmac | enhanced }
undo unknown-unicast load-balance
Parameters
Parameter Description Value
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
If the traffic policy contains a traffic behavior that defines the action of re-marking destination
MAC addresses of packets, load balancing of non-known unicast traffic must be based on
source MAC addresses of packets.
Example
# Configure the device to load balance non-known unicast traffic based on source MAC
addresses of packets.
<HUAWEI> system-view
[HUAWEI] unknown-unicast load-balance smac
Function
The damping time command sets the VLAN damping time on a VLANIF interface, that is,
the delay before reporting a VLAN Down event to the VLANIF interface.
The undo damping time command restores the default damping time.
The default damping time on a VLANIF interface is 0 seconds. That is, the VLANIF interface
is notified immediately after the VLAN becomes Down.
Format
damping time delay-time
Parameters
Parameter Description Value
Views
VLANIF interface view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Software upgrade or active/standby switchover on the switch may cause frequent status
changes on VLANIF interfaces. To prevent network flapping, run the damping time
command on VLANIF interfaces to configure the VLAN damping function.
When all interfaces in a VLAN become Down, the switch waits for a period specified by
delay-time and then reports the VLAN Down event to the VLANIF interface.
Precautions
If any interface in the VLAN becomes Up within the delay time, the VLANIF interface
remains Up.
You can use the display interface vlanif command to view the VLAN damping time.
If you run the damping time command multiple times in the same VLANIF interface view,
only the latest configuration takes effect.
Example
# Set the VLAN damping time on VLANIF 10 to 10 seconds.
<HUAWEI> system-view
[HUAWEI] vlan 10
[HUAWEI-vlan10] quit
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] damping time 10
Related Topics
5.3.5 display interface vlanif
Function
The description command sets the description of a VLAN.
By default, the description of a VLAN shows the VLAN ID. For example, the description of
VLAN 2 is "VLAN 0002".
Format
description description
undo description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The description command is used to set the description of a VLAN, which is convenient for
identifying, memorizing, and maintaining the VLAN.
The display vlan vlan-id verbose command can display the description of a specified VLAN.
Precautions
If you run the description command multiple times in the same VLAN view, only the last
configuration takes effect.
Example
# Set the description of VLAN 2 as "Huawei".
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] description Huawei
Related Topics
5.3.13 display vlan
Function
The description command set the description of a VLANIF interface.
The undo description command restores the default description of a VLANIF interface.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
description description
undo description
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To manage VLANIF interfaces conveniently, use the description command to set VLANIF
interface descriptions. The description of a VLANIF interface helps you identify the VLANIF
interface and know its functions.
You can use the display interface vlanif command to view the description of a VLANIF
interface.
Precautions
The description of a VLANIF interface should provide useful information.
Set different descriptions for VLANIF interfaces to distinguish VLANIF interfaces.
If you run the description command multiple times in the same VLANIF interface view, only
the latest configuration takes effect.
Example
# Set the description of VLANIF 2 to Huawei.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] quit
[HUAWEI] interface vlanif 2
[HUAWEI-Vlanif2] description Huawei
Related Topics
5.3.5 display interface vlanif
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The display default-parameter vlan command displays the default parameters of a VLAN.
Format
display default-parameter vlan vlan-id
Parameters
Parameter Description Value
vlan-id Displays the default parameters of a The value is an integer ranging from 1
specified VLAN. to 4094.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
A great number of VLANs are created on a device, and different features are configured for
every VLAN. To know the default parameters of a VLAN, run the display default-
parameter vlan command to specify the VLAN and view its default parameters.
Prerequisites
The specified VLAN has been created.
Precautions
The default parameters of a VLAN do not change with the VLAN configuration.
Example
# Display the default parameters of VLAN 10.
<HUAWEI> display default-parameter vlan 10
VLAN ID : 10
Type : Common
Status : undo shutdown
Broadcast : Forward
Unknown-Multicast : Forward
Unknown-Unicast : Forward
Statistics : Disable
MAC learning : Enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Property : Default
Description : VLAN 0010
MAC learning Whether MAC address learning is enabled. The value can be:
Enable: MAC address learning is enabled.
Format
display interface vlanif [ vlan-id | main ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To monitor an interface or locate an interface fault, you can use the display interface vlanif
command to view the interface status, interface configuration, and traffic statistics on the
interface.
Prerequisites
The specified VLANIF interface has been created.
Precautions
If vlan-id is not specified, the display interface vlanif command displays information about
all VLANIF interfaces in the system.
Example
# Display the status and configuration of VLANIF 3.
<HUAWEI> display interface vlanif 3
Vlanif3 current state : UP
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Line protocol current Status of the link-layer protocol on a VLANIF interface. The
state value is UP or Down.
Last line protocol up The last time the line protocol is up.
time
Last 300 seconds input/ Rates of incoming and outgoing packets in the last 300 seconds,
output rate expressed in bytes per second and packets per second.
NOTE
On the S1720GFR, S2720, S2750, S5720SI, S5720S-SI, S5700LI,
S5700S-LI, and S5710-X-LI, this field is displayed only when the traffic
statistics function is enabled on the VLANIF interface using the statistic
enable command. Other models, this field is displayed only when the
traffic statistics function is enabled on the VLAN view using the
statistic enable command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Input/Output Number of bytes and packets sent and received by the VLANIF
interface.
NOTE
On the S1720GFR, S2720, S2750, S5720SI, S5720S-SI, S5700LI,
S5700S-LI, and S5710-X-LI, this field is displayed only when the traffic
statistics function is enabled on the VLANIF interface using the statistic
enable command. Other models, this field is displayed only when the
traffic statistics function is enabled on the VLAN view using the
statistic enable command.
Related Topics
5.3.3 description (VLANIF interface view)
5.3.14 interface vlanif
6.1.1 ip address
5.3.22 mtu (VLANIF interface view)
Format
display ip-subnet-vlan vlan { all | vlan-id1 [ to vlan-id2 ] }
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After configuring IP subnet-based VLAN assignment, you can run the display ip-subnet-
vlan vlan command to verify the configuration.
This command displays the VLAN ID, IP subnet index, IP subnet address, IP subnet mask,
and 802.1p priority of the VLAN mapping an IP subnet.
When using the display ip-subnet-vlan vlan command, pay attention to the following points:
l If all is specified, IP subnets associated with all VLANs are displayed.
l If vlan vlan-id is specified, the IP subnet associated with the specified VLAN is
displayed.
l If vlan-id1 to vlan-id2 is specified, IP subnets associated with the specified VLANs are
displayed.
Precautions
If no VLAN is associated with any IP subnet by using the ip-subnet-vlan command, the
display ip-subnet-vlan vlan command does not display any information.
Example
# Display information about IP subnets associated with all VLANs.
<HUAWEI> display ip-subnet-vlan vlan all
----------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.3.15 ip-subnet-vlan
5.3.16 ip-subnet-vlan enable
Function
The display lnp interface command displays LNP negotiation information on a Layer 2
Ethernet interface.
Format
display lnp { interface interface-type interface-number | summary }
Parameters
Views
All views
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
1: Monitoring level
Usage Guidelines
If you want to check the link type and traffic statistics of a Layer 2 Ethernet interface after
enabling LNP negotiation, run the display lnp command.
To monitor the status of or locate the fault on an LNP-enabled Layer 2 Ethernet interface, run
the display lnp command to obtain the status information and statistics about user packets.
This information provides a basis for fault locating.
Example
# Display LNP negotiation information on a specified Layer 2 Ethernet interface.
<HUAWEI> display lnp interface gigabitethernet0/0/1
LNP information for GigabitEthernet0/0/1:
Port link type: trunk
Negotiation mode: desirable
Hello timer expiration(s): 19
Negotiation timer expiration(s): 0
Trunk timer expiration(s): 289
FSM state: trunk
Packets statistics
4 packets received
0 packets dropped
bad version: 0, bad TLV(s): 0, bad port link type: 0,
bad negotiation state: 0, other: 0
5 packets output
0 packets dropped
other: 0
Item Description
LNP information for Layer 2 Ethernet interface on which LNP negotiation information
is displayed
Negotiation mode Negotiation mode on the Layer 2 Ethernet interface, which can be
configured using the port link-type command
l desirable
l auto
l on
l off
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
bad port link type Number of LNP packets dropped due to incorrect negotiation
results
bad negotiation state Number of LNP packets dropped due to incorrect negotiation states
Global lnp Whether LNP is enabled globally, which can be configured using
the lnp disable command
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
InDropped Number of incoming LNP packets that are dropped on the Layer 2
Ethernet interface
OutDropped Number of outgoing LNP packets that are dropped on the Layer 2
Ethernet interface
Function
Using the display mac-vlan command, you can view the configuration of MAC address-
based VLAN assignment.
Format
display mac-vlan { mac-address { all | mac-address [ mac-address-mask | mac-address-
mask-length ] } | vlan vlan-id }
Parameters
Parameter Description Value
mac-address-mask- Specifies the mask length of The value is an integer that ranges
length a MAC address. from 1 to 48.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
vlan vlan-id Displays the configuration of The value is an integer that ranges
a specified MAC address- from 1 to 4094.
based VLAN.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After configuring MAC address-based VLAN assignment, you can run the display mac-vlan
command to verify the configuration.
When using the display mac-vlan command, pay attention to the following points:
l If mac-address mac-address is specified, the VLAN associated with the specified MAC
address is displayed.
l If mac-address all is specified, all VLANs associated with MAC addresses are
displayed.
l If vlan vlan-id is specified, configuration of the specified MAC address-based VLAN is
displayed.
Example
# Display the configuration of all MAC address-based VLANs.
<HUAWEI> display mac-vlan mac-address all
---------------------------------------------------------------
MAC Address MASK VLAN Priority
---------------------------------------------------------------
0022-0033-0044 ffff-ffff-ffff 200 0
Priority 802.1p priority of the VLAN associated with the MAC address.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.3.20 mac-vlan mac-address
5.3.19 mac-vlan enable
Function
Using the display policy-vlan command, you can view the configuration of policy-based
VLAN assignment.
Format
display policy-vlan { all | vlan vlan-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After associating MAC address and IP address binding policies to VLANs, you can use the
display policy-vlan command to verify the configuration. The command displays the source
MAC address, source IP address, interface where a policy-based VLAN is configured, VLAN
ID, and VLAN priority.
When using the display policy-vlan command, pay attention to the following points:
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display configuration of policy-based VLAN assignment.
<HUAWEI> display policy-vlan all
------------------------------------------------------------------------
MacAddress IPAddress Port Vlan Priority
------------------------------------------------------------------------
0003-0003-0003 10.2.2.2 GigabitEthernet0/0/1 6 4
0002-0002-0002 10.1.1.1 NA 8 6
------------------------------------------------------------------------
Total Policy-VLAN count: 2
Port Interface where the MAC address and IP address are bound.
Related Topics
5.3.26 policy-vlan
Format
display port vlan [ interface-type interface-number | active ] *
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display port vlan command to view information about interfaces of the
VLAN and check whether the VLAN is assigned by the command, protocols, or services. If a
fault occurs on an interface, you can locate the fault based on the information about the
interface and VLAN.
Prerequisite
A VLAN has been created and the Layer 2 interface has joined the VLAN.
Precautions
If a large number of mappings between interfaces and VLANs exist on the device, you are
advised to specify the interface or active to filter the command output. Otherwise, the
following problems may occur due to excessive output information:
l The displayed information is repeatedly refreshed, causing required information to fail to
be obtained.
l The system does not respond because of long-time information traverse and search.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display information about interfaces that belong to each VLAN on the device.
<HUAWEI> display port vlan
Port Link Type PVID Trunk VLAN List
-------------------------------------------------------------------------------
GigabitEthernet0/0/1 hybrid 1 -
GigabitEthernet0/0/2 hybrid 1 -
Item Description
Trunk VLAN List l Indicates the VLAN IDs that are dynamically added by an
interface.
l Indicates the VLAN IDs of packets that are statically
configured to pass through an interface.
VLAN List Indicates the VLAN IDs of packets that are statically
configured to pass through an interface.
Related Topics
5.3.34 port link-type
5.3.36 port trunk allow-pass vlan
Function
The display protocol-vlan interface command displays the protocol-based VLAN
configuration on a specified interface or all interfaces.
Format
display protocol-vlan interface { all | interface-type interface-number }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After associating an interface with a protocol-based VLAN, you can use the display
protocol-vlan interface command to verify the configuration.
Precautions
If no protocol-based VLAN is configured by using the protocol-vlan vlan command, the
display protocol-vlan interface command displays no information.
Example
# Display the protocol-based VLAN associated with GE0/0/1.
<HUAWEI> display protocol-vlan interface gigabitethernet 0/0/1
-------------------------------------------------------------------------------
Interface VLAN Index Protocol Type Priority
-------------------------------------------------------------------------------
GigabitEthernet0/0/1 2 2 ipv4 4
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.3.40 protocol-vlan
5.3.41 protocol-vlan vlan
5.3.12 display protocol-vlan vlan
Function
The display protocol-vlan vlan command displays the types and indexes of the protocols
associated with VLANs.
Format
display protocol-vlan vlan { all | vlan-id1 [ to vlan-id2 ] }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
After configuring protocol-based VLANs, you can use the display protocol-vlan vlan
command to verify the configuration.
Example
# Display types and indexes of protocols associated with VLANs.
<HUAWEI> display protocol-vlan vlan all
----------------------------------------------------------------
VLAN Protocol Index Protocol Type
----------------------------------------------------------------
2 2 ipv4
Related Topics
5.3.40 protocol-vlan
5.3.41 protocol-vlan vlan
5.3.11 display protocol-vlan interface
Format
display vlan [ vlan-id [ verbose ] ]
display vlan [ vlan-id1 [ to vlan-id2 ] ]
display vlan [ vlan-id [ statistics [ slot slot-id ] ] ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display vlan command displays VLAN configuration or packet statistics on interfaces in
a VLAN.
The display vlan vlan-id command displays the ports that actually take effect, and the display
vlan vlan-id verbose command displays the configured ports.
Prerequisites
Before using the display vlan vlan-id statistics command, run the statistic enable (vlan
view) command in the corresponding VLAN view to enable the traffic statistics function in
the VLAN.
Precautions
If no parameter is specified, brief information about all VLANs is displayed.
Example
# Display brief information about all VLANs.
<HUAWEI> display vlan
The total number of VLANs is : 3
--------------------------------------------------------------------------------
U: Up; D: Down; TG: Tagged; UT: Untagged;
MP: Vlan-mapping; ST: Vlan-stacking;
#: ProtocolTransparent-vlan; *: Management-vlan;
--------------------------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
--------------------------------------------------------------------------------
1 enable default enable disable VLAN 0001
9 enable default enable disable VLAN 0009
40 enable default enable disable VLAN 0040
Total
VLAN :
10
---------------------------------------------------------------------------------
Item Packets
Bytes
pps
bps
---------------------------------------------------------------------------------
Inbound 0
0
0
0
Outbound 0
0
0
0
---------------------------------------------------------------------------------
Slot :
0
VLAN :
10
---------------------------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Packets
Bytes
pps
bps
---------------------------------------------------------------------------------
Inbound 0
0
0
0
Outbound 0
0
0
0
---------------------------------------------------------------------------------
# Display interface traffic statistics in VLAN 10 on other devices except the S5720HI. If no
interface is added to VLAN 10, Slot information is not displayed.
<HUAWEI> display vlan 10 statistics
Total
VLAN :
10
---------------------------------------------------------------------------------
Item Packets
Bytes
pps
bps
---------------------------------------------------------------------------------
Inbound 0
-
0
-
Outbound 0
-
0
-
Inbound unknown-unicast -
-
-
-
Inbound multicast 0
-
0
-
Inbound broadcast 0
-
0
-
Inbound drop -
-
-
-
---------------------------------------------------------------------------------
Inbound drop-percentage -
-
---------------------------------------------------------------------------------
Slot :
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
VLAN :
10
---------------------------------------------------------------------------------
Item Packets
Bytes
pps
bps
---------------------------------------------------------------------------------
Inbound 0
-
0
-
Outbound 0
-
0
-
Inbound unknown-unicast -
-
-
-
Inbound multicast 0
-
0
-
Inbound broadcast 0
-
0
-
Inbound drop -
-
-
-
---------------------------------------------------------------------------------
Inbound drop-percentage -
-
---------------------------------------------------------------------------------
Dynamic VLAN:
Total 0 dynamic VLAN.
Reserved VLAN:
Total 5 reserved VLAN.
Rrpp reserved:
3000 to 3001
Sep reserved:
3100
Stack-VLAN:
212 to 213
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Active Tag/Active Untag Port Active interfaces that join a VLAN in tagged or
untagged mode.
Related Topics
5.3.2 description (VLAN view)
5.3.43 reset vlan statistics
5.3.45 statistic enable (VLAN view)
5.3.49 vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
interface vlanif vlan-id
undo interface vlanif vlan-id
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a device needs to communicate with devices at the network layer, you can create a
logical interface based on a VLAN on the device, namely, a VLANIF interface. A VLANIF
interface is a network layer interface and can be configured with an IP address. The device
then users the VLANIF interface to communicate with devices at the network layer.
Follow-up Procedure
Run the ip address to assign an IP address to the VLANIF interface.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If the specified VLANIF interface exists, the interface vlanif command displays the VLANIF
interface view directly.
When a VLANIF interface is used as a management VLANIF interface where you can telnet
to the device, the user VLAN ID cannot be the same as the management VLAN ID;
otherwise, you will fail to telnet to the device.
Example
# Create VLANIF 2 and enter the VLANIF interface view.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] quit
[HUAWEI] interface vlanif 2
[HUAWEI-Vlanif2]
Related Topics
5.3.5 display interface vlanif
5.3.49 vlan
5.3.15 ip-subnet-vlan
Function
Using the ip-subnet-vlan command, you can associate an IP subnet with a VLAN.
Using the undo ip-subnet-vlan command, you can disassociate an IP subnet from a VLAN.
Format
ip-subnet-vlan [ ip-subnet-index ] ip ip-address { mask | mask-length } [ priority priority ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
priority priority Specifies the 802.1p priority The value is an integer that
of the VLAN associated ranges from 0 to 7. A larger
with an IP address or subnet. value indicates a higher
priority. The default value is
0.
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The ip-subnet-vlan command associates IP subnets with VLANs so that packets from
different subnets are transmitted in different VLANs. On a network, if only one service is
deployed on each subnet, you can associate IP subnets with VLANs to simplify VLAN
configuration. In addition, you can add, modify, and move users on subnets without changing
the VLAN configuration.
Follow-up Procedure
Add an interface to the VLAN and enable IP subnet-based VLAN assignment on the
interface.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
On the S1720GFR, S2720, S2750, S5720SI, S5720S-SI, S5700LI, S5710-X-LI, and S5700S-
LI, when the ip error-packet-check disable command is used to disable IP packet check, IP
subnet-based VLAN assignment and policy-based VLAN assignment do not take effect.
If you run the ip-subnet-vlan command multiple times in the same VLAN view, all the
specified IP subnets are associated with the VLAN.
NOTE
Example
# Associate VLAN 3 with network segment 10.10.10.0/24 so that the packets originated from
this segment can be transmitted in VLAN 3.
<HUAWEI> system-view
[HUAWEI] vlan 3
[HUAWEI-vlan3] ip-subnet-vlan ip 10.10.10.0 255.255.255.0
Related Topics
5.3.16 ip-subnet-vlan enable
5.3.6 display ip-subnet-vlan vlan
Format
ip-subnet-vlan enable
undo ip-subnet-vlan enable
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
IP subnets can be associated with VLANs so that packets from different subnets are
transmitted in different VLANs. On a network, if only one service is deployed on each subnet,
you can associate IP subnets with VLANs to simplify VLAN configuration. In addition, you
can add, modify, and move users on subnets without changing the VLAN configuration.
If IP subnet-based VLAN assignment is enabled on an interface:
l When receiving an untagged packet, the interface searches for the VLAN entry matching
the source IP address of the packet. If a matching entry is found, the interface forwards
the packet based on the matching VLAN ID and priority. If no matching entry is found,
the interface uses other matching rules to forward the packet.
l When receiving a tagged packet, the interface forwards the packet based on the port-
based VLAN configuration.
Precautions
On the S1720GFR, S2720, S2750, S5720SI, S5720S-SI, S5700LI, S5710-X-LI, and S5700S-
LI, when the ip error-packet-check disable command is used to disable IP packet check, IP
subnet-based VLAN assignment and policy-based VLAN assignment do not take effect.
The interface where IP subnet-based VLAN assignment is to be enabled is a hybrid interface.
When multiple VLAN assignment methods are configured on the device, the device assigns
VLANs based on priorities of these methods.
Example
# Enable IP subnet-based VLAN assignment.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] ip-subnet-vlan enable
Related Topics
5.3.15 ip-subnet-vlan
5.3.6 display ip-subnet-vlan vlan
Format
lnp disable
undo lnp disable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, LNP negotiation is enabled for all interfaces on a Layer 2 device. If an LNP-
capable Layer 2 device is connected to an LNP-incapable Layer 2 device, the LNP-capable
device keeps sending LNP packets, wasting bandwidth resources. To disable LNP negotiation
on all interfaces of a Layer 2 device, run the lnp disable command.
To disable LNP negotiation on a Layer 2 Ethernet interface, run the port negotiation disable
command in the interface view.
Precautions
l By default, LNP negotiation is enabled for all interfaces on a Layer 2 device. If you run
the lnp disable command in the system view to disable LNP negotiation on all interfaces
of a Layer 2 device. LNP negotiation cannot be enabled on a Layer 2 Ethernet interface
by running the undo port negotiation disable command in the interface view.
l The lnp disable command has no impact on services before the device restarts. After the
device restarts, the device can only forward packets from the VLANs specified by the
port default vlan command at Layer 2. The port default vlan 1 command is configured
by default, so only packets of VLAN 1 can be forwarded at Layer 2.
l For LNP negotiation to take effect, LNP negotiation must be enabled on both the device
and Layer 2 Ethernet interfaces.
Example
# Disable LNP negotiation on a device.
<HUAWEI> system-view
[HUAWEI] lnp disable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
mac-learning smart vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> enable
undo mac-learning smart vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> enable
Parameters
Parameter Description Value
vlan-id1 Specifies the start VLAN The value is an integer ranging from 1 to 4094.
ID.
to vlan-id2 Specifies the end VLAN The value is an integer ranging from 1 to 4094.
ID. The value of vlan-id2 must be greater than the
value of vlan-id1.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Enterprises usually adopt the ring or tree network topology to construct enterprise networks.
Both network topologies require that devices at the convergence layer be able to learn a large
number of MAC addresses in the case of enormous number of attached users.
As the number of attached users keeps growing, the specification of MAC entries supported
by the devices cannot meet the need. As a result, MAC addresses of some users cannot be
learned, and the packets of these users are broadcast in the VLAN, wasting network
bandwidth and affecting the network performance.
To prevent the preceding problem, you can run the mac-learning smart vlan enable
command in the system view to enable flexible MAC address learning in a VLAN. When less
than three interfaces in the VLAN are Up, the system automatically disables MAC address
learning in the VLAN, avoiding unnecessary resource consumption due to MAC address
learning.
Prerequisites
The command takes effect only when the following operations are complete.
1. Run the vlan command to create a VLAN. If the device supports the dynamic VLAN
function, you do not need to run the vlan command to create the VLAN.
2. Run the undo mac-address learning disable command in the VLAN view to enable
MAC address learning.
Precautions
The system will delete the MAC entries after enabling flexible MAC address learning in the
specified VLAN. When the number of Up interfaces in the VLAN exceeds 2, the system
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Configure the system to automatically disable MAC address learning in VLAN 10.
<HUAWEI> system-view
[HUAWEI] undo mac-learning smart vlan 10 enable
Related Topics
5.3.49 vlan
Function
The mac-vlan enable command enables MAC address-based VLAN assignment on an
interface.
The undo mac-vlan enable command disables MAC address-based VLAN assignment on an
interface.
By default, MAC address-based VLAN assignment is disabled on an interface.
Format
mac-vlan enable
undo mac-vlan enable
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If user devices move frequently on a network, you can use the mac-vlan mac-address
command to associate MAC addresses with VLANs. When a user moves, you do not need to
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
assign a VLAN to the user again. This improves security and access flexibility on the
network. To enable an interface to forward packets based on associations between MAC
addresses and VLANs, you must run the mac-vlan enable command to enable MAC address-
based assignment on the interface.
If MAC address-based assignment is enabled on an interface:
l When receiving an untagged packet, the interface searches for the VLAN entry matching
the source MAC address of the packet. If a matching entry is found, the interface
forwards the packet using the VLAN ID and priority in the entry. If no matching entry is
found, the interface uses other matching rules to forward the packet.
l When receiving a tagged packet, the interface forwards the packet based on the port-
based VLAN configuration.
Precautions
The interface where MAC address-based VLAN assignment is to be enabled is a hybrid
interface.
The MUX VLAN function and MAC address-based VLAN assignment cannot be enabled on
the same interface.
MAC address-based VLAN assignment and MAC address authentication cannot be enabled
on the same interface.
When multiple VLAN assignment methods are configured on the
S1720&S2700&S5700&S6720, the S1720&S2700&S5700&S6720 assigns VLANs based on
priorities of these methods.
Example
# Enable MAC address-based VLAN assignment on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] mac-vlan enable
Related Topics
5.3.20 mac-vlan mac-address
5.3.8 display mac-vlan
Format
mac-vlan mac-address mac-address [ mac-address-mask | mac-address-mask-length ]
[ priority priority ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
priority priority Specifies the 802.1p priority The value is an integer that ranges
of the VLAN to be associated from 0 to 7. A larger value indicates
with a MAC address. a higher priority. The default value is
0.
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If user devices move frequently on a network, you can use the mac-vlan mac-address
command to associate MAC addresses with VLANs. The S1720&S2700&S5700&S6720 then
assigns VLANs to packets based on source MAC addresses of packets. Before forwarding a
packet, the S1720&S2700&S5700&S6720 tags the packet with the VLAN associated with the
source MAC address. When a user moves, you do not need to assign a VLAN to the user
again. This improves security and access flexibility on the network.
Follow-up Procedure
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Add an interface to the VLAN and enable MAC address-based VLAN assignment on the
interface.
Precautions
l When the mac-vlan mac-address command with the same MAC address specified is
executed multiple times, MAC-VLAN entries take effect according to the longest match
principle. On the S5720HI, S5720EI, S6720EI, and S6720S-EI, MAC-VLAN entries
take effect according to the longest match principle only when the mask has 47 bits or
less than 47 bits, and the MAC-VLAN entry with the 48-bit mask has the lowest priority.
l After a MAC address is associated with a VLAN, it cannot be associated with other
VLANs.
l If you run the mac-vlan mac-address command multiple times in the same VLAN view,
all the specified MAC addresses are associated with the VLAN.
l The S5720HI, S5720EI, S5720SI, S5720S-SI, S6720EI, and S6720S-EI support a
maximum of 1024 MAC-VLAN entries and a maximum of 64 MAC-VLAN entries with
the mask. Other models support a maximum of 512 MAC-VLAN entries and a
maximum of 32 MAC-VLAN entries with the mask. The total number of MAC-VLAN
entries is the number of configured MAC-VLAN entries multiplied by the number of
interfaces where MAC-VLAN entries are delivered.
Example
# Associate MAC address 22-33-44 with VLAN 100.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100] mac-vlan mac-address 22-33-44
Related Topics
5.3.19 mac-vlan enable
5.3.8 display mac-vlan
5.3.21 management-vlan
Function
Using the management-vlan command, you can configure a VLAN as a management
VLAN.
Using the undo management-vlan command, you can cancel the configuration.
By default, no VLAN is configured as a management VLAN.
Format
management-vlan
undo management-vlan
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To use a network management system to manage multiple devices, create a VLANIF interface
on each device and configure a management IP address for the VLANIF interface. You can
then log in to a device and manage it using its management IP address. If a user-side interface
is added to the VLAN, users connected to the interface can also log in to the device. This
brings security risks to the device.
After a VLAN is configured as a management VLAN, no access interface or dot1q-tunnel
interface can be added to the VLAN. An access interface or a dot1q-tunnel interface is
connected to users. The management VLAN forbids users connected to access and dot1q-
tunnel interfaces to log in to the device, improving device performance.
Follow-up Procedure
Create a VLANIF interface corresponding to the VLAN and configure a management IP
address on the VLANIF interface.
Precautions
VLAN 1 cannot be configured as an mVLAN.
You can run the display vlan command to view the management VLAN configuration. In the
command output, the VLAN marked with a * is the management VLAN.
After a VLAN is configured as a management VLAN, only trunk and hybrid interfaces can be
added to the VLAN.
Example
# Configure VLAN 100 as a management VLAN.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100] management-vlan
Related Topics
5.3.13 display vlan
5.3.49 vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Using the undo mtu command, you can restore the default MTU of a VLAN interface.
By default, the MTU of a VLAN interface is 1500 bytes.
Format
mtu mtu
undo mtu
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MTU is short for maximum transmission unit. An MTU value determines the maximum
number of bytes each time a sender can send. If the size of packets exceeds the MTU
supported by a transit node or a receiver, the transit node or receiver fragments the packets or
even discards them, aggravating the network transmission load. To avoid this problem, set the
MTU value of the VLANIF interface.
Example
# Set the MTU of the VLANIF interface to 1492 bytes.
<HUAWEI> system-view
[HUAWEI] interface Vlanif 100
[HUAWEI-Vlanif100] mtu 1492
Related Topics
5.3.44 shutdown (VLANIF interface view)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
name vlan-name
undo name
Parameters
Parameter Description Value
vlan-name Specifies the VLAN The name is a string of 1 to 31 case-sensitive characters,
name. spaces not supported.When double quotation marks are
used around the string, spaces are allowed in the string.
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
If a device is configured with multiple VLANs for transmitting different services, you can
name the VLANs in their corresponding VLAN views to facilitate service management. In
this manner, you can check the deployed services of a VLAN by the VLAN name.
After VLANs are named, you can run the vlan vlan-name command in the system view to
enter the view of a specific VLAN, and then check or modify the configuration of the VLAN.
Example
# Create VLAN 2, which is used to transmit voice services, and name it as voice.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] name voice
Related Topics
5.3.49 vlan
Function
The ping mac command enables the system to monitor connectivity between the local device
and the destination device. This detection is called GMAC ping.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
The S1720GFR does not support this command.
Format
ping mac mac-address vlan vlan-id [ interface interface-type interface-number | -c count | -s
packetsize | -t timeout | -p priority-value ] *
Parameters
Parameter Description Value
mac-address Specifies the MAC address of the destination The destination node can
node. be a MEP or a MIP. The
value is in H-H-H format.
An MP's MAC address can be a bridge MAC An H is a hexadecimal
address or the MAC address of the interface number of 1 to 4 digits.
where the MP is configured. The MAC The value cannot be a
address depends on the configured MP broadcast or multicast
address model: MAC address.
l If the shared MP address model is
configured, an MP uses a bridge MAC
address as its own MAC address.
l If the independent MP address model is
configured, an MP uses the MAC address
of the interface where the MP is
configured.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
To use GMAC ping to detect connectivity, use the ping mac command.
Prerequisites
GMAC ping has been enabled using the ping mac enable command.
Precautions
A MEP is not required to initiate GMAC ping. The destination node can be not a MEP or
MIP. You can perform GMAC ping without configuring the MD, MA, or MEP on the source
device, intermediate device, and destination device. You must specify the VLAN on which the
destination node resides.
NOTE
The two devices must be configured with IEEE 802.1ag of the same version. If the local device is
configured with IEEE 802.1ag Draft 7 and the peer device is configured with IEEE Standard
802.1ag-2007, the ping mac command does not take effect. That is, the local device cannot ping the
peer device.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Ping the device with the MAC address of 0001-0300-0204. Send two ping packets with the
size of 112 bytes each. The device is in VLAN 10.
<HUAWEI> system-view
[HUAWEI] ping mac enable
[HUAWEI] ping mac 0001-0300-0204 vlan 10 -c 2 -s 112
Pinging 0001-0300-0204 with 112 bytes of data:
Reply from 0001-0300-0204: byte = 112 time = 9ms
Reply from 0001-0300-0204: byte = 112 time = 11ms
Packets: Sent = 2, Received = 2, Lost = 0 (0% Loss)
Minimum = 9ms, Maximum = 11ms, Average = 10ms
Reply from 0001-0300-0204: Size and response time of ping packets returned from the
byte = 112 time = 9ms destination device.
When the response time is less than 1 ms, "time < 1ms" is
displayed.
Packets: Sent = 2, Received Number of sent ping packets, number of received reply
= 2, Lost = 0 (0% Loss) packets, and number and percentage of discarded packets.
Related Topics
12.7.26 display oam global configuration
5.3.25 ping mac enable
Function
The ping mac enable command enables GMAC ping.
The undo ping mac enable command disables GMAC ping.
By default, GMAC ping is disabled.
NOTE
The S1720GFR does not support this command.
Format
ping mac enable
undo ping mac enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To implement the following functions, use the ping mac enable command:
Example
# Enable GMAC ping.
<HUAWEI> system-view
[HUAWEI] ping mac enable
Related Topics
12.7.26 display oam global configuration
5.3.24 ping mac
5.3.26 policy-vlan
Function
The policy-vlan command configures policy-based VLAN assignment by associating a MAC
address and IP address binding policy to a VLAN and setting the 802.1p priority of the
VLAN.
The undo policy-vlan command disassociates a MAC address and IP address binding policy
from a VLAN.
By default, a VLAN is not associated with any MAC address and IP address binding policy.
Format
policy-vlan mac-address mac-address ip ip-address [ interface interface-type interface-
number ] [ priority priority ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
priority priority Specifies the 802.1p priority The value is an integer that
of the VLAN associated ranges from 0 to 7. A larger
with the MAC address and value indicates a higher
IP address. priority. The default value is
0.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When receiving an untagged packet, an interface matches the source IP address and source
MAC address of the packet with the entries in the policy-based VLAN table.
l If a matching entry is found, the interface forwards the packet based on the matching
VLAN ID and priority.
l If no matching entry is found, the interface uses other matching rules to forward the
packet.
Policy-based VLAN assignment takes effect only for untagged packets, whereas tagged
packets are forwarded based on port-based VLANs.
Precautions
On the S1720GFR, S2720, S2750, S5720SI, S5720S-SI, S5700LI, S5710-X-LI, and S5700S-
LI, when the ip error-packet-check disable command is used to disable IP packet check, IP
subnet-based VLAN assignment and policy-based VLAN assignment do not take effect.
After a MAC address or IP address is associated with a VLAN, it cannot be associated with
other VLANs.
If you run the policy-vlan command multiple times in the same VLAN view, all the specified
IP addresses and MAC addresses are associated with the VLAN.
Example
# Bind MAC address 0-1-1 and IP address 10.1.1.1 to VLAN 2, and set the 802.1p priority of
the VLAN to 7.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] policy-vlan mac-address 0-1-1 ip 10.1.1.1 priority 7
Related Topics
5.3.9 display policy-vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
5.3.27 port
Function
The port command configures a VLAN as the default VLAN of an interface and adds the
interface to the VLAN.
The undo port command restores the default VLAN of an interface to the default setting.
Format
port interface-type { interface-number1 [ to interface-number2 ] } &<1-10>
Parameters
Parameter Description Value
Views
VLAN view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
All frames sent from a user device are untagged, and frames sent from a remote device may
also be untagged. However, the device processes only tagged frames. Therefore, the device
adds a tag to each untagged frame received by an interface. The default VLAN ID of the
interface can be added to untagged frames so that these frames are forwarded in the default
VLAN.
After the default VLAN is specified for an access interface or a QinQ interface, packets
passing through the interface are processed as follows:
l When the interface receives an untagged frame, it tags the frame with the default VLAN
ID.
l When the interface receives a tagged packet:
– If the interface is an access interface, it compares the VLAN ID of the packet with
the default VLAN ID. If they are the same, the interface forwards the packets;
otherwise, the interface discards the packets.
– If the interface is a QinQ interface, it adds an outer tag with the default VLAN ID to
the packet.
l Before forwarding tagged packets, access and QinQ interfaces remove VLAN tags from
the packets.
Prerequisites
The link-type of specified interfaces cannot be access or trunk before you run the port
command.
Precautions
A super VLAN cannot be configured as the default VLAN of interfaces.
The undo port command deletes the default VLAN of the specified interfaces only if the
current VLAN is the default VLAN of these interfaces.
If you run the port command multiple times in the same VLAN view, the VLAN is
configured as the default VLAN of all the specified interfaces.
You can also run the port default vlan command in the interface view to configure the
default VLAN for an interface. The two commands have the same function.
Example
# Configure VLAN 3 as the default VLAN of interfaces GE0/0/1 to GE0/0/4.
<HUAWEI> system-view
[HUAWEI] vlan 3
[HUAWEI-vlan3] port gigabitethernet 0/0/1 to 0/0/4
Related Topics
5.3.13 display vlan
5.3.34 port link-type
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
port default vlan vlan-id [ step step-number [ increased | decreased ] ]
undo port default vlan
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
step step-number Specifies that the interface The value is an integer that
[ increased | decreased ] added to an interface group ranges from 1 to 4093.
can be bound to VLANs
starting from the one
identified by vlan-id in an
ascending or descending
order at a step specified by
step-number.
increased specifies an
increase in the values of
VLAN IDs starting from the
one identified by vlan-id at a
step specified by step-
number to add the interfaces
to the VLANs. Whereas
decreased specifies a
decrease in the values of
VLAN IDs starting from the
one identified by vlan-id at a
step specified by step-
number to add the interfaces
to the VLANs.
For example, you can
configure increased, and set
vlan-id to 10 and step-
number to 20 in the port
default vlan command.
After this configuration,
interface 1 joins VLAN 10;
interface 2 joins VLAN 30...
By analogy, interface 10
joins VLAN 190.
NOTE
l This parameter can only be
used in the port group
view.
l When using step and vlan-
id in the command, ensure
that all interfaces added to
the VLAN are available.
l If this parameter is not
specified, all interfaces in
an interface group are
added into the same
VLAN, that is, VLAN
vlan-id.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
All frames sent from a user device are untagged, and frames sent from a remote device may
also be untagged. However, the device processes only tagged frames. Therefore, the device
adds a tag to each untagged frame received by an interface. The default VLAN ID of the
interface can be added to untagged frames so that these frames are forwarded in the default
VLAN.
After the default VLAN is specified for an access interface or a QinQ interface, packets
passing through the interface are processed as follows:
l When the interface receives an untagged frame, it tags the frame with the default VLAN
tag.
l When the interface receives a tagged packet:
– If the interface is an access interface, it compares the VLAN ID of the packet with
the default VLAN ID. If they are the same, the interface forwards the packets;
otherwise, the interface discards the packets.
– If the interface is a QinQ interface, it adds an outer tag with the default VLAN ID to
the packet.
l Before forwarding tagged packets, access and QinQ interfaces remove VLAN tags from
the packets.
Prerequisites
The interface type is negotiation-desirable, negotiation-auto, access or QinQ. If not, run the
port link-type command to change the interface type. On the interface where negotiation-
desirable or negotiation-auto is configured, the interface must be used as the access
interfaces so that the default VLAN configured by the port default vlan command takes
effect.
Precautions
l If the ID of a nonexistent VLAN is configured as the PVID, VLAN 1 is added to the
untagged packets. After the PVID is configured globally, the PVID of the interface is
changed to the configured one.
l You can also run the port command in the VLAN view to configure the default VLAN
of an interface. The two commands have the same function.
l A super VLAN cannot be configured as the default VLAN of interfaces.
l This command is invalid on a member interface of an Eth-Trunk.
l If you run the port default vlan command multiple times in the same interface view,
only the latest configuration takes effect.
l This configuration will be deleted automatically if the default VLAN is deleted in system
view.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Configure VLAN 3 (an existing VLAN) as the default VLAN of GE0/0/1 (an access
interface).
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type access
[HUAWEI-GigabitEthernet0/0/1] port default vlan 3
Related Topics
5.3.13 display vlan
5.3.27 port
5.3.34 port link-type
Format
port discard tagged-packet
undo port discard tagged-packet
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
All frames sent from user devices are untagged, so user-side interfaces on a switch should not
receive tagged frames. If a user connects a switching device to a user-side interface without
permission, the user-side interface may receive tagged frames. The port discard tagged-
packet command enables the user-side interface to discard untagged frames, preventing
unauthorized access.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
The port discard tagged-packet command cannot function when dot1q-tunnel interfaces are
configured on switches except the S5720HI.
Use this command only on interfaces connected to user devices. If you run this command on a
network-side interface, users in the same VLAN may fail to communicate.
Example
# Configure GE0/0/1 to discard incoming tagged frames.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port discard tagged-packet
Related Topics
2.1.9 display this
Function
The port hybrid pvid vlan command specifies the default VLAN ID of a hybrid interface.
The undo port hybrid pvid vlan command restores the default VLAN ID of a hybrid
interface to the default setting.
Format
port hybrid pvid vlan vlan-id
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
An interface may receive untagged and tagged frames, but the device processes only tagged
frames. Therefore, the device adds a tag to each untagged frame received by an interface. The
default VLAN ID of the interface can be added to untagged frames so that these frames are
forwarded in the default VLAN.
A hybrid interface processes Ethernet frames as follows:
l When the interface receives an untagged frame, it tags the frame with the default VLAN
ID. If the default VLAN ID is allowed by the interface, the interface accepts the frame.
Otherwise, the interface discards the frame.
l When the interface receives a tagged frame, it accepts the frame if the VLAN ID of the
frame is in the list of allowed VLAN IDs. Otherwise, the interface discards the frame.
l If the VLAN ID of a frame is allowed by the interface, the interface forwards the frame.
Precautions
If the ID of a nonexistent VLAN is configured as the PVID, VLAN 1 is added to the untagged
packets. After the PVID is configured globally, the PVID of the interface is changed to the
configured one.
This command is invalid on a member interface of an Eth-Trunk.
The port hybrid pvid vlan command only specifies the default VLAN for an interface but
does not add the interface to the default VLAN.
If you run the port hybrid pvid vlan command multiple times in the same interface view,
only the latest configuration takes effect.
This configuration will be deleted automatically if the default VLAN is deleted in system
view.
Example
# Specify VLAN 5 as the default VLAN of GE0/0/1.
<HUAWEI> system-view
[HUAWEI] vlan 5
[HUAWEI-vlan5] quit
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] port hybrid pvid vlan 5
Related Topics
5.3.38 port trunk pvid vlan
Function
The port hybrid tagged vlan command adds a hybrid interface to the specified VLANs.
Frames of the VLANs then pass through the hybrid interface in tagged mode.
The undo port hybrid vlan command removes a hybrid interface from the specified VLANs.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
port hybrid tagged vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
undo port hybrid [ tagged ] vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> | all }
( Port group view)port hybrid tagged vlan vlan-id3 [ step step-number [ increased |
decreased ] ]
( Port group view)undo port hybrid vlan vlan-id3 [ step step-number [ increased |
decreased ] ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
step step-number Specifies the step for the The value is an integer that
increase or decrease in the ranges from 1 to 4093.
value of the VLAN ID.
With this parameter
specified, the member ports
in a port group can be bound
to VLANs starting from the
one identified by vlan-id3 in
an ascending or descending
order at a step specified by
step-number. This facilitates
the subsequent user
configuration. For example:
A port group has 10 member
ports. You can configure
increased, and set vlan-id3
to 1 and step-number to 1 in
the port hybrid tagged
vlan command. After this
configuration, member port
1 joins VLAN 1; member
port 2 joins VLAN 2... By
analogy, member port 10
joins VLAN 10.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A hybrid interface can connect to either a user device or a switch. This command adds a
hybrid interface to VLANs in tagged mode so that the hybrid interface allows frames from the
VLANs to pass.
After a hybrid interface is added to VLANs in tagged mode, the interface forwards frames
without removing VLAN tags of frames.
Prerequisites
If an interface is not a hybrid interface, run the port link-type hybrid command to change the
interface type to hybrid.
Precautions
l This command is invalid on a member interface of an Eth-Trunk.
l A super VLAN cannot be specified in the command.
l If you run the port hybrid tagged vlan command multiple times in the same interface
view, the interface is added to all the specified VLANs.
Example
# Add GE0/0/1 to VLAN 3 to VLAN 5 in tagged mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] port hybrid tagged vlan 3 to 5
Related Topics
5.3.34 port link-type
5.3.32 port hybrid untagged vlan
Function
The port hybrid untagged vlan command adds a hybrid interface to the specified VLANs.
Frames of the VLANs then pass through the hybrid interface in untagged mode.
The undo port hybrid vlan command removes a hybrid interface from the specified VLANs.
By default, a hybrid interface is added to VLAN 1 in untagged mode.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
port hybrid untagged vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
undo port hybrid [ untagged ] vlan{ { vlan-id1 [ to vlan-id2 ] } &<1-10> | all }
( Port group view)port hybrid untagged vlan vlan-id3 [ step step-number [ increased |
decreased ] ]
( Port group view)undo port hybrid vlan vlan-id3 [ step step-number [ increased |
decreased ] ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
step step-number Specifies the step for the The value is an integer that
increase or decrease in the ranges from 1 to 4093.
value of the VLAN ID.
With this parameter
specified, the member ports
in a port group can be bound
to VLANs starting from the
one identified by vlan-id3 in
an ascending or descending
order at a step specified by
step-number. This facilitates
the subsequent user
configuration. For example:
A port group has 10 member
ports. You can configure
increased, and set vlan-id3
to 1 and step-number to 1 in
the port hybrid untagged
vlan command. After this
configuration, member port
1 joins VLAN 1; member
port 2 joins VLAN 2... By
analogy, member port 10
joins VLAN 10.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A hybrid interface can connect to either a user device or a switch. When a hybrid interface is
connected to a user device, it must be added to VLANs in untagged mode so that it sends
untagged frames.
After a hybrid interface is added to VLANs in untagged mode, the interface removes VLAN
tags of frames before sending frames.
Prerequisites
If an interface is not a hybrid interface, run the port link-type hybrid command to change the
interface type to hybrid.
Precautions
Example
# Add GE0/0/1 to VLAN 3 to VLAN 5 in untagged mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] port hybrid untagged vlan 3 to 5
Related Topics
5.3.34 port link-type
5.3.31 port hybrid tagged vlan
Function
The port hybrid vlan 1 command adds a Hybrid port to VLAN 1 in untagged mode.
The undo port hybrid vlan 1 command deletes a Hybrid port from VLAN 1.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
port hybrid vlan 1
undo port hybrid vlan 1
Parameters
None
Views
GE interface view, Ethernet interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A hybrid port can connect to either a user host or another switch. It allows the packets from
multiple VLANs to pass through, and removes VLAN tags from some packets on the
outbound interface. You can run the port hybrid vlan 1 command to add the Hybrid port to
the default VLAN 1 in Untagged mode.
Precautions
This command cannot be used for a physical interface that has been added to an Eth-Trunk
interface.
Example
# Add GE 0/0/1 to VLAN 1 in Untagged mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] port hybrid vlan 1
Related Topics
5.3.32 port hybrid untagged vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
port link-type { access | dot1q-tunnel | hybrid | trunk | negotiation-desirable |
negotiation-auto }
undo port link-type
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Access, hybrid, trunk, and dot1q-tunnel link types are statically configured, and the LNP
negotiation mode of negotiation-desirable or negotiation-auto is dynamically negotiated.
The interface where negotiation-desirable or negotiation-auto is configured is negotiated as
the access or trunk interface.
Characteristics of different interfaces are:
l An access interface connects to a user device. It can connect only to an access link, and
Ethernet frames transmitted on the access link are untagged. An access interface adds a
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
VLAN tag to packets and sets the VID field in the VLAN tag to the default VLAN ID.
The access link transmits only the packets with the default VLAN ID.
l A trunk interface connects to a switch and can connect only to a trunk link. A trunk
interface allows frames from multiple VLANs to pass.
l A hybrid interface can connect to either a user device or a switch, and it can connect to
an access link or a trunk link. A hybrid interface allows frames from multiple VLANs to
pass and can remove VLAN tags of outgoing frames.
l A QinQ interface connects to a switch and can process double-tagged frames.
l The interface configured with negotiation-desirable can actively send negotiation
packets, while the interface configured with negotiation-auto cannot actively send
negotiation packets. The interface where negotiation-desirable or negotiation-auto is
configured is negotiated as the access or trunk interface through LNP and added to a
VLAN. Table 5-48 describes the negotiation result when the local and remote ends use
different negotiation modes.
negotiate on: LNP negotiation is enabled. negotiate off: LNP negotiation is disabled.
N/A: The link type is uncertain.
Prerequisites
LNP has been enabled.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Follow-up Procedure
Add the interface to VLANs.
Precautions
This command is invalid on a member interface of an Eth-Trunk.
If you run the port link-type command multiple times in the same interface view, only the
latest configuration takes effect.
When using LNP negotiation, pay attention to the following points:
l If a Layer 2 Ethernet interface is Down, it does not participate in LNP negotiation.
l If the two ends of an Eth-Trunk link have different numbers of member interfaces, LNP
negotiation may fail.
l If the link type of the Layer 2 Ethernet interface is configured as access, hybrid, trunk, or
dot1q-tunnel using the port link-type command, LNP does not take effect on the
interface.
l The interface configured with negotiation-desirable or negotiation-auto is negotiated
as an access or trunk interface. By default, the negotiated access interface joins VLAN 1,
and the negotiated trunk interface allows all VLANs and uses default VLAN 1. 5.3.28
port default vlan and 5.3.37 port trunk allow-pass only-vlan can be simultaneously
used on the interface configured with negotiation-desirable or negotiation-auto. If the
interface is negotiated as an access interface, 5.3.28 port default vlan takes effect. If the
interface is negotiated as a trunk interface, 5.3.37 port trunk allow-pass only-vlan takes
effect.
Before changing the link type of an interface, you do not need to restore the default VLAN
configuration. However, if the link type of the interface is changed, the VLAN configuration
of the interface is deleted. Exercise caution when you perform this configuration.
There are limitations on the interface where negotiation-desirable or negotiation-auto is
configured:
l The sub-interface cannot be created.
l The MUX VLAN cannot be enabled.
l The voice VLAN in auto mode cannot be configured on the interface.
Dot1q-tunnel interfaces do not support voice VLAN.
Example
# Set the link type of GE0/0/1 to trunk.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
Related Topics
2.1.9 display this
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The port negotiation disable command disables LNP negotiation on a Layer 2 Ethernet
interface.
The undo port negotiation disable command enables LNP negotiation on a Layer 2 Ethernet
interface.
By default, LNP negotiation is enabled on a Layer 2 Ethernet interface.
Format
port negotiation disable
undo port negotiation disable
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, LNP negotiation is enabled for all interfaces on a Layer 2 device. If an LNP-
capable Layer 2 device is connected to an LNP-incapable Layer 2 device, the LNP-capable
device keeps sending LNP packets, wasting bandwidth resources. In this situation, you can
run the port negotiation disable command to disable LNP negotiation on the Layer 2
Ethernet interface connected to the LNP-incapable Layer 2 device.
To disable LNP negotiation on all interfaces of a Layer 2 device, run the lnp disable
command in the system view.
Prerequisites
The interface must be a layer 2 interface before using the port negotiation disable command.
Use the portswitch command to switch a layer 3 interface to a Layer 2 interface.
Precautions
By default, LNP negotiation is enabled for all interfaces on a Layer 2 device. If you run the
lnp disable command in the system view to disable LNP negotiation on all interfaces of a
Layer 2 device. LNP negotiation cannot be enabled on a Layer 2 Ethernet interface by
running the undo port negotiation disable command in the interface view.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
For LNP negotiation to take effect, LNP negotiation must be enabled on both the device and
Layer 2 Ethernet interfaces.
Example
# Disable LNP negotiation on a Layer 2 Ethernet interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port negotiation disable
Function
The port trunk allow-pass vlan command adds a trunk interface to the specified VLANs.
The undo port trunk allow-pass vlan command deletes a trunk interface from the specified
VLANs.
Format
port trunk allow-pass vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
(Port group view)port trunk allow-pass vlan vlan-id3 [ step step-number [ increased |
decreased ] ]
(Port group view)undo port trunk allow-pass vlan vlan-id3 [ step step-number [ increased |
decreased ] ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
step step-number Specifies the step for the The value is an integer that
increase or decrease in the ranges from 1 to 4093.
value of the VLAN ID.
With this parameter
specified, the member ports
in a port group can be bound
to VLANs starting from the
one identified by vlan-id3 in
an ascending or descending
order at a step specified by
step-number. This facilitates
the subsequent user
configuration. For example:
A port group has 10 member
ports. You can configure
increased, and set vlan-id3
to 1 and step-number to 1 in
the port trunk allow-pass
vlan command. After this
configuration, member port
1 joins VLAN 1; member
port 2 joins VLAN 2... By
analogy, member port 10
joins VLAN 10.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A trunk interface can join multiple VLANs and connects to a network device. To allow all
packets from one or multiple VLANs to pass through a trunk interface, the trunk interface
must be added to the VLANs using the port trunk allow-pass vlan command.
