02 Interface
02 Interface
1Interface Basis
1.1 Overview
The interfaces can be classified into physical interface and logical interface. The
physical interface includes Ethernet interface, E1 interface, CE1 interface, 3G
interface,and 4G interface. The logical interface includes Ethernet subinterface,
aggregation group interface, VLAN interface, loopback interface, null interface, and
tunnel interface.
z Physical interface
The physical interfaces can be classified into fast Ethernet interface and slow WAN
interface. Ethernet, characterized with highly flexible, relatively simple, and easy to
realize, currently has become a most important LAN networking technology. The WAN
interfaces are classified into E1 interface, CE1 interface, and
synchronous/asynchronous serial interface. These interfaces can capsulate WAN link
protocols such as HDLC and PPP. The device supports the following physical
interfaces:
L2 Ethernet interface: also called port, is a physical interface. It works in layer 2, the
data link layer. It only switches and forwards the received packets in layer 2.
L3 Ethernet interface: is a physical interface. It works in the network layer and can
configure the IP address. It forwards the received packets in layer 3. That is, it can
receives and transmits packets with the source IP address and destination IP address
in the different network segment.
E1 interface: is a physical interface. It works in the physical layer. The highest rate 2
Mbps can be divided into 32 timeslots. It can transmit different data via TDM.
CE1 interface: is a physical interface. It works in the physical layer. The 2 Mbps E1 line
is divided into 1 to 31 timeslots, providing 31 logical channels. Each channel is 64 kbps.
Timeslot 0 transmits the signaling, which means that complete transparent
transmission is impossible. Other 31 timeslots are used for data transmission.
Version 1.0
FALCON
z Logical interface
The logical interface does not exist physically but it can achieve data switching,
interacting, and forwarding. The device supports the following logical interfaces:
L3 Ethernet subinterface: is a logical interface. It works in the network layer and can
configure the IP address and handle the L3 protocol. The VLAN tagged packets are
received and transmitted on the L3 Ethernet interface. Users can configure multiple
subinterfaces on one Ethernet interface. Therefore, packets from different VLANs can
be forwarded from different subinterfaces, providing high flexibility for users.
VLAN interface: is a logical interface. It is bound with VLAN and forwards the packet
between different VLANs.
loopback interface: is a logical interface. For the packets sent to the loopback interface,
the device regards that the packets are sent to itself, so it does not forward the packets.
Null interface: is a logical interface. Any packet sent to null interface is dropped.
Tunnel interface: is a logical interface, providing the transmission link for the
point-to-point mode.
Version 1.0
FALCON
For different interfaces, there are corresponding configuration modes. The related
configuration modes of the interfaces include:
This chapter mainly describes the common function configuration of various interfaces.
For the featured function configuration of various interfaces, refer to the corresponding
interface chapter.
Configuration Task
Configure the interface Configure the interface status SNMP proxy concern layer
status SNMP proxy
concern layer
Version 1.0
FALCON
Configuration Condition
None
z If a logical interface is not created, the preceding command will be used to create
the logical interface and then enter its configuration mode.
Enable/Disable Interface
Version 1.0
FALCON
z The null interface does not support the function of disabling the interface.
The MTU configured on the interface takes effect at the same time for the ingress and
egress packets, and the set values are the same. When the length of the received and
sent packets exceeds the set value, the packets are dropped directly.
In contrast, the MTU configured on L3 Ethernet interface only takes effect for the
egress packets. When the length of the sent packet exceeds the set value, the packet
first performs the IP fragmenting, making the length of the fragmented packet not
exceed the set value, and then send it out.
Version 1.0
FALCON
configuration mode
z The null interface, loopback interface, tunnel interface, and aggregation group
interface do not support the MTU configuration.
z The MTU value of the tunnel interface varies with MTU value of the egress
interface.
z The actual valid port MTU is the multiples of 4 bytes. If the setting value is not the
multiples of 4 bytes, the actual valid MTU = (setting value / 4) x 4. For example, if the
set MTU is 1501 bytes, the actual valid MTU is 1500 bytes. If the length of the frame
received and transmitted by the port exceeds the set MTU, the frame is dropped
directly.
Users can describe the interface through configuring the interface description
information.
Version 1.0
FALCON
configuration mode
z The null interface does not support the function of configuring the interface
description.
The interface logical bandwidth affects the routing costs and QoS calculation, which
does not affect the interface physical bandwidth. Generally, when the interface is
connected to the WAN, it is recommended that the interface logical bandwidth and the
actual bandwidth of the leased line be consistent.
Version 1.0
FALCON
z The interface logical bandwidth does not vary with the rate negotiated at the
physical layer. For example, the gigabit-Ethernet port negotiates a rate as 100 M. The
logical bandwidth still remains at the default value 1,000,000 kbps.
z The default logical bandwidth varies for different interface types. You can run the
show interface interface-name command to check.
z The null interface, aggregation group interface, and L2 Ethernet interface do not
support the function of configuring the logical bandwidth.
The interface delay configuration affects the calculation of the IRMP routing protocol
cost, but does not affect the actual transmission delay of the interface. Users can
change the cost of the routing protocol by configuring the interface delay.
Version 1.0
FALCON
z The default delay value varies for different interface types. You can run the show
interface interface-name command to check.
z The null interface, aggregation group interface, and L2 Ethernet interface do not
support the function of configuring the delay.
The device measures the interface traffic regularly. Users can change the statistics
interval of the interface traffic by manual configuration.
Version 1.0
FALCON
aggregation group
interface.
z The null interface does not support the function of configuring the statistics interval
of the interface traffic.
Configuration Condition
Before configuring the interface group function, first complete the following task:
Version 1.0
FALCON
z The interface types in the interface group should be the same. The user can
configure multiple interface groups as desired.
z The user can configure the commands supported by all types of interfaces in the
interface group, but if the interfaces covered by the interface group do not support, the
commands do not take effect and there may be no error prompt. Please check
whether the commands take effect by viewing the configuration.
z If the interface group covers the logical interface and when the logical interface is
deleted, the logical interface in the interface group is also deleted automatically.
In fact, the interface UP/DOWN status has two layers of status in the system. One is
the L2 link layer status and the other is L3 protocol layer status. You can adopt the
show ip interface brief command to view. Usually, the two status vary with the
physical interface UO/DOWN, but when configuring keepalive gateway on the Ethernet
interface, the L3 prototcol layer status is controlled by the keepalive detection status.
If the SNMP proxy function is enabled on the device, the network management server
can get the interface status information via the public mib. If SNMP Trap is enabled, the
interface status change information can be sent to the network management server.
With the function command, you can set the SNMP proxy concerned interface status
layer. By default, the SNMP procy concerned interface status layer is L2 link layer, but
to make the interface status displayed by the network management server be
consistent with the keepalive detection status when keepalive gateway is configured on
the Ethernet interface, it is necessary to set the SNMP proxy concerned interface
status is the L3 protocol layer. Therefore, in the environment enabled with keepalive
detection (such as MSTP WAN line environment), it is suggested to configure
link-status-care l3.
Version 1.0
FALCON
Configuration Condition
None
Table 1-9 Configure the interface status SNMP proxy concerned layer
Command Description
Version 1.0
FALCON
2Ethernet Interface
2.1 Overview
Ethernet adopts the CSMA/CD media access mechanism, enabling any workstation to
access the network at any time. Before transmitting data, the workstation first
monitors whether the network is available. If no data is transmitted on the network, the
workstation sends the information to be transmitted to the network. Ethernet,
characterized with highly flexible, relatively simple, and easy to realize, currently has
become a most important network technology.
The ten gigabit Ethernet standard is contained in the complementary standard IEEE
802.3ae of the IEEE802.3. It extends the IEEE 802.3 protocol and MAC standard,
enabling them to support the 10 Gb/s transmission rate. In addition, through the WIS
(WAN interface sublayer), the 10 gigabit Ethernet can be adjusted to a low
transmission rate, which requires that the transmission format of the 10 gigabit
Ethernet device and of the SONET (synchronous optic network) STS -192c are
compatible.
The Ethernet interfaces are classified into L2 Ethernet interface and L3 Ethernet
interface.
Version 1.0
FALCON
Data frame forwarding: According to the MAC address (that is physical address) of the
data frame, forward the data frame. Ethernet interface can only perform the L2
switching forwarding for the received packets, that is, can only receive and send the
packets whose source IP and destination IP are at the same segment.
MAC address learning: Construct and maintain the MAC address table, used to
support forwarding the data frames.
According to the maximum rate supported by the port, the ports can be divided to the
following three types:
According to the media type of the port, the port type can be divided to copper
(electrical port) and fiber (optical port).
Configuration Task
Version 1.0
FALCON
Configuration Task
Configuration Condition
None
One is to set the fixed rate according to the port rate capability set. The optional
Version 1.0
FALCON
The other is to set the rate as auto (auto-negotiation), specifying that the rate is
negotiated by the local end and the peer port.
Similarly, the port duplex mode can be set in the following two methods:
One is to set the duplex mode according to the capability set of the port duplex mode.
The optional parameters include full (full-duplex mode), indicating that the port can
send packets when receiving the packets; half (half-duplex mode), indicating that the
port can only receive or send packets at one moment, but cannot perform at the same
time;
The other is to set the duplex mode as auto (auto-negotiation), indicating that the
duplex mode is negotiated automatically by the local end and the peer port.
Table 2-2 Configure the rate and duplex mode of the port
Version 1.0
FALCON
Table 2-3 Configure the switching of Ethernet fiber and electrical modes
Configuration Condition
None
Version 1.0
FALCON
z The MAC address is 48 bytes. The preceding command can be only used to set the
unicast MAC address. The MAC address of the interface cannot be set to all 0,
broadcast address, or multicast address.
Table 2-5 Configure the automatic negotiation of the optical Ethernet interface mode
To configure on the specified port, first enter the L2 Ethernet interface configuration
mode of the port and then execute the corresponding configuration command.
Version 1.0
FALCON
z The naming rule of the port number is S/P (Slot/Port). Slot indicates the slot on the
device, numbered from 0. If there is fixed port, slot 0 is reserved for the fixed port. The
service slot is numbered from 1. Port indicates the physical port on the device or
service card. The port on each device and service card is numbered from 1.
z The naming rule of the port name interface-name is port type + port number. For
example, fastethernet0/1 indicates the fixed port numbered 1 and the type is 100 M
port.
Version 1.0
FALCON
We can send and receive signals only after connecting the local end and the peer port.
Therefore, the MDIX mode is used with connection cables.
The cables connecting ports are divided to two types: straight-through cable and
crossover cable. To support the two types of cables, provide three kinds of MDIX
modes: normal, cross, and auto.
The optical port can only support straight-through cable. Therefore, MDIX mode can
only be set as normal.
The electrical port is formed by eight pins. You can change the roles of the pins by
setting the MDIX mode. When setting as normal, use pin 1 and 2 to send signals, and
pin 3, 6 to receive signals; when setting as cross, use pin 1, 2 to receive signals, pin 3,
6 to send signals; when setting as auto, the local and peer electrical ports
automatically negotiate the functions of the pins by connecting the cables.
When using the straight-through cable, the MDIX modes of the local and peer ports
cannot be the same.
When using crossover cable, the MDIX modes of the local and peer ports should be
the same or at least one is auto.
When the port is blocked and if the head-of-line blocking function is enabled, the
packets causing the block are directly dropped; if the head-of-line blocking function is
disabled, process the packets causing the block according to the configuration of the
port flow control.
Version 1.0
FALCON
When the sending or receiving buffer is full and if the duplex mode of the port is half-duplex,
send the blocking signals back to the source end by the back pressure mode; if the duplex
mode of the port is full-duplex mode, the port informs the source end to stop sending by the
flow control mode.
z When enabling the flow control function, first disable the head-of-line blocking
function; when enabling the head-of-line blocking function, enabling the flow control
function cannot take effect.
Version 1.0
FALCON
z The local flow control can be realized only when the local and peer ends both
enable the flow control function.
When the port changes from Up to Down, first enter the set suppression time period
and the switching of the port status is not felt by the system; and then after the set
suppression time, report the port status change to the system. In this way, we can
avoid the unnecessary running cost caused by the frequent switching of the ports
status in short time.
When disabling or enabling port auto energy-saving, but not connecting cables, the
port inside is always in the polling port state. To reduce the unnecessary energy
consumption, automatically switch to the low energy consumption state when the port
is idle by configuring the port auto energy-saving.
