Fat AP and Cloud AP V200R019C00 Command Reference PDF
Fat AP and Cloud AP V200R019C00 Command Reference PDF
Fat AP and Cloud AP V200R019C00 Command Reference PDF
V200R019C00
Command Reference
Issue 08
Date 2021-11-15
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://e.huawei.com
Contents
29 Reliability Commands....................................................................................................3032
29.1 BFD Configuration Commands................................................................................................................................. 3032
29.1.1 bfd................................................................................................................................................................................... 3032
29.1.2 bfd bind peer-ip.......................................................................................................................................................... 3033
29.1.3 bfd bind peer-ip default-ip...................................................................................................................................... 3035
29.1.4 bfd bind peer-ip source-ip auto.............................................................................................................................3038
29.1.5 bfd one-arm-echo...................................................................................................................................................... 3040
29.1.6 bfd bfd-name............................................................................................................................................................... 3042
29.1.7 bfd session nonexistent-config-check................................................................................................................. 3044
29.1.8 commit........................................................................................................................................................................... 3044
29.1.9 default-ip-address...................................................................................................................................................... 3046
29.1.10 description (BFD session view)........................................................................................................................... 3047
29.1.11 detect-multiplier.......................................................................................................................................................3048
29.1.12 discriminator..............................................................................................................................................................3050
29.1.13 display bfd configuration...................................................................................................................................... 3051
29.1.14 display bfd interface............................................................................................................................................... 3055
29.1.15 display bfd session................................................................................................................................................... 3056
29.1.16 display bfd statistics................................................................................................................................................ 3062
29.1.17 display bfd statistics session................................................................................................................................ 3066
29.1.18 display bfd ttl............................................................................................................................................................ 3069
29.1.19 display snmp-agent trap feature-name bfd all............................................................................................. 3070
29.1.20 min-echo-rx-interval............................................................................................................................................... 3072
29.1.21 min-rx-interval.......................................................................................................................................................... 3073
29.1.22 min-tx-interval.......................................................................................................................................................... 3075
29.1.23 multi-hop.................................................................................................................................................................... 3076
29.1.24 peer-ip ttl.................................................................................................................................................................... 3078
29.1.25 process-interface-status........................................................................................................................................ 3079
29.1.26 reset bfd statistics.................................................................................................................................................... 3081
29.1.27 shutdown (BFD session view)............................................................................................................................. 3082
29.1.28 snmp-agent bfd trap-interval.............................................................................................................................. 3083
29.1.29 snmp-agent trap enable feature-name bfd....................................................................................................3084
29.1.30 tos-exp......................................................................................................................................................................... 3086
29.1.31 wtr................................................................................................................................................................................. 3087
Overview
This document provides the configuration commands of each feature supported by
the device, including the syntax, view, default level, description, parameters, usage
guideline, related commands, and example of each command.
This document together with the Configuration Guide provides intended readers
with detailed usage of each command.
Intended Audience
This document is intended for network engineers responsible for WLAN
configuration and management. You should be familiar with basic Ethernet
knowledge and have extensive experience in network deployment and
management.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as
follows.
Convention Description
NOTE
The interface types, command outputs, and device models provided in this manual vary
according to device configurations and may differ from the actual information.
To obtain better user experience, you are advised to set the number of columns displayed
on the command line editor to 132 or higher.
Security Conventions
● Password setting
When configuring a password, the cipher text is recommended. To ensure
device security, do not disable password complexity check, and change the
password periodically.
When configuring a plaintext password, do not start and end it with %$%$,
%^%#, %#%#, %@%@, or @%@%, which are considered valid ciphertext
characters. The device can decrypt such as password and display the same
plaintext password as that configured by the user in the configuration file.
Ciphertext passwords starting and ending with %$%$, %^%#, %#%#, %@
%@, or @%@% are valid. However, ciphertext passwords for different
features are not interchangeable. For example, the ciphertext password
generated for Authentication, Authorization, Accounting (AAA) cannot be
configured for other features.
● Encryption algorithm
Currently, the device uses the following encryption algorithms: DES, 3DES,
AES, RSA, SHA1, SHA2, MD5, SMS4, and RC4. The encryption algorithm
depends on the applicable scenario. Use the recommended encryption
algorithm; otherwise, security protection requirements may not be met.
– For the symmetrical encryption algorithm, use AES with the key of 128
bits or more.
– For the asymmetrical encryption algorithm, use RSA with the key of 2048
bits or more.
– For the hash algorithm, use SHA2 with the key of 256 bits or more.