Prerequisites
Precautions
If a specified VLAN does not exist, the configuration does not take effect.
If you run the port trunk allow-pass vlan command multiple times in the same interface
view, the interface is added to all the specified VLANs.
Example
# Add GE0/0/1 to VLANs 10 to 30.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 to 30
Related Topics
5.3.13 display vlan
5.3.38 port trunk pvid vlan
Function
The port trunk allow-pass only-vlan command configures VLANs allowed by the interface
that is configured as a trunk interface through LNP negotiation.
The undo port trunk allow-pass only-vlan command restores the default VLANs allowed
by the interface that is configured as a trunk interface through LNP negotiation.
By default, if the Layer 2 Ethernet interface is negotiated as a trunk interface, the interface
allows all VLANs.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
port trunk allow-pass only-vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> | none }
undo port trunk allow-pass only-vlan
Parameters
Parameter Description Value
vlan-id1 [ to Specifies VLANs on a Layer 2 Ethernet interface so that the The value is
vlan-id2 ] interface forwards only packets for these VLANs after LNP an integer
negotiation. ranging
from 1 to
l vlan-id1 specifies the first VLAN. 4094.
l to vlan-id2 specifies the last VLAN. vlan-id2 must be
greater than or equal to vlan-id1. vlan-id2 and vlan-id1
specify a VLAN range.
l If to vlan-id2 is not specified, only the VLAN specified
by vlan-id1 can be configured for the Layer 2 Ethernet
interface.
In one port trunk allow-pass only-vlan command, a
maximum of 10 VLAN ranges can be specified using to.
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Link-type Negotiation Protocol (LNP) dynamically negotiates the link type of an Ethernet
interface. The negotiated link type can be access or trunk.
In routine maintenance, if the network administrator wants to update the VLANs on a Layer 2
Ethernet interface so that the interface forwards only packets for these VLANs after LNP
negotiation, perform the following operations in the corresponding interface view.
1. Run the port trunk allow-pass vlan all command to delete all VLANs from the Layer 2
Ethernet interface.
2. Run the port trunk allow-pass only-vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> |
none } to update VLANs on the Layer 2 Ethernet interface so that the interface forwards
only packets for these VLANs after LNP negotiation.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Prerequisites
The LNP function is supported on the Layer 2 Ethernet interface, and the Layer 2 Ethernet
interface is configured to work in auto-negotiation mode using the port link-type negotiation
command.
Example
# Configure VLANs 10 to 20 on the interface so that the interface forwards only packets for
these VLANs.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass only-vlan 10 to 20
Function
The port trunk pvid vlan command specifies the default VLAN for a trunk interface.
The undo port trunk pvid vlan command restores the default VLAN of a trunk interface to
the default setting.
Format
port trunk pvid vlan vlan-id
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
An interface may receive untagged and tagged frames, but the device processes only tagged
frames. Therefore, the device adds a tag to each untagged frame received by an interface. The
default VLAN ID of the interface can be added to untagged frames so that these frames are
forwarded in the default VLAN.
Follow-up Procedure
Precautions
If the ID of a nonexistent VLAN is configured as the PVID, VLAN 1 is added to the untagged
packets. After the PVID is configured globally, the PVID of the interface is changed to the
configured one.
The port trunk pvid vlan command only specifies the default VLAN of a trunk interface but
does not add the trunk interface to the default VLAN. A trunk interface forwards frames with
the default VLAN ID only after it is added to the default VLAN using the port trunk allow-
pass vlan command.
If you run the port trunk pvid vlan command multiple times in the same interface view, only
the latest configuration takes effect.
This configuration will be deleted automatically if the default VLAN is deleted in system
view.
Example
# Specify VLAN 5 as the default VLAN of GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk pvid vlan 5
Related Topics
5.3.34 port link-type
5.3.36 port trunk allow-pass vlan
5.3.39 protocol-transparent
Function
Using the protocol-transparent command, you can enable transparent transmission of
protocol packets in a VLAN.
Using the undo protocol-transparent command, you can disable transparent transmission of
protocol packets in a VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
S1720GFR No
S2720 No
S2750 No
S6700 Yes
Format
protocol-transparent
undo protocol-transparent
Parameters
None
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the device used as the gateway or Layer 2 switches is enabled with snooping functions
such as DHCP/IGMP/MLD snooping, the device needs to parse and process protocol packets
such as ARP, DHCP, and IGMP packets. That is, protocol packets received by an interface are
sent to the CPU for processing. The interface sends protocol packets without differentiating
VLANs. If the preceding functions are deployed, protocol packets from all VLANs are sent to
the CPU for processing.
To address this issue, deploy transparent transmission of protocol packets in VLANs where
protocol packets do not need to be processed. This function enables the device to
transparently transmit the protocol packets in the VLANs to other devices, which improves
the forwarding speed and efficiency.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The switch can transparently transmit the following protocol packets: CFM/ARP/BFD/
DHCP/DHCPV6/HTTP/IGMP/MLD/ND/PIM/PIMv6/PPPoE/TACACS.
Precautions
Before running the protocol-transparent command, ensure that IGMP snooping or MLD
snooping has been disabled in the VLAN. Otherwise, the configuration fails.
After the protocol-transparent command is executed in a VLAN view, the switch does not
participate in protocol calculation in this VLAN.
Example
# Enable transparent transmission of protocol packets in VLAN 100.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100] protocol-transparent
Related Topics
5.3.49 vlan
5.3.13 display vlan
5.3.40 protocol-vlan
Function
The protocol-vlan command associates a protocol with a VLAN.
Format
protocol-vlan [ protocol-index ] { at | ipv4 | ipv6 | ipx { ethernetii | llc | raw | snap } | mode
{ ethernetii-etype etype-id1 | llc dsap dsap-id ssap ssap-id | snap-etype etype-id2 } }
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
ethernetii-etype etype-id1 Specifies the protocol type The value ranges from
ID that matches the Ethernet 0x600 to ffff, excluding 800,
II encapsulation format. 809b, 8137, and 86dd.
dsap dsap-id Specifies the destination The value ranges from 0x0
service access point. to ff.
ssap ssap-id Specifies the source service The value ranges from 0x0
access point. to ff.
snap-etype etype-id2 Specifies the protocol type The value ranges from
ID that matches the SNAP 0x600 to ffff, excluding 800,
encapsulation format. 809b, 8137, and 86dd.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Add interfaces to the VLAN associated with protocols, and then associate the interfaces with
the VLAN.
Precautions
The control VLAN of an RRPPor ERPS ring cannot be associated with protocols.
The AppleTalk, IPv4, and IPv6 protocols can be associated with VLANs directly. When
associating other protocols with a VLAN, set the encapsulation format.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
When specifying the source and destination service access points, pay attention to the
following points:
l The dsap-id and ssap-id parameters cannot be set to 0xaa (indicating the SNAP
encapsulation format) simultaneously.
l The dsap-id and ssap-id parameters cannot be set to 0xe0 (indicating the LLC
encapsulation format) simultaneously.
l The dsap-id and ssap-id parameters cannot be set to 0xff (indicating the raw
encapsulation format) simultaneously.
If you run the protocol-vlan command multiple times in the same VLAN view, all the
specified protocols are associated with the VLAN.
Example
# Associate IPv4 with VLAN 3.
<HUAWEI> system-view
[HUAWEI] vlan 3
[HUAWEI-vlan3] protocol-vlan ipv4
Related Topics
5.3.41 protocol-vlan vlan
5.3.12 display protocol-vlan vlan
5.3.11 display protocol-vlan interface
Format
protocol-vlan vlan vlan-id { all | protocol-index1 [ to protocol-index2 ] } [ priority priority ]
undo protocol-vlan { all | vlan vlan-id { all | protocol-index1 [ to protocol-index2 ] } }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
priority priority Specifies the 802.1p priority The value is an integer that
of a VLAN. ranges from 0 to 7. A larger
value indicates a higher
priority. The default value is
0.
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Associate GE0/0/1 with VLAN 2, which is associated with the protocol with index 0.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] protocol-vlan vlan 2 0
Related Topics
5.3.40 protocol-vlan
5.3.12 display protocol-vlan vlan
5.3.11 display protocol-vlan interface
Format
reset lnp statistics [ interface interface-type interface-number ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To collect statistics about LNP packets for a specified period of time, run the reset lnp
statistics command to clear existing statistics and allow the system to recollect them.
Configuration Note
Cleared statistics on LNP packets cannot be restored. Exercise caution when running this
command.
Example
# Clear statistics about LNP packets.
<HUAWEI> reset lnp statistics interface gigabitethernet 0/0/1
Function
Using the reset vlan statistics command, you can clear traffic statistics in a specified VLAN.
Format
reset vlan vlan-id statistics
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command is used when you need to collect new packet statistics in a VLAN. After this
command is executed, the packet count in the VLAN becomes 0.
Prerequisites
The traffic statistics function has been enabled in the VLAN by using the statistic enable
(VLAN view) command.
Precautions
CAUTION
Traffic statistics cannot be restored after they are cleared. Exercise caution when you use the
command.
Example
# Clear traffic statistics in VLAN 3.
<HUAWEI> reset vlan 3 statistics
Related Topics
5.3.13 display vlan
5.3.45 statistic enable (VLAN view)
Format
shutdown
undo shutdown
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a VLANIF interface fails or is not needed, you can run the shutdown command on the
VLANIF interface.
Precautions
After the VLANIF interface is shut down, the interface status changes to Down even if
physical interfaces in the corresponding VLAN are Up.
After a VLANIF interface is shut down, none of the users that use the VLANIF interface
address as the gateway address can communicate at Layer 3. In addition, the VLANIF
interface address cannot be used in route calculation.
After a VLANIF interface is shut down, the dynamic ARP entry corresponding to the
VLANIF interface starts aging in the ARP table. If the VLANIF interface address is in a static
ARP entry, the ARP entry is not deleted.
Example
# Enable VLANIF 2.
<HUAWEI> system-view
[HUAWEI] interface vlanif 2
[HUAWEI-Vlanif2] undo shutdown
Related Topics
5.3.5 display interface vlanif
Function
The statistic enable command enables the traffic statistics function in a VLAN.
The undo statistic enable command disables the traffic statistics function in a VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
statistic enable
undo statistic enable
Parameters
None
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To check the network status or locate network faults, you can use the statistic enable
command to enable the traffic statistics function in a VLAN.
After the traffic statistics function is enabled in a VLAN, the device collects statistics on
unicast packets, broadcast packets, and broadcast packets transmitted in the VLAN.
Precautions
l Traffic statistics are accumulative and cannot be cleared by the system. To clear traffic
statistics in a VLAN, run the reset vlan statistics command in the VLAN.
l The traffic statistics function occupies system resources. If system resources are
insufficient, the configuration may fail. Disable this function when traffic statistics do
not need to be collected.
l After enabling the traffic statistics function in a VLAN, you can use the display vlan
vlan-id statistics command to view traffic statistics in the VLAN.
l On the S1720GFR, S2720, S5700LI, S5700S-LI, S5710-X-LI, S5720SI, S5720S-SI, and
S2750, if the traffic policy is bound to the traffic behavior containing traffic statistics and
is applied to an interface in the inbound direction, and the statistic enable command is
enabled in the VLAN that the interface joins, the statistic enable command cannot
collect statistics on packets in the inbound direction of the interface.
Example
# Enable the traffic statistics function in VLAN 100.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100] statistic enable
Related Topics
5.3.13 display vlan
5.3.43 reset vlan statistics
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
S1720GFR No
S2720 No
S2750 No
S6700 Yes
Format
statistic enable { both | inbound | outbound }
undo statistic enable { both | inbound | outbound }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
To check the network status or locate network faults, you can use the statistic enable
command to enable the traffic statistics function on VLANIF interfaces. The
S1720&S2700&S5700&S6720 then collects traffic statistics on the VLANIF interfaces.
Precautions
l When the traffic statistics function is enabled in a VLAN, this function cannot take effect
in the outbound direction of the VLANIF interface.
l After you run the undo statistic enable command on a VLANIF interface, the
S1720&S2700&S5700&S6720 stops collecting traffic statistics on the VLANIF
interface, and the collected traffic statistics are deleted.
l The S1720&S2700&S5700&S6720 uses ACL resources when collecting traffic
statistics. If the traffic statistics function is enabled on too many VLANIF interfaces,
other services may fail to obtain ACL resources.The device supports tranffic statistics on
a maximum of 100 VLANIF interface.
l Traffic statistics on VLANIF interfaces is unavailable for error packets.
l On the VLANIF interface enabled with the traffic statistics function, the packets such as
ping packets sent from the device cannot be counted.
Example
# Enable the traffic statistics function for incoming and outgoing traffic on the VLANIF
interface.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] statistic enable both
Related Topics
5.3.13 display vlan
Function
The trace mac command locates a link connectivity fault between the local device and the
destination device. The operation is called GMAC trace.
NOTE
The S1720GFR does not support this command.
Format
trace mac mac-address vlan vlan-id [ interface interface-type interface-number | -t timeout |
-h ]*
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
mac-address Specifies the MAC address of the destination node. The value is in H-H-H
The destination node can be a MEP or a MIP. format. An H is a
hexadecimal number
An MP's MAC address can be a bridge MAC of 1 to 4 digits. The
address or the MAC address of the interface where value cannot be a
the MP is configured. The MAC address depends broadcast or multicast
on the configured MP address model: MAC address.
l If the shared MP address model is configured,
an MP uses a bridge MAC address as its own
MAC address.
l If the independent MP address model is
configured, an MP uses the MAC address of the
interface where the MP is configured.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
To perform GMAC trace, run this command.
Prerequisites
GMAC trace has been enabled using the trace mac enable command.
Precautions
A MEP is not required to initiate GMAC trace. The destination node can be not a MEP or
MIP. The destination node can be not a MEP or MIP. That is, GMAC trace can be
implemented without configuring the MD, MA, or MEP on the source device, intermediate
device, and the destination device. All the intermediate devices can respond with an LTR.
NOTE
The two devices must be configured with IEEE 802.1ag of the same version. If the local device is
configured with IEEE 802.1ag Draft 7 and the peer device is configured with IEEE Standard
802.1ag-2007, the trace mac command does not take effect. That is, the connectivity fault cannot be
located.
-h is only supported by the device running IEEE Standard 802.1ag-2007.
Example
# Trace the destination device with the MAC address as aa99-6600-5600. The device belongs
to VLAN 2.
<HUAWEI> system-view
[HUAWEI] trace mac enable
[HUAWEI] trace mac aa99-6600-5600 vlan 2
Tracing the route to aa99-6600-5600 over a maximum of 255 hops:
Hops Ingress MAC Ingress Port Ingress Action Relay Action
Egress MAC Egress Port Egress Action
1 aa99-6600-5600 GigabitEthernet0/0/1 IngOK RlyHit
-- -- --
Info: Succeed in tracing the destination address aa99-6600-5600.
# Trace the destination device with the MAC address as 0025-9efb-923d. The device belongs
to VLAN 2.
<HUAWEI> system-view
[HUAWEI] trace mac enable
[HUAWEI] trace mac 0025-9efb-923d vlan 2 -h
Tracing the route to 0025-9efb-923d over a maximum of 255 hops:
Hops Host Name (IP Address)
Ingress MAC Ingress Port Ingress Action Relay Action
Egress MAC Egress Port Egress Action
1 173 (10.137.126.173)
0025-9efb-923d GigabitEthernet0/0/1 IngOK RlyHit
-- -- --
Info: Succeed in tracing the destination address 0025-9efb-923d.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
12.7.26 display oam global configuration
5.3.48 trace mac enable
Function
The trace mac enable command enables GMAC trace.
The undo trace mac enable command disables GMAC trace.
By default, GMAC trace is disable (except the S5720HI) .
NOTE
The S1720GFR does not support this command.
Format
trace mac enable
undo trace mac enable
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To implement the following functions, use the trace mac enable command:
Example
# Enable GMAC trace.
<HUAWEI> system-view
[HUAWEI] trace mac enable
Related Topics
12.7.26 display oam global configuration
5.3.47 trace mac
5.3.49 vlan
Function
The vlan command creates a VLAN and displays the VLAN view. If the VLAN exists, the
VLAN view is displayed.
Format
vlan vlan-id
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
vlan-id Specifies the VLAN ID. The value is an
integer ranging from
1 to 4094.
batch Configures VLANs in batches. -
vlan-id1 to vlan- Specifies range of VLANs to be configured in The vlan-id1 and
id2 batches: vlan-id2 are integers
ranging from 1 to
l vlan-id1 specifies the start VLAN ID. 4094.
l vlan-id2 specifies the end VLAN ID.
vlan-id2 must be greater than or equal to vlan-
id1. vlan-id1 and vlan-id2 define a range
together.
l If the parameter to vlan-id2 is not specified,
only the VLAN specified by vlan-id1 is
created.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To reduce broadcast domains and enhance security on a complex network, VLANs can be
created on the network to isolate the devices that do not need to communicate each other. The
vlan batch command creates multiple VLANs at one time, simplifying VLAN configuration.
Follow-up Procedure
Assign VLANs according to network requirements.
Precautions
VLAN 1 is the default VLAN, which cannot be deleted and does not need to be created.
The vlan command can be used to create a VLAN and enter the VLAN view. If a VLAN has
been created, the VLAN view is displayed after this command is used. The vlan command
multiple times creates multiple VLANs. If a VLAN has been created, using this command
cannot be used to create the same VLAN or modify the configurations of the VLAN.
The vlan batch command can be used to create multiple VLANs in batches. If a VLAN has
been created, using this command cannot be used to create the same VLAN or modify the
configurations of the VLAN. The vlan batch commands multiple times creates VLANs in
multiple batches.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Create VLAN 100 and enter the VLAN 100 view. If VLAN 100 exists, the VLAN 100 view
is displayed directly.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100]
Related Topics
5.3.13 display vlan
5.3.50 vlan configuration
Format
vlan vlan-id configuration
undo vlan vlan-id configuration
Parameters
Parameter Description Value
vlan-id Specifies the VLAN ID. The value is an integer ranging from 1 to 4094.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to the following scenarios:
l If you need to perform configurations in a VLAN without creating the VLAN on VCMP
clients, create the VLAN on the VCMP server and run the vlan configuration command
on VCMP clients to enter the VLAN configuration view.
l After a VLAN is deleted on the VCMP server, VCMP clients delete the local VLAN but
do not delete configurations in the VLAN. To delete or modify configurations in a
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
VLAN without creating the VLAN, run the vlan configuration command to enter the
VLAN configuration view to delete or modify configurations.
The vlan vlan-id configuration command completes the VLAN configuration when the
VLAN is not created.
Precautions
The vlan configuration command only enters the VLAN configuration view. Neither the
corresponding VLAN or configurations in the VLAN take effect. To make configurations in
the VLAN take effect, create the VLAN using the vlan command.
Example
# Enter the configuration view of VLAN 10.
<HUAWEI> system-view
[HUAWEI] vlan 10 configuration
[HUAWEI-vlan10]
Function
The vlan precedence command configures the device to preferentially use a VLAN
assignment mode when both MAC address-based and IP subnet-based VLAN assignment
modes are matched.
The undo vlan precedence command restores the default VLAN assignment mode on an
interface when both MAC address-based and IP subnet-based VLAN assignment modes are
matched.
S1720GFR No
S2720 No
S2750 No
S6700 Yes
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
vlan precedence { ip-subnet-vlan | mac-vlan }
undo vlan precedence
Parameters
Parameter Description Value
Views
system view, Ethernet interface view, GE interface view, XGE interface view, 40GE interface
view, Eth-Trunk interface view, port group view
NOTE
S5720SI and S5720S-SI supports the vlan precedence command only in the system view. Other
switches support the vlan precedence command only in the interface view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure all the VLAN assignment methods simultaneously on the
S1720&S2700&S5700&S6720. By default, the priority order of VLAN assignment methods
is: policy-based VLAN > MAC address-based > IP subnet-based > protocol-based > port-
based.
The vlan precedence command changes the priority order of MAC address-based VLAN
assignment and IP subnet-based VLAN assignment. For example, the vlan precedence ip-
subnet-vlan command makes IP subnet-based VLAN assignment take precedence over MAC
address-based VLAN assignment.
Currently, port-based VLAN assignment is used most widely.
Precautions
This command does not change the priority order of the other VLAN assignment methods.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Packets may be transmitted in a different VLAN after the priority order of MAC address-
based VLAN assignment and IP subnet-based VLAN assignment changes. This may cause a
traffic forwarding failure in the VLAN.
When the command is used on the S5720SI and S5720S-SI to adjust the priority, the
command is valid for MAC-VLAN entries with the mask and without the mask. The
command is valid for only MAC-VLAN entries without the mask on other models.
If you run the vlan precedence command multiple times in the same interface view, only the
latest configuration takes effect.
Example
# Specify that IP subnet-based VLAN assignment takes precedence over MAC address-based
VLAN assignment.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] vlan precedence ip-subnet-vlan
Related Topics
5.3.19 mac-vlan enable
5.3.8 display mac-vlan
5.3.20 mac-vlan mac-address
5.3.15 ip-subnet-vlan
5.3.16 ip-subnet-vlan enable
5.3.6 display ip-subnet-vlan vlan
Format
vlan statistics { by-bytes | by-packets }
undo vlan statistics { by-bytes | by-packets }
NOTE
Only the S1720GFR, S2720, S2750, S5700LI, S5700S-LI, S5710-X-LI, S5720SI, and S5720S-SI
support this command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To check the network status or locate network faults, you can use the statistic enable (VLAN
view) command to enable traffic statistics collection in VLANs.
After traffic statistics collection is enabled in a VLAN, the switch collects statistics on unicast
packets, broadcast packets, and broadcast packets transmitted in the VLAN.
The vlan statistics { by-bytes | by-packets } command configures whether traffic statistics
are collected by packet s or bytes.
Example
# Configure the system to collect VLAN traffic statistics by bytes.
<HUAWEI> system-view
[HUAWEI] vlan statistics by-bytes
Related Topics
5.3.45 statistic enable (VLAN view)
5.3.43 reset vlan statistics
Function
The vlan statistics interval command sets the interval for collecting VLAN traffic statistics.
The undo vlan statistics interval command restores the default interval for collecting VLAN
traffic statistics.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
vlan statistics interval interval-time
undo vlan statistics interval
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To check the network status or locate network faults, you can use the statistic enable (VLAN
view) command to enable traffic statistics collection in VLANs.
After traffic statistics collection is enabled in a VLAN, the S1720&S2700&S5700&S6720
collects statistics on unicast packets, broadcast packets, and broadcast packets transmitted in
the VLAN.
You can use the vlan statistics interval command to specify the interval at which traffic
statistics are collected.
Example
# Set the interval for collecting VLAN traffic statistics to 500 seconds.
<HUAWEI> system-view
[HUAWEI] vlan statistics interval 500
Related Topics
5.3.45 statistic enable (VLAN view)
5.3.43 reset vlan statistics
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo vlan vlan-name command deletes a VLAN with the specified VLAN name. After
the command is used, the VLAN name is also deleted.
Format
vlan vlan-name vlan-name
Parameters
Parameter Description Value
vlan-name Specifies the VLAN The name is a string of 1 to 31 case-sensitive characters,
name. spaces not supported.When double quotation marks are
used around the string, spaces are allowed in the string.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the name command is run to set a VLAN name, you can run the vlan vlan-name
command in the system view to enter the corresponding VLAN view.
Assume that a device has multiple VLANs and each VLAN has a name. If you need to delete
the VLAN that is used to transmit voice services but cannot remember the ID of the VLAN,
you can run the undo vlan vlan-name command to delete the VLAN by inputting the VLAN
name.
Prerequisites
Before running the vlan vlan-name command, ensure that the name command is run to set
the VLAN name.
Precautions
When you run the undo vlan vlan-name command to delete a VLAN, services configured for
the VLAN are deleted at the same time. The deleted services cannot be restored even if you
recreate the VLAN. Therefore, exercise caution when running the undo vlan vlan-name
command.
Example
# Enter the view of the VLAN named user1.
<HUAWEI> system-view
[HUAWEI] vlan vlan-name user1
[HUAWEI-vlan2]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.3.23 name (VLAN view)
Function
The access-vlan command adds one or more sub-VLANs to a super-VLAN.
The undo access-vlan command removes one or more sub-VLANs from a super-VLAN.
By default, no sub-VLAN is added to the super-VLAN.
S1720GFR No
S2720 No
S2750 No
S6700 Yes
Format
access-vlan { vlan-id1 [ to vlan-id2 ] } &<1-10>
undo access-vlan { vlan-id1 [ to vlan-id2 ] } &<1-10>
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The VLAN technology is widely applied to packet switching networks because it controls
broadcast domains flexibly and is easy to deploy. Generally, a Layer 3 switch usually uses a
Layer 3 logical interface in each VLAN to allow user hosts in different broadcast domains to
communicate. This wastes IP addresses. The VLAN aggregation function is introduced to
save IP addresses while implementing communication between VLANs.
Prerequisites
The super-VLAN has been configured using the aggregate vlan command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Before running the access-vlan command, delete VLANIF interfaces from all the sub-
VLANs.
Follow-up Procedure
Precautions
If you run the access-vlan command multiple times in the same VLAN view, all the specified
VLANs are added to the super-VLAN.
Example
# Add sub-VLAN20 and sub-VLAN30 to super-VLAN2.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] aggregate-vlan
[HUAWEI-vlan2] access-vlan 20 30
Related Topics
5.4.2 aggregate-vlan
5.3.49 vlan
5.3.13 display vlan
5.3.14 interface vlanif
6.1.1 ip address
6.2.19 arp-proxy inter-sub-vlan-proxy enable
5.4.2 aggregate-vlan
Function
The aggregate-vlan command configures a VLAN as a super-VLAN.
S1720GFR No
S2720 No
S2750 No
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
S6700 Yes
Format
aggregate-vlan
undo aggregate-vlan
Parameters
None
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The VLAN technology is widely applied to packet switching networks because it controls
broadcast domains flexibly and is easy to deploy. Generally, a Layer 3 switch usually uses a
Layer 3 logical interface in each VLAN to allow user hosts in different broadcast domains to
communicate. This wastes IP addresses. The VLAN aggregation function is introduced to
save IP addresses while implementing communication between VLANs.
The VLAN aggregation function associates a super-VLAN with multiple sub-VLANs. A
VLANIF interface can be created in the super-VLAN and be configured with an IP address.
Interfaces in all the sub-VLANs use this IP address as the gateway address to communicate
with interfaces in other VLANs. This reduces subnet IDs, subnet default gateway addresses,
and subnet broadcast IP addresses. In a word, the VLAN aggregation function allows different
broadcast domains to use the same subnet address, implements flexible addressing, and saves
IP addresses.
Prerequisites
Before configuring a VLAN as a super-VLAN, delete all physical interfaces from the VLAN.
Precautions
VLAN 1 cannot be configured as a super-VLAN.
If a VLAN has been configured as a guest VLAN, it cannot be configured as a super-VLAN.
The super-VLAN must be different from all its sub-VLANs.
After a VLAN is configured as a super-VLAN, no physical interface can be added to the
VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Configure VLAN 2 as a Super-VLAN.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] aggregate-vlan
Related Topics
5.3.13 display vlan
5.4.1 access-vlan
Function
The display sub-vlan command displays information about sub-VLAN entries.
S1720GFR No
S2720 No
S2750 No
S6700 Yes
Format
display sub-vlan [ vlan-id ]
Parameters
Views
All views
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
1: Monitoring level
Usage Guidelines
After VLAN aggregation is configured on a device, you can determine whether VLAN
aggregation has been correctly configured by running the display sub-vlan command to
check information about sub-VLANs and check which sub-VLANs are contained in a super-
VLAN.
When using the display sub-vlan command, note the following issues:
l If vlan-id is not specified, information about all sub-VLANs on the device is displayed.
l If vlan-id is specified, information about a specific sub-VLAN is displayed.
Before running the display sub-vlan command, ensure that the device is configured with sub-
VLANs. Otherwise, no command output is displayed.
Example
# Display information about all sub-VLANs.
<HUAWEI> display sub-vlan
VLAN ID Super-VLAN
------------------------
10 40
20 40
30 40
Item Description
Related Topics
5.3.49 vlan
5.4.1 access-vlan
5.4.2 aggregate-vlan
Function
The display super-vlan command displays information about super-VLAN entries.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
S1720GFR No
S2720 No
S2750 No
S6700 Yes
Format
display super-vlan [ vlan-id ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After VLAN aggregation is configured on a device, you can determine whether VLAN
aggregation has been correctly configured by running the display super-vlan command to
check information about super-VLANs and check which sub-VLANs are contained in a
super-VLAN.
When using the display super-vlan command, note the following issues:
l If vlan-id is not specified, information about all super-VLANs on the device is displayed.
l If vlan-id is specified, information about a specific super-VLAN is displayed.
Before running the display super-vlan command, ensure that the device is configured with
super-VLANs. Otherwise, no command output is displayed.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display information about all super-VLANs.
<HUAWEI> display super-vlan
VLAN ID Sub-VLAN
------------------------
40 10 20 30
Related Topics
5.3.49 vlan
5.4.1 access-vlan
5.4.2 aggregate-vlan
Function
Using the display mux-vlan command, you can view the MUX VLAN configuration.
Format
display mux-vlan
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
After configuring the MUX VLAN function, you can use the display mux-vlan command to
verify the configuration. This command displays the principal VLAN ID, subordinate VLAN
ID, VLAN type, and interfaces in each VLAN.
Precautions
If no MUX VLAN is configured by using the mux-vlan command, the display mux-vlan
command does not display any information.
Example
# Display the MUX VLAN configuration.
<HUAWEI> display mux-vlan
Principal Subordinate Type Interface
-----------------------------------------------------------------------------
100 - principal
100 120 separate GigabitEthernet0/0/1
100 130 group GigabitEthernet0/0/2
100 140 group GigabitEthernet0/0/3
-----------------------------------------------------------------------------
Item Description
Related Topics
5.5.2 mux-vlan
5.3.49 vlan
5.5.5 subordinate separate
5.5.4 subordinate group
5.5.2 mux-vlan
Function
The mux-vlan command configures a VLAN as a principal VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
mux-vlan
undo mux-vlan
Parameters
None
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
All employees and customers of an enterprise can access servers on the enterprise network.
The enterprise allows employees to communicate but expects to isolate customers from one
another. To meet this requirement, the enterprise can add the servers to a VLAN, add
employees to another VLAN, and add each customer to a different VLAN. This wastes
VLAN IDs and increases workload on VLAN configuration.
The MUX VLAN function is introduced to solve this problem. The MUX VLAN function
isolates Layer 2 traffic between interfaces in a VLAN. This function involves the following
VLANs:
l Principal VLAN: allows member interfaces to communicate with each other and with
interfaces in subordinate VLANs.
l Subordinate VLAN
– Subordinate separate VLAN: allows member interfaces to communicate with only
interfaces in the principal VLAN. An interface in a subordinate separate VLAN
cannot communicate with interfaces in the same VLAN or other subordinate
VLANs.
– Subordinate group VLAN: allows member interfaces to communicate with
interfaces in the same VLAN and interfaces in the principal VLAN. An interface in
a subordinate group VLAN cannot communicate with interfaces in other
subordinate VLANs.
According to features of the preceding VLANs, the enterprise can add the servers to the
principal VLAN, add employees to a subordinate group VLAN, and add customers to a
subordinate separate VLAN. Customers are then allowed to access the servers but isolated
from one another. This saves VLAN IDs on the enterprise network and facilitates network
management.
Prerequisites
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Follow-up Procedure
Configure subordinate VLANs for the principal VLAN and enable the MUX VLAN function
on interfaces.
Precautions
If a VLAN has been configured as a principal VLAN, it cannot be used to configure Super
VLAN, Sub VLAN, VLAN mapping, or VLAN stacking.
Example
# Configure VLAN 5 as a principal VLAN.
<HUAWEI> system-view
[HUAWEI] vlan 5
[HUAWEI-vlan5] mux-vlan
Related Topics
5.5.1 display mux-vlan
5.5.3 port mux-vlan enable
5.5.5 subordinate separate
5.5.4 subordinate group
Function
The port mux-vlan enable command enables the MUX VLAN function on an interface.
The undo port mux-vlan enable command disables the MUX VLAN function on an
interface.
Format
port mux-vlan enable vlan vlan-id
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The MUX VLAN function isolates Layer 2 traffic between interfaces in a VLAN. This
function involves a MUX VLAN and several subordinate VLANs. Subordinate VLANs are
classified into subordinate group VLANs and subordinate separate VLANs. Subordinate
VLANs can communicate with the principal VLAN but cannot communicate with each other.
Interfaces in a subordinate group VLAN can communicate with each other, and interfaces in a
subordinate separate VLAN are isolated from each other.
The MUX VLAN function takes effect only after it is enabled on an interface.
Prerequisites
Before enabling the MUX VLAN function, ensure that the following operations have been
performed:
l The port has been added to a principal or subordinate VLAN as an access, hybrid, or
trunk interface.
l The port can allow multiple common VLANs, but can join only one MUX VLAN.
Precautions
l Disabling MAC address learning or limiting the number of learned MAC addresses on
an interface affects the MUX VLAN function on the interface.
l The MUX VLAN and port security functions conflict on an interface. That is, the port-
security enable and port mux-vlan enable vlan vlan-id commands cannot be used on
the same interface.
l The MUX VLAN and MAC address authentication conflict on an interface; therefore,
the port mux-vlan enable vlan vlan-id and mac-authen command cannot be used on
the same interface.
l The MUX VLAN and 802.1x authentication conflict on an interface; therefore, the port
mux-vlan enable vlan vlan-id and dot1x enable command cannot be used on the same
interface.
l You can create a VLANIF interface for a principal VLAN, but cannot create a VLANIF
interface for a subordinate group VLAN or separate VLAN.
l The port mux-vlan enable command is not supported on a negotiation-auto or
negotiation-desirable port.
l When the interface is enabled with MUX VLAN and configured with the PVID using the
port trunk pvid vlan command, do not configure the PVID as the ID of the principal
VLAN or subordinate VLAN of the MUX VLAN. For example, VLAN 10 is the
principal VLAN, VLAN 11 is a subordinate group VLAN, and VLAN 12 is a
subordinate separate VLAN. After the port mux vlan enable 10 command is used on
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
the interface to enable MUX VLAN, do not run the port trunk pvid vlan command to
set the PVID to VLAN 11 or VLAN 12.
Example
# Enable the MUX VLAN function in VLAN 2 on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] port mux-vlan enable vlan 2
Related Topics
5.5.1 display mux-vlan
5.5.2 mux-vlan
Function
The subordinate group command configures subordinate group VLANs for a principal
VLAN.
The undo subordinate group command removes subordinate group VLANs from a principal
VLAN.
By default, a principal VLAN does not have any subordinate group VLAN.
Format
subordinate group { vlan-id1 [ to vlan-id2 ] } &<1-10>
Parameters
Parameter Description Value
Views
VLAN view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
All employees and customers of an enterprise can access servers on the enterprise network.
The enterprise allows employees to communicate but expects to isolate customers from one
another. To meet this requirement, the enterprise can add the servers to a VLAN, add
employees to another VLAN, and add each customer to a different VLAN. This wastes
VLAN IDs and increases workload on VLAN configuration.
The MUX VLAN function is introduced to solve this problem. The MUX VLAN function
isolates Layer 2 traffic between interfaces in a VLAN. This function involves the following
VLANs:
l Principal VLAN: allows member interfaces to communicate with each other and with
interfaces in subordinate VLANs.
l Subordinate VLAN
– Subordinate separate VLAN: allows member interfaces to communicate with only
interfaces in the principal VLAN. An interface in a subordinate separate VLAN
cannot communicate with interfaces in the same VLAN or other subordinate
VLANs.
– Subordinate group VLAN: allows member interfaces to communicate with
interfaces in the same VLAN and interfaces in the principal VLAN. An interface in
a subordinate group VLAN cannot communicate with interfaces in other
subordinate VLANs.
According to features of the preceding VLANs, the enterprise can add the servers to the
principal VLAN, add employees to a subordinate group VLAN, and add customers to a
subordinate separate VLAN. Customers are then allowed to access the servers but isolated
from one another. This saves VLAN IDs on the enterprise network and facilitates network
management.
After interfaces using by employees are added to the subordinate group VLAN, employees
can access servers of the enterprise and communicate with one another.
Prerequisites
The specified subordinate group VLANs are not super-VLANs and do not have any VLANIF
interface.
Before configuring a VLAN as a subordinate group VLAN, run the undo subordinate group
command to delete all its member interfaces.
Follow-up Procedure
Add interfaces to subordinate group VLANs and enable the MUX VLAN function on the
interfaces.
Precautions
Subordinate VLANs must be different from the principal VLAN.
A VLAN cannot be configured as a subordinate group VLAN and a subordinate separate
VLAN simultaneously.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If you run the subordinate group command multiple times in the same VLAN view, all the
specified VLANs are configured as subordinate group VLANs.
A subordinate group VLAN cannot be used to configure the VLANIF interface, Super-
VLAN, Sub-VLAN, VLAN mapping, or VLAN stacking.
Example
# Configure VLAN 7 as the subordinate group VLAN of VLAN 5.
<HUAWEI> system-view
[HUAWEI] vlan 5
[HUAWEI-vlan5] subordinate group 7
Related Topics
5.5.1 display mux-vlan
5.5.5 subordinate separate
5.5.3 port mux-vlan enable
Function
The subordinate separate command configures a subordinate separate VLAN for a principal
VLAN.
The undo subordinate separate command removes the subordinate separate VLAN from a
principal VLAN.
By default, a principal VLAN does not have any subordinate separate VLAN.
Format
subordinate separate vlan-id
Parameters
Parameter Description Value
Views
VLAN view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
All employees and customers of an enterprise can access servers on the enterprise network.
The enterprise allows employees to communicate but expects to isolate customers from one
another. To meet this requirement, the enterprise can add the servers to a VLAN, add
employees to another VLAN, and add each customer to a different VLAN. This wastes
VLAN IDs and increases workload on VLAN configuration.
The MUX VLAN function is introduced to solve this problem. The MUX VLAN function
isolates Layer 2 traffic between interfaces in a VLAN. This function involves the following
VLANs:
l Principal VLAN: allows member interfaces to communicate with each other and with
interfaces in subordinate VLANs.
l Subordinate VLAN
– Subordinate separate VLAN: allows member interfaces to communicate with only
interfaces in the principal VLAN. An interface in a subordinate separate VLAN
cannot communicate with interfaces in the same VLAN or other subordinate
VLANs.
– Subordinate group VLAN: allows member interfaces to communicate with
interfaces in the same VLAN and interfaces in the principal VLAN. An interface in
a subordinate group VLAN cannot communicate with interfaces in other
subordinate VLANs.
According to features of the preceding VLANs, the enterprise can add the servers to the
principal VLAN, add employees to a subordinate group VLAN, and add customers to a
subordinate separate VLAN. Customers are then allowed to access the servers but isolated
from one another. This saves VLAN IDs on the enterprise network and facilitates network
management.
After interfaces using by customers are added to the subordinate separate VLAN, customers
can neither communicate with each other nor access servers of the enterprise.
Prerequisites
The specified subordinate separate VLANs are not super-VLANs and do not have any
VLANIF interface.
Before configuring a VLAN as a subordinate separate VLAN, run the undo subordinate
separate command to delete all its member interfaces.
Follow-up Procedure
Add interfaces to the subordinate separate VLAN and enable the MUX VLAN function on the
interfaces.
Precautions
Subordinate VLANs must be different from the principal VLAN.
A VLAN cannot be configured as a subordinate group VLAN and a subordinate separate
VLAN simultaneously.
A principal VLAN can be configured with only one subordinate separate VLAN. Before
configuring another VLAN as the subordinate separate VLAN, run the undo subordinate
separate command to delete the previous one.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
A subordinate separate VLAN cannot be used to configure the VLANIF interface, VLAN
mapping, VLAN stacking, Super-VLAN, or Sub-VLAN.
Example
# Configure VLAN 6 as the subordinate separate VLAN of VLAN 5.
<HUAWEI> system-view
[HUAWEI] vlan 5
[HUAWEI-vlan5] subordinate separate 6
Related Topics
5.5.1 display mux-vlan
5.5.4 subordinate group
5.5.3 port mux-vlan enable
Function
The arp broadcast enable command enables ARP broadcast on a VLAN tag termination sub-
interface.
The undo arp broadcast enable command disables ARP broadcast on a VLAN tag
termination sub-interface.
Format
arp broadcast enable
NOTE
Parameters
None
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view, Eth-Trunk sub-
interface view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
VLAN tag termination sub-interfaces discard broadcast packets after receiving the packets. To
permit a VLAN tag termination sub-interface to forward broadcast packets, run the arp
broadcast enable command on the sub-interface to enable ARP broadcast.
Configuration Impact
When IP packets need to be sent from a VLAN tag termination sub-interface:
l The system discards IP packets when ARP broadcast is not enabled on the VLAN tag
termination sub-interface.
l The system tags an ARP broadcast packet and forwards it through the VLAN tag
termination sub-interface when ARP broadcast is enaled run on the VLAN tag
termination sub-interface.
Precautions
When you enable or disable ARP broadcast on a VLAN tag termination sub-interface, the
routing status of the sub-interface becomes Down and then Up. This may result in route
flapping on the entire network, affecting services.
Example
# Enable ARP broadcast on XGigabitEthernet0/0/1.1.
<HUAWEI> system-view
[HUAWEI] vcmp role silent
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-XGigabitEthernet0/0/1] quit
[HUAWEI] interface xgigabitethernet 0/0/1.1
[HUAWEI-XGigabitEthernet0/0/1.1] dot1q termination vid 10
[HUAWEI-XGigabitEthernet0/0/1.1] arp broadcast enable
Format
display dot1q information termination [ interface interface-type interface-number
[.subinterface-number ] ]
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this configuration.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring dot1q termination on sub-interfaces, run the display dot1q information
termination command to view the sub-interfaces where dot1q termination is configured and
configuration of the dot1q sub-interfaces.
Example
# Display the configuration of all dot1q sub-interfaces.
<HUAWEI> display dot1q information termination
XGigabitEthernet0/0/1.3
Total QinQ Num: 1
dot1q termination vid 3
Total vlan-group Num: 0
Item Description
Total QinQ Num Number of QinQ entries configured for user packets on a
sub-interface.
Related Topics
5.6.4 dot1q termination vid
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display qinq information { termination | stacking | mapping } [ interface interface-type
interface-number [.subinterface-number ] ]
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this configuration.
Parameters
Parameter Description Value
termination Displays all the sub-interfaces configured with -
QinQ termination.
stacking Displays all the sub-interfaces configured with -
QinQ stacking.
mapping Displays all the sub-interfaces configured with -
QinQ mapping.
interface interface- Displays whether all the sub-interfaces of the -
type interface- specified main interface are configured with QinQ
number termination, QinQ stacking, or QinQ mapping.
interface-type specifies the interface type.
interface-number specifies the number of the main
interface.
subinterface-number Specifies the number of a sub-interface. The value is an
integer that
ranges from 1
to 4096.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring QinQ termination, QinQ stacking, and QinQ mapping, run the display qinq
information command to view the configuration and the sub-interfaces configured with these
functions.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
When a large number of QinQ termination, QinQ stacking, and QinQ mapping entries are
configured, it is recommended that you specify a QinQ function, a main interface, a sub-
interface, or a pipe operator (|) to filter the output. Otherwise, too much information is
displayed, which has the following negative effects:
l The displayed information is updated continuously on the display terminal and the
required information cannot be obtained.
l The system traverses and retrieves information for a long time. As a result, the system
does not respond to any request.
l If you specify only termination in the command, all sub-interfaces configured with
QinQ termination are displayed.
l If you specify termination and interface interface-type interface-number, the sub-
interface configured with QinQ termination on the specified main interface is displayed.
l If you specify termination and interface interface-type interface-number.subinterface-
number, the specified sub-interface configured with QinQ termination is displayed.
l If you specify only stacking in the command, all sub-interfaces configured with QinQ
stacking are displayed.
l If you specify stacking and interface interface-type interface-number, the sub-interface
configured with QinQ stacking on the specified main interface is displayed.
l If you specify stacking and interface interface-type interface-number.subinterface-
number, the specified sub-interface configured with QinQ stacking is displayed.
l If you specify only mapping in the command, all sub-interfaces configured with QinQ
mapping are displayed.
l If you specify mapping and interface interface-type interface-number, the sub-interface
configured with QinQ mapping on the specified main interface is displayed.
l If you specify mapping and interface interface-type interface-number.subinterface-
number, the specified sub-interface configured with QinQ mapping is displayed.
Example
# Display all the sub-interfaces configured with QinQ termination.
<HUAWEI> display dot1q information termination
XGigabitEthernet0/0/1.30
Total QinQ Num: 1
qinq termination pe-vid 300 ce-vid 200
Total vlan-group Num: 0
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Total QinQ Num Number of QinQ entries configured for user packets on a
sub-interface.
Related Topics
5.6.5 qinq termination pe-vid ce-vid
Function
The dot1q termination vid command sets the single VLAN ID for Dot1q termination on a
sub-interface.
The undo dot1q termination vid command deletes the single VLAN ID for Dot1q
termination on a sub-interface.
By default, the single VLAN ID for Dot1q termination is not set on a sub-interface.
Format
dot1q termination vid low-pe-vid [ to high-pe-vid ]
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this configuration.
Parameters
Parameter Description Value
low-pe-vid Specifies the minimum value The value is an integer that ranges
of the VLAN tag in user from 2 to 4094.
packets.
high-pe-vid Specifies the maximum value The value is an integer that ranges
of the VLAN tag in user from 2 to 4094.
packets.
The value of high-pe-vid
must be greater than or equal
to the value of low-pe-vid.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view, Eth-Trunk sub-
interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
l Communication between VLANs
VLANs are widely used because they can separate Layer 2 packets. A physical LAN is
divided into multiple logical broadcast domains. Hosts in the same VLAN can
communicate with each other but the hosts of different VLANs cannot. The Layer 3
routing technology is used for communication between hosts of different VLANs in the
following two methods:
– Through the VLANIF interface on the Layer 3 switch.
– Through the Layer 3 Ethernet interface on the Layer 3 switch.
However, when a traditional Layer 3 Ethernet interface receives VLAN packets, the
VLAN packets are discarded. To enable communication between hosts of different
VLANs, you can create an Ethernet sub-interface on the Layer 3 Ethernet interface
and enable QinQ termination on the sub-interface to remove the tag from the VLAN
packet.
l Communication between a LAN and a WAN
Most packets on a LAN have VLAN tags, but some WAN protocols such as ATM, FR,
and PPP, cannot identify VLAN packets. To send a VLAN packet from LAN to WAN,
the device records VLAN information in the packet, removes the VLAN tag, and
forwards the packet.
Based on the number of tags, VLAN packets can be classified into Dot1q packets and QinQ
packets. A Dot1q packet carries a single-layer VLAN tag and a QinQ packet carries a double-
layer VLAN tag. Accordingly, there are two VLAN tag termination modes:
l Dot1q termination, which terminates tags carried in Dot1q packets
To configure Dot1q termination, run the dot1q termination vid command.
l QinQ termination, which terminates tags carried in QinQ packets.
To configure QinQ termination, run the qinq termination pe-vid ce-vid command in the
sub-interface view.
After the dot1q termination vid command is run, the sub-interface for VLAN tag
termination processes the packet in the following procedures:
l The sub-interface removes the tag in the VLAN packet when receiving the packet and
forwards the packet on Layer 3. The outbound interface determines whether the
forwarded VLAN packet carries tags.
l The sub-interface adds VLAN information to the packet and then sends the packet.
Precautions
l The tag values of the user packet received by the sub-interface must be in the range of
low-pe-vid to high-pe-vid specified in the command; otherwise, the packet is discarded.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Set the encapsulation mode on XGigabitEthernet0/0/1.1 to Dot1q and allow the packets
with the VLAN tag 100 to pass through.
<HUAWEI> system-view
[HUAWEI] vcmp role silent
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-XGigabitEthernet0/0/1] quit
[HUAWEI] interface xgigabitethernet 0/0/1.1
[HUAWEI-XGigabitEthernet0/0/1.1] dot1q termination vid 100
Related Topics
5.6.5 qinq termination pe-vid ce-vid
Function
The qinq termination pe-vid ce-vid command configures QinQ termination on a sub-
interface.
The undo qinq termination pe-vid ce-vid command cancels QinQ termination on a sub-
interface.
Format
qinq termination pe-vid pe-vid ce-vid ce-vid1 [ to ce-vid2 ]
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this configuration.
Parameters
Parameter Description Value
pe-vid pe-vid Specifies the outer VLAN The value is an integer that ranges
ID. from 2 to 4094.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
ce-vid ce-vid1 [ to Specifies the inner VLAN The value of ce-vid1 is an integer
ce-vid2 ] ID. that ranges from 1 to 4094.
l ce-vid1: specifies the The value of ce-vid2 is an integer
lower threshold of the that ranges from 1 to 4094.
inner VLAN tag in the
user packet.
l ce-vid2: specifies the
upper threshold of the
outer VLAN tag in the
user packet.
l The value of ce-vid2 must
be greater than or equal to
the value of ce-vid1.
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view, Eth-Trunk sub-
interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Based on the number of tags, VLAN packets can be classified into Dot1q packets and QinQ
packets. A Dot1q packet carries a single-layer VLAN tag and a QinQ packet carries a double-
layer VLAN tag. Accordingly, there are two VLAN tag termination modes:
l Dot1q termination, which terminates tags carried in Dot1q packets
To configure Dot1q termination, run the dot1q termination vid command in the sub-
interface view.
l QinQ termination, which terminates tags carried in QinQ packets.
To configure Dot1q termination, run the qinq termination pe-vid ce-vid command.
After the qinq termination pe-vid ce-vid command is run, the sub-interface for VLAN tag
termination processes the packet in the following procedures:
l The sub-interface removes the tag in the VLAN packet when receiving the packet and
forwards the packet on Layer 3. Whether the forwarded VLAN packet carries tags is
determined by the outbound interface.
l The sub-interface adds VLAN information to the packet and then sends the packet.
Precautions
l The tag values of the user packet received by the sub-interface must be in the range
specified in the command; otherwise, the packet is discarded.
l The allowed VLANs on a sub-interface cannot be created in the system view or be
displayed by the display command.
l When the sub-inerface is used for Layer 3 forwarding, it is recommended that there
should be a maximum of 128 VLANs in the VLAN range. When there are more than 128
VLANs, IPv4 addresses can be configured but IPv6 addresses cannot be configured.
Example
# Set the encapsulation mode on XGigabitEthernet0/0/1.1 to QinQ and allow the packets with
the outer VLAN tag 100 and inner VLAN tag 200 to pass through.
<HUAWEI> system-view
[HUAWEI] vcmp role silent
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-XGigabitEthernet0/0/1] quit
[HUAWEI] interface xgigabitethernet 0/0/1.1
[HUAWEI-XGigabitEthernet0/0/1.1] qinq termination pe-vid 100 ce-vid 200
Related Topics
5.6.4 dot1q termination vid
Function
The display voice-vlan oui command displays the OUI address and OUI attributes of a voice
VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display voice-vlan oui
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays the OUI address, OUI mask, and OUI description of the voice
VLAN.
Example
# Display the OUI address of the voice VLAN.
<HUAWEI> display voice-vlan oui
---------------------------------------------------
OuiAddress Mask Description
---------------------------------------------------
0022-3300-0000 ffff-ff00-0000 PhoneA
0011-2200-0000 ffff-ff00-0000 PhoneB
OuiAddress OUI address of the packets that can pass through the device. You can
run the voice-vlan mac-address command to configure the OUI
address.
Mask OUI mask of the packets that can pass through the device.
Related Topics
5.7.5 voice-vlan mac-address
Function
The display voice-vlan status command displays information about the current voice VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display voice-vlan [ vlan-id ] status
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display voice-vlan status command to view the following information:
l VLAN ID of the voice VLAN
l Working status of the voice VLAN
l 802.1p priority of the voice VLAN
l DSCP value of the voice VLAN
l Interface enabled with the voice VLAN
l The mode in Which an Interface Is Added to a Voice VLAN
l Secure mode of the voice VLAN on an interface
l Voice VLAN legacy
l Whether the interface increases the priority of voice packets based on VLAN IDs
l Whether the interface adds voice VLAN IDs to untagged packets
Example
# Display information about the current voice VLAN, such as the working status, secure
mode, the 802.1p priority, DSCP value, and information about an interface that is enabled
with voice VLAN.