Version 1.0
FALCON
When the port changes from Down to Up and if the port status flap detection is
configured and it meets the detection condition, it is regarded that the status flap
happens to the specified port or called Link-Flap and the port is automatically disabled
and set as Error-Disabled.
z When the port is disabled by the Link-Flap function and set as Error-Disabled and if
it is necessary to recover automatically, you can configure the command errdisable
recovery cause to set the above function.
When performing some troubleshooting, such as locating the port fault initially, you can
enable the port loopback test function. The port enabled with the loopback test function
Version 1.0
FALCON
The port loopback test function includes internal loopback test and external loopback
test.
During internal loopback test, change the internal receiving end and sending end of the
specified port to make the packets sent by the port loopback in the device and received
by the port. If the internal loopback test succeeds, it indicates that the port inside works
normally.
During the external loopback test, first insert one self-loop cable on the port and the
packets sent by the specified port return to the port via the self-loop cable and received
by the port. If the external loopback test succeeds, it indicates that the port works
normally.
Limit the broadcast, multicast or unknown unicast traffic on the port by configuring the
storm suppression parameters. When the broadcast, multicast or unknown unicast
traffic on the port exceeds the set threshold, the system drops the excessive packets,
so as to make the proportion of the broadcast, multicast or unknown unicast traffic on
the port reduce to the limited range and ensure the normal running of the network
services.
Version 1.0
FALCON
When the storm is detected on the specified port and the storm suppression is enabled,
you can select two policies to process the storms on the port:
One is to disable the port and send the alarm information of detecting storm and
disabling the port to the configured log server via trap. In the mode, the port is disabled,
so the port cannot receive the subsequent traffic and the storm on the port is removed
at once.
The other is to send the alarm information of detecting storm to the configured log
server via trap. In the mode, the port is enabled, so the port can receive the
subsequent traffic and the storm on the port cannot be removed.
Version 1.0
FALCON
z When the port is disabled by the storm suppression function and set as
Error-Disabled and it is necessary to recover automatically, you can set the above
function by configuring the command errdisable recovery cause.
Uni port is the connection port between the user device and network; nni port is the
connection interface between networks. On one device, the nni port and uni port or nni
ports are interconnected; uni ports are separated from each other.
By default, all uni ports of one device are separated from each other. However, to
realize the intercommunication between the specified multiple uni ports, but not change
the separation relation between these uni ports and other uni ports, you can configure
the connectivity of the uni port.
When configuring the connectivity on the specified uni port, you can only set whether
the uni port can forward packets to other uni ports, not affecting whether other uni ports
can forward packets to the specified uni port. Therefore, to realize the
intercommunication among multiple uni ports, you should configure as community on
these uni ports respectively.
Version 1.0
FALCON
Command Description
clear interface { interface-list | switchport } Clear the packet and traffic statistics
information of the port
statistics
show interface interface-list statistics Display the packet and traffic statistics
information of the port
show interface switchport statistics [ packet Display the packet and traffic statistics
information of all ports on the device
| rate ]
show optical { all | interface interface-list } Display the information of the optical
[ detail ] module inserted on the Ethernet port
Version 1.0
FALCON
Command Description
show port-type [ interface-list | { uni | nni } Display the UNI/NNI attribute information
[ interface interface-list ] ] of the port
Network Requirements
z Configure the storm suppression function on the port of Device to suppress the
broadcast, unknown unicast and multicast packets, realizing that PC2 can access
Internet normally when PC1 sends lots of broadcast, unknown unicast and
multicast packets.
Network Topology
Configuration Steps
Version 1.0
FALCON
#Configure the link type of port fastethernet0/3 on Device as Trunk, permitting the
services of VLAN2 to pass.
Device(config)#interface fastethernet 0/3
Device(config-if-fastethernet0/3)#switchport mode trunk
Device(config-if-fastethernet0/3)#switchport trunk allowed vlan add 2
Device(config-if-fastethernet0/3)#exit
#Adopt bps limitation mode to suppress the broadcast, unknown unicast and multicast
packets on port fastethernet0/1 and the suppression rate is 1024 kbps.
Device(config)#interface fastethernet 0/1
Device(config-if-fastethernet0/1)#storm-control broadcast bps 1024
Device(config-if-fastethernet0/1)#storm-control unicast bps 1024
Device(config-if-fastethernet0/1)#storm-control multicast bps 1024
Device(config-if-fastethernet0/1)#exit
#When PC1 sends lots of broadcast, unknown unicast and multicast packets, PC2 also
can access Internet normally.
Version 1.0
FALCON
Aggregation group interface is one logical interface. When enabling the link
aggregation function on multiple ports, the multiple ports with the same link
aggregation feature form the aggregation group and are abstracted to aggregation
group interface; meanwhile, the multiple ports with the same attribute are called the
member ports of the aggregation group. It is mainly used to expand the link bandwidth
and improve the connection reliability.
Configuration Task
Configure the basic functions of Enter the aggregation group configuration mode
the aggregation group interface
Configuration Condition
None
Version 1.0
FALCON
z Before entering the specified aggregation group configuration mode, first create the
corresponding aggregation group.
Command Description
Version 1.0
FALCON
4VLAN Interface
4.1 Overview
VLAN interface is one logical interface, used to be bound with VLAN and complete the
packet forwarding between different VLANs. One VLAN can only be bound to one
VLAN interface. One VLAN interface also can only be bound with one VLAN.
Configuration Task
Configuration Condition
None
Version 1.0
FALCON
z There is no order requirement for creating VLAN interface, creating VLAN and
adding physical port to VLAN.
z For how to create a VLAN and add the physical port to the VLAN, refer the VLAN
chapter in the configuration manual.
Command Description
show interface vlan vlan-id original Display the statistics information of the
statistics
specified VLAN interface
Network Requirements
Network Topology
Configuration Steps
Version 1.0
FALCON
# Create VLAN2 interface on Device whose IP address is 1.1.1.1 and subnet mask is
255.255.255.0; create VLAN3 interface whose IP address is 2.1.1.1 and subnet mask
is 255.255.255.0.
Device(config)#interface vlan 2
Device(config-if-vlan2)#ip address 1.1.1.1 255.255.255.0
Device(config-if-vlan2)#exit
Device(config)#interface vlan 3
Device(config-if-vlan3)#ip address 2.1.1.1 255.255.255.0
Device(config-if-vlan3)#exit
Version 1.0
FALCON
Type: ETHERNET_CSMACD
Internet address: 2.1.1.1/24
Broadcast address: 2.1.1.255
Queue strategy: FIFO , Output queue: 0/1 (current/max packets)(0)
Metric: 0, MTU: 1500, BW: 100000 Kbps, DLY: 100 usec, VRF: global
Reliability 255/255, Txload 1/255, Rxload 1/255
Ethernet address is 0045.1023.0032
5 minutes input rate 0 bits/sec, 0 packets/sec
5 minutes output rate 0 bits/sec, 0 packets/sec
0 packets received; 1 packets sent
0 multicast packets received
1 multicast packets sent
0 input errors; 0 output errors
0 collisions; 0 dropped
Unknown protocol 0
Version 1.0
FALCON
5E1 Interface
5.1 Overview
With the emerging of the PCM (Pulse Code Modulation), the TDM (Time Division
Multiplexing) has been extensively applied in the digital communication system.
Currently, two TDM systems exist in the digital communication system. One is the E1
system recommended by ITU-T, which is extensively applied in Europe and China. The
other is the T1 system recommended by ANSI, which is mainly applied in North
America and Japan. The T1 rate is 1.544 Mbit/s and the E1 rate is 2.048 Mbit/s.
PCM coding theory and rule: The PCM digital interface uses the G.703 standard,
performing asymmetric or symmetric transmission via the 75 Ω coaxial cables or 120 Ω
twisted-pair cables. HDB3 codes containing timing relationship are the transmission
codes. The receiving end recovers the timing by decoding and achieves clock
synchronization.
The E1 interface follows the G.703 unframed structure standard. All 2.048 Mbit/s
bandwidth are used for data transmission. When the E1 interface is used for the frame
structure, it can be used for G.704 CCS structure and G.704 CAS structure. G.704 CCS
structure TS16 can transmit data, but G.704 CAS structure TS16 transmits signaling,
instead of data. In both G.704 CCS structure and G.704 CAS structure modes, TS0
cannot transmit data. TS16 indicates timeslot 16 on the E1 channel and TS0 indicates
timeslot 0 on the E1 channel.
When the E1 interface is used, all timeslots can be bound as an interface in random.
This logical interface is the same as the synchronous serial port, supporting the link
layer protocol such as PPP and HDLC.
Configuration Task
Version 1.0
FALCON
Configuration Task
Configuration Condition
None
When configuring the E1 framing mode, TS0 is used to transmit frame synchronous
signal, CRC-4, and peer end asynchronous alarm indicator and TS16 is used to
transmit CAS multiframe alignment signal and multiframe peer end asynchronous
alarm indicator. Thus, other 30 timeslots are used to transmit data.
Version 1.0
FALCON
z When configuring the framing mode, the start timeslot number must be greater than
the end timeslot number. Otherwise, the configuration is invalid.
When configuring the E1 framing mode, TS0 is used to transmit frame synchronous
signal, CRC-4, and peer end asynchronous alarm indicator and TS16 is used to
transmit data, that is, the CCS mode. Thus, a total of 31 timeslots on the E1 channel
are used to transmit data.
z When configuring the interface working in the CCS mode, the interface must be in
the framing mode. CCS indicates the common channel signaling and CAS indicates
the channel associated signaling.
Configuration Condition
None
Version 1.0
FALCON
The E1 supports protocols such as PPP and HDLC. The CRC is used to check the data
frame. The following commands can be used to configure data CRC verification
mode.
During the data transmission, both frame synchronization and clock synchronization
must be ensured. Packet loss may occur when the clock is not synchronized.
Therefore, to ensure clock synchronization, a unified clock must be used. One end is
configured with an internal clock and the other end is configured with a line clock. Thus,
a unified clock is ensured on the line.
The E1 is the standard dual-line circuit. One is used to receive data and the other is
Version 1.0
FALCON
used to send data. Meanwhile, two cables are used. One is 75 Ω unbalanced coaxial
cables and the other is 120 Ω balanced twisted-pair cables. The following command
can be used to configure the line matching impedance.
The E1 receiving and transmitting directions are independent without interfering each
other. The E1 adopts the differential transmission mode, which has a stronger ability of
resisting common-mode interference and a transmission distance of 1 km. Because
the clock is extracted from the line clock, an independent clock line is not required. The
E1 line transmits the baseband signal, generally HDB3 (High Density Bipolar 3) codes
or AMI. Both the preceding two codes are ternary return to zero codes.
Version 1.0
FALCON
Different looping modes are used to diagnose the line status. The local loop is used to
diagnose whether exceptions occur to the local device for receiving and transmitting
data. The remote loop is used to diagnose whether exceptions occur to the remote
device for receiving and transmitting data.
z When configuring the interface looping, the interface transmit clock source must be
configured as the internal clock.
Command Description
Version 1.0
FALCON
Network Requirements
z Use a cable to connect the E1 interface of Device1 and Device2. The E1 interface is
configured as the unframed mode by default. The interface encapsulation type is HDLC
to enable the intercommunication between Device1 and Device2.
Network Topology
Configuration Steps
Step 1: Configure the clock mode for the E1 interface. Device1 is configured with an internal
clock and Device2 in configured with an external clock. The external clock is the default
setting, which does not need to be configured manually.
#Configure Device1.
Device1#configure terminal
Device1(config)#interface serial1/0
Device1(config-if-serial1/0)#clock source internal
#Configure Device2.
Device2#configure terminal
Device2(config)#interface serial1/0
#Configure Device1.
Device1(config-if-serial1/0)#ip address 1.0.0.1 255.255.255.0
Device1(config-if-serial1/0)#exit
#Configure Device2.
Device2(config-if-serial1/0)#ip address 1.0.0.2 255.255.255.0
Device2(config-if-serial1/0)#exit
Version 1.0
FALCON
#Ping the IP address of the peer interface serial1/0 on Device1 and can be pinged
through.
Device1#ping 1.0.0.2
Version 1.0
FALCON
Network Requirements
z Use a cable to connect the E1 interface of Device1 and Device2. The E1 interface is
configured as framing CAS mode with timeslot 16 transmitting signaling. The framing
mode is CAS by default. The interface encapsulation type is HDLC to enable the
intercommunication between Device1 and Device2.
Network Topology
Configuration Steps
Step 1: When configuring timeslots of the E1 interface, both Device1 and Device2 use timeslot
from 1 to 20.
#Configure Device1.
Device1#configure terminal
Device1(config)#interface serial1/0
Device1(config-if-serial1/0)#timeslot 1-20
#Configure Device2.
