NE9000 V800R022C00 Configuration Guide 04 Interface and Data Link
NE9000 V800R022C00 Configuration Guide 04 Interface and Data Link
V800R022C00SPC600
Configuration Guide
Issue 01
Date 2022-10-31
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: [email protected]
Contents
1 Configuration............................................................................................................................1
1.1 Interface and Data Link........................................................................................................................................................ 1
1.1.1 About This Document........................................................................................................................................................ 1
1.1.2 Interface Management Configuration.......................................................................................................................... 5
1.1.2.1 Overview of Interface Management..........................................................................................................................5
1.1.2.2 Configuration Precautions for Interface_Management.................................................................................... 12
1.1.2.3 Interface Basics Configuration................................................................................................................................... 12
1.1.2.3.1 Entering the Interface View.................................................................................................................................... 13
1.1.2.3.2 (Optional) Setting Interface Parameters............................................................................................................ 13
1.1.2.3.3 Enabling an Interface................................................................................................................................................ 17
1.1.2.3.4 (Optional) Configuring a Device to Send a Trap Message to an NMS When an Interface Physical
Status Changes............................................................................................................................................................................. 17
1.1.2.3.5 (Optional) Configuring IPv4 and IPv6 Traffic Statistics Collection on a Main Interface................... 18
1.1.2.3.6 (Optional) Configuring Power Locking and Gain Locking for an Optical Amplifier Module...........18
1.1.2.3.7 (Optional) Configuring an Interface Splitting Mode......................................................................................19
1.1.2.3.8 Verifying the Configuration.....................................................................................................................................19
1.1.2.4 Configuring the Physical Link Detection Function............................................................................................. 20
1.1.2.4.1 Configuring the Alarm Function for CRC Errors, SDH Errors, Input Errors, Output Errors, or
Optical Module Power Exceptions......................................................................................................................................... 20
1.1.2.4.2 Configuring the Alarm Function for Pause-Frame Errors Received on an Interface........................... 23
1.1.2.4.3 Configuring the Alarm Function in Case the Number of SDH B1 or SDH B2 Error Packets That an
Interface Receives Exceeds an Alarm Threshold............................................................................................................... 24
1.1.2.4.4 Configuring the Alarm Function in Case the Number of Bytes of Error Packets That an Interface
Receives Exceeds an Alarm Threshold.................................................................................................................................. 24
1.1.2.4.5 Verifying the Configuration.....................................................................................................................................25
1.1.2.5 Configuring MAC Accounting.................................................................................................................................... 26
1.1.2.6 Configuring Strict Filter for EVC Sub-Interfaces.................................................................................................. 27
1.1.2.7 Enabling the Signal Sending Delay Function....................................................................................................... 28
1.1.2.8 Enabling or Disabling the Optical Module Laser................................................................................................ 29
1.1.2.8.1 Disabling the Optical Module Laser.................................................................................................................... 30
1.1.2.8.2 (Optional) Enabling the Optical Module Laser................................................................................................30
1.1.2.8.3 Verifying the Configuration of Enabling or Disabling the Optical Module Laser................................ 31
1.1.2.9 Enabling the Optical Module Alarm Threshold Standardization Function................................................ 32
1.1.2.10 Disabling the Optical Module Alarm Function................................................................................................. 32
Figures
Tables
Table 1-1 Commands, views, and prompts of physical interfaces supported by the NE9000............... 6
Table 1-2 Commands, views, and prompts of logical interfaces..................................................................... 8
Table 1-3 Flapping control modes............................................................................................................................11
Table 1-4 Feature requirements................................................................................................................................ 12
Table 1-5 Configurable parameters of an interface...........................................................................................14
Table 1-6 Setting interface parameters.................................................................................................................. 15
Table 1-7 Logical interface list.................................................................................................................................. 36
Table 1-8 Numbers of physical ports that can be added to the same group and port-id value
ranges for different subcard models........................................................................................................................ 45
Table 1-9 Feature requirements................................................................................................................................ 68
Table 1-10 Elements of the date format................................................................................................................93
1 Configuration
Licensing Requirements
For details about the License, see the License Guide.
● Carrier user: License Usage Guide
● Enterprise users: License Usage Guide
Related Version
The following table lists the product version related to this document.
Intended Audience
This document is intended for:
● Data configuration engineers
● Commissioning engineers
● Network monitoring engineers
● System maintenance engineers
Security Declaration
● Notice on Limited Command Permission
The documentation describes commands when you use Huawei devices and
make network deployment and maintenance. The interfaces and commands
for production, manufacturing, repair for returned products are not described
here.
If some advanced commands and compatible commands for engineering or
fault location are incorrectly used, exceptions may occur or services may be
interrupted. It is recommended that the advanced commands be used by
engineers with high rights. If necessary, you can apply to Huawei for the
permissions to use advanced commands.
● Encryption algorithm declaration
The encryption algorithms DES/3DES/RSA (with a key length of less than
2048 bits)/MD5 (in digital signature scenarios and password encryption)/
SHA1 (in digital signature scenarios) have a low security, which may bring
security risks. If protocols allowed, using more secure encryption algorithms,
such as AES/RSA (with a key length of at least 2048 bits)/SHA2/HMAC-SHA2
is recommended.
For security purposes, insecure protocols Telnet, FTP, and TFTP as well as
weak security algorithms in BGP, LDP, PECP, MSDP, DCN, TCP-AO, MSTP, VRRP,
E-Trunk, AAA, IPsec, BFD, QX, port extension, SSH, SNMP, IS-IS, RIP, SSL, NTP,
OSPF, and keychain features are not recommended. To use such weak security
algorithms, run the undo crypto weak-algorithm disable command to enable
the weak security algorithm function. For details, see the Configuration Guide.
● Password configuration declaration
– When the password encryption mode is cipher, avoid setting both the
start and end characters of a password to "%^%#". This causes the
password to be displayed directly in the configuration file.
– To further improve device security, periodically change the password.
● Personal data declaration
– Your purchased products, services, or features may use users' some
personal data during service operation or fault locating. You must define
user privacy policies in compliance with local laws and take proper
measures to fully protect personal data.
– When discarding, recycling, or reusing a device, back up or delete data on
the device as required to prevent data leakage. If you need support,
contact after-sales technical support personnel.
● Feature declaration
– The NetStream feature may be used to analyze the communication
information of terminal customers for network traffic statistics and
management purposes. Before enabling the NetStream feature, ensure
that it is performed within the boundaries permitted by applicable laws
and regulations. Effective measures must be taken to ensure that
information is securely protected.
Special Declaration
● This document serves only as a guide. The content is written based on device
information gathered under lab conditions. The content provided by this
document is intended to be taken as general guidance, and does not cover all
scenarios. The content provided by this document may be different from the
information on user device interfaces due to factors such as version upgrades
and differences in device models, board restrictions, and configuration files.
The actual user device information takes precedence over the content
provided by this document. The preceding differences are beyond the scope of
this document.
● The maximum values provided in this document are obtained in specific lab
environments (for example, only a certain type of board or protocol is
configured on a tested device). The actually obtained maximum values may
be different from the maximum values provided in this document due to
factors such as differences in hardware configurations and carried services.
● Interface numbers used in this document are examples. Use the existing
interface numbers on devices for configuration.
● The pictures of hardware in this document are for reference only.
● The supported boards are described in the document. Whether a
customization requirement can be met is subject to the information provided
at the pre-sales interface.
● In this document, public IP addresses may be used in feature introduction and
configuration examples and are for reference only unless otherwise specified.
● The configuration precautions described in this document may not accurately
reflect all scenarios.
● Log Reference and Alarm Reference respectively describe the logs and alarms
for which a trigger mechanism is available. The actual logs and alarms that
the product can generate depend on the types of services it supports.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as
follows.
Convention Description
Convention Description
Change History
Changes between document issues are cumulative. The latest document issue
contains all the changes made in earlier issues.
● Changes in Issue 01 (2022-10-31)
This issue is the first official release. The software version of this issue is
V800R022C00SPC600.
Interface Types
Devices exchange data and interact with other devices on a network through
interfaces. Interfaces are classified into physical and logical interfaces.
● Physical Interfaces
Physical interfaces physically exist on boards. They are divided into the
following types:
– LAN interfaces: interfaces through which the router can exchange data
with other devices on a LAN.
– WAN interfaces: interfaces through which the router can exchange data
with remote devices on external networks.
● Logical Interfaces
Logical interfaces are manually configured interfaces that do not exist
physically. Logical interfaces can be used to exchange data.
NOTICE
The management network port of the main control board does not forward
services.
Table 1-1 Commands, views, and prompts of physical interfaces supported by the
NE9000
Interface Command Operation Prompt
Name View
Feature Requirements
Usage Scenario
To ensure better communication between devices on the network, physical and
logical interfaces must be used together. In addition, you need to set parameters
for each interface as required, such as the description, MTU, alarm thresholds for
the inbound and outbound bandwidth usage of each interface, interval for
collecting traffic statistics, trap reporting to the NMS when the protocol status of
an interface changes, and control-flap.
Pre-configuration Tasks
Before performing interface basics configurations, verify that the device has been
powered on and started properly.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
In this command, interface-type specifies the type of the interface, and interface-
number specifies the number of the interface.
Step 3 (Optional) Run commit
The configuration is committed.
If the interface of the specified type and number exists in the preceding step, you
do not need to run the commit command.
----End
Context
Table 1-5 describes the configurable parameters of an interface.
Parameter Description
Interface MTU After the MTU is configured for an interface, the device
fragments a packet transmitted on the interface if the
size of the packet exceeds the MTU.
NOTE
Loopback and NULL interfaces do not support the MTU.
Interface bandwidth You can calculate the bandwidth usage by setting the
that can be obtained interface bandwidth that can be obtained by the NMS
by the NMS through through the MIB.
the MIB
Whether the device You can enable the device to send a trap message to the
sends a trap NMS when the interface status changes. After this
message to the NMS function is enabled, the NMS monitors the interface
when the interface status in real time.
status changes However, if an interface alternates between up and
down, the device will frequently send trap messages to
the NMS, which increases the processing load on the
NMS. In this situation, you can disable the device from
sending trap messages to the NMS to avoid adverse
impact on the NMS.
Interval at which After setting the interval at which traffic statistics are
traffic statistics are collected for an interface, you can view the traffic
collected volumes and rates of the interface in different time
ranges.
Procedure
Step 1 Run system-view
In this command, interface-type specifies the type of the interface, and interface-
number specifies the number of the interface.
Step 3 Perform one or more operations in Table 1-6 to set the desired interface
parameters.
Set an MTU for an Run the mtu mtu or ipv6 mtu mtu command to set an
interface. MTU for an interface.
Run the mtu mtu spread or ipv6 mtu mtu spread
command to set an MTU for an interface and apply the
MTU to all the sub-interfaces on the interface.
NOTE
● After changing the MTU on a POS interface using the mtu
or mtu spread command, run the shutdown and undo
shutdown commands in the interface view for the change to
take effect. Alternatively, you can run the restart command
in the interface view to restart the interface for the change
to take effect.
● If IPv4 attributes are configured on an interface, run the mtu
or mtu spread command to set an MTU for the IPv4 packets
to be sent by the interface.
● If IPv6 attributes are configured on an interface, run the ipv6
mtu or ipv6 mtu spread command to set an MTU for the
IPv6 packets to be sent by the interface.
Configure whether Run the enable snmp trap updown command to enable
the device sends a the device to send a trap message to the NMS when the
trap message to the interface status changes.