<HUAWEI> display voice-vlan status
Voice VLAN Configurations:
---------------------------------------------------
Voice VLAN ID : 2
Voice VLAN status : Enable
Voice VLAN 8021p remark : 6
Voice VLAN dscp remark : 46
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
----------------------------------------------------------
Port Information:
-------------------------------------------------------------------------------
Port Add-Mode Security-Mode Legacy PribyVLAN Untag
-------------------------------------------------------------------------------
GigabitEthernet0/0/1 Manual Security Disable Enable Disable
Voice VLAN status Status of the voice VLAN function. The value can be:
l Enable
l Disable
You can run the voice-vlan enable command to configure
the voice VLAN status.
Voice VLAN 8021p 802.1p priority of the voice VLAN. You can run the voice-
remark vlan remark command to configure the 802.1p priority of
the voice VLAN.
Voice VLAN dscp remark DSCP value of the voice VLAN. You can run the voice-vlan
remark command to configure the DSCP value of the voice
VLAN.
Add-Mode Working mode of the voice VLAN. The value can be:
l Manual: indicates the manual mode.
l Auto: indicates the automatic mode.
You can run the voice-vlan mode command to configure the
working mode of the voice VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.7.3 voice-vlan enable
5.7.9 voice-vlan security enable
5.7.6 voice-vlan mode
Function
The voice-vlan enable command configures the specified VLAN as a voice VLAN and
enables the voice VLAN function.
The undo voice-vlan enable command disables the voice VLAN function.
Format
voice-vlan vlan-id enable [ include-untagged ]
undo voice-vlan [ vlan-id ] enable (other interface views except the port group view)
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
GE interface view, Ethernet interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After voice VLAN is enabled, based on the mode in which the priority of voice packets is
increased by the voice-vlan remark-mode command, the device increases the priority of
voice packets according to the VLAN or MAC address to ensure that voice packets are sent
first.
Precautions
If the voice VLAN configured on an interface works in automatic mode, you need to run the
port link-type command to set the interface type to trunk, or hybrid.
To ensure normal transmission of different services, assign different VLAN IDs to the voice
VLAN and default VLAN on the interface.
At a time, only one VLAN can be configured as the voice VLAN on an interface.
Example
# Configure VLAN 2 as a voice VLAN and enable the voice VLAN function on
GigabitEthernet 0/0/1.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] voice-vlan 2 enable
Related Topics
5.7.2 display voice-vlan status
Format
voice-vlan legacy enable
undo voice-vlan legacy enable
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The switch can encapsulate voice VLAN information into LLDPDUs and send them to
connected IP phones. However, IP phones of some vendors send Cisco Discovery Protocol
(CDP) packets. You can run the voice-vlan legacy enable command to enable CDP-
compatible function so that the switch encapsulates voice VLAN information in CDP packets
and sends them to connected IP phones.
Prerequisites
The voice VLAN function has been enabled using the voice-vlan enable command.
Example
# Enable CDP-compatible Voice VLAN function on GE0/0/1.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] interface GigabitEthernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] voice-vlan 10 enable
[HUAWEI-GigabitEthernet0/0/1] voice-vlan legacy enable
Related Topics
5.7.2 display voice-vlan status
Function
The voice-vlan mac-address command sets the OUI address of the voice VLAN.
The undo voice-vlan mac-address command cancels the setting of the OUI address.
Format
voice-vlan mac-address mac-address mask oui-mask [ description text ]
Parameters
Parameter Description Value
mask oui-mask Specifies the mask of the The value is in the format of
OUI address. H-H-H. H is a 4-digit
hexadecimal number that can
be f or 0. The value in binary
notation must start with
consecutive 1s and end with
consecutive 0s.
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An OUI is the first 24 bits of a 48-bit MAC address assigned to each vendor by the Institute
of Electrical and Electronics Engineers (IEEE). Voice packets sent by IP phones can be
identified by the MAC address ranges requested by IP phone vendors.
In voice VLAN, the OUI is user-defined and not necessarily 24 bits long. The OUI is the
result of the AND operation between the MAC address and mask in the voice-vlan mac-
address command.
Precautions
When you run the undo voice-vlan mac-address command to delete an OUI MAC address,
set mac-address to the result of the logical AND operation between the OUI and the OUI
mask that you set.
Example
# Allow the voice packets coming from Phone A, an IP phone, to be identified by the voice
VLAN. The MAC address of Phone A is 1234-1234-1234 and the OUI mask address is ffff-
ff00-0000.
<HUAWEI> system-view
[HUAWEI] voice-vlan mac-address 1234-1234-1234 mask ffff-ff00-0000 description
PhoneA
Related Topics
5.7.1 display voice-vlan oui
Function
The voice-vlan mode command sets the working mode of the voice VLAN on an interface.
The undo voice-vlan mode command restores the mode in which an interface is added to a
voice VLAN to the default.
NOTE
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
voice-vlan mode { auto | manual }
undo voice-vlan mode { auto | manual }
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
NOTE
The undo voice-vlan mode manual command is not supported in the port group view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Ports can be added to a voice VLAN in either of the following modes:
l Automatic mode
A voice VLAN-enabled port learns source MAC addresses of frames from voice devices,
adds ports connecting the device to voice devices to a voice VLAN.
In auto mode, you cannot manually add ports to a voice VLAN.
NOTE
The automatic mode takes effect only when the voice-vlan remark-mode mac-address command
is configured to increase the priority of voice packets based on MAC addresses and the voice-vlan
enable command without include-untagged specified is configured to enable voice VLAN on the
interface and add voice VLAN IDs to only tagged packets.
l Manual mode
After the voice VLAN function is enabled, ports connected to voice devices must be
manually added to a voice VLAN. Otherwise, the voice VLAN function does not take
effect.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Pre-configuration Tasks
Voice VLAN has been enabled using the voice-vlan enable command.
Run the voice-vlan remark-mode mac-address command to increase the priority of voice
packets based on MAC addresses.
In auto mode, access, negotiation-auto, or negotiation-desirable interfaces cannot be added to
a voice VLAN. To add the interface to the voice VLAN, run the port link-type command to
change the link type of the interface to trunk or hybrid.
Precautions
The working mode of the voice VLAN on an interface does not affect the working mode of
the voice VLAN on another interface. That is, voice VLANs on different interfaces can adopt
different working modes.
Example
# On GE0/0/1, configure the voice VLAN to work in manual mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] voice-vlan 10 enable
[HUAWEI-GigabitEthernet0/0/1] voice-vlan remark-mode mac-address
[HUAWEI-GigabitEthernet0/0/1] voice-vlan mode manual
Related Topics
5.7.3 voice-vlan enable
5.7.2 display voice-vlan status
Format
voice-vlan remark { 8021p 8021p-value | dscp dscp-value } *
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When voice VLAN is deployed on a network, voice service must be transmitted with a shorter
delay than data service. Therefore, voice data packets need to be transmitted with a higher
priority than other service data packets to reduce the transmission delay. You can run the
voice-vlan remark command to change the 802.1p and DSCP priorities of a voice VLAN to
allow voice data packets to be transmitted with a high priority.
Precautions
The voice-vlan vlan-id enable command has been run on an interface to specify a VLAN as a
voice VLAN, and the voice VLAN function has been enabled on the interface.
If the voice-vlan remark command has been run multiple times, the last configuration
overrides the previous configurations.
Example
# Set the DSCP value for a voice VLAN to 20.
<HUAWEI> system-view
[HUAWEI] voice-vlan remark dscp 20
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The voice-vlan remark-mode command configures a mode to increase the priority of voice
packets.
Format
voice-vlan remark-mode { vlan | mac-address }
Parameters
Parameter Description Value
vlan Specifies that the priority of voice packets is increased based on -
VLAN IDs.
mac-address Specifies that the priority of voice packets is increased based on -
MAC addresses.
Views
GE interface view, Ethernet interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After voice VLAN is enabled on an interface, the device determines whether a data flow
consists of voice packets based on the VLAN ID by default. In this situation, even if you do
not run the voice-vlan mac-address command to configure the OUI of the voice VLAN, you
can use the voice VLAN function. Therefore, the voice VLAN configuration is more flexible
and simple. Specifically, you can configure voice VLAN in the following methods:
l If you want to increase the priority of voice packets based on MAC addresses, run the
voice-vlan remark-mode mac-address and voice-vlan mac-address commands.
l If you want to increase the priority of voice packets based on VLAN IDs, run the voice-
vlan remark-mode vlan command.
Prerequisites
Voice VLAN has been enabled on the interface using the voice-vlan enable command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Configure GE0/0/1 to increase the priority of voice packets based on MAC addresses.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] voice-vlan remark-mode mac-address
Related Topics
5.7.3 voice-vlan enable
5.7.5 voice-vlan mac-address
Format
voice-vlan security enable
undo voice-vlan security enable
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Based on the data filtering mechanism, a voice VLAN works in either secure or normal mode:
l Secure mode
A voice VLAN-enabled inbound port transmits only frames of which the source MAC
addresses match OUIs configured on the device, discards the voice data not belong to the
current voice VLAN and the other data can be forwarded normally.
The secure mode prevents a voice VLAN from being attacked by malicious data flows,
but consumes system resources to check frames.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
The secure mode takes effect only when the voice-vlan remark-mode mac-address command is
configured to increase the priority of voice packets based on MAC addresses.
l Normal mode
A voice VLAN-enabled inbound port transmits both voice and non-voice data. The port
does not compare source MAC addresses in received frames with configured OUIs,
exposing a voice VLAN to malicious attacks.
Pre-configuration Tasks
Voice VLAN has been enabled using the voice-vlan enable command.
Run the voice-vlan remark-mode mac-address command to increase the priority of voice
packets based on MAC addresses.
Precautions
When a voice VLAN works in secure mode, only voice packets in the VLAN can be
transmitted in the voice VLAN.
To allow both voice packets and data packets to be transmitted in the voice VLAN, configure
the voice VLAN to work in normal mode.
Example
# Disable the secure mode of the voice VLAN on GigabitEthernet 0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] voice-vlan remark-mode mac-address
[HUAWEI-GigabitEthernet0/0/1] undo voice-vlan security enable
Related Topics
5.7.1 display voice-vlan oui
5.7.2 display voice-vlan status
Function
The display spare-bucket resource command displays the usage of backup resources when
VLAN translation resources on a card conflict.
Format
display spare-bucket resource [ slot slot-number ]
NOTE
Only the S5720HI supports this command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The command displays the usage of backup VLAN translation resources, including the total
number of backup VLAN translation resources, and the numbers of used and remaining
backup VLAN translation resources. The command output helps you manage backup VLAN
translation resources and locate the problem of ineffective VLAN mapping due to insufficient
resources.
When no slot ID is specified, the usage of backup VLAN translation resources on all cards is
displayed.
Example
# Display the usage of backup VLAN translation resources in slot 0.
<HUAWEI> display spare-bucket resource slot 0
------------------------------------------------------------
------------------------------------------------------------
0 0 66 66
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display vlan-translation resource [ slot slot-number ]
NOTE
Only the S5720HI, S5720EI, S6720EI, and S6720S-EI support this command.
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display vlan-translation resource command displays VLAN translation resource usage
on a card, including the total number of inbound/outbound VLAN translation resources, the
number of used VLAN translation resources, and the number of remaining VLAN translation
resources. The command output helps you manage VLAN translation resources, and locate
faults of insufficient VLAN translation resources caused by VLAN Mapping or Selective
QinQ.
Example
# Display VLAN translation resource usage on a card in slot 0.
<HUAWEI> display vlan-translation resource slot 0
Interface:
GigabitEthernet0/0/1 to GigabitEthernet0/0/48
-------------------------------------------------
Type Total Configured Remaining
-------------------------------------------------
Ingress 65536 0 65536
Egress 65536 0 65536
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Function
The port add-tag acl command adds an outer tag to the packet that matches an ACL rule on
an interface.
By default, the device does not add an outer tag to the packet that matches an ACL rule.
Product Support
S6700 Supported.
Format
port add-tag acl { acl-number | name acl-name } [ rule rule-id ] vlan vlan-id { priority-
inherit | remark-8021p 8021p-value }
If both Layer 2 ACLs and Layer 3 ACLs are configured, use the following command:
port add-tag acl l2-acl [ rule rule-id ] [ acl { basic-acl | advance-acl | name acl-name }
[ rule rule-id ] ] vlan vlan-id { priority-inherit | remark-8021p 8021p-value }
port add-tag acl { basic-acl | advance-acl } [ rule rule-id ] [ acl { l2-acl | name acl-name }
[ rule rule-id ] ] vlan vlan-id { remark-8021p 8021p-value | priority-inherit }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
port add-tag acl name acl-name [ rule rule-id ] [ acl { basic-acl | advance-acl | l2-acl |
name acl-name } [ rule rule-id ] ] vlan vlan-id { remark-8021p 8021p-value | priority-
inherit }
undo port add-tag acl l2-acl [ rule rule-id ] [ acl { basic-acl | advance-acl | name acl-
name } [ rule rule-id ] ]
undo port add-tag acl { basic-acl | advance-acl } [ rule rule-id ] [ acl { l2-acl | name acl-
name } [ rule rule-id ] ]
undo port add-tag acl name acl-name [ rule rule-id ] [ acl { basic-acl | advance-acl | l2-acl |
name acl-name } [ rule rule-id ] ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
name acl-name Specifies a named ACL. The value must the name of
an existing ACL.
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view, Eth-
Trunk interface view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A device interface adds the specified outer tag to a packet based on the VLAN tag, MAC
address, IP protocol, source address, destination address, priority, or port number of an
application of a user.
Precautions
l After you run the port add-tag acl command, the following situations may occur:
– The device does not take the original forwarding action to forward the packet that
matches an ACL rule. Instead, the device adds an outer tag to the packet and
forwards the packet in the VLAN specified by the added outer tag.
– The device adds an outer tag to the packet that does not match an ACL rule based
on the default VLAN of an interface.
l A Layer 2 ACL and a Layer 3 ACL can be set in the port add-tag acl command
simultaneously. The Layer 3 ACL and its rules can be configured only after the Layer 2
ACL and its rules are configured. The Layer 2 ACL number ranges from 4000 to 4999
and the Layer 3 ACL number ranges from 2000 to 2999 and 3000 to 3999.
l This command is invalid for packets tagged with VLAN 0. If packets tagged with VLAN
0 need to be processed, configure a traffic policy on the switch.
Example
# Add the outer tag of VLAN 1001 to the packet that matches the source IP address of
192.16.0.0/16 on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] acl name test 2000
[HUAWEI-acl-basic-test] rule 1 permit source 192.16.0.0 0.0.255.255
[HUAWEI-acl-basic-test] quit
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan all
[HUAWEI-GigabitEthernet0/0/1] port add-tag acl 2000 rule 1 vlan 1001 priority-
inherit
Format
port vlan-stacking vlan vlan-id1 [ to vlan-id2 ] stack-vlan vlan-id3 [ remark-8021p 8021p-
value ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
stack-vlan vlan-id3 Specifies the outer VLAN The value is an integer that
ID added to a frame. ranges from 1 to 4094.
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
VLAN stacking, also called selective QinQ, is a Layer 2 technology that enables a device to
add outer VLAN tags based on VLAN IDs.
When frames are transmitted on the ISP network, the frames are differentiated based on user
applications, access sites, or access devices. A device enabled with VLAN stacking adds outer
tags to user frames based on the inner tags or priorities in the user frames so that traffic from
different users are differentiated.A VLAN stacking interface has the following features:
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l A VLAN stacking port can be configured with multiple outer VLAN tags so that the port
can add different outer VLAN tags to different VLAN frames.
l A VLAN stacking interface can add the outer tag to received frames. After an interface
joins the stacked VLAN in untagged mode, the interface removes the outer tag from
outgoing frames.
Precautions
Example
# On GE0/0/1, configure selective QinQ and outer VLAN tag 100 to the tagged frames with
the inner VLAN tags 10 to 13.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] qinq vlan-translation enable
[HUAWEI-GigabitEthernet0/0/1] port hybrid untagged vlan 100
[HUAWEI-GigabitEthernet0/0/1] port vlan-stacking vlan 10 to 13 stack-vlan 100
Related Topics
5.3.13 display vlan
Function
The port vlan-stacking untagged command configures a device to add double VLAN tags to
an untagged frame.
By default, the device does not add double tags to an untagged frame.
Format
port vlan-stacking untagged stack-vlan vlan-id1 stack-inner-vlan vlan-id2
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If double tags need to be added to packets, two devices are required. The port vlan-stacking
untagged command adds double tags to packets on one device or untagged packets received
on a Layer 2 interface to differentiate services or users.
For outgoing packets:
l S1720GFR, S2720, S5700LI, S5700S-LI, S5710-X-LI, S5720SI, S5720S-SI, and
S2750EI: As long as the outer VLAN ID is matched, tags are removed.
l Other models: When only the outer VLAN ID is matched and the VLAN is configured
on the interface in untagged mode, the outer VLAN tag is removed and the inner VLAN
tag is reserved.
Precautions
To enable an interface to add double VLAN tags to an untagged packet, you must set the link
type of the interface to hybrid, and add the interface to the outer VLAN in untagged mode.
When the interface PVID is not VLAN 1, restore the PVID to VLAN 1 before the port vlan-
stacking untagged command is executed.
Adding double VLAN tags to untagged frames is port-based VLAN assignment. It is matched
based on VLAN assignment priorities of policy-based VLAN assignment, MAC-based
VLAN assignment, IP subnet-based VLAN assignment, protocol-based VLAN assignment,
and port-based VLAN assignment in descending order.
On the S1720GFR, S2720, S2750, S5700LI, S5700S-LI, S5710-X-LI, S5720SI, and S5720S-
SI, if the port vlan-stacking untagged vlan-id1 stack-inner-vlan vlan-id2 command is used
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
on an interface, the VLAN specified by vlan-id1 cannot be configured as the outer VLAN in
the port vlan-stacking command.
Example
# Add double VLAN tags to untagged frames received on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] qinq vlan-translation enable
[HUAWEI-GigabitEthernet0/0/1] port hybrid untagged vlan 100
[HUAWEI-GigabitEthernet0/0/1] port vlan-stacking untagged stack-vlan 100 stack-
inner-vlan 200
Related Topics
5.8.4 port vlan-stacking
Format
qinq mapping pe-vid vlan-id1 ce-vid vlan-id2 [ to vlan-id3 ] map-vlan vid vlan-id4
undo qinq mapping pe-vid vlan-id1 ce-vid vlan-id2 [ to vlan-id3 ] map-vlan vid vlan-id4
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this configuration.
Parameters
Parameter Description Value
pe-vid vlan-id1 Specifies the outer VLAN tag The value is an integer that ranges
in a received frame. from 2 to 4094.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
ce-vid vlan-id2 Specifies the inner VLAN tag The value of vlan-id2 is an integer
[ to vlan-id3 ] in a received frame. that ranges from 1 to 4094.
l vlan-id2: specifies the The value of vlan-id3 is an integer
start inner VLAN tag. that ranges from 1 to 4094.
l vlan-id3: specifies the end
inner VLAN tag.
l The value of vlan-id3
must be larger than or
equal to the value of vlan-
id2. vlan-id2 and vlan-id3
identify a VLAN range.
map-vlan vid Specifies the VLAN ID in The value is an integer that ranges
vlan-id4 the mapped outer tag. from 1 to 4094.
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view, Eth-Trunk sub-
interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
QinQ mapping is generally deployed on edge devices of a metro Ethernet and often used to
map the VLAN tag carried in the frame to a specified VLAN tag before the frame is
transmitted on the public network. QinQ mapping can be applied to the following scenarios:
l The VLAN IDs deployed in new sites and old sites conflict, but new sites need to
communicate with old sites.
l The VLAN ID planning of each site on the public network is different. As a result, the
VLAN IDs conflict. However, the sites do not need to communicate.
l The VLAN IDs on both ends of the public network are different.
When a network edge device receives double-tagged frames, the inner tags indicate users and
outer tags indicates services. To differentiate services on the ISP network, you can configure 2
to 1 QinQ mapping on network edge devices. The double tags of frames are mapped to a
specified S-VLAN tag so that the outer tag can be transparently transmitted on the ISP
network.
The qinq mapping pe-vid ce-vid command on a sub-interface has similar functions with the
port vlan-mapping vlan inner-vlan command on the main interface. The differences are as
follows:
l QinQ mapping on a sub-interface is mainly used to access the L2VPN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l QinQ mapping used on the main interface is used for interconnection on the Layer 2
MAN so that users of different VLANs can communicate with each other.
l QinQ mapping saves a large number of physical ports.
Precautions
The qinq mapping pe-vid ce-vid command maps the outer VLAN tags of the frames on a
sub-interface, but does not change the inner VLAN tags. This command takes effect for only
incoming frames.
The original VLAN IDs specified for QinQ mapping on a sub-interface cannot be globally
created or displayed by display commands.
VLAN mapping or VLAN stacking cannot be configured for the same VLAN on the main
interface and its sub-interfaces.
Example
# On XGigabitEthernet0/0/1.1, set the outer VLAN tag 10 of frames with the inner VLAN tag
20 to outer VLAN tag 30.
<HUAWEI> system-view
[HUAWEI] vcmp role silent
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-XGigabitEthernet0/0/1] quit
[HUAWEI] interface xgigabitethernet 0/0/1.1
[HUAWEI-XGigabitEthernet0/0/1.1] qinq mapping pe-vid 10 ce-vid 20 map-vlan vid 30
Related Topics
5.8.7 qinq mapping vid map-vlan
Function
The qinq mapping vid map-vlan command configures 1 to 1 QinQ mapping on a sub-
interface.
The undo qinq mapping vid map-vlan command cancels the configuration.
Format
qinq mapping vid vlan-id1 [ to vlan-id2 ] map-vlan vid vlan-id3
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this configuration.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
map-vlan vid Specifies the VLAN ID in The value is an integer that ranges
vlan-id3 the mapped outer tag. from 1 to 4094.
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view, Eth-Trunk sub-
interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
QinQ mapping is generally deployed on edge devices of a metro Ethernet and often used to
map the VLAN tag carried in the frame to a specified VLAN tag before the frame is
transmitted on the public network. QinQ mapping can be applied to the following scenarios:
l The VLAN IDs deployed in new sites and old sites conflict, but new sites need to
communicate with old sites.
l The VLAN ID planning of each site on the public network is different. As a result, the
VLAN IDs conflict. However, the sites do not need to communicate.
l The VLAN IDs on both ends of the public network are different.
The qinq mapping vid map-vlan command on a sub-interface has similar functions with the
port vlan-mapping vlan inner-vlan command on the main interface. The differences are as
follows:
l QinQ mapping on a sub-interface is mainly used to access the L2VPN.
l QinQ mapping used on the main interface is used for interconnection on the Layer 2
MAN so that users of different VLANs can communicate with each other.
l QinQ mapping saves a large number of physical ports.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
The qinq mapping vid map-vlan command maps the single tags in frames on a sub-
interface. This command takes effect only for incoming packets.
The original VLAN IDs specified for QinQ mapping on a sub-interface cannot be globally
created or displayed by display commands.
VLAN mapping or VLAN stacking cannot be configured for the same VLAN on the main
interface and its sub-interfaces.
Example
# Configure QinQ mapping on XGigabitEthernet0/0/1.1 to map outer VLAN tag 100 to inner
VLAN tag 200.
<HUAWEI> system-view
[HUAWEI] vcmp role silent
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-XGigabitEthernet0/0/1] quit
[HUAWEI] interface xgigabitethernet 0/0/1.1
[HUAWEI-XGigabitEthernet0/0/1.1] qinq mapping vid 100 map-vlan vid 200
Related Topics
5.8.6 qinq mapping pe-vid ce-vid
Function
The qinq protocol command sets the TPID value in the outer VLAN tag of an interface.
The undo qinq protocol command restores the default TPID value in the outer VLAN tag.
Format
qinq protocol protocol-id
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Devices from different vendors or in different network plans may use different TPID values in
VLAN tags of VLAN packets. To adapt to an existing network plan, the switch supports TPID
value configuration. You can set the TPID value on the switch to be the same as the TPID
value in the network plan to ensure compatibility with the current network.
Precautions
The device directly connected to an interface must be able to identify the TPID value in the
outer VLAN tag on the interface.
The qinq protocol command identifies incoming frames, and adds or changes the TPID value
of outgoing frames.
The TPID value specified by the qinq protocol command must be different from TPID values
of specific protocols. Otherwise, the interface cannot correctly classify protocol packets. The
TPID value cannot be any of the values in the following table.
ARP 0x0806
RARP 0x8035
IP 0x0800
IPv6 0x86DD
PPPoE 0x8863/0x8864
MPLS 0x8847/0x8848
IPX/SPX 0x8137
LACP 0x8809
802.1x 0x888E
HGMP 0x88A7
Reserved 0xFFFD/0xFFFE/0xFFFF
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Set the TPID value in the outer VLAN tag of a QinQ frame to 0x9100 on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] qinq protocol 9100
Related Topics
5.3.34 port link-type
Format
qinq stacking vid vlan-id1 [ to vlan-id2 ] pe-vid vlan-id3
undo qinq stacking vid vlan-id1 [ to vlan-id2 ] pe-vid vlan-id3
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI support this configuration.
Parameters
Parameter Description Value
vid vlan-id1 [ to vlan-id2 ] Specifies the outer VLAN The value of vlan-id1 is an
ID range. integer that ranges from 2 to
l vlan-id1 specifies the 4094.
start VLAN ID. The value of vlan-id2 is an
l to vlan-id2 specifies the integer that ranges from 2 to
end VLAN ID. The . 4094.
vlan-id1 and vlan-id2 id
value of vlan-id2 must be
larger than or equal to
the value of vlan-
id1entify a VLAN range.
pe-vid vlan-id3 Specifies the outer VLAN The value is an integer that
tags added to a frame. ranges from 1 to 4094.
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view, Eth-Trunk sub-
interface view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
The qinq stacking command adds an outer VLAN tag to the packets on a sub-interface.
The original VLAN IDs specified for QinQ mapping on a sub-interface cannot be globally
created or displayed by display commands.
VLAN mapping or VLAN stacking cannot be configured for the same VLAN on the main
interface and its sub-interfaces.
Example
# Configure VLAN stacking on XGigabitEthernet0/0/1.1 and add an outer VLAN tag 100 to
frames with the inner VLAN tags 10 to 13.
<HUAWEI> system-view
[HUAWEI] vcmp role silent
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-XGigabitEthernet0/0/1] quit
[HUAWEI] interface xgigabitethernet 0/0/1.1
[HUAWEI-XGigabitEthernet0/0/1.1] qinq stacking vid 10 to 13 pe-vid 100
Related Topics
5.8.7 qinq mapping vid map-vlan
5.8.6 qinq mapping pe-vid ce-vid
Function
The qinq stacking vlan command configures QinQ stacking on a VLANIF interface.
Format
qinq stacking vlan vlan-id
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Assume that the local device A is connected to the remote device B over the ISP network.
The ID of the management VLAN on device B is the same as the ID of VLAN for users
connected to device A. However, the S-VLAN ID is different from the management VLAN
ID.
To log in to device B to manage it from local device A, you can use the qinq stacking vlan
command on device B to configure QinQ stacking on the VLANIF interface corresponding to
the management VLAN. In addition, you need to configure QinQ on the user-side interface of
device A.
l Packets sent from device A to device B are processed as follows:
The user-side interface of device A sends double-tagged packets to the ISP network. The
outer VLAN tag is assigned by the carrier so that the packets can be transparently
transmitted over the ISP network to SwitchB.
When device B receives double-tagged packets, it compares the VLAN tags of the
packets with the VLAN tags configured on the VLANIF interface. If the outer tag of the
packets is the same as the outer tag configured on the VLANIF interface, device B
removes the outer tag and sends the packets to the IP layer for processing.
l Packets sent from device B to device A are processed as follows:
When the VLANIF interface of SwitchB receives data packets, device B adds a VLAN
tag to the packets according to the QinQ stacking configuration. The new outer VLAN
tag is assigned by the carrier so that the double-tagged data packets can be transparently
transmitted across the ISP network to device A. Device A removes the outer VLAN tag,
and then forwards the packets to users.
NOTE
l When configuring QinQ stacking on a VLANIF interface, ensure that the VLANIF interface
corresponds to the management VLAN. VLANIF interfaces corresponding to other VLANs do not
support QinQ stacking.
l To change the configured outer VLAN, run the undo qinq stacking vlan command to disable QinQ
stacking, and then run the qinq stacking vlan command to configure a new outer VLAN.
l The qinq stacking vlan command conflicts with the icmp host-unreachable send command.
Therefore, you must run the undo icmp host-unreachable send command before using the qinq
stacking vlan command.
l The outer VLAN added to packets must be an existing VLAN without VLANIF interface
configured.
Example
# Configure QinQ stacking on VLANIF 10.
<HUAWEI> system-view
[HUAWEI] vlan 10
[HUAWEI-vlan10] management-vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
[HUAWEI-vlan10] quit
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] undo icmp host-unreachable send
[HUAWEI-Vlanif10] qinq stacking vlan 20
Related Topics
5.3.13 display vlan
6.8.21 icmp host-unreachable send
Format
qinq vlan-translation enable
undo qinq vlan-translation enable
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
You can configure VLAN mapping and selective QinQ on an interface only after VLAN
translation is enabled on an interface.
Example
# Enable VLAN translation on GigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] qinq vlan-translation enable
Related Topics
5.9.3 port vlan-mapping vlan map-vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Format
qinq vlan-translation miss-drop
undo qinq vlan-translation miss-drop
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
After VLAN Stacking, VLAN mapping, are configured on an interface, you can run the qinq
vlan-translation miss-drop command to configure the interface to discard the received
packets that do not match any VLAN Stacking, VLAN mapping, entry.
Example
# Configure GE0/0/1 to discard the packets that do not match any VLAN Stacking, VLAN
mapping, entry.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] qinq vlan-translation enable
[HUAWEI-GigabitEthernet0/0/1] qinq vlan-translation miss-drop
Related Topics
5.8.4 port vlan-stacking
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
This command is only supported by S1720GFR, S2720, S2750, S5700S-LI, S5700LI, S5710-X-LI,
S5720SI, and S5720S-SI.
Format
port vlan-mapping ingress
undo port vlan-mapping ingress
Parameters
None
Views
Ethernet interface view, GE interface view, MultiGE interface view, Eth-Trunk interface view,
port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the port vlan-mapping vlan vlan-id1 [ to vlan-id2 ] map-vlan vlan-id3
[ remark-8021p 8021p-value ] command is used on an interface, vlan-id1 [ to vlan-id2 ] is
mapped to vlan-id3 in the inbound direction, and vlan-id3 is mapped to vlan-id1 [ to vlan-
id2 ] in the outbound direction.
On the S1720GFR, S2720, S2750, S5700S-LI, S5700LI, S5710-X-LI, S5720SI, and S5720S-
SI, outbound VLAN mapping cannot be used with a traffic policy containing CAR. You can
run the port vlan-mapping ingress command to configure VLAN mapping in the inbound
direction. The interface configured with VLAN mapping maps vlan-id1 [ to vlan-id2 ] to
vlan-id3 in the inbound direction, and does not map vlan-id3 to vlan-id1 [ to vlan-id2 ] in the
outbound direction.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Prerequisites
Precautions
To make VLAN mapping take effect in the inbound direction only, configure the port vlan-
mapping ingress and port vlan-mapping vlan map-vlan commands in sequence. To delete
the VLAN mapping configuration, delete the port vlan-mapping vlan map-vlan and port
vlan-mapping ingress commands in sequence.
Example
# Configure VLAN mapping in the inbound direction on GE0/0/1 to map VLAN 100 in
received frames to VLAN 10.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 10
[HUAWEI-GigabitEthernet0/0/1] qinq vlan-translation enable
[HUAWEI-GigabitEthernet0/0/1] port vlan-mapping ingress
[HUAWEI-GigabitEthernet0/0/1] port vlan-mapping vlan 100 map-vlan 10
Related Topics
5.9.3 port vlan-mapping vlan map-vlan
Function
The port vlan-mapping vlan inner-vlan command enables the interface to replace the outer
VLAN tag or both VLAN tags of a double-tagged packet.
The undo port vlan-mapping vlan inner-vlan command disables the interface to replace the
outer VLAN tag or both VLAN tags of a double-tagged packet.
NOTE
Only the S5720HI, S5720EI, S6720EI, and S6720S-EI support this command.
Format
port vlan-mapping vlan vlan-id1 inner-vlan vlan-id2 [ to vlan-id3 ] map-vlan vlan-id4
[ remark-8021p 8021p-value ]
undo port vlan-mapping { all | vlan vlan-id1 inner-vlan vlan-id2 [ to vlan-id3 ] [ map-vlan
vlan-id4 ] }
undo port vlan-mapping vlan vlan-id1 inner-vlan vlan-id2 map-vlan vlan-id4 map-inner-
vlan vlan-id5
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Setting
vlan vlan-id1 Specifies the VLAN ID of The value is an integer that ranges
the outer tag in a received from 1 to 4094.
packet.
map-vlan vlan-id4 Specifies the VLAN ID that The value is an integer that ranges
replaces the VLAN ID of the from 1 to 4094.
outer tag in a packet.
map-inner-vlan Specifies the VLAN ID that The value is an integer that ranges
vlan-id5 replaces the VLAN ID of the from 1 to 4094.
inner tag in a packet.
If the parameter map-inner-
vlan is configured, the
interface maps the VLAN ID
of the inner tag in the packet
to the value of vlan-id5
specified by users.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view, Eth-
Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When provider edges (PEs) receive double-tagged packets, the inner tag in the packets
indicates the user, and the outer tag indicates the service. To differentiate services entering the
ISP network, you can configure 2 to 1 VLAN mapping on PEs. To allow users to
communicate with each other, the interface maps tags of different services to outer tags, and
inner tags are transparently transmitted to the ISP network.
This command allows an interface to map the VLAN ID in a tagged packet to an S-VLAN ID.
Precautions
VLAN mapping can be configured only on a trunk or hybrid interface, and the interface must
be added to the map-vlan in tagged mode.
When inner-vlan is set to a VLAN ID range, the interface cannot replace the VLAN ID of the
inner tag in packets.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If VLAN mapping and DHCP are configured on the same interface, the interface must be
added to the original VLANs (VLANs before mapping) in tagged mode.
When the VLAN tags of a packet match both a single-tag VLAN mapping entry and a double-
tag VLAN mapping entry, the double-tag VLAN mapping takes effect.
Example
# Configure 2 to 1 VLAN mapping, map VLAN 10 in the outer tag of a packet (with VLAN
10 in the outer tag and VLAN 20 in the inner tag) to VLAN 100.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[HUAWEI-GigabitEthernet0/0/1] qinq vlan-translation enable
[HUAWEI-GigabitEthernet0/0/1] port vlan-mapping vlan 10 inner-vlan 20 map-vlan 100
Related Topics
5.9.3 port vlan-mapping vlan map-vlan
Format
port vlan-mapping vlan vlan-id1 [ to vlan-id2 ] map-vlan vlan-id3 [ remark-8021p 8021p-
value ]
undo port vlan-mapping { all | vlan vlan-id1 [ to vlan-id2 ] [ map-vlan vlan-id3 ]}
NOTE
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Setting
map-vlan vlan-id3 Specifies the VLAN ID in The value is an integer that ranges
the mapped tag. from 1 to 4094.
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
VLAN mapping, also called VLAN translation, implements communication between different
VLANs. VLAN mapping takes effect after outbound interfaces on a switch forward the
packets received by inbound interfaces. This command allows an interface to map the VLAN
ID in a tagged packet to an S-VLAN ID.
After the port vlan-mapping vlan vlan-id1 [ to vlan-id2 ] map-vlan vlan-id3
[ remark-8021p 8021p-value ] command is used on an interface, vlan-id1 [ to vlan-id2 ] is
mapped to vlan-id3 in the inbound direction, and vlan-id3 is mapped to vlan-id1 [ to vlan-
id2 ] in the outbound direction.
Precautions
VLAN mapping can be configured only on a trunk or hybrid interface, and the interface must
be added to the translated VLAN in tagged mode.
When N:1 VLAN mapping is configured (VLAN IDs can be incontiguous before mapping),
the interface needs to be added to these VLANs in tagged mode, and the VLAN specified by
map-vlan cannot be a VLAN corresponding to a VLANIF interface.
If VLAN mapping and DHCP are configured on the same interface, the interface must be
added to the original VLANs (VLANs before mapping) in tagged mode.
N:1 VLAN mapping is not supported in a stack scenario.
A maximum of 16 original VLAN IDs can be specified on an interface.
If the VLANs before and after mapping are the same, return packets may fail to be forwarded.
To solve the problem, map the VLAN to itself. For example, packets with VLAN 10 and
VLAN 20 (before mapping) need to be sent to the network side and S-VLAN 20 (after
mapping) is assigned to users, run the port vlan-mapping vlan 10 map-vlan 20 command.
To ensure that return packets are correctly forwarded, run the port vlan-mapping vlan 20
map-vlan 20 command.
Example
# Configure VLAN mapping on the GE0/0/1 and map VLAN 100 of a received packet to
VLAN 10 before the packet is forwarded.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 10
[HUAWEI-GigabitEthernet0/0/1] qinq vlan-translation enable
[HUAWEI-GigabitEthernet0/0/1] port vlan-mapping vlan 100 map-vlan 10
Related Topics
5.3.34 port link-type
5.3.36 port trunk allow-pass vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
By default, an action of re-marking the inner VLAN tag in QinQ packets is not configured in
a traffic behavior.
Product Support
S6700 Supported
Format
remark cvlan-id cvlan-id
undo remark cvlan-id
Parameters
Parameter Description Value
Views
Traffic behavior view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use the remark cvlan-id command to re-mark the inner VLAN tag in QinQ packets
in a traffic behavior so that the downstream device can identify packets and provide
differentiated services.
Follow-up Procedure
Run the traffic policy command to create a traffic policy and run the classifier behavior
command in the traffic policy view to bind the traffic classifier to the traffic behavior
containing the action of re-marking the inner VLAN tag in QinQ packets.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
The remark cvlan-id command is valid for only QinQ packets that carry two or more layers
of tags.
After the remark cvlan-id, remark 8021p, and remark vlan-id commands are used, the
system modifies VLAN tags of packets according to the configuration. These actions are
called VLAN-based actions.
You must configure the VLAN-based action and non-VLAN-based action in different traffic
behaviors bound to the same traffic policy.
If you run the remark cvlan-id command in the same traffic classifier view multiple times,
only the latest configuration takes effect.
Example
# Re-mark the inner VLAN tag in packets with 5 in the traffic behavior b1.
<HUAWEI> system-view
[HUAWEI] traffic behavior b1
[HUAWEI-behavior-b1] remark cvlan-id 5
Related Topics
15.2.16 remark 8021p
5.9.5 remark vlan-id
15.1.30 traffic behavior
Function
The remark vlan-id command configures an action of re-marking the VLAN tag in VLAN
packets in a traffic behavior.
By default, an action of re-marking the VLAN tag in VLAN packets is not configured in a
traffic behavior.
Format
remark vlan-id vlan-id
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Traffic behavior view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use the remark vlan-id command to re-mark the VLAN tag in VLAN packets in a
traffic behavior so that the downstream device can identify packets and provide differentiated
services.
The remark vlan-id command re-marks only the outer VLAN tag of double-tagged packets.
Follow-up Procedure
Run the traffic policy command to create a traffic policy and run the classifier behavior
command in the traffic policy view to bind the traffic classifier to the traffic behavior
containing VLAN tag re-marking.
Precautions
If the remark vlan-id command is used on an inbound interface on the S5720HI, S5720EI,
S6720EI, and S6720S-EI, add the outbound interfaces to the replaced VLAN and the original
VLAN. Otherwise, packets cannot be forwarded correctly. On other models, add the inbound
and outbound interfaces to the replaced VLAN and the original VLAN. Otherwise, packets
cannot be forwarded correctly.
If a traffic policy containing remark vlan-id is applied to the outbound direction on an
interface, the VLAN that the interface belongs to must work in tag mode.
After the remark vlan-id, remark 8021p, remark cvlan-id command is used, the system
modifies the VLAN tag of packets based on the device configuration. The behavior
configured through these commands is called VLAN-based action.
To perform VLAN-based actions and non-VLAN-based actions in an upstream traffic policy,
you need to configure VLAN-based actions and non-VLAN-based actions in different traffic
behaviors.
If you run the remark vlan-id command in the same traffic behavior view multiple times,
only the latest configuration takes effect.
Example
# Re-mark the VLAN tag of packets in a VLAN to 200.
<HUAWEI> system-view
[HUAWEI] traffic behavior tb
[HUAWEI-behavior-tb] remark vlan-id 200
Related Topics
15.2.16 remark 8021p
5.9.4 remark cvlan-id
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display garp statistics [ interface { interface-type interface-number [ to interface-type
interface-number ] }&<1-10> ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the GARP VLAN Registration Protocol (GVRP) is enabled on an interface, the system
collects statistics about GVRP packets sent, received, and discarded on the interface. You can
view the statistics to check whether the GVRP function on the interface is normal.
When using this command, pay attention to the following points:
l If interface interface-type interface-number is not specified, the system displays
statistics about GARP packets on all the interfaces.
l If interface interface-type interface-number is specified, the system displays statistics
about GARP packets on the specified interface.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display statistics about GARP packets on a specified interface.
<HUAWEI> display garp statistics interface gigabitethernet 0/0/1
Item Description
Related Topics
5.10.9 gvrp
Function
The display garp timer command displays the values of GARP timers.
Format
display garp timer [ interface { interface-type interface-number [ to interface-type
interface-number ] }&<1-10> ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display garp timer command displays the values of GARP timers. When using this
command, pay attention to the following points:
l If interface interface-type interface-number is not specified, the system displays GARP
timers of all the interfaces.
l If interface interface-type interface-number is specified, the system displays GARP
timers of the specified interface.
Example
# Display the values of the GARP timers of the specified interface.
<HUAWEI> display garp timer interface gigabitethernet 0/0/1
GARP JoinTime Value of the Join timer. You can run the garp timer command to set
the Join timer.
GARP LeaveTime Value of the Leave timer. You can run the garp timer command to
set the Leave timer.
GARP Value of the LeaveAll timer. You can run the garp timer leaveall
LeaveAllTime command to set the LeaveAll timer.
GARP HoldTime Value of the Hold timer. You can run the garp timer command to
set the Hold timer.
Related Topics
5.10.7 garp timer
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display gvrp state interface interface-type interface-number vlan vlan-id
Parameters
Parameter Description Value
vlan vlan-id Displays information about The value is an integer that ranges
the state machine of the from 2 to 4094.
specified VLAN.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The GVRP function has two types of state machines: Applicant state machine and Registrar
state machine.
An applicant implements declaration of attributes. If no message is lost during transmission,
an applicant can ensure that all registrars have registered an attribute after it sends a Join
message or receives a JoinIn message. To ensure reliable transmission of messages, the
applicant needs to send two Join messages or send a Join message and receive a JoinIn
message to confirm that all registrars have registered an attribute. Therefore, a simple counter
is used. The counter starts from 0 and increases by 1 every time the applicant sends a Join
message or receives a JoinIn message. The maximum value of the counter is 2. If the
applicant receives a JoinEmpty, Empty, Leave, or LeaveAll message, the counter is reset to 0.
This indicates that the applicant can send PDUs only when the value of the counter is smaller
than 2.
The Join timer controls the interval for sending Join messages, but not every attribute has its
own Join timer. A GVRP participant uses a Join timer. The value of the Join timer must be
long enough to ensure that all the attributes can be packaged in a message and transmitted in a
declaration.
l Anxious applicants
Depending on the value of the applicant counter, an applicant may be in either of the
following states:
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
– V (very anxious): The value of the counter is 0, indicating that the applicant does
not send a Join message or receive a JoinIn message.
– A (anxious): The value of the counter is 1, indicating that no message is lost and all
the registrars have registered the attribute.
– Q (quiet): The value of the counter is 2, indicating that the applicant does not need
to send Join messages.
l Members and observers
The preceding states are applicable to normal situations. In special cases, for example,
when some terminals do not need to send registration messages and only need to retain
all the GARP state machines, these terminals must be separated from other entities.
Therefore, the concept of member and observer is introduced. A member refers to an
entity that tries to declare or retain an attribute value or an entity that has not sent a
Leave message yet. An observer refers to an entity that traces the states of attributes but
does not declare attributes.
Multiple entities may actively join or leave the same attribute. To minimize the number
of Join or Leave messages in this situation, members are classified into active members
and passive members. Therefore, the following states are introduced:
– A: Active member
– P: Passive member
– O: Observer
In addition, when an active member must send a Leave message to cancel a declaration, the
active member enters the leaving state. Considering all these states, the state machine of an
applicant has multiple state combinations, as shown in the following table.
State Very Anxious Quiet Leaving
Combin Anxious
ation
Active VA AA QA LA
Member
Passive VP AP QP -
Member
Observer VO AO QO LO
When a passive member needs to cancel a declaration, it can switch to the observer state.
Therefore, the leaving passive member state does not exist.
A registrar has a Leave timer and three states: IN (attribute registered), MTR (attribute
deregistered), and LV (attribute being deregistered). If a registrar in LV state does not receive
the declaration of an attribute within the timeout interval of the Leave timer, the registrar
enters the MTR state.
A registrar changes to different states depending on the received message:
l When receiving a Join message, the registrar changes to the IN state.
l When receiving a Leave or LeaveAll message, the registrar changes from the IN state to
the LV state and starts the Leave timer. If the registrar is not in IN state, it does not
change its state after receiving a Leave or LeaveAll message.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l The registrar does not change its state after receiving an Empty message.
Example
# Display information about the GVRP state machine.
<HUAWEI> display gvrp state interface gigabitethernet 0/0/1 vlan 100
GVRP state of VLAN 100 on port GigabitEthernet0/0/1
Related Topics
5.10.9 gvrp
Format
display gvrp statistics [ interface { interface-type interface-number [ to interface-type
interface-number ] }&<1-10> ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display gvrp statistics command displays statistics about GVRP on an interface,
including the GVRP status, number of GVRP registration failures, source MAC address of the
last GVRP PDU, and registration mode of the interface.
Example
# Display the statistics about GVRP on an interface.
<HUAWEI> display gvrp statistics interface gigabitethernet 0/0/1
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
GVRP last PDU Source MAC address of the last GVRP PDU.
origin
Related Topics
5.10.9 gvrp
5.10.10 gvrp registration
Format
display gvrp status
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The device with GVRP enabled can dynamically register VLANs or deregister VLANs from
an interface. You can run the display gvrp status command to check whether GVRP is
enabled.
Example
# Display the enabling status of global GVRP.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.10.9 gvrp
Format
display gvrp vlan-operation interface interface-type interface-number
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display gvrp vlan-operation command displays the dynamic VLANs to which an
interface is added.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display the operation of adding an interface to dynamic VLANs.
<HUAWEI> display gvrp vlan-operation interface GigabitEthernet 0/0/1
Dynamic VLAN operations on port GigabitEthernet0/0/1
Item Description
Related Topics
5.10.9 gvrp
Function
The garp timer command sets GARP timers.
The undo garp timer command restores the default values of GARP timers.
By default, the value of the Hold timer is 10 centiseconds, the value of the Join timer is 20
centiseconds, and the value of the Leave timer is 60 centiseconds.
Format
garp timer { hold | join | leave } timer-value
Parameters
Parameter Description Value
hold timer-value Sets the value of the GARP l Lower limit: 10 centiseconds
Hold timer. l Upper limit: smaller than or equal
to half the value of the Join timer,
changing with the value of the
Join timer
l The value can be exactly divided
by 5, in centiseconds.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
join timer-value Sets the value of the GARP l Lower limit: greater than or equal
Join timer. to two times the value of the
Hold timer, changing with the
value of the Hold timer
l Upper limit: smaller than half the
value of the Leave timer,
changing with the value of the
Leave timer
l The value can be exactly divided
by 5, in centiseconds.
leave timer-value Sets the value of the GARP l Lower limit: greater than two
Leave timer. times the value of the Join timer,
changing with the value of the
Join timer
l Upper limit: smaller than the
value of the LeaveAll timer,
changing with the value of the
LeaveAll timer
l The value can be exactly divided
by 5, in centiseconds.
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command can set the following GARP timers:
l Join timer: controls sending of Join messages including JoinIn messages and JoinEmpty
messages.
l Hold timer: controls sending of Join messages (JoinIn messages and JoinEmpty
messages) and Leave messages (LeaveIn messages and LeaveEmpty messages).
l Leave timer: controls attribute deregistration.
You can set the GARP timers to control sending of GARP protocol packets.
Prerequisite
The physical port has been added to the port group before running the garp timer command
in the port group view.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Before setting garp timers on an interface, you must enable GVRP globally and on the
interface.
Precautions
When using the garp timer command to set the GARP timers, pay attention to the following
points:
l The garp timer can be used only on trunk interfaces.
l The undo garp timer command restores the default values of GARP timers. If the
default value of a timer is out of the valid range, the undo garp timer command does
not take effect.
l The value range of each timer changes with the values of the other timers. If a value you
set for a timer is not in the allowed range, you can change the value of the timer that
determines the value range of this timer.
l To restore the default values of all the GARP timers, restore the Hold timer to the default
value, and then restore the Join timer, Leave timer, and LeaveAll timer to the default
values in sequence.
When many dynamic VLANs need to be registered or the network radius is large, using
default values of timers may cause VLAN flapping and high CPU usage. In this case, increase
values of the timers. The following values are recommended depending on the number of
VLANs.
Table 5-66 Relationship between GARP timer values and number of dynamic VLANs that
need to be registered
Number of Dynamic VLANs to Be Registered (N)
Timer N <= 500 500 < N <= 1000 < N <= N > 1500
1000 1500
Example
# Set the LeaveALL timer of GigabitEthernet0/0/1 to 2000 centiseconds.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] garp timer leaveall 2000
Related Topics
5.10.2 display garp timer
5.10.8 garp timer leaveall
Function
The garp timer leaveall command sets the GARP LeaveAll timer.
The undo garp timer leaveall command restores the default value of the GARP LeaveAll
timer.
The default value of the LeaveAll timer is 1000 centiseconds (10 seconds).
Format
garp timer leaveall timer-value
Parameters
Parameter Description Value
timer-value Specifies the value of the The value is an integer that ranges
GARP LeaveAll timer. from 65 to 32765 and that can be
exactly divided by 5, in
centiseconds. The value of the
LeaveAll timer must be greater than
the values of Leave timers on all the
interfaces.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a GARP participant is enabled, the LeaveAll timer is started. When the LeaveAll timer
expires, the GARP participant sends LeaveAll messages to request other GARP participants
to re-register all its attributes. Then the LeaveAll timer restarts.
Devices on a network may have different settings for the LeaveAll timer. In this case, all the
devices use the smallest LeaveAll timer value on the network. When the LeaveAll timer of a
device expires, the device sends LeaveAll messages to other devices. After other devices
receive the LeaveAll messages, they reset their LeaveAll timers. Therefore, only the LeaveAll
timer with the smallest value takes effect even if devices have different settings for the
LeaveAll timer.
Prerequisites
Precautions
The Leave timer length on an interface is restricted by the global LeaveAll timer length.
When configuring the global LeaveAll timer, ensure that all the interfaces that have a GARP
Leave timer configured are working properly.
Example
# Set the LeaveAll timer to 2000 centiseconds.
<HUAWEI> system-view
[HUAWEI] garp timer leaveall 2000
Related Topics
5.10.7 garp timer
5.10.2 display garp timer
5.10.9 gvrp
Function
The gvrp command enables GVRP globally or on an interface.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
gvrp
undo gvrp
Parameters
None
Views
System view, Ethernet interface view, GE interface view, XGE interface view, MultiGE
interface view, 40GE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device with GVRP enabled can dynamically register VLANs or deregister VLANs from
an interface. To make GVRP take effect, run the gvrp command both in the system view and
interface view.
Precautions
Table 5-67 Relationship between GARP timer values and number of dynamic VLANs
that need to be registered
Number of Dynamic VLANs to Be Registered (N)
Timer N <= 500 500 < N <= 1000 < N <= N > 1500
1000 1500
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Enable GVRP globally.
<HUAWEI> system-view
[HUAWEI] gvrp
Related Topics
5.10.5 display gvrp status
5.10.4 display gvrp statistics
Format
gvrp registration { fixed | forbidden | normal }
undo gvrp registration [ fixed | forbidden | normal ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A GVRP interface supports three registration modes:
l Normal: In this mode, the GVRP interface can dynamically register and deregister
VLANs, and transmit dynamic VLAN registration information and static VLAN
registration information. information.
l Fixed: In this mode, the GVRP interface is disabled from dynamically registering and
deregistering VLANs and can transmit only the static VLAN registration information. If
the registration mode of a trunk interface is set to fixed, the interface allows only the
manually configured VLANs to pass even if it is configured to allow all the VLANs to
pass.
l Forbidden: In this mode, the GVRP interface is disabled from dynamically registering
and deregistering VLANs and can transmit only information about VLAN 1. If the
registration mode of a trunk interface is set to forbidden, the interface allows only
VLAN 1 to pass even if it is configured to allow all the VLANs.