Device2#configure terminal
Device2(config)#interface serial1/0
Device2(config-if-serial1/0)#timeslot 1-20
Step 2: Configure the clock mode for the E1 interface. Device1 is configured with an internal
clock and Device2 in configured with an external clock. The external clock is the default
setting, which does not need to be configured manually.
#Configure Device1.
Device1(config-if-serial1/0)#clock source internal
#Configure Device1.
Device1(config-if-serial1/0)#ip address 1.0.0.1 255.255.255.0
Device1(config-if-serial1/0)#exit
Version 1.0
FALCON
#Configure Device2.
Device2(config-if-serial1/0)#ip address 1.0.0.2 255.255.255.0
Device2(config-if-serial1/0)#exit
# Ping the IP address of the peer interface serial1/0 on Device1 and can be pinged
through.
Device1#ping 1.0.0.2
z When the E1 interface is configured as the framing mode, timeslots used by both
ends must be the same. For example, in the preceding case, Device 1 uses timeslots
from 1 to 20 and Device 2 must also use the timeslots from 1 to 20. Otherwise, the
port cannot be up.
z When the E1 interface is configured as the framing mode, if the E1 interface is in the
CAS mode, then the peer interface must also be configured in the CAS mode.
Otherwise, the interface cannot be up.
Version 1.0
FALCON
Network Requirements
z Use a cable to connect the E1 interface of Device1 and Device2. The E1 interface is
configured as framing CCS mode with timeslot 16 transmitting data. The interface
encapsulation type is HDLC to enable the intercommunication between Device1 and
Device2.
Network Topology
Configuration Steps
Step 1: When configuring timeslots of the E1 interface, both Device1 and Device2 use timeslot
from 1 to 20.
#Configure Device1.
Device1#configure terminal
Device1(config)#interface serial1/0
Device1(config-if-serial1/0)#timeslot 1-20
#Configure Device2.
Device2#configure terminal
Device2(config)#interface serial1/0
Device2(config-if-serial1/0)#timeslot 1-20
#Configure Device1.
Device1(config-if-serial1/0)#ts16
Version 1.0
FALCON
#Configure Device2.
Device2(config-if-serial1/0)#ts16
Step 3: Configure the clock mode for the E1 interface. Device1 is configured with an internal
clock and Device2 in configured with an external clock. The external clock is the default
setting, which does not need to be configured manually.
#Configure Device1.
Device1(config-if-serial1/0)#clock source internal
#Configure Device1.
Device1(config-if-serial1/0)#ip address 1.0.0.1 255.255.255.0
Device1(config-if-serial1/0)#exit
#Configure Device2.
Device2(config-if-serial1/0)#ip address 1.0.0.2 255.255.255.0
Device2(config-if-serial1/0)#exit
Version 1.0
FALCON
# Ping the IP address of the peer interface serial1/0 on Device1 and can be pinged
through.
Device1#ping 1.0.0.2
z When the E1 interface is configured as the framing mode, timeslots used by both
ends must be the same. For example, in the preceding case, Device 1 uses timeslots
from 1 to 20 and Device 2 must also use the timeslots from 1 to 20. Otherwise, the
interface cannot be up.
z When the E1 interface is configured as the framing mode, if the E1 interface is in the
CCS mode, then the peer interface must also be configured in the CCS mode.
Otherwise, the interface cannot be up.
z The encapsulation type of the E1 interface is HDLC by default. Therefore, the
encapsulation type does not need to be configured for the interfaces. Run the show
interface command, it can be observed that Type is set to HDLC. If other WAN
protocols need to be configured (for example, PPP protocol), refer to WAN
protocol-related documentation.
z The typical application of the CCS mode of the E1 interface is as follows: The digital
trunk, as the voice switch, considers the E1 interface as 32 64 kbit/s. However,
timeslot 16 (configurable) is used to transmit data.
Version 1.0
FALCON
6CE1 Interface
6.1 Overview
CE1 means channelized E1. A 2.048Mbit/s E1 is used as multiple 64 kbit/s and its
combination, such as 128 kbit/s and 256 kbit/s. The difference between CE1 and E1
lies in that timeslots cannot be divided for the E1 but can be divided for CE1. CE1 has
a total of 32 timeslot and each timeslot is 64 kbit/s. It can be divided into N x 64 kbit/s.
Timeslot 0 of CE1 is used to transmit synchronous information. CE1 and E1 can be
interconnected, but CE1 must be used as E1 in this case, that is, timeslots cannot be
divided. The link layer supports the link layer protocols such as PPP and HDLC.
Configuration Task
Version 1.0
FALCON
Configuration Condition
None
When configuring the CE1 framing mode, CE1 at this time is the E1 in the CCS mode.
But the difference between CE1 and E1 lies in that timeslots of CE1 can be divided into
multiple channels to transmit data independently. The E1 can be only divided into one
channel, but this channel has a bandwidth of N x 64 kbit/s. However, the CE1 can be
divided into multiple N s 64 kbit/s.
z When configuring the framing mode, the start timeslot number must be smaller than
the end timeslot number. Otherwise, the configuration is invalid.
z If a timeslot is configured for both two channels, this configuration is invalid and
interfaces cannot be generated.
z During the configuration, the timeslot scope must match the channel group number.
The timeslot of the channel group is defined by the service provider.
Version 1.0
FALCON
z If other channels are configured, the unframed mode cannot be configured any
more.
Configuration Condition
None
The CE1 interface supports the protocols such as PPP and HDLC. CRC can be used to
verify the data frame. The following command can configure the data CRC verification
mode.
Table 6-4 Configure the CE1 data line CRC-4 verification mode
Version 1.0
FALCON
During the data transmission, both frame synchronization and clock synchronization
must be ensured. Packet loss may occur when the clock is not synchronized.
Therefore, to ensure clock synchronization, a unified clock must be used. One end is
configured with an internal clock and the other end is configured with a line clock. Thus,
a unified clock is ensured on the line.
The CE1 is the standard dual-line circuit. One is used to receive data and the other is
used to send data. Meanwhile, two cables are used. One is 75 Ω unbalanced coaxial
cables and the other is 120 Ω balanced twisted-pair cables. The following command
can be used to configure the line matching impedance.
Version 1.0
FALCON
The CE1 receiving and transmitting directions are independent without interfering each
other. The CE1 adopts the differential transmission mode, which has a stronger ability
of resisting common-mode interference and a transmission distance of 1 km. Because
the clock is extracted from the line clock, an independent clock line is not required. The
CE1 line transmits the baseband signal, generally HDB3 (High Density Bipolar 3)
codes or AMI. Both the preceding two codes are ternary return to zero codes.
Different looping modes are used to diagnose the line status. The local loop is used to
diagnose whether exceptions occur to the local device for receiving and transmitting
data. The remote loop is used to diagnose whether exceptions occur to the remote
device for receiving and transmitting data.
Version 1.0
FALCON
z When configuring the interface looping, the interface transmit clock source must be
configured as the internal clock.
Command Description
Network Requirements
z Use a cable to connect the CE1 interface of Device1 and Device2. The CE1
Version 1.0
FALCON
Network Topology
Configuration Steps
Step 1: Configure the clock mode for the CE1 controller. Device1 is configured with an internal
clock and Device2 in configured with an external clock. The external clock is the default
setting, which does not need to be configured manually.
Step 2: Configure the unframed mode in the CE1 controller and the interface serial1/0:0 is
automatically generated.
Version 1.0
FALCON
z In the CE1 unframed mode, the ":" contained in the generated interface name
followed by number 0.
z The encapsulation type of the CE1 interface is HDLC by default. Therefore, the
encapsulation type does not need to be configured for the interfaces. Run the show
interface command, it can be observed that Type is set to HDLC. If other WAN
protocols need to be configured, refer to WAN protocol-related documentation.
Version 1.0
FALCON
Network Requirements
z Use a cable to connect the CE1 interface of Device1 and Device2. The CE1
interface is configured as the framing mode. The interface encapsulation type is
HDLC to enable the intercommunication between Device1 and Device2.
Network Topology
Configuration Steps
Step 1: Configure the framing mode for the CE1 controller. Channel 0 uses timeslots form 0 to 10
and channel 1 uses timeslots from 11 to 20. serial1/0:0 and serial1/0:1 are automatically
generated.
Step 2: Configure the clock mode for the CE1 controller. Device1 is configured with an internal
clock and Device2 in configured with an external clock. The external clock is the default
setting, which does not need to be configured manually.
Version 1.0
FALCON
Version 1.0
FALCON
# Ping the IP addresses of the peer interface serial 1/0:0 and serial 1/0:1 on Device1
and can be pinged through.
Device1#ping 1.0.0.2
Device1#ping 2.0.0.2
z serial1/0:0 and serial1/0:1 in the network topology are two logical interfaces on a physical
interface. Because the two interfaces communicate independently, two solid lines in the
topology indicates two logical channels, which is a physical channel actually.
z When the CE1 interface is configured as the framing mode, timeslots used by both
ends must be the same. For example, in the preceding case, Device 1 uses timeslots
from 1 to 10 and timeslots from 11 to 20 and Device 2 must also use the timeslots from
1 to 10 and timeslots from 11 to 20. Otherwise, the port cannot be up.
z In the CE1 unframed mode, the ":" contained in the interface name indicates the
channel number.
z The encapsulation type of the CE1 interface is HDLC by default. Therefore, the
encapsulation type does not need to be configured for the interfaces. Run the show
interface command, it can be observed that Type is set to HDLC. If other WAN
protocols need to be configured, refer to WAN protocol-related documentation.
Version 1.0
FALCON
7Synchronous/Asynchronous Serial
Interface
7.1 Overview
In the parallel communication, data bits of one character are transmitted over different
channels. Therefore, the data is transmitted in high speed. When eighth data bits are
transmitted in the parallel communication, at least eight data channels and one
common channel are required and sometimes control channels such as status channel
and response channel are required. This is expensive and inconvenient for
long-distance transmission. In the serial communication, only two channels are
required. It is cost effective for long-distance transmission. However, the serial
communication can only transmit one bit every time, resulting in slow transmission
speed. However, with the improvement of the communication signal frequency, the
slow transmission speed problem has solved. The serial communication is generally
applied to synchronous and asynchronous serial interface communication.
In the channel, the amplitude and pulse width are used to specify the data pulse signal.
The receiving end samples the received signal by a certain clock serial number.
Therefore, timing is an important factor to correctly receive and transmit data.
Version 1.0
FALCON
Configuration
Configuration Task
Version 1.0
FALCON
Configuration Task
transmission character
Configure the asynchronous serial interface Configure the asynchronous serial interface clo
rate
Configure the data transmitting and receiving Configure the synchronous/asynchronous seria
condition f the synchronous/asynchronous serial interface data receiving and transmitting conditi
interface
Configuration Condition
None
Version 1.0
FALCON
Configuration Condition
Before configuring the synchronous serial interface, first complete the following task:
During the data transmission, both frame synchronization and clock synchronization
must be ensured. Packet loss may occur when the clock is not synchronized.
Therefore, to ensure clock synchronization, a unified clock must be used. One end is
configured with an internal clock and the other end is configured with a line clock. Thus,
a unified clock is ensured on the line. You are advised to avoid configuring clocks at
both ends of the device. Otherwise, interfaces may be unable for communications due
to clock chaos. Generally, the clock is configured at the DCE. When the DTE is
operating, the device does not need to be configured with a clock. It transmits and
receives data via the clock provided by the DCE. When the DCE is operating, the
device needs to be configured with a clock. It transmits and receives data by the clock
configured by itself. The DCE also provides the clock for other devices. The V.35 or
V.24 mode determines the highest clock rate configured. The V.35 or V.24 mode is
determined by the connected cable.
The synchronous serial interface clock rate needs to be configured under interfaces.
Version 1.0
FALCON
z Run the show interface command to view whether the interface works in the DCE or
DTE mode.
z When the synchronous serial interface of the device works in the DCE mode, a
clock needs to be configured. The device also provides external clock for other
devices.
z When the synchronous serial interface of the device works in the DTE mode, it
obtains the clock form the DCE.
z In the V.24 mode, the clock rate of the interface can reach a maximum of 128 kbit/s.
z In the V.35mode, the clock rate of the interface can reach a maximum of 2 Mbit/s.
The E1 receiving and transmitting directions are independent without interfering each
other. Because the clock is extracted from the line signal, no independent clock line is
needed. The line coding usually uses NRZI and NRZ.
The synchronous serial interface line coding needs to be configured under interfaces.
Version 1.0
FALCON
This section mainly describes the characters transmitted over the line when the
synchronous serial interface is idle.