NMS when the NOTE
interface status If an interface alternates between up and down, the device will
changes. frequently send trap messages to the NMS, which increases the
processing load on the NMS. In this situation, you can run the
undo enable snmp trap updown command to disable the
device from sending trap messages to the NMS to avoid adverse
impact on the NMS.
Operation Description
Set the interval at Run the set flow-stat interval interval command to set
which traffic the interval at which traffic statistics are collected.
statistics are NOTE
collected. ● To set a global interval at which traffic statistics are
collected, run the set flow-stat interval interval command
in the system view, and you do not need to run the interface
interface-type interface-number command. You can
configure a global traffic statistic collection interval, which
takes effect on all interfaces, including the interfaces on
which no traffic statistic collection interval has been set.
● The new interval takes effect after the original interval
expires. If the interface is logical, traffic statistics about the
interface are updated when the new interval takes effect for
the second time. If the interface is physical, traffic statistics
about the interface are updated immediately after the new
interval takes effect.
Enable the control- Run the control-flap [ suppress reuse ceiling decay-ok
flap function. decay-ng ] command to enable the control-flap function
on an interface.
The value of suppress is 1000 times the interface
suppression threshold. It ranges from 1 to 20000. The
default value is 2000. The value of suppress must be
greater than the value of reuse and less than the value
of ceiling.
The value of reuse is 1000 times the interface reuse
threshold. It ranges from 1 to 20000. The default value is
750. The value of reuse must be less than the value of
suppress.
The value of ceiling is 1000 times the maximum
interface suppression penalty value. It ranges from 1001
to 20000. The default value is 6000. The value of ceiling
must be greater than the value of suppress.
decay-ok specifies the half life for the penalty value
when an interface is up. It ranges from 1 to 900, in
seconds. The default value is 54.
decay-ng specifies the half life for the penalty value
when an interface is down. It ranges from 1 to 900, in
seconds. The default value is 54.
----End
Context
NOTE
Procedure
● By default, interfaces are started.
● If an interface is shut down, perform the following steps to start the interface:
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
c. Run undo shutdown
The interface is started.
d. Run commit
The configuration is committed.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run enable snmp trap physical-updown
The device is enabled to send a trap message to the NMS when the interface
physical status changes.
----End
Context
Do as follows on the router that needs to be configured with IPv4 and IPv6 traffic
statistics collection.
Procedure
Step 1 Run system-view
IPv4 and IPv6 traffic statistics collection is enabled on the main interface.
----End
1.1.2.3.6 (Optional) Configuring Power Locking and Gain Locking for an Optical
Amplifier Module
You can configure power locking and gain locking for an optical amplifier module
to amplify the optical power.
Context
Perform the following steps on the router where power locking and gain locking
need to be configured for an optical amplifier module.
Procedure
Step 1 Run system-view
Power locking and gain locking are configured for the optical amplifier module.
----End
Context
To switch an interface bandwidth mode, configure an interface splitting mode,
which increases the networking flexibility and saves interface costs.
NOTE
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run port split dimension interface { { interface-name1 | interface-type interface-
number1 } [ to { interface-name2 | interface-type interface-number2 } ] } &<1–
32> split-type split-type
Interface splitting is configured.
Step 3 Run commit
The configuration is committed.
----End
Procedure
● Run the display interface [ interface-type interface-number ] command to
check the status of the interface and statistics on the interface.
● Run the display control-flap interface interface-type interface-number
command to check the configuration and running status of the control-flap
function on interfaces.
● Run the display counters [ bit ] [ inbound | outbound ] [ interface
interface-type [ interface-number ] ] [ slot slot-id ] command to check the
interface traffic statistics.
● Run the display counters [ bit ] rate [ inbound | outbound ] [ interface
interface-type [ interface-number | slot slot-id ] | slot slot-id ] command to
check the interface traffic rates.
● Run the display port split or display port split slot command to check the
splitting status of the interface.
----End
Usage Scenario
When plenty of alarms are generated on links, system performance deteriorates
because the system has to process the huge number of alarms. You can set
thresholds for different types of alarms, so that alarms are generated only when
the alarm thresholds are reached. In addition, measures can be taken when
necessary to remove faults and guarantee the transmission of normal traffic.
Pre-configuration Tasks
Before configuring physical link detection, complete the following tasks:
● Powering on the router, ensuring that the router works properly and
completes self-check successfully.
● Configure physical attributes for interfaces on the router.
1.1.2.4.1 Configuring the Alarm Function for CRC Errors, SDH Errors, Input Errors,
Output Errors, or Optical Module Power Exceptions
This section describes how to configure the alarm function for CRC errors, SDH
errors, input errors, output errors, or optical module power exceptions.
Context
If the alarm function for CRC errors, SDH errors, input errors, output errors, or
optical module power exceptions is enabled on an interface, the system generates
an alarm when the number of errors or exceptions exceeds or falls below the
threshold set on the interface. If a large number of alarms are generated on links,
the system will be busy processing them, which causes performance deterioration.
To prevent this problem, properly configure the type of interface alarm, alarm
thresholds, and detection interval.
Procedure
Step 1 Run system-view
The configuration takes effect on all physical interfaces supporting the alarm
function.
You can configure a global traffic statistic collection interval, which takes effect
on all interfaces, including the interfaces on which no traffic statistic collection
interval has been set. To configure a global traffic statistic collection interval, run
the set flow-stat interval interval command in the system view. The traffic
statistic collection interval of an interface takes preference over a global traffic
statistic collection interval.
● Configure CRC alarm thresholds and a detection interval (for Ethernet
interfaces and POS interfaces using either of the following methods):
– Run trap-threshold crc-error threshold interval-second interval
An alarm threshold and a detection interval are set for CRC errors.
– Run trap-threshold crc-error high-threshold high-threshold low-
threshold low-threshold interval-second interval [ shutdown ]
The upper and lower alarm thresholds for CRC errors as well as the
detection interval are set.
NOTE
You can run the trap-threshold slot slot-id card card-id crc-error high-
threshold high-threshold low-threshold low-threshold interval-second interval
command in the system view to configure global values for all interfaces on the
specified subcard.
● Configure SDH alarm thresholds and a detection interval (for 10GE WAN
interfaces and POS interfaces using either of the following methods):
– Run trap-threshold sdh-error threshold interval-second interval
An alarm threshold and a detection interval are set for SDH errors.
– Run trap-threshold sdh-error high-threshold high-threshold low-
threshold low-threshold interval-second interval
The upper and lower alarm thresholds for SDH errors as well as the
detection interval are set.
● Configure SDH alarm thresholds and a detection interval (for POS interfaces
using either of the following methods):
– Run trap-threshold sdh-error threshold interval-second interval
An alarm threshold and a detection interval are set for SDH errors.
– Run trap-threshold sdh-error high-threshold high-threshold low-
threshold low-threshold interval-second interval
The upper and lower alarm thresholds for SDH errors as well as the
detection interval are set.
● Configure symbol alarm thresholds and a detection interval (for Ethernet
interfaces only).
– Run trap-threshold symbol-error high-threshold high-threshold low-
threshold low-threshold interval-second interval
The upper and lower alarm thresholds for symbol errors as well as the
detection interval are set.
NOTE
You can run the trap-threshold slot slot-id card card-id symbol-error high-
threshold high-threshold low-threshold low-threshold interval-second interval
command in the system view to configure global values for all interfaces on the
specified subcard.
● Configure input/output alarm thresholds and a detection interval (for
Ethernet interfaces and POS interfaces).
– Run trap-threshold { input-error | output-error } high-threshold high-
threshold low-threshold low-threshold interval-second interval
The upper and lower alarm thresholds for interface input or output errors
are set.
NOTE
You can run the trap-threshold slot slot-id card card-id { input-error | output-
error } high-threshold high-threshold low-threshold low-threshold interval-
second interval command in the system view to configure global values for all
interfaces on the specified subcard.
NOTE
● You can run the port-alarm down slot slot-id card card-id { crc-error | sdh-error |
symbol-error | input-error | output-error | bip8-sd } command in the system view to
apply the configurations to all interfaces on the subcard.
● After the association function is enabled, you can run the port-alarm clear { crc-error |
sdh-error | symbol-error | input-error | output-error | bip8-sd } command to clear the
alarms on the interface.
----End
Context
A device generates an alarm and sends it to an NMS only when the number of
pause-frame error packets sent or received by the device reaches the upper
threshold for three consecutive detection intervals. The device sends a clear alarm
to the NMS only when the number of pause-frame error packets sent or received
by the device falls below the lower threshold for three consecutive detection
intervals.
Procedure
Step 1 Run system-view
----End
1.1.2.4.3 Configuring the Alarm Function in Case the Number of SDH B1 or SDH B2
Error Packets That an Interface Receives Exceeds an Alarm Threshold
You can configure the alarm function in case the number of SDH B1 or SDH B2
error packets exceeds an alarm threshold. If such an alarm is generated, the link is
in a poor condition.
Context
If an interface receives a large number of SDH B1 or SDH B2 error packets, the
link is in a poor condition, affecting service transmission. In this situation, you can
configure the alarm function, alarm threshold, and detection interval on an
interface. The system then detects the number of SDH B1 or SDH B2 error packets
that the interface receives at the configured interval. If the number of SDH B1 or
SDH B2 error packets exceeds the configured alarm threshold, the system
generates an alarm and sends it to the NMS, prompting the administrator to
perform maintenance on the interface and troubleshoot the fault. When the
number of SDH B1 or SDH B2 error packets falls below the alarm threshold, the
system generates a clear alarm and sends it to the NMS, notifying the
administrator that the alarm has been cleared.
Procedure
Step 1 Run system-view
A threshold and detection interval for the SDH B1 or SDH B2 error alarm on an
interface are set.
----End
1.1.2.4.4 Configuring the Alarm Function in Case the Number of Bytes of Error
Packets That an Interface Receives Exceeds an Alarm Threshold
You can configure the alarm function in case the number of bytes of error packets
exceeds a threshold. If such an alarm is generated, the link is in a poor condition.
Context
If an interface receives a large number of bytes of error packets, the link is in a
poor condition, affecting service transmission. In this situation, you can configure
the alarm function, alarm threshold, and detection interval on an interface. The
system then detects the number of bytes of error packets that the interface
receives at the configured interval. If the number of bytes of error packets exceeds
the configured alarm threshold, the system generates an alarm and sends it to the
NMS, prompting the administrator to perform maintenance on the interface and
troubleshoot the fault. When the number of bytes of error packets falls below the
alarm threshold, the system generates a clear alarm and sends it to the NMS,
notifying the administrator that the alarm has been cleared.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run snmp-agent trap enable port bad-bytes
The alarm function is configured in case the number of bytes of error packets
exceeds an alarm threshold.
----End
Context
The physical link detection function has been configured.
Procedure
● Run the display trap-info command in the interface view or run the display
trap-info { interface-type interface-number | interface-name | slot slot-id
card card-id } command in the system view to check alarm configurations on
the specified interface, including the alarm function status, alarm thresholds,
detection interval, alarm blocking status, current alarm state, and the number
of current alarms.
----End
Usage Scenario
Procedure
Step 1 Run system-view
----End
If you need to re-check MAC accounting statistics after a period, run the reset
mac accounting command to delete the existing statistics and then run the
display mac accounting command. This ensures statistics accuracy.
Usage Scenario
On a BD scenario, the router has two sub-interfaces configured in a main
interface, one with the Dot1q encapsulation type and the other with the default
encapsulation type. Once the sub-interface encapsulated Dot1q receives traffic,
the sub-interface with the default encapsulation type also sends out the traffic.