Pre-configuration Tasks
Before setting the registration mode of an interface, you must enable GVRP globally and
configure the interface as a trunk interface.
Example
# Set the registration mode of GE0/0/1 to fixed.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] gvrp
[HUAWEI-GigabitEthernet0/0/1] gvrp registration fixed
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.10.9 gvrp
5.10.4 display gvrp statistics
Format
reset garp statistics [ interface { interface-type interface-number [ to interface-type
interface-number ] }&<1-10> ]
Parameters
Parameter Description Value
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before collecting GARP traffic statistics on a specific interface within a certain period, you
need to clear the existing GARP traffic statistics on this interface.
When using this command, pay attention to the following points:
l If interface interface-type interface-number is not specified, the system clears statistics
about GARP packets on all the interfaces.
l If interface interface-type interface-number is specified, the system clears statistics
about GARP packets on the specified interface.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
GVRP statistics cannot be restored after being cleared. Confirm your action before using this
command.
Example
# Clear statistics about GARP packets on GE0/0/1.
<HUAWEI> reset garp statistics interface gigabitethernet 0/0/1
Related Topics
5.10.9 gvrp
Function
The display snmp-agent trap feature-name vcmp all command displays all trap functions
of the VCMP module.
Format
display snmp-agent trap feature-name vcmp all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the trap function of a specified feature is enabled, you can run the display snmp-agent
trap feature-name vcmp all command to check the status of all traps of VCMP. You can use
the snmp-agent trap enable feature-name vcmp command to enable the trap function of
VCMP.
Prerequisites
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display all trap functions of the VCMP module.
<HUAWEI>display snmp-agent trap feature-name vcmp all
------------------------------------------------------------------------------
Feature name: VCMP
Trap number : 2
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwVcmpServerMacConflict on on
hwVcmpRevisionConflict on on
Table 5-68 Description of the display snmp-agent trap feature-name vcmp all command
output
Item Description
Related Topics
5.11.9 snmp-agent trap enable feature-name vcmp
Function
The display vcmp counters command displays statistics on VCMP packets.
Format
display vcmp counters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If VCMP configured on a switch does not take effect, run the display vcmp counters
command to view statistics on VCMP packets. The statistics helps you determine whether
data on the switch is incorrect and locate faults.
Example
# Display statistics on VCMP packets.
<HUAWEI> display vcmp counters
VCMP statistics:
Received summary packets : 0
Received request packets : 0
Sent summary packets : 0
Sent request packets : 0
Received packets with ethheader error : 0
Received packets with version error : 0
Received packets with type error : 0
Received packets with digest error : 0
Received packets with domain error : 0
Received packets with deviceid error : 0
Failed to receive packets for bad vcmp state : 0
Failed to send packets for bad vcmp state : 0
Failed to receive packets for bad vlan : 0
Failed to send packets for bad vlan : 0
Failed to receive packets for bad link state : 0
Failed to send packets for bad link state : 0
Failed to receive packets for bad link type : 0
Failed to send packets for bad link type : 0
Failed to receive packets for bad forward state : 0
Failed to send packets for bad forward state : 0
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Received packets Number of received VCMP packets with an incorrect device ID.
with deviceid error
Failed to send Number of packets that failed to be sent due to incorrect VCMP
packets for bad vcmp status.
state
Failed to send Number of packets that failed to be sent due to incorrect VLAN
packets for bad vlan information.
Failed to receive Number of packets that failed to be received due to incorrect link
packets for bad link status.
state
Failed to send Number of packets that failed to be sent due to incorrect link status.
packets for bad link
state
Failed to send Number of packets that failed to be sent due to an incorrect link
packets for bad link type.
type
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.11.7 reset vcmp counters
Function
The display vcmp interface brief command displays the VCMP status on Layer 2 Ethernet
interfaces.
Format
display vcmp interface brief
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
By default, VCMP is enabled on all Layer 2 Ethernet interfaces of a switch. You can run the
display vcmp interface brief command to view the VCMP status on Layer 2 Ethernet
interfaces.
Example
# Display the VCMP status on Layer 2 Ethernet interfaces.
<HUAWEI> display vcmp interface brief
Vcmp interface number:2
Interface Vcmp State
--------------------------------------------
GigabitEthernet0/0/1 disable
GigabitEthernet0/0/2 enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Table 5-70 Description of the display vcmp interface brief command output
Item Description
Related Topics
5.11.12 vcmp disable
Format
display vcmp status
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After VCMP is configured on a switch, you can run the display vcmp status command to
view the VCMP configuration.
Example
# Display the VCMP configuration.
<HUAWEI> display vcmp status
VCMP information:
Domain : VLAN
Role : Server
Server ID : VLAN
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Domain VCMP domain name. To change the VCMP domain name, run the
vcmp domain command.
Role VCMP role of the switch in the VCMP domain. To change the
VCMP role, run the vcmp role command.
Format
display vcmp track
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a VLAN is created on or deleted from a device functioning as a server, the device
functioning as a client synchronizes its VLAN information with that on the server by
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
exchanging VCMP packets. To view VLAN changes, run the display vcmp track command
on the client.
Example
# Display VLAN changes on the client.
<HUAWEI> display vcmp track
Operate Flags: A - Add, D - Delete
-------------------------------------------------------------------------------
Op System-Time Operate-VLAN
-------------------------------------------------------------------------------
D 03-26 17:56:44+01:01 20-100
D 03-26 16:44:11+01:01 300
A 03-26 16:44:11+01:01 30
D 03-26 16:44:10+01:01 30
A 03-26 16:44:10+01:01 300
D 03-26 16:44:09+01:01 300
A 03-26 16:44:09+01:01 30
D 03-26 16:44:08+01:01 30
A 03-26 16:44:08+01:01 300
D 03-26 16:44:08+01:01 300
Item Description
Related Topics
5.11.8 reset vcmp track
Function
The reset vcmp command clears the VCMP domain name and device ID learned on a VCMP
client.
Format
reset vcmp
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The VCMP domain ID and device ID learned by a VCMP client remain unchanged. The
VCMP client needs to learn VCMP information again when the VCMP server in the local
VCMP domain is changed. Therefore, clear learned VCMP information before the VCMP
client learns VCMP information.
Configuration Impact
After the reset vcmp command is executed, the learned VCMP information is cleared and
cannot be restored. Therefore, exercise caution when you run the reset vcmp command.
Example
# Clear the VCMP domain name and device ID learned on a VCMP client
<HUAWEI> reset vcmp
Function
The reset vcmp counters command clears statistics on VCMP packets.
Format
reset vcmp counters
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Before recollecting statistics on VCMP packets in a specified period, run the reset vcmp
counters command to clear existing statistics on VCMP packets.
Configuration Impact
After the reset vcmp counters command is executed, statistics on VCMP packets are cleared
cannot be restored. Therefore, exercise caution when you run the reset vcmp counters
command.
Example
# Clear statistics on VCMP packets.
<HUAWEI> reset vcmp counters
Related Topics
5.11.2 display vcmp counters
Format
reset vcmp track
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before viewing VLAN changes on a client using the display vcmp track command, run the
reset vcmp track command to delete existing VLAN changes.
Configuration Impact
After you run the reset vcmp track command, the deleted information cannot be restored.
Therefore, exercise caution when running the reset vcmp track command.
Example
# Delete existing VLAN changes on the client.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.11.5 display vcmp track
Function
The snmp-agent trap enable feature-name vcmp command enables the trap function for the
VCMP module.
The undo snmp-agent trap enable feature-name vcmp command disables the trap function
for the VCMP module.
Format
snmp-agent trap enable feature-name vcmp [ trap-name { hwvcmprevisionconflict |
hwvcmpservermacconflict } ]
Parameters
Views
System view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
When the trap function is enabled, the device generates traps during running and sends traps
to the NMS through SNMP. When the trap function is not enabled, the device does not
generate traps and the SNMP module does not send traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the device to send a Huawei proprietary trap when the server in a VCMP domain
receives a VCMP packet with a higher revision number.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name vcmp trap-name hwvcmprevisionconflict
Related Topics
5.11.1 display snmp-agent trap feature-name vcmp all
Format
vcmp authentication sha2-256 password password
undo vcmp authentication
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To enhance security for a VCMP domain, you can run the vcmp authentication command to
set a VCMP domain authentication password on each switch for authenticating packets
exchanged between the switches in the VCMP domain.
Precautions
All switches in a VCMP domain must use the same VCMP domain authentication password.
Example
# Set the VCMP domain authentication password to huawei.
<HUAWEI> system-view
[HUAWEI] vcmp authentication sha2-256 password huawei
Related Topics
5.11.4 display vcmp status
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The vcmp device-id command sets the device ID of the VCMP server.
The undo vcmp device-id command deletes the device ID of the VCMP server.
Format
vcmp device-id device-name
Parameters
Parameter Description Value
device-name Specifies a device ID. The value is a string of 1 to 31 case-sensitive
characters without spaces.When double quotation
marks are used around the string, spaces are allowed
in the string.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A device ID identifies the VCMP server so that other roles in a VCMP domain can identify
the VCMP server.
Precautions
Example
# Set the device ID of the VCMP server.
<HUAWEI> system-view
[HUAWEI] vcmp device-id VLAN
Related Topics
5.11.4 display vcmp status
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The vcmp disable command disables VCMP on an interface.
Format
vcmp disable
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
The interface connected to the peer end has been configured as a Layer 2 interface using the
portswitch command.
Example
# Disable VCMP on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] vcmp disable
Related Topics
5.11.3 display vcmp interface brief
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
vcmp domain domain-name
undo vcmp domain
Parameters
Parameter Description Value
domain-name Specifies the name of a The value is a string of 1 to 31 case-sensitive
VCMP domain. characters without spaces.When double quotation
marks are used around the string, spaces are
allowed in the string.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
VLANs created and deleted on the VCMP server are synchronized to VCMP clients in the
local VCMP domain by sending VCMP packets.
A VCMP domain specifies the scope for managed switches. All VCMP clients are managed
by the VCMP server. You can run the vcmp domain command to configure a VCMP domain.
Precautions
All switches in a VCMP domain must use the same domain name either through manual
configuration or automatic learning. If the domain name is not set on a VCMP client, the
VCMP client learns the domain name in the first received VCMP packet.
Each switch can be added to only one VCMP domain. Switches in different VCMP domains
cannot synchronize VLAN information.
Example
# Configure a VCMP domain named VLAN.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] vcmp domain VLAN
Related Topics
5.11.4 display vcmp status
Function
The vcmp role command configures a role for a switch in a VCMP domain.
The undo vcmp role command restores the default role of a switch in a VCMP domain.
Format
vcmp role { client | server | silent | transparent }
Parameters
Parameter Description Value
client Indicates the client role in a VCMP domain. -
You can create and delete VLAN information on the VCMP server.
The VCMP server synchronizes VLAN information to other switches
in the local VCMP domain by sending VCMP packets.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
VLANs created and deleted on the VCMP server are synchronized to VCMP clients in the
local VCMP domain by sending VCMP packets.
You can run the vcmp role command to set roles of switches in a VCMP domain.
Example
# Configure a switch as the VCMP server in a VCMP domain.
<HUAWEI> system-view
[HUAWEI] vcmp role server
Related Topics
5.11.4 display vcmp status
Function
The active region-configuration command activates the configuration of a multiple spanning
tree (MST) region.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
active region-configuration
Parameters
None
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Configuring MST region parameters, especially VLAN mapping tables for MST regions, is
likely to cause network topology flapping. To reduce network flapping, make sure that newly
configured MST region parameters take effect only after the active region-configuration
command is run.
Precautions
After the active region-configuration command is run, the configured MST region
parameters will take effect and all spanning trees in the MST region will be recalculated.
If the VLAN to be mapped to an MSTP instance is the control VLAN for the SEP segment,
the newly configured parameters of the MST region cannot be activated.
Example
# Map VLAN 5 to the spanning tree instance 2 and activate the configuration.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] instance 2 vlan 5
[HUAWEI-mst-region] active region-configuration
Related Topics
5.12.2 check region-configuration
5.12.12 display stp region-configuration
Function
The check region-configuration command displays the configuration of an MST region such
as the region name, revision level, and VLAN mapping table.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
check region-configuration
Parameters
None
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP divides a switching network into multiple regions, each of which has multiple
spanning trees that are independent of each other. Each region is called an MST region and
each spanning tree is called a multiple spanning tree instance (MSTI).
Two switching devices belong to the same MST region only when they have the following
same configurations:
l MST region name
l MST region revision level
l Mappings between MSTIs and VLANs
To ensure that MST region configurations on each switching device are correct, you are
recommended to run the check region-configuration command to check the MST region
configurations before running the active region-configuration command. If the MST region
configurations are correct, run the active region-configuration command to activate them.
Precautions
By default, VLANs that are not mapped to any instances with non-zero IDs using the
instance command are mapped to instance 0.
Example
# Display the configuration of an MST region.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] check region-configuration
Admin configuration
Format selector :0
Region name :00b010000001
Revision level :0
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Region name Name of the MST region. To configure the name for
an MST region, run the region-name command.
Revision level Revision level of the MST region. To set the revision
level of the MST region, run the revision-level
command.
Related Topics
5.12.1 active region-configuration
Format
display ethernet-loop-protection ignored-vlan
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After you configure an ignored VLAN using the ethernet-loop-protection ignored-vlan
command, the display ethernet-loop-protection ignored-vlan command can be used to
display information about the configured ignored VLAN.
Prerequisites
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display information about the configured ignored VLAN.
<HUAWEI> display ethernet-loop-protection ignored-vlan
Ethernet-loop-protection ignored-vlan : 3 to 4
Related Topics
5.12.17 ethernet-loop-protection ignored-vlan
Format
display snmp-agent trap feature-name mstp all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The Simple Network Management Protocol (SNMP) is a standard network management
protocol widely used on TCP/IP networks. It uses a central computer (a network management
station) that runs network management software to manage network elements. The
management agent on the network element automatically reports traps to the network
management station. After that, the network administrator immediately takes measures to
resolve the problem.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The display snmp-agent trap feature-name mstp all command displays whether all trap
functions of the MSTP module are enabled.
Example
# Display all trap messages of the MSTP module.
<HUAWEI> display snmp-agent trap feature-name mstp all
------------------------------------------------------------------------------
Feature name: MSTP
Trap number : 22
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwMstpiPortStateForwarding off off
hwMstpiPortStateDiscarding off off
hwMstpiBridgeLostRootPrimary off off
hwMstpiPortBpduGuarded off off
hwMstpiPortRootGuarded off off
hwMstpiPortLoopGuarded off off
newRoot off off
topologyChange off off
hwMstpiEdgePortChanged off off
hwMstpiTcGuarded off off
hwMstpProNewPortStateForwarding
off off
hwMstpProNewPortStateDiscarding
off off
hwMstpProNewBridgeLostRootPrimary
off off
hwMstpProNewPortBpduGuarded off off
hwMstpProNewPortRootGuarded off off
hwMstpProNewPortLoopGuarded off off
hwMstpProNewEdgePortChanged off off
hwMstpProTcGuarded off off
hwMstpProRootChanged off off
hwMstpProLoopbackDetected off off
hwMstpPortCountThreshold off off
hwMstpPortCountThresholdResume off off
Table 5-75 Description of the display snmp-agent trap feature-name mstp all command
output
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.12.25 snmp-agent trap enable feature-name mstp
Format
display snmp-agent trap feature-name vbst all
Parameters
None
Views
All views
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
1: Monitoring level
Usage Guidelines
The Simple Network Management Protocol (SNMP) is a standard network management
protocol widely used on TCP/IP networks. It uses a central computer (a network management
station) that runs network management software to manage network elements. The
management agent on the network element automatically reports traps to the network
management station. After that, the network administrator immediately takes measures to
resolve the problem.
The display snmp-agent trap feature-name vbst all command displays whether all trap
functions of the VBST module are enabled.
Example
# Display all trap messages of the VBST module.
<HUAWEI>display snmp-agent trap feature-name vbst all
------------------------------------------------------------------------------
Feature name:
VBST
Trap number :
2
------------------------------------------------------------------------------
Table 5-76 Description of the display snmp-agent trap feature-name vbst all command
output
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.12.26 snmp-agent trap enable feature-name vbst
Format
STP/RSTP/MSTP: display stp [ process process-id ] [ instance instance-id ] [ interface
interface-type interface-number | slot slot-id ] [ brief ]
VBST: display stp [ vlan vlan-id ] [ interface interface-type interface-number | slot slot-id ]
[ brief ]
Parameters
Parameter Description Value
process Indicates the ID of an MSTP process. The value is a decimal
process-id integer ranging from 1
If process process-id is not specified, the status to 15.
and statistics of an MSTP process with the ID 0
will be displayed.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display stp command is used to check whether STP/RSTP/MSTP/VBST is run in the
existing switching device or specified interface.
l If the Protocol Status field value is Disabled, STP/RSTP/MSTP/VBSTis not run.
l If STP/RSTP/MSTP has been run, information such as the working mode of STP/RSTP/
MSTP/VBST will be displayed.
When the network planner has deployed STP/RSTP/MSTP/VBST on the network, you can
run the display stp command to check whether the configurations and calculation result.
Precautions
l If you run this command in the system view without specifying an MSTP process,
information about MSTP process 0 is displayed by default.
l If you run this command in the MSTP process view without specifying an MSTP
process, information about the MSTP process in this view is displayed by default.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Example
# When the stp enable command does not run, the status and statistics of STP are displayed.
<HUAWEI> display stp
Protocol Status :Disabled
Protocol Standard :IEEE 802.1s
Version :3
CIST Bridge Priority :32768
MAC address :00e0-6343-6800
Max age(s) :20
Forward delay(s) :15
Hello time(s) :2
Max hops :20
Share region-configuration :Enabled
Item Description
CIST Bridge Priority Priority of the switch in the CIST. To set the STP priority, run
the stp priority command.
Max age (s) Maximum TTL of BPDU. To set the value of Max Age, run
the stp timer max-age command.
Forward delay (s) Time taken by interface status transition. To set the value of
Forward Delay, run the stp timer forward-delay command.
Hello time (s) Interval for sending BPDUs from the root switch. To set the
hello time, run the stp timer hello command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
# Display the status of and statistics on a spanning tree instance when the stp enable
command is configured.
<HUAWEI> display stp brief
MSTID Port Role STP State Protection
0 GigabitEthernet0/0/1 DESI FORWARDING NONE
0 GigabitEthernet0/0/2 DESI FORWARDING NONE
0 GigabitEthernet0/0/4 ROOT FORWARDING NONE
Port -
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
# Display the status of and statistics on the spanning tree instance 0 on GE0/0/1.
<HUAWEI> display stp instance 0 interface gigabitethernet 0/0/1
-------[CIST Global Info][Mode MSTP]-------
CIST Bridge :32768.00e0-fc0e-a421
Config Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
Active Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
CIST Root/ERPC :32768.00e0-fc0e-a421 / 0 (This bridge is the root)
CIST RegRoot/IRPC :32768.00e0-fc0e-a421 / 0 (This bridge is the root)
CIST RootPortId :0.0
BPDU-Protection :Disabled
TC or TCN received :0
TC count per hello :0
STP Converge Mode :Normal
Share region-configuration :Enabled
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
----[Port3(GigabitEthernet0/0/1)][FORWARDING]----
Port Protocol :Enabled
Port Role :Designated Port
Port Priority :128
Port Cost(Legacy) :Config=auto / Active=19
Designated Bridge/Port :32768.00e0-fc0e-a421 / 128.1229
Port Edged :Config=disabled / Active=disabled
Point-to-point :Config=auto / Active=true
Transit Limit :3 packets/hello-time
Protection Type :None
Port STP Mode :MSTP
Config-digest-snoop :snooped=false
Port Protocol Type :Config=auto / Active=dot1s
BPDU Encapsulation :Config=stp / Active=stp
PortTimes :Hello 2s MaxAge 20s FwDly 15s RemHop 0
TC or TCN send :0
TC or TCN received :0
BPDU Sent :147
TCN: 0, Config: 0, RST: 0, MST: 147
BPDU Received :0
TCN: 0, Config: 0, RST: 0, MST: 0
Mode MSTP The operation mode is MSTP. By default, the mode is MSTP.
To set the operation mode, run the stp mode command.
Active Times Values that is used actually in the bridge protocol information:
l Hello: the period of sending BPDUs.
l MaxAge: the maximum life cycle of BPDU.
l FwDly: deferred time of the change of the port status.
l MaxHop: the maximum hops in the MST region.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
CIST Root/ERPC CIST root bridge ID/External path cost (the path cost from the
switch to the CIST root bridge.)
NOTE
CIST Root/ERPC is displayed when STP/RSTP/MSTP is running.
Root ID / RPC is displayed when VBST is running.
CIST RegRoot/IRPC Region root bridge ID/Internal path cost (the path cost from
the switch to region root bridge.)
CIST RootPortId CIST root port ID. "0.0" indicates the switch is a root bridge
and has no root port.
NOTE
CIST RootPortId is displayed when STP/RSTP/MSTP is running.
RootPortId is displayed when VBST is running.
Time since last TC Period from the last topology change to now.
Port Role In CIST area, the four port roles are as follows:
l Root Port
l Designated Port
l Alternate Port
l Backup Port
Port Priority Priority of the port. To set the priority for a port, run the stp
port priority command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Designated Bridge/Port ID of the designated switch and port. The first 16 bits of the
switch ID represent the priority of the switch in the CIST
region; the last 48 bits represent the MAC address of the
switch. The first 4 bits of the port ID represent the priority and
the last 12 bits represent the port number.
Point-to-point Link type of the port. Config indicates that the link type is
configured by running the stp point-to-point command.
Active indicates the actual link type.
Transit Limit Limit of the BPDUs sent by the current port during each Hello
time. To set the limit of the BPDUs sent by the current port
during each Hello time, run the stp transmit-limit (interface
view) command.
Port Protocol Type Format of the packets that the interface receives and sends.
The formats are as follows:
l auto
l legacy
l dot1s
The default value is auto. Config indicates that the packet
format is configured by running the stp compliance command.
Active indicates the actual packet format.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
BPDU Encapsulation Protocol format of the BPDUs received and sent through a
port:
l pvst
l stp
TC or TCN send Number of BPDUs with TC flags or TCN BPDUs sent by the
port.
Related Topics
5.12.22 reset stp statistics
5.12.40 stp enable
5.12.52 stp process
Format
STP/RSTP/MSTP: display stp [ process process-id ] [ instance instance-id ] abnormal-
interface
VBST: display stp [ vlan vlan-id ] abnormal-interface
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
process Displays the ID of a specified multi service The value is an integer in
process-id transport platform (MSTP) process. the range 1 to 15.
If process process-id is not specified, the
status and statistics of the MSTP process with
ID 0 will be displayed.
vlan vlan-id Displays information about abnormal ports The value is an integer that
running STP in a specified VLAN. ranges from 1 to 4094.
If vlan vlan-id is not specified, information
about abnormal ports running STP in all
VLANs is displayed.
NOTE
If vlan vlan-id is specified, only information about
abnormal ports running VBST is displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
If a device has many interfaces and the display stp command output displays vast
information, viewing information about abnormal interfaces running STP is difficult.
You can use the display stp abnormal-interface command to view information about
abnormal interfaces running STP.
Precautions
l If you run this command in the system view without specifying an MSTP process,
information about MSTP process 0 is displayed by default.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l If you run this command in the MSTP process view without specifying an MSTP
process, information about the MSTP process in this view is displayed by default.
Example
# Display information about abnormal interfaces in process 0 running STP
<HUAWEI> display stp instance 0 abnormal-interface
MSTID Interface Status Reason
0 GigabitEthernet0/0/0 DISCARDING LOOP-Protected
0 GigabitEthernet0/0/1 DOWN BPDU-Protected
0 GigabitEthernet0/0/2 DISCARDING ROOT-Protected
0 GigabitEthernet0/0/3 DISCARDING LOOP-Detected
Related Topics
5.12.6 display stp
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The display stp active command displays the status of and statistics on spanning trees of all
Up interfaces.
Format
STP/RSTP/MSTP: display stp [ process process-id ] active
Parameters
Parameter Description Value
process Multiple Spanning Tree Protocol (MSTP) process ID The value is an
process-id
integer ranging
If process process-id is not specified, the status of and
from 1 to 15.
statistics on process 0 will be displayed.
vlan vlan-id Displays details and statistics about spanning trees of The value is an
all ports in Up state in a specified VLAN. integer that
ranges from 1 to
If vlan vlan-id is not specified, details and statistics 4094.
about spanning trees of all ports in Up state in all
VLANs are displayed.
NOTE
If vlan vlan-id is specified, only details and statistics about
spanning trees of all ports in Up state in a specified VLAN
are displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display stp active command displays information about spanning trees of Up interfaces
only.
Precautions
l If you run this command in the system view without specifying an MSTP process ID,
information about MSTP process 0 is displayed by default.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l If you run this command in the MSTP process view without specifying an MSTP process
ID, information about the MSTP process in this view is displayed by default.
Example
# Display information about spanning trees of all Up interfaces of MSTP process 0 when
STP/RSTP/MSTP is running.
<HUAWEI> display stp active
-------[CIST Global Info][Mode MSTP]-------
CIST Bridge :61440.781d-ba56-f06c
Config Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
Active Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
CIST Root/ERPC :61440.781d-ba56-f06c / 0 (This bridge is the
root)
CIST RegRoot/IRPC :61440.781d-ba56-f06c / 0 (This bridge is the
root)
CIST RootPortId :0.0
BPDU-Protection :Disabled
TC or TCN received :85
TC count per hello :0
STP Converge Mode :Normal
Share region-configuration :Enabled
Time since last TC :0 days 9h:10m:8s
Number of TC :13
Last TC occurred :GigabitEthernet0/0/4
----[Port18(GigabitEthernet0/0/10)][FORWARDING]----
Port Protocol :Enabled
Port Role :Designated Port
Port Priority :128
Port Cost(Dot1T ) :Config=auto / Active=20000
Designated Bridge/Port :61440.781d-ba56-f06c / 128.18
Port Edged :Config=default / Active=enabled
Point-to-point :Config=auto / Active=true
Transit Limit :10 packets/s
Protection Type :None
Port STP Mode :MSTP
Port Protocol Type :Config=auto / Active=dot1s
BPDU Encapsulation :Config=stp / Active=stp
PortTimes :Hello 2s MaxAge 20s FwDly 15s RemHop 20
TC or TCN send :5
TC or TCN received :0
BPDU Sent :178445
TCN: 0, Config: 0, RST: 0, MST: 178445
BPDU Received :0
TCN: 0, Config: 0, RST: 0, MST: 0
Last forwarding time: 2012/04/19 16:58:37 UTC+08:00
----[Port19(GigabitEthernet0/0/17)][FORWARDING]----
Port Protocol :Enabled
Port Role :Designated Port
Port Priority :128
Port Cost(Dot1T ) :Config=auto / Active=20000
Designated Bridge/Port :61440.781d-ba56-f06c / 128.19
Port Edged :Config=default / Active=enabled
Point-to-point :Config=auto / Active=true
Transit Limit :10 packets/s
Protection Type :None
Port STP Mode :MSTP
Port Protocol Type :Config=auto / Active=dot1s
BPDU Encapsulation :Config=stp / Active=stp
PortTimes :Hello 2s MaxAge 20s FwDly 15s RemHop 20
TC or TCN send :0
TC or TCN received :0
BPDU Sent :5
TCN: 0, Config: 0, RST: 0, MST: 5
BPDU Received :0
TCN: 0, Config: 0, RST: 0, MST: 0
Last forwarding time: 2012/04/23 20:06:08 UTC+08:00
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
# Display details and statistics about spanning trees of all ports in Up state in VLAN 10 when
VBST is running.
<HUAWEI> display stp vlan 10 active
-------[VLAN 10 Global Info]-------
Bridge ID :0 .00e0-5553-9900
Bridge Diameter :7
Config Times :Hello 2s MaxAge 20s FwDly 15s
Active Times :Hello 2s MaxAge 20s FwDly 15s
Root ID / RPC :0 .00e0-5553-9900 / 0 (This bridge is the root)
RootPortId :0.0
Root Type :Primary
----[Port1(GigabitEthernet0/0/1)][FORWARDING]----
Port Role :Designated Port
Port Priority :128
Port Cost(Legacy) :Config=Auto / Active=20
Desg. Bridge/Port :0 .00e0-5553-9900 / 128.1
Port Edged :Config=Default / Active=Disabled
Point-to-point :Config=Auto / Active=true
Transit Limit :6 packets/hello
Protection Type :None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
CIST Root/ERPC CIST Root/ERPC indicates the CIST root bridge ID/external
Root ID / RPC path cost from the switch to the root bridge.
Root ID / RPC indicates the root bridge ID in a VLAN/
external path cost from the switch to the root bridge.
NOTE
CIST Root/ERPC is displayed when STP/RSTP/MSTP is running.
Root ID / RPC is displayed when VBST is running.
CIST RegRoot/IRPC ID of the CIST region root bridge/Cost of the internal path
(path from the switch to the CIST region root switch)
CIST RootPortId CIST RootPortId indicates the CIST root port ID. "0.0"
RootPortId indicates that the switch is the root switch without the root
port.
RootPortId indicates the root port ID in a VLAN. "0.0"
indicates that the switch is the root switch without the root
port.
NOTE
CIST RootPortId is displayed when STP/RSTP/MSTP is running.
RootPortId is displayed when VBST is running.
STP Converge Mode Convergence mode of the Spanning Tree Protocol (SPT),
which can be fast or normal. For details, see stp converge.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Port Role Role of an interface. In the CIST region, the roles of interfaces
are as follows:
l Root Port
l Designated Port
l Alternate Port
l Backup Port
Port Priority Interface priority. For details, see stp port priority.
Designated Bridge/Port Switch ID/Port ID The first 16 bits represent the switch's
priority in the CIST region, and the last 48 bits represent the
switch's MAC address. The first 4 bits of the port ID represent
the port's priority, and the last 12 bits represent the port
number.
Point-to-point Link type of the interface. Config indicates the link type that is
specified in the stp point-to-point command, and Active
indicates the link type that is being used.
Transit Limit Maximum number of BPDUs that the current interface can
send per second. For details, see stp transmit-limit.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Port Protocol Type Format of packets sent and received on the interface, which
can be:
l auto
l legacy
l dot1s
The default value is auto. Config indicates the packet format
that is specified in the stp compliance command, and Active
indicates the packet format in use.
BPDU Encapsulation Format of BPDUs that are sent and received on the interface,
which can be:
l pvst
l stp
MSTI RegRoot/IRPC MSTI root bridge ID/Cost of the internal path (path from the
switch to the MSTI root switch)
MSTI RootPortId ID of the MSTI root interface. 0.0 indicates that the switch is
the root switch and does not provide any root interface.
Cost to Master Cost of the path from the switch to the bridge where the master
interface is located. 0 indicates that the master interface is
located at the current bridge.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.12.6 display stp
5.12.9 display stp bridge
5.12.11 display stp global
Format
STP/RSTP/MSTP: display stp [ process process-id ] bridge { root | local }
VBST: display stp [ vlan vlan-id ] bridge { root | local }
Parameters
Parameter Description Value
process Multiple Spanning Tree Protocol (MSTP) process ID The value is an
process-id integer ranging
If process process-id is not specified, details about from 1 to 15.
the spanning tree of MSTP process 0 will be
displayed.
Views
All views
Default Level
1: Monitoring level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
When a device provides many interfaces, running the display stp command displays a large
amount of information, and it is difficult to find information about the spanning trees of the
root and local bridges.
Using the display stp bridge command, you can easily view details about the spanning trees
of the root and local bridges.
Precautions
l If you run this command in the system view without specifying an MSTP process ID,
information about MSTP process 0 is displayed by default.
l If you run this command in the MSTP process view without specifying an MSTP process
ID, information about the MSTP process in this view is displayed by default.
Example
# Display details about the spanning tree of the root bridge of MSTP process 0 when STP/
RSTP/MSTP is running.
<HUAWEI> display stp bridge root
MSTID Root ID Root Cost Hello Max Forward Root Port
Time Age Delay
----- -------------------- ---------- ----- --- ------- -----------------
0 61440.781d-ba56-f06c 0 2 20 15
1 61440.781d-ba56-f06c 0 2 20 15
# Display details about the spanning tree of the root bridge running VBST in VLAN 5.
<HUAWEI> display stp vlan 5 bridge root
VLAN-ID Root ID Root Cost Hello Max Forward Root
Port
Time Age
Delay
----- -------------------- ---------- ----- --- -------
-----------------
5 32768.5489-9876-a2b0 20000 2 20 15 GigabitEthernet0/0/5
# Display details about the spanning tree of the root bridge running VBST in VLAN 10.
<HUAWEI> display stp vlan 10 bridge root
------------------------------------------------------------------------------
Hello Max
Forward
10 4106.0025-9e95-7c21 0 2 20
15
------------------------------------------------------------------------------
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Hello Time Interval at which Bridge Protocol Data Units (BPDUs) are sent
from the root switch
Related Topics
5.12.6 display stp
5.12.8 display stp active
5.12.11 display stp global
Function
The display stp error packet command displays the statistics about error packets received by
MSTP and the contents of recently received packets.
Format
display stp error packet
Parameters
None.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a device on a Layer 2 network runs MSTP is attacked by MSTP error packets, the display
stp error packet command can be used to view recently received MSTP error packets.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display the statistics about error packets received by MSTP and the contents of recently
received packets.
<HUAWEI> display stp error packet
4 error-packet(s) have been received and the last one is received at 2011/05/02
12:45:31.
01 80 C2 00 00 00 38 AA D2 11 11 10 00 69 42 42
03 00 00 03 02 7C 00 00 38 AA D2 11 11 10 00 00
00 00 00 00 38 AA D2 11 11 10 80 01 00 00 14 00
02 00 0F 00 00 00 40 00 33 38 61 61 64 32 31 31
31 31 31 30 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 AC 36 17 7F 50 28
3C D4 B8 38 21 D8 AB 26 DE 62 00 00 00 00 00 00
38 AA D2 11 11 10 14
Related Topics
5.12.22 reset stp statistics
5.12.40 stp enable
Format
display stp [ process process-id ] global
Parameters
Parameter Description Value
process Multiple Spanning Tree Protocol (MSTP) process ID The value is an
process-id integer ranging
If process process-id is not specified, the global STP from 1 to 15.
information of MSTP process 0 will be displayed.
VBST does not support processes. Therefore, this
parameter cannot be specified when the spanning tree
protocol is VBST.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
When a device provides many interfaces, the display stp command output contains a large
amount of information, and it is difficult to find the desired information quickly and view
global information at a glance. The display stp brief command output, by comparison,
displays information about spanning trees on interfaces, but not global information.
Using the display stp global command, you can view global STP information conveniently.
Precautions
l If you run this command in the system view without specifying an MSTP process ID,
information about MSTP process 0 is displayed by default.
l If you run this command in the MSTP process view without specifying an MSTP process
ID, information about the MSTP process in this view is displayed by default.
Example
# Display brief STP information about MSTP process 0 when STP/RSTP/MSTP is running.
<HUAWEI> display stp global
Protocol Status : Enabled
Bpdu-filter default : Disabled
Tc-protection : Enabled
Tc-protection threshold : 1
Tc-protection interval : 2s
Edged port default : Enabled
Pathcost-standard : Dot1t
Timer-factor : 3
Transmit-limit : 10
Bridge-diameter : 7
-------[CIST Global Info][Mode MSTP]-------
CIST Bridge :61440.781d-ba56-f06c
Config Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
Active Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
CIST Root/ERPC :61440.781d-ba56-f06c / 0
CIST RegRoot/IRPC :61440.781d-ba56-f06c / 0
CIST RootPortId :0.0
BPDU-Protection :Disabled
TC or TCN received :85
TC count per hello :0
STP Converge Mode :Normal
Share region-configuration :Enabled
Time since last TC :0 days 9h:12m:34s
Number of TC :13
Last TC occurred :GigabitEthernet0/0/4
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Tc-protection threshold Threshold of TC packets that the device can handle and
immediately refresh forwarding entries in a given period
Tc-protection interval Time the MSTP takes to handle a given number of TC packets
and immediately refresh forwarding entries
Edged port default Whether the function of configuring all ports of the switch as
edge ports is enabled:
l Enabled: The function is enabled.
l Disabled: The function is disabled.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
CIST Root/ERPC CIST root switch ID/Cost of the external path (path from the
switch to the CIST root switch)
CIST RegRoot/IRPC ID of the CIST region root bridge/Cost of the internal path
(path from the switch to the CIST region root switch)
CIST RootPortId ID of the CIST root interface. 0.0 indicates that the switch is
the root switch and does not provide any root interface.
STP Converge Mode Convergence mode of the Spanning Tree Protocol (SPT),
which can be fast or normal. For details, see stp converge.
Related Topics
5.12.6 display stp
5.12.8 display stp active
5.12.9 display stp bridge
Function
The display stp region-configuration command displays the effective configuration of the
MST region on the switching device. The configuration includes the region name, revision
level and mapping relationship between VLANs and spanning tree instances.
Format
display stp [ process process-id ] region-configuration [ digest ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
process process-id Indicates the ID of an MSTP process. VBST The value is an
does not support processes. Therefore, this integer ranging from
parameter cannot be specified when the spanning 1 to 15.
tree protocol is VBST.
digest Displays brief information about the effective -
MST region.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After an MST region is configured and takes effect on the network running MSTP, you can
run the display stp region-configuration command to view the name, revision level, STP
instance, and inter-VLAN mapping of the MST region.
Precautions
l If you run this command in the system view without specifying an MSTP process,
information about MSTP process 0 is displayed by default.
l If you run this command in the MSTP process view without specifying an MSTP
process, information about the MSTP process in this view is displayed by default.
NOTE
Example
# Display the configuration of MST regions when STP/RSTP/MSTP is running.
<HUAWEI> display stp region-configuration
Oper configuration
Format selector :0
Region name :huawei
Revision level :0
Instance VLANs Mapped
0 21 to 4094
1 1 to 10
2 11 to 20
# Display brief information about the effective MST region when STP/RSTP/MSTP is
running.
<HUAWEI> display stp region-configuration digest
Oper configuration
Format selector :0
Region name :huawei
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Revision level :0
Digest :0xAC36177F50283CD4B83821D8AB26DE62
# Display the mapping between VLANs and MSTIs when VBST is running.
<HUAWEI> display stp region-configuration
Oper configuration
Format selector :0
Region name :00e055539900
Revision level :0
Region name Name of the MST region. For the related commands, see
region-name.
Revision level Revision level of the MST region. For the related
commands, see revision-level.
Instance VLANs Mapped Mapping between the spanning tree instance and VLANs
of the MST region. For the related commands, see instance
or vlan-mapping modulo.
If the mapping is incorrect, run the instance command to
re-map the specified VLAN to the specified MSTI and run
the active region-configuration command to activate the
mapping.
Related Topics
5.12.18 instance
5.12.20 region-name
5.12.24 revision-level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
STP/RSTP/MSTP: display stp [ process process-id ] [ instance instance-id ] [ interface
interface-type interface-number | slot slot-id ] tc-bpdu statistics
VBST: display stp [ vlan vlan-id ] [ interface interface-type interface-number | slot slot-id ]
tc-bpdu statistics
Parameters
Parameter Description Value
process Specifies the ID of an MSTP process of which The value is an integer
process-id statistics of TC and TCN BPDUs are displayed. ranging from 1 to 15.
If the parameter process process-id is not
specified, statistics of TC and TCN BPDUs in
MSTP process 0 are displayed.
slot slot-id Displays the statistics of TC and TCN BPDUs on The value is an integer
a spanning tree instance in a specified slot. and must be an existing
slot on the device.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If you need to know whether a fault has occurred on interfaces that send and receive TC/TCN
BPDUs, you can run this command to view statistics of these BPDUs and locate the fault.
Example
# Display the statistics of TC/TCN BPDUs on interfaces of an MSTP instance when STP/
RSTP/MSTP is running.
<HUAWEI> display stp tc-bpdu statistics
-------------------------- STP TC/TCN information --------------------------
MSTID Port TC(Send/Receive) TCN(Send/Receive)
0 GigabitEthernet0/0/9 3/2 0/0
0 GigabitEthernet0/0/10 1/0 0/0
1 GigabitEthernet0/0/9 14/9 -/-
1 GigabitEthernet0/0/10 8/10 -/-
2 GigabitEthernet0/0/9 3/2 -/-
2 GigabitEthernet0/0/10 1/0 -/-
# Display statistics on sent and received TC and TCN BPDUs on ports running VBST.
<HUAWEI> display stp vlan 5 tc-bpdu statistics
-------------------------- STP TC/TCN information
--------------------------
VLAN-ID Port TC(Send/Receive) TCN(Send/
Receive)
5 GigabitEthernet0/0/5 1/615 0/0
Table 5-86 Description of the display stp tc-bpdu statistics command output
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
TCN(Send/Receive) Statistics of send and received TCN BPDUs ("-" indicates that
MSTP instances except MSTP instance 0 do not have TCN
BPDUs sent and received)
Related Topics
5.12.22 reset stp statistics
5.12.52 stp process
Format
STP/RSTP/MSTP: display stp [ process process-id ] [ instance instance-id ] topology-
change
VBST: display stp [ vlan vlan-id ] topology-change
Parameters
Parameter Description Value
process Displays statistics about the topology The value is an integer
process-id changes of a specified MSTP process. ranging from 1 to 1563.
If this parameter is not specified, the
statistics about the topology changes of
MSTP process 0 are displayed.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
On a Layer 2 network running MSTP, a device clears ARP entries and MAC entries after
receiving topology change packets. If a device receives too many topology change packets,
the device will frequently clear ARP entries and MAC entries, causing high CPU usage. As a
result, network traffic is instable.
The display stp topology-change command can be used to display the statistics about MSTP/
VBST topology changes. If the statistics increase, network flapping occurs.
Prerequisites
In the case of a non-zero process, the stp process process-id command must be used to create
a process.
Example
# Display statistics about MSTP topology changeswhen MSTP is running.
<HUAWEI> display stp topology-change
CIST topology change information
Number of topology changes :5
Time since last topology change :0 days 0h:23m:19s
Topology change initiator(detected) :GigabitEthernet0/0/1
Topology change last received from :00e0-5b3c-c100
Number of generated topologychange traps : 5
Number of suppressed topologychange traps: 3
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Time since last topology Time since the last topology change
change
Topology change Interface that initiates a topology change because the interface
initiator(detected) status changes to detected
Topology change last Source bridge MAC address contained in a topology change
received from packet
Related Topics
5.12.22 reset stp statistics
5.12.40 stp enable
5.12.52 stp process
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display stp vlan vlan-id
Parameters
Parameter Description Value
vlan-id Displays the STP status on an interface The value is an integer ranging
added to a specified VLAN. from 1 to 4094.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After an interface is added to a VLAN, the display stp vlan command can be used to the
display the STP status on the interface. In this case, the mapping between VLANs and
instances does not need to be concerned with.
Example
# Display the STP status on an interface added to a specified VLAN when STP/RSTP/MSTP
is running.
<HUAWEI> display stp vlan 1
ProcessId InstanceId Port Role State
----------------------------------------------------------------------
0 0 GE0/0/1 DESI FORWARDING
# Display the spanning tree status on a port in a specified VLAN when VBST is running.
<HUAWEI> display stp vlan 20
<HUAWEI> display stp vlan 20
-------[VLAN 20 Global Info]-------
Bridge ID :32768.4c1f-cc6b-c208
Bridge Diameter :7
Config Times :Hello 2s MaxAge 20s FwDly 15s
Active Times :Hello 2s MaxAge 20s FwDly 15s
Root ID / RPC :0 .781d-bacc-8bc0 / 199
RootPortId :128.191
(GigabitEthernet0/0/7)
Root Type :Normal
----[Port190(GigabitEthernet0/0/6)]
[DISCARDING]----
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
ProcessId Process ID
InstanceId. Instance ID
Port Interface
Root ID / RPC Root switch ID or external cost of the path from the switch to
the root switch.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Port Role Role of a port. In the CIST region, four port roles are
available:
l Root port
l Designated port
l Alternate port
l Backup port
Port Priority Priority of the port. To set the priority for a port, run the stp
port priority command.
Port Cost(Legacy) Path cost of the port, which is calculated using Huawei
proprietary algorithm:
l config: indicates the path cost that is manually configured.
l active: indicates the path cost that is actually used.
Desg. Bridge/Port IDs of the designated switch and designated port. In the switch
ID, the first 16 bits represent the switch's priority, and the last
48 bits represent the switch's MAC address. In the port ID, the
first 4 bits represents the port priority, and the last 12 bits
represent the port number.
Port Edged Status of the edge port that is specified by the administrator:
l enabled: The edge port is enabled.
l disabled: The edge port is disabled.
Config indicates the value configured using the stp edged-
port command, and Active indicates the actual value.
Point-to-point Link type of the port. Config indicates link type configured
using the stp point-to-point command, and Active indicates
the actual link type.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Transmit Limit Maximum number of BPDUs sent by the port per second. To
set the maximum number of BPDUs sent by the port per
second, run the stp transmit-limit (interface view) command.
Related Topics
5.12.22 reset stp statistics
5.12.40 stp enable
Function
The display vbst bpdu-statistics command displays VBST BPDU statistics.
Format
display vbst bpdu-statistics [ vlan vlan-id ] [ interface interface-type interface-number | slot
slot-id ]
Parameters
Views
All views
Default Level
1: Monitoring level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
To check statistics on BPDUs on the switch running VBST, run the display vbst bpdu-
statistics command.
Example
# Display VBST BPDU statistics in VLAN 2.
<HUAWEI> display vbst bpdu-statistics vlan 2
-------[VLAN 2 ]-------
----[Port1010(GigabitEthernet0/0/17)]---
BPDU Sent :0
TCN: 0, Config: 0, RST: 0
BPDU Received :0
TCN: 0, Config: 0, RST: 0
----[Port1011(GigabitEthernet0/0/18)]---
BPDU Sent :0
TCN: 0, Config: 0, RST: 0
BPDU Received :0
TCN: 0, Config: 0, RST: 0
----[Port1012(GigabitEthernet0/0/19)]---
BPDU Sent :0
TCN: 0, Config: 0, RST: 0
BPDU Received :0
TCN: 0, Config: 0, RST: 0
----[Port1031(GigabitEthernet0/0/20)]---
BPDU Sent :0
TCN: 0, Config: 0, RST: 0
BPDU Received :0
TCN: 0, Config: 0, RST: 0
----[Port1033(GigabitEthernet0/0/21)]---
BPDU Sent :14664
TCN: 0, Config: 0, RST: 14664
BPDU Received :3
TCN: 0, Config: 0, RST: 3
----[Port1047(GigabitEthernet0/0/22)]---
BPDU Sent :14643
TCN: 0, Config: 0, RST: 14643
BPDU Received :0
TCN: 0, Config: 0, RST: 0
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Format
ethernet-loop-protection ignored-vlan { vlan-id1 [ to vlan-id2 ] } &<1-10>
undo ethernet-loop-protection ignored-vlan { { vlan-id1 [ to vlan-id2 ] } &<1-10> | all }
Parameters
Parameter Description Value
vlan-id1 Specifies the ID of a start VLAN. The value is an integer
ranging from 1 to 4094.
Views
System view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
If a device uses a specific VLAN to create a VLANIF interface and configure it as the
management network port, Layer 2 loop protocols (MSTP/RRPP/SEP/ERPS/Smart Link) are
enabled on the device to prevent network loops. After the device starts or the Layer 2 loop
protocols are enabled, the VLANIF interface enters the blocked state and needs to wait a long
time to enter the forwarding state through the protocol calculation. During this period,
services are interrupted, and users who use the VLANIF interface cannot operate the device.
To resolve the problem, the ethernet-loop-protection ignored-vlan command can be used to
configure the specific VLAN to an ignored VLAN. Through loop protocol calculation, the
interface on which the ignored VLAN is configured does not enter the blocked state but stays
in the forwarding state.
Precautions
If an ignored VLAN is configured on a ring network, a loop occurs. Therefore, you cannot
configure an ignored VLAN in a ring topology.
After the ethernet-loop-protection ignored-vlan command is executed, the configuration file
shows that STP has been disabled in the VLAN, for example, stp vlan 100 disable.
After the undo ethernet-loop-protection ignored-vlan command is executed, the system
checks whether the number of instances exceeds the limit. If so, the system restores the VBST
status in the VLAN. If not, the system displays a message about a failure to restore the VBST
status in the VLAN.
Example
# Configure VLAN 2 as an ignored VLAN.
<HUAWEI> system-view
[HUAWEI] ethernet-loop-protection ignored-vlan 2
Warning: This operation may result in bridging loops. Please make sure there are
no bridging loops in the VLAN(s). Continue?[Y/N]:Y
Related Topics
5.12.3 display ethernet-loop-protection ignored-vlan
5.12.18 instance
Function
The instance command maps a VLAN to a spanning tree instance.
The undo instance command deletes the mapping between a VLAN and a spanning tree
instance.
By default, all VLANs are mapped to CIST, that is, instance 0.
Format
instance instance-id vlan { vlan-id1 [ to vlan-id2 ] } &<1-10>
undo instance instance-id [ vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
instance-id Specifies the number of a spanning The value is an integer ranging from 0
tree instance. to 4094. Value 0 refers to CIST.
NOTE
instance-id ranges from 0 to 4094. Each
process supports a maximum of 65
instances.
vlan vlan-id1 Specifies a start VLAN ID. The value is an integer ranging from 1
to 4094. The start VLAN ID must be
smaller than the end VLAN ID.
to vlan-id2 Specifies an end VLAN ID. The value is an integer that ranges
NOTE from 1 to 4094.
l VBST maps one VLAN to one
instance. Therefore, this parameter
cannot be specified when the
spanning tree protocol is VBST.
l The 1:1 mapping between MSTIs
and VLANs are used only by the
switch to determine the VBST
forwarding status. This does not
mean that VBST supports multi-
instance. instance in other
commands cannot be specified when
VBST is running.
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP divides a switching network into multiple regions, each of which has multiple
spanning trees that are independent of each other. Each spanning tree is called an MSTI and
each region is called an MST region.
Two switching devices belong to the same MST region only when they have the following
same configurations:
l MST region name
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The instance command is used to set mappings between spanning tree instances and VLANs.
Precautions
When using the undo instance command, note the following points:
l After the mapping between specified VLANs and a specified spanning tree instance is
deleted, these VLANs will be mapped to a CIST, namely, instance 0.
l If no VLAN is specified, all VLANs that have established mappings with the spanning
tree instance will be mapped to a CIST.
If the instance command is run more than once, all configurations take effect.
A VLAN cannot be mapped to different spanning tree instances. If the instance command is
run several times, the latest configuration overrides the previous one.
To map the MUX VLAN to a spanning tree instance, you are advised to configure the
principal VLAN, subordinate group VLAN, and subordinate separate VLAN in the MUX
VLAN in the same spanning tree instance.
Example
# Map VLAN 2 to spanning tree instance 1.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] instance 1 vlan 2
Related Topics
5.12.12 display stp region-configuration
Function
The max bandwidth-affected-linknumber command sets the upper threshold for the number
of interfaces that determine the bandwidth of an Eth-Trunk.
By default, the upper threshold for the number of interfaces that determine the bandwidth of
an Eth-Trunk is 32 on the S5720HI and 8 on other models.
Format
max bandwidth-affected-linknumber link-number
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
link-number Specifies the upper threshold The value is an integer that ranges
for the number of interfaces from 1 to 32 on the S5720HI and 1
that determine the bandwidth to 8 on other models.
of an Eth-Trunk. On the S6720EI, and S6720S-EI,,
you can run the assign trunk
command to set the value, and run
the display trunk configuration
command to check the configuration.
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
The upper threshold for the number of interfaces that determine the bandwidth of an Eth-
Trunk is used for STP calculation.
For example, device A and device B are connected by two Eth-Trunks. Eth-Trunk1 has three
member links that are Up; the Eth-Trunk2 has two member links that are Up. The bandwidth
of each member link is 1 Gbit/s, so the bandwidth of Eth-Trunk1 is 3 Gbit/s and the
bandwidth of Eth-Trunk2 is 2 Gbit/s. If device A is the root bridge during STP calculation,
Eth-Trunk1 on device B is the root port and Eth-Trunk2 is the alternate port. You can run this
command to set the upper threshold to 1. Then the bandwidth of Eth-Trunk1 becomes 1 Gbit/s
during STP calculation. Bandwidth decrease affects the interface cost, causing STP
recalculation. The max bandwidth-affected-linknumber command does not affect traffic
forwarding on the Eth-Trunk. The bandwidth used to forward traffic is still 3 Gbit/s.