The idle transmission character of the synchronous serial interface must be configured
under interfaces.
Table 7-5 Configure the synchronous serial interface idle transmission character
z When the idle transmission character is set to flags, the transmission character on
the line is 7E character actually.
z When the idle transmission character is set to marks, the transmission character on
the line is FF character actually.
Because of the long line and fast clock, the clock may be delayed for more than half
Version 1.0
FALCON
period and less than one period. This results in that the packet cannot be received and
transmitted normally. At this time, the following command can be configured to rotate
the clock to adjust the clock for half period.
z The clock frequency of different devices may be different and the clock rotation
needs to be configured.
Configuration Condition
Before configuring the asynchronous serial interface, first complete the following task:
The clock rate of the asynchronous serial interface can reach a maximum of 115200
kbit/s. The both devices must be configured with the same clock rate for normal
communications.
The asynchronous serial interface clock rate must be configured under devices.
Version 1.0
FALCON
Configure the bit number occupied by data when a character is transmitted over the
line. By default, a character data occupies 8 bits.
The data bit length of the asynchronous data bit must be configured under interfaces.
z After the 5, 6, and 7 bits are configured, exceptions may occur to the communication
unless the corresponding data bits are sent by the interface.
z When the data bit configured by the interface is 5, the stop bit length of the interface
must be configured to 2 at first. Because the ASCII code is 7 bits, at least 7 bits must
Version 1.0
FALCON
Configuring the data bit number occupied by the stop bit when a character is
transmitted over the line. By default, 1 bit is occupied.
The stop bit length of the asynchronous serial interface must be configured under
interfaces.
Table 7-9 Configure the asynchronous serial interface stop bit length
The flow control is used to avoid the phenomenon that packet loss occurs when
sending devices due to different device receiving speed. The flow control mode is
divided into hardware flow control and software flow control.
The software flow control indicates that the receiving end informs the sending end to
send or not send data using special characters.
The hardware flow control indicates the receiving end uses the hardware control signal
line on the interface to inform the sending end to send or not send data. Compared with
the software flow control, the sending end of the hardware flow control does not need
to insert the flow control character in the data flow. The receiving end does not need to
check whether the flow control character is received.
Generally, the hardware flow control has a higher transmission rate than the software
flow control. When the control signal line is incomplete, the software flow control is
adopted.
The flow control mode of the asynchronous serial interface must be configured under
interfaces.
Version 1.0
FALCON
Table 7-10 Configure the flow control mode of the asynchronous serial interface
The verification ensures the data correctness. The verification is divided into odd,
mark, even, and spac. When the parity bit is any odd number, it is called odd. When
all the parity bits are 1, it is called mark. When the parity bit is any even number, it is
called even. When all the parity bits are 0, it is called space.
The verification mode of the asynchronous serial interface must be configured under
interfaces.
Transmitting Condition
Configuration Condition
Version 1.0
FALCON
The synchronous/asynchronous serial interface follows the RS-232-C standard, but the
RS-232-C standard has many signal lines, commonly data signal line and control
signal line.
DSR (Data Set Ready) signal line: When the interface is up, the data communication
terminal is ready for use.
DTR (Data Terminal Ready) signal line: When the interface is up, the data
communication terminal is ready for use.
The preceding two signals are valid immediately when powering on. This only indicates
that the device is available, instead of indicating that the device is ready for
communications. Whether the communication is available is determined by the
following control signal.
RTS (Request To Send) signal line: It indicates that signal is sent to the communication
device to make the signal up when the DCT requests to send data to the DCE, that is,
when the terminal begins to send data. It controls whether the communication terminal
will enter the sending status.
CTS (Clear To Send) signal line: It indicates the response signal to the RTS when the
DCE is ready to receive the data sent by the DTE. When the communication terminal is
ready to receive the data sent by the terminal, the signal is up and the terminal is
informed to send data.
DCD (Data Carrier Detection) signal line: It indicates that the DCE is connected to the
communication link and informs that the DTE is ready to receive data.
Generally, when all control signal line are valid, the interfaces can communicate
normally. When the control signal line is incomplete, you can run the following
command to change the condition for receiving and transmitting data to enable normal
communications of synchronous/asynchronous serial interface.
Table 7-12 Configure the synchronous/asynchronous serial interface data receiving and
transmitting condition
Version 1.0
FALCON
Configure the condition for tx-on { cts | dcd | dcd-dsr | dsr } Optional
receiving and transmitting
data of the By default, the
synchronous/asynchronous condition for receiving
serial interface and transmitting data is
dcd-dsr.
Command Description
Network Requirements
Network Topology
Configuration Steps
Version 1.0
FALCON
Step 1: Configure the interface in the synchronous serial mode. Configure the IP address on the
interface and encapsulate the protocol.
#Configure Device1.
Device1#configure terminal
Device1(config)#interface serial 1/0
Device1(config-if-serial1/0)#ip address 2.0.0.1 255.255.255.0
Device1(config-if-serial1/0)#encapsulation ppp
Device1(config-if-serial1/0)#exit
#Configure Device2.
Device2#configure terminal
Device2(config)#interface serial 1/0
Device2(config-if-serial1/0)#ip address 2.0.0.2 255.255.255.0
Device2(config-if-serial1/0)#encapsulation ppp
Device2(config-if-serial1/0)#exit
#Configure Device2.
Device2(config)#interface serial 1/0
Device2(config-if-serial1/0)#clock rate 2000000
When the clock rate for the interface is configured, the device works in the DCE mode.
Version 1.0
FALCON
Run the show interface command on Device1, it can be observed that the status of the
interface is up, able to obtaining the IP address of the peer device.
#Ping the IP address of the peer device on Device1. The IP address can be pinged
through.
Device1#ping 2.0.0.2
Version 1.0
FALCON
Network Requirements
Network Topology
Configuration Steps
Step 1: Configure the interface in the asynchronous serial mode. Configure the IP address on
the interface and encapsulate the protocol.
#Configure Device1.
Device1#configure terminal
Device1(config)#interface serial 1/0
Device1(config-if-serial1/0)#physical-layer async
Device1(config-if-serial1/0)#ip address 2.0.0.1 255.255.255.0
Device1(config-if-serial1/0)#encapsulation ppp
Device1(config-if-serial1/0)#exit
#Configure Device2.
Device2#configure terminal
Device2(config)#interface serial 1/0
Device2(config-if-serial1/0)#physical-layer async
Device2(config-if-serial1/0)#ip address 2.0.0.2 255.255.255.0
Device2(config-if-serial1/0)#encapsulation ppp
Device2(config-if-serial1/0)#exit
#Configure Device1.
Device1(config)#interface serial 1/0
Device1(config-if-serial1/0)#speed 115200
Device1(config-if-serial1/0)#exit
#Configure Device2.
Device2(config)#interface serial 1/0
Version 1.0
FALCON
Device2(config-if-serial1/0)#speed 115200
Device2(config-if-serial1/0)#exit
Run the show interface command on Device1, it can be observed that the status of the
interface is up, able to obtaining the IP address of the peer device. The interface works
in the asycnhronous mode.
#Ping the IP address of the peer device on Device1. The IP address can be pinged
through.
Device1#ping 2.0.0.2
z Generally, the data bit and stop bit of the asynchronous serial interface is set by
default.
Version 1.0
FALCON
Version 1.0
FALCON
83G Interface
8.1 Overview
Viewing from the preceding figure, the device achieves the wireless communication
with the operator NodeB via the 3G communication modules and achieves data
interaction with the WAN finally via the operator. Different 3G communication modules
and different SIM cards determine different operators and different network modes.
However, viewing from the overall application scenario, the data communications
Version 1.0
FALCON
Configuration Task
Configure the SIM card safety function Enable the PIN code function
3G dialing function configuration means setting the dialing access points as required by
the operator. This ensures successful dialing and data connection with the operator.
Configuration Condition
Version 1.0
FALCON
None
Configure the dialing access point according to the dialing requirement of the carrier,
mainly setting the accesse server name.
SIM card safety function mainly provides PIN code protection and IMSI binding,
protecting the right of using the 3G module.
The SIM (subscriber identity module), also called the subscriber identity card, records
the user identity data and information.
PIN (Personal Identification Number) code is the personal identity password of the SIM
card. The PIN code is set to 1234 or 0000 by default. If the PIN code is enabled, a
four-digit PIN code must be entered when powering on. The PIN code can be changed,
which is used to protect your own SIM card from being used by others.
PUK (PIN Unlocking Key) is the unblocking code of the PIN code. When the SIM card
is locked caused by entering wrong PIN code, you can unblock it using the PUK code.
Version 1.0
FALCON
z When the PIN code is wrongly entered for three consecutive times, the SIM card will
be locked. At this time, you can use the PUK code to unblock it. However, if the PUK
code is wrongly entered for ten consecutive times, the SIM card will be locked
permanently.
Configuration Condition
None
The right of using the SIM card is protected by enabling the PIN code. You must enter
the correct PIN code to use the SIM card.
PIN code manual authentication means PIN code authentication by entering the
command manually every time.
Version 1.0
FALCON
In the PIN code automatic authentication mode, the PIN code is verified by presetting
the PIN code. The user only needs to configure the PIN code for one time and the
device will use the configured PIN code for authentication.
Changing the PIN code allows the new PIN code set by the user. After the PIN code is
changed, the new PIN code is used for authentication.
If the SIM card is locked by entering the wrong PIN code for three consecutive times,
the user can enter the PUK code to unblock it and set new PIN code.
Version 1.0
FALCON
The user can specify the SIM card to the 3G communication module in the fixed slot by
the IMSI binding function, and the 3G communication modules in other slots cannot
use the SIM card. This function is only available for this device.
The device provides multiple flexible policies for the 3G network mode and supports
the network mode of all the current operators. The user configures the network mode
for the 3G communication module using commands to satisfy requirements in different
network environment.
Configuration Condition
None
The interface provides three network access modes: auto-sensing, forced 3G, and
forced 2G. The user can configure the network as required by users.
Version 1.0
FALCON
The 3G signal function mainly achieves some assistant functions based on the 3G
signal strength, including the specified signal change notification range and dual-3G
application and interface switching policies based on 3G signal strength.
Configuration Condition
None
Due to the particularity of the wireless network, the signal strength changes frequently.
Therefore, the device provides the function of configurable signal change notification
range. If the signal changes within the configured range, the signal change will not be
notified. If the signal changes beyond the configured range, the signal change will be
notified.
The dual-3G mode provides a service switching policy based on the signal strength.
When weak signal strength occurs to a 3G communication module, the data services
carried over the 3G communication module is automatically switched to another 3G
Version 1.0
FALCON
Table 8-12 Configure the interface switching policy in the dual-3G mode
Configuration Condition
None
In the automatic dialing mode, the 3G communication module can restart automatically
when the dialing fails in a specified time. The dialing success rate increases after
restart.
Table 8-13 Configure the timeout for the 3G communication module automatic restart
Version 1.0
FALCON
When the 3G card fails to be loaded repeatedly and other error handling mechanism
cannot recover the 3G card to normal operating, this function enables the entire device
to be restarted to recover the system to the initial state. This ensures the correct
operating of the system and of the 3G card.
Table 8-14 Configure the host restart function when the 3G card fails to be loaded
repeatedly
Command Description
Network Requirements
Network Topology
Version 1.0
FALCON
Configuration Steps
#Configure Device.
Device#cellular 1/0 configure apn-config apn-set 3gnet
Step 2: Configure modem dialing script with the script name as g3dia and indicator as ATDT.
#Configure Device.
Device#configure terminal
Device(config)#chat-script g3dia ATDT
#Configure Device.
Device(config)#dialer-list 1 protocol ip permit
#Configure Device.
Device(config)#interface cellular 1/0
Device(config-if-cellular1/0)#dialer in-band
Device(config-if-cellular1/0)#dialer-group 1
Device(config-if-cellular1/0)#dialer string *99#
Device(config-if-cellular1/0)#script dialer g3dia
Device(config-if-cellular1/0)#ppp chap hostname a
Device(config-if-cellular1/0)#ppp chap password 0 a
Device(config-if-cellular1/0)#ip address negotiated
Device(config-if-cellular1/0)#exit
Step 5: Configure the default routing of Device with the egress interface as cellular1/0.
Version 1.0
FALCON
#Configure Device.
Device(config)#ip route 0.0.0.0 0.0.0.0 cellular 1/0
#After the dialing is triggered, check whether the interface cellular1/0 of Device can
obtain the IP address.