This may cause the illusion of return current. Besides, the router has two
interfaces configured on a BD scenario. The first interface has a sub-interface that
is configured with the Dot1q encapsulation type. The second interface has two
sub-interfaces that are configured with the Dot1q and default encapsulation types
respectively. Once traffic passes through the sub-interface on the first interface,
the second interface also sends two copied traffic from each of its sub-interfaces.
This causes traffic to be replicated, wasting resources and reducing the board's
forwarding efficiency. To allow traffic to be sent through specific interfaces, enable
strict filter.
Pre-configuration Tasks
Before configuring strict filter on an interface, configure physical attributes for
interfaces on the router.
Procedure
● Enable strict filter globally.
a. Run system-view
NOTE
The strict filter configuration on an EVC sub-interface takes precedence over that
configured in the system view. The strict filter configuration on an EVC sub-
interface takes effect, regardless of whether strict filter is configured globally.
----End
Usage Scenario
After a device is restarted or a board is replaced, if an interface sends signals
immediately after initialization before the link completes a switchover or
configuration restoration, data loss may occur. To prevent data loss, configure the
signal sending delay function.
NOTE
● Only physical interfaces can be configured with signal sending delays. Logical interfaces
do not support this function.
● Configuring a signal sending delay does not affect an interface that has sent signals to
the peer, and the configuration takes effect after the interface is initialized.
Procedure
Step 1 Run system-view
The GE, POS, 10GE WAN or 10GE LAN interface view is displayed.
2. Run controller wdm interface-number
The signal sending delay function is enabled, and the signal sending delay is
configured.
----End
Usage Scenario
Before locating or troubleshooting a link failure, maintenance engineers should
ensure that the optical module laser is disabled so that it cannot cause injury. The
optical module can be configured to disable the laser automatically if it detects a
link failure. The laser can also be disabled manually. If the optical module is
configured to disable the laser automatically, the laser is not immediately re-
enabled when the link failure is cleared. However, maintenance engineers can
enable the optical module laser manually to check whether services have
recovered.
Pre-configuration Tasks
Before enabling or disabling the optical module laser, complete the following
tasks:
Context
Before locating or troubleshooting a link failure, maintenance engineers should
ensure that the optical module laser is disabled so that it cannot cause injury. The
optical module can be configured to disable the laser automatically if it detects a
link failure. The laser can also be disabled manually.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Perform either of the following operations:
● Configure the optical module to disable the laser automatically.
a. To configure the optical module to disable the laser automatically, run
the laser autoshutdown enable command.
b. (Optional) To configure intervals at which the optical module laser is
disabled or enabled and the system checks for link failures, run the laser
auto-shutdown-interval { open opentime-interval | close closetime-
interval } command.
● Disable the optical module laser manually.
To disable the optical module laser manually, run the laser turn-off
command.
NOTICE
Context
If the optical module is configured to disable the laser automatically, the laser is
not immediately re-enabled when the link failure is cleared. However,
maintenance engineers can enable the optical module laser manually to check
whether services have recovered.
Procedure
Step 1 Run system-view
The optical module laser is enabled, and the duration for which the optical
module laser will be temporarily enabled is configured.
The duration takes effect only after the laser autoshutdown enable command is
run.
----End
Prerequisites
The optical module laser has been enabled or disabled as required.
Context
The following operations affect the status of the optical module laser:
● Run the laser turn-on command to enable the optical module laser.
● Run the laser turn-off command to disable the optical module laser.
● Run the laser autoshutdown enable command to configure the optical
module to disable the laser automatically if it detects a link failure.
● Run the shutdown command to deactivate the interface.
Procedure
● Run the display laser status { interface interface-type interface-number }
command in any view to check the status of the optical module laser.
----End
Context
The system automatically obtains the vendor-defined power threshold of an
optical module and compares it with the actual power. If the actual power exceeds
the vendor-defined threshold, an alarm will be generated. However, the vendor-
defined power threshold of an optical module may not meet user requirements. If
the alarm standardization function is enabled, a unified power threshold is used,
and the threshold is calculated based on the optical module transmission distance
and bandwidth.
NOTE
The device has two types of optical module power alarms: warning and alarm. A warning is
reported when the difference between the actual power and vendor-defined threshold is
not great. It can also be considered as a precaution. Some optical modules can continue
working properly when the actual optical power is at the warning level. You can disable
warning detection as required.
Procedure
Step 1 Run system-view
The alarm threshold standardization function is enabled for the optical module.
----End
Context
The system automatically obtains the vendor-defined power threshold of an
optical module and compares it with the actual power. If the actual power exceeds
the vendor-defined threshold, an alarm will be generated. Generally, the actual
power is greater than the vendor-defined threshold, which means frequent alarm
reporting. It is unfeasible to install an attenuator on each optical module to
prevent frequent reporting of such power alarms. You can disable the alarm
function for the optical module by executing the following command.
NOTE
The device has two types of optical module power alarms: warning and alarm. A warning is
reported when the difference between the actual power and vendor-defined threshold is
not great. It can also be considered as a precaution. Some optical modules can continue
working properly when the actual optical power is at the warning level. You can disable the
alarm function for these optical modules to prevent these optical modules from frequently
reporting warnings by executing the following command.
Procedure
Step 1 Run system-view
----End
Context
When an interface is inserted with a non-Huawei-certified optical module, the
system automatically reports an alarm. If you want to suppress the alarm, you can
disable the function of reporting the alarm for the non-Huawei-certified optical
module. If you do not want to use the interface with the optical module inserted,
you can enable the function of setting the interface to Down.
Procedure
Step 1 Run system-view
----End
Usage Scenario
The flapping of routing protocols, MPLS, and other protocols caused by the
frequent change of the interface status may influence the stability of the whole
network. To resolve this problem, you can configure the control-flap function.
Pre-configuration Tasks
Before configuring the control-flap function, configure the physical attributes for
the router interfaces.
Procedure
● Configure the control-flap function.
a. Run system-view
NOTE
The null interface and loopback interface do not support the control-flap
function.
c. Run control-flap [ suppress reuse ceiling decay-ok decay-ng ]
The value of reuse is 1000 times the reuse threshold of the interface. It
ranges from 1 to 20000. The default value is 750. The value of reuse must
be smaller than the value of suppress.
The value of ceiling is 1000 times the suppress penalty value of the
interface. It ranges from 1001 to 20000. The default value is 6000. The
value of ceiling must be greater than the value of suppress.
The value of decay-ok is the time taken to decay the penalty value to
half when the interface is Up. It ranges from 1 to 900 seconds. The
default value is 54 seconds.
The value of decay-ng is the time taken to decay the penalty value to
half when the interface is Down. It ranges from 1 to 900 seconds. The
default value is 54 seconds.
d. Run commit
----End
Usage Scenario
For usage scenarios of logical interfaces, see "Logical Interface" in NE9000-Feature
Description-Interface Management.
Pre-configuration Tasks
Before configuring logical interfaces, connect interfaces and set their physical
parameters to ensure that these interfaces are physically up.
Procedure
Step 1 Run system-view
----End
Context
To prevent services from affecting each other, a mechanism to isolate different
types of services is needed. Different service flows are forwarded through different
VLAN channelized sub-interfaces with dot1q encapsulation, and each channelized
sub-interface implements independent HQoS scheduling to isolate services of
different types.
Procedure
Step 1 Run system-view
NOTE
----End
Procedure
Step 1 Run system-view
----End
Procedure
Step 1 Run system-view
The NULL interface is always in the Up state but does not forward any data
packets. In addition, IP addresses cannot be configured on the NULL interface, and
data link layer protocol cannot be encapsulated on the NULL interface.
----End
Follow-up Procedure
The NULL interface is used to prevent routing loops and filtering traffic. If the ip
route-static 192.168.0.0 255.255.0.0 NULL 0 command is run, the device will
discard all packets destined for the network segments 192.168.0.1 to
192.168.255.255.
Prerequisites
The Global-VE interface, FlexE interface license, FlexE interface, loopback interface,
and NULL interface have been configured.
Procedure
● Run the display interface loopback [ loopback-number ] command to check
the status of the Loopback interface.
● Run the display interface null [ 0 ] command to check the status of the Null
interface.
● Run the display flexe group information slot slot-id card card-id command
to check information about groups, FlexE physical interfaces added to the
groups, and timeslot allocation in the groups on a FlexE subcard.
----End
Usage Scenario
The need for higher mobile bearer bandwidth is increasing as 5G networks
continue to evolve. In addition, customers want a unified network to transmit
various services, such as home broadband, leased line access, and mobile bearer
services. These factors place increasingly higher requirements on
telecommunication network interfaces. FlexE isolates services by isolating the
bandwidth resources of interfaces. FlexE interfaces are isolated from each other so
that traffic is isolated at the physical layer and network slicing is performed for
services on the same physical network.
FlexE applies to the access, aggregation, and core layers. As 5G services transition
through the initial, development, and maturity phases, the service volume
increases gradually. FlexE allows the bearer network to be smoothly upgraded.
Pre-configuration Tasks
Before configuring FlexE interfaces, complete the following tasks:
Pre-configuration Tasks
Before activating the FlexE interface license on a board, complete the following
tasks:
1. Run the license active file-name command to activate a specified license file
on the main control board.
2. Run the system-view command to enter the system view.
3. Run the license command to enter the license view.
4. Run the active port-basic slot slotid card cardid port port-list command to
activate the interface-specific basic hardware license.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run license
The license view is displayed.
Step 3 Run active port-flexe slot slotid card cardid port port-list
The FlexE interface license is activated on a specified board.
Step 4 Run commit
The configuration is committed.
----End
Context
After a standard Ethernet interface is switched to the FlexE mode, the system
automatically creates a FlexE physical interface and deletes the services
configured on the original interface. If the Ethernet interface is an Eth-Trunk
interface's member interface, it is also deleted from the Eth-Trunk interface.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run flexe enable port port-position
The working mode of the Ethernet interface is switched from standard Ethernet to
FlexE.
Step 3 Run commit
----End
Context
Different FlexE physical interfaces can be configured with the same PHY number.
However, the FlexE physical interfaces with the same PHY number cannot be
added to the same FlexE group, and a FlexE physical interface can be added to
only one FlexE group.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The view of a specified FlexE physical interface (for example, FlexE-50G 1/1/1) is
displayed.
Step 3 Run phy-number phy-number
A PHY number is configured for the FlexE physical interface.
Step 4 (Optional) Run management-channel mode { union | section | shim-to-shim |
shim-to-shim-op2 }
A management channel mode is configured for the FlexE physical interface.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
NOTE
If the timeslot mode has been configured on the FlexE card where the PHYs bound to a
FlexE group reside, ensure that the FlexE clients in the group are not bound to any sub-
timeslots before disabling timeslot negotiation.
● If the peer device does not support timeslot negotiation, you need to disable it in the
FlexE group view of the local device.
● The same timeslot negotiation mode must be configured for the FlexE groups on both
ends. Otherwise, the FlexE interfaces may fail to go up or fail to forward traffic after a
reliability operation (such as an active/standby switchover, subcard reset, or interface
shutdown/startup) is performed.
● After timeslot negotiation is disabled for the FlexE groups on both ends, the same
timeslot number must be configured for the corresponding FlexE clients. Otherwise, the
FlexE interfaces may fail to go up or fail to forward traffic.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run flexe group group-index
A FlexE group is created and its view is displayed, or the view of a specified
existing FlexE group is displayed.
Step 3 Run flexe-groupnum group-number
A group number is configured for the FlexE group.