– For the HMAC algorithm, use HMAC-SHA2.
– The encryption algorithms DES/3DES/RSA (RSA-1024 or lower)/MD5 (in
digital signature scenarios and password encryption)/SHA1 (in digital
signature scenarios) have a low security, which may bring security risks. If
protocols allowed, using more secure encryption algorithms, such as
AES/RSA (RSA-2048 or higher)/SHA2/HMAC-SHA2, is recommended.
– SHA2 is irreversible encryption algorithm. The irreversible encryption
algorithm must be used for the administrator password.
● Personal data
Some personal data (such as the MAC or IP addresses of users) may be
obtained or used during operation or fault location of your purchased
products, services, features, so you have an obligation to make privacy policies
and take measures according to the applicable law of the country to protect
personal data.
User When a user logs in to the In the user view, you can view
view device, the user enters the user the running status and statistics
view and the following prompt is of the device.
displayed on the screen:
<HUAWEI>
System Run the system-view command In the system view, you can set
view and press Enter in the user view. the system parameters of the
The system view is displayed. device, and enter other function
<HUAWEI> system-view views from this view.
Enter system view, return user view with
Ctrl+Z.
[HUAWEI]
Interface Run the interface command and You can configure interface
view specify an interface type and parameters in the interface view.
number to enter an interface The interface parameters include
view. physical attributes, link layer
[HUAWEI] interface gigabitethernet protocols, and IP addresses.
X/Y/Z
[HUAWEI-GigabitEthernetX/Y/Z]
NOTE
● X/Y/Z indicates the number of an
interface that needs to be
specified. It is in the format of
slot number/sub card number/
interface sequence number.
● The interface GigabitEthernet is
only an example.
WLAN Run the wlan command and In the WLAN view, you can
view press Enter in the system view. configure most WLAN
The WLAN view is displayed. parameters.
[HUAWEI] wlan
[HUAWEI-wlan-
view]
NOTE
● The command line prompt HUAWEI is the default host name (sysname). The prompt
indicates the current view. For example, <> indicates the user view and [] indicates all
other views except user view.
● Some commands can be executed in multiple views, but they have different functions
after being executed in different views. For example, you can run the lldp enable
command in the system view to enable LLDP globally and in the interface view to
enable LLDP on an interface.
● In the system view, you can run the diagnose command to enter the diagnostic view.
Diagnostic commands are used for device fault diagnosis. If you run some commands in
the diagnostic view, the device may run improperly or services may be interrupted.
Contact technical support personnel and use these diagnostic commands with caution.
To return from the interface view directly to the user view, press Ctrl+Z or run the
return command.
# Press Ctrl+Z to return directly to the user view.
[HUAWEI-GigabitEthernet0/0/1] #Press Ctrl+Z.
<HUAWEI>
NOTICE
Changing the default command level without the guidance of technical personnel
is not recommended. This may result in inconvenience for operation and
maintenance and bring about security problems.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run command-privilege level level view view-name command-key
The command level is set in the specified view.
----End
Table 2-2 lists keys that are frequently used for command editing.
Backspace Deletes the character on the left of the cursor and the
cursor moves to the left. When the cursor reaches the
head of the command, an alarm is generated.
Left cursor key ← or Moves the cursor to the left by the space of a
Ctrl+B character. When the cursor reaches the head of the
command, an alarm is generated.
Right cursor key → or Moves the cursor to the right by the space of a
Ctrl+F character. When the cursor reaches the end of the
command, an alarm is generated.
Operating Techniques
Incomplete Keyword
You can enter incomplete keywords on the device. In the current view, you do not
need to enter complete keywords if the entered characters can match a unique
keyword. This function improves operating efficiency.
For example, to execute the display current-configuration command, you can
enter d cu, di cu, or dis cu, but you cannot enter d c or dis c because they do not
match unique keywords.
NOTE
Tab
Enter an incomplete keyword and press Tab to complete the keyword.
● When a unique keyword matches the input, the system replaces the
incomplete input with the unique keyword and displays it in a new line with
the cursor leaving a space behind. For example:
a. Enter an incomplete keyword.
[HUAWEI] info-
b. Press Tab.
The system replaces the entered keyword and displays it in a new line
with the complete keyword followed by a space.
[HUAWEI] info-center
● When the input has multiple matches, press Tab repeatedly to display the
keywords beginning with the incomplete input in a circle until the desired
keyword is displayed. In this case, the cursor closely follows the end of the
keyword. For example:
a. Enter an incomplete keyword.