Device#show interface cellular 1/0
Cellular1/0:
line protocol is up
Flags: (0xc0080f1) POINT-TO-POINT MULTICAST RUNNING
Type: PPP
Internet address: 10.231.36.57/32
Destination Internet address: 0.0.0.0
Metric: 0, MTU: 1500, BW: 384 Kbps, DLY: 100000 usec, VRF: global
Reliability 255/255, Txload 1/255, Rxload 1/255
Last clearing of "show interface" counters at: 0 hour 5 minutes 2 seconds
input rate 0 bit/sec, 0 packet/sec
output rate 0 bit/sec, 0 packet/sec
2 packets received; 2 packets sent
0 multicast packets received
0 multicast packets sent
0 input errors; 0 output errors
0 collisions; 0 dropped
LCP:OPENED
IPCP:OPENED
encap-type: simply PPP
Rx chars: 80, Tx chars 80
Rx overrun 0, Tx underrun 0
If the WCDMA system is used, the IP address of the local end can be successfully
negotiated. If the CDMA2000 and TD-SCDMA systems are used, both the IP
addresses of the local end and of the peer end can be negotiated.
z The dialing number of WCDMA and TD-SCDMA is "99#" and the dialing number of
CDMA2000 is "#777".
z If the command dialer mode auto is configured for the 3G interface to enable the
automatic dialing, there is no need to define the rule for triggering dialing data flow.
z In the WCDMA and TD-SCDMA networks, it is recommended that the
PPP-authenticated user account and password use "a". In the CDMA2000 network, it
is recommended that the PPP-authenticated user account and password use "card".
z The WCDMA and TD-SCDMA networks use the APN names to identify the private
network and public network. The APN name is provided by the operator. The
CDMA2000 network dials the domain name used by the user account to identify the
private network and public network. The domain name is allocated by the operator.
z The public network name APN name of the WCDMA and TD-SCDMA networks is
"3gnet".
Version 1.0
FALCON
Network Requirements
z IPsec is built between Device1 and Device2 via the 3G interface cellular1/0.
z Device1 acts as the branch device, the operator device as the LAC, and Device2 as
the LNS. L2TP is built between LAC and Device2.
z Device2 performs the AAA authentication and allocates IP addresses by the AAA
authentication.
Network Topology
Gi1 192.168.201.1/24
Gi2 192.168.200.1/24
Loopback0 172.16.20.1/32
Configuration Steps
Version 1.0
FALCON
#Configure Device1.
Device#cellular 1/0 configure apn-config apn-set hy118.scapn
Step 3: Configure the modem dialing script with the script name as g3dia and indicator as ATDT.
#Configure Device1.
Device1#configure terminal
Device1(config)#chat-script g3dia ATDT
#Configure Device1.
Device1(config)#dialer-list 1 protocol ip permit
#Configure Device1.
Device1(config)#interface cellular 1/0
Device1(config-if-cellular1/0)#dialer in-band
Device1(config-if-cellular1/0)#dialer-group 1
Device1(config-if-cellular1/0)#dialer string *99#
Device1(config-if-cellular1/0)#script dialer g3dia
Device1(config-if-cellular1/0)#ppp chap hostname 3g_authen
Device1(config-if-cellular1/0)#ppp chap password 0 admin
Device1(config-if-cellular1/0)#ip address negotiated
Device1(config-if-cellular1/0)#exit
Step 6: Configure the default routing of Device1 with the egress interface as cellular1/0.
#Configure Device1.
Device1(config)#ip route 0.0.0.0 0.0.0.0 cellular 1/0
Step 7: Configure the AAA server to authenticate and allocate the IP address.
#Configure Device2.
Configure the AAA server to use the radius authentication and authority.
Device2(config)#aaa new-model
Device2(config)#aaa authentication ppp default radius
Device2(config)#aaa authorization network default radius
Version 1.0
FALCON
Configure the IP address, user account, and password of the AAA server.
Device2(config)#radius-server host 192.168.200.2 auth-port 1645 priority 0 key admin
Step 8: Configure the L2TP tunnel between the LAC and Device2.
#Configure Device2.
Configure the L2TP connection request of the LAC whose hostname is set to
GGSNCD0. (Optional)
Device2(config-vpdn)#terminate-from hostname GGSNCD01
Configure the L2TP tunnel authentication password. This password must be the same
as the L2TP password provided by the operator.
Device2(config-vpdn)#l2tp tunnel password admin
#After the dialing is triggered, check the information of interface cellular1/0 on Device1.
Device1#show interface cellular 1/0
Cellular1/0:
line protocol is up
Flags: (0xc0080f1) POINT-TO-POINT MULTICAST RUNNING
Type: PPP
Internet address: 172.16.10.11/32
Version 1.0
FALCON
If the WCDMA private network dialing is successful, the IP address of the local end can
be successfully negotiated. If the CDMA2000 private network is used, both the IP
addresses of the local end and of the peer end can be negotiated.
Step 10: Create the IPsec tunnel and configure the IPsec security policy.
#Configure Device1.
Configure the pre-shared key. Set the key to admin, allowing all peer end to use the
key.
Device1(config)#crypto ike key admin any
Version 1.0
FALCON
#Configure Device2.
Configure the pre-shared key. Set the key to admin, allowing all peer end to use the
key.
Device2(config)#crypto ike key admin any
Configure the Ipsec security policy and configure the routing that is automatically
added to thepeer end to protect the network.
Device2(config)#crypto policy policy1
Device2(config-policy)#flow 192.168.201.0 255.255.255.0 192.168.100.0 255.255.255.0 ip tunnel tun
Device2(config-policy)#set reverse-route
Device2(config-policy)#exit
#Use the extended ping command on Device1. The destination address 192.168.201.1
Version 1.0
FALCON
z Configure the command ppp mtu adaptive proxy for virtual-template 1 to ensure the
local MTU adapting to the peer MRU.
z The WCDMA and TD-SCDMA networks use the APN names to identify the private
network and public network. The APN name is provided by the operator. The
CDMA2000 network dials the domain name used by the user account to identify the
private network and public network. The domain name is allocated by the operator.
z The APN name used by Device1 is provided by the operator.
z The command terminate-from hostname configured for Device2 is provided by the
operator.
z If the operator LAC and LNS do not exist in the direct connecting network segment,
the static routing directing to the operator LAC is configured.
z If the command dialer mode auto is configured for the 3G interface to enable the
automatic dialing, there is no need to define the rule for triggering dialing data flow.
z The PPP-authenticated user account and password configured on Device1 are
allocated by the upper AAA server.
Network Requirements
z IPsec is built between Device1 and Device2 via the 3G interface cellular1/0 and
cellular2/0.
z Device1 uses two 3G cards of different 3G systems. Where, cellular1/0 uses the
Version 1.0
FALCON
WCDMA and cellular2/0 uses the CDMA2000. cellular1/0 is the master interface
and cellular2/0 is the standby interface. The two interfaces switches based on the
signal strength.
z Device1 acts as the branch device, operator device as the LAC, and Device2 as the
LNS. The L2TP is built between LAC-1/LAC-2 and Device2.
z Two VPDN lines are created on Device2 and two VPDN groups are created.
Different VPDN groups correspond to different operators.
z LNS device performs authentication and allocates the IP address by the AAA server.
Network Topology
Figure 8-4Networking of configuring sual-3G switching based on the signal strength
Gi1/0 192.168.201.234/24
Configuration Steps
Version 1.0
FALCON
Step 2: Define the rule for triggering dialing data flow and configure the APN name. (Omitted)
Configure the modem dialing script with the script name as g3dia and indicator as ATDT.
Step 3:
(Omitted)
#Configure Device1 and set the initial dialing detection time as 120s.
Device1#configure terminal
Device1(config)#interface cellular 1/0
Device1(config-if-cellular1/0)#signal switch automatically
Device1(config-if-cellular1/0)#signal switch after 120
Device1(config-if-cellular1/0)#exit
#Configure Device1.
Device1(config)#track 1
Device1(config-track)#interface cellular 1/0 3g-signal
Device1(config-track)#exit
#Configure Device1.
Device1(config)#ip route 172.16.20.1 255.255.255.255 cellular 1/0 track 1
Device1(config)#ip route 0.0.0.0 0.0.0.0 cellular 2/0 100
#Configure Device2 and create two loopback interfaces as the virtual template
address.
Device2#configure terminal
Device2(config)#interface loopback0
Device2(config-if-loopback0)#ip address 172.16.20.1 255.255.255.255
Device2(config-if-loopback0)#exit
Device2(config)#interface loopback1
Device2(config-if-loopback1)#ip address 172.16.30.1 255.255.255.255
Version 1.0
FALCON
Device2(config-if-loopback1)#exit
Create two L2TPs on Device2 and correspond to different operators based on configured
Step 9:
terminate-from hostname. (Omitted)
#Configure Device1.
Configure the pre-shared key. Set the key to admin, allowing all peer end to use the
key.
Device1(config)#crypto ike key admin any
Create two IPsec tunnels for two 3G interfaces. Configure the local interface of tun1 as
cellular1/0 and tunnel ID as wcdma. Configure the local interface of tun2 as cellular2/0
and tunnel ID as cdma.
Device1(config)#crypto tunnel tun1
Device1(config-tunnel)#local interface cellular1/0
Device1(config-tunnel)#peer address 172.16.20.1
Device1(config-tunnel)#set authentication preshared
Device1(config-tunnel)#set auto-up
Device1(config-tunnel)#set local-id wcdma
Device1(config-tunnel)#set track 1
Device1(config-tunnel)#exit
Device1(config)#crypto tunnel tun2
Device1(config-tunnel)#local interface cellular 2/0
Device1(config-tunnel)#peer address 172.16.30.1
Device1(config-tunnel)#set authentication preshared
Device1(config-tunnel)#set auto-up
Device1(config-tunnel)#set local-id cdma
Device1(config-tunnel)#exit
#Configure Device2.
Configure the pre-shared key. Set the key to admin, allowing all peer end to use the
key.
Device2(config)#crypto ike key admin any
Create two IPsec tunnels. tun1 uses the IP address of loopback0 as the local IP
address, specifying the tunnel ID of Device1 as wcdma. tun2 uses the IP address of
loopback1 as the local IP address, specifying the tunnel ID of Device1 as cdma.
Device2(config)#crypto tunnel tun1
Device2(config-tunnel)#local address 172.16.20.1
Device2(config-tunnel)#peer any
Device2(config-tunnel)#set peer-id wcdma
Device2(config-tunnel)#set authentication preshared
Device2 config-tunnel)#exit
Device2(config)#crypto unnel tun2
Device2(config-tunnel)#local address 172.16.30.1
Device2(config-tunnel)#peer any
Device2(config-tunnel)#set peer-id cdma
Device2(config-tunnel)#set authentication preshared
Device2 config-tunnel)#exit
Version 1.0
FALCON
#Configure Device1 and create the Ipsec security policy to associate tun1 and tun2.
Set tun1 as the active tunnel and tun2 as the standby tunnel.
Device1(config)#crypto policy policy1
Device1(config-policy)#flow 192.168.100.0 255.255.255.0 192.168.201.0 255.255.255.0 ip tunnel
tun1 tun2
Associate track and choose the policy based on the track status. The tunnel with track
as up is preferentially selected.
Device1(config-policy)#set track-aware
Device1(config-policy)#exit
Configure Device2 and create IPsec security policy to associate tun1 and tun2. Set
tun1 as the active tunnel and tun2 as the standby tunnel. Configure the routing that is
automatically added to the peer end to protect the network.
Device2(config)#crypto policy policy1
Device2(config-policy)# flow 192.168.201.0 255.255.255.0 192.168.100.0 255.255.255.0 ip tunnel
tun1 tun2
Device2(config-policy)#set reverse-route
Device2(config-policy)#set peer-track-aware
Device2(config-policy)#exit
The set peer-track-aware command must be used together with the set track-aware
command. The local end chooses the tunnel for sending data based on the tunnel for
receiving data. The channel for sending data must be the same tunnel for receiving
data.
#The dialing is triggered successfully when the Ipsec channel is built successfully.
When the track object status is up on Device1, tun1 is selected for data
communication.
Device1#show track object
track 1
status = up
entnum = 1
logic operator AND
Object Type Status Refcnt instruction
------------------------- -------- ------ ----------------------------------------
interface 3g-signal up 1
-------------------------------------------------------------------------------------
module priority caller
------------------------- -------- ------
STATICRT 20 0x75f990
cdma 20 0x6a6670
-------------------------------------------------------------------------------------
Version 1.0
FALCON
#When track object status is down on Device1, tun2 is selected for data communication.