Step 4 Run commit
----End
Context
To configure a bandwidth lower than 5 Gbit/s for a FlexE client, set the sub-
timeslot granularity of the FlexE client to 1 Gbit/s first.
Bandwidth configuration rules for FlexE clients based on different sub-timeslot
granularities are as follows:
● If the sub-timeslot granularity is 5 Gbit/s (default value), the bandwidth of a
FlexE client can be set to an integer multiple of 5 Gbit/s, such as 5 Gbit/s, 10
Gbit/s, or 15 Gbit/s.
● If the sub-timeslot granularity is 1 Gbit/s, the bandwidth of a FlexE client can
be set to 1 Gbit/s, 2 Gbit/s, 3 Gbit/s, 4 Gbit/s, or an integer multiple of 5
Gbit/s.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run set flexe sub-time-slot granula slot slotid card cardid { 1g | 5g }
A sub-timeslot granularity is configured for a specified FlexE card.
Step 3 Run commit
The configuration is committed.
----End
Context
● Timeslot mode: A timeslot number to be allocated to a FlexE client is
statically specified when the client is configured.
● Bandwidth mode: Only the needed bandwidth is specified when a FlexE client
is configured, and the device automatically allocates the corresponding
timeslot.
NOTE
Procedure
Step 1 Run system-view
----End
Context
To ensure that the FlexE clients on both ends can communicate with each other,
you need to configure the same ID and bandwidth for them.
Table 1-8 Numbers of physical ports that can be added to the same group and
port-id value ranges for different subcard models
4 60-69, 1000-3000
5 70-79, 1000-3000
6, 7 80-99, 1000-3000
8, 9 100-119, 1000-3000
14 160-169, 1000-3000
15 170-179, 1000-3000
4 60-69, 1000-3000
5 70-79, 1000-3000
6, 7 80-99, 1000-3000
8, 9 100-119, 1000-3000
14 160-169, 1000-3000
15 170-179, 1000-3000
4 60-69, 1000-3000
5 70-79, 1000-3000
6, 7 80-99, 1000-3000
8, 9 100-119, 1000-3000
14 160-169, 1000-3000
15 170-179, 1000-3000
CR58E8KE8N 0 1000-3000
CS0
1 1000-3000
4 1000-3000
5 1000-3000
8 1000-3000
9 1000-3000
12 1000-3000
13 1000-3000
Procedure
Step 1 Run system-view
The system view is displayed.
Usage Scenario
As shown in Figure 1-2, DeviceA and DeviceB on the live network work in
standard Ethernet mode and do not support DCN auto-negotiation on FlexE
physical interfaces. The new NE DeviceC works in FlexE mode and supports DCN
auto-negotiation on FlexE physical interfaces.
After DeviceC is added, the underlying working mode of the FlexE physical
interfaces automatically switches from FlexE to standard Ethernet within about
10s because DCN auto-negotiation is enabled on them by default. The NMS can
then manage DeviceC.
● If you run the following commands on DeviceC within 20 minutes of being
added, the configuration takes effect immediately to ensure DCN continuity.
a. Run the force-physical-mode ethernet command to forcibly switch the
underlying working mode of the FlexE physical interface to standard
Ethernet.
NOTE
Procedure
Step 1 Run the flexe enable port port-position command on DeviceA to switch the
working mode of the Ethernet interface from standard Ethernet to FlexE. Because
the underlying working mode of the FlexE physical interface on DeviceC has been
switched to standard Ethernet, the DCN channel between DeviceA and DeviceC is
interrupted, and DeviceC is disconnected from the NMS.
Step 2 Change the status of the FlexE physical interface on DeviceA manually, triggering
the underlying working mode of DeviceC's FlexE physical interface connected to
the FlexE physical interface on DeviceA to quickly switch back to the FlexE mode.
You can perform the following operations:
● Run the laser turn-off command on DeviceA to disable the optical module
laser, and then run the laser turn-on command to enable the optical module
laser.
● Run the shutdown command on DeviceA to disable the interface, and then
run the undo shutdown command to enable the interface.
After the preceding operations are complete, the FlexE physical interface
connecting DeviceC to DeviceA is switched back to the FlexE mode. The two
devices are now successfully connected using FlexE, and the NMS can continue to
manage DeviceC.
NOTE
In the preceding scenarios, the operations on DeviceB are the same as those on DeviceA.
----End
Usage Scenario
● Adding a FlexE NE to a live network running FlexE services
As shown in Figure 1-3, DeviceA and DeviceB work in FlexE mode on the live
network, and the new NE DeviceC also works in FlexE mode.
In the following scenarios, the operations on DeviceB are the same as those on
DeviceA.
Procedure
● If DeviceA supports DCN auto-negotiation on FlexE physical interfaces, but
DeviceC does not:
After DeviceC is added, the underlying working mode of the FlexE physical
interface on DeviceA automatically switches from FlexE to standard Ethernet
within about 10s because DCN auto-negotiation is enabled on the FlexE
physical interface by default. The NMS can then manage DeviceC.
– If you run the following commands on DeviceA within 20 minutes of
being added, the configuration takes effect immediately to ensure DCN
continuity.
i. Run the system-view command to enter the system view.
ii. Run the interface interface-type interface-number command to
enter the view of a specified FlexE physical interface (for example,
FlexE-50G 1/0/0).
iii. Run the force-physical-mode ethernet command to forcibly switch
the underlying working mode of the FlexE physical interface to
standard Ethernet.
NOTE
Context
● OH mode: Clock messages are transmitted using FlexE overhead timeslots.
The configuration related to clock synchronization is the same as that on a
standard Ethernet interface.
● Client mode: Clock messages are transmitted using FlexE clients. In this mode,
the FlexE interface that carries clock services must be bound to a FlexE
physical interface that has clock services deployed.
Pre-configuration Tasks
1588v2 has been configured, no matter which mode is used to transmit 1588v2
messages. For details, see HUAWEI NetEngine9000 Core Router Configuration
Guide > System Management.
Procedure
Step 1 Run system-view
The view of a specified FlexE physical interface (for example, FlexE-50G 1/0/0) is
displayed.
A specified FlexE interface carrying clock services is bound to the FlexE physical
interface.
----End
Prerequisites
A FlexE interface has been configured.
Procedure
● Run the display license resource usage port-flexe { all | slot slotid } [ active
| deactive ] command to check information about FlexE interface licenses on
boards.
● Run the display flexe group information slot slot-id card card-id command
to check the group information of a FlexE card.
● Run any of the following commands to check information about FlexE service
interfaces, FlexE physical interfaces, and physical interfaces bound to a FlexE
group:
– display flexe client information [ interface { interface-type interface-
number | interface-name } ]
– display flexe client information [ index clientindex ]
– display flexe physical-interface information [ interface { interface-type
interface-number | interface-name } } ]
● Run the display interface ethernet brief command to check brief
information about FlexE interfaces.
● Run the display interface flexe interface-number command to check the
running status and statistics of a FlexE interface.
● Run the display lldp neighbor brief command to check brief information
about LLDP neighbors of FlexE interfaces.
----End
Context
Interface groups are classified into permanent and temporary interface groups.
Multiple interfaces can be added to the same permanent or temporary interface
group to enable batch command configurations for the interfaces. The differences
between permanent and temporary interface groups are described as follows:
● After a user exits the view of a temporary interface group, the system
automatically deletes the temporary interface group. A permanent interface
group, however, can be deleted only by using the undo port-group command.
● Information about a permanent interface group can be viewed using the
display port-group command, whereas information about a temporary
interface group cannot.
● After a permanent interface group is configured, a configuration file is
generated. However, no configuration file is generated after a temporary
interface group is configured.
Procedure
● Configure a permanent interface group.
a. Run system-view
NOTE
Usage Scenario
When a network-side interface goes Down in a dual-device backup scenario, user-
side devices cannot detect the Down event and therefore do not switch traffic to
the backup link. As a result, traffic overloads or interruptions occur. To prevent
these problems, you can configure an interface monitoring group to monitor the
network-side interface status and instruct the user-side interface to change its
status accordingly. An interface monitoring group allows traffic to be switched
between the master and backup links and prevents traffic overloads or
interruptions.
On the network shown in Figure 1-5, PE2 backs up PE1. NPE1 through NPEM on
the user side is dual-homed to the two PEs to load-balance traffic, and the two
PEs are connected to DeviceA through DeviceN on the network side. When only
the link between PE1 and DeviceN is available and all the links between PE1 and
all the other routers fail, the NPEs do not detect the failure and continue sending
packets to DeviceN through PE1. As a result, the link between PE1 and DeviceN
becomes overloaded.
To resolve this problem, you can configure an interface monitoring group and add
multiple network-side interfaces on the PEs to the interface monitoring group.
When a link failure occurs on the network side and the interface monitoring group
detects that the status of a certain proportion of network-side interfaces changes,
the system instructs the user-side interfaces associated with the interface
monitoring group to change their status accordingly and allows traffic to be
switched between the master and backup links. Therefore, the interface
monitoring group can be used to prevent traffic overloads or interruptions.
Pre-configuration Tasks
Before configuring an interface monitoring group, configure physical attributes for
interfaces on the router.
Procedure
Step 1 Run system-view
----End
Context
NOTICE
Statistics cannot be restored after being cleared. Exercise caution when running
the following commands.
Procedure
● To clear the traffic statistics on an interface, run the reset counters interface
command in the user view.
----End
Procedure
● Run the monitor interface-statistics interface-type interface-number &<1-5>
[ interval interval-value | times { times-value | infinity } ] * command in any
view to check traffic statistics on a specified interface.
● Run the monitor interface-statistics batch [ interface-type [ interface-
number-begin [ to interface-number-end ] ] ] [ interval interval-value | times
{ times-value | infinity } ] * [ main ] command in any view to check traffic
statistics on interfaces in a batch.
● Run the monitor interface-information interface interface-type interface-
number [ interval interval-value | times { times-value | infinity } ] *
command in any view to check detailed information, including the running
status and traffic statistics, on a specified interface.
Networking Requirements
To ensure smooth communication between devices on a network, you need to
configure both physical and logical interfaces properly and set the following
parameters:
● Interface description
● MTU
● Trap threshold for the outbound and inbound bandwidth usage on a specified
interface
● Interval at which traffic statistics are collected
● Whether the device sends a trap message to the network management
system (NMS) when the interface status changes
● Whether the control-flap function is enabled
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a description for an interface.
2. Set an MTU for the interface to ensure successful packet transmission over
the interface.
3. Set the interval at which traffic statistics (including the traffic volumes and
rates) are collected globally.
4. Create a sub-interface and set an MTU for the sub-interface so that packets
can reach the receiver.
Data Preparation
To complete the configuration, you need the following data:
● Interface name
● Interface description
● Interface MTU
● Interval at which traffic statistics are collected globally
● Sub-interface MTU
Procedure
Step 1 Configure a description for an interface.
<HUAWEI> system-view
[~HUAWEI] interface gigabitethernet 2/0/0
[~HUAWEI-GigabitEthernet2/0/0] description for IFM
[*HUAWEI-GigabitEthernet2/0/0] commit
Step 3 Set the interval at which traffic statistics are collected globally.
[~HUAWEI] set flow-stat interval 100
[*HUAWEI] commit
----End
Configuration Files
#
sysname HUAWEI
#
set flow-stat interval 100
#
interface gigabitethernet2/0/0
description for IFM
mtu 1000
#
interface gigabitethernet2/0/0.1
mtu 800
#
return
Networking Requirements
On the network shown in Figure 1-6, FlexE clients need to be created on DeviceA
and DeviceB for communication. Different bandwidths are configured for the FlexE
clients to meet requirements for diversified services and applications. The
bandwidths of FlexE Client1, FlexE Client2, FlexE Client3, and FlexE Client4 need to
be set to 4 Gbit/s, 5 Gbit/s, 15 Gbit/s, and 20 Gbit/s, respectively.