[HUAWEI] info-center log
b. Press Tab.
The system displays the prefixes of all the matched keywords. In this
example, the prefix is log.
[HUAWEI] info-center logbuffer
Press Tab to switch from one matched keyword to another. In this case,
the cursor closely follows the end of a word.
[HUAWEI] info-center logfile
[HUAWEI] info-center loghost
Stop pressing Tab when the desired keyword is displayed.
● When an incorrect keyword is entered, press Tab and it is displayed in a new
line without being changed. For example:
a. Enter an incorrect keyword.
[HUAWEI] info-center loglog
b. Press Tab.
[HUAWEI] info-center loglog
The system displays information in a new line, but the keyword loglog
remains unchanged and there is no space between the cursor and the
keyword, indicating that this keyword does not exist.
Full Help
When entering a command, you can use the full help function to obtain keywords
and parameters for the command. Use any of the following methods to obtain full
help from a command line.
● Enter a question mark (?) in any command view to obtain all the commands
and their simple descriptions. For example:
<HUAWEI> ?
User view commands:
autosave <Group> autosave command group
backup Backup information
cd Change current directory
clear Clear
clock Specify the system clock
cls Clear screen
compare Compare configuration file
copy Copy from one file to another
...
● Enter some keywords of a command and a question mark (?) separated by a
space. All keywords associated with this command, as well as simple
descriptions, are displayed. For example:
<HUAWEI> system-view
[HUAWEI] user-interface vty 0 4
[HUAWEI-ui-vty0-4] authentication-mode ?
aaa AAA authentication
password Authentication through the password of a user terminal interface
[HUAWEI-ui-vty0-4] authentication-mode aaa ?
<cr> Please press ENTER to execute command
[HUAWEI-ui-vty0-4] authentication-mode aaa
Partial Help
If you enter only the first or first several characters of a command keyword, partial
help provides keywords that begin with this character or character string. Use any
of the following methods to obtain partial help from a command line.
● Enter a character string followed directly by a question mark (?) to display all
keywords that begin with this character string. For example:
<HUAWEI> d?
debugging <Group> debugging command group
delete Delete a file
dir List files on a filesystem
display Display information
<HUAWEI>d
● Enter the first several letters of a keyword in a command and press Tab to
display a complete keyword. The first several letters, however, must uniquely
identify the keyword. If they do not identify a specific keyword, press Tab
continuously to display different keywords and you can select one as required.
NOTE
The command output obtained through the online help function is used for reference only.
<HUAWEI> system-view
[HUAWEI] header login information "Hello!"
Log out of the terminal and re-log in. A message "Hello!" is displayed before
authentication. Run the undo header login command.
Hello!
Login authentication
Username:admin
Password:
<HUAWEI> system-view
[HUAWEI] undo header login
Log out of the terminal and re-log in. No message is displayed before
authentication.
Login authentication
Username:admin
Password:
<HUAWEI>
NOTE
The command output provided here is used for reference only. The actual output
information may differ from the preceding information.
NOTE
If the value is too large, it may take a long time to obtain a required history command.
Therefore, a large value is not recommended.
Display the later Down arrow key ↓ or Ctrl+N If there is a later history
history command. command, the later
history command is
displayed. Otherwise, the
command is cleared and
an alarm is generated.
● The saved history commands are the same as that those entered by users. For
example, if the user enters an incomplete command, the saved command also
is incomplete.
● If the user runs the same command several times, only the latest command is
saved. If the command is entered in different forms, they are considered as
different commands.
For example, if the display current-configuration command is run several
times, only one history command is saved. If the display current-
configuration command and the dis curr command are used, both of them
are saved.
NOTE
The terminal in use may affect the functions of the shortcut keys. For example, if the
shortcut keys defined by the terminal conflict with those defined in the system, the shortcut
keys entered by the user are captured by the terminal program and the commands
corresponding to the shortcut keys are not executed.
The system supports four user-defined shortcut keys and the default values are as
follows:
● Ctrl+G: display current-configuration
● Ctrl+L: undo idle-timeout
● Ctrl+O: undo debugging all
● Ctrl+U: Null
NOTE
● When defining shortcut keys, use double quotation marks to define the command if this
command contains several keywords separated by spaces. For example, hotkey ctrl_l
"display tcp status". Do not use double quotation marks to define a command if the
command contains only one keyword.
● Run the display hotkey command to view the status of the defined, undefined, and
system-defined shortcut keys.
● Run the undo hotkey command to restore default values of the configured shortcut
keys.