Example
# Set the upper threshold to 3.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] max bandwidth-affected-linknumber 3
Related Topics
5.2.4 display eth-trunk
5.2.44 least active-linknumber
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
5.12.20 region-name
Function
The region-name command configures the MST region name of the switching device.
The undo region-name command restores the default name.
By default, the MST region name is the MAC address of the bridge MAC of the switching
device.
Format
region-name name
undo region-name
Parameters
Parameter Description Value
name Specifies the region name The value is a case-sensitive string of 1 to 32
of the switching device. characters without spaces.
NOTE
When double quotation marks are used around the string,
spaces are allowed in the string.
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
MSTP divides a switching network into multiple regions, each of which has multiple
spanning trees that are independent of each other. Each spanning tree is called an MSTI and
each region is called an MST region.
Two switching devices belong to the same MST region only when they have the following
same configurations:
l MST region name
l Mappings between MSTIs and VLANs
l MST region revision level
The region-name command is used to configure MST region names in order to identify
different regions.
VBST does not support regions. Therefore, this command does not take effect when the
spanning tree protocol is VBST.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Set the MST region name of the switch to "huawei".
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] region-name huawei
Related Topics
5.12.12 display stp region-configuration
Function
The reset stp error packet statistics command clears the statistics of error STP packets.
Format
reset stp error packet statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
Applicable Scenario
You can use the reset stp error packet statistics command to clear the history statistics when
you need to observe the statistics of error STP packets in a period from the current time.
Precautions
The reset stp error packet statistics command clears the statistics about error STP packets
are cleared and cannot be restored. Therefore, confirm the action before you use the
command.
Example
# Clear the statistics about error STP packets.
<HUAWEI> reset stp error packet statistics
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The reset stp statistics command clears the statistics of a spanning tree.
Format
reset stp [ interface interface-type interface-number ] statistics
Parameters
Parameter Description Value
interface interface-type interface- Specifies an interface type and the number of
-
number the interface.
Views
User view
Default Level
3: Management level
Usage Guidelines
Sometimes, traffic statistics within a certain period is needed. In this situation, clear the
existing statistics before restarting the count.
l If you specify an interface, you can clear the statistics of a spanning tree on the interface.
l If you do not specify an interface, you can clear the statistics of spanning trees on all
interfaces.
Example
# Clear the statistics of spanning trees on GE0/0/1.
<HUAWEI> reset stp interface gigabitethernet 0/0/1 statistics
Related Topics
5.12.6 display stp
Function
The reset vbst bpdu-statistics command clears VBST BPDU statistics.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
reset vbst bpdu-statistics [ interface interface-type interface-number | slot slot-id ]
Parameters
Parameter Description Value
interface interface-type Clears BPDU statistics on a specified -
interface-number interface running VBST.
slot slot-id Clears BPDU statistics on interfaces The value is an integer
running VBST on the card in a and must be an existing
specified slot. slot on the device.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before recollecting VBST BPDU statistics on a specified interface or on the card in a
specified slot in a specified period of time, run the reset vbst bpdu-statistics command to
clear existing VBST BPDU statistics.
Configuration Impact
The cleared VBST BPDU statistics on a specified interface or on the card in a specified slot
cannot be restored. Exercise caution when running the reset vbst bpdu-statistics command.
Example
# Clear VBST BPDU statistics on GE 0/0/1.
<HUAWEI> reset vbst bpdu-statistics interface gigabitethernet 0/0/1
5.12.24 revision-level
Function
The revision-level command configures the revision level of MST region of a switching
device.
The undo revision-level command restores the default level.
By default, the revision level of MST region is 0.
Format
revision-level level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
undo revision-level
Parameters
Parameter Description Value
level Specifies the revision level of the MST The value is an integer ranging from 0
region. to 65535.
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
MSTP divides a switching network into multiple regions, each of which has multiple
spanning trees that are independent of each other. Each region is called an MST region and
each spanning tree is called a multiple spanning tree instance (MSTI).
Two switching devices belong to the same MST region only when they have the following
same configurations:
l MST region name
l Mappings between MSTIs and VLANs
l MST region revision level
To perform tree calculation in an MST region, multiple devices in this region must have the
same value for the three parameters. If the parameters are changed after MSTP is deployed,
the change will cause spanning tree recalculation and route flapping on the network. As a
result, you are advised not to change the MST region parameters after MSTP is deployed.
If two switching devices have the same region name and VLAN mapping table, the revision-
level command can be used to set different revision levels for the two devices so that the two
devices belong to different MST regions.
MSTP is a standard protocol; therefore, the MSTP revision level of a device is 0 by default. If
the revision level of some devices from a specified manufacturer is not 0, you must change
the MSTP revision level of devices to be the same to facilitate tree calculation in an MST
region.
VBST does not support regions. Therefore, this command does not take effect when the
spanning tree protocol is VBST.
Example
# Set the MSTP revision level of the switching device to 5.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] revision-level 5
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.12.12 display stp region-configuration
Format
snmp-agent trap enable feature-name mstp [ trap-name
{ hwmstpibridgelostrootprimary | hwmstpiedgeportchanged | hwmstpiportbpduguarded
| hwmstpiportloopguarded | hwmstpiportrootguarded | hwmstpproloopbackdetected |
hwmstpiportstatediscarding | hwmstpiportstateforwarding | hwmstpitcguarded |
hwmstpportcountthreshold | hwmstpportcountthresholdresume |
hwmstppronewbridgelostrootprimary | hwmstppronewedgeportchanged |
hwmstppronewportbpduguarded | hwmstppronewportloopguarded |
hwmstppronewportrootguarded | hwmstppronewportstatediscarding |
hwmstppronewportstateforwarding | hwmstpprorootchanged | hwmstpprotcguarded |
newroot | topologychange } ]
undo snmp-agent trap enable feature-name mstp [ trap-name
{ hwmstpibridgelostrootprimary | hwmstpiedgeportchanged | hwmstpiportbpduguarded
| hwmstpiportloopguarded | hwmstpiportrootguarded | hwmstpproloopbackdetected |
hwmstpiportstatediscarding | hwmstpiportstateforwarding | hwmstpitcguarded |
hwmstpportcountthreshold | hwmstpportcountthresholdresume |
hwmstppronewbridgelostrootprimary | hwmstppronewedgeportchanged |
hwmstppronewportbpduguarded | hwmstppronewportloopguarded |
hwmstppronewportrootguarded | hwmstppronewportstatediscarding |
hwmstppronewportstateforwarding | hwmstpprorootchanged | hwmstpprotcguarded |
newroot | topologychange } ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The MSTP module is not configured with the function of excessive traps. To enable the traps
of one or more events, you can specify trap-name.
Example
# Enables the device to send trap when the current device is no longer the root bridge.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name mstp trap-name
hwmstpibridgelostrootprimary
Related Topics
5.12.4 display snmp-agent trap feature-name mstp all
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
snmp-agent trap enable feature-name vbst [ trap-name { hwvbstpvnumexceeded |
hwvbstpvnumresumed } ]
undo snmp-agent trap enable feature-name vbst [ trap-name { hwvbstpvnumexceeded |
hwvbstpvnumresumed } ]
Parameters
Parameter Description Value
trap-name Enables the traps of VBST events of specified types. -
hwvbstpvnumexceeded Enables the device to send trap when the number of -
interfaces and VLANs participating in VBST calculation
exceeded the maximum number of interfaces and VLANs
allowed by VBST.
hwvbstpvnumresumed Enables the device to send trap when the number of -
interfaces and VLANs participating in VBST calculation
falls below 95% of the maximum number of interfaces
and VLANs allowed by VBST.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The VBST module is not configured with the function of excessive traps. To enable the traps
of one or more events, you can specify trap-name.
Example
# Enables the device to send trap when the number of interfaces and VLANs participating in
VBST calculation exceeded the maximum number of interfaces and VLANs allowed by
VBST.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name vbst trap-name hwvbstpvnumexceeded
Related Topics
5.12.5 display snmp-agent trap feature-name vbst all
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The stp agreement-legacy command configures an interface to discard non-standard STP/
RSTP packets sent by the Handremanet switch.
By default, an interface does not discard non-standard STP/RSTP packets sent by the
Handremanet switch.
Format
stp agreement-legacy
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If Huawei datacom device and Handremanet switch are deployed on the VBST network, non-
standard STP/RSTP packets sent by the Handremanet switch may cause temporary loops. You
can run the stp agreement-legacy command to configure the interface to discard non-
standard STP/RSTP packets to prevent temporary loops.
Example
# Configure the GE0/0/1 to discard non-standard STP/RSTP packets sent by the Handremanet
switch.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp agreement-legacy
Function
The stp binding process command adds the current interface to a specified MSTP process.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo stp binding process command removes the current interface from the specified
MSTP process.
By default, the interface belongs to MSTP process with ID 0.
Format
stp binding process process-id
undo stp binding process process-id
Parameters
Parameter Description Value
process process-id Specifies the ID of an MSTP The value is an integer ranging
process. from 1 to 15.
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an MSTP device properly starts, each port of this device belongs to MSTP process 0 by
default. Links connecting MSTP devices and access rings are called access links. If multiple
processes are required to isolate services on access rings, the stp binding process command
can be used to add ports on access links to specified MSTP processes.
Prerequisites
The stp process command has been run to configure the corresponding MSTP process. This
means that the MSTP process to which a port will be added already exists.
Precautions
A port on an access link can be added to only one MSTP process. If the stp binding process
command is run several times to add a port to different MSTP processes, only the latest
configuration takes effect.
Example
# Add a port to MSTP process 1.
<HUAWEI> system-view
[HUAWEI] stp process 1
[HUAWEI-mst-process-1] quit
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp binding process 1
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.12.52 stp process
5.12.6 display stp
Format
stp binding process process-id1 [ to process-id2 ] link-share
undo stp binding process process-id1 [ to process-id2 ]
Parameters
Parameter Description Value
process-id1 Specifies the ID of the start MSTP The value is an integer ranging from
process. 1 to 15.
to process-id2 Specifies the ID of the end MSTP The value is an integer ranging from
process. 1 to 15.
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running MSTP, the link shared by multiple access rings is called a
public link. A port on a public link participates in the spanning tree calculation for multiple
MSTP processes and access rings. As a result, the port may have multiple statuses. Which
spanning tree status can be used as the port status cannot be determined. To prevent this
situation, the stp binding process link-share command can be used to add this port to an
MSTP process. Then, the port always uses its status in MSTP process 0 after participating in
the calculation for multiple MSTP processes.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
After the stp binding process link-share command is run on a port, the port will perform the
following operations:
l Participates in the status calculation of a specified MSTP process without affecting
packet forwarding of this MSTP process.
l Participates in the status calculation of MSTP process 0, affecting packet forwarding of
this MSTP process.
If the stp binding process link-share command is run more than once, all configurations take
effect.
The port configured with the stp binding process link-share command must be a port on the
public link between devices configured with MSTP multi-process, but not a port that connects
an access ring and a device.
If a process has a public link, the stp enable command must be run in the view of this process
to enable MSTP globally.
For a port that is added to the process in link-share mode, you must run the stp enable
command in the interface view to enable MSTP.
For a port that is added to the process in link-share mode, the port participates in status
calculation of MSTP process 0. Therefore, you must run the stp enable command to enable
MSTP for process 0.
Example
# Configure the port to participate in the status calculation of MSTP process 1 and MSTP
process 2.
<HUAWEI> system-view
[HUAWEI] stp process 1
[HUAWEI-mst-process-1] quit
[HUAWEI] stp process 2
[HUAWEI-mst-process-2] quit
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp binding process 1 to 2 link-share
Related Topics
5.12.52 stp process
Format
stp bpdu-filter { enable | disable }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running a spanning tree protocol, if the stp edged-port enable command is
used to configure a port as an edge port, the port will not participate in the spanning tree
calculation. This speeds up network convergence and improves network stability. This port,
however, will still send BPDUs. This may cause BPDUs to be sent to other networks. As a
result, these networks flap.
The stp bpdu-filter enable command can be used on the port to address this problem. After
the stp bpdu-filter enable command is used on the port, the port will become a BPDU-filter
port, and will not process BPDUs.
NOTICE
If the stp bpdu-filter enable command is run on a port, the port will not transmit or process
BPDUs. The port cannot negotiate the STP status with the directly connected port on the
remote device. Therefore, exercise cautions when using the stp bpdu-filter enable command.
Running the stp bpdu-filter enable command only on edge ports is recommended.
Running the stp bpdu-filter enable command in the interface view configures only the
current port as a BPDU-filter port. If multiple BPDU-filter ports are required on a device, the
stp bpdu-filter default command can be used in the system view to configure all the ports as
BPDU-filter ports. If some ports need to participate in spanning tree calculation but do not
need to be configured as BPDU-filter ports, the stp bpdu-filter disable command can be used
in the view of these ports to configure them as non-BPDU-filter ports. Similarly, if the stp
bpdu-filter disable command has been run on a port, the non-BPDU filter port attributes of
the port will not change after the stp bpdu-filter default command is run.
Precautions
After the stp bpdu-filter disable command is run on a port, the port becomes a non-BPDU-
filter port. The port is still a non-BPDU-filter port even if the stp bpdu-filter default
command is run in the system view. After the undo stp bpdu-filter command is run on the
port, the BPDU-filter attributes of the port restore to the default ones.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# On a network edge device, specify GE0/0/1 as a non-BPDU-filter port.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp bpdu-filter disable
Related Topics
5.12.31 stp bpdu-filter default
5.12.38 stp edged-port
Function
The stp bpdu-filter default command specifies all ports of a device as BPDU-filter ports.
The undo stp bpdu-filter default command specifies all ports of a device as non-BPDU-
filter ports.
Format
stp bpdu-filter default
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running a spanning tree protocol, if the stp edged-port enable command is
used to configure a port as an edge port, the port will not participate in the spanning tree
calculation. This speeds up network convergence and improves network stability. This port,
however, will still send BPDUs. This may cause BPDUs to be sent to other networks. As a
result, these networks flap.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The stp bpdu-filter enable command can be used on the port to address this problem. After
the stp bpdu-filter enable command is used on the port, the port will become a BPDU-filter
port, and will not process BPDUs.
Running the stp bpdu-filter enable command in the interface view configures only the
current port as a BPDU-filter port. If multiple BPDU-filter ports are required on a device, the
stp bpdu-filter default command can be used in the system view to configure all ports as
BPDU-filter ports. Then run the stp bpdu-filter disable command in the interface view to
change the interfaces that need not to be configured as BPDU filter interfaces into non-BPDU
filter interfaces.
Precautions
After the stp bpdu-filter default command is run, a port that has been configured with the
undo stp bpdu-filter command will become a BPDU-filter port. After the stp bpdu-filter
disable command is run, the port that has been configured with the undo stp bpdu-filter
command, however, will still serve as a non-BPDU-filter port.
NOTICE
After the stp bpdu-filter default and stp edged-port default commands are run in the
system view, none of the ports on the device will initiate any BPDUs or initiate a negotiation
with the remote device, and all the ports are in the forwarding state. This may lead to a loop
and cause a broadcast storm. Exercise cautions when using the stp bpdu-filter default and
stp edged-port default commands in the system view.
Example
# On a network edge device, specify all ports as BPDU-filter ports.
<HUAWEI> system-view
[HUAWEI] stp bpdu-filter default
Related Topics
5.12.30 stp bpdu-filter
5.12.38 stp edged-port
Format
stp bpdu-protection
undo stp bpdu-protection
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None.
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp bpdu-protection
command in the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, a port connected to terminals does not
need to participate in spanning tree calculation. If the port participates in spanning tree
calculation, the network convergence speed will be affected. In addition, status changes of the
port may cause network flapping, interrupting user traffic. To address this problem, you can
run the stp edged-port enable command to configure the port as an edge port. Then, the port
will not participate in the spanning tree calculation. This speeds up network convergence and
improves network stability.
An edge port will lose edge port attributes after receiving BPDUs. To prevent attackers from
forging BPDUs to change edge ports to non-edge ports, you can run the stp bpdu-protection
command to configure BPDU protection on a switching device.
Configuration Impact
After BPDU protection is enabled on a switching device, the switching device shuts down the
edge port if the edge port receives a BPDU. The attributes of the edge port are not changed.
Precautions
After BPDU protection is enabled, a switching device sets an edge port to error down state if
the edge port receives a BPDU and retains the port as an edge port. To configure the edge port
in error-down state to automatically restore to the Up state, run the error-down auto-
recovery cause bpdu-protection interval interval-value command in the system view.
By default, an interface cannot automatically restore to Up state after it is shut down. To
restore the interface, run the shutdown and undo shutdown commands on the interface in
sequence. Alternatively, run the restart command on the interface to restart the interface.
To configure the interface to go Up automatically, run the error-down auto-recovery cause
bpdu-protection interval interval-value command in the system view to set a recovery delay.
After the delay, the interface goes Up automatically.
Example
# Enable the BPDU protection on the switching device.
<HUAWEI> system-view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.12.6 display stp
5.12.38 stp edged-port
Function
The stp bridge-diameter command configures the diameter of the spanning tree.
Format
stp [ vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> ] bridge-diameter diameter
Parameters
Parameter Description Value
vlan vlan-id1 Configures the diameter of a spanning tree in VLANs. The value is an
[ to vlan-id2 ] integer that
l vlan-id1 specifies the start VLAN ID. ranges from 1 to
l to vlan-id2 specifies the end VLAN ID. vlan-id2 4094.
must be greater than or equal to vlan-id1. vlan-id2
and vlan-id1 specify a VLAN range.
l If to vlan-id2 is not specified, the diameter is
configured only for the VLAN specified by vlan-
id1.
In the stp bridge-diameter command, you can specify
a maximum of 10 VLAN ranges.
NOTE
VLANs can be specified only when VBST is running.
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp bridge-diameter
command in the MSTP process view.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running a spanning tree protocol, the network diameter is the maximum number
of devices between two switching devices. If the network diameter is improperly set, network
converge may slow down, affecting users' normal communication.
The stp bridge-diameter command can be used to set a proper network diameter based on
the network scale. This helps to accelerate network convergence.
The following time parameters are related to the network scale:
l Hello Time
l Forward Delay
l Max Age
Precautions
After the stp bridge-diameter command is used on a switching device, the switching device
will automatically set proper values for Hello Time, Forward Delay, and Max Age based on
the configured network diameter.
On an MSTP network, the network diameter configured using the stp bridge-diameter
command is valid only for CISTs.
Example
# Set the network diameter to 5 when STP/RSTP/MSTP is running.
<HUAWEI> system-view
[HUAWEI] stp bridge-diameter 5
Related Topics
5.12.61 stp timer forward-delay
5.12.62 stp timer hello
5.12.63 stp timer max-age
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
stp compliance { auto | dot1s | legacy }
Parameters
Parameter Description Value
auto Indicates that the protocol format is self-adaptive. -
dot1s Indicates that the format is standard IEEE 802.1s. -
legacy Indicates the private packet format. -
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP protocol packets have two formats: dot1s (IEEE 802.1s standard packets) and legacy
(proprietary protocol packets). The stp compliance command can be used on a device to set
an MSTP packet format based on the format of the MSTP packet received from a remote
device so that this device can better communicate with the remote device.
The auto mode is set to allow a port to automatically switch to the MSTP protocol packet
format used by the remote end based on the MSTP protocol packet format received from the
remote end. This enables the two interfaces to use the same MSTP protocol packet format.
Example
# Set the format of the MSTP packets to the standard format of the interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp compliance dot1s
# Restore the self-adaptive format of the MSTP packets that are received and sent by the
switching device.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo stp compliance
Related Topics
5.12.6 display stp
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
stp config-digest-snoop
undo stp config-digest-snoop
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
On an MSTP network where Huawei and non-Huawei devices are interconnected, if the
Huawei and non-Huawei devices have the same region name, revision level, and VLAN
mapping table but different BPDU keys, the stp config-digest-snoop command can be used
to enable the Huawei and non-Huawei devices to exchange BPDUs.
Example
# Enable digest snooping on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp config-digest-snoop
Related Topics
5.12.6 display stp
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
stp converge { fast | normal }
Parameters
Parameter Description Value
fast Indicates ARP entries that will be directly deleted. -
normal Indicates ARP entries that will age quickly. -
Views
System view, MSTP process view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, if the topology of a spanning tree
instance changes, the forwarding paths of VLANs that are mapped to this instance change. As
a result, ARP entries related to these VLANs need to be updated. Based on methods for
processing ARP entries, the converging modes of a spanning tree protocol are classified into
fast and normal:
l In fast mode, entries that need to be updated in an ARP table are directly deleted.
l In normal mode, entries that need to be updated in an ARP table quickly age. A
switching device sets the EXPIRE time of these ARP entries to 0 in order to age them. If
the number of detection times for aging out ARP entries is greater than 0, the switching
device detects these ARP entries before deleting them.
The stp converge command can be used to set a converging mode based on the method for
processing ARP entries.
Precautions
If the stp converge fast command is run on a switching device and the topology of a
spanning tree instance changes, the switching device will directly delete the ARP entries that
need to be updated in the ARP table.
If the stp converge normal command is run on a switching device and the topology of a
spanning tree instance changes, the switching device will age the ARP entries that need to be
updated in the ARP table.
Setting the converging mode of a spanning tree protocol to normal is recommended. If the
fast mode is used, frequent ARP entry deletion will affect services and even may cause the
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
CPU usage of the device to reach 100%. As a result, packet processing will time out, causing
network flapping.
Example
# Set the converging mode of the spanning tree protocol on the Ethernet switch as normal.
<HUAWEI> system-view
[HUAWEI] stp converge normal
Related Topics
5.12.6 display stp
Function
The stp cost command sets the path cost of a port in a spanning tree.
The undo stp cost command restores the default path cost.
By default, the path cost of a port in a spanning tree is the path cost corresponding to the port
rate.
Format
STP/RSTP/MSTP: stp [ process process-id ] [ instance instance-id ] cost cost
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The path cost of a port is an important basis for calculating a spanning tree. Path costs
determine root port selection. In a spanning tree, the port with the lowest path cost to the root
bridge is selected as a root port.
If different path costs are set for a port on an MSTP device in different spanning tree
instances, traffic of different VLANs will be forwarded along different physical links and
VLAN-based load balancing can be carried out.
Path costs depend on path cost calculation standards. After the path cost calculation standard
is determined, set a relatively small path cost within a specified range for a port that has a
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
high link rate. In the Huawei legacy standard, default path costs for ports with different link
rates are different, as shown in the following table.
Table 5-90 Mappings between link rates and path costs ( Huawei legacy standard )
Link Rate Recommended Recommended Value Range
Value Value Range
Default, Value
Prerequisites
A path cost calculation standard has been set using the stp pathcost-standard command.
Precautions
If the path cost of a port, the spanning tree where the port resides needs to be recalculated.
If the stp pathcost-standard command is used to change the path cost calculation standard,
the path cost set using the stp cost command for a port will be restored to the default value.
Example
# Set the path cost of GE0/0/1 in spanning tree instance 2 to 200 when STP/RSTP/MSTP is
running.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp instance 2 cost 200
# Set the path cost of GE0/0/1 in VLAN 10 to 300 when VBST is running.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp vlan 10 cost 300
Related Topics
5.12.6 display stp
5.12.48 stp pathcost-standard
Function
The stp edged-port enable command sets the current port as an edge port.
The stp edged-port disable command sets the current port as a non-edge port.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo stp edged-port command restores the default attribute of an edge port.
By default, all the ports on the switching device are non-edge ports.
NOTE
After STP is enabled on a port, edge-port detecting is started automatically. If the port fails to receive
BPDU packets within (2 x Hello Timer + 1) seconds, the port is set to an edge port. Otherwise, the port
is set to a non-edge port.
Format
stp edged-port { enable | disable }
Parameters
Parameter Description Value
enable Sets the current port as an edge port. -
disable Sets the current port as a non-edge port. -
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, a port connected to terminals does not
need to participate in spanning tree calculation. If the port participates in spanning tree
calculation, the network convergence speed will be affected. In addition, status changes of the
port may cause network flapping, interrupting user traffic. To address this problem, you can
run the stp edged-port enable command to configure the port as an edge port. Then, the port
will not participate in the spanning tree calculation. This speeds up network convergence and
improves network stability.
Precautions
If a port of a switching device receives a BPDU after being configured as an edge port, the
switching device will automatically set the port as a non-edge port and recalculate the
spanning tree.
NOTE
The device supports automatic detection of the edge port. When the port connected to the terminal
changes from Down to Up, the port enters the forwarding state after two times the hello interval plus
one. If automatic detection is not configured, the port enters the forwarding state after 30s.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Configure GE0/0/1 as an edge port.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp edged-port enable
Related Topics
5.12.32 stp bpdu-protection
5.12.39 stp edged-port default
NOTE
After STP is enabled on a port, edge-port detecting is started automatically. If the port fails to receive
BPDU packets within (2 x Hello Timer + 1) seconds, the port is set to an edge port. Otherwise, the port
is set to a non-edge port.
Format
stp edged-port default
undo stp edged-port default
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, a port connected to terminals does not
need to participate in spanning tree calculation. If the port participates in spanning tree
calculation, the network convergence speed will be affected. In addition, status changes of the
port may cause network flapping, interrupting user traffic. To address this problem, you can
run the stp edged-port enable command to configure the port as an edge port. Then, the port
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
will not participate in the spanning tree calculation. This speeds up network convergence and
improves network stability.
NOTICE
After the stp edged-port default command is run on a device, all ports of the device will be
become edge ports. During network topology calculation, running the stp edged-port default
command may cause a loop. Exercise caution when using this command.
Precautions
If a port of a switching device receives a BPDU after being configured as an edge port, the
switching device will automatically set the port as a non-edge port and recalculate the
spanning tree.
To prevent attackers from forging BPDUs to change edge ports on a switching device to non-
edge ports, you can run the stp bpdu-protection command in the system view to configure
BPDU protection on the switching device. After BPDU protection is enabled on a switching
device, the switching device shuts down the edge port if the edge port receives a BPDU. The
attributes of the edge port are not changed.
Example
# Configure all ports on an edge device as edge ports.
<HUAWEI> system-view
[HUAWEI] stp edged-port default
Related Topics
5.12.32 stp bpdu-protection
5.12.38 stp edged-port
Format
stp enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
System view, MSTP process view, Ethernet interface view, GE interface view, XGE interface
view, MultiGE interface view, 40GE interface view, Eth-Trunk interface view, port group
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a complex Layer 2 network, to prevent loops or break loops, STP/RSTP/MSTP/VBST can
be configured on switching devices.
Running the stp enable command enables STP/RSTP/MSTP/VBST. The devices running
STP/RSTP/MSTP/VBST discover loops on the network by exchanging information with each
other and trim the ring topology into a loop-free tree topology by blocking a certain interface.
In this manner, replication and circular propagation of packets are prevented on the network.
In addition, the processing performance of devices is prevented from deteriorating.
Enabling STP/RSTP/MSTP/VBST consumes system resources so that you can run the stp
disable command to disable STP/RSTP/MSTP/VBST on devices or interfaces that do not
participate in the spanning tree calculation.
NOTE
For the S1720GFR, S2720, S2750EI, S5700LI, and S5700S-LI, a maximum of 64 STP-enabled ports in Up
state are recommended. If there are more than 64 STP-enabled ports in Up state, the CPU may be affected
and faults such as protocol flapping may occur.
For the S5710-X-LI, S5720SI, and S5720S-SI, a maximum of 128 STP-enabled ports in Up state are
recommended. If there are more than 128 STP-enabled ports in Up state, the CPU may be affected and faults
such as protocol flapping may occur.
For the S5720EI, a maximum of 200 STP-enabled ports in Up state are recommended. If there are more than
200 STP-enabled ports in Up state, the CPU may be affected and faults such as protocol flapping may occur.
For the S5720HI, S6720EI, and S6720S-EI, a maximum of 256 STP-enabled ports in Up state are
recommended. If there are more than 256 STP-enabled ports in Up state, the CPU may be affected and faults
such as protocol flapping may occur.
Pre-configuration Tasks
After STP/RSTP/MSTP is enabled on a ring network, STP/RSTP/MSTP immediately
calculates spanning trees on the network. Configurations on a switching device, such as, the
switching device priority and port priority, will affect spanning tree calculation. Any change
of the configurations may cause network flapping. Therefore, to ensure rapid and stable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
a VLANIF interface, DHCP clients obtain IP addresses slowly. To solve the problem,
disable STP or configure the device interface connected to a terminal as the edge
interface.
Follow-up Procedure
After STP is enabled globally and on an interface, run the stp vlan enable command to
enable STP in a VLAN so that VBST can take effect.
Example
# Enable STP/RSTP/MSTP/VBST on a switching device.
<HUAWEI> system-view
[HUAWEI] stp enable
Related Topics
5.12.67 stp vlan enable
5.12.6 display stp
Function
The stp link-share-protection command enables the shared-link protection for an MSTP
process.
The undo stp link-share-protection command disables the shared-link protection of an
MSTP process.
By default, the shared-link protection of an MSTP process is disabled.
Format
stp link-share-protection
undo stp link-share-protection
Parameters
None
Views
MSTP process view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
Precautions
Shared-link protection is valid only in processes. Before running the stp link-share-
protection command, check that relevant ports have been correctly bound to the
corresponding process using the stp binding process command.
Example
# Enable the shared-link protection for MSTP process 1.
<HUAWEI> system-view
[HUAWEI] stp process 1
[HUAWEI-mst-process-1] stp link-share-protection
Related Topics
5.12.29 stp binding process link-share
5.12.56 stp root-protection
Function
The stp loop-protection command enables loop protection on the current port.
The undo stp loop-protection command disables loop protection on the current port.
Format
stp loop-protection
Parameters
None.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running a spanning tree protocol, a switching device maintains the status of the
root port and blocked port by continually receiving BPDUs from the upstream switching
device. If ports cannot receive BPDUs from the upstream switching device due to link
congestion or unidirectional link failures, the switching device will re-select a root port. Then,
the previous root port becomes a designated port and the previous blocked port enters the
Forwarding state. As a result, loops may occur on the network.
To prevent the preceding problems, deploy loop protection. If the root port or alternate port
does not receive BPDUs from the upstream device for a long time, the switch enabled with
loop protection sends a notification to the NMS. If the root port is used, the root port enters
the Discarding state and becomes the designated port. If the alternate port is used, the
alternate port keeps blocked and becomes the designated port. In this case, loops will not
occur. After the link is not congested or unidirectional link failures are rectified, the port
receives BPDUs for negotiation and restores its original role and status.
NOTE
l An Alternate port is the backup of the root port. When the root port can normally send and receive
BPDUs, the Alternate port is in the blocked state.
l Between two interconnected switching devices in a spanning tree, the switching device nearer to the
root bridge is the upstream device of the other devices.
Precautions
Loop protection and root protection cannot be configured on the same interface
simultaneously.
Example
# Enable loop protection on the GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp loop-protection
Related Topics
5.12.6 display stp
Function
The stp max-hops command sets the maximum hops of a spanning tree in an MST region.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo stp max-hops command restores the default value of the maximum hops of a
spanning tree.
Format
stp max-hops hop
Parameters
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp max-hops command
in the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Switching devices on a Layer 2 network running MSTP communicate with each other by
exchanging MST BPDUs. An MST BPDU has a field that indicates the number of remaining
hops.
l The number of remaining hops in a BPDU sent by the root switching device equals the
maximum number of hops.
l The number of remaining hops in a BPDU sent by a non-root switching device equals
the maximum number of hops minus the number of hops from the non-root switching
device to the root switching device.
l If a switching device receives a BPDU in which the number of remaining hops is 0, the
switching device will discard the BPDU.
Therefore, the maximum number of hops of a spanning tree in an MST region determines the
network scale. The stp max-hops command can be used to set the maximum number of hops
in an MST domain so that the network scale of a spanning tree can be controlled.
Precautions
In an MST region, the maximum number of hops set on the root switching device in a CIST
or an MSTI is the maximum number of hops in the CIST or MSTI.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Set the maximum hops in the MST region to 35.
<HUAWEI> system-view
[HUAWEI] stp max-hops 35
Related Topics
5.12.6 display stp
Function
The stp mcheck command configures a port to automatically switch from the STP mode back
to the RSTP/MSTP mode.
By default, a port transitions from the STP mode to the RSTP/MSTP/VBST mode by
receiving BPDUs. A port that does not receive BPDUs cannot transition from the STP mode
to the RSTP/MSTP/VBST mode.
Format
stp mcheck
Parameters
None
Views
System view, MSTP process view, Ethernet interface view, Eth-Trunk interface view, GE
interface view, XGE interface view, MultiGE interface view, 40GE interface view, port group
view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp check command in
the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The stp mcheck command can be used to address this problem. After this command is run on
a port, the port will automatically switch from the STP mode back to the RSTP/MSTP mode.
When a VBST-enabled switch connects to an MSTP-enabled switch, the connected port of the
MSTP-enabled switch automatically switches to the RSTP mode through negotiation. When
the VBST-enabled switch switches to the MSTP mode, the connected ports of the two
switches may still work in RSTP mode due to the time sequence problem. You can perform
the following operations to manually switch the ports to the MSTP mode.
Prerequisites
Precautions
Running the stp mcheck command in the system view configures all ports on the current
switching device to automatically switch back to the RSTP/MSTP/VBST mode.
Running the stp mcheck command in the MSTP process view configures all ports bound to
the current MSTP process to automatically switch back to the RSTP/MSTP mode.
Running the stp mcheck command in the interface view configures only the current port to
automatically switch back to the RSTP/MSTP/VBST mode.
Example
# Perform MCheck on GE0/0/1 and switch it to the MSTP mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp mcheck
Function
The stp mode command sets the operation mode of spanning tree protocol for the current
MSTP process.
The undo stp mode command restores the default operation mode of the current MSTP
process.
By default, the operation mode of spanning tree protocol for the current MSTP process is
MSTP.
Format
stp mode { mstp | rstp | stp }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
mstp Indicates the MSTP operation mode for the ports bound to the current -
MSTP process.
rstp Indicates the RSTP operation mode for the ports bound to the current -
MSTP process.
stp Indicates the STP operation mode for the ports bound to the current -
MSTP process.
Views
MSTP process view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an MSTP process is created on an MSTP network, all ports bound to the MSTP process
operate in MSTP mode by default. These ports may be connected to STP/RSTP devices. As a
result, spanning trees cannot be properly calculated, because devices running different
spanning tree protocols cannot exchange packets.
To address this problem, the stp mode command can be set an operation mode for a switching
device. The operation mode can be MSTP, RSTP, or STP.
Precautions
l After the stp mode mstp command is run in an MSTP process, all ports that are running
MSTP and are bound to the MSTP process, excluding the ports directly connected to
STP switching devices, operate in MSTP mode and can send MST BPDUs. The ports
directly connected to STP switching devices operate in STP mode.
l After the stp mode rstp command is run in an MSTP process, all ports that are running
MSTP and are bound to the MSTP process, excluding the ports directly connected to
STP switching devices, operate in RSTP mode and can send RST BPDUs. The ports
directly connected to STP switching devices operate in STP mode.
l After the stp mode stp command is run in an MSTP process, all ports bound to the
MSTP process operate in STP mode and send configured BPDUs.
A port operating in MSTP mode can communicate with a port operating in RSTP mode.
Running the stp mode rstp command on a device that supports MSTP is not recommended.
The function of the stp mode rstp command can be implemented by the stp mode mstp
command by default.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Set the operation mode of MSTP process 1 to the STP mode.
<HUAWEI> system-view
[HUAWEI] stp process 1
[HUAWEI-mst-process-1] stp mode stp
Related Topics
5.12.6 display stp
5.12.46 stp mode (system view)
Function
The stp mode command sets the operation mode of the spanning tree protocol on a switching
device.
The undo stp mode command restores the default operation mode of the spanning tree
protocol.
Format
stp mode { mstp | rstp | stp | vbst }
Parameters
Parameter Description Value
mstp Indicates the MSTP mode. -
rstp Indicates the RSTP mode. -
stp Indicates the STP mode. -
vbst Indicates the VBST mode. -
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
On the network running a spanning tree protocol, switches running different spanning tree
protocols cannot communicate with each other. As a result, spanning trees cannot be properly
calculated. A switch has four operation modes: VBST, MSTP, RSTP, and STP.
The stp mode command can be used to set a proper operation mode for a spanning tree
protocol on a switching device and enables the switching device to identify BPDUs sent by a
switching device that runs a different spanning tree protocol during communication.
By default, all ports on a switching device operate in MSTP mode. When a switching device
finds that it is directly connected to an STP switching device, it automatically switch the
operation mode the port directly connected to the STP switching device to STP.
Configuration Impact
l After the stp mode vbst command is run on a switch, all ports running VBST on the
switch, excluding the ports directly connected to STP switches, operate in VBST mode
and can send VBST BPDUs. The ports directly connected to STP switches operate in
STP mode.
l After the stp mode mstp command is run on a switching device, all ports running MSTP
on the switching device, excluding the ports directly connected to STP switching
devices, operate in MSTP mode and can send MSTP BPDUs. The ports directly
connected to STP switching devices operate in STP mode.
l After the stp mode rstp command is run on a switching device, all ports running RSTP
on the switching device, excluding the ports directly connected to STP switching
devices, operate in RSTP mode and can send RSTP BPDUs. The ports directly
connected to STP switching devices operate in STP mode.
l After the stp mode stp command is run on a switching device, all ports of the switching
device operate in STP mode and send configured BPDUs.
Precautions
l A port operating in MSTP mode can communicate with a port operating in RSTP mode.
l VBST BPDUs and RST BPDUs can be used at the same time.
l The stp mode rstp command can be used to enable a switch that does not support MSTP
to communicate with an STP switch.
l In VBST mode, the MAC address 0100-0CCC-CCCD is displayed in the display bpdu
mac-address command output. In STP/RSTP/MSTP mode, the MAC address
0100-0CCC-CCCD is not displayed unless the bpdu mac-address command specifies
the MAC address as 0100-0CCC-CCCD.
Example
# Set the operation mode of the switching device to the STP mode.
<HUAWEI> system-view
[HUAWEI] stp mode stp
Related Topics
5.12.6 display stp
5.17.3 bpdu mac-address
5.17.5 display bpdu mac-address
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
stp no-agreement-check
undo stp no-agreement-check
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If Huawei and non-Huawei data communication devices are deployed on a network running a
spanning tree protocol, the Huawei devices and non-Huawei devices may fail to communicate
with each other, because they have different Proposal/Agreement mechanisms. To address this
problem, the stp no-agreement-check command can be used to set a common fast transition
mechanism or an enhanced transition mechanism on a port.
l Running the stp no-agreement-check command configures a common fast transition
mechanism on a port.
l Running the undo stp no-agreement-check command configures an enhanced fast
transition mechanism on a port.
Precautions
The fast transition mechanism is also called the Proposal/Agreement mechanism. The device
currently supports the following modes:
l Enhanced mode: The current interface counts a root port when it calculates the
synchronization flag bit.
a. An upstream device sends a Proposal message to a downstream device requesting
fast status transition. After receiving the message, the downstream device sets the
port connected to the upstream device as the root port and blocks all non-edge ports.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
b. The upstream device then sends an Agreement message to the downstream device.
After the downstream device receives the message, the root port transitions to the
Forwarding state.
c. The downstream device then responds with an Agreement message. After receiving
the message, the upstream device sets the port connected to the downstream device
as the designated port, and then the status of the designated port changes to
Forwarding.
l Common mode: The current interface ignores the root port when it calculates the
synchronization flag bit.
a. An upstream device sends a Proposal message to a downstream device requesting
fast transition. After receiving the message, the downstream device sets the port
connected to the upstream device as the root port and blocks all non-edge ports.
Then, the status of the root port changes to Forwarding.
b. The downstream device then responds with an Agreement message. After receiving
the message, the upstream device sets the port connected to the downstream device
as the designated port, and then the status of the designated port changes to
Forwarding.
NOTE
Between two interconnected switching devices in a spanning tree, the switching device nearer to the root
bridge is the upstream device of the other devices.
Example
# Configure the common fast transition mechanism for the GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp no-agreement-check
Function
The stp pathcost-standard command sets the standard used to calculate the path cost.
The undo stp pathcost-standard command restores the default standard used to calculate the
path cost.
Format
stp pathcost-standard { dot1d-1998 | dot1t | legacy }
Parameters
Parameter Description Value
dot1d-1998 Indicates IEEE 802.1D standard that used to calculate the path cost. -
dot1t Indicates IEEE 802.1T standard that used to calculate the path cost. -
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp pathcost-standard
command in the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A path cost is a port parameter, and is used by a spanning tree protocol to select a link. By
calculating path costs, a spanning tree protocol selects stable links, blocks redundant paths,
and trims a network into a loop-free network. The path cost range is determined by the path
cost calculation standard.
Table 5-91 lists path costs defined by the IEEE 802.1D-1998 standard, IEEE 802.1T standard,
and Huawei legacy standard. Different vendors use different standards.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
If the path cost calculation standard is changed on a port, the path cost of the port is restored
to the default value. The stp cost command can be used to set a path cost for a port.
Usually, all switching devices on the same network use the same path cost calculation
standard.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Use the IEEE 802.1d-1998 to calculate the path cost.
<HUAWEI> system-view
[HUAWEI] stp pathcost-standard dot1d-1998
Related Topics
5.12.6 display stp
Format
stp point-to-point { auto | force-false | force-true }
undo stp point-to-point
Parameters
Parameter Description Value
force-true Indicates the link type is P2P. -
force-false Indicates the link type is non-P2P. -
auto Indicates that the spanning tree protocol detects automatically whether -
the port is connected to a P2P link.
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, if a port of a switching device is
connected to a non-P2P link, the port cannot perform fast status transition.
If a port works in full-duplex mode, the port is connected to a P2P link, and force-true can be
set in the stp point-to-point command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If a port works in half-duplex mode, the stp point-to-point force-true command can be used
to forcibly set the type of the link to which the port is connected to P2P, implementing rapid
network convergence.
Precautions
The stp point-to-point command configuration on a port takes effect in all spanning tree
instances where the port resides.
Example
# Set the link type of GE0/0/1 as P2P.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp point-to-point force-true
Function
The stp port priority command sets the priority of a port in a spanning tree.
The undo stp port priority command restores the default priority.
Format
STP/RSTP/MSTP: stp [ process process-id ] [ instance instance-id ] port priority priority
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When ports participate in spanning tree calculation, the PIDs of these ports on switching
devices may affect the designated port election result. During spanning tree calculation, the
port with the smallest PID is elected as the designated port.
NOTE
A PID is the ID of a port, and consists of a 4-bit priority and a 12-bit port number.
The stp port priority command can be used to change the priority of a port. This affects the
PID of the port and determines whether the port can be elected as the designated port.
Precautions
When the priority of a port changes, a spanning tree protocol recalculates the role of the port
and performs status transition for the port.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The priority of a port determines the role of the port in a specified spanning tree instance and
process. You can set different priorities for a port in different spanning tree instances or
processes so that user traffic can be forwarded along different links and traffic load balancing
can be implemented.
Example
# Set the priority of GE0/0/1 to 16 in the spanning tree instance 2 when MSTP is running.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp instance 2 port priority 16
Related Topics
5.12.51 stp priority
5.12.6 display stp
Function
The stp priority command sets the priority of the switching device in a spanning tree.
Format
STP/RSTP/MSTP: stp [ instance instance-id ] priority priority
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp priority command in
the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Priorities of switching devices are an important factor to calculate a spanning tree and
determine the selection of the root bridge.
On an STP/RSTP/MSTP/VBST network, each spanning tree has only one root bridge, which
is responsible for sending BPDUs. Owning to the importance of the root bridge, the switching
device with high performance and network hierarchy is generally chosen as the root bridge.
The priority of such a switching device, however, may not be that high. Therefore, setting a
high priority for the switching device is necessary so that the device can function as a root
bridge.
Other devices with low performance and network hierarchy are not fit to be a root bridge.
Therefore, set low priorities for these devices.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
On an MSTP network, each switching device can be set with a distinct priority in each
spanning tree instance. On a VBST network, each switch can be set with a priority for the
spanning tree in each VLAN.
Precautions
The smaller the priority value of a switching device is, the higher the possibility that the
switching device is selected as the root bridge.
If a switching device has been configured as the primary or secondary root bridge, before
changing the priority of the switching device, run the undo stp [ instance instance-id ] root
command to disable the root bridge or secondary root bridge function.
If the stp root primary command is run to set a switching device as the primary root bridge,
the priority value of the switching device is 0.
If the stp root secondary command is run to set a switching device as the secondary root
bridge, the priority value of the switching device is 4096.
Example
# Set the priority of the switching device in spanning tree instance 1 to 4096 when MSTP is
running.
<HUAWEI> system-view
[HUAWEI] stp instance 1 priority 4096
# Set the priority of the switch in VLAN 10 to 4096 when VBST is running.
<HUAWEI> system-view
[HUAWEI] stp vlan 10 priority 4096
Related Topics
5.12.6 display stp
Function
The stp process command has the following functions:
l Create an MSTP process with a specified ID and enter the MSTP process view if the
specified MSTP process does not exist.
l Display the MSTP process view if the specified MSTP process exists.
Format
stp process process-id
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network where MSTP is run, if devices belong to multiple access rings that are
isolated from each other and these access rings do not need intercommunication, MSTP
cannot be used to calculate one spanning tree for all these access rings. Instead, MSTP must
be enabled on each access ring to calculate the spanning trees independently.
Each switching device on these access rings can be configured with multiple MSTP
processes. After ports of each switching device are bound to different MSTP processes, they
participate in the MSTP calculations of different MSTP processes. MSTP calculations in
different MSTP processes are independent of each other.
Follow-up Procedure
After an MSTP process is created, run the stp binding process command to bind relevant
interfaces to the MSTP process.
Precautions
After a switching device that runs MSTP starts correctly, MSTP process 0 exists by default.
MSTP configurations in the system view and interface view both belong to this process.
VBST does not support processes. Therefore, this command does not take effect when the
spanning tree protocol is VBST. If this command has been run in MSTP mode, switching the
MSTP mode to VBST mode fails, and the system displays a message indicating switching
failure.
Example
# Create MSTP process 1.
<HUAWEI> system-view
[HUAWEI] stp process 1
Related Topics
5.12.28 stp binding process
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
stp pvid-consistency protection mode block
undo stp pvid-consistency protection mode
Parameters
Parameter Description Value
block Specifies the block mode. -
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
VBST checks whether PVIDs of two directly connected ports are the same. If they are
different, the processing method varies as follows:
l If the protection mode is block, VBST will block the PVIDs.
l If no protection mode is configured, VBST will print log information but not block the
PVIDs.
Precautions
When the PVID of the interface is inconsistent and the PVID needs to be blocked, the stp
pvid-consistency protection mode command must be configured on the two directly
connected ports and their link types must be both trunk.
Example
# Set the protection mode for PVID inconsistency between directly connected ports to block.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] stp pvid-consistency protection mode block
Format
stp region-configuration
undo stp region-configuration
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP divides a switching network into multiple regions, each of which has multiple
spanning trees and these spanning trees are independent of each other. Each spanning tree is
called a multiple spanning tree instance (MSTI) and each region is called a multiple spanning
tree (MST) region.
Two switching devices belong to the same MST region if they have the following parameters
the same:
l MST region name
l Mappings between VLANs and MSTIs
l Revision level of the MST region
If the preceding parameters need to be set for the current switching device or the current
process, run the the stp region-configuration command to enter the MST region view first.
Follow-up Procedure
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
After the stp region-configuration command is run to enter the MST region view, run the
following commands:
l Run the region-name command to set the MST region name.
l Run the instance or the vlan-mapping modulo command to set the mappings between
VLANs and MSTIs.
l Run the revision-level name command to set the revision level of the MST region.
Example
# Enter the MST region view.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region]
Related Topics
5.12.12 display stp region-configuration
Function
The stp root command configures a switching device as a root bridge or secondary root
bridge of a spanning tree.
By default, a switching device does not function as the root bridge or secondary root bridge of
a spanning tree.
Format
STP/RSTP/MSTP: stp [ instance instance-id ] root { primary | secondary }
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp root command in the
MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On an a spanning tree protocol network, each spanning tree has only one root bridge, which is
responsible for sending BPDUs. Owning to the importance of the root bridge, the switching
device with high performance and network hierarchy is generally chosen as a root bridge. The
priority of such a device, however, may be not that high. Therefore, setting a high priority for
the switching device is necessary so that the device can function as a root bridge.
To ensure nonstop traffic transmission, run the stp root command to configure the switching
device as the secondary root bridge. When the root bridge is faulty or is powered off, the
secondary root bridge becomes the root bridge during spanning tree calculation.
NOTE
After the stp root primary command is run to set a switching device to be the primary root bridge, the
priority value of the switching device is 0 in the spanning tree and the priority cannot be modified.
The secondary root bridge specified using the stp root secondary command has the priority value of
4096 and the priority cannot be modified.
Precautions
A switching device in a spanning tree cannot function both as the primary root bridge and as
the secondary root bridge.
If multiple secondary root bridges are set in a spanning tree, the one with the smallest MAC
address functions as the secondary root bridge of the spanning tree.
When the device connects to a non-Huawei device, you are advised to run the stp vlan { vlan-
id1 [ to vlan-id2 ] } &<1-10> priority priority command to set the device priority to ensure
that the root bridge is selected correctly.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Set the switching device as the root bridge of spanning tree instance 1 when MSTP is
running.
<HUAWEI> system-view
[HUAWEI] stp instance 1 root primary
# Configure the switch as the root bridge in VLAN 10 when VBST is running.
<HUAWEI> system-view
[HUAWEI] stp vlan 10 root primary
# Set the switching device as the secondary root bridge of spanning tree instance 4 when
MSTP is running.
<HUAWEI> system-view
[HUAWEI] stp instance 4 root secondary
# Configure the switch as the secondary root bridge in VLAN 10 when VBST is running.
<HUAWEI> system-view
[HUAWEI] stp vlan 10 root secondary
Related Topics
5.12.6 display stp
Format
stp root-protection
undo stp root-protection
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Owning to incorrect configurations or malicious attacks on the network, a root bridge may
receive BPDUs with a higher priority. Consequently, the root bridge is no longer able to serve
as the root bridge, and the network topology is changed, triggering a spanning tree
recalculation. This spanning tree recalculation may transfer traffic from high-speed links to
low-speed links, causing traffic congestion.
If a designated port is enabled with the root protection function, the port role cannot be
changed. Once a designated port that is enabled with root protection receives BPDUs with a
higher priority, the port enters the Discarding state and does not forward packets. If the port
does not receive any BPDUs with a higher priority before a period (generally two Forward
Delay periods) expires, the port automatically enters the Forwarding state.
NOTE
You can run the stp timer forward-delay command to set the Forward Delay period.
Precautions
The root protection function takes effect only on a designated port. In addition, configuring
the root protection function on a port that functions as the designated port in all instances is
recommended.
If the stp root-protection command is run on other types of ports, the root protection function
does not take effect.
Loop protection and root protection cannot be configured on the same interface
simultaneously.
Example
# Enable the root protection function on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp root-protection
Related Topics
5.12.55 stp root
5.12.55 stp root
5.12.6 display stp
Format
stp tc-notify process 0
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
MSTP process view
Default Level
2: Configuration level
Usage Guidelines
After the stp tc-notify process 0 command is run, the current MSTP process, after receiving a
TC message, notifies the MSTIs in MSTP process 0 to update MAC entries and ARP entries.
This prevents user services from being interrupted.
Example
# Configure MSTP process 1 to notify MSTP process 0 of receiving a TC message.
<HUAWEI> system-view
[HUAWEI] stp process 1
[HUAWEI-mst-process-1] stp tc-notify process 0
Related Topics
5.12.52 stp process
Function
The stp tc-protection command enables the trap function for the Topology Change (TC)
BPDU protection.
The undo stp tc-protection command disables the trap function for the TC BPDU protection.
Format
stp tc-protection
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view or MST process region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The TC attack defense function is enabled by default, you can run the stp tc-protection
interval command to set the time that a device needs to process the maximum number of TC
BPDUs which is configured using the stp tc-protection threshold command. If there are
packets exceeding the maximum number, the switch processes the packets after the time
specified in the stp tc-protection interval command expires. For example, if the time is set to
10 seconds and the maximum number is set to 5, when a switch receives TC BPDUs, the
switch processes only the first 5 TC BPDUs within 10 seconds and processes the other TC
BPDUs after the time expires. In this way, the device does not frequently update its MAC
address entries and ARP entries, reducing CPU usage.