Precautions
When you configure FlexE interfaces, note the following:
● To ensure normal communication between interconnected devices, you need
to configure the same PHY number for the FlexE physical interfaces on both
of them.
● To ensure normal communication between interconnected devices, you need
to configure the same group number for the FlexE groups to which the FlexE
physical interfaces on both devices are added.
● To ensure that the FlexE clients on both ends can communicate with each
other, you need to configure the same ID and bandwidth for them.
Configuration Roadmap
The configuration roadmap is as follows:
1. Activate the FlexE interface license on a board.
2. Configure a standard Ethernet interface to work in FlexE mode.
3. Configure a PHY number for a FlexE physical interface.
4. Create a FlexE group and bind the FlexE physical interface to it.
5. Configure a number for the FlexE group.
6. Configure a sub-timeslot granularity for a FlexE card.
7. Create a FlexE client and configure an ID and bandwidth for it.
8. Configure an IP address for each interface.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Activate the FlexE interface license on a board.
<DeviceA> license active XXXXX.dat
<DeviceA> system-view
[~DeviceA] license
[~DeviceA-license] active port-basic slot 1 card 1 port 1
[*DeviceA-license] active port-flexe slot 1 card 1 port 1
[*DeviceA-license] commit
[~DeviceA-license] quit
Step 4 Create a FlexE group and bind the FlexE physical interface to it.
[~DeviceA] flexe group 1
[*DeviceA-flexe-group-1] binding interface FlexE-50G1/1/1
Step 7 Create a FlexE client and configure an ID and bandwidth for it.
[~DeviceA] flexe client-instance 1 flexe-group 1 flexe-type full-function port-id 129
[*DeviceA-flexe-client-1] flexe-clientid 1
Warning: The traffic on this interface may be interrupted if the operation is performed. Continue? [Y/N]:y
[*DeviceA-flexe-client-1] flexe-bandwidth 4
[*DeviceA-flexe-client-1] commit
[~DeviceA-flexe-client-1] quit
[~DeviceA] flexe client-instance 2 flexe-group 1 flexe-type full-function port-id 130
[*DeviceA-flexe-client-2] flexe-clientid 2
Warning: The traffic on this interface may be interrupted if the operation is performed. Continue? [Y/N]:y
[*DeviceA-flexe-client-2] flexe-bandwidth 5
[*DeviceA-flexe-client-2] commit
[~DeviceA-flexe-client-2] quit
[~DeviceA] flexe client-instance 3 flexe-group 1 flexe-type full-function port-id 131
[*DeviceA-flexe-client-3] flexe-clientid 3
Warning: The traffic on this interface may be interrupted if the operation is performed. Continue? [Y/N]:y
[*DeviceA-flexe-client-3] flexe-bandwidth 15
[*DeviceA-flexe-client-3] commit
[~DeviceA-flexe-client-3] quit
[~DeviceA] flexe client-instance 4 flexe-group 1 flexe-type full-function port-id 132
[*DeviceA-flexe-client-4] flexe-clientid 4
Warning: The traffic on this interface may be interrupted if the operation is performed. Continue? [Y/N]:y
[*DeviceA-flexe-client-4] flexe-bandwidth 20
[*DeviceA-flexe-client-4] commi
[~DeviceA-flexe-client-4] quit
Step 8 Configure an IP address for each interface. For configuration details, see
Configuration Files in this section.
Step 9 Repeat the preceding steps on DeviceB. For configuration details, see
Configuration Files in this section.
After completing the preceding configuration, run the display flexe group
information command on DeviceA and DeviceB to check group information of
FlexE cards. The command output on DeviceA is used as an example.
[~DeviceA] display flexe group information slot 9 card 1
FlexE Card Info:
=============================================================
FlexE Config Mode : Bandwidth
=============================================================
------------------------------------------------------
port-no : FlexE-50G1/1/1
ts-num : 20
sub-ts-num :5
-------------------------------------------------------
time-slot-id ts-port-map
-------------------------------------------------------
0: [129][129][129][129][130]
1: [130][130][130][130][131]
2: [131][131][131][131][131]
3: [131][131][131][131][131]
4: [131][131][131][131][132]
5: [132][132][132][132][132]
6: [132][132][132][132][132]
7: [132][132][132][132][132]
8: [132][132][132][132][-]
9: [-][-][-][-][-]
10: [-][-][-][-][-]
11: [-][-][-][-][-]
12: [-][-][-][-][-]
13: [-][-][-][-][-]
14: [-][-][-][-][-]
15: [-][-][-][-][-]
16: [-][-][-][-][-]
17: [-][-][-][-][-]
18: [-][-][-][-][-]
19: [-][-][-][-][-]
=============================================================
Run the display interface ethernet brief command on DeviceA and DeviceB to
check brief information about FlexE interfaces. The command output on DeviceA
is used as an example.
[~DeviceA] display interface ethernet brief
PHY: Physical
*down: administratively down
^down: standby
(l): loopback
(b): BFD down
(d): Dampening Suppressed
(p): port alarm down
InUti/OutUti: input utility/output utility
Interface PHY Auto-Neg Duplex Bandwidth InUti OutUti Trunk
FlexE1/1/129 up - full 4G 0.01% 0.01% --
FlexE1/1/130 up - full 5G 0.01% 0.01% --
FlexE1/1/131 up - full 15G 0.01% 0.01% --
FlexE1/1/132 up - full 20G 0.01% 0.01% --
FlexE-50G1/1/1 up - full 50G -- -- --
Run the display lldp neighbor brief command on DeviceA and DeviceB to check
brief information about LLDP neighbors of FlexE interfaces. The command output
on DeviceA is used as an example.
[~DeviceA] display lldp neighbor brief
Local Intf Neighbor Dev Neighbor Intf Exptime (sec)
--------------------------------------------------------------------------------------
FlexE1/1/129 DeviceB FlexE1/1/129 114
FlexE1/1/130 DeviceB FlexE1/1/130 114
FlexE1/1/131 DeviceB FlexE1/1/131 114
FlexE1/1/132 DeviceB FlexE1/1/132 114
FlexE-50G1/1/1 DeviceB FlexE-50G1/1/1 95
Description:
Route Port,The Maximum Transmit Unit is 1500
Internet Address is 10.1.1.1/24
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 00e0-fc12-3456
Port BW: 4G
Pause Flowcontrol: Receive Enable and Send Enable
Client-id Match State: Match
Last physical up time : 2021-03-10 15:11:46
Last physical down time : 2021-03-10 15:11:29
Current system time: 2021-03-11 11:36:52
Statistics last cleared:never
Last 300 seconds input rate: 10031 bits/sec, 1 packets/sec
Last 300 seconds output rate: 10041 bits/sec, 1 packets/sec
Input peak rate 125150137 bits/sec, Record time: 2021-03-10 09:25:57
Output peak rate 125757954 bits/sec, Record time: 2021-03-10 09:25:57
Input: 7006191780 bytes, 52343200 packets
Output: 7024402448 bytes, 52482810 packets
Input:
Unicast: 52334185 packets, Multicast: 9010 packets
Broadcast: 5 packets, JumboOctets: 0 packets
CRC: 0 packets, Symbol: 0 packets
Overrun: 0 packets, InRangeLength: 0 packets
LongPacket: 0 packets, Jabber: 0 packets, Alignment: 0 packets
Fragment: 0 packets, Undersized Frame: 0 packets
RxPause: 0 packets
Output:
Unicast: 52473465 packets, Multicast: 9334 packets
Broadcast: 11 packets, JumboOctets: 0 packets
Lost: 0 packets, Overflow: 0 packets, Underrun: 0 packets
System: 0 packets, Overruns: 0 packets
TxPause: 0 packets
Last 300 seconds input utility rate: 0.01%
Last 300 seconds output utility rate: 0.01%
----End
Configuration Files
● DeviceA configuration file
#
sysname DeviceA
#
set flexe sub-time-slot granula slot 1 card 1 1g
flexe enable port 1/1/1
#
flexe group 1
flexe-groupnum 2345
binding interface FlexE-50G1/1/1
#
flexe client-instance 1 flexe-group 1 flexe-type full-function port-id 129
flexe-clientid 1
flexe-bandwidth 4
#
flexe client-instance 2 flexe-group 1 flexe-type full-function port-id 130
flexe-clientid 2
flexe-bandwidth 5
#
flexe client-instance 3 flexe-group 1 flexe-type full-function port-id 131
flexe-clientid 3
flexe-bandwidth 15
#
flexe client-instance 4 flexe-group 1 flexe-type full-function port-id 132
flexe-clientid 4
flexe-bandwidth 20
#
license
active port-basic slot 1 card 1 port 1
active port-flexe slot 1 card 1 port 1
#
interface FlexE-50G1/1/1
undo shutdown
undo dcn
phy-number 5
#
return
● DeviceB configuration file
#
sysname DeviceB
#
set flexe sub-time-slot granula slot 1 card 1 1g
flexe enable port 1/1/1
#
flexe group 1
flexe-groupnum 2345
binding interface FlexE-50G1/1/1
#
flexe client-instance 1 flexe-group 1 flexe-type full-function port-id 129
flexe-clientid 1
flexe-bandwidth 4
#
flexe client-instance 2 flexe-group 1 flexe-type full-function port-id 130
flexe-clientid 2
flexe-bandwidth 5
#
flexe client-instance 3 flexe-group 1 flexe-type full-function port-id 131
flexe-clientid 3
flexe-bandwidth 15
#
flexe client-instance 4 flexe-group 1 flexe-type full-function port-id 132
flexe-clientid 4
flexe-bandwidth 20
#
license
active port-basic slot 1 card 1 port 1
active port-flexe slot 1 card 1 port 1
#
interface FlexE-50G1/1/1
undo shutdown
undo dcn
phy-number 5
#
return
Usage Scenario
NOTE
NOTE
After a port extension system is deployed, the scope of service features supported by the
master's port extension interfaces is the same as that supported by local common Ethernet
interfaces.
Deployment Guidance
To completely deploy a port extension system and maintain and manage the
system on demand, perform the following configurations on a master:
Feature Requirements
Port extension does not support VLL VPN QoS. NE9000 NE9000
Background
A port extension system consists of masters and APs. To simplify service
deployment and facilitate O&M and management, the control plane of the port
extension system is on a master. You can establish a port extension system on a
master. APs support plug-and-play (PnP). A master uses ESNs to automatically
identify APs and manage them, and delivers basic configurations to APs through
NETCONF channels. You do not need to perform configurations on APs.
Pre-configuration Tasks
Before establishing a port extension system, complete the following tasks:
Procedure
Step 1 Run system-view
Step 5 Run the following commands as required to configure a username, password, and
slave password for the master to establish an STelnet connection with an AP.
● ap default login-user user-name { login-password password | slave slave-
password-value } *
The username and password must be set to the default username and password of an AP.
To improve the security of a port extension system, run the isis authentication-
mode command to authenticate received Hello, LSP, and SNP packets and to
encapsulate authentication information into sent Hello, LSP, and SNP packets.
Only authenticated or encrypted packets can be forwarded on a network,
preventing invalid packets from interfering with the network.
----End
Context
In a port extension system, a master can manage multiple APs at the same time.