● Shortcut keys are executed in the same way as commands. The system can record
commands in their original formats in the command buffer and logs to help query and
locate the fault.
● The user-defined shortcut keys are available to all users. If a user does not have the
rights to use the command defined by a shortcut key, the system displays an error
message when this shortcut key is executed.
Key Function
Key Function
3.1.1 cls
Function
The cls command clears the current screen.
Format
cls
Parameters
None
Views
User view
Default Level
1: Monitoring level
Usage Guidelines
This command only clears the screen and does not clear the screen buffer.
Example
# Clear screen.
<HUAWEI> cls
Info: Current terminal monitor is off.
Info: Current terminal debugging is off.
Format
command-privilege level level view view-name command-key
undo command-privilege view view-name command-key
Parameters
Parameter Description Value
level level Specifies the command level. The value is an
integer that
ranges from 0 to
15.
view view-name Specifies the view name. You can enter a -
question mark (?) in the terminal GUI to
obtain all view names in the command
view.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The system divides commands into four levels and sets the command level in the
specified view. The device administrator can change the command level as
required, so that a lower-level user can use some high-level commands. The device
administrator can also change the command level to a larger value to improve
device security.
You can run the command-privilege level command to change the level of one
command line based on Table 3-1.
Precautions
You are advised not to change the default command level. If you need to change
it, consult with professional personnel to ensure that routine operations and
maintenance are not affected and security risk is avoided.
When you run this command to lower the level of a command, pay attention to
relative commands in the upper-layer view of the command. If the level of
commands in the upper-layer view is lower the current command level, users of
the corresponding level cannot run the command for which the level is lowered
because the users cannot enter the upper-layer view.
The rules for using this command to set the command level of a specified view are
as follows:
● When you degrade the target command, all keywords in the command are
degraded.
● When you upgrade the target command, only the last keyword in the
command is upgraded.
● When you set a level for the target command, the levels of all commands (in
the same view) starting with this command are changed.
● When you set a level for the target command, the keyword level in other
commands having the same index as the keyword whose level is changed is
also changed.
● If the level of keywords that have the same index is modified for multiple
times, the latest configured level takes effect.
You cannot change the command level of some commands, including:
● config lock
● config unlock interval time
● diagnose
● quit
● return
● cls
Example
# Set the privilege level of the save command to 5.
<HUAWEI> system-view
[HUAWEI] command-privilege level 5 view user save
3.1.3 diagnose
Function
The diagnose command enters the diagnostic view from the system view.
Format
diagnose
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Diagnostic commands are mainly used for fault diagnosis. However, running some
commands may cause device faults or service interruptions. Therefore, use these
commands under the instruction of technical support personnel.
Example
# Enter the diagnostic view.
<HUAWEI> system-view
[HUAWEI] diagnose
[HUAWEI-diagnose]
Function
The display history-command command displays the historical commands stored
on the current device.
Format
display history-command
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to check historical commands the user has executed
recently, facilitating information search. Historical commands are recorded in
circular mode. You can run the history-command max-size command to set the
maximum number of historical commands to be recorded.
Precautions
All the historical commands entered by a user are automatically saved on the
terminal, that is, any input that ends with Enter is saved as a historical command.
NOTE
● Historical commands are saved in the same format as that used in the input. If a
command that is entered by a user is in an incomplete format, the saved historical
command is also in the incomplete format.
● If a user runs a command several times, only the latest command is saved on the device.
If the command is entered in different formats, they are considered as different
commands.
● To view the previous historical command, press the Up arrow key or Ctrl+P.
If there is an earlier historical command, the earlier historical command is
displayed.
● To view the next historical command, press the Down arrow key or Ctrl+N.
If there is a new historical command, the new historical command is
displayed.
Example
# Display the historical commands that have been executed on the current
terminal.
<HUAWEI> display history-command
quit
user privilege level 15
user-interface vty 0 4
system-view
Function
The display language command displays the language that the system supports
and version information.
Format
display language
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use this command to check the language supported by the system or the
running version information. The system can display information in different
languages according to customer requirements.
Example
# Display the languages that the system supports and the version information.
<HUAWEI> display language
General:
Description: ENGLISH
Version: V200R003C00
Encoding: ANSI
Item Description
Function
The display this command displays the running configuration in the current view.
Format
display this
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After the configurations are complete in a certain view, run the display this
command to check the current configurations.
Precautions
If you run the display this command in an interface view, configuration of the
interface view is displayed. If you run this command in a protocol view,
configuration of the protocol view is displayed.