Device1#show track object
track 1
status = down
entnum = 1
logic operator AND
Object Type Status Refcnt instruction
------------------------- -------- ------ ----------------------------------------
interface 3g-signal down 1
-------------------------------------------------------------------------------------
module priority caller
------------------------- -------- ------
tun1 20 0x6a6714
-------------------------------------------------------------------------------------
Version 1.0
FALCON
Use the extended ping command on Device1 to enable the packet to be protected by
the Ipsec. You can run the show crypto ipsec sa command to check which channel is
selected by the packet for data communication.
z The signal switching means whether to perform the signal switching based on the
Version 1.0
FALCON
signal quality. However, the signal quality cannot authentically refelect the channel
situation. Good signal may not result in smooth channel and weak signal may not
result in congestion. Therefore, it is not relaiable that the switching is determined by
the signal quality to a certain extent.
z Because the 3G signal is vulnerable to the environment, generally the sutomatic
detection mode is used for the signal detection.
z If the dialer mode auto command is configured for the 3G interface to enable the
automatic dialing, there is no need to define the rule for triggering dialing data flow.
z Run the signal switch after command to determine the initial status of the 3G signal.
The signal switch after command is followed by a time parameter, which configures
that no dialing will be performed in the period when the 3G interface is successfully
loaded. Instead, the signal in the period is detected at first to determine the initial
signal sttaus and judge whether to perform the dialing.
z Two L2TP tunnels are created on Device2, corresponding to two operators. You can
configure the terminate-from hostname command for the VPDN group, corresponding
to different operators.
z The PPP-authenticated user account and password configured on Device1 are
allocated by the upper AAA server.
Network Requirements
z Device1 acts as the branch device, operator device as the LAC, and Device2 and
Device3 as the LNS. The L2TP is created between the LAC and LNS.
z Different user accounts and APNs are adopted to connect to Device2 and Device3
by user accounts and APN switching.
z The user account connecting to Device2 is a1, password is a1, and APN name is
isapn1. The user account connecting to Device3 is b1, password is b1, and APN
name is apn2.
z The LNS device performs authentication and allocates the IP address by the AAA
server.
Version 1.0
FALCON
Network Topology
Figure 8-5 Typical networking of configuring the 3G line connecting to the upper dual
centers
Loopback0 172.16.30.1/32
Configuration Steps
Configure the modem dialing script with the script name as g3dia and indicator as ATDT.
Step 2:
(Omitted)
Step 3: Define the rule for triggering dialing data flow and configure the APN name. (Omitted)
#Configure Device1.
Version 1.0
FALCON
Device1#configure terminal
Device1(config)#interface cellular 1/0
Device1(config-if-cellular1/0)#dialer in-band
Device1(config-if-cellular1/0)#dialer-group 1
Device1(config-if-cellular1/0)#dialer string *99#
Device1(config-if-cellular1/0)#script dialer g3dia
Device1(config-if-cellular1/0)#ip address negotiated
Configure the switching to be performed when the connection fails for three
consecutive times.
Device1(config-if-cellular1/0)#ppp retry authentication 3
Configure the active account to dial every hour when the standby account is used.
Device1(config-if-cellular1/0)#ppp main-account recovery 60
Device1(config-if-cellular1/0)#exit
Create the user name list admin and configure a1 as the account connecting to Device2
Step 5:
and b1 as the account connecting to Device3.
#Configure Device1.
Device1(config)#user-list admin
Device1(config-ulist)#user a1 password 0 a1 apn apn1 main
Device1(config-ulist)#user b1 password 0 b1 apn apn2
Device1(config-ulist)#exit
Step 6: Configure the default routing of Device1 with the egress interface as cellular1/0.
#Configure Device1.
Device1(config)#ip route 0.0.0.0 0.0.0.0 cellular1/0
Configure Device2 and Device3 to perform authentication and allocate the IP address by
Step 7:
the AAA server.
#Configure Device2.
Configure the AAA server to use the radius authentication and authority.
Device2#configure terminal
Device2(config)#aaa new-model
Device2(config)#aaa authentication ppp default radius
Device2(config)#aaa authorization network default radius
Configure the IP address, user account, and password of the AAA server.
Device2(config)#radius-server host 192.168.200.2 auth-port 1645 priority 0 key admin
Version 1.0
FALCON
#Configure Device3.
Configure the AAA server to use the radius authentication and authority.
Device3#configure terminal
Device3(config)#aaa new-model
Device3(config)#aaa authentication ppp default radius
Device3(config)#aaa authorization network default radius
Configure the IP address, user account, and password of the AAA server.
Device3(config)#radius-server host 192.168.199.2 auth-port 1645 priority 0 key admin
Step 8: Configure the L2TP tunnel to be built between Device2 and operator.
#Configure Device2.
Configure the L2TP connection request of the LAC whose hostname is set to
GGSNCD01. (Optional)
Device2(config-vpdn)#terminate-from hostname GGSNCD01
Configure the L2TP tunnel authentication password. The password must be the same
as the L2TP password provided by the operator.
Device2(config-vpdn)#l2tp tunnel password admin
Version 1.0
FALCON
Step 9: Configure the L2TP tunnel to be built between Device3 and the operator.
#Configure Device3.
Configure the L2TP connection request of the LAC whose hostname is set to
GGSNCD03. (Optional)
Device3(config-vpdn)#terminate-from hostname GGSNCD03
Configure the L2TP tunnel authentication password. The password must be the same
as the L2TP password provided by the operator.
Device3(config-vpdn)#l2tp tunnel password admin
Step 10: Configure the IPsec tunnel to be built between the branch device and Device2/Device3.
#Configure Device1.
Create two IPsec tunnels for two 3G interfaces. Configure the local interface of tun1 as
cellular1/0, connecting Device2. Configure the local interface of tun2 as cellular1/0,
connecting Device3.
Device1(config)#crypto tunnel tun1
Device1(config-tunnel)#local interface cellular1/0
Device1(config-tunnel)#peer address 172.16.20.1
Device1(config-tunnel)#set authentication preshared
Device1(config-tunnel)#set auto-up
Device1(config-tunnel)#exit
Version 1.0
FALCON
Enable the IPsec pre-fragment to ensure the data will not fragmented in the operator
network transmission when the non-TCP is encapsulated with the IPsec. Packet loss
may occur to fragmented packets in the operator link.
Device1(config)#crypto ipsec pre-fragment enable
Configure the pre-shared key. Set the key to admin, allowing all peer end to use the
key.
Device1(config) #crypto ike key admin any
#Configure Device2.
Configure the pre-shared key. Set the key to admin, allowing all peer end to use the
key.
Device2(config)#crypto ike key admin any
#Configure Device3.
Configure the pre-shared key. Set the key to admin, allowing all peer end to use the
key.
Device3(config)#crypto ike key admin any
Configure the IPsec security tunnel on Device2 and configure the routing that is
Version 1.0
FALCON
Configure the IPsec security policy on Device3 and configure the routing that is
automatically added to the peer device to protect network.
Device3(config)#crypto policy policy1
Device3(config-policy)#flow 10.1.4.0 255.255.255.0 192.168.100.0 255.255.255.0 ip tunnel tun1
Device3(config-policy)#set reverse-route
Device3(config-policy)#exit
#When Device1 dials Device2, the IPsec tunnel can be built between Decice1 and
Device2. Use the extended ping command on Device1 and Network-Center-1 can be
pinged through.
Device1#show crypto ipsec sa
policy name : policy1
f (src, dst, protocol, src port, dst port) : 192.168.100.0/24 10.250.19.0/24 ip any any
local tunnel endpoint : 172.16.10.123 remote tunnel endpoint : 172.16.20.1
the pairs of ESP ipsec sa : id : 238, algorithm : DES HMAC-SHA1-96
inbound esp ipsec sa : spi : 0x1beb1e9d(468393629) crypto context : 0x9eb67e0
current input 0 packets, 0 kbytes
encapsulation mode : Tunnel
replay protection : ON
remaining lifetime (seconds/kbytes) : 28793/4294967295
uptime is 0 hour 0 minute 7 second
outbound esp ipsec sa : spi : 0x8adc247a(2329683066) crypto context : 0xa86a240
current output 0 packets, 0 kbytes
encapsulation mode : Tunnel
replay protection : ON
remaining lifetime (seconds/kbytes) : 28793/4294967295
uptime is 0 hour 0 minute 7 second
policy name : tun2
f (src, dst, protocol, src port, dst port) : 192.168.100.0/24 10.1.4.0/24 ip any any
Device1#ping
Protocol [ip]:
Target IP address or hostname: 10.250.19.1
Repeat count [5]:
Datagram size [76]:
Timeout in seconds [2]:
Extended commands [no]: y
Source address or interface: 192.168.100.2
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [abcd]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [no]:
Version 1.0
FALCON
#When Device1 fails to dial Device2 for three consecutive times, Device1 will connect
to Device3 and the IPsec tunnel will be correctly built with Device3. Use the extended
ping command on Device1 and Network-Center-2 can be pinged through.
Device1#show crypto ipsec sa
policy name : policy2
f (src, dst, protocol, src port, dst port) : 192.168.100.0/24 10.250.19.0/24 ip any any
policy name : tun2
f (src, dst, protocol, src port, dst port) : 192.168.100.0/24 10.1.4.0/24 ip any any
local tunnel endpoint : 172.16.10.123 remote tunnel endpoint : 172.16.30.1
the pairs of ESP ipsec sa : id : 274, algorithm : DES HMAC-SHA1-96
inbound esp ipsec sa : spi : 0x12c01ea6(314580646) crypto context : 0xa86a8c0
current input 0 packets, 0 kbytes
encapsulation mode : Tunnel
replay protection : ON
remaining lifetime (seconds/kbytes) : 28797/4294967295
uptime is 0 hour 0 minute 3 second
outbound esp ipsec sa : spi : 0x1f7822be(527966910) crypto context : 0xa86a740
current output 0 packets, 0 kbytes
encapsulation mode : Tunnel
replay protection : ON
remaining lifetime (seconds/kbytes) : 28797/4294967295
uptime is 0 hour 0 minute 3 second
Device1#ping
Protocol [ip]:
Target IP address or hostname: 10.1.4.1
Repeat count [5]:
Datagram size [76]:
Timeout in seconds [2]:
Extended commands [no]: y
Source address or interface: 192.168.100.2
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [abcd]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [no]:
Version 1.0
FALCON
!!!!!
Success rate is 100% (5/5). Round-trip min/avg/max = 383/456/516 ms.
Use the extended ping command on Device1 to enable the packet to be protected by
the Ipsec. You can run the show crypto ipsec sa command to check which channel is
selected by the packet for data communication.
z Configure the command ppp mtu adaptive proxy for virtual-template 1 to ensure the
local MTU adapting to the peer MRU.
z In the WCDMA and TD-SCDMA systems, the APN names, which are provided by
the operator, are used to determine the connected private network. In the CDMA2000
network, run the ppp chap hostname command to identify the private network and
public network based on the corresponding domain names. In the telecom network,
the APN name is not required.
z If the command dialer mode auto is configured for the 3G interface to enable the
automatic dialing, there is no need to define the rule for triggering dialing data flow.
z The PPP-authenticated user account and password configured on Device1 are
allocated by the upper AAA server.
z If the operator LAC and LNS do not exist in the direct connecting network segment,
the static routing directing to the operator LAC is configured.
Network Requirements
z IPsec is built between Device1 and Device2 via the 3G interface cellular1/0 and
Version 1.0
FALCON
cellular2/0.
z Device1 uses two 3G cards of different 3G systems. Where, cellular1/0 uses the
WCDMA and cellular2/0 uses the CDMA2000. The two 3G links are in the active
and standby mode.
z Device1 acts as the branch device, operator device as the LAC, and Device2 as the
LNS. The L2TP is built between the LAC and Device2.
z Use the traffic distribution to transmit multiple service traffic on two 3G lines, service
A and service B for example. Service A uses WCDMA as the active line and
CDMA2000 as the standby line. Service B uses CDMA2000 as the active line and
WCDMA as the standby line.
z The LNS device performs authentication and allocates the IP address by the AAA
server.
Network Topology
Figure 8-6 Networking of configuring dual-3G switching based on the signal strength
Gi1/0 192.168.201.234/24
Configuration Steps
Version 1.0
FALCON
Configure the modem dialing script with the script name as g3dia and indicator as ATDT.
Step 2:
(Omitted)
Step 3: Define the rule for triggering dialing data flow and configure the APN name. (Omitted)
#Configure Device1.
Service A uses cellular1/0 as the main data communication interface and cellular2/0 as
the backup interface. Service B uses cellular 2/0 as the main data communication
interface and cellular1/0 as the standby interface.