You can repeat the following steps on a master to configure basic functions for
multiple APs.
Procedure
Step 1 Run system-view
The port extension system supports plug-and-play (PnP) for an AP. After an AP
starts, it automatically enables the data communication network (DCN) function
and uses OSPF to advertise its ESN and initial PnP status. After a master discovers
the AP and identifies the initial PnP status, the master checks whether the AP's
ESN has been locally configured. If the AP's ESN has been locally configured, the
master starts the PnP process. A master uses an ESN to uniquely identify an AP,
and therefore different APs' ESNs cannot be the same.
Step 4 (Optional) Run sysname host-name
A host name is specified for the AP.
Step 5 Run commit
The configuration is committed.
Step 6 Run admin ip-address
A management IP address is configured for the AP.
The management IP address of the AP is used to establish internal control and
management channels to the master. This configuration is delivered by the master
to the AP in the AP plug-and-play process. Then, the AP automatically generates a
loopback interface with the IP address specified by ip-address.
The command takes effect immediately after being run.
----End
Context
To establish a port extension system, you must establish channels (such as
STelnet, SFTP, and NETCONF channels) between a master and AP. To ensure
system security, you must configure an authentication scheme for AP login. The
current authentication scheme supports the following authentication modes:
● Local authentication: If no HWTACACS server is deployed on the current
network, you can use the local authentication mode. Local authentication
features fast processing and low operation costs, but the amount of
information that can be stored is limited by a device's hardware capacity.
● HWTACACS authentication: HWTACACS authentication can be used to prevent
unauthorized users from attacking a port extension system. Compared with
local authentication, HWTACACS authentication features more reliable
transmission and encryption.
Perform the following steps on a master.
Procedure
Step 1 Run system-view
The system view is displayed.
A username and password required for the master to log in to the AP are
configured.
A user name and SFTP directory required for the master to log in to the AP are
configured.
NOTE
If HWTACACS authentication is used, you must ensure that the user name and
password configured using the login-user command in Step 3 are the same as those
on the HWTACACS server. Otherwise, the AP cannot work normally.
● If local authentication is configured, perform the following operations:
a. Run the ap-user command to enter the virtual access AP-user view.
b. Run the local-user user-name password cipher password command to
create a local user name on the AP and configure a login password.
NOTE
If local authentication is used, you must ensure that the user name and password
configured using the login-user command in Step 3 are the same as those configured
using the local-user command. Otherwise, the AP cannot work normally.
----End
Context
In a port extension system, data traffic is transmitted through the internal
forwarding channel between internal communication interfaces on an AP and
master. To set up the channel, you must configure the directly connected physical
interfaces between the master and AP as physical internal communication
interfaces. To increase the bandwidth or improve reliability, you can also configure
the Eth-Trunk interfaces between the master and AP as internal trunk interfaces.
NOTE
Physical internal communication interfaces and internal trunk interfaces do not support
service configuration or sub-interface creation.
To view a physical internal communication interface on the AP connected to a physical
internal communication interface on a master, run the link detect interface interface-type
interface-number command in the user view to enable the master to send LAD packets.
Then, run the display link neighbor interface interface-type interface-number command
to view the neighbor information about the internal communication interfaces between the
master and AP.
Procedure
● Configure a physical internal communication interface.
a. Run system-view
After this step is performed, an IS-IS process inside the port extension
system is automatically enabled on the interface and the isis circuit-type
p2p command is automatically run to simulate the interface as a P2P
interface.
NOTE
● If you manually run the isis enable process-id command and then run the
virtual-access enable command on the interface, the port extension IS-IS
process is not automatically enabled and the isis circuit-type p2p command
is not automatically run on the interface. In this situation, you need to ensure
that port extension has been enabled for the IS-IS process specified by
process-id and manually run the isis circuit-type p2p command on the
interface. This brings heavy configuration workloads. In this case, the
automatic configuration solution is recommended. Do not run the isis enable
process-id command before running the virtual-access enable command.
● After an AP automatically goes online, port extension is automatically
enabled on the AP's all Ethernet interfaces. In addition, the AP automatically
saves the virtual-access enable configuration on corresponding interfaces.
d. Run commit
Where:
▪ The binding configured in this step must match the actual physical
connection.
h. Run commit
The configuration is committed.
● Configure an internal trunk interface.
a. Configure an Eth-Trunk interface to work in manual load balancing
mode.
Configuration details are as follows:
NOTE
If you manually run the isis enable process-id command and then run the
virtual-access enable command on the Eth-Trunk interface, the port extension
IS-IS process is not automatically enabled and the isis circuit-type p2p
command is not automatically run on the Eth-Trunk interface. In this situation,
you need to ensure that port extension has been enabled for the IS-IS process
specified by process-id and manually run the isis circuit-type p2p command on
the Eth-Trunk interface. This brings heavy configuration workloads. Therefore, do
not manually run the isis enable process-id command before running the
virtual-access enable command.
d. Run commit
The configuration is committed.
e. Run quit
Return to the system view.
f. Run ap-id ap-id
The AP view is displayed.
g. Run inner-connect ap-interface-type ap-interface-number binding
master-interface-type master-interface-number
The internal communication interfaces on the AP and master are bound.
Where:
▪ The binding configured in this step must match the actual physical
connection.
After this step is performed, the AP automatically configures the
corresponding internal trunk interface.
h. Run commit
The configuration is committed.
----End
Context
In a port extension system, an AP can be considered as a card for extending
master interfaces. An AP receives configurations and forwarding entries from a
master and provides an external communication interface. To improve interface
density on a master, bind an AP's external communication interface to the
master's internal communication interface and create a port extension interface.
To configure Eth-Trunk for an AP's external communication interface, add the port
extension interface for the external communication interface to a common Eth-
Trunk interface as a port extension trunk interface on a master.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ap-id ap-id
The AP view is displayed.
Step 3 Run remote-interface ap-interface-type ap-interface-number [ to max-port-
number ] binding master-interface-type master-interface-number
The AP's external communication interface is bound to the master's internal
communication interface, and a port extension interface is created.
Where:
● ap-interface-type ap-interface-number specifies an AP's external
communication interface, and master-interface-type master-interface-number
specifies a master's physical internal communication interface or internal
trunk interface.
NOTE
After an AP goes online, port extension is automatically enabled on the AP's all Ethernet
interfaces. That is, the interfaces are internal communication interfaces by default. After
this step is performed on the master, port extension is automatically disabled on the AP's
external communication interface, because an interface cannot function as both an internal
communication interface and an external communication interface.
NOTE
Currently, port extension interfaces and local common interfaces cannot be added to the
same Eth-Trunk interface.
----End
1.1.3.2.6 (Optional) Configuring Route Import Between the Port Extension System
and External Network
To enable an NMS to directly manage masters and APs, configure route import
between the port extension system and external network.
Context
A port extension system uses the DCN function to implement AP PnP, but a DCN is
characterized by route isolation. Therefore, if an NMS is used to manage a master
and AP, you must configure route import between the port extension system and
external network on a master.
Procedure
Step 1 Run system-view
NOTE
If a route to a management IP address is imported into IS-IS or OSPF, ensure that the
process specified by process-id does not import other routes. Otherwise, the configuration
fails.
----End
Prerequisites
A port extension system has been established.
Procedure
● Run the display virtual-access ap [ ap-id ] command to check basic AP
information.
Background
In the port extension solution, the control and management planes are centralized
on a master. You can upgrade and manage an AP on a master, including:
● Upgrade using a software package
● Patch installation
● AP restart
● Configuring APs to communicate with an NMS over SNMP
● Configuring APs to send information to a syslog server
● Setting an interval for collecting traffic statistics on an AP interface
● Configuring alarm thresholds for bandwidth usage on an AP interface
● Configuring a time format for AP information
● Configuring an AP information output mode
After you complete configurations, the master uses the NETCONF channel to
deliver the configurations to the AP and the AP automatically performs the
configurations.
NOTE
● During a software upgrade of the port extension system, upgrade APs and then masters.
The process for upgrading a master is the same as that for upgrading a common device.
● Ensure that the software versions running on the master and APs are the same. If the
software versions are inconsistent, services may be unavailable after the APs go online.
● You can also log in to an AP to upgrade and manage it.
Pre-configuration Tasks
Before upgrading and managing an AP on a master, complete the following tasks:
● Establish a port extension system.
Procedure
Step 1 Upload a software package for an upgrade to an AP. The following table describes
upload methods.
Softw AP Command
are Range
Packa
ge
Sourc
e
NOTE
● After upgrade download-package is run, a user must enter an SFTP user name and
password as prompted for SFTP authentication between an AP and master or between
an AP and specified server.
● If the software package source is a specified server, configure the port extension system
and server to import each other's network segment route to implement connectivity
between the APs and server.
● To free up the system storage space, run the upgrade delete-package type command
on the master to delete unnecessary AP software packages.
Step 2 Run the display patch-information ap-id ap-id command to check whether any
running patch exists on the AP.
Step 3 (Optional) Run the patch delete all { all-ap | ap-id { startapid [ to endapid ] }
&<1-10> } command to delete the running patches on the AP.
Before using a software package to upgrade an AP, ensure that no patches are
running on the AP. If any patch is running on the AP, system software cannot be
upgraded. Perform this step if any patch is running on the AP. Otherwise, skip this
step.
----End
Follow-up Procedure
Restart the AP for the software package to take effect immediately.
Procedure
Step 1 Upload a patch file to an AP. The following table describes upload methods.
Patch AP Command
File Range
Sourc
e
NOTE
● After upgrade download-package is run, a user must enter an SFTP user name and
password as prompted for SFTP authentication between an AP and master or between
an AP and specified server.
● If the software package source is a specified server, configure the port extension system
and server to import each other's network segment route to implement connectivity
between the APs and server.
● To free up the system storage space, run the upgrade delete-package type command
on the master to delete unnecessary AP patch packages.
----End
Follow-up Procedure
● When the patch is installed without interrupting services:
– To delete the installed patch that results in an exception, run the patch
delete all { all-ap | ap-id { startapid [ to endapid ] } &<1-10> }
command.
● When the patch is installed for the next startup:
– To clear the patch configuration for the next startup, run the reset patch-
configure next-startup { all-ap | ap-id { startapid [ to endapid ] }
&<1-10>} command.
– Restart the AP for the patch to take effect immediately.
1.1.3.3.3 Restarting an AP
After configuring a software package for an AP's upgrade or a patch for an AP's
next startup, restart the AP to immediately validate the software package or patch
and check whether the configuration is successful.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ap-id ap-id
The AP view is displayed.
Step 3 Run reboot
The AP is restarted.
----End
Context
In a port extension scenario, to use an NMS to manage APs, you need to configure
SNMP in the port extension view of a master. After the configuration, when the IP
route between the NMS and an AP is reachable:
● The AP uses a trap message to report a fault alarm to the NMS.
● The AP records active alarms, and the NMS can use the MIB to query or
synchronize the active alarms on the AP.
NOTE
● In a port extension system, all services are configured on a master. Therefore, the
master is responsible for service alarm reporting. If an AP fails, it independently reports
a fault alarm.
● A master communicates with an NMS over SNMP. The configuration procedure is the
same as that in a common scenario.
Pre-configuration Tasks
Before configuring APs to communicate with an NMS over SNMP:
● Establish a port extension system.
When establishing a port extension system, you can configure route import
between the port extension system and external network so that the
routes between the NMS and APs are reachable.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run virtual-access port-extend
Step 5 Perform either of the following configurations based on the SNMP version. You
are advised to use SNMPv3 with higher security.