Example
# Display the running configuration in the current view.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] display this
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password irreversible-cipher %$%$I6.ASV)hJET,p"Dn.YM%3aXO%$%$
local-user admin service-type http
#
return
3.1.7 header
Function
The header command configures the header information displayed on a terminal
when users log in to a connected device.
Format
header { login | shell } { information text | file file-name }
Parameters
Parameter Description Value
information Specifies the header and The value is a string with spaces
text content. and carriage returns supported. The
maximum length of the string that
can be entered at one time is 480
characters, if a linefeed is contained
in the first line. If no linefeed is
contained in the first line, a
maximum of 510 characters can be
entered at one time, and the total
string length ranges from 1 to 2038
characters.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To provide some prompts or alarms to users, you can use the header command to
configure a title on the device. If a user logs in to the device, the title is displayed.
Procedure
If information is specified, the header text starts and ends with the same
character. You can set the header text in either of the following modes:
● Non-interactive: enter the header text behind the start character.
Use the same character at the beginning and end of the header and press
Enter. If the start and end characters are inconsistent, the system prompts an
error message.
● Interactive: enter the start character and press Enter.
The system displays a message prompting the correct header information.
Then enter the required information and enter the same character at the
beginning and end of the header, and press Enter. The system quits the
interactive process.
During interaction, you can press Enter at any time to enter information in
the next line.
Precautions
● Before setting the login parameter, you must set login authentication
parameters; otherwise, no header information about authentication is
displayed.
● Before setting the file parameter, ensure that the file containing the header
exists; otherwise, the file name cannot be obtained.
● If the file parameter is set, save the file containing the header in the root
directory of the default storage media. To save the file to another directory,
you must use a full path.
● If you use SSH1.X to log in to the device, the shell header rather than the
login header is displayed.
● If you use SSH2.0 to log in to the device, both login and shell headers are
displayed in the login process.
● If the header command is configured several times, only the latest
configuration takes effect.
● After the login title is configured, any user that logs in to the system can view
the title.
● The start and end characters in the header text can be double quotation
marks (""). However, the header text content cannot contain double
quotation marks ("").
Example
# Configure a shell header in non-interactive mode.
<HUAWEI> system-view
[HUAWEI] header shell information &Hello! Welcome to system!& # Enter the header text behind
the start character '&' and enter '&' at the end of the header text, and press Enter.
[HUAWEI] header shell information % # Press Enter after entering the start character % to start the
interactive process.
Info: Input banner text, and quit with the character '%'. Hello!
Welcome to system!%
[HUAWEI] quit
<HUAWEI> quit # Log off.
# Press Enter. The shell header is displayed when the user logs in again.
Hello!
Welcome to system!
<HUAWEI>
Format
display hotkey
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After you understand the defined, undefined, and system hotkeys in the system,
you can use hotkeys to quickly enter commands. To redefine hotkeys for a
command, run the hotkey command.
The system allows hotkeys in places where commands can be entered, and
displays the commands corresponding to hotkeys. You can run the display hotkey
command to view the commands corresponding to hotkeys.
Example
# Display defined, undefined, and system hotkeys.
<HUAWEI> display hotkey
----------------- HOTKEY -----------------
=Defined hotkeys=
Hotkeys Command
CTRL_G display current-configuration
CTRL_L undo idle-timeout
CTRL_O undo debugging all
=Undefined hotkeys=
Hotkeys Command
CTRL_U NULL
=System hotkeys=
Hotkeys Function
CTRL_A Move the cursor to the beginning of the first line
CTRL_B Move the cursor one character left
CTRL_C Stop current command function
CTRL_D Erase current character
CTRL_E Move the cursor to the end of the Last line
CTRL_F Move the cursor one character right
CTRL_H Erase the character left of the cursor
CTRL_I Perform the same fucntion as the "Tab" key
CTRL_J Perform the same fucntion as the "Enter" key
CTRL_K Kill outgoing connection when connecting
CTRL_M Perform the same fucntion as the "Enter" key
CTRL_N Display the next command from the history buffer
CTRL_T Function as a question mark
CTRL_P Display the previous command from the history buffer
CTRL_W Delete the word left of the cursor
CTRL_X Delete all characters up to the cursor
CTRL_Y Delete all characters after the cursor
CTRL_Z Return to the user view
CTRL_] Kill incoming connection or redirect connection
ESC_B Move the cursor one word back
ESC_D Delete remainder of word
ESC_F Move the cursor forward one word