Device1#configure terminal
Device1(config)#ip route 11.1.1.0 255.255.255.0 cellular 1/0
Device1(config)#ip route 11.1.1.0 255.255.255.0 cellular 2/0 100
Device1(config)#ip route 0.0.0.0 255.255.255.0 cellular 2/0
Device1(config)#ip route 0.0.0.0 255.255.255.0 cellular 1/0 100
Step 6: Configure that Device2 is authenticated and allocated with IP address by the AAA server.
#Configure Device2. Configure the AAA server to use the radius authentication and
authority.
Device2#configure terminal
Device2(config)#aaa new-model
Device2(config)#aaa authentication ppp default radius
Device2(config)#aaa authorization network default radius
Configure the IP address, user account, and password of the AAA server.
Device2(config)#radius-server host 192.168.200.2 auth-port 1645 priority 0 key admin
#Configure Device2.
Configure virtual-template 1 and build the L2TP tunnel between virtual-template 1 and
Version 1.0
FALCON
WCDMA.
Device2(config)#interface virtual-template1
Device2(config-if-virtual-template1)# encapsulation ppp
Device2(config-if-virtual-template1)#no peer default ip address
Device2(config-if-virtual-template1)#ppp mtu adaptive proxy
Device2(config-if-virtual-template1)#ppp authentication chap default
Device2(config-if-virtual-template1)#ppp authorization default
Device2(config-if-virtual-template1)#ip unnumber loopback0
Device2(config-if-virtual-template1)#exit
Configure the L2TP connection request of the LAC whose hostname is set to
GGSNCD01.
Device2(config-vpdn)#terminate-from hostname GGSNCD01
Configure the L2TP tunnel authentication password. This password must be the same
as the L2TP password provided by the operator.
Device2(config-vpdn)#l2tp tunnel password admin
Configure virtual-template 2 and build the L2TP tunnel between virtual-template 2 and
WCDMA.
Device2(config)#interface virtual-template2
Device2(config-if-virtual-template2)#encapsulation ppp
Device2(config-if-virtual-template2)#no peer default ip address
Device2(config-if-virtual-template2)#ppp mtu adaptive proxy
Device2(config-if-virtual-template2)#ppp authentication chap default
Device2(config-if-virtual-template2)#ppp authorization default
Device2(config-if-virtual-template2)#ip unnumber loopback1
Device2(config-if-virtual-template2)#exit
Configure the L2TP connection request of the LAC whose hostname is set to
SC-CD-BS-PDSN-1.
Device2(config-vpdn)#terminate-from hostname SC-CD-BS-PDSN-1
Configure the L2TP tunnel authentication password. This password must be the same
as the L2TP password provided by the operator.
Device2(config-vpdn)#l2tp tunnel password admin
Version 1.0
FALCON
#Configure Device1. Create two IPsec tunnels for two 3G interfaces. Configure the
local interface of tun1 as cellular1/0, the main data communication interface of service
A. Configure the local interface of tun2 as cellular2/0, the main data communication
interface of service B.
Device1(config)#crypto tunnel tun1
Device1(config-tunnel)#local interface cellular1/0
Device1(config-tunnel)#peer address 172.16.20.1
Device1(config-tunnel)#set authentication preshared
Device1(config-tunnel)#set auto-up
Device1(config-tunnel)#exit
Device1(config)#crypto tunnel tun2
Device1(config-tunnel)#local interface cellular 2/0
Device1(config-tunnel)#peer address 172.16.30.1
Device1(config-tunnel)#set authentication preshared
Device1(config-tunnel)#set auto-up
Device1(config-tunnel)#exit
#Configure Device1.
#Configure Device2.
Device2(config)#crypto tunnel tun1
Device2(config-tunnel)#local interface loopback0
Device2(config-tunnel)#peer any
Device2(config-tunnel)#exit
Device2(config)#crypto tunnel tun2
Device2(config-tunnel)#local interface loopback1
Device2(config-tunnel)#peer any
Device2(config-tunnel)#exit
Version 1.0
FALCON
Configure the IPsec policy of Device2 and configure the routing that is automatically
Step 11:
added to the peer end to protect the network.
#Configure Device2.
Device2(config)#crypto policy policy1
Device2(config-policy)#flow 11.1.1.0 255.255.255.0 any ip tunnel tun1 tun2
Device2(config-policy)#set reverse-route
Device2(config-policy)#exit
Device2(config)#crypto policy policy2
Device2(config-policy)#flow 10.1.1.0 255.255.255.0 any ip tunnel tun2 tun1
Device2(config-policy)#set reverse-route
Device2(config-policy)#exit
#Configure Device2.
Device2(config)#router ospf 100
Device2(config-ospf)#network 10.250.19.0 0.0.0.255 area 0
Device2(config-ospf)#redistribute static
Device2(config-ospf)#redistribute connected
Device2(config-ospf)#exit
#The two 3G interfaces can connect to the operator normally and the IPsec tunnel can
be created. Use the extended ping command on Decice1 with the destination IP
address as 11.1.1.1 and source IP address as 192.168.100.2. Packets are protected
by tun1.
Device1#ping
Protocol [ip]:
Target IP address or hostname: 11.1.1.1
Repeat count [5]:
Datagram size [76]:
Timeout in seconds [2]:
Extended commands [no]: y
Source address or interface: 192.168.100.2
Type of service [0]:
Set DF bit in IP header? [no]:
Validate reply data? [no]:
Data pattern [abcd]:
Loose, Strict, Record, Timestamp, Verbose[none]:
Sweep range of sizes [no]:
Version 1.0
FALCON
#If the IPsec tunnel created via cellular1/0 disconnects due to certain faults, use the
extended ping command on Device1 with the destination IP address as 11.1.1.1 and
source IP address as 192.168.100.2. Packets are protected by tun2.
Device1#ping
Protocol [ip]:
Target IP address or hostname: 11.1.1.1
Repeat count [5]:
Datagram size [76]:
Version 1.0
FALCON
Use the same method to verify that service B uses cellular2/0 as the master interface
and cellular1/0 as the standby interface.
z Configure the command ppp mtu adaptive proxy for virtual-template 1 to ensure the
local MTU adapting to the peer MRU.
z In the WCDMA and TD-SCDMA systems, the APN names, which are provided by
the operator, are used to determine the connected private network. In the CDMA2000
network, run the ppp chap hostname command to identify the private network and
Version 1.0
FALCON
public network based on the corresponding domain names. In the telecom network,
the APN name is not required.
z If the command dialer mode auto is configured for the 3G interface to enable the
automatic dialing, there is no need to define the rule for triggering dialing data flow.
z The traffic distribution means that two services are carried over different 3G lines
when the line is normal and the two lines act in the active and standby mode when
exceptions occur.
z The PPP-authenticated user account and password configured on Device1 are
allocated by the upper AAA server.
z To ensure normal routing, configure reverse route injection for the IPsec policy of
Device2. You can also configure the floating static routing directing to the 3G interface
of Device1. When configuring the static routing, direct to the IP address of the 3G
interface. Do not configure the egress interface named virtual-template .
z If the operator LAC and LNS do not exist in the direct connecting network segment,
the static routing directing to the operator LAC is configured.
Version 1.0
FALCON
94G Interface
9.1 4G Overview
4G is short for 4th Generation. It is evolved from the the third generation
communication technology, that is, LTE (Long Term Evolution). The importing of
various core technologies, such as OFDM (Orthogonal Frequency Division Multiplexing)
and MIMO (Multiple Input Multiple Output), improves the communication efficiency and
transmission rate in the LTE network. With the advantages of high bandwidth, high rate
and low delay, LTE brings better data transmission service for the wireless
communication. It will also bring more revolutionary change, such as VoLTE (Voice
over LTE) and MBMS (Multimedia Broadcast Multicast Service).
LTE mainly has two mainstream network modes, that is, LTE-TDD and LTE-FDD.
LTE-TDD mainly adopts the Time Division Multiplexing technology and the main
advantage is that the uplink and downlink rate can be adjusted by configuring the
uplink and downlink timeslot ratio. It has high utilization for the fragmental bands,
applicable to the asymmetrical transmission services. The disadvantage is the poor
immunity. LTE-FDD mainly adopts the Frequency Division Multiplexing technology. The
uplink and downlink transmission adopts different bands to ensure the stability of the
communication rate and strong immunity. The disadvantage is the low band utilization.
In the 20M spectrum bandwidth, the LTE uplink and downlink theoretical rates are
50Mb/s, 100Mb/s respectively. With the updating of the LTE technology, the rate is also
improved continunously.
With the evolution of the mobile communication technology, the network difference is
gradually reduced, bringing more colorful services for the user.
Version 1.0
FALCON
Viewing from the preceding figure, the device achieves the wireless communication
with the operator base station via the 4G communication modules and achieves data
interaction with the WAN finally via the operator. Different 4G communication modules
and different SIM cards determine different operators and different network modes.
However, viewing from the overall application scenario, the data communications
methods differ slightly.
Configuration Task
Configure the 4G dialing access point Configure the APN dialing access point
Configure the 4G dialing parameters Configure the user name and password
Configure the SIM card safety function Enable the PIN code function
Version 1.0
FALCON
The APN access point name is provided by the carrier. During dialing, the carrier
determines the accessed server and sets up the data connection by resolving the
access point name.
Configuration Condition
Configure the dialing access point according to the dialing requirement of the carrier,
mainly setting the accesse server name.
The carrier determines the access server, authenticates and sets up the connection by
resolving the user name and password.
Configuration Condition
The carrier needs to support the access function via the user name and password.
Configure the user name and password according to the dialing requirement of the
carrier.
Version 1.0
FALCON
It needs to be consistent with the authentication type of the server. If the server does
not need the authentication type, do not affect the dialing process after 4G interface
configuration.
SIM card safety function mainly provides PIN code protection and IMSI binding,
protecting the right of using the 4G module.
The SIM (subscriber identity module), also called the subscriber identity card, records
the user identity data and information.
PIN (Personal Identification Number) code is the personal identity password of the SIM
card. The PIN code is set to 1234 or 0000 by default. If the PIN code is enabled, a
four-digit PIN code must be entered when powering on. The PIN code can be changed,
Version 1.0
FALCON
which is used to protect your own SIM card from being used by others.
PUK (PIN Unlocking Key) is the unblocking code of the PIN code. When the SIM card
is locked caused by entering wrong PIN code, you can unblock it using the PUK code.
z When the PIN code is wrongly entered for three consecutive times, the SIM card will
be locked. At this time, you can use the PUK code to unblock it. However, if the PUK
code is wrongly entered for ten consecutive times, the SIM card will be locked
permanently.
Configuration Condition
None
The right of using the SIM card is protected by enabling the PIN code. You must enter
the correct PIN code to use the SIM card.
PIN code manual authentication means PIN code authentication by entering the
Version 1.0
FALCON
In the PIN code automatic authentication mode, the PIN code is verified by presetting
the PIN code. The user only needs to configure the PIN code for one time and the
device will use the configured PIN code for authentication.
Changing the PIN code allows the new PIN code set by the user. After the PIN code is
changed, the new PIN code is used for authentication.
Version 1.0
FALCON
If the SIM card is locked by entering the wrong PIN code for three consecutive times,
the user can enter the PUK code to unblock it and set new PIN code.
Unlock and set the new PIN pin-code puk-check puk code Mandatory
code via the PUK code pin code
By default, do not
configure the unblock
PIN code
The user can specify the SIM card to the 3G communication module in the fixed slot by
the IMSI binding function, and the 3G communication modules in other slots cannot
use the SIM card. This function is only available for this device.
Version 1.0
FALCON
The deivce only provides two optional network configuration modes, that is, auto mode
and forced LTE mode. The auto mode indicates that the module automatically adapts
to the current network and performs the network switching according to the preferred
mode automatically. The forced LTE mode is mainly used when the 4G signal coverage
is stable in the customer scenario and the user has the specified requirement for the
rate. Usually, the auto mode is recommended.
Configuration Condition
None
The multi-account dialing function is mainly used: In the auto dialing mode, when the
default dialing configuration in the 4G interface fails to dial in the set time, automatically
Version 1.0
FALCON
Configuration Condition
None
Enter the sub item config-list list-id list-id: optional value 1-2
configuration mode
The default dialing configuration in the interface is still the preferred dialing
configuration. After configuring the 4G interface to associate with the multi-account list,
the created multi-account list can take effect.
Table 9-13 Configure the 4G interface to associate with the multi-account list
Version 1.0
FALCON
Command Description
show fastcellular dialer condition Display the error statistics information related
with the dialing
Network Requirements
z Device1 is connected to the specified private network environment via the domain
name.
z Device1 serves as the network site device, the carrier device serves as LAC, and
Device2 serves as LNS. Set up the L2TP tunnel between LAC and Device2.
z Associate Track on the 4G interface of Device1, used to detect the link status
between the site router and LNS.