● For SNMPv1 or SNMPv2:
Run snmp-agent community { read | write } cipher community-name
[ mib-view view-name ]
A read/write community name and MIB view are configured for APs.
A community is a set of an NMS and SNMP agents and is identified using a
community name. The community name acts like a password to regulate
access to a managed device. An NMS can access a managed device only if the
community name carried in an SNMP request sent by the NMS is the same as
the community name configured on the managed device. Perform this step to
configure an SNMP community name for APs so that the NMS communicates
with the APs. You can also run the snmp-agent community command to set
a MIB view that is accessible using a community name.
● For SNMPv3:
a. Run snmp-agent group v3 group-name { authentication | privacy |
noauthentication } [ read-view read-view | write-view write-view |
notify-view notify-view ]
An SNMP user group is configured.
If an NMS and a device reside in an insecure network environment, for
example, they are prone to network attacks, you are advised to set
authentication or privacy to enable data authentication and encryption.
The available authentication and encryption modes are as follows:
The md5, sha, sha2-224, DES56, and 3DES168 algorithms in the snmp-agent
usm-user command are weak security algorithms. You are advised to use other
security algorithms. To prevent security risks, run the crypto weak-algorithm
disable command to disable the weak security algorithm function.
Perform this step to set a destination NMS address for trap messages sent by APs.
If a target host that receives trap messages is a Huawei NMS, specify private-
netmanager. To enable trap messages to carry extended bound variables, specify
ext-vb.
The extended error code function can be configured to extend standard error
codes only when an NMS is a Huawei NMS and managed APs are Huawei devices.
Extended error codes facilitate fault locating.
A MIB view is created, and MIB objects monitored and managed by an NMS are
specified.
● If there are only a few MIB objects that do not need to be managed by an
NMS when you create a MIB view or you want to remove some MIB objects
from an existing MIB view, specify excluded in the command.
● If there are only a few MIB objects that need to be managed by an NMS
when you create a MIB view or you want to add some MIB objects to an
existing MIB view, specify included in the command.
----End
Context
When an AP is running, the system records the AP's running status in real time
and generates related information. After the information management function is
enabled, configure the APs managed by the master to send information to a
syslog server for storage and query on a master. A network administrator can use
the information to monitor the running status of the APs and diagnose network
faults.
Perform the following steps on a master.
Pre-configuration Tasks
Before configuring APs to send information to a syslog server:
● Establish a port extension system.
When establishing a port extension system, you can configure route import
between the port extension system and external network so that the
routes between the NMS and APs are reachable.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run virtual-access port-extend
The port extension view is displayed.
Step 3 Run info-center loghost source interface-type interface-number
The source interface through which APs send information to a specified syslog
server is configured.
The syslog server can obtain the source interface address of received information
and determine which AP sends the information based on the source interface
address. This helps the syslog server properly retrieve the received information.
Step 4 Run info-center loghostipv4-address [ { local-time | utc } | facilitylocal-number |
port port-number | levellog-level | transport { udp | tcp } ] *
All the APs managed by the master are configured to send information to the
specified syslog server. Repeat this step to configure APs to send information to
multiple syslog servers, implementing information backup between the syslog
servers.
Step 5 (Optional) Run info-center source { module-name | default } channel { channel-
number | channel-name } [ log { state { off | on } | levelseverity } * | trap { state
{ off | on } | levelseverity } * | debug { state { off | on } | levelseverity } * ] *
A rule is configured for each AP to output information to an information channel.
Step 6 Run commit
The configuration is committed.
----End
Usage Scenario
On a master, you can configure a time format for AP information to meet the time
requirements in different places. After the configuration is complete, new
information on APs is generated using the configured time format.
NOTE
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run virtual-access port-extend
The port extension view is displayed.
Step 3 Run one or more of the following commands to configure time formats for desired
information:
● Run the info-center timestamp log { boot | { date | short-date | format-
date | rfc-3339 } [ precision-time { tenth-second | millisecond | second } ] }
[ without-timezone ] command to configure the time format of log
information.
● Run the info-center timestamp trap { boot | { date | short-date | format-
date | rfc-3339 } [ precision-time { tenth-second | millisecond | second } ] }
[ without-timezone ] command to configure the time format of trap
information.
● Run the info-center timestamp debugging { boot | { date | short-date |
format-date | rfc-3339 } [ precision-time { tenth-second | second |
millisecond } ] } [ without-timezone ] command to configure the time
format of debugging information.
The following table describes the elements of the date format.
mm Month Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct,
Nov, or Dec.
----End
Context
APs log their operation information in real time. You can configure an AP
information output mode and log in to the desired AP to know its operation
information.
Perform the following steps on a master.
Procedure
● Output information to the display area.
a. Run system-view
The system view is displayed.
b. Run virtual-access port-extend
The port extension view is displayed.
c. (Optional) Run info-center logbuffer size buffersize
The maximum number of AP logs to be displayed is configured.
d. Run info-center source { module-name | default } channel { channel-
number | channel-name } log { state { off | on } | level severity } *
A rule is configured for each AP to output log information to an
information channel.
e. Run commit
The configuration is committed.
Context
By default, traffic statistics collection is enabled on external communication
interfaces of an AP to monitor the running status of interfaces and services. To
adjust the interval for collecting traffic statistics on external communication
interfaces of an AP, perform either of the following operations on the master:
● Configure a global interval for collecting traffic statistics on an AP:
Run the set flow-stat interval command in the AP view. The configuration is
delivered to the corresponding AP and takes effect on the AP's external
Procedure
● Configure a global interval for collecting traffic statistics on an AP.
a. Run system-view
The system view is displayed.
b. Run ap-id ap-id
The AP view is displayed.
c. Run set flow-stat interval interval
A global interval for collecting traffic statistics on the AP is set.
d. Run commit
The configuration is committed.
● Configure an interval for collecting traffic statistics on one or more specified
external communication interfaces of an AP.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The port extension interface view or port extension trunk interface view is
displayed.
c. Run set flow-stat interval interval
An interval for collecting traffic statistics on one or more specified
external communication interfaces of the AP is set.
d. Run commit
The configuration is committed.
----End
Context
Monitoring bandwidth usage helps you keep track of the load on an AP. If
bandwidth usage exceeds a specified threshold, bandwidth resources are
insufficient on an AP. In this case, you need to expand the capacity of the AP or
migrate services to another AP. The default alarm threshold for bandwidth usage
on an external communication interface of an AP is 90%. If the bandwidth usage
exceeds 90%, an alarm is generated, indicating that bandwidth resources are
almost exhausted. As a result, packet loss may occur before the capacity is
expanded or services are migrated. To resolve the preceding problem, adjust the
alarm threshold for bandwidth usage on an external communication interface of
an AP. For example, you can set the alarm threshold for inbound bandwidth usage
to 80% so that an alarm is generated when the inbound bandwidth usage exceeds
80%.
Procedure
Step 1 Run system-view
----End
Context
NOTICE
Statistics cannot be restored after being cleared. Therefore, exercise caution when
clearing statistics.
Procedure
● Run the reset counters [ if-mib ] interface { interface-name | interface-type
interface-number } remote command in the user view to clear remote
statistics or remote MIB statistics about a specified port extension interface or
port extension trunk interface.
----End
Networking Requirements
Figure 1-8 shows the typical networking of a port extension system, which is used
to provide devices with high-density Ethernet interfaces on the IP core network.
Port extension enables a device with higher performance to be configured as a
master and a large number of low-end devices that support Ethernet interfaces to
be configured as APs. The APs' Ethernet interfaces are then mapped to the
master's port extension interfaces, so that the master provides high-density
Ethernet interfaces. Services only need to be configured on the master's port
extension interfaces.
Interfaces 1 through 3 in this example are GE 1/0/1, GE 1/0/2, and GE 1/0/3, respectively.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Retain the default configurations for APs.
When an AP goes online for the first time, the master delivers a root user
configuration to the AP to establish a connection with the AP.
NOTE
AP Esn : 391092333000298
AP ID : 2001 Admin IP : 3.3.3.3
Master : 1.1.1.1
State : Online
Online Time : 2017-09-30 01:31:26
-----------------------------------------------------------------------------------------------
Run the display virtual-access bindinfo command on the master to view the
bindings between internal communication interfaces and port extension interfaces
on the master.
[~Master] display virtual-access bindinfo
--------------------------------------------------------------------------------------
AP-ID Inner-interface Out-interface
--------------------------------------------------------------------------------------
2000 GigabitEthernet1/1/0/1 GigabitEthernet2000/1/0/2
2000 GigabitEthernet1/1/0/1 GigabitEthernet2000/1/0/3
----End
Configuration Files
● AP1 configuration file
#
sysname AP1
#
virtual-access
role ap
admin 2.2.2.2
master admin-ip primary 1.1.1.1
isis authentication-mode hmac-sha256 key-id 1 cipher %^%#OqaV.B&wk-eu\lD0(u:5ZWFN)r'k:2uIW.-/
9:NU%^%#
#
undo user-security-policy enable
#
ip dcn vpn-instance __dcn_vpn__
ipv4-family
#
bfd
#
aaa
local-user sys-admin password irreversible-cipher $1c$VW58EBdUe"$uXfj.2l)I#za`:6tJ,w$U|
([5}MsD#|):rU(cV/+$
local-user sys-admin service-type ssh
local-user sys-admin state block fail-times 3 interval 5
local-user sys-admin user-group manage-ug
#
authentication-scheme default0
#
authentication-scheme default1
#
authentication-scheme default
authentication-mode local
#
authorization-scheme default
#
accounting-scheme default0
#
accounting-scheme default1
#
domain default0
#
domain default1
#
domain default_admin
authorization-scheme default
#
isis 65534
description auto-generated for virtual-access
is-level level-2
cost-style wide
virtual-access enable
network-entity 00.38ba.33bc.a402.00
binding interface GigabitEthernet1/0/1 down-weight 10
#
interface GigabitEthernet1/0/1
undo shutdown
isis enable 65534
isis circuit-type p2p
dcn
virtual-access enable
#
interface GigabitEthernet1/0/2
undo shutdown
#
interface GigabitEthernet1/0/3
undo shutdown
#
interface LoopBack2147483646
description virtual-access loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 2.2.2.2 255.255.255.255
#
interface LoopBack2147483647
description DCN loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 172.16.1.1 255.255.0.0
#
ospf 65534 vpn-instance __dcn_vpn__
description DCN ospf create by default
opaque-capability enable
hostname
vpn-instance-capability simple
area 0.0.0.0
network 0.0.0.0 255.255.255.255
#
!The DCN function implements the capability of plug-and-play for this device.