To learn about detailed processing information on TC BPDUs, run the stp tc-protection
command to enable the trap function for the TC BPDU protection. After the function is
enabled, MSTP_1.3.6.1.4.1.2011.5.25.42.4.2.15 hwMstpiTcGuarded and
MSTP_1.3.6.1.4.1.2011.5.25.42.4.2.16 hwMstpProTcGuarded are generated.
Precautions
The trap function for the TC BPDU protection takes effect only when the snmp-agent trap
enable feature-name mstp and stp tc-protection are both run.
Example
# Enable the trap function for the TC BPDU protection.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name mstp trap-name hwmstpitcguarded
[HUAWEI] stp tc-protection
Function
The stp tc-protection interval command sets the time for a device to process the maximum
number of TC BPDUs.
The undo stp tc-protection interval command restores the default value.
NOTE
When STP works in VBST mode, the default time for the device to process the maximum number of TC
BPDUs is 10s.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
stp tc-protection interval interval-value
undo stp tc-protection interval
Parameters
Parameter Description Value
interval-value Specifies the time for a device to process The value is an integer ranging
the maximum number of TC BPDUs. from 1 to 600, in seconds.
Views
System view or MST process region view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp tc-protection
command in the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, a device deletes MAC address entries
and ARP entries after receiving TC packets. Frequent entry deletion may cause high CPU
usage.
The TC attack defense function is enabled by default, you can configure the time, which the
device takes to handle a given number of TC packets and immediately refresh forwarding
entries, by running the stp tc-protection interval command. Within the time specified by
interval-value, the device handles a given number of TC packets. Excess TC packets are
processed by the device at once after the timer (whose length is the configured time) expires.
This mechanism ensures that the device does not frequently delete its MAC entries and ARP
entries, and therefore does not have excessive CPU usage.
NOTE
You can specify the maximum number of TC packets that the device processes can handle in the
specified time by running the stp tc-protection threshold command.
Example
# Configure the amount of time, which MSTP take to handle a given number of TC packets
and immediately refreshes forwarding entries, to 10 seconds.
<HUAWEI> system-view
[HUAWEI] stp tc-protection interval 10
Related Topics
5.12.60 stp tc-protection threshold
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
stp tc-protection threshold threshold
undo stp tc-protection threshold
Parameters
Parameter Description Value
threshold Indicates the number of times that a device The value is an integer
handles the TC BPUD and updates forwarding ranging from 1 to 255.
entries per unit of time.
Views
System view or MST process region view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp tc-protection
threshold command in the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network where MSTP is run, a switching device that receives TC BPDUs will
delete the corresponding MAC entries and ARP entries. Frequent deletion operations will
greatly affect the CPU, leading to a high CPU usage.
The TC attack defense function is enabled by default, the number of times that TC BPDUs are
processed by the switching device within a unit time is configurable (the default unit time is
2s, and the default number of times is 1). If the number of TC BPDUs that the switching
device receives within a unit time exceeds the specified threshold, the switching device
handles TC BPDUs only for the specified number of times. Additional TC BPDUs are
processed by the switching device as a whole for once after the timer (that is, the specified
time period) expires. In this manner, the switching device is prevented from frequently
deleting its MAC entries and ARP entries so that the CPU is protected against overburden.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
The value of the unit time is consistent with the Hello time and can be set using the stp timer hello
command.
Example
# Set the threshold update forwarding entries to 5.
<HUAWEI> system-view
[HUAWEI] stp tc-protection threshold 5
Function
The stp timer forward-delay command sets the value of the Forward Delay of a switching
device.
The undo stp timer forward-delay command restores the default value of the Forward
Delay.
By default, the value of the Forward Delay of a switching device is 1500 centiseconds (15
seconds).
Format
stp [ vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> ] timer forward-delay forward-delay
Parameters
Parameter Description Value
vlan vlan-id1 Specifies one or more VLANs in which the The value is an
[ to vlan-id2 ] Forward Delay value is set. integer that ranges
from 1 to 4094.
l vlan-id1 specifies the start VLAN ID.
l to vlan-id2 specifies the end VLAN ID. vlan-
id2 must be greater than or equal to vlan-id1.
vlan-id2 and vlan-id1 specify a VLAN range.
l If to vlan-id2 is not specified, the Forward
Delay value is configured for only the VLAN
specified by vlan-id1.
In the stp timer forward-delay command, you can
specify a maximum of 10 VLAN ranges.
NOTE
VLANs can be specified only when VBST is running.
forward-delay Specifies the value of the Forward Delay. The value ranges
from 400 to 3000
centiseconds by a
step of 100.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp timer forward-delay
command in the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running a spanning tree algorithm, if the network topology is changed, it takes
time to advertise new BPDU configuration messages on the network. During this period,
interfaces to be blocked may not be blocked in time and interface ever blocked may not be
blocked. As a result, a temporary loop may be formed. To prevent this problem, you can use
the Forward Delay timer to set a delay time. During the delay time, all interfaces are blocked
temporarily.
The stp timer forward-delay command is used to set the Forward Delay timer.
Precautions
The value of the Forward Delay timer set on the root bridge is advertised to other devices of
the same spanning tree using BPDUs. Then it becomes the value of the Forward Delay timer
of all devices in the spanning tree.
The relationships between the Hello Time, Forward Delay, and MaxAge are as follows. The
spanning tree functions properly only if the correct relationships are established. Otherwise,
frequent network flapping occurs.
l 2 x (Forward Delay - 1.0 second) ≥ Max Age
l Max Age ≥ 2 x (Hello Time + 1.0 second)
Running the stp bridge-diameter command to set the network diameter is recommended.
After the stp bridge-diameter command is run, the switching device sets optimum values for
the three parameters, Hello Time, Forward Delay, and Max Age.
Example
# Set the Forward Delay to 2000 centiseconds (20 seconds) when STP/RSTP/MSTP is
running.
<HUAWEI> system-view
[HUAWEI] stp timer forward-delay 2000
# Set the Forward Delay value to 2000 centiseconds (20 seconds) for VLAN 10 when VBST
is running.
<HUAWEI> system-view
[HUAWEI] stp vlan 10 timer forward-delay 2000
Related Topics
5.12.62 stp timer hello
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The stp timer hello command sets the interval of the switching device to send BPDUs, that
is, the value of the Hello Time.
The undo stp timer hello command restores the default setting.
By default, the interval of the switch to send BPDUs is 200 centiseconds (2 seconds).
Format
stp [ vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> ] timer hello hello-time
Parameters
Parameter Description Value
vlan vlan-id1 Specifies one or more VLANs in which the Hello The value is an
[ to vlan-id2 ] timer value is set. integer that ranges
from 1 to 4094.
l vlan-id1 specifies the start VLAN ID.
l to vlan-id2 specifies the end VLAN ID. vlan-
id2 must be greater than or equal to vlan-id1.
vlan-id2 and vlan-id1 specify a VLAN range.
l If to vlan-id2 is not specified, the Hello timer
value is configured for only the VLAN
specified by vlan-id1.
In the stp timer hello command, you can specify a
maximum of 10 VLAN ranges.
NOTE
VLANs can be specified only when VBST is running.
hello-time Specifies the interval of the switch to send BPDUs. The value ranges
from 100 to 1000, in
centiseconds by a
step of 100.
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp timer hello
command in the MSTP process view.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network where a spanning tree protocol is enabled, a switching device periodically sends
BPDUs to other devices in the same spanning tree at the interval of the Hello Time. Sending
BPDUs periodically ensures that the spanning tree is stable. The stp timer hello command
can be used to set the BPDU sending interval, that is, the Hello Time.
If no BPDUs are received by the switching device within the timeout period (timeout period =
Hello Time x 3 x Timer Factor), the spanning tree is calculated again.
NOTE
In a spanning tree, the device closer to the root bridge is the upstream device of another connected
device.
Precautions
The value of the Hello Time set on the root bridge is advertised to other devices of the same
spanning tree using BPDUs. Then it becomes the value of the Hello Time of all devices in the
spanning tree.
The relationships between the Hello Time, Forward Delay, and Max Age are as follows. The
spanning tree works properly only if the relationships are correctly established. Otherwise,
frequent network flapping occurs.
l 2 x (Forward Delay - 1.0 second) ≥ Max Age
l Max Age ≥ 2 x (Hello Time + 1.0 second)
Running the stp bridge-diameter command to set the network diameter is recommended.
After the stp bridge-diameter command is run, the switching device sets optimum values for
the three parameters, Hello Time, Forward Delay, and Max Age.
Example
# Set the Hello Time to 400 centiseconds (4 seconds) when STP/RSTP/MSTP is running.
<HUAWEI> system-view
[HUAWEI] stp timer hello 400
# Set the Hello time to 400 centiseconds (4 seconds) for VLAN 10 when VBST is running.
<HUAWEI> system-view
[HUAWEI] stp vlan 10 timer hello 400
Related Topics
5.12.61 stp timer forward-delay
5.12.63 stp timer max-age
5.12.33 stp bridge-diameter
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
stp [ vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> ] timer max-age max-age
undo stp [ vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> ] timer max-age
Parameters
Parameter Description Value
vlan vlan-id1 Specifies one or more VLANs in which the Max The value is an
[ to vlan-id2 ] Age value is set. integer that ranges
from 1 to 4094.
l vlan-id1 specifies the start VLAN ID.
l to vlan-id2 specifies the end VLAN ID. vlan-
id2 must be greater than or equal to vlan-id1.
vlan-id2 and vlan-id1 specify a VLAN range.
l If to vlan-id2 is not specified, the Max Age
value is configured only for the VLAN
specified by vlan-id1.
In the stp timer max-age command, you can
specify a maximum of 10 VLAN ranges.
NOTE
VLANs can be specified only when VBST is running.
max-age Specifies the BPDU aging time on a port of the The value ranges
switch. from 600 to 4000 in
centiseconds with a
step of 100.
Views
System view or MST process region view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp timer max-age
command in the MSTP process view.
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
On a network where a spanning tree protocol is enabled, a switching device checks whether
the BPDUs received from an upstream switching device time out based on the set Max Age
value. If the received BPDUs time out, the switching device ages the BPDUs and blocks the
port that receives the BPDUs. Then, the switching device sends the BPDUs with the
switching device as the root bridge. This aging mechanism effectively controls the diameter
of the spanning tree. After the stp timer max-age command is run, the Max Age value is set
to control the timeout period of received BPDUs.
NOTE
In a spanning tree, the device closer to the root bridge is the upstream device of another connected
device.
Precautions
The value of the Max Age set on the root bridge is advertised to other devices of the same
spanning tree using BPDUs. Then it becomes the MaxAge value of all devices in the spanning
tree.
The timer MaxAge value takes effect for only the CIST and does not take effect for MSTIs.
The relationships between the Hello Time, Forward Delay, and Max Age are as follows. The
spanning tree functions properly only if the relationships are correctly established. Otherwise,
frequent network flapping occurs.
l 2 x (Forward Delay - 1.0 second) ≥ Max Age
l Max Age ≥ 2 x (Hello Time + 1.0 second)
Running the stp bridge-diameter command to set the network diameter is recommended.
After the stp bridge-diameter command is run, the switching device sets optimum values for
the three parameters, Hello Time, Forward Delay, and Max Age.
Example
# Set the Max Age to 1000 centiseconds (10 seconds) when STP/RSTP/MSTP is running.
<HUAWEI> system-view
[HUAWEI] stp timer max-age 1000
# # Set the Max Age value to 1000 centiseconds (10 seconds) for VLAN 10 when VBST is
running.
<HUAWEI> system-view
[HUAWEI] stp vlan 10 timer max-age 1000
Related Topics
5.12.6 display stp
5.12.61 stp timer forward-delay
5.12.62 stp timer hello
5.12.33 stp bridge-diameter
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If a switching device does not receive BPDUs from an upstream device within the timeout period
(timeout period = Hello Time × 3 × Timer Factor), the spanning tree is calculated again.
Format
stp timer-factor factor
undo stp timer-factor
Parameters
Parameter Description Value
factor Specifies the timer factor. The value ranges from 1 to 10.
Views
System view or MSTP process view
NOTE
VBST does not support processes. When VBST is running, you cannot run the stp timer-factor
command in the MSTP process view.
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network where a spanning tree protocol is enabled, if a switching device does not
receive BPDUs from an upstream device within the timeout period, it considers that the
upstream device becomes faulty, and will recalculate the spanning tree.
Sometimes, however, the failure of the upstream device to send BPDUs within the timeout
period is only because it is busy processing services. In this case, the spanning tree cannot be
calculated. Therefore, you can set a long timeout period on a stable network to avoid the
waste of network resources.
NOTE
In a spanning tree, the device closer to the root bridge is the upstream device of another connected
device.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
If the parameter factor is set smaller, the timeout period of the switching device to re-calculate
the spanning tree is shorter. In this case, there is a higher probability that the switching device
incorrectly considers the upstream device as being faulty.
If the parameter factor is set larger, the timeout period of the switching device to re-calculate
the spanning tree is longer. In this case, there is a higher probability that the traffic becomes
interrupted because the upstream device has become faulty.
Example
# Set the Time-Factor of the switching device to 6.
<HUAWEI> system-view
[HUAWEI] stp timer-factor 6
Related Topics
5.12.62 stp timer hello
Function
The stp transmit-limit command sets the maximum number of BPDUs that the current port
can send in a specified period.
The undo stp transmit-limit command restores the default maximum BPDUs.
By default, the maximum number of BPDUs that a port sends is 6 per second.
Format
stp transmit-limit packet-number
Parameters
Parameter Description Value
packet-number Specifies the maximum number of BPDUs The value is an integer that
that a port can send in a specified period. ranges from 1 to 255.
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view, port group view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
On a network where a spanning tree protocol is enabled, a switching device periodically sends
BPDUs to other devices in the same spanning tree with the interval of the Hello Time.
Sending BPDUs periodically ensures that the spanning tree is stable. If the number of sent
BPDUs are great in a specified period, excessive system and bandwidth resources will be
consumed.
To prevent this problem from occurring, run the stp transmit-limit command to set the
maximum number of BPDUs that can be sent by an interface in a specified period. In this
manner, the BPDU sending speed is controlled, preventing excessive use of system and
bandwidth resources by MSTP when the network topology flaps.
Precautions
After the stp transmit-limit command is configured, the maximum number of BPDUs sent in
a specified period by the interface is determined by the set value.
Example
# Set the maximum BPDUs that GE0/0/1 can send in a specified period to 5.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp transmit-limit 5
Format
stp transmit-limit packet-number
undo stp transmit-limit
Parameters
Parameter Description Value
packet-number Maximum number of BPDUs that each The value is an integer
interface of the local device can send per ranging from 1 to 255.
second
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running the Spanning Tree Protocol (STP), a switch sends BPDUs to other
devices in the same spanning tree at the interval of the Hello time, to maintain the spanning
tree stability. If a number of BPDUs are sent every second, system and bandwidth resources
will be greatly consumed.
NOTE
You can configure the Hello time by using the stp timer hello command. The Hello time is the length of
the Hello timer and specifies the interval at which the switch sends BPDUs.
To prevent excessive usage of system and bandwidth resources, you can run the stp transmit-
limit command to configure the maximum number of BPDUs that each interface of the local
device can send per second. This configuration controls the BPDU sending rate and prevents
the Multiple Spanning Tree Protocol (MSTP) from consuming too many system and
bandwidth resources when topology flapping occurs.
Precautions
After the stp transmit-limit command is executed, packet-number controls the maximum
number of BPDUs that each interface can send per second.
You can also configure the maximum number of BPDUs that a specific interface can send per
second by running the stp transmit-limit (interface view) command in the view of this
interface. The stp transmit-limit (interface view) command configuration in the interface
view takes precedence over the stp transmit-limit command configuration in the system
view. That is, if the stp transmit-limit (interface view) command is configured in the view
of an interface, the stp transmit-limit command configuration in the system view does not
take effect for this interface.
Example
# Configure the maximum number of BPDUs that each interface of the local device can send
per second to 5.
<HUAWEI> system-view
[HUAWEI] stp transmit-limit 5
Related Topics
5.12.62 stp timer hello
5.12.65 stp transmit-limit (interface view)
Function
The stp vlan enable command enables VBST in a VLAN on the switch.
The stp vlan disable command disables VBST in a VLAN on the switch.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The undo stp vlan disable command restores the default VBST status in a VLAN on the
switch.
Format
stp vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> enable
Parameters
Parameter Description Value
vlan vlan-id1 [ to Specifies one or more VLANs in which VBST is enabled. The value is
vlan-id2 ] an integer
l vlan-id1 specifies the start VLAN ID. that ranges
l to vlan-id2 specifies the end VLAN ID. vlan-id2 must from 1 to
be greater than or equal to vlan-id1. vlan-id2 and vlan- 4094.
id1 specify a VLAN range.
l If to vlan-id2 is not specified, VBST is enabled only
for the VLAN specified by vlan-id1.
In the stp enable command, you can specify a maximum
of 10 VLAN ranges.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a complex Layer 2 network, to prevent or eliminate loops and allow traffic in different
VLANs to be forwarded along spanning trees to implement load balancing, deploy VBST on
the switch.
Spanning tree calculation occupies system resources. Therefore, run the stp vlan disable
command to disable VBST in a VLAN where spanning tree calculation does not need to be
performed.
Pre-configuration Tasks
When VBST is enabled on a ring network, VBST immediately starts spanning tree
calculation. Parameters such as the switch priority and port priority affect spanning tree
calculation, and change of these parameters may cause network flapping. To ensure fast and
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
stable spanning tree calculation, perform basic configurations on the switch and ports before
enabling VBST.
l Run the stp mode vbst command to set the working mode of the switch.
l Run the stp vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> priority priority command to set
the priority of the switch in the spanning tree.
l Run the stp vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> port priority priority command
to set the priority of the port in the spanning tree instance.
l Run the stp vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> root primary command to set the
switch as the root bridge of the spanning tree instance.
l Run the stp vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> root secondary command to set
the switch as the secondary root bridge of the spanning tree.
l Run the stp vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> costcost command to set the path
cost of the port in the spanning tree instance.
l Run the instance instance-id vlan vlan-id command to configure 1:1 mapping between
MSTIs and VLANs.
Configurations are needed based on real-world situations.
Precautions
When VBST is enabled globally and in a VLAN, the interface that belongs to the VLAN
participates in spanning tree calculation. Whether the interface is in forwarding state depends
on the calculation result.
When VBST is disabled in a VLAN, the interface that belongs to the VLAN does not
participate in spanning tree calculation and is in forwarding state in the VLAN.
VBST cannot be enabled in the ignored VLAN or control VLAN used by ERPS, RRPP, SEP,
or Smart Link.
If VLAN mapping or VLAN stacking is configured on an interface corresponding to the
VLAN, VBST negotiation for this VLAN will fail.
Example
# Enable VBST in VLAN 5.
<HUAWEI> system-view
[HUAWEI] stp vlan 5 enable
Related Topics
5.12.40 stp enable
5.12.6 display stp
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The stp vpls-subinterface enable command enables a main interface to notify its sub-
interface bound to a VSI of the received TC BPDUs.
The undo stp vpls-subinterface enable command disables a main interface from notifying its
sub-interface bound to a VSI of the received TC BPDUs.
By default, a main interface is disabled from notifying its sub-interface bound to a VSI of the
received TC BPDUs.
NOTE
Only the S5720EI, S5720HI, S6720EI, and S6720S-EI supports this command.
Format
stp vpls-subinterface enable
Parameters
None.
Views
GE interface view, XGE interface view, 40GE interface view, Eth-Trunk interface view, port
group view
Default Level
2: Configuration level
Usage Guidelines
If an MSTP-enabled interface has a sub-interface configured with L2VPN, you can run the
stp vpls-subinterface enable command to enable the main interface to notify its sub-interface
bound to a VSI of the received TC BPDUs. After the main interface receives TC BPDUs, the
main interface can notify the sub-interface bound to the VSI of updating MAC address entries
and ARP entries. This function ensures nonstop services. When the stp vpls-subinterface
enable command is used and the main interface is in discarding state, the sub-interface bound
to the VSI enters the flowdown state. This prevents loops on a VPLS network when CEs are
dual-homed to PEs.
This command does not take effect when VBST is running. If this command has been run in
STP/RSTP/MSTP mode, switching the STP/RSTP/MSTP mode to VBST mode fails, and the
system displays a message indicating switching failure
Example
# Enable the 40GE0/0/1 to notify its sub-interface bound to a VSI of the received TC BPDUs.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] interface 40ge 0/0/1
[HUAWEI-40GE0/0/1] stp vpls-subinterface enable
Function
The vlan-mapping modulo command enables VLAN-to-instance mapping assignment based
on a default algorithm.
By default, all VLANs are mapped to CIST, namely, spanning tree instance 0.
Format
vlan-mapping modulo modulo
Parameters
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP divides a switching network into multiple regions, each of which has multiple
spanning trees that are independent of each other. Each spanning tree is called an MSTI and
each region is called an MST region.
Two switching devices belong to the same MST region only when they have the following
same configurations:
l MST region name
l Mappings between MSTIs and VLANs
l MST region revision level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
In the command, vlan-mapping modulo indicates that the formula (VLAN ID-1)%modulo+1 is used. In
the formula, (VLAN ID-1)%modulo means the remainder of (VLAN ID-1) divided by the value of
modulo. This formula is used to map a VLAN to the corresponding MSTI. The calculation result of the
formula is ID of the mapping MSTI. For example, if the modulus is 16, the switch maps VLAN 1 to
MSTI 1, VLAN 2 to MSTI 2 VLAN 16 to MSTI 16, VLAN 17 to MSTI 1, and so on.
Precautions
VBST does not support regions. Therefore, this command does not take effect when the
spanning tree protocol is VBST.
Example
# Map all VLANs to spanning tree instances modulo 16.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] vlan-mapping modulo 16
Related Topics
5.12.12 display stp region-configuration
Function
The block port command configures the mode in which an interface is blocked on the device
where the primary edge interface resides.
The undo block port command restores the default mode in which an interface is blocked on
the device where the primary edge interface resides.
By default, the system selects a blocked interface from the interfaces on both ends of the link
that is established last or the link that recovers from a fault last.
Format
block port { sysname sysname interface { interface-type interface-number | interface-
name } | hop hop-id | optimal | middle }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
sysname Specifies the name of the device where the The value is a string of
sysname interface to be blocked resides. 1 to 20 case-sensitive
characters without
spaces.When double
quotation marks are
used around the string,
spaces are allowed in
the string.
interface Specifies the interface to be blocked. interface- interface-name
{ interface- type indicates the type of the interface to be specifies the user-
type interface- blocked. defined interface name
number | in the format of
interface- After SEP is enabled, sysname sysname and interface type+interface
name } interface { interface-type interface-number | number. The value of
interface-name } specify the interface to be interface-name is a
blocked. Before configuring the mode in which an string of 1 to 63 case-
interface is blocked, run the display sep topology sensitive characters
verbose command to view detailed information without spaces.
about the topology of the current ring and obtain
information about all the interfaces in the
topology. Then, you can specify the device and
interface names.
hop hop-id Specifies the interface with the specified hop The value is an integer
count from the primary edge interface as the that ranges from 1 to
blocked interface. hop-id specifies the hop count. 128.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
SEP segment view
Default Level
2: Configuration level
Usage Guidelines
In a SEP segment, some interfaces are blocked to prevent loops. Any interface in a SEP
segment may be blocked if no interface is specified for blocking. A complete SEP segment
contains only one blocked interface.
You can specify the blocked interface according to network requirements or your reference.
The specified interface is not blocked immediately. Normally, the blocked interface is one of
the two interfaces that complete neighbor negotiations last. The specified interface preempts
to be the blocked interface only after the preemption mechanism takes effect.
The SEP segment must have been created before the block port command is used.
To make the block port command configuration take effect, complete the following tasks
before using the block port command.
l Run the sep segment command in the system view to create a SEP segment.
l Run the control-vlan (SEP segment view) command to configure the control VLAN of
the SEP segment.
l Run the sep segment (interface view) command to add the interface to the SEP segment
and configure the interface as the primary edge interface.
Example
# On the device where the primary edge interface is located, specify the device and interface
names to block the specified interface.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] block port sysname HUAWEI interface gigabitethernet 0/0/1
# On the device where the primary edge interface is located, specify the interface with the
specified hop count from the primary edge interface as the interface to be blocked.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] block port hop 3
# On the device where the primary edge interface is located, specify the interface with the
highest priority as the interface to be blocked.
<HUAWEI> system-view
[HUAWEI] sep segment 1
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
# On the device where the primary edge interface is located, specify the interface in the
middle of the SEP segment as the interface to be blocked.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] block port middle
Related Topics
5.13.13 sep segment
5.13.14 sep segment (interface view)
5.13.2 control-vlan (SEP segment view)
5.13.6 display sep interface
Format
control-vlan vlan-id
undo control-vlan
Parameters
Parameter Description Value
vlan-id Specifies the ID of the control VLAN in a The value is an integer that ranges
SEP segment. from 1 to 4094.
Views
SEP segment view
Default Level
2: Configuration level
Usage Guidelines
After a SEP segment is created, run the control-vlan command to create a control VLAN for
the SEP segment.
Compared with a data VLAN, a control VLAN forwards only SEP packets but not service
packets in a SEP segment, which improves SEP security.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Devices in the same SEP segment must be configured with the same control VLAN to fast
forward SEP packets. Different SEP segments can use the same control VLAN.
NOTE
In the absence of neighbors, devices that are not in a SEP segment cannot be added to the control VLAN
of the SEP segment. Otherwise, network loops occur.
The control VLAN must be not created, and is not used by RRPP, dynamic instances of
VBST, VLAN mapping, and VLAN stacking. In addition, no interface is added to the control
VLAN.
You must configure the control VLAN of a SEP segment before adding interfaces to the SEP
segment.
l If the SEP segment contains an interface, the control VLAN cannot be deleted. To delete
the configured control VLAN, run the undo sep segment command in the interface view
to remove the interface from the SEP segment, and then run the undo control-vlan
command.
l If the SEP segment contains no interface, you can configure the control VLAN multiple
times. Only the latest configuration takes effect.
l After the control VLAN is created, the configuration file automatically displays the
command for creating the VLAN.
Each SEP segment must have a control VLAN. After an interface is added to a SEP
segment that has a control VLAN, the interface is automatically added to the control
VLAN.
– If the interface type is trunk, in the configuration file, the port trunk allow-pass
vlan command is displayed in the view of the interface added to the SEP segment.
– If the interface type is hybrid, in the configuration file, the port hybrid tagged vlan
command is displayed in the view of the interface added to the SEP segment.
To check whether the control VLAN is created or view the control VLAN where SEP packets
are transmitted, run the display sep interface command and specify the verbose parameter.
Example
# Configure control VLAN 5 for SEP segment 1.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] control-vlan 5
Related Topics
5.13.13 sep segment
5.13.6 display sep interface
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
By default, a device in a SEP segment is disabled from processing SmartLink Flush packets.
Format
deal smart-link-flush
Parameters
None
Views
SEP segment view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a host is connected to a SEP network through a SmartLink group, the host sends
SmartLink Flush packets to the connected devices in the SEP segment, if the active/standby
switchover of member interfaces in the SmartLink group occurs. In this situation, the deal
smart-link-flush command must be used to enable the devices in the SEP segment to process
SmartLink Flush packets.
Prerequisites
Precautions
After the deal smart-link-flush command is used, the device that receives a SmartLink Flush
packet in the SEP segment floods the forwarding database (FDB) to notify the other devices
in the SEP segment of topology changes. The other devices then refresh their MAC address
entries to ensure reliable traffic transmission.
The deal smart-link-flush command must be run on the device that receives SmartLink
Flush packets and the interfaces on the device have been added to the SEP segment.
Example
# Enable a device in SEP segment 1 to process SmartLink Flush packets.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] deal smart-link-flush
Related Topics
5.13.13 sep segment
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
description text
undo description
Parameters
Parameter Description Value
text Specifies the description The value is a string of 1 to 255 case-sensitive
of an SEP segment characters.When double quotation marks are used
around the string, spaces are allowed in the string.
Views
SEP segment view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a device running SEP, you can run the description command to configure the description
of the SEP segment, such as the SEP segment ID. Configuring the description of an SEP
segment facilitates the maintenance of the SEP segment.
Precautions
After being configured in the SEP-Segment view, the description command takes effect only
on the local device.
Example
# Configure the description It's segment 10 for SEP segment 10.
<HUAWEI> system-view
[HUAWEI] sep segment 10
[HUAWEI-sep-segment10] description It's segment 10
Related Topics
5.13.13 sep segment
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The display sep error packet command displays the statistics about error packets received by
SEP and the contents of recently received packets.
Format
display sep error packet
Parameters
None.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a device on a Layer 2 network runs SEP is attacked by SEP error packets, the display sep
error packet command can be used to view recently received MSTP error packets.
Example
Display the statistics about error packets received by SEP and the contents of recently
received packets.
<HUAWEI> display sep error packet
4 error-packets have been recieved and the last
01 80 c2 00 00 02 00 e0 fc 8e 0b 34 88 09 01 01
01 14 80 00 00 e0 fc 8e 0b 34 01 21 80 00 09 06
47 00 00 00 02 14 00 00 00 00 00 00 00 00 00 00
00 00 00 00 c7 00 00 00 03 10 ff ff 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
Related Topics
5.13.11 reset sep error packet statistics
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display sep interface [ interface-type interface-number | segment segment-id ] [ verbose ]
Parameters
Parameter Description Value
interface-type Displays SEP information on a specified -
interface-number interface. interface-type specifies the type of an
interface. interface-number specifies the number
of an interface.
segment segment-id Displays information about the interfaces in a The value is an
specified SEP segment. integer that ranges
from 1 to 1024.
verbose Displays detailed SEP information on a specified -
interface, including traffic statistics.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To monitor the status of an interface or locate an interface fault, use this command to collect
statistics and the status of the interface. Then you can locate the interface fault according to
the statistics.
When using the display sep interface command,
l If no parameter is specified, this command displays information about all the interfaces
in SEP segments.
l If only interface-type interface-number is specified, this command displays information
about a specified interface in SEP segments.
l If only segment segment-id is specified, this command displays information about all the
interfaces in a specified SEP segment.
l If only verbose is specified, this command displays detailed information about all the
interfaces in SEP segments.
l If interface-type interface-number and verbose are specified, this command displays
detailed information about a specified interface in SEP segments.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l If segment segment-id and verbose are specified, this command displays detailed
information about a specified interface in a specified SEP segment.
NOTE
Example
# Display information about all the interfaces in SEP segments.
<HUAWEI> display sep interface
SEP segment 1
----------------------------------------------------------------
Interface Port Role Neighbor Status Port Status
----------------------------------------------------------------
GE0/0/1 *secondary up forwarding
GE0/0/2 common up forwarding
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Preempt Delay Delay in preempting the blocked interface after the faulty link
Timer recovers, in seconds.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.13.13 sep segment
5.13.14 sep segment (interface view)
Function
The display sep segment command displays the configurations of SEP segments.
Format
display sep segment {segment-id | all }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After SEP is configured, you can run the display sep segment command to view the
configuration of a specified SEP segment or all SEP segments on the network.
Example
# Display the configuration of SEP segment 2.
<HUAWEI> display sep segment 2
-----------------------------------------------------------------
SEP Segment ID :2
SEP Control-vlan :3
Protected-instance :0 to 5 9 12 to 13 16 to 17 20 to 21
Preempt Delay Timer(s) :20/0 (Configured/Remaining)
Block Port Expected :Eth-Trunk2
Name of Port Member :Eth-Trunk3
TC-Notify Propagate to :segment 6
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The display sep topology command displays the topologies of SEP segments.
Format
display sep topology [ segment segment-id ] [ verbose ]
Parameters
Parameter Description Value
segment segment-id Displays the topology of a specified SEP The value is an integer that
segment. ranges from 1 to 1024.
verbose Displays detailed information about the -
topology of a SEP segment.
Views
All views
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
1: Monitoring level
Usage Guidelines
After SEP is configured, you can run the display sep topology command to view the
topologies of SEP segments, including device names, names of the interfaces added to SEP
segments, and roles of the interfaces in a SEP segment.
When running the display sep topology command:
l If no parameter is specified, this command displays brief information about the
topologies of all the SEP segments on the device.
l If only segment segment-id is specified, this command displays brief information about
the topology of a specified SEP segment.
l If only verbose is specified, this command displays detailed information about the
topologies of all SEP segments on the device.
l If segment segment-id and verbose are specified, this command displays detailed
information about the topology of a specified SEP segment on the device.
NOTE
Example
# Display the topologies of all SEP segments on the device.
<HUAWEI> display sep topology
SEP segment 1
SEP detects a segment failure that may be caused by an incomplete topology
------------------------------------------------------------------------
System Name Port Name Port Role Port Status Hop
------------------------------------------------------------------------
LSW1 GE0/0/1 *secondary forwarding 1
LSW1 GE0/0/2 common forwarding 2
LSW3 GE0/0/1 common forwarding 3
LSW3 GE0/0/2 common forwarding 4
LSW2 GE0/0/1 common forwarding 5
LSW2 GE0/0/2 *secondary discarding 6
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.13.13 sep segment
5.13.14 sep segment (interface view)
Format
preempt { manual | delay seconds }
undo preempt delay
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
manual Indicates the manual preemption mode. -
delay Indicates the delayed preemption mode. -
seconds Specifies the preemption delay. The value is an integer
that ranges from 15 to
You can configure a preemption delay to prevent 600, in seconds.
network flapping. When link faults are rectified, the
specified interface waits until the delay timer expires,
and then preempts to be the blocked interface.
Views
SEP segment view
Default Level
2: Configuration level
Usage Guidelines
In a SEP segment, some ports are blocked to prevent loops.
When a link in the SEP segment fails, the blocked interface in Up state changes to the
Forwarding state after receiving a fault notification packet. If the preemption mode is not
configured, when all link faults are rectified or the last two interfaces enabled with SEP
complete neighbor negotiations, interfaces send blocking status packets to each other. The
interface with the highest priority is then blocked, and the other interfaces enter the
Forwarding state.
NOTE
The blocked interface is determined by the administrative priority and user-defined priority of each
interface. The priority value of an interface contains 16 bits. The higher 8 bits are defined by the system,
and the lower 8 bits are set by the user. The value of the lower 8 bits ranges from 1 to 128, and the
default value is 64. The interface with the highest priority is blocked.
If the preemption mode is configured on the device where the primary edge interface is
located, the specified interface transitions to the Blocking state and sends blocking status
packets to other ports.
l Delayed preemption
After all interface faults are rectified, the faulty interface does not send any fault
notification packet. If the primary edge interface does not receive any fault notification
packet within 3 seconds, it starts the delay timer. When the delay timer expires, the
devices in the SEP segment initiate blocked interface preemption.
NOTE
You must set the preemption delay when delayed preemption is used because there is no default
delay time.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
After delay preemption is configured, you can run the undo preempt delay command in
the SEP segment view to delete the configuration of delay preemption.
l Manual preemption
In this mode, if the link status databases of the primary and secondary edge interfaces are
complete, the primary edge interface sends preemption packets to block the specified
interface. Then the specified interface sends blocking status packets to request the
original blocked interface to transition to the Forwarding state.
NOTE
l Manual preemption is a one-off operation and will not take effect again after the preemption is
complete on the SEP segment. To change the blocked interface, run the preempt command
and specify the delay parameter to configure delayed preemption.
l Manual preemption causes a short link disconnection in the SEP segment.
Blocked interface preemption is triggered when the following conditions are met:
l The primary edge interface in the SEP segment is selected.
To configure interface roles, run the sep segment segment-id [ edge [ no-neighbour ]
{ primary | secondary } ] command in the interface view.
l The method of selecting the interface to block is configured on the device where the
primary edge interface is located.
To configure the method of selecting the interface to block, run the block port
{ sysname sysname interface interface-type interface-number | hop hop-id | optimal |
middle } command in the SEP segment view.
l The topology of the SEP segment must be complete.
Example
# Configure manual preemption on the device where the primary edge port is located.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] preempt manual
# Configure delayed preemption on the device where the primary edge port is located.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] preempt delay 100
Related Topics
5.13.13 sep segment
5.13.14 sep segment (interface view)
5.13.1 block port
5.13.6 display sep interface
5.13.10 protected-instance
Function
The protected-instance command configures protected instances in a SEP segment.
The undo protected-instance command deletes the protected instances in a SEP segment.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
protected-instance { all | { instance-id1 [ to instance-id2 ] } &<1-10> }
Parameters
Views
SEP segment view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In common SEP networking, a physical ring can be configured with only one SEP segment in
which only one interface can be blocked. If an interface in a complete SEP segment is
blocked, all service data is transmitted only along the path where the primary edge interface is
located. The path where the secondary edge interface is located remains idle, wasting
bandwidth.
SEP multi-instance is used to improve bandwidth efficiency, allowing each physical interface
on a ring network to be added to two SEP segments. A physical ring can be configured with
two logical rings, allowing packets carrying different VLAN IDs to pass through. Load
balancing is then implemented between the two logical rings. This implementation requires
logical rings to be configured with different protected instances and mappings between
protected instances and VLANs to be configured. The protected-instance command can be
used to configure protected instances for a SEP segment.
Prerequisites
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The protected instance IDs configured for SEP segments do not overlap. If different SEP
segments have duplicate protected instance IDs, replan protected instance IDs.
Follow-up Procedure
Complete the following tasks to configure mappings between protected instances and
VLANs:
1. Run the stp region-configuration command to enter the MST region view.
2. Run the instance instance-id vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> command to
configure mappings between protected instances and VLANs.
The value of instance-id specified in this command must be the same as the value of
instance-id specified in the protected-instance command.
3. Run the active region-configuration command to activate the configured mappings
between protected instances and VLANs.
Precautions
If you run the protected-instance command multiple times in the same SEP segment,
multiple instances are configured.
After the protected-instance command is run to configure different protected instances for
SEP segments and mappings between protected instances and VLANs are set, topology
changes affect only corresponding VLANs. This ensures reliable data transmission.
Before adding an interface to a SEP segment, ensure that the SEP segment has been
configured with protected instances; otherwise, the interface cannot be added to the SEP
segment.
Example
# Configure protected instances for SEP segment 1.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] protected-instance all
Related Topics
5.13.13 sep segment
Function
The reset sep error packet statistics command clears the statistics of error sep packets.
Format
reset sep error packet statistics
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
3: Management level
Usage Guidelines
Applicable Scenario
You can use the reset sep error packet statistics command to clear the history statistics when
you need to observe the statistics of error sep packets in a period from the current time.
Precautions
The reset sep error packet statistics command clears the statistics about error sep packets
are cleared and cannot be restored. Therefore, confirm the action before you use the
command.
Example
# Clear the statistics about error sep packets.
<HUAWEI> reset sep error packet statistics
Format
reset sep interface interface-type interface-number statistics
Parameters
Parameter Description Value
interface interface- Clears SEP packet statistics on a specified interface in a SEP -
type interface- segment. interface-type specifies the type of the interface in a
number SEP segment. interface-number specifies the number of the
interface in a SEP segment.
Views
All views
Default Level
3: Management level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Before collecting SEP packet statistics on an interface within a certain period, clear existing
traffic statistics on this interface. In such a situation, you can run the reset sep interface
statistics command.
NOTE
l Before the reset sep interface statistics command is run, the SEP segment must be created and the
interface must be added to the SEP segment.
l After the reset sep interface statistics command is run, SEP packet statistics on the specified
interface in the SEP segment are cleared and cannot be restored. Confirm your action before you use
this command.
Example
# Clear SEP packet statistics on GE 0/0/1 in the SEP segment.
<HUAWEI> reset sep interface gigabitethernet 0/0/1 statistics
Related Topics
5.13.13 sep segment
5.13.14 sep segment (interface view)
5.13.6 display sep interface
5.13.8 display sep topology
Function
The sep segment command creates a SEP segment and displays the SEP segment view. If the
specified SEP segment has been created, you can directly enter the SEP segment view.
The undo sep segment command deletes the existing SEP segment.
Format
sep segment segment-id
Parameters
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
On a Layer 2 switching network, packets will be transmitted infinitely once a loop occurs,
causing a broadcast storm. The broadcast storm occupies all the bandwidth on the network,
causing network congestion or even breakdown of the entire network. To prevent loops on a
Layer 2 switching network, Huawei develops the Smart Ethernet Protection (SEP) protocol.
SEP is a ring network protocol specially used for the Ethernet link layer. It blocks redundant
links to prevent loops. It can run on a network together with STP, RSTP, MSTP, and RRPP
and supports display of the network topology. When the devices of other vendors are used on
the network, SEP can also prevent loops, but does not need to be configured on these devices.
A SEP segment consists of interconnected Layer 2 switching devices configured with the
same SEP segment ID and control VLAN ID. A SEP segment is the basic unit for SEP.
NOTE
A maximum of two interfaces on a Layer 2 switching device can be added to the same SEP segment.
Before enabling SEP, run the sep segment command to create a SEP segment. Then run the
control-vlan (SEP segment view) command in the SEP segment view to configure a control
VLAN.
A SEP segment can be deleted only when it does not contain any interface. If the SEP
segment contains interfaces, run the undo sep segment segment-id command in the
corresponding interface views to delete the interfaces from the SEP segment one by one.
Example
# Create SEP segment 1.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1]
Related Topics
5.13.2 control-vlan (SEP segment view)
5.13.14 sep segment (interface view)
5.13.8 display sep topology
Function
The sep segment command adds an Ethernet interface to a specified SEP segment and
configures the role of the Ethernet interface.
The undo sep segment command removes an Ethernet interface from a specified SEP
segment and deletes the interface role configuration.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
By default, an Ethernet interface is not added to a specified SEP segment and is not
configured with a role.
Format
sep segment segment-id [ edge [ no-neighbor ] { primary | secondary } ]
undo sep segment segment-id
Parameters
Parameter Description Value
segment segment- Specifies the ID of the SEP segment to which an The value is an
id Ethernet interface is added. integer that ranges
from 1 to 1024.
edge Specifies the Ethernet interface added to the SEP -
segment as an edge interface.
no-neighbor Specifies the Ethernet interface as a no-neighbor -
edge interface.
primary Specifies the Ethernet interface as a primary edge -
interface.
secondary Specifies the Ethernet interface as a secondary -
edge interface.
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
A Layer 2 interface can forward SEP packets only after being added to a SEP segment. Each
Layer 2 switching device in a SEP segment is a node. Each node can have at most two Layer
2 interfaces added to the same SEP segment.
When using the sep segment command:
l If no parameter is specified, this command adds an Ethernet interface to a specified SEP
segment and configures the interface as a common interface.
In a SEP segment, all interfaces except edge interfaces and blocked interfaces are
common interfaces.
A common interface monitors the status of the directly-connected SEP link. When the
link status changes, the interface sends a topology change notification message to notify
its neighbors. Then the topology change notification message is flooded on the link until
it finally reaches the primary edge interface. The primary edge interface determines how
to process the link change.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l If edge and primary are specified, this command adds an Ethernet interface to the
specified SEP segment and configures the interface as the primary edge interface.
A SEP segment has only one primary edge interface, which is determined by the
configuration and primary edge interface election. The primary edge interface initiates
blocked interface preemption, terminates packets, and sends topology change
notification messages to other networks.
l If edge and secondary are specified, this command adds an Ethernet interface to the
specified SEP segment and configures the interface as the secondary edge interface.
A SEP segment has only one secondary edge interface, which is determined by the
configuration and secondary edge interface election. The secondary edge interface
terminates packets and sends topology change notification messages to other networks.
l If edge, no-neighbor, and primary are specified, this command adds an Ethernet
interface to the specified SEP segment and configures the interface as the no-neighbor
primary edge interface.
An interface at the edge of a SEP segment is a no-neighbor edge interface. There are two
types of no-neighbor edge interface: no-neighbor primary edge interface and no-neighbor
secondary edge interface. You can configure the role of a no-neighbor edge interface. A
no-neighbor edge interface terminates packets and sends topology change notification
messages to other networks. It is commonly used to interconnect Huawei devices and
non-Huawei devices or interconnect Huawei devices and devices that do not support
SEP.
l If edge, no-neighbor, and secondary are specified, this command adds an Ethernet
interface to the specified SEP segment and configures the interface as the no-neighbor
secondary edge interface.
NOTE
To view the role of an interface added to a SEP segment, run the display sep topology or
display sep interface command.
Example
# Add GE 0/0/1 to SEP segment 1 and configure the interface as the no-neighbor secondary
edge interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] sep segment 1 edge no-neighbor secondary
Related Topics
5.13.13 sep segment
5.13.2 control-vlan (SEP segment view)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The sep segment priority command configures the priority of an Ethernet interface in a
specified SEP segment.
The undo sep segment priority command restores the default priority of an Ethernet
interface in a specified SEP segment.
Format
sep segment segment-id priority priority
Parameters
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view,
40GE interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
In a SEP segment, some interfaces are blocked to prevent loops. Any interface in a SEP
segment may be blocked if no interface is specified for blocking. A complete SEP segment
contains only one blocked interface.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If you run the block port optimal command to select the blocked interface according to the
port priority, the interface priority set using the sep segment priority command determines
whether the interface will be blocked when an interface fault is rectified.
The blocked interface is determined by the administrative priority and user-defined priority of
each interface. The priority value of an interface contains 16 bits. The higher 8 bits are
defined by the system, and the lower 8 bits are set by the user. A higher interface priority
indicates a higher probability that the interface is blocked.
SEP compares interface priorities as follows:
1. Compares configured interface priority values. A larger value indicates a higher priority.
2. Compares bridge MAC addresses of interfaces with same priority values. A smaller
bridge MAC address indicates a higher priority.
3. Compares interface numbers of interfaces with identical bridge MAC addresses. A
smaller interface number indicates a higher priority.
Before using the sep segment priority command, ensure that the interface is added to the
specified SEP segment using the sep segment (interface view) command.
Example
# Set the priority of GE 0/0/1 added to SEP segment 1 to 10.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] sep segment 1
[HUAWEI-GigabitEthernet0/0/1] sep segment 1 priority 10
Related Topics
5.13.14 sep segment (interface view)
5.13.8 display sep topology
5.13.6 display sep interface
5.13.16 tc-notify
Function
The tc-notify command configures a SEP segment to report topology changes to other SEP
segments or networks running other ring network protocols.
The undo tc-notify command disables a SEP segment from reporting topology changes to
other SEP segments or networks running other ring network protocols.
By default, a SEP segment does not send topology change notifications.
Format
tc-notify { segment { segment-id1 [ to segment-id2 ] } &<1-10> | stp | rrpp | smart-link
send-packet vlan vlan-id | vpls }
undo tc-notify { segment { segment-id1 [ to segment-id2 ] } &<1-10> | stp | rrpp | smart-
link send-packet vlan | vpls }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Parameters
Parameter Description Value
segment-id1 [ to Specifies the SEP segments to which topology changes The value is
segment-id2 ] of the local SEP segment need to be reported. an integer that
ranges from 1
Topology changes of the local SEP segment are reported to 1024.
to other SEP segments, but not the local SEP segment.
The keyword to connecting two instance IDs, indicating
an ID range from instance-id1 to instance-id2. The value
of instance-id2 must be greater than the value of
instance-id1.
Views
SEP segment view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If topology changes in a SEP segment are not reported to the upper-layer Layer 2 network in
time, devices on the upper-layer network retain the original MAC address entries, causing
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
traffic interruption. To ensure uninterrupted traffic transmission, run the tc-notify command
to configure the local SEP segment to report topology changes to other SEP segments or
networks running other ring network protocols.
Prerequisites
The sep segment command has been used to create SEP segments.
Precautions
When the topology of a SEP segment changes, the SEP segment sends topology change
notification messages to other SEP segments or networks running other ring network
protocols. If the specified segment or network does not exist, the tc-notify command
configuration does not take effect.
After receiving topology change notification messages from a SEP segment, devices on the
upper layer network send Flush FDB packets on the network. Then, all the devices on the
upper-layer network delete the original MAC addresses and learn new MAC addresses to
ensure normal traffic transmission.
The tc-notify command is used on the device connecting a lower-layer network and an upper-
layer network.
Example
# Configure SEP segment 1 to report topology changes to SEP segments 10 to 20.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] tc-notify segment 10 to 20
Related Topics
5.13.8 display sep topology
5.13.6 display sep interface
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The tc-protection interval command sets the interval for suppressing topology change (TC)
notification packets.
The undo tc-protection interval command restores the default interval for suppressing TC
notification packets.
Format
tc-protection interval interval-value
Parameters
Parameter Description Value
interval-value Specifies the interval for suppressing TC The value is an integer that
notification packets. ranges from 1 to 10, in
seconds.
A longer interval ensures stable SEP
operating but deteriorates convergence
performance.
Views
SEP segment view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Assume that a host is connected to an upstream network through three or more SEP networks.
If the topology of the SEP network nearest to the host changes, doubled TC notification
packets are flooded on the upper-layer SEP network. Each time TC notification packets pass
through a SEP segment, TC notification packets will be doubled. The upstream network will
receive multiple duplicate TC notification packets.
Frequent topology change notifications reduce the CPU packet processing capability, and
cause devices in the SEP segments to frequently refresh MAC address entries, which
consumes bandwidth resources. To address the problem, run the tc-protection interval
command to suppress TC notification packets.
Prerequisites
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The sep segment command has been used to create SEP segments.
Precautions
After this command is used, the upstream network only needs to process one TC notification
packet but not multiple duplicate TC notification packets. In addition, this function protects
devices on the SEP segment against TC attacks.
Example
# Set the interval for suppressing TC notification packets to 3s in SEP segment 1.
<HUAWEI> system-view
[HUAWEI] sep segment 1
[HUAWEI-sep-segment1] tc-protection interval 3
Related Topics
5.13.13 sep segment
5.14.1 control-vlan
Function
The control-vlan command configures the control VLAN in an RRPP domain.
Format
control-vlan vlan-id
undo control-vlan
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
RRPP domain view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A VLAN that transmits RRPP packets in an RRPP domain is called a control VLAN.
An RRPP domain is configured with two control VLANs, that is, the major control VLAN
and sub-control VLAN. You need to specify only the major control VLAN. The VLAN whose
ID is one greater than the ID of the major control VLAN becomes the sub-control VLAN.
Precautions
The control VLAN must be included in the protected VLANs; otherwise, the RRPP ring
cannot be configured.
The control VLAN specified by vlan-id must be a VLAN that has not been created. The sub-
control VLAN specified by vlan-id plus one must be a VLAN that has not been created.
The control VLAN is deleted when the RRPP domain is deleted using the undo rrpp domain
command.
Example
# Set the control VLAN ID in RRPP Domain 1 to 100.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1] control-vlan 100
Related Topics
5.14.17 rrpp domain
Function
The description command configures the description of the RRPP domain.
Format
description text
undo description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
RRPP domain view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a device running RRPP, you can run the description command to configure the
description of the RRPP domain, such as the RRPP domain ID. Configuring the description of
an RRPP domain facilitates the maintenance of the RRPP domain.
Precautions
After being configured in the RRPP domain view, the description command takes effect only
on the local device.
Example
# Configure the description It's RRPP Domain 10 for RRPP domain 10.
<HUAWEI> system-view
[HUAWEI] rrpp domain 10
[HUAWEI-rrpp-domain-region10] description It's RRPP Domain 10
Related Topics
5.14.17 rrpp domain
Function
The display rrpp brief command displays summary information about all RRPP domains
configured on the device.
Format
display rrpp brief [ domain domain-id ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display rrpp brief command on the RRPP-enabled device to view summary
information about RRPP domains configured on the device. The command output shows
whether RRPP is enabled, the configuration of RRPP domains, and information about the
configured rings in the RRPP domains.
Example
# Display summary information about RRPP.
<HUAWEI> display rrpp brief
Abbreviations for Switch Node Mode :
M - Master , T - Transit , E - Edge , A - Assistant-Edge
Domain Index : 1
Control VLAN : major 30 sub 31
Protected VLAN : Reference Instance 10
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Domain Index : 1
Control VLAN : major 30 sub 31
Protected VLAN : Reference Instance 10
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
Abbreviations for Switch Abbreviations of node modes. The value can be:
Node Mode l M-Master: indicates the master node.
l T-Transit: indicates the transit node.
l E-Edge: indicates the edge node.
l A-Assistant-Edge: indicates the assistant edge node.
RRPP Linkup Delay Delay time before the master node becomes Complete.
Timer To set the delay time before the master node becomes
Complete, run the rrpp linkup-delay-timer command.
Control VLAN : major 30 Control VLAN IDs of the RRPP domain. major indicates the
sub 31 master control VLAN and sub indicates the sub-control
VLAN.
Protected VLAN ID of the instance bound to the protected VLAN in the RRPP
domain.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Node Mode Mode of a node. For modes of a node, see the preceding item
Abbreviations for Switch Node Mode.