Network Topology
Version 1.0
FALCON
Gi1 26.1.1.1/24
Gi2 130.255.100.29/24
Configuration Steps
#Configure the dialing user name and password of Device1 4G interface fastcellular1/0.
Configure the interface as the auto dialing mode and get IP adderss via DHCP.
Device1#configure terminal
Device1(config)#interface fastcellular1/0
Device1(config-if-fastcellular1/0)#dialer config username [email protected] password 0 admin
Device1(config-if-fastcellular1/0)#dialer mode auto
Device1(config-if-fastcellular1/0)#ip address dhcp
Device1(config-if-fastcellular1/0)#exit
z The 4G private network can be connected via the APN and domain name. The specific
mode depends on the carrier. In the exmplae, use the domain name mode to access.
#Configure Device2.
Version 1.0
FALCON
Use Radius to authenticate. The authentication list and authorization list are named as
ppp. Configure the address, authentication port, statistics port, and Radius server
password of the Radius server.
Device2(config)#aaa new-model
Device2(config)#aaa authentication ppp ppp radius none
Device2(config)#aaa authorization network ppp radius
Device2(config)#radius-server host 130.255.12.28 auth-port 1812 acct-port 1813 priority 0 key 0 a
#Configure Device2.
Configure only to accept the L2TP connection request of the LAC with hostname
GGSNCD01 (optional).
Device2(config-vpdn)#terminate-from hostname GGSNCD01
Configure the L2TP tunnel authentication password. The password should be the same
as the L2TP password provided by the carrier.
Device2(config-vpdn)#l2tp tunnel password admin
After dialing successfully, the 4G interface of Device1 can get the IP address and the
protocol is up.
Device1#show interface fastcellular 1/0
Fastcellular1/0:
line protocol is up
Flags: (0xc208063) BROADCAST MULTICAST ARP RUNNING
Version 1.0
FALCON
Type: ETHERNET_CSMACD
Internet address: 64.19.245.249/30
Broadcast address: 64.19.245.251
Metric: 0, MTU: 1500, BW: 100000 Kbps, DLY: 100 usec, VRF: global
Reliability 255/255, Txload 1/255, Rxload 1/255
Ethernet address is 0001.7ab8.d858
Last clearing of "show interface" counters never
input peak rate 596 bits/sec, 1 hour 58 minutes 8 seconds ago
output peak rate 715 bits/sec, 1 hour 58 minutes 8 seconds ago
5 minutes input rate 0 bit/sec, 0 packet/sec
5 minutes output rate 0 bit/sec, 0 packet/sec
618 packets received; 1807 packets sent
4 multicast packets received
29 multicast packets sent
0 input errors; 0 output errors
0 collisions; 0 dropped
Unknown protocol 0
Rate: auto Duplex: auto
rxframes 618, rx bytes 52160, rx arps 21
txframes 1807, tx bytes 308654, tx arps 25
rx errors 0, tx errors 0
On Device1, ping the address of the virtual interface virtual-access2 on Device2 and
view whether the ping can succeed.
Device1#ping 64.19.245.250
Device1 can ping the address of the virtual interface virtual- access2 of Device 2.
#On Device1, configure the ICMP-echo entity to detect the network connectivity from
Device1 to Device2 and add the entity to the entity group. Schedule the RTP group 1.
Device1(config)#rtr enable
Device1(config)#rtr 1 icmpecho
Device1(config-rtr-icmpecho)#set 64.19.245.250 5 70 2 12
Device1(config-rtr-icmpecho)#exit
Device1(config)#rtr group 1
Device1(config-rtr-group)#member 1
Device1(config-rtr-group)#exit
Device1(config)#rtr schedule 1 group 1 start now ageout 100 life forever
Version 1.0
FALCON
z For the SLA configuration, refer to the SLA chapter of the configuration manual.
When the link status between Device1 and Device2 is normal, view that the track
status is up on Device1.
Device1#show track object
track 1
status = up
entnum = 1
logic operator AND
Object Type Status Refcnt instruction
------------------------- -------- ------ ----------------------------------------
rtr up 1 rtr 1
-------------------------------------------------------------------------------------
module priority caller
------------------------- -------- ------
NDISDDR 20 0xd56b88
-------------------------------------------------------------------------------------
#On Device1, view that the 4G interface status is UP and can get the IP address.
Device1#show interface fastcellular 1/0
Fastcellular1/0:
line protocol is up
Flags: (0xc208063) BROADCAST MULTICAST ARP RUNNING
Type: ETHERNET_CSMACD
Internet address: 64.19.245.249/30
Broadcast address: 64.19.245.251
Metric: 0, MTU: 1500, BW: 100000 Kbps, DLY: 100 usec, VRF: global
Reliability 255/255, Txload 1/255, Rxload 1/255
Ethernet address is 0001.7ab8.d858
Last clearing of "show interface" counters never
input peak rate 596 bits/sec, 1 hour 58 minutes 8 seconds ago
output peak rate 715 bits/sec, 1 hour 58 minutes 8 seconds ago
5 minutes input rate 0 bit/sec, 0 packet/sec
5 minutes output rate 0 bit/sec, 0 packet/sec
618 packets received; 1807 packets sent
4 multicast packets received
29 multicast packets sent
0 input errors; 0 output errors
0 collisions; 0 dropped
Unknown protocol 0
Rate: auto Duplex: auto
rxframes 618, rx bytes 52160, rx arps 21
txframes 1807, tx bytes 308654, tx arps 25
rx errors 0, tx errors 0
When the link status between Device1 and Device2 is not normal, view that the track
status is down on Device1. Here, make the 4G interface down and re-dial.
Network Requirements
z Device1 is connected to the specified private network environment via the APN.
z 4G router Device1 and Device2 use the IPSEC extended authentication to set up
Version 1.0
FALCON
the IPsec tunnel, protecting the data between the PC1 network and
Network-Center.
z IPsec proposed securitu protocol adopts ESP, IKE proposal and IPsec proposal
encryption algorithm adopts 3DES; authentication algorithm adopts SHA1.
z Set up BFD echo multi-hop session between device1 and device2; detect the 4G
link status between device1 and device2.
Network Topology
Gi1 26.1.1.1/24
Gi2 130.255.100.29/24
Configuration Steps
Version 1.0
FALCON
z The 4G private network can be connected via the APN and domain name. The specific
mode depends on the carrier. In the exmplae, use the APN mode to access.
#Confgure Device2; use Radius to authenticate; the authentication list and accounting
list are named as 4g; configure the Radius server address, authentication port,
statistics port, and Radius server password.
Device2#configure terminal
Device2(config)#aaa new-model
Device2(config)#aaa authentication xauth 4g radius
Device2(config)#aaa accounting network 4g wait-start radius
Device2(config)#radius-server host 130.255.12.28 auth-port 1812 acct-port 1813 priority 0 key 0 a
#Configure the IKE proposal ikepro on Device1, use the encryption algorithm 3DES
and authentication algorithm SHA1; configure the IPsec proposal ippro, use ESP
security protocol, use the encryption algorithm 3DES and authentication algorithm
SHA1.
Device1(config)#crypto ike proposal ikepro
Device1(config-ike-prop)#encryption 3des
Device1(config-ike-prop)#exit
Device1(config)#crypto ipsec proposal ippro
Device1(config-ipsec-prop)#esp 3des sha1
Device1(config-ipsec-prop)#exit
#Configure the pre-share key on Device1 as admin and permit all peers to use the key.
Device1(config)#crypto ike key admin any
#Configure the IKE proposal ikepro on Device2, use the encryption algorithm 3DES
and authentication algorithm SHA1; configure the IPsec proposal ippro, use the ESP
security protocol, use the encryption algorithm 3DES and authentication algorithm
SHA1.
Device2(config)#crypto ike proposal ikepro
Device2(config-ike-prop)#encryption 3des
Device2(config-ike-prop)#exit
Device2(config)#crypto ipsec proposal ippro
Device2(config-ipsec-prop)#esp 3des sha1
Device2(config-ipsec-prop)#exit
#Configure the pre-share key on Device2 as admin and permit all peers to use the key.
Device2(config)#crypto ike key admin any
Version 1.0
FALCON
#Configure the IKE ID aliad as 4g on Device2, apply the extended authentication list 4g,
specify the extended authentication IMSI attribute and optional attribute, and apply the
accounting list 4g.
Device2(config)#crypto ike id alias 4g
Device2(config)#authentication 4g authen_imsi optional
Device2(config)#accounting 4g
#Configure the tunnel tun on Device1 to initiate the negotiation with the identity of the
extended authentication client, use the 4G interface fastcellular1/0 as the local address
of the tunnel, configure the peer address of the tunnel as 125.71.215.223, configure
the authentication mode as the pre-share key authentication, IKE proposal uses ikepro,
the IPsec proposal uses ippro, configure the extended authentication client user name
as a and password as a, and enable auto initiating negotiation. On the AAA server, it is
necessary to configure the IKE extended authentication user name, password, and
IMSI information.
z The IMSI value of the AAA server is consistent with the IMSI value of the 4G interface.
#On Device2, configure the tunnel, use the address of the interface Gi0
125.71.215.223 as the local address of the tunnel, configure the peer address of the
tunnel as any, the IKE proposal uses ikepro, the IPsec proposal uses ippro, and set the
peer ID alias as 4g.
Device2(config)#crypto tunnel tun
Device2(config-tunnel)#local address 125.71.215.223
Device2(config-tunnel)#peer any
Device2(config-tunnel)#set ike proposal ikepro
Device2(config-tunnel)#set ipsec proposal ippro
Device2(config-tunnel)#set peer-id alias 4g
Device2(config-tunnel)#exit
Version 1.0
FALCON
tunnel tun.
Device1(config)#crypto policy policy1
Device1(config-policy)#flow 172.16.2.0 255.255.255.0 26.1.1.0 255.255.255.0 ip tunnel tun
Device1(config-policy)#exit
Version 1.0
FALCON
z Currently, BFD only detects the lower-end device, so the upper Device2 session status
is always DOWN.
Version 1.0
FALCON
#You can see that Device1 and Device2 set up the IPsec extended authentication
tunnel successfully.
#PC1 and data center can ping each other via the Ipsec tunnel.
#After the line between Device1 and Device2 fails, BFD can detect the fault fast and
trigger re-initiating dialing after the 4G interface is down.
Version 1.0
FALCON
10 Loopback Interface
10.1 Overview
Loopback interface, also called local loopback interface, is one logical virtual interface
realized by software. The interface is not affected by the physical status. As long as not
disabling manually, its status is always enabled. In the dynamical routing protocol, such
as OSPF, you can select the IP address of loopback interface as Router ID. For the
packets sent to the loopback interface, the device regards that the packets are sent to
itself, so it does not forward the packets.
Configuration Task
Configuration Condition
None
Version 1.0
FALCON
Version 1.0
FALCON
11 Null Interface
11.1 Overview
Null interface is one logical interface realized by software. Any packet sent to null
interface is dropped. The dynamic routing protocol, such as OSPF, generates the
auto-summarized route. The egress interface points to null interface and can avoid
route loop effectively. Null0 interface is created by the device by default and the user
cannot disable or delete it.
Configuration Task
Configure the basic functions of Null Configure the basic functions of Null
interface
interface
Configuration Condition
None
Version 1.0
FALCON
z Null interface just supports configuring permitting or prohibiting sending the error
packet of ICMP unreachable.
z The packet reaching Null interface is dropped and it is not necessary to send the
error of ICMP unreachable.
Version 1.0
FALCON
12 Tunnel Interface
12.1 Overview
Tunnel is the technology of using one network protocol to transmit another network
protocol. It includes the process of encapsulating, transmitting, and de-encapsulating
data. The path passed by the encapsulated packet when being transmitted in the
network is called tunnel. Tunnel is one virtual point-to-point connection. The devices at
the two sides of the tunnel are called tunnel endpoints and they are responsible for
encapsulating and de-encapsulating packets.
Configuration Task
Configure the basic functions of the tunnel Configure the basic functions of the tunnel
interface interface
Configuration Condition
None
Version 1.0
FALCON
z The TOS configured on tunnel interface is used to fill the TOS field in the outer IPv4
packet header during encapsulation. If the TOS value is not configured on tunnel
interface, use the TOS value in the inner IPv4 packet header.
z The TTL value configured on tunnel interface is used to fill the TTL field in the outer
IPv4 packet header during encapsulation.
Version 1.0