!A NE IP address based on the unique NE ID is automatically generated in VPN
!of DCN. It is recommended that the NE IP address be changed to the planned
!one by running the ne-ip X.X.X.X <mask> command after the device being online.
dcn
bandwidth ethernet 1024
bandwidth pos 1024
#
stelnet ipv4 server enable
sftp ipv4 server enable
snetconf ipv4 server enable
stelnet ipv6 server enable
sftp ipv6 server enable
snetconf ipv6 server enable
ssh user sys-admin
ssh user sys-admin authentication-type password
ssh user sys-admin service-type all
ssh user sys-admin sftp-directory cfcard:/
ssh authorization-type default aaa
#
ssh server cipher aes256_gcm aes128_gcm aes256_ctr aes192_ctr aes128_ctr
ssh server hmac sha2_512 sha2_256
ssh server key-exchange dh_group_exchange_sha256
#
ssh server publickey rsa_sha2_256 rsa_sha2_512
#
ssh server dh-exchange min-len 3072
#
ssh client first-time enable
sftp client-source -a 2.2.2.2 -vpn-instance __dcn_vpn__
#
user-interface con 0
#
user-interface vty 0 4
authentication-mode aaa
protocol inbound ssh
#
netconf
idle-timeout 0 0
#
local-aaa-server
#
return
● AP2 configuration file
#
sysname AP2
#
virtual-access
role ap
admin 3.3.3.3
master admin-ip primary 1.1.1.1
isis authentication-mode hmac-sha256 key-id 1 cipher %^%#gb0N3W.{o6QZelLT!#yIPjdj/
~Dk8$F&p73~P/x.%^%#
#
undo user-security-policy enable
#
ip dcn vpn-instance __dcn_vpn__
ipv4-family
#
bfd
#
aaa
local-user sys-admin password irreversible-cipher $1c$2"iN;T!PrW$4H+g1J;+D>"[]=$i,Z/4(5"MWJ-Ld
%)']CO`l>Z9$
local-user sys-admin service-type ssh
local-user sys-admin state block fail-times 3 interval 5
local-user sys-admin user-group manage-ug
#
authentication-scheme default0
#
authentication-scheme default1
#
authentication-scheme default
authentication-mode local
#
authorization-scheme default
#
accounting-scheme default0
#
accounting-scheme default1
#
domain default0
#
domain default1
#
domain default_admin
authorization-scheme default
#
isis 65534
description auto-generated for virtual-access
is-level level-2
cost-style wide
virtual-access enable
network-entity 00.38ba.33bc.a402.00
binding interface GigabitEthernet1/0/1 down-weight 10
#
interface GigabitEthernet1/0/1
undo shutdown
isis enable 65534
isis circuit-type p2p
dcn
virtual-access enable
#
interface GigabitEthernet1/0/2
undo shutdown
#
interface GigabitEthernet1/0/3
undo shutdown
#
interface LoopBack2147483646
description virtual-access loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 3.3.3.3 255.255.255.255
#
interface LoopBack2147483647
ipv4-family
#
bfd
#
dcn
#
isis 65534
description auto-generated for virtual-access
is-level level-2
cost-style wide
virtual-access enable
network-entity 00.38ba.1a42.1f01.00
binding interface GigabitEthernet1/1/0/1 down-weight 10
binding interface GigabitEthernet1/1/0/2 down-weight 10
#
interface GigabitEthernet1/1/0/1
undo shutdown
isis enable 65534
isis circuit-type p2p
dcn
virtual-access enable
#
interface GigabitEthernet1/1/0/2
undo shutdown
isis enable 65534
isis circuit-type p2p
dcn
virtual-access enable
#
interface LoopBack2147483646
description virtual-access loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 1.1.1.1 255.255.255.255
#
interface LoopBack2147483647
description DCN loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 10.1.1.1 255.255.0.0
#
ap-id 2000
sysname ap2000
esn 391092333866236
admin 2.2.2.2
login-user sys-admin login-password %^%#(p@y@~'n3/4m<"=;YyWDZIyvCQuK5D1JbuYk^ODQ%^%#
login-user sys-admin sftp-directory cfcard:/
authentication-mode local
#
ap-user
local-user sys-admin password cipher %^%#otll=pnt1#I_[1TE|k'F9-RT!@>rGAa%<&J@q9H&%^%#
inner-connect GigabitEthernet1/0/1 binding GigabitEthernet1/1/0/1
remote-interface GigabitEthernet1/0/2 binding GigabitEthernet1/1/0/1
remote-interface GigabitEthernet1/0/3 binding GigabitEthernet1/1/0/1
#
ap-id 2001
sysname ap2001
esn 391092333000298
admin 3.3.3.3
login-user sys-admin login-password %^%#/md1*$flA+)0\t.0B"43,q{>+2*)f-k&PWLDzjcL%^%#
login-user sys-admin sftp-directory cfcard:/
authentication-mode local
#
ap-user
local-user sys-admin password cipher %^%#(1F!FQJ[FP&+-H@%pe)G5h9r:g$)DF&19m@N\T(9%^%#
inner-connect GigabitEthernet1/0/1 binding GigabitEthernet1/1/0/2
remote-interface GigabitEthernet1/0/2 binding GigabitEthernet1/1/0/2
remote-interface GigabitEthernet1/0/3 binding GigabitEthernet1/1/0/2
#
interface NULL0
#
Definition
Currently, carrier-class networks require high reliability for IP devices. As such,
devices on the networks are required to rapidly detect faults. After fast detection is
enabled on an interface, the alarm reporting speed is accelerated. As a result, the
physical status of the interface frequently alternates between up and down,
causing frequent network flapping. Therefore, alarms must be filtered and
suppressed to prevent frequent network flapping.
Transmission alarm suppression can efficiently filter and suppress alarm signals to
prevent interfaces from frequently flapping. In addition, transmission alarm
customization can control the impact of alarms on the interface status.
Purpose
Transmission alarm customization allows you to filter unwanted alarms, and
transmission alarm suppression enables you to set thresholds on customized
alarms, allowing devices to ignore burrs generated during transmission link
protection and preventing frequent network flapping.
On a backbone or metro network, IP devices are connected to transmission
devices, such as Synchronous Digital Hierarchy (SDH), Wavelength Division
Multiplexing (WDM), or Synchronous Optical Network (SONET) devices. If a
transmission device becomes faulty, the interconnected IP device receives an
alarm. The transmission devices then perform a link switchover. After the link of
the transmission device recovers, the transmission device sends a clear alarm to
the IP device. After an alarm is generated, a link switchover lasts 50 ms to 200 ms.
In the log information on IP devices, the transmission alarms are displayed as
burrs that last 50 ms to 200 ms. These burrs will cause the interface status of IP
devices to switch frequently. IP devices will perform route calculation frequently.
As a result, routes flap frequently, affecting the performance of IP devices.
From the perspective of the entire network, IP devices are expected to ignore such
burrs. That is, IP devices must customize and suppress the alarms that are
generated during transmission device maintenance or link switchovers. This can
prevent route flapping. Transmission alarm customization can control the impact
of transmission alarms on the physical status of interfaces. Transmission alarm
suppression can efficiently filter and suppress specific alarm signals to avoid
frequent interface flapping.
During the active/standby switchover, various transmission alarm signals can be
processed properly, and the transmission alarm configuration still takes effect.
Feature Requirements
None
Usage Scenario
In the scenario where transmission devices are connected to IP devices, if the
network is unstable, a large number of burr alarms will be generated. As a result,
the physical status of interfaces on the transmission devices will switch between
Up and Down. To enable IP devices to ignore these burrs, configure transmission
alarm customization on the IP devices.
Pre-configuration Tasks
Before configuring the transmission alarm customization function, power on the
router and ensure that it is working properly.
1.1.4.3.1 Configuring the Types of Alarms that Affect the Physical Status of
Interfaces
In the scenario where a router is connected to a transmission device, if the
network is unstable, a large number of burr alarms may be generated. As a result,
the physical status of interfaces will frequently change between up and down. To
specify the alarms that can trigger the physical status of an interface to go down,
you can configure transmission alarm customization.
Context
Transmission alarm customization can be used to control the impact of
transmission alarms on the physical interface status. Perform the following steps
globally or on the interface connected to a transmission device:
NOTE
In VS mode, global transmission alarm customization is supported only by the admin VS.
Procedure
● Configure transmission alarm customization globally.
a. Run system-view
a. Run system-view
▪ To enter the POS or 10GE WAN interface view, run the interface
interface-type interface-number command.
▪ To enter the WDM interface view, run the controller wdm controller-
number command.
c. Run the following commands as required:
● Not all interfaces support the preceding alarms because the alarm types
supported may vary with subcards. If you attempt to customize an alarm type
that is not supported by an interface for the interface, the customization fails,
and a message is displayed, telling you which alarm types are not supported
by this interface.
● WLNK alarms can be viewed only and cannot be customized. The WLNK
alarms are always enabled, and their generation causes interfaces to go down
physically. To view the status and statistics on WLNK alarms, run the display
transmission-alarm command.
NOTICE
By default, the LAIS, LOF, and LOS alarms can change interface status. If
these alarms are disabled, forwarding of service data may be adversely
affected. Therefore, you are advised to keep these alarms enabled.
d. Run commit
----End
Prerequisites
Transmission alarm customization has been configured. The transmission alarm
suppression function has been enabled using the transmission-alarm damping
command.
Procedure
● To check the alarm configuration on a POS or 10GE WAN interface, run the
display transmission-alarm { pos | wan } interface-number [ auais | b1tca |
b2tca | b3tca | lais | lcd | lof | lom | lop | los | lrdi | lrei | oof | pais | prdi |
prei | pplm | puneq | rdool | rrool | sdbere | sfbere | trool | wlnk ] *
command.
● To check the alarm configuration on a WDM interface, run the display
transmission-alarm wdm interface-number [ odu-ais | odu-lck | odu-oci |
otu-ais | otu-lom | otu-sd-ber | otu-sf-ber | pm-bdi | pm-tim | r-lof | r-los |
r-oof | sm-bdi | sm-iae | sm-tim | prefec-tca | odu-sd-ber ] * command.
----End
Usage Scenario
In the scenario where a router is connected to a transmission device, if the
network is unstable, a large number of burr alarms may be generated. As a result,
the physical status of interfaces will frequently change between up and down. If a
transmission alarm filtering interval is configured, the alarms whose lifetime is
shorter than the interval will be ignored.
In VS mode, global transmission alarm filtering intervals are supported only by the admin
VS.
Pre-configuration Tasks
Before configuring transmission alarm filtering intervals, complete the following
tasks:
● Power on the router and ensure that the router passes the self-check.
● Configure transmission alarm customization on the router's interface
connected to the transmission device by referring to 1.1.4.3 Configuring
Transmission Alarm Customization.
NOTE
The alarm filtering function on an interface takes effect only after transmission alarm
customization is configured on the interface.
Procedure
● Enable the global alarm filtering function and set global generation and
clearance alarm filtering intervals.
a. Run system-view
▪ To enter the POS or 10GE WAN interface view, run the interface
interface-type interface-number command.
▪ To enter the WDM interface view, run the controller wdm controller-
number command.
c. Run transmission-alarm holdoff-timer [ holdoff-time ]
Usage Scenario
In the scenario where a router is connected to a transmission device, if the
network is unstable, a large number of burr alarms may be generated. As a result,
the physical status of interfaces will frequently change between up and down. To
prevent these alarms from frequently flapping or configure the device to ignore
these burr alarms, you need to enable transmission alarm suppression.
Pre-configuration Tasks
Before configuring transmission alarm suppression, complete the following tasks:
● Power on the router and ensure that the router passes the self-check.
● Configure transmission alarm customization on the router's interface
connected to the transmission device by referring to 1.1.4.3 Configuring
Transmission Alarm Customization.
NOTE
Transmission alarm suppression takes effect on an interface only after transmission alarm
customization is configured on the interface.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run the following commands as required:
1. To enter the POS or 10GE WAN interface view, run the interface interface-
type interface-number command.
2. To enter the WDM interface view, run the controller wdm interface-number
command.
----End
Procedure
● To query the current bit error rates of an interface, run the display
transmission-alarm bit-error-rate command in any view.
----End
Context
NOTICE
After information about transmission alarms has been cleared, all statistics on
alarms will be reset. Exercise caution when running the reset transmission-alarm
statistics command.
Procedure
● To clear the information about transmission alarms on an interface, run the
reset transmission-alarm statistics command in the interface view.
----End