Related Topics
5.14.9 display rrpp verbose
5.14.8 display rrpp statistics
Format
display rrpp error packet
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When a device recieves RRPP attack packets on a network, you can run the display rrpp
error packet command to collect statistics about recently-received RRPP error packets to
locate the problem.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display statistics about recently-received RRPP error packets.
<HUAWEI> display rrpp error packet
4 error-packets have been received and the last
00 0f e2 07 82 17 00 18 82 99 fc 22 81 00 e0 01
00 48 aa aa 03 00 e0 2b 00 bb 99 0b 00 40 01 05
00 01 00 01 00 00 00 18 82 99 fc 22 00 01 00 03
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00.
Related Topics
5.14.8 display rrpp statistics
Format
display rrpp ring-group [ ring-group-id ]
Parameters
Parameter Description Value
ring-group ring- Specifies the ID of an RRPP ring group. If The value is an integer
group-id this parameter is not specified, that ranges from 1 to
configurations about all the RRPP ring 16.
groups are displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display rrpp ring-group command on an RRPP-enabled device to view
configurations about RRPP ring groups and learn their running status.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
If the RRPP-enabled device is an edge node, the ring that sends Edge-Hello packets is
displayed.
If the RRPP-enabled device is an assistant edge node, the ring that receives Edge-Hello
packets is displayed.
Example
# Display configurations about all ring groups.
<HUAWEI> display rrpp ring-group
Ring Group 1:
domain 1 ring 1 to 3, 5
domain 2 ring 1 to 3, 5
domain 1 ring 1 send Edge-Hello packet
Ring Group 2:
domain 1 ring 4, 6 to 7
domain 2 ring 4, 6 to 7
domain xx ring xx Sub-ring that sends Edge Hello packets in the RRPP ring group.
send Edge-Hello
packet
Related Topics
5.14.20 rrpp ring-group
Function
The display rrpp snooping enable command displays information about an interface where
RRPP snooping is enabled.
NOTE
Only the S5720HI, S5720EI, S6720S-EI, and S6720EI support this command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display rrpp snooping enable { all | interface vlanif interface-number }
display rrpp snooping enable { all | interface interface-type interface-number
[.subinterface-number ] }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can use the display rrpp snooping enable command to view information about
interfaces where RRPP snooping is enabled.
Example
# Display information about all interfaces where RRPP snooping is enabled.
<HUAWEI> display rrpp snooping enable all
Port VsiName Vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
--------------------------------------------------------
Vlanif100 name1 100
Vlanif200 name2 200
Table 5-97 Description of the display rrpp snooping enable command output
Item Description
Vlan VLAN that is associated with the interface. It refers to the control
VLAN of the RRPP ring.
Related Topics
5.14.7 display rrpp snooping vsi
Function
The display rrpp snooping vsi command displays the VSI that is associated with RRPP
snooping.
NOTE
Only the S5720HI, S5720EI, S6720S-EI, and S6720EI support this command.
Format
display rrpp snooping vsi { all | interface vlanif interface-number }
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command on an RRPP snooping-enabled device to view VSIs that are
associated with RRPP snooping.
Example
# Display VSIs associated with RRPP snooping on all interfaces.
<HUAWEI> display rrpp snooping vsi all
Port VsiName
-----------------------------------------------
Vlanif100 name1
Vlanif100 name2
Vlanif200 name1
Vlanif200 name2
# Display the VSI associated with RRPP snooping on the specified interface.
<HUAWEI> display rrpp snooping vsi interface vlanif 100
Port VsiName
-----------------------------------------------
Vlanif100 name1
Vlanif100 name2
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Table 5-98 Description of the display rrpp snooping vsi command output
Item Description
Related Topics
5.14.6 display rrpp snooping enable
Format
display rrpp statistics domain domain-id [ ring ring-id ]
Parameters
Parameter Description Value
domain domain-id The value is an integer
Specifies the ID of an RRPP domain.
that ranges from 1 to 64.
ring ring-id Specifies the ID of an RRPP ring. If ring-id The value is an integer
is not specified, statistics on packets of all that ranges from 1 to 64.
the rings in a specified RRPP domain are
displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to view statistics on RRPP packets on each interface to locate
network faults.
Example
# Display the statistics on packets on RRPP Ring 1 in Domain 1.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Is Active Whether the RRPP ring is activated. The RRPP ring can be
activated only when RRPP and the RRPP ring are enabled.
To activate an RRPP ring, run the rrpp enable and ring enable
commands.
Common port Common interface on the edge node or assistant edge node of the
RRPP sub-ring.
Edge port Edge interface on the edge node or assistant edge node of the
RRPP sub-ring.
HEALTH Number of Hello packets sent by the master node to check the
loop integrity.
LINK DOWN Number of LinkDown packets. LinkDown packets are sent by the
transit node, edge node, or assistant edge node to notify the master
node that the status of the link on the ring becomes Down and the
physical ring does not exist. Only statistics on received packets are
collected on the master node and statistics on sent packets are
collected on other nodes.
COMMON FDB Number of common FDB packets used to refresh the FDB.
Common FDB packets are sent from the master node to request
the transit node, edge node, and assistant edge node to update their
MAC address forwarding entries and ARP entries. Only statistics
on sent packets are collected on the master node and statistics on
received packets are collected on other nodes.
COMPLETE FDB Number of Complete FDB packets used to update the FDB after
the ring network recovers. Complete FDB packets are sent from
the master node to request the transit node, edge node, and
assistant edge node to update their MAC address forwarding
entries and ARP entries. These packets are also used to request the
transit node to unblock the temporarily blocked interfaces. Only
statistics on sent packets are collected on the master node and
statistics on received packets are collected on other nodes.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
EDGE HELLO Number of Edge-Hello packets used to check the integrity of the
major ring. Edge-Hello packets are sent from the edge node of the
sub-ring to the assistant edge node of the same sub-ring. The sub-
ring checks the integrity of the major ring in the same domain
through the Edge-Hello packets. Only statistics on sent packets are
collected on the edge node and statistics on received packets are
collected on the assistant edge node.
MAJOR FAULT Number of Major-Fault packets used to notify faults on the major
ring. Major-Fault packets are sent by the assistant edge interface
on a sub-ring. If the assistant edge node does not receive the Edge-
Hello packet from the edge interface within a specified period, the
assistant edge node sends the Major-Fault packet to the edge
interface to notify that the packets cannot be transparently
transmitted on the major ring. Only statistics on received packets
are collected on the edge node and statistics on sent packets are
collected on the assistant edge node.
Related Topics
5.14.14 reset rrpp statistics
Format
display rrpp verbose [ domain domain-id [ ring ring-id ] ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to check detailed configuration about RRPP. The command output
helps you analyze the link status of the network and locate network faults.
Example
# Display detailed configuration about the master node on Ring 1 in RRPP Domain 1.
<HUAWEI> display rrpp verbose domain 1 ring 1
Domain Index : 1
Control VLAN : major 400 sub 401
Protected VLAN : Reference Instance 30
Hello Timer : 1 sec(default is 1 sec) Fail Timer : 6 sec(default is 6 sec)
RRPP Ring : 1
Ring Level : 0
Node Mode : Master
Ring State : Complete
Is Enabled : Enable Is Active : Yes
Primary port : GigabitEthernet0/0/1 Port status: UP
Secondary port : GigabitEthernet0/0/2 Port status: BLOCKED
Item Description
Control Control VLAN IDs of the RRPP domain. major indicates the master
VLAN : major control VLAN and sub indicates the sub-control VLAN.
400 sub 401
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Node Mode Role of a node on the RRPP ring. The value can be:
l Master: indicates the master node.
l Transit: indicates the transit node.
l Edge: indicates the edge node.
l Assistant Edge: indicates the assistant edge node.
Ring State Status of the RRPP ring. The value can be:
l Complete: indicates that the ring is complete. Only the master node
can be in Complete state.
l Failed: indicates that the ring fails. Only the master node can be in
Failed state.
l Unknown: indicates that the status of the ring is unknown. The
Unknown state occurs when RRPP or the RRPP ring is enabled.
l LinkUp: indicates that the link is Up. Only transit nodes can be in
LinkUp state.
l LinkDown: indicates that the link is Down. Only transit nodes can be
in LinkDown state.
l Preforwarding: indicates that the link is in Preforwarding state. Only
transit nodes can be in Preforwarding state.
Is Active Whether the RRPP ring is activated. The RRPP ring can be activated
only when RRPP and the RRPP ring are enabled.
To activate an RRPP ring, run the rrpp enable and ring enable
commands.
Port status Status of an interface on the RRPP ring. The value can be:
l UNKNOWN: indicates that the LPU is not properly installed.
l UP: indicates that the interface is in Up state and can forward
packets.
l DOWN: indicates that the interface is not connected.
l BLOCKED: indicates that the interface is in Up state but cannot
forward packets.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.14.3 display rrpp brief
5.14.8 display rrpp statistics
Format
display snmp-agent trap feature-name rrpp all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The Simple Network Management Protocol (SNMP) is a network management standard
widely used on the TCP/IP network. It uses a central computer (a network management
station) that runs network management software to manage network elements (NEs). The
SNMP agent reports trap messages to the network management station so that the network
management station can obtain the network status in a timely manner, and the network
administrator can take measures accordingly.
The display snmp-agent trap feature-name rrpp all command displays the following
information:
l Trap names supported by the RRPP module. The trap names are the same as those
specified by the snmp-agent trap enable feature-name rrpp trap-name trap-name
command. Each trap name indicates a network element exception.
l Trap status of the RRPP module. You can check whether the trap is reported based on the
trap name.
Prerequisites
SNMP has been enabled using the snmp-agent command.
Example
# Display all trap messages on the RRPP module.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Table 5-101 Description of the display snmp-agent trap feature-name rrpp all command
output
Item Description
Feature name Name of the module that the trap messages belong to.
Trap name Names of the trap messages on the RRPP module. The value
can be:
l hwRrppRingRecover: indicates that the RRPP ring is
complete.
l hwRrppRingFail: indicates that the RRPP ring is
incomplete.
l hwRrppMultiMaster: indicates that the RRPP ring has
multiple master nodes.
Related Topics
5.14.24 snmp-agent trap enable feature-name rrpp
Format
domain domain-id ring { ring-id1 [ to ring-id2 ] } &<1-10>
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
domain-id Specifies the ID of an RRPP domain. The value is an
integer that ranges
from 1 to 64.
ring-id1 to ring- Specifies the ID of an RRPP sub-ring. The value is an
id2 l ring-id1 specifies the first sub-ring ID. integer that ranges
from 1 to 64.
l to ring-id2 specifies the last sub-ring ID. The
value of ring-id2 must be larger than the value of
ring-id1. ring-id1 and ring-id2 identify a range of
instances. If to ring-id2 is not specified, only
ring-id1 is specified.
Views
RRPP ring group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If multiple RRPP rings exist, you can add sub-rings to the ring group to reduce the number of
Edge-Hello packets, improving system performance.
Precautions
A maximum of 15 sub-rings can be added to a ring group.
If the domain command is run more than once, all configurations take effect.
l Only an edge node or an assistant edge node on a sub-ring can be added to a ring group.
The edge nodes on the sub-rings are configured on the same device. Similarly, the
assistant edge nodes are on the same device.
l A sub-ring can belong to only one ring group.
l All the sub-rings in a ring group must be on the same type of nodes, that is, edge nodes
or assistant edge nodes.
l To add an activated sub-ring to a ring group, add the sub-ring to the ring group on the
assistant edge node, and then perform the same operation on the edge node.
l To delete an activated sub-ring from a ring group, delete the sub-ring from the ring group
on the edge node, and then perform the same operation on the assistant edge node.
l All the sub-rings in a ring group must have the same primary ring link; otherwise, the
ring group cannot work properly.
l The configuration and activation status of a ring group must be the same on the edge
node and assistant edge node.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Add sub-rings to Ring Group 1.
<HUAWEI> system-view
[HUAWEI] rrpp ring-group 1
[HUAWEI-rrpp-ring-group1] domain 1 ring 1 to 3 5
5.14.12 protected-vlan
Function
The protected-vlan command configures a list of protected VLANs in an RRPP domain.
The undo protected-vlan command deletes the list of protected VLANs in an RRPP domain.
Format
protected-vlan reference-instance { all | { { instance-id1 [ to instance-id2 ] } &<1-10> } }
Parameters
Views
RRPP domain view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
The control VLAN transmits RRPP protocol packets and the data VLAN transmits data
packets. The control VLAN and data VLANs must be configured as the protected VLANs so
that RRPP takes effect for these VLAN packets. Otherwise, VLAN packets may cause
broadcast storms on the ring network. This will cause the network to be unavailable.
Precautions
When you configure the list of protected VLANs, note the following points:
If the protected-vlan command is run more than once, all configurations take effect.
Example
# Configure the VLANs mapping instances 0 as the protected VLANs in Domain 1.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1] control-vlan 100
[HUAWEI-rrpp-domain-region1] protected-vlan reference-instance 0
Related Topics
5.14.3 display rrpp brief
5.14.9 display rrpp verbose
5.12.12 display stp region-configuration
Function
The reset rrpp error packet statistics command clears statistics on RRPP error packets.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
reset rrpp error packet statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If you need to check statistics on RRPP error packets from the current time, you can run this
command to clear historical statistics on RRPP error packets.
Configuration Impact
The statistics on all the RRPP error packets are cleared and cannot be restored after you run
the command. Exercise caution when you run the command.
Example
# Clear statistics on all the RRPP error packets.
<HUAWEI> reset rrpp error packet statistics
Function
The reset rrpp statistics command clears statistics on all RRPP packets.
Format
reset rrpp statistics domain domain-id [ ring ring-id ]
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command clears statistics on all the RRPP packets so that you can collect new statistics
to analyze the network.
Precautions
The statistics on RRPP packets cannot be restored after you clear them. Exercise caution
before you run the command.
Example
# Clear the statistics on RRPP packets on Ring 1 in Domain 1.
<HUAWEI> reset rrpp statistics domain 1 ring 1
Related Topics
5.14.8 display rrpp statistics
Function
The ring enable command enables an RRPP ring.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
ring ring-id enable
undo ring ring-id enable
Parameters
Parameter Description Value
ring ring-id Specifies the ID of an RRPP ring. The value is an integer that ranges from 1
to 64.
Views
RRPP domain view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The RRPP ring cannot be activated using the ring enable command. You also need to run the
rrpp enable command to enable RRPP so that the RRPP ring can be activated.
Example
# Activate ring 1 in Domain 1.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1] control-vlan 100
[HUAWEI-rrpp-domain-region1] protected-vlan reference-instance 0
[HUAWEI-rrpp-domain-region1] ring 1 node-mode transit primary-port
gigabitethernet 0/0/5 secondary-port gigabitethernet 0/0/6 level 1
[HUAWEI-rrpp-domain-region1] ring 1 enable
Related Topics
5.14.18 rrpp enable
Function
The ring node-mode command configures the node mode and specifies the interfaces for
nodes.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Deleting the RRPP ring can delete the mode configured on the node and interfaces on the node.
Format
ring ring-id node-mode { master | transit } primary-port interface-type interface-number
secondary-port interface-type interface-number level level-value
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
RRPP domain view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
RRPP specifies devices and interfaces on the ring network as nodes and interfaces of different
roles on the RRPP ring to implement RRPP functions.
Prerequisites
An RRPP domain has been created using the rrpp domain command, and STP has been
enabled using the stp disable command on the interfaces that want to join the RRPP domain.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l The rings in the same RRPP domain must use different ring IDs.
l After the RRPP ring is enabled, to delete the RRPP ring using the undo ring ring-id
command, you must run the undo ring ring-id enable command to disable the RRPP
ring first.
l After the control-vlan command is used to configure the control VLAN in an RRPP
domain, the ID of the sub-control VLAN is the control VLAN ID plus one. If the
protected VLAN list specified by protected-vlan does not contain the control VLAN or
sub-control VLAN, the system displays an error message when you run the ring node-
mode command.
Example
# Configure the master node of Ring 10 in Domain 1, with GE0/0/5 as the primary interface
and GE0/0/6 as the secondary interface.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1] control-vlan 100
[HUAWEI-rrpp-domain-region1] protected-vlan reference-instance 0
[HUAWEI-rrpp-domain-region1] ring 10 node-mode master primary-port
gigabitethernet 0/0/5 secondary-port gigabitethernet 0/0/6 level 0
# Configure the transit node of Ring 10 in Domain 1, with GE0/0/5 as the primary interface
and GE0/0/6 as the secondary interface.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1] control-vlan 100
[HUAWEI-rrpp-domain-region1] protected-vlan reference-instance 0
[HUAWEI-rrpp-domain-region1] ring 10 node-mode transit primary-port
gigabitethernet 0/0/5 secondary-port gigabitethernet 0/0/6 level 0
# Configure the master node of Ring 20 in Domain 1, with GE0/0/5 as the primary interface
and GE0/0/6 as the secondary interface.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1] control-vlan 100
[HUAWEI-rrpp-domain-region1] protected-vlan reference-instance 0
[HUAWEI-rrpp-domain-region1] ring 20 node-mode master primary-port
gigabitethernet 0/0/5 secondary-port gigabitethernet 0/0/6 level 1
# Configure the transit node of Ring 20 in Domain 1, with GE0/0/5 as the primary interface
and GE0/0/6 as the secondary interface.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1] control-vlan 100
[HUAWEI-rrpp-domain-region1] protected-vlan reference-instance 0
[HUAWEI-rrpp-domain-region1] ring 20 node-mode transit primary-port
gigabitethernet 0/0/5 secondary-port gigabitethernet 0/0/6 level 1
Related Topics
5.14.15 ring enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The rrpp domain command creates an RRPP domain.
Format
rrpp domain domain-id
Parameters
Parameter Description Value
domain domain-id Specifies the ID of an RRPP The value is an integer that ranges
domain. from 1 to 64.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Other RRPP configurations can be performed only after an RRPP domain is created.
Precautions
Before you delete a domain, ensure that no RRPP ring is configured in the domain. If a ring
exists in the domain, the domain cannot be deleted.
Example
# Create RRPP Domain 1.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.14.16 ring node-mode
Format
rrpp enable
undo rrpp enable
rrpp disable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The RRPP ring cannot be activated using the rrpp enable command. You also need to run the
ring enable command to enable RRPP so that the RRPP ring can be activated.
NOTE
Running the undo rrpp enable or rrpp disable command may cause network loops. Therefore, exercise
caution when running these commands.
Example
# Enable RRPP.
<HUAWEI> system-view
[HUAWEI] rrpp enable
# Disable RRPP.
<HUAWEI> system-view
[HUAWEI] undo rrpp enable
# Disable RRPP.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] rrpp disable
Related Topics
5.14.15 ring enable
Function
The rrpp linkup-delay-timer command sets the value of a LinkUp timer.
The undo rrpp linkup-delay-timer command restores the default value of a LinkUp timer.
By default, the value of a LinkUp timer is 0.
Format
rrpp linkup-delay-timer linkup-delay-timer-value
undo rrpp linkup-delay-timer
Parameters
Parameter Description Value
linkup-delay-timer- Sets the value of the LinkUp The value is an integer that ranges
value timer. from 0 to 1000, in seconds.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the link recovers, transmission paths of the traffic are switched frequently if the link
status changes frequently on a ring. As a result, link flapping occurs and system performance
deteriorates. To address this problem, a LinkUp timer is used to set the period after which the
status of the master node changes to Complete.
Precautions
After a LinkUp timer is set, the status of the Blocked interface on the RRPP link is changed
only after the period set using the linkup-delay-timer-value command. This prevents link
flapping.
The value set by the linkup-delay-timer-value command must be no larger than the value of
the Fail timer minus twice the value of the Hello timer.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The rrpp linkup-delay-timer command is valid only for the master node.
Configure the LinkUp timer on the master node on the RRPP ring.
In scenarios where RRPP packets are transparently transmitted, running the rrpp linkup-
delay-timer command on the master node of the major ring is not recommended. If you do
so, temporary loops may occur due to RRPP packet interruption or loss.
Example
# Set the value of the LinkUp timer to 2 seconds.
<HUAWEI> system-view
[HUAWEI] rrpp linkup-delay-timer 2
Related Topics
5.14.3 display rrpp brief
Function
The rrpp ring-group command creates an RRPP ring group and enters the RRPP ring group
view.
Format
rrpp ring-group ring-group-id
Parameters
Parameter Description Value
ring-group ring-group-id Specifies the ID of an RRPP The value is an integer that
ring group. ranges from 1 to 16.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
You can create an RRPP ring group to reduce the number of Edge-Hello packets, improving
system performance.
Precautions
To delete a ring group, delete it on the edge node first, and then perform the same operation
on the assistant edge node.
Example
# Create Ring Group 1 and enter its view.
<HUAWEI> system-view
[HUAWEI] rrpp ring-group 1
[HUAWEI-rrpp-ring-group1]
Related Topics
5.14.11 domain (RRPP ring group view)
5.14.5 display rrpp ring-group
Function
The rrpp snooping enable command enables RRPP snooping on an interface.
The undo rrpp snooping enable command disables RRPP snooping on an interface.
NOTE
Only the S5720HI, S5720EI, S6720S-EI, and S6720EI support this command.
Format
rrpp snooping enable
Parameters
None
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view , Eth-Trunk sub-
interface view, VLANIF interface view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
When an RRPP ring accesses the virtual private LAN service (VPLS) network in which
devices are connected using PWs, the device cannot respond to RRPP protocol packets
directly. Therefore, the VPLS network cannot sense the status change of the RRPP ring. When
the RRPP ring topology changes, each node in the VPLS network forwards downstream data
according to the MAC address table generated before the RRPP ring topology changes. As a
result, the downstream traffic cannot be forwarded. When RRPP snooping is configured on
sub-interfaces or VLANIF interfaces, the VPLS network can transparently transmit RRPP
protocol packets, detect the changes on the RRPP rings, and upgrade the forwarding entries to
ensure that traffic is switched in time to a congestion-free path.
When an RRPP network and a VPLS network are connected to form a network, you can run
the rrpp snooping enable command to enable RRPP snooping on interfaces of the devices
deployed on the network.
Precautions
Before running the rrpp snooping enable command, ensure that the following configurations
are completed on the sub-interface or VLANIF interface:
l Binding the sub-interface or VLANIF interface to a VSI using the l2 binding vsi vsi-
name command in the interface view.
l Specifying that the sub-interface or VLANIF interface permits only the packets in the
control VLAN of the RRPP domain to pass through.
After you run the rrpp snooping enable command, RRPP snooping is automatically
associated with the VSI bound to this interface.
When RRPP snooping is enabled on the interface, the status of the RRPP ring can be detected
through RRPP control packets. When the RRPP ring status changes, the VSI can receive a
notification and update the MAC address table.
RRPP and RRPP snooping cannot be simultaneously configured on the same interface.
Example
# Enable RRPP snooping on an interface.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] rrpp snooping enable
Related Topics
5.14.22 rrpp snooping vsi
5.14.6 display rrpp snooping enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
By default, the RRPP snooping-enabled interface is not associated with other VSIs on the
device.
NOTE
Only the S5720HI, S5720EI, S6720S-EI, and S6720EI support this command.
Format
rrpp snooping vsi vsi-name
undo rrpp snooping vsi vsi-name
Parameters
Parameter Description Value
vsi-name Specifies the name of a The value is a string of 1 to 31 case-sensitive
VSI instance. characters, spaces not supported. When double
quotation marks are used around the string, spaces
are allowed in the string.
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view , Eth-Trunk sub-
interface view, VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In the scenario of RRPP and VPLS association, when the RRPP ring fails, the RRPP
snooping-enabled interface clears the forwarding entries on the associated VSI and the remote
VPLS device, and relearns the entries. In this way, downstream traffic can be forwarded
through a normal path.
Precautions
Before running the rrpp snooping vsi command, you must enable RRPP snooping using the
rrpp snooping enable command.
The VSI specified in the rrpp snooping vsi command is bound to other sub-interfaces or
VLANIF interfaces, instead of the interface where RRPP snooping is enabled.
After you run the rrpp snooping vsi command, the change of the RRPP ring status is
reported to the VSI that is bound to the interface so that the VSI can update its MAC address
table.
Example
# Associate RRPP snooping with VSI abc.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] rrpp snooping vsi abc
Related Topics
5.14.21 rrpp snooping enable
5.14.7 display rrpp snooping vsi
NOTE
Only the S5720HI, S5720EI, S6720S-EI, and S6720EI support this command.
Format
rrpp snooping all-vsi
undo rrpp snooping all-vsi
Parameters
None
Views
GE sub-interface view, XGE sub-interface view, 40GE sub-interface view , Eth-Trunk sub-
interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In the scenario of RRPP and VPLS association, when the RRPP ring fails, the RRPP
snooping-enabled sub-interface clears the forwarding entries on the associated VSI and the
remote VPLS device, and relearns the entries. In this way, downstream traffic can be
forwarded through a normal path.
You can run the rrpp snooping all-vsi command on the RRPP snooping-enabled sub-
interface to associate the sub-interface with the VSI that all the other sub-interfaces connected
to the same primary interface are bound to. The sub-interface clears all the forwarding entries
of associated VSIs when the preceding fault occurs.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Prerequisites
RRPP snooping has been enabled using the rrpp snooping enable command.
Precautions
l You must run the l2 binding vsi vsi-name command to bind other interfaces connected to
the same primary interface to the VSI before associating the VSI using the rrpp
snooping all-vsi command on the current sub-interface.
l You can run the undo rrpp snooping all-vsi command to cancel all the associations
between the current sub-interface and the VSIs bound to other interfaces connected to
the same primary interface.
l You do not need to enable RRPP snooping on other sub-interfaces connected to the same
primary interface.
Example
# Associate the sub-interface with VSIs that all the other sub-interfaces connected to the same
primary interface are bound to.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1.1
[HUAWEI-GigabitEthernet0/0/1.1] rrpp snooping enable
[HUAWEI-GigabitEthernet0/0/1.1] rrpp snooping all-vsi
Related Topics
5.14.21 rrpp snooping enable
5.14.7 display rrpp snooping vsi
Format
snmp-agent trap enable feature-name rrpp [ trap-name { hwrrppmultimaster |
hwrrppringfail | hwrrppringrecover } ]
undo snmp-agent trap enable feature-name rrpp [ trap-name { hwrrppmultimaster |
hwrrppringfail | hwrrppringrecover } ]
Parameters
Parameter Description Value
hwrrppmultimaster Enables the trap function when multiple master nodes exist -
on an RRPP ring.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can specify trap-name to enable the trap function for one or more events of the RRPP
module.
Example
# Enable the trap function when the RRPP ring is incomplete.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name rrpp trap-name hwrrppringfail
Related Topics
5.14.10 display snmp-agent trap feature-name rrpp all
Function
The timer command sets the values of the Hello timer and Fail timer.
The undo timer command restores the default values of the Hello timer and Fail timer.
By default, the value of the Hello timer is 1 second and that of the Fail timer is 6 seconds.
Format
timer hello-timer hello-value fail-timer fail-value
undo timer
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
RRPP domain view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can set the values of the Hello timer and Fail timer as required.
Precautions
You need to run the timer command only on the master node, edge node, and assistant edge
node.
The value of the Fail timer must be three times the value of the Hello timer or larger.
By default, the value of the Hello timer on an edge node is half of the value of the Hello timer
on the master node of the major ring.
The values of the Hello timer and Fail timer must be the same on the nodes in an RRPP
domain; otherwise, the edge interface on the edge node may be unstable.
You are advised to set the value of the Fail timer to 30 seconds, because the default value may
cause temporary loops. For example, when RRPP multi-instance is enabled, multiple RRPP
domains are configured on the same ring. If the value of the Fail timer is set to the default
value, loops may occur.
Example
# Set the Hello timer and Fail timer in RRPP Domain 1 to 2s and 7s respectively.
<HUAWEI> system-view
[HUAWEI] rrpp domain 1
[HUAWEI-rrpp-domain-region1] timer hello-timer 2 fail-timer 7
Related Topics
5.14.9 display rrpp verbose
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The S5700S-LI and S1720GFR series switches does not support ERPS.
Format
clear
Parameters
None
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To clear the FS or MS mode configured by the erps ring protect-switch command, run the
clear command. The clear command also provides the following functions:
l Triggers revertive switching before the WTR or WTB timer expires in the case of
revertive switching operations.
l Triggers revertive switching in the case of non-revertive operations.
Precautions
The clear command is supported in both ERPSv1 and ERPSv2.
Example
# Clear the port blocking mode of ERPS ring 5.
<HUAWEI> system-view
[HUAWEI] erps ring 5
[HUAWEI-erps-ring5] clear
Related Topics
5.15.24 version (ERPS ring view)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
control-vlan vlan-id
undo control-vlan
Parameters
Parameter Description Value
vlan-id Specifies the ID of a control VLAN for The value is an integer that ranges
an ERPS ring. from 1 to 4094.
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an ERPS ring is created, run the control-vlan command to create the control VLAN.
Unlike a data VLAN, a control VLAN is used only to forward ERPS protocol packets but not
forward service packets in an ERPS ring, which improves the security of the ERPS protocol.
Precautions
If you run the control-vlan command multiple times, only the latest configuration takes
effect.
After a control VLAN is created, the vlan batch { vlan-id1 [ to vlan-id2 ] } &<1-10>
command used to create common VLANs is displayed in the configuration file.
After a port is added to an ERPS ring configured with a control VLAN, the port is added to
the control VLAN.
l If the port is a trunk port, the port trunk allow-pass vlan vlan-id command is displayed
in the record of the port that has been added to the ERPS ring in the configuration file.
l If the port is a hybrid port, the port hybrid tagged vlan vlan-id command is displayed in
the record of the port that has been added to the ERPS ring in the configuration file.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
All the devices in an ERPS ring must use the same control VLAN in an ERPS ring, and
different ERPS rings must use different control VLANs.
The control VLAN must have not been created or used.
If ports have been added to an ERPS ring, the control VLAN cannot be modified. To delete
the configured control VLAN, run the undo erps ring command in the interface view or the
undo port command in the ERPS ring view to delete ports from the ERPS ring, and run the
undo control-vlan command to delete the control VLAN.
Run the display erps command to check whether the control VLAN is configured or which
VLAN is configured as the control VLAN.
Example
# Configure control VLAN 5 in ERPS ring 1.
<HUAWEI> system-view
[HUAWEI] erps ring 1
[HUAWEI-erps-ring1] control-vlan 5
Related Topics
5.15.8 erps ring
5.15.15 protected-instance (ERPS ring view)
5.15.4 display erps
5.15.6 display erps statistics
Format
description text
undo description
Parameters
Parameter Description Value
text Specifies the description of an The value is a string of 1 to 80 case-
ERPS ring. sensitive characters.
Views
ERPS ring view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the description command on the ERPS-enabled device to configure the
description of an ERPS ring. The description contains information such as the ID of the ERPS
ring, which facilitates maintenance.
Precautions
If you run the description command multiple times, only the latest configuration takes effect.
After the description is configured in the ERPS ring view, the description only takes effect on
the device.
Example
# Configure the description of the ERPS ring 10 as huawei Ring 1 on the device.
<HUAWEI> system-view
[HUAWEI] erps ring 10
[HUAWEI-erps-ring10] description huawei Ring 1
Related Topics
5.15.8 erps ring
5.15.4 display erps
Function
The display erps command displays ports that are added to an ERPS ring and information
about the ERPS ring.
Format
display erps [ ring ring-id ] [ verbose ]
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display erps command on the ERPS-enabled device to view ports added to
the ERPS ring and information about the ERPS ring. The command output facilitates ERPS
management and helps you learn the running status of ports.
Prerequisites
To view information about ports that have been added to a specified ERPS ring and the ERPS
ring, ensure that the ERPS ring has already been created.
Precautions
If ring ring-id is not specified, information about all the ERPS rings and ports added to the
ERPS rings is displayed.
Example
# Display information about all ERPS rings and ports that are added to the ERPS rings.
<HUAWEI> display erps
D : Discarding
F : Forwarding
R : RPL Owner
N : RPL Neighbour
FS : Forced Switch
MS : Manual Switch
Total number of rings configured = 4
Ring Control WTR Timer Guard Timer Port 1 Port 2
ID VLAN (min) (csec)
--------------------------------------------------------------------------------
1 100 1 50 (D)GE0/0/1
(F,R)GE0/0/2
2 200 2 50 (D)GE0/0/3 (F)GE0/0/4
3 300 3 50 (F)ETH-TRUNK3 (D)ETH-TRUNK4
4 400 5 50 (F,R)ETH-TRUNK1 (D)ETH-TRUNK2
--------------------------------------------------------------------------------
# Display information about ERPS ring 1 and ports that are added to ERPS ring 1.
<HUAWEI> display erps ring 1
D : Discarding
F : Forwarding
R : RPL Owner
N : RPL Neighbour
FS : Forced Switch
MS : Manual Switch
Ring Control WTR Timer Guard Timer Port 1 Port 2
ID VLAN (min) (csec)
--------------------------------------------------------------------------------
1 100 1 50 (D)GE0/0/1 (F,R)GE0/0/2
--------------------------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
# Display detailed information about all ERPS rings and ports that are added to the ERPS
rings.
<HUAWEI> display erps verbose
Ring ID : 101
Description : Ring 101
Control Vlan : 1001
Protected Instance : 4091
Service Vlan : 200 to 400
WTR Timer Setting (min) : 1 Running (s) : 0
Guard Timer Setting (csec) : 200 Running (csec) : 0
Holdoff Timer Setting (deciseconds) : 0 Running (deciseconds) : 0
WTB Timer Running (csec) : 0
Ring State : Idle
RAPS_MEL : 7
Revertive Mode : Revertive
R-APS Channel Mode : -
Version : 2
Sub-ring : No
Forced Switch Port : -
Manual Switch Port : -
TC-Notify : -
Time since last topology change : 0 days 0h:31m:49s
--------------------------------------------------------------------------------
Port Port Role Port Status Signal Status
--------------------------------------------------------------------------------
GE0/0/1 Common Discarding Non-failed
GE0/0/2 Common Forwarding Non-failed
Ring ID : 102
Description : Ring 102
Control Vlan : 1002
Protected Instance : 4092
Service Vlan : 500 to 600
WTR Timer Setting (min) : 1 Running (s) : 0
Guard Timer Setting (csec) : 200 Running (csec) : 0
Holdoff Timer Setting (deciseconds) : 0 Running (deciseconds) : 0
WTB Timer Running (csec) : 0
Ring State : Idle
RAPS_MEL : 7
Revertive Mode : Revertive
R-APS Channel Mode : -
Version : 2
Sub-ring : No
Forced Switch Port : -
Manual Switch Port : -
TC-Notify : -
Time since last topology change : 0 days 4h:12m:20s
--------------------------------------------------------------------------------
Port Port Role Port Status Signal Status
--------------------------------------------------------------------------------
GE0/0/1 Common Forwarding Non-failed
GE0/0/2 RPL Owner Discarding Non-failed
# Display detailed information about ERPS ring 1 and ports that are added to ERPS ring 1.
<HUAWEI> display erps ring 1 verbose
Ring ID : 1
Description : Ring 102
Control Vlan : 1002
Protected Instance : 4092
Service Vlan : 500 to 600
WTR Timer Setting (min) : 1 Running (s) : 0
Guard Timer Setting (csec) : 200 Running (csec) : 0
Holdoff Timer Setting (deciseconds) : 0 Running (deciseconds) : 0
WTB Timer Running (csec) : 0
Ring State : Idle
RAPS_MEL : 7
Revertive Mode : Revertive
R-APS Channel Mode : -
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Version : 2
Sub-ring : No
Forced Switch Port : -
Manual Switch Port : -
TC-Notify : -
Time since last topology change : 0 days 4h:13m:40s
--------------------------------------------------------------------------------
Port Port Role Port Status Signal Status
--------------------------------------------------------------------------------
GE0/0/1 Common Forwarding Non-failed
GE0/0/2 RPL Owner Discarding Non-failed
Item Description
Ring ID ID of the ERPS ring. To configure an ERPS ring, run the erps
ring command.
Control VLAN Control VLAN. To configure a control VLAN, run the control
vlan command.
WTR Timer (min) Value of the WTR timer. To set the value of the WTR timer, run
the wtr-timer command.
Guard Timer (csec) Value of the Guard timer. To set the value of the Guard timer, run
the guard-timer command.
WTR Timer Setting Value of the WTR timer. Setting indicates the configured value
(min) and Running indicates the actual value. To set the value of the
Running (s) WTR timer, run the wtr-timer command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Guard Timer Setting Value of the Guard timer. Setting indicates the configured value
(csec) and Running indicates the actual value. To set the value of the
Running (csec) Guard timer, run the guard-timer command.
Holdoff Timer Setting Value of the Holdoff timer. Setting indicates the configured value
(deciseconds) and Running indicates the actual value. To set the value of the
Running (deciseconds) Holdoff timer, run the holdoff-timer command.
RAPS_MEL MEL value. To set the MEL value, run the raps-mel command.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Sub-ring ERPS sub-ring ID. To configure an ERPS sub-ring ID, run the
sub-ring command.
Forced Switch Port Port that has been blocked by an FS operation. A hyphen (-)
indicates that no port has been blocked by an FS operation.
To configure an FS mode, run the erps ring protect-switch
command.
Manual Switch Port Port that has been blocked by an MS operation. A hyphen (-)
indicates that no port has been blocked by an MS operation.
To configure a port blocking mode for an ERPS port, run the
erps ring protect-switch command.
TC-Notify The ERPS ring is configured to notify other ERPS rings of its
topology change. A hyphen (-) indicates that the ERPS ring does
not notify other ERPS rings when its topology changes.
To configure an ERPS ring to notify other ERPS rings of its
topology change, run the tc-notify erps ring command.
Time since last Period since the last ERPS ring topology change.
topology change
Related Topics
5.15.8 erps ring
5.15.6 display erps statistics
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
display erps interface interface-type interface-number [ ring ring-id ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To check the running status of ports that have been added to an ERPS ring, run the display
erps interface command.
Example
# Display ERPS information about GigabitEthernet0/0/1.
<HUAWEI> display erps interface gigabitethernet 0/0/1
Interface State : Up
--------------------------------------------------------------------------------
Ring ID : 1
Flush Logic
Remote Node ID : 0000-0000-0000
Remote BPR : 0
Track Link Detect Protocol : 1AG
MD Name : 1
MA Name : 1
MEP ID : 2270
RMEP ID : 2260
CFM State : Failed
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Track Link Detect Protocol Protocol associated with ERPS on the port. The
hyphen (-) indicates that no protocol is associated
with ERPS on the port.
Related Topics
5.15.24 version (ERPS ring view)
Format
display erps [ ring ring-id ] statistics
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
On a Layer 2 network running ERPS, the display erps statistics command displays statistics
about sent and received RAPS PDUs on the ports that are added to ERPS rings. The
command output helps you analyze the network situation, learn the network running status,
and maintain devices.
Prerequisites
To query statistics about sent and received RAPS PDUs on the ports that have been added to a
specified ERPS ring, ensure that the EPRS ring has been created.
Example
# Display statistics about sent and received RAPS PDUs on the ports that are added to ERPS
rings.
<HUAWEI> display erps statistics
--------------------------------------------------------------------------------
Ring Port RX/TX SF NR NRRB FS MS EVENT
--------------------------------------------------------------------------------
1 Eth-Trunk1 RX 0 0 552 0 0 0
1 Eth-Trunk1 TX 0 68 0 326 0 6
1 GE0/0/1 RX 0 6 552 0 0 0
1 GE0/0/1 TX 4 63 0 326 0 6
10 GE0/0/2 RX 0 1 0 0 0 0
10 GE0/0/2 TX 4 74 0 0 0 0
# Display statistics about sent and received RAPS PDUs on the ports that are added to ERPS
ring 2.
<HUAWEI> display erps ring 2 statistics
--------------------------------------------------------------------------------
Ring Port RX/TX SF NR NRRB FS MS EVENT
--------------------------------------------------------------------------------
2 GE0/0/1 RX 0 1 0 0 0 0
2 GE0/0/1 TX 4 74 0 0 0 0
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Ring ID of the ERPS ring. To configure an ERPS ring, run the erps
ring command.
Related Topics
5.15.8 erps ring
5.15.4 display erps
Function
The display snmp-agent trap feature-name erps all command displays trap functions of the
Ethernet Ring Protection Switching (ERPS) module.
Format
display snmp-agent trap feature-name erps all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
The Simple Network Management Protocol (SNMP) is a standard network management
protocol widely used on TCP/IP networks. It uses a central computer (a network management
station) that runs network management software to manage network elements. The
management agent on the network element automatically reports traps to the network
management station so that the network administrator can immediately take measures to
resolve the problem.
The display snmp-agent trap feature-name erps all command displays trap functions of the
ERPS module.
Example
# Display trap functions of the ERPS module.
<HUAWEI> display snmp-agent trap feature-name erps all
------------------------------------------------------------------------------
Feature name: ERPS
Trap number : 2
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwErpsFwStateForwarding on on
hwErpsFwStateDiscarding on on
Table 5-105 Description of the display snmp-agent trap feature-name erps all command
output
Item Description
Related Topics
5.15.19 snmp-agent trap enable feature-name erps
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The erps ring command creates an ERPS ring and displays the view of the ERPS ring, or
directly displays the view of an existing ERPS ring.
The undo erps ring command deletes a created ERPS ring.
By default, no ERPS ring is created.
Format
erps ring ring-id
undo erps ring ring-id
Parameters
Parameter Description Value
ring-id Specifies the ID of an ERPS ring. The value is an integer that ranges from 1 to
255.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Ethernet Ring Protection Switching (ERPS) is a standard protocol issued by the ITU-T to
prevent loops on ring networks. ERPS implements fast convergence of carrier-class reliability
standards. It allows all ERPS-capable devices on a ring network to communicate.
To enable ERPS on the device, run the erps ring command to create an ERPS ring and enter
the ERPS ring view.
To configure parameters such as the control VLAN and the protected instance for an ERPS
ring, run the erps ring command to enter the ERPS ring view.
Follow-up Procedure
Run the control-vlan (ERPS ring view) command to configure a control VLAN for the
ERPS ring.
Run the protected-instance (ERPS ring view) command to configure an ERP instance for
the ERPS ring.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
To delete an ERPS ring, ensure that no ports are added to the ERPS ring. If any port is added
to the ERPS ring, the system displays a message indicating a failure to delete the ERPS ring.
To delete an ERPS ring where ports are added, run the undo erps ring command in the
interface view or the undo port command in the ERPS ring view to remove the port, and run
the undo erps ring command to delete the ERPS ring.
Example
# Create ERPS ring 1.
<HUAWEI> system-view
[HUAWEI] erps ring 1
[HUAWEI-erps-ring1]
Related Topics
5.15.2 control-vlan (ERPS ring view)
5.15.15 protected-instance (ERPS ring view)
5.15.4 display erps
5.15.6 display erps statistics
Function
The erps ring command adds a port to an ERPS ring and specifies a role for the port.
The undo erps ring command deletes a port from an ERPS ring and cancels the port role.
By default, a port is not added to an ERPS ring, and no port role is specified.
Format
erps ring ring-id [ rpl { owner | neighbour } ]
undo erps ring ring-id
Parameters
Parameter Description Value
ring-id Specifies the ID of an ERPS ring. The value is an
integer that ranges
from 1 to 255.
rpl { owner | Specifies the port to be added to an ERPS -
neighbour } ring as the RPL owner port or RPL
neighbor port.
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an ERPS ring is created, run the erps ring command in the interface view to add Layer
2 ports to the ERPS ring so that RAPS PDUs can be correctly forwarded. Each device in an
ERPS ring is a node, and a maximum of two Layer 2 ports on each node can be added to the
same ERPS ring.
ERPS defines three port roles: RPL owner port, RPL neighbor port (only in ERPSv2), and
common port.
l RPL owner port
An RPL owner port is responsible for blocking traffic over the Ring Protection Link
(RPL) to prevent loops. An ERPS ring has only one RPL owner port.
When the node on which the RPL owner port resides receives an RAPS PDU indicating
a link or node fault in an ERPS ring, the node unblocks the RPL owner port. Then the
RPL owner port can send and receive traffic to ensure nonstop traffic forwarding.
The link where the RPL owner port resides is the RPL.
l RPL neighbor port
An RPL neighbor port is directly connected to an RPL owner port.
Both the RPL owner port and RPL neighbor ports are blocked in normal situations to
prevent loops.
If an ERPS ring fails, both the RPL owner and neighbor ports are unblocked.
The RPL neighbor port helps reduce the number of FDB entry updates on the device
where the RPL neighbor port resides.
l Common port
Common ports are ring ports other than the RPL owner and neighbor ports.
A common port monitors the status of the directly connected ERPS link and sends RAPS
PDUs to notify the other ports of its link status changes.
Prerequisites
An EPRS ring has been created using the erps ring command.
l The control VLAN and ERP instance have been configured using the control-vlan and
protected instance commands respectively in the ERPS ring view.
l The port is not a Layer 3 port. If the port is a Layer 3 port, run the portswitch command
to switch the port to the Layer 2 mode.
l Spanning Tree Protocol (STP), Rapid Ring Protection Protocol (RRPP), Smart Ethernet
Protection (SEP), or Smart Link is not enabled on the port.
– If the port has STP enabled, run the stp disable command in the interface view to
disable STP.
– If the port has RRPP enabled, run the undo ring ring-id command in the RRPP
domain view to disable RRPP.
– If the port has SEP enabled, run the undo sep segment segment-id command in the
interface view to disable SEP.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
– If the port has Smart Link enabled, run the undo port command in the Smart Link
group view to disable Smart Link.
l ERPSv2 has been specified in the ERPS ring using the version v2 command if the port
is specified as an RPL neighbor port.
Precautions
Before running the undo erps ring command to delete a port from an ERPS ring, run the
shutdown (interface view) command to shut down the port. The port can be enabled again
according to the actual situation.
If ports added to an ERPS ring are all ordinary ports, any port on the device with the largest
MAC address will be blocked.
NOTE
If an RPL neighbor port is configured for a non-virtual channel of a sub-ring, network convergence may
fail to meet requirements because SF packets are discarded on the port in the case of a link fault.
Example
# Add GE0/0/1 to ERPS ring 2.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] erps ring 2
Related Topics
5.15.2 control-vlan (ERPS ring view)
5.15.8 erps ring
5.15.15 protected-instance (ERPS ring view)
5.15.4 display erps
5.15.6 display erps statistics
5.15.24 version (ERPS ring view)
Function
The erps ring protect-switch command configures a port blocking mode for an ERPS port.
Format
erps ring ring-id protect-switch { force | manual }
Parameters
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Because the Ring Protection Link (RPL) may have high bandwidth, you can block the low-
bandwidth link so that user traffic can be transmitted on the RPL. ERPSv2 supports both
Forced Switch (FS) and Manual Switch (MS) modes for blocking an ERPS port:
l FS: forcibly blocks a port immediately after FS is configured, irrespective of whether
link failures have occurred.
l MS: blocks a port on which MS is configured when the ERPS ring is in Idle or Pending
state.
FS takes precedence over MS.
Prerequisites
l The erps ring or port (ERPS ring view) command has been executed to add the port to
an ERPS ring.
l The version v2 command has been executed to specify ERPSv2.
Configuration Impact
After an ERPS port is blocked in FS or MS mode, the node on which the ERPS port resides
sends RAPS (FS) or RAPS (MS) messages to the other nodes in the ERPS ring. As a result,
ERPS performs recalculation and finally unblocks the RPL owner port.
Precautions
The ERPS ring specified by ring-id must be the one to which the port belongs; otherwise, the
command does not take effect.
To change the port blocking mode from MS to FS, run the erps ring ring-id protect-switch
force command to set the FS mode. To change the port blocking mode from FS to MS, run the
clear command in the ERPS ring view to delete the FS mode, and then run the erps ring
ring-id protect-switch manual command to set the MS mode.
You can delete the manual port blocking mode only by using the clear command in the ERPS
ring view.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
The erps ring protect-switch command is not saved in the configuration file.
Example
# Specify the FS mode to block GigabitEthernet0/0/1 in ERPS ring 5.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] erps ring 5
[HUAWEI-GigabitEthernet0/0/1] erps ring 5 protect-switch force
Related Topics
5.15.9 erps ring (interface view)
5.15.24 version (ERPS ring view)
5.15.1 clear (ERPS ring view)
Format
erps ring ring-id track cfm md md-name ma ma-name mep mep-id remote-mep rmep-id
undo erps ring ring-id [ track cfm ]
Parameters
Parameter Description Value
ring-id Specifies the ID of an The value is an integer that ranges from 1
ERPS ring. to 255.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
mep mep-id Specifies the ID of a The value is an integer that ranges from 1
maintenance association to 8191.
end point (MEP).
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To fast detect faults, implement fast convergence, and shorten traffic interruptions, run the
erps track cfm command to associate ERPS with Ethernet CFM on a port added to an ERPS
ring.
Prerequisites
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Associate ERPS with Ethernet CFM on GigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] erps ring 5
[HUAWEI-GigabitEthernet0/0/1] erps ring 5 track cfm md md1 ma ma1 mep 1 remote-
mep 2
Related Topics
5.15.24 version (ERPS ring view)
Format
guard-timer time-value
undo guard-timer
Parameters
Parameter Description Value
time-value Specifies the value of the Guard The value is an integer that ranges from
timer in an ERPS ring. 1 to 200, in centiseconds.
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running ERPS, after a faulty link or node recovers, the device sends
RAPS PDUs to inform the other nodes of link or node recovery and starts the Guard timer.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Before the Guard timer expires, the device does not receive any RAPS PDU. If the device
receives out-of-date RAPS PDUs indicating that the link or node fails, the local port may be
blocked again. After the Guard timer expires, if the device receives an RAPS PDU indicating
that another port fails, the local port enters the Forwarding state.
Precautions
If the value of the Guard timer is too small, network loops may occur. The default value (200
centiseconds) is recommended.
Example
# Set the Guard timer to 180 centiseconds in ERPS ring 10.
<HUAWEI> system-view
[HUAWEI] erps ring 10
[HUAWEI-erps-ring10] guard-timer 180
Related Topics
5.15.8 erps ring
5.15.4 display erps
5.15.6 display erps statistics
Function
The holdoff-timer command sets the Holdoff timer in an ERPS ring.
The undo holdoff-timer command restores the default value of the Holdoff timer.
By default, the Holdoff timer is 0 deciseconds in an ERPS ring.
Format
holdoff-timer time-value
undo holdoff-timer
Parameters
Parameter Description Value
time-value Specifies the value of the Holdoff The value is an integer that ranges from
timer in an ERPS ring. 0 to 100, in deciseconds.
Views
ERPS ring view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
On Layer 2 networks running EPRS, there may be different requirements for protection
switching. For example, on a network where multi-layer services are provided, after a server
fails, users may require a period of time to rectify the server fault so that clients do not detect
the fault. That is, protection switching is not performed immediately.
You can run the holdoff-timer command to set the Holdoff timer. When a fault occurs, the
fault is not immediately reported to ERPS. Instead, the Holdoff timer starts. If the fault
persists after the timer expires, the fault will be reported to ERPS.
Precautions
If you run the holdoff-timer command multiple times, only the latest configuration takes
effect.
Example
# Set the Holdoff timer to 10 in ERPS ring 10.
<HUAWEI> system-view
[HUAWEI] erps ring 10
[HUAWEI-erps-ring10] holdoff-timer 10
Related Topics
5.15.8 erps ring
5.15.4 display erps
Function
The port command adds a port to an ERPS ring and specifies a role for the port.
The undo port command deletes a port from an ERPS ring and cancels the port role.
By default, a port is not added to an ERPS ring, and no port role is specified.
Format
port interface-type interface-number [ rpl { owner | neighbour } ]
Parameters
Parameter Description Value
interface-type interface- Specifies the port to be added to an ERPS ring. -
number
interface-type specifies the interface type and interface-
number specifies the interface number.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an ERPS ring is created, run the port command to add Layer 2 ports to the ERPS ring
so that RAPS PDUs can be correctly forwarded. Each device in an ERPS ring is a node, and a
maximum of two Layer 2 ports on each node can be added to the same ERPS ring.
ERPS defines three port roles: RPL owner port, RPL neighbor port (only in ERPSv2), and
common port.
l RPL owner port
An RPL owner port is responsible for blocking traffic over the Ring Protection Link
(RPL) to prevent loops. An ERPS ring has only one RPL owner port.
When the node on which the RPL owner port resides receives an RAPS PDU indicating
a link or node fault in an ERPS ring, the node unblocks the RPL owner port. Then the
RPL owner port can send and receive traffic to ensure nonstop traffic forwarding.
The link where the RPL owner port resides is the RPL.
l RPL neighbor port
An RPL neighbor port is directly connected to an RPL owner port.
Both the RPL owner port and RPL neighbor ports are blocked in normal situations to
prevent loops.
If an ERPS ring fails, both the RPL owner and neighbor ports are unblocked.
The RPL neighbor port helps reduce the number of FDB entry updates on the device
where the RPL neighbor port resides.
l Common port
Common ports are ring ports other than the RPL owner and neighbor ports.
A common port monitors the status of the directly connected ERPS link and sends RAPS
PDUs to notify the other ports of its link status changes.
Prerequisites
l The control VLAN and ERP instance have been configured using the control-vlan and
protected instance commands respectively in the ERPS ring view.
l The port is not a Layer 3 port. If the port is a Layer 3 port, run the portswitch command
to switch the port to the Layer 2 mode.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l Spanning Tree Protocol (STP), Rapid Ring Protection Protocol (RRPP), Smart Ethernet
Protection (SEP), or Smart Link is not enabled on the port.
– If the port has STP enabled, run the stp disable command in the interface view to
disable STP.
– If the port has RRPP enabled, run the undo ring ring-id command in the RRPP
domain view to disable RRPP.
– If the port has SEP enabled, run the undo sep segment segment-id command in the
interface view to disable SEP.
– If the port has Smart Link enabled, run the undo port command in the Smart Link
group view to disable Smart Link.
l ERPSv2 has been specified in the ERPS ring using the version v2 command if the port
is specified as an RPL neighbor port.
Precautions
Before deleting a port from an ERPS ring or changing the port role, use the shutdown
(interface view) command to disable the port. Then remove the port or change the port role
and run the undo shutdown (interface view) command to enable the port. Otherwise, traffic
forwarding may fail.
If ports added to an ERPS ring are all ordinary ports, any port on the device with the largest
MAC address will be blocked.
Example
# Add GE0/0/1 to ERPS ring 10, and set the port to the RPL owner port.
<HUAWEI> system-view
[HUAWEI] erps ring 10
[HUAWEI-erps-ring10] port gigabitethernet 0/0/1 rpl owner
Related Topics
5.15.8 erps ring
5.15.4 display erps
5.15.6 display erps statistics
5.15.24 version (ERPS ring view)
Function
The protected-instance command configures Ethernet ring protection (ERP) instances in an
ERPS ring.
The undo protected-instance command deletes ERP instances from an ERPS ring.
By default, no ERP instance is configured in an ERPS ring.
Format
protected-instance { all | { instance-id1 [ to instance-id2 ] &<1-10> } }
undo protected-instance { all | { instance-id1 [ to instance-id2 ] &<1-10> } }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
instance-id1 to Specifies the ID of an ERP instance. The value is
instance-id2 l instance-id1 specifies the first ERP instance ID. an integer that
ranges from 0
l to vlan-id2 specifies the last ERP instance ID. The to 4094.
value of instance-id2 must be greater than the value
of instance-id1. instance-id1 and instance-id2
identify a range of ERP instances. If to instance-id2
is not specified, only instance-id1 is specified.
all Indicates all ERP instances. -
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a device running ERPS, the VLAN where ERPS PDUs and data packets are transmitted
must be mapped to an ERP instance. Otherwise, VLAN packets may cause broadcast storms
on the ring network. As a result, the network may become unavailable.
Precautions
l If the stp mode (system view) command is used to set the STP working mode to VLAN-
based Spanning Tree (VBST), the ERP instance specified by the protected-instance
command must be the created static instance.
l If you run the protected-instance command multiple times in the same ERPS ring,
multiple ERP instances are configured.
l If ports have been added to the ERPS ring, the ERP instance cannot be modified. To
delete the configured ERP instance, run the undo erps ring command in the interface
view or the undo port command in the ERPS ring view to delete ports from the ERPS
ring, and run the undo protected-instance command to delete the ERP instance.
Example
# Configure ERP instance 5 in ERPS ring 1.
<HUAWEI> system-view
[HUAWEI] erps ring 1
[HUAWEI-erps-ring1] protected-instance 5
Related Topics
5.15.8 erps ring
5.15.2 control-vlan (ERPS ring view)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
5.15.16 raps-mel
Function
The raps-mel command sets the value of the MEL field in Ring Auto Protection Switching
(RAPS) Protocol Data Units (PDUs).
The undo raps-mel command restores the default value of the MEL field.
By default, the value of the MEL field in RAPS PDUs is 7.
Format
raps-mel level-id
undo raps-mel
Parameters
Parameter Description Value
level-id Specifies the value of the MEL field in The value is an integer that ranges
RAPS PDUs. from 0 to 7.
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running ERPS, if another fault detection protocol is enabled, the MEL
field in RAPS PDUs is used to determine whether the RAPS PDUs can be forwarded. If the
MEL value in an ERPS ring is smaller than the MEL value of the fault detection protocol, the
RAPS PDUs have a lower priority and are discarded. If the MEL value in an ERPS ring is
larger than the MEL value of the fault detection protocol, the RAPS PDUs can be forwarded.
You can run the raps-mel command to set the value of the MEL field in RAPS PDUs.
In addition, the MEL value can also be used for interworking with other vendors' devices in
an ERPS ring. The same MEL value ensures smooth communication between devices.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If you run the raps-mel command multiple times, only the latest configuration takes effect.
Example
# Set the value of the MEL field to 5 in ERPS ring 1.
<HUAWEI> system-view
[HUAWEI] erps ring 1
[HUAWEI-erps-ring1] raps-mel 5
Related Topics
5.15.8 erps ring
5.15.2 control-vlan (ERPS ring view)
5.15.15 protected-instance (ERPS ring view)
5.15.4 display erps
5.15.6 display erps statistics
Format
reset erps [ ring ring-id ] statistics
Parameters
Parameter Description Value
ring ring-id Clears packet statistics in a specified The value is an integer that ranges
ERPS ring. from 1 to 255.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before collecting traffic statistics on a specific interface in a given period of time, clear the
existing statistics on the interface by using the reset erps command.
Prerequisites
The ERPS ring has been created, and ports have been added to the specified ERPS ring.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Precautions
The cleared statistics cannot be restored. Exercise caution when you run this command.
Example
# Clear packet statistics in ERPS ring 2.
<HUAWEI> reset erps ring 2 statistics
Related Topics
5.15.4 display erps
5.15.6 display erps statistics
5.15.18 revertive
Function
The revertive command configures revertive switching or non-revertive switching in an
ERPS ring. The switching mode determines whether the RPL owner port is blocked again
after a link fault is rectified.
The undo revertive disable command restores the default configuration.
By default, ERPS rings use revertive switching.
Format
revertive { enable | disable }
undo revertive disable
Parameters
Parameter Description Value
enable Enables revertive switching in an ERPS ring. -
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
After link faults in an ERPS ring are rectified, re-blocking the RPL owner port depends on the
switching mode:
l In revertive switching, the RPL owner port is re-blocked after the WTR timer expires,
and the RPL is blocked.
l In non-revertive switching, the WTR timer is not started, and the original faulty link is
still blocked.
Prerequisites
Example
# Configure non-revertive switching in ERPS ring 5.
<HUAWEI> system-view
[HUAWEI] erps ring 5
[HUAWEI-erps-ring5] revertive disable
Related Topics
5.15.24 version (ERPS ring view)
Function
The snmp-agent trap enable feature-name erps command enables the trap function for the
Ethernet Ring Protection Switching (ERPS) module.
The undo snmp-agent trap enable feature-name erps command disables the trap function
for the ERPS module.
Format
snmp-agent trap enable feature-name erps [ trap-name { hwerpsfwstatediscarding |
hwerpsfwstateforwarding } ]
Parameters
Parameter Description Value
trap-name Enables or disables the trap function for ERPS events -
of specified types.
hwerpsfwstatediscarding Enables or disables the trap function when a port in an -
ERPS ring enters the Discarding state.
hwerpsfwstateforwarding Enables or disables the trap function when a port in an -
ERPS ring enters the Forwarding state.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
3: Management level
Usage Guidelines
You can specify trap-name to enable the trap function for one or more events of the ERPS
module.
Example
# Enable the device to send a trap when a port in an ERPS ring enters the Forwarding state.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name erps trap-name
hwerpsfwstateforwarding
Related Topics
5.15.7 display snmp-agent trap feature-name erps all
5.15.20 sub-ring
Function
The sub-ring command configures an ERPS ring as a sub-ring.
Format
sub-ring
undo sub-ring
Parameters
None
Views
ERPS ring view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenario
ERPS has two versions: ERPSv1 and ERPSv2. ERPSv2 supports multi-ring topologies such
as intersecting ring topologies in addition to single-ring topologies.
To deploy ERPS on a multi-ring network, run the sub-ring command to configure some rings
as sub-rings.
NOTE
Prerequisites
Precautions
If a sub-ring uses the VC mode to transmit RAPS PDUs, you must run the virtual-channel
disable command to restore the RAPS PDU transmission mode to NVC before running the
undo sub-ring command to restore the sub-ring to a major ring.
Example
# Configure ERPS ring 5 as a sub-ring.
<HUAWEI> system-view
[HUAWEI] erps ring 5
[HUAWEI-erps-ring5] sub-ring
Related Topics
5.15.24 version (ERPS ring view)
Function
The tc-notify erps ring command configures an ERPS ring to notify other ERPS rings of its
topology change.
The undo tc-notify erps ring command disables the topology change notification function.
By default, an ERPS ring does not notify other ERPS rings of its topology change.
Format
tc-notify erps ring { ring-id1 [ to ring-id2 ] } &<1-10>
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
ring-id1 The value is an
Specifies the start ring ID of the ERPS ring that will be
integer that ranges
notified of the topology change.
from 1 to 255.
to ring-id2 Specifies the end ring ID of the ERPS ring that will be The value is an
notified of the topology change. integer that ranges
from 1 to 255 and
ring-id1 and ring-id2 specify a ring range. If to ring- must be greater than
id2 is not specified, an ERPS ring notifies only the or equal to ring-id1.
ERPS ring specified by ring-id1 of its topology
change.
NOTE
You can specify the ring range for a maximum of 10 times,
and the ring ranges can overlap.
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the topology of the local ERPS ring changes and other ERPS rings is not notified of the
topology change, the MAC address entries remain unchanged on the other ERPS rings and
therefore user traffic is interrupted. To ensure nonstop traffic transmission, run the tc-notify
erps ring command to specify ERPS rings to which topology change notifications are sent.
Prerequisites
The version v2 command has been executed to specify ERPSv2.
Precautions
l The tc-notify erps ring command takes effect only on ERPS sub-rings.
l If an ERPS ring topology changes, the ERPS ring notifies the specified ERPS rings of its
topology change. If the ERPS ring that has been specified to receive the topology change
notification does not exist, the configuration does not take effect.
l After other ERPS rings receive the topology change notification from an ERPS ring, they
send Flush-FDB messages on their separate rings to instruct their nodes to update MAC
addresses. This ensures nonstop traffic transmission.
l If the tc-notify erps ring command is run more than once, all configurations take effect.
Example
# Configure ERPS ring 5 to notify ERPS rings 1 through 3 of its topology change.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
<HUAWEI> system-view
[HUAWEI] erps ring 5
[HUAWEI-erps-ring5] tc-notify erps ring 1 to 3
Related Topics
5.15.20 sub-ring
5.15.24 version (ERPS ring view)
Format
tc-protection interval interval-value
undo tc-protection interval
Parameters
Parameter Description Value
interval-value Specifies the topology change protection The value is an integer that
interval. ranges from 1 to 600, in
seconds.
A longer interval ensures stable ERPS
operation, but may cause slow convergence.
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a user terminal connects to an upper-layer network through multiple ERPS rings and the
topology of the ERPS ring closest to the user terminal changes, topology change notifications
will be multiplied by 2 each time they pass through a ring until they reach the upper-layer
network. As a result, the upper-layer network receives many identical topology change
notifications.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
In addition, if an ERPS ring frequently receives topology change notifications, its nodes will
have lower CPU processing capability and repeatedly update Flush-FDB packets, consuming
much bandwidth. To prevent this problem, run the tc-protection interval command to set the
topology change protection interval at which the maximum number of topology change
notifications specified in the tc-protection threshold command are processed. Then, during
the topology change protection interval, the device processes only the specified maximum
number of topology change notification messages. If there are excess notifications, the device
processes all the excess notifications once after the topology change protection interval
elapses. For example, if the topology change protection interval is set to 10 seconds and the
maximum number is set to 5, when a device receives topology change notifications, the
device processes only the first 5 topology change notifications within 10 seconds and
processes the subsequent topology change notifications only after 10s. This prevents the
device from frequently deleting MAC address entries and ARP entries.
Prerequisites
The erps ring command has been executed to create an ERPS ring.
Precautions
Example
# Set thetopology change protection interval to 3s in ERPS ring 1.
<HUAWEI> system-view
[HUAWEI] erps ring 1
[HUAWEI-erps-ring1] tc-protection interval 3
Related Topics
5.15.8 erps ring
Function
The tc-protection threshold command sets the number of times ERPS parses topology
change notifications and updates forwarding entries in the topology change protection
interval.
The undo tc-protection threshold command restores the default number of times ERPS
parses topology change notifications and updates forwarding entries in the topology change
protection interval.
By default, ERPS parses topology change notifications and updates forwarding entries three
times in the topology change protection interval.
Format
tc-protection threshold threshold-value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
threshold-value Specifies the number of times ERPS parses The value is an integer that
topology change notifications and updates ranges from 1 to 255.
forwarding entries in the topology change
protection interval.
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
After a switching device in an ERPS ring network receives topology change notifications, the
device updates MAC address entries and ARP entries. Frequent updates will cause a high
CPU usage.
To prevent frequent MAC address and ARP entry updates, run the tc-protection threshold
command to set the maximum number of topology change notifications that can be processed
during the topology change protection interval specified by the tc-protection interval
command. Then, during the topology change protection interval, the device processes only the
specified maximum number of topology change notification messages. If there are excess
notifications, the device processes all the excess notifications once after the topology change
protection interval elapses. For example, if the topology change protection interval is set to 10
seconds and the maximum number is set to 5, when a device receives topology change
notifications, the device processes only the first 5 topology change notifications within 10
seconds and processes the subsequent topology change notifications only after 10s. This
prevents the device from frequently deleting MAC address entries and ARP entries.
Example
# Set the number of times ERPS parses topology change notifications and updates forwarding
entries in the topology change protection interval to 5.
<HUAWEI> system-view
[HUAWEI] erps ring 5
[HUAWEI-erps-ring5] tc-protection threshold 5
Related Topics
5.15.24 version (ERPS ring view)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
version { v1 | v2 }
undo version
Parameters
Parameter Description Value
v1 Specifies ERPSv1. -
v2 Specifies ERPSv2. -
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
ERPS has two versions: ERPSv1 released by the ITU-T in June and ERPSv2 released in
August, 2010. ERPSv2 that is compatible with ERPSv1 provides the following enhanced
functions:
l Multi-ring topologies, such as intersecting rings
l RAPS PDU transmission on virtual channels (VCs) and non-virtual-channels (NVCs) in
sub-rings
l Forced Switch (FS) and Manual Switch (MS)
l Revertive and non-revertive switching
To configure an ERPS version, run the version command.
Precautions
Before specifying ERPSv1 for an ERPSv2-enabled device, delete all ERPS configurations
that ERPSv1 does not support. Otherwise, the version cannot be changed.
Example
# Specify ERPSv2 for ERPS ring 5.
<HUAWEI> system-view
[HUAWEI] erps ring 5
[HUAWEI-erps-ring5] version v2
Related Topics
5.15.8 erps ring
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
5.15.25 virtual-channel
Function
The virtual-channel enable command configures the virtual channel (VC) mode for RAPS
PDU transmission in a sub-ring.
The virtual-channel disable command configures the non-virtual-channel (NVC) mode for
RAPS PDU transmission in a sub-ring.
The undo virtual-channel enable command configures the non-virtual-channel (NVC) mode
for RAPS PDU transmission in a sub-ring.
By default, RAPS PDUs are transmitted in NVC mode in a sub-ring.
Format
virtual-channel { enable | disable }
undo virtual-channel enable
Parameters
Parameter Description Value
enable Enables the VC mode for RAPS PDU transmission in a sub-ring. -
disable Disables the VC mode for RAPS PDU transmission in a sub-ring. That -
is, the NVC mode is used.
Views
ERPS ring view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
ERPSv2 supports both single- and multi-ring topologies.
In multi-ring topologies, the VC or NVC mode can be used to transmit RAPS PDUs in a sub-
ring:
l VC mode: RAPS PDUs in a sub-ring are transmitted to the major ring by the intersecting
node. The RPL owner port of the sub-ring blocks both RAPS PDUs and data traffic.
l NVC mode: RAPS PDUs in a sub-ring are terminated on the intersecting nodes. The
RPL owner port of the sub-ring blocks data traffic but not RAPS PDUs.
You can run the virtual-channel command to configure the RAPS PDU transmission mode in
a sub-ring.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Prerequisites
Configuration Impact
If a sub-ring uses the VC mode to transmit RAPS PDUs, you must run the virtual-channel
disable or undo virtual-channel enable command to restore the RAPS PDU transmission
mode to NVC before running the undo sub-ring command to restore the sub-ring to a major
ring.
Example
# Configure the VC mode for RAPS PDU transmission in ERPS sub-ring 5.
<HUAWEI> system-view
[HUAWEI] erps ring 5
[HUAWEI-erps-ring5] version v2
[HUAWEI-erps-ring5] sub-ring
[HUAWEI-erps-ring5] virtual-channel enable
Related Topics
5.15.20 sub-ring
5.15.24 version (ERPS ring view)
Function
The wtr-timer command sets the WTR timer in an ERPS ring.
The undo wtr-timer command restores the default value of the WTR timer.
Format
wtr-timer time-value
undo wtr-timer
Parameters
Views
ERPS ring view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The wtr-timer command is applied to RPL owner ports. If an RPL owner port is unblocked
due to a link or node fault, the involved port may not go Up immediately after the link or node
recovers. To prevent the RPL owner port from alternating between the Up and Down states,
the node where the RPL owner port resides starts the WTR timer after receiving an RAPS
PDU indicating the link or node recovery:
l If the node receives an RAPS PDU indicating that another port fails before the timer
expires, the node disables the WTR timer and enables the RPL owner port.
l If the node does not receive any RAPS PDUs indicating that another port fails before the
timer expires, the node blocks the RPL owner port when the WTR timer expires and
sends an RAPS PDU indicating that the RPL owner port is blocked. After receiving the
RAPS PDU, other nodes set their recovering ports to the Forwarding state in the ring.
Precautions
If you run the wtr-timer command multiple times, only the latest configuration takes effect.
Example
# Set the WTR timer to 10 minutes in ERPS ring 10.
<HUAWEI> system-view
[HUAWEI] erps ring 10
[HUAWEI-erps-ring10] wtr-timer 10
Related Topics
5.15.8 erps ring
5.15.4 display erps
Format
display loopback-detect
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
This command is used to check the loopback detection configuration and status of each
interface on which loopback detection is enabled.
Prerequisites
Loopback detection has been enabled on the interface by using the loopback-detect enable
(interface view) or loopback-detect enable (system view) command.
Example
# Display the loopback detection configuration and status of loopback detection enabled
interfaces.
<HUAWEI> display loopback-detect
Loopback-detect sending-packet interval:
5
-----------------------------------------------------------------
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.16.6 loopback-detect enable (interface view)
5.16.3 loopback-detect action
5.16.5 loopback-detect enable (system view)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Function
The display snmp-agent trap feature-name lbdt all command displays all trap messages of
the Loopback Detection module.
Format
display snmp-agent trap feature-name lbdt all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the trap function of a specified feature is enabled, you can run the display snmp-agent
trap feature-name lbdt all command to check the status of all traps of Loopback Detection.
You can use the snmp-agent trap enable feature-name lbdt command to enable the trap
function of Loopback Detection.
Prerequisites
SNMP has been enabled. See snmp-agent.
Example
# Display all trap messages of the Loopback Detection module.
<HUAWEI> display snmp-agent trap feature-name lbdt all
------------------------------------------------------------------------------
Feature name: LBDT
Trap number : 2
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwLdtPortLoopDetect on on
hwLdtPortLoopDetectRecovery on on
Table 5-107 Description of the display snmp-agent trap feature-name lbdt all command
output
Item Description
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.16.11 snmp-agent trap enable feature-name lbdt
Function
The loopback-detect action command configures an action to be taken when a loopback is
detected on an interface.
The undo loopback-detect action command restores the default action.
By default, an interface is shut down when a loopback is detected on the interface.
Format
loopback-detect action { block | nolearn | shutdown | trap | quitvlan }
undo loopback-detect action [ block | nolearn | shutdown | trap | quitvlan ] ( Ethernet
interface view, GE interface view, XGE interface view, 40GE interface view, MultiGE
interface view)
undo loopback-detect action ( port group view )
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After loopback detection is enabled on an interface, the interface sends loopback detection
packets at intervals. When a loopback is detected on the interface, the system performs an
action to minimize the impact on the entire network. The loopback-detect action command
configures the action.
The system performs any of the following actions after detecting a loopback on an interface:
l block: blocks the interface. After the interface is blocked, it is isolated from other
interfaces and does not forward received data packets to other interfaces.
l nolearn: disables MAC address learning on the interface. When a loopback is detected
on the interface, the interface stops learning MAC addresses.
l shutdown: shuts down the interface.
l trap: only sends a trap.
l quitvlan: When a loopback is detected on an interface, the interface exits from the
VLAN in which a loop occurs.
Prerequisites
Enable loopback detection in the interface view or system view.
Follow-up Procedure
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
l If the action is set to block, nolearn, trap or quitvlan, you can run the loopback-detect
recovery-time command to set the interface recovery time.
l If the action is set to shutdown, the shutdown interface cannot be restored automatically
after a loopback is eliminated. You must run the shutdown and undo shutdown
commands or run the restart command to restore the interface.
Example
# Configure the system to shut down GigabitEthernet0/0/1 when a loopback occurs.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] loopback-detect action shutdown
Related Topics
5.16.9 loopback-detect recovery-time
5.16.6 loopback-detect enable (interface view)
5.16.5 loopback-detect enable (system view)
5.16.1 display loopback-detect
Function
The loopback-detect auto disable command disables automatic loop detection of LBDT.
The undo loopback-detect auto disable command enables automatic loop detection of
LBDT.
By default, automatic loop detection of LBDT is enabled.
Format
loopback-detect auto disable
undo loopback-detect auto disable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
When an interface changes from Down to Up, a loop may occur. You can enable automatic
loop detection of LBDT. The device then immediately detects loops and blocks the
corresponding interface when the interface becomes Up.
Precautions
l When the switch is upgraded from an earlier version to V200R009 or later, automatic
loop detection of LBDT is disabled by default.
l The device enabled with automatic loop detection of LBDT automatically blocks an
interface when detecting a loop. The blocked interface will be unblocked automatically
after the loop is eliminated. The time of unblocking the interface is one or two times the
recovery time. The recovery time can be configured using the loopback-
detect_recovery-time command, and the default value is three detection intervals, that
is, 15s.
l When automatic loop detection of LBDT is enabled, all interfaces where the loopback-
detect enable command is not configured periodically send detection packets with the
PVID to detect loops, consuming CPU resources. If no loop occurs on a network, run the
loopback-detect auto disable command to disable automatic loop detection of LBDT to
reduce resource consumption.
Example
# Enable automatic loop detection of LBDT.
<HUAWEI> system-view
[HUAWEI] undo loopback-detect auto disable
Related Topics
5.16.9 loopback-detect recovery-time
5.16.8 loopback-detect packet-interval
5.16.1 display loopback-detect
Function
The loopback-detect enable command enables loopback detection on all interfaces.
The undo loopback-detect enable command disables loopback detection on all interfaces.
Format
loopback-detect enable
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
When loopback detection needs to be enabled on all or most of interfaces on a device, you can
use the loopback-detect enable command to simplify configuration.
Precautions
After you run the loopback-detect enable command in the system view, the CPU usage
increases because all interfaces send broadcast loopback detection packets at intervals.
Loopback detection occupies CPU resources; therefore, disable this function when it is not
required.
Follow-up Procedure
If loopback detection is not required on an interface, run the undo loopback-detect enable
command in the interface view to disable loopback detection.
Example
# Enable loopback detection on all interfaces.
<HUAWEI> system-view
[HUAWEI] loopback-detect enable
Related Topics
5.16.6 loopback-detect enable (interface view)
5.16.1 display loopback-detect
Function
The loopback-detect enable command enables loopback detection on an interface.
Format
loopback-detect enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
The loopback-detect enable command enables loopback detection on an interface. This
function enables the system to detect a loopback on the downstream network quickly and shut
down an interface to minimize the impact of the loopback on the entire network.
Precautions
After loopback detection is enabled on an interface, the interface sends loopback detection
packets at intervals.
A large number of broadcast packets are sent during loopback detection, occupying CPU
resources; therefore, disable loopback detection if it is not required.
Example
# Enable loopback detection for the GE0/0/1 interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] loopback-detect enable
Related Topics
5.16.1 display loopback-detect
Format
loopback-detect packet vlan { vlan-id1 [ to vlan-id2 ] } &<1-8>
undo loopback-detect packet vlan [ { vlan-id1 [ to vlan-id2 ] } &<1-8> ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, loopback detection packets do not contain VLAN IDs. After the loopback-detect
packet vlan command is executed on an interface, the interface sends multiple copies of
tagged loopback detection packets with the specified VLAN tags.
Prerequisites
The specified VLANs exist and the interface has been added to the VLANs in tagged mode.
Before running this command, check whether loopback detection is enabled. If not, run the
loopback-detect enable (interface view) command to enable loopback detection.
Precautions
If you run the loopback-detect packet vlan command multiple times in the same interface
view, multiple VLAN IDs are specified.
Each interface can send detection packets with a maximum of eight VLAN IDs.
Example
# Configure loopback detection for VLAN30 on the GE0/0/1 interface.
<HUAWEI> system-view
[HUAWEI] vlan 30
[HUAWEI-vlan30] quit
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 30
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.16.6 loopback-detect enable (interface view)
5.16.1 display loopback-detect
Format
loopback-detect packet-interval packet-interval-time
undo loopback-detect packet-interval [ packet-interval-time ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
After loopback detection is enabled on an interface, the interface sends loopback detection
packets at the interval specified by the loopback-detect packet-interval command. You can
run the loopback-detect packet-interval command to adjust the interval between sending
loopback detection packets. according to service requirements. If a shorter interval is set, the
system sends more loopback detection packets in a certain period. This enables the system to
detect loopbacks more quickly and accurately, but more system sources are consumed.
Precautions
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
If you run the loopback-detect packet-interval command multiple times, only the latest
configuration takes effect.
Example
# Set the interval between sending loopback detection packets on all interfaces to 10s.
<HUAWEI> system-view
[HUAWEI] loopback-detect packet-interval 10
Related Topics
5.16.6 loopback-detect enable (interface view)
5.16.1 display loopback-detect
Function
The loopback-detect recovery-time command sets the interface recovery time after a
loopback is detected.
The undo loopback-detect recovery-time command restores the interface recovery time
after a loopback is detected.
The default recovery time is three times the loopback detection interval.
Format
loopback-detect recovery-time recovery-time
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
Usage Scenarios
After loopback detection is enabled on an interface, the device sends loopback detection
packets at intervals through the interface, performs the preconfigured action on the interface
after a loopback is detected, and starts timing. You can configure the interface recovery time.
After the configured interface recovery time, the system will attempt to recover the interface.
If the loopback is removed on the interface, the system recovers the interface from the error-
down state.
Precautions
If you run the loopback-detect recovery-time command multiple times, only the latest
configuration takes effect.
After a loop is eliminated, the interface recovery time is the same as the value of recovery-
time or two times the value of recovery-time.
It is recommended that the interface recovery time be three times the packet sending interval.
If the packet sending interval has been set to a small value, the interface recovery time should
be at least 10 seconds longer than the packet sending interval.
An interface cannot automatically restore the Up state after it is shut down. To restore the
interface, run the shutdown and undo shutdown commands on the interface in sequence.
Alternatively, run the restart command on the interface to restart the interface.
NOTE
The default recovery time is three times the loopback detection interval and is not restricted by the value
ranging from 1 to 1000. If you configure the command manually, the recovery time can only be set to a
value from 1 to 1000.
Example
# Sets the recovery time of the GE0/0/1 interface to 50 seconds.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] loopback-detect recovery-time 50
Related Topics
5.16.1 display loopback-detect
4.1.8 display interface
Function
The loopback-detect untagged mac-address command sets the destination MAC address of
untagged loopback detection packets.
The undo loopback-detect untagged mac-address command restores the default destination
MAC address of untagged loopback detection packets.
By default, the destination MAC address of untagged loopback detection packets is 0180-
C200-000A.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
loopback-detect untagged mac-address mac-address
undo loopback-detect untagged mac-address [ mac-address ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The Loopback Detection untagged command applies to scenarios with self-loops and loops
on the downstream network. When the connected interfaces are access interfaces, run the
loopback-detect packet vlan command to configure the device to detect loops in a specified
VLAN. This is because untagged packets are processed only when the transmit interface
receives them. If the device is not configured to detect loops in a specified VLAN, run the
loopback-detect untagged mac-address command.
Prerequisites
Loopback detection has been enabled using the loopback-detect enable (system view)
command.
Precautions
If you run this command multiple times, only the latest configuration takes effect.
You are not advised to set the destination MAC address of untagged loopback detection
packets to a destination MAC address of other protocols but to the broadcast MAC address
FFFF-FFFF-FFFF.
Example
# Set the destination MAC address of untagged loopback detection packets to FFFF-FFFF-
FFFF.
<HUAWEI> system-view
[HUAWEI] loopback-detect enable
[HUAWEI] loopback-detect untagged mac-address ffff-ffff-ffff
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.16.5 loopback-detect enable (system view)
Format
snmp-agent trap enable feature-name lbdt [ trap-name { hwldtportloopdetect |
hwldtportloopdetectrecovery } ]
undo snmp-agent trap enable feature-name lbdt [ trap-name { hwldtportloopdetect |
hwldtportloopdetectrecovery } ]
Parameters
Parameter Description Value
trap-name Enables or disables the trap function for the -
specified event.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the trap function is enabled, the device generates traps during running and sends traps
to the NMS through SNMP. When the trap function is not enabled, the device does not
generate traps and the SNMP module does not send traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Enable the device to send a Huawei proprietary trap when the loopback on the interface of
the Loopback Detection module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name lbdt trap-name hwldtportloopdetect
Related Topics
5.16.2 display snmp-agent trap feature-name lbdt all
5.17.1 bpdu
Function
The bpdu command configures an interface to send received BPDUs to the CPU or discard
BPDUs.
Format
bpdu { disable | enable }
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, MultiGE interface view, port
group view, Eth-Trunk interface view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
After you run the bpdu enable command on an interface, the interface forwards a packet to
the CPU if the destination MAC address of the packet is the BPDU MAC address. You can
use the display bpdu mac-address command to view the BPDU MAC address.
NOTE
This command is not supported by the S5720HI, S5720EI, S6720EI, and S6720S-EI. On the these
switches, an interface discards BPDUs by default. If BPDUs of a protocol need to be sent to the CPU for
processing, enable functions of the protocol. For example, if STP BPDUs need to be sent to the CPU for
processing, enable STP globally and on the interface.
Example
# Enable Eth-Trunk 1 to send received BPDUs to the CPU.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] bpdu enable
Related Topics
5.17.3 bpdu mac-address
5.17.5 display bpdu mac-address
NOTE
Format
bpdu dmac mac-address eth-type type action encapsulate
undo bpdu dmac mac-address eth-type type action [ encapsulate ]
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To be compatible with devices of other vendors, run this command to configure actions taken
on packets with a specified destination MAC address and protocol number. Actions is
encapsulating packets.
Example
# Configure the device to forward packets with the destination MAC address 0100-0ccc-cccc
and protocol number 0101.
<HUAWEI> system-view
[HUAWEI] bpdu dmac 0100-0ccc-cccc eth-type 0101 action encapsulate
Function
The bpdu mac-address command sets the MAC address of BPDUs.
NOTE
By default, the S2720 and S2750 does not process packets destined for the MAC address 0100-0ccc-
cccc as BPDUs.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
bpdu mac-address mac-address [ mac-address-mask ]
undo bpdu mac-address mac-address [ mac-address-mask ]
Parameters
Parameter Description Value
mac-address [ mac-address- Specifies the MAC address The first digit of the MAC
mask ] and mask of BPDUs. address must be 0 and the
second digit must be an odd
number, for example,
03XX-XXXX-XXXX and
0fXX-XXXX-XXXX.
The mask of the MAC
address must consist of
consecutive fs and 0s, for
example, ffff-ffff-ff00 and
ffff-fff0-0000.
NOTE
l To enable the device to
forward packets destined
for 0100-0ccc-cccc by
using hardware, run the
undo bpdu mac-address
command to cancel the
BPDU MAC address
configuration.
l Only addresses of
0100-0ccc-cccc
0100-0ccc-cccd and
0118-8255-5555 can be
configured as BPDU MAC
addresses on the
S1720GFR, S2720, S2750,
S5700LI, S5700S-LI,
S5710-X-LI, S5720SI, and
S5720S-SI.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
A Bridge Protocol Data Unit (BPDU) uses a special reserved multicast MAC address. An
interface can send and receive BPDUs regardless of whether the interface is blocked. By
default, the switch does not forward BPDUs at Layer 2.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
NOTE
Sometimes, bridge protocol packets of the devices from other vendors need to be processed as BPDUs. You
can set the MAC address of such packets to the MAC address of BPDUs.
Example
# Set the MAC address of BPDUs to 0100-0ccc-cccd.
<HUAWEI> system-view
[HUAWEI] bpdu mac-address 0100-0ccc-cccd
Related Topics
5.17.5 display bpdu mac-address
Function
The bpdu-tunnel stp bridge role provider command configures the switch as a provider on
the network.
The undo bpdu-tunnel stp bridge role provider command configures the switch as a
customer on the network.
Product Support
Format
bpdu-tunnel stp bridge role provider
Parameters
None
Views
System view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
If the switch is configured as a customer, the well-known destination MAC address of the
transmitted BPDU packets is 01-80-C2-00-00-00.
If the switch is configured as a provider, the well-known destination MAC address of the
transmitted BPDU packets is 01-80-C2-00-00-08. The provider directly forwards the BPDU
packets created by the customer, instead of sending the packets to the CPU.
If the bpdu-tunnel stp bridge role provider and l2protocol-tunnel commands are
configured simultaneously, the l2protocol-tunnel command preferentially takes effect.
Example
# Configure the switch as a provider on the network.
<HUAWEI> system-view
[HUAWEI] bpdu-tunnel stp bridge role provider
Related Topics
5.17.12 l2protocol-tunnel group-mac
Function
The display bpdu mac-address command displays the MAC addresses of BPDUs.
Format
display bpdu mac-address
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
A Bridge Protocol Data Unit (BPDU) uses a special reserved multicast MAC address. An
interface can send and receive BPDUs regardless of whether the interface is blocked. By
default, the switch does not forward BPDUs at Layer 2.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Sometimes, bridge protocol packets of the devices from other vendors need to be processed as
BPDUs. You can set the MAC address of such packets to the MAC address of BPDUs.
This command displays the MAC addresses of BPDUs.
Example
# Display the MAC addresses of BPDUs.
<HUAWEI> display bpdu mac-address
Remaining configurable number: 126
----------------------------------------------------------------------------
(001) 0100-0ccc-cccc (002) 0100-0ccc-cccd
Remaining configurable Number of remaining MAC addresses that you can specify for
number BPDUs.
Related Topics
5.17.3 bpdu mac-address
Function
The display bpdu-tunnel global config command displays the role of a device on the
network and the multicast MAC address of STP BPDUs.
Product Support
Format
display bpdu-tunnel global config
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To check the role of a device on the network and the multicast MAC address of STP BPDUs,
you can use the display bpdu-tunnel global config command.
Example
# Display the role of a device on the network and multicast MAC address of STP BPDUs.
<HUAWEI> display bpdu-tunnel global config
BridgeRole customer
GroupMac 0100-5e00-0011
Table 5-109 Description of the display bpdu-tunnel global config command output
Item Description
BridgeRole Device role on a network. The roles are classified into two
types:
l Customer: The well-known destination MAC address of
the BPDUs generated by the customer is 01-80-
C2-00-00-00. This is the default type.
l Provider: The well-known destination MAC address of the
BPDUs generated by the provider is 01-80-C2-00-00-08.
Format
display l2protocol-tunnel group-mac { all | protocol-type | user-defined-protocol protocol-
name }
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring Layer 2 protocol transparent transmission, you can run this command to
check transparent transmission information about all standard Layer 2 protocols or a specified
Layer 2 protocol.
Example
# Display transparent transmission information about the STP protocol.
<HUAWEI> display l2protocol-tunnel group-mac stp
Protocol EncapeType ProtocolType Protocol-MAC Group-MAC Pri
----------------------------------------------------------------------------------
--------
stp llc dsap 0x42 0180-c200-0000 0100-0ccd-cdd0 0
ssap 0x42
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Description
Related Topics
5.17.10 l2protocol-tunnel
Format
display l2protocol-tunnel statistics interface-type interface-number [ { protocol-type }
&<1-15> | user-defined-protocol protocol-name ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring Layer 2 protocol transparent transmission, you can run this command to
view statistics about transparently transmitted packets of a specified Layer 2 protocol. The
command output includes:
According to the output information, you can collect traffic statistics and locate faults on the
interface.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Display statistics about transparently transmitted STP and HGMP protocol packets.
<HUAWEI> display l2protocol-tunnel statistics GigabitEthernet 0/0/1 stp hgmp
-------------------------------------------------------------------
Port Protocol Drop Input Output Drop
Threshold Packets Packets Packets
-------------------------------------------------------------------
GE0/0/1 stp 100 12345 67890 1235
Item Description
Related Topics
5.17.15 reset l2protocol-tunnel statistics
Function
The display snmp-agent trap feature-name l2bptnl all command displays all trap messages
of the Layer 2 tunneling module.
Format
display snmp-agent trap feature-name l2bptnl all
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the trap function of a specified feature is enabled, you can run the display snmp-agent
trap feature-name l2bptnl all command to check the status of all traps of l2bptnl. You can
use the snmp-agent trap enable feature-name l2bptnl command to enable the trap function
of l2bptnl.
Prerequisites
Example
# Display all trap messages of the Layer 2 tunneling module.
<HUAWEI>display snmp-agent trap feature-name l2bptnl all
------------------------------------------------------------------------------
Feature name:
L2BPTNL
Trap number :
2
------------------------------------------------------------------------------
on
on
hwL2ProtocolTunnelDropThresholdFalling
on
on
Table 5-112 Description of the display snmp-agent trap feature-name l2bptnl all command
output
Item Specification
Feature name Name of the module that the trap belongs to.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Item Specification
Related Topics
5.17.16 snmp-agent trap enable feature-name l2bptnl
5.17.10 l2protocol-tunnel
Function
The l2protocol-tunnel enable command enables Layer 2 protocol transparent transmission
on an interface.
Format
l2protocol-tunnel { all | { protocol-type } &<1-15> | user-defined-protocol protocol-name }
enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Layer 2 protocol transparent transmission is often configured on an interface connecting the
PE and CE. After Layer 2 protocol transparent transmission is enabled, Layer 2 protocol
packets received from the user network need to be sent to the CPU and the destination MAC
address in the packets needs to be replaced. On the ISP network, Layer 2 protocol packets are
directly forwarded.
The l2protocol-tunnel vlan and l2protocol-tunnel commands cannot specify the same
protocol type on the same interface; otherwise, the configurations conflict.
Before specifying a user-defined protocol in the l2protocol-tunnel enable command, run the
l2protocol-tunnel user-defined-protocol command to define characteristic information about
the Layer 2 protocol.
STP packets have a default group MAC address for replacing the original destination MAC
address. For packets of other Layer 2 protocols, you need to configure a global group MAC
address to replace the destination MAC address. For details, see l2protocol-tunnel group-
mac.
Example
# Configure GE0/0/1 to transparently transmit STP BPDUs.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp disable
[HUAWEI-GigabitEthernet0/0/1] l2protocol-tunnel stp enable
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Related Topics
5.17.14 l2protocol-tunnel vlan
Format
l2protocol-tunnel drop-threshold rate [ { protocol-type } &<1-15> | user-defined-protocol
protocol-name ]
undo l2protocol-tunnel drop-threshold [ { protocol-type } &<1-15> | user-defined-
protocol protocol-name } ]
undo l2protocol-tunnel drop-threshold rate { protocol-type | user-defined-protocol
protocol-name }
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
protocol-type Specifies the type of a Layer The protocol type can be:
2 protocol. The interface l Spanning Tree Protocol
discards excess packets of (STP)
this type of protocol when
the rate of these packets l Link Aggregation
exceeds the drop threshold. Control Protocol (LACP)
NOTE l Ethernet Operation,
You can specify multiple Administration, and
protocols in the command. Maintenance 802.3ah
(EOAM3ah)
l Link Layer Discovery
Protocol (LLDP)
l Generic VLAN
Registration Protocol
(GVRP)
l Generic Multicast
Registration Protocol
(GMRP)
l HUAWEI Group
Management Protocol
(HGMP)
l VLAN Trunking
Protocol (VTP)
l Unidirectional Link
Detection (UDLD)
l Port Aggregation
Protocol (PAGP)
l Cisco Discovery
Protocol (CDP)
l Per VLAN Spanning
Tree Plus (PVST+)
l Shared Spanning Tree
Protocol (SSTP)
l Dynamic Trunking
Protocol (DTP)
l Device Link Detection
Protocol (DLDP)
You can select one or more
Layer 2 protocols.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
After enabling Layer 2 protocol transparent transmission on an interface, you can run the
l2protocol-tunnel drop-threshold command on this interface to set the drop threshold of
protocol packets.
After Layer 2 protocol transparent transmission is enabled and the drop threshold of Layer 2
protocol packets is set on an interface, the interface drops excess Layer 2 protocol packets
when the drop threshold is exceeded. If the trap function is enabled, the device sends a trap
message to the NMS to notify the network administrator.
When using the l2protocol-tunnel drop-threshold command, pay attention to the following
points:
l If no Layer 2 protocol is specified, the drop threshold applies to all Layer 2 protocol
packets that need to be transparently transmitted.
l If a Layer 2 protocol is specified, the interface discards excess packets of the protocol
when the rate of these packets exceeds the drop threshold.
l If you run this command without specifying a protocol, and then run the command with a
specified protocol, the drop threshold that you set the second time takes effect.
Example
# Set the drop threshold of STP packets that are transparently transmitted on GE0/0/1 to 10
pps.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] l2protocol-tunnel drop-threshold 10 stp
Related Topics
5.17.8 display l2protocol-tunnel statistics
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
l2protocol-tunnel protocol-type group-mac { group-mac | default-group-mac }
undo l2protocol-tunnel protocol-type
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Parameters
Parameter Description Value
protocol-type Specifies the type of a Layer The protocol type can be:
2 protocol. l Spanning Tree Protocol
(STP)
l Link Aggregation
Control Protocol (LACP)
l Ethernet Operation,
Administration, and
Maintenance 802.3ah
(EOAM3ah)
l Link Layer Discovery
Protocol (LLDP)
l Generic VLAN
Registration Protocol
(GVRP)
l Generic Multicast
Registration Protocol
(GMRP)
l HUAWEI Group
Management Protocol
(HGMP)
l VLAN Trunking
Protocol (VTP)
l Unidirectional Link
Detection (UDLD)
l Port Aggregation
Protocol (PAGP)
l Cisco Discovery
Protocol (CDP)
l Per VLAN Spanning
Tree Plus (PVST+)
l Shared Spanning Tree
Protocol (SSTP)
l Dynamic Trunking
Protocol (DTP)
l Device Link Detection
Protocol (DLDP)
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Layer 2 protocols running between user networks, such as MSTP, HGMP, and LACP, must
traverse a backbone network to perform Layer 2 protocol calculation.
Generally, the destination MAC addresses in Layer 2 protocol packets of the same Layer 2
protocol are the same. For example, the MSTP PDUs are BPDUs with the destination MAC
address 0180-C200-0000. Therefore, when a Layer 2 protocol packet reaches an edge device
on a backbone network, the edge device cannot identify whether the Layer 2 protocol packet
comes from a user network or the backbone network and sends the Layer 2 protocol packet to
the CPU to calculate a spanning tree. As a result, the user network devices calculate a
spanning tree with backbone network edge devices but not with user network devices.
Precautions
When configuring Layer 2 protocol transparent transmission, do not use the following
multicast MAC addresses to replace the destination MAC address of Layer 2 protocol
packets:
NOTE
Do not replace the destination MAC addresses of STP, GVRP, and GMRP packets with the same
multicast MAC address.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Example
# Configure a device to replace the destination MAC address of STP packets with
0100-0100-0100 before tunneling the STP BPDUs.
<HUAWEI> system-view
[HUAWEI] l2protocol-tunnel stp group-mac 0100-0100-0100
Related Topics
5.17.10 l2protocol-tunnel
Function
The l2protocol-tunnel user-defined-protocol command defines characteristic information
about a user-defined Layer 2 protocol, including the protocol name, Ethernet encapsulation
format, destination MAC address, and MAC address that replaces the destination MAC
address of Layer 2 protocol packets.
Format
l2protocol-tunnel user-defined-protocol protocol-name protocol-mac protocol-mac
[ encap-type { { ethernetii | snap } protocol-type protocol-type-value | llc dsap dsap-value
ssap ssap-value } ] group-mac { group-mac | default-group-mac }
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
dsap dsap-value Specifies the destination The value ranges from 0x00
service access point. to 0xff, in hexadecimal
format.
ssap ssap-value Specifies the source service The value ranges from 0x00
access point. to 0xff, in hexadecimal
format.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When Layer 2 protocol packets with a specified multicast destination MAC address need to
be transparently transmitted on an ISP network, you can define characteristic information
about the Layer 2 protocol on devices on the ISP network.
When configuring Layer 2 protocol transparent transmission, do not use the following
multicast MAC addresses to replace the destination MAC address of Layer 2 protocol
packets:
Example
# Define a Layer 2 protocol named huawei. Set the destination MAC address of its packets to
0180-c200-0022 and use multicast MAC address 0100-5e00-0012 to replace the destination
MAC address of its packets.
<HUAWEI> system-view
[HUAWEI] l2protocol-tunnel user-defined-protocol huawei protocol-mac 0180-
c200-0022 group-mac 0100-5e00-0012
Related Topics
5.17.10 l2protocol-tunnel
5.17.14 l2protocol-tunnel vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
l2protocol-tunnel { all | { protocol-type } &<1-15> | user-defined-protocol protocol-name }
vlan { low-id [ to high-id ] } &<1-10>
undo l2protocol-tunnel { all | { protocol-type } &<1-15> | user-defined-protocol protocol-
name } vlan { low-id [ to high-id ] } &<1-10>
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
high-id Specifies the end VLAN ID. The value is an integer that
ranges from 1 to 4094. The
value must be greater than
the start VLAN ID.
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
After a user-side interface of a PE on an ISP network is enabled to transparently transmit
Layer 2 protocol packets, the interface directly forwards Layer 2 protocol packets sent from a
user network instead of sending the packets to the CPU. In this way, Layer 2 protocol packets
are transparently transmitted through the ISP network.
The l2protocol-tunnel vlan and l2protocol-tunnel commands cannot specify the same
protocol type on the same interface. Otherwise, the configurations conflict.
Before specifying a user-defined protocol in the l2protocol-tunnel vlan command, run the
l2protocol-tunnel user-defined-protocol command to define characteristic information about
the Layer 2 protocol.
STP packets have a default MAC address for replacing the original destination MAC address.
For packets of other Layer 2 protocols, you need to configure a global group MAC address to
replace the destination MAC address. For details, see l2protocol-tunnel group-mac.
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
In addition, the VLAN specified in the command must be the static VLAN, but not the VLAN
dynamically created by GVRP or VCMP.
If the l2protocol-tunnel vlan command is run more than once, all configurations take effect.
Example
# Enable GE0/0/1 to transparently transmit LACP packets with VLAN tags ranging from 100
to 200.
<HUAWEI> system-view
[HUAWEI] vlan batch 100 to 200
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 to 200
[HUAWEI-GigabitEthernet0/0/1] l2protocol-tunnel lacp vlan 100 to 200
Related Topics
5.17.10 l2protocol-tunnel
Function
The reset l2protocol-tunnel statistics command clears statistics about Layer 2 protocol
packets that are transparently transmitted on an interface.
Format
reset l2protocol-tunnel statistics interface-type interface-number [ { protocol-type }
&<1-15> | user-defined-protocol protocol-name ]
Parameters
Parameter Description Value
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
User view
Default Level
3: Management level
Usage Guidelines
To collect statistics about Layer 2 protocol packets transparently transmitted on an interface in
a specified period, you must reset original statistics on the interface.
When using the reset l2protocol-tunnel statistics command, pay attention to the following
points:
l If you specify an interface but do not specify any protocol, statistics about all Layer 2
protocol packets on the interface are reset.
l If you specify an interface and a protocol, statistics about packets of the specified
protocol are reset.
NOTE
Statistics about Layer 2 protocol packets cannot be restored after being deleted. Confirm your action
before you use this command.
Example
# Reset statistics about all Layer 2 protocol packets on GE0/0/1.
<HUAWEI> reset l2protocol-tunnel statistics gigabitethernet 0/0/1
Related Topics
5.17.8 display l2protocol-tunnel statistics
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Format
snmp-agent trap enable feature-name l2bptnl [ trap-name
{ hwl2protocoltunneldropthresholdfalling | hwl2protocoltunneldropthresholdraising } ]
undo snmp-agent trap enable feature-name l2bptnl [ trap-name
{ hwl2protocoltunneldropthresholdfalling | hwl2protocoltunneldropthresholdraising } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Usage Guidelines
When the trap function is enabled, the device generates traps during running and sends traps
to the NMS through SNMP. When the trap function is not enabled, the device does not
generate traps and the SNMP module does not send traps to the NMS.
You can specify trap-name to enable the trap function for one or more events.
Example
# Enable the alarm to be generated when the number of discarded protocol packets on the
Layer 2 protocol transparent transmission-enabled interface exceeds the threshold.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name l2bptnl trap-name
hwl2protocoltunneldropthresholdraising
Related Topics
5.17.9 display snmp-agent trap feature-name l2bptnl all
Function
The stp bpdu vlan command configures the STP packets sent from an interface to contain the
specified VLAN ID.
By default, the STP packets sent from an interface do not contain VLAN IDs.
Format
stp bpdu vlan vlan-id
Parameters
Parameter Description Value
Views
Ethernet interface view, GE interface view, XGE interface view, 40GE interface view,
MultiGE interface view, port group view, Eth-Trunk interface view
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Default Level
2: Configuration level
Usage Guidelines
When multiple user networks connect to the interfaces of the same PE, the PE interface needs
to distinguish STP packets from different user networks. In this case, you need to configure
the STP packets sent from each CE interface to contain the specified VLAN ID. In addition,
the STP packets sent to the CE interface must also contain the specified VLAN ID.
On the CE interface, run the stp bpdu vlan vlan-id command to configure the STP packets
sent to the PE to contain the specified VLAN ID. On the PE interface connected to the CE,
run the l2protocol-tunnel vlan command to enable the STP packets with the specified VLAN
ID to traverse the ISP network.
Before running the stp bpdu vlan command on a CE interface, ensure that the CE interface
has been added to the specified VLAN.
The stp bpdu vlan command is usually configured on the network interface of the CE.
Example
# Configure the STP packets sent from GE0/0/1 to contain VLAN ID 100.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 100
[HUAWEI-GigabitEthernet0/0/1] stp bpdu vlan 100
Related Topics
5.17.14 l2protocol-tunnel vlan
Function
The stp snooping enable command enables STP snooping.
Format
stp snooping enable
Parameters
None
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4
e-DOC 2D5809B4-e
Proc 13409/2016
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After you run the l2protocol-tunnel command to enable transparent transmission of Layer 2
protocol packets on untagged interfaces or the l2protocol-tunnel vlan command to enable
transparent transmission of Layer 2 protocol packets on tagged interfaces, the untagged or
tagged interfaces directly forward Layer 2 protocol packets sent from user networks over the
ISP network but not send them to the CPU for processing. When a device enabled with Layer
2 protocol transparent transmission receives TC packets, the device clears the MAC entries
and ARP entries and updates the forwarding table after the stp snooping enable command is
executed.
Example
# Enable STP snooping.
<HUAWEI> system-view
[HUAWEI] stp snooping enable
Related Topics
5.17.10 l2protocol-tunnel
5.17.14 l2protocol-tunnel vlan
Documento assinado digitalmente. Para verificar as assinaturas, acesse www.tc.df.gov.br/autenticidade e informe o edoc 2D5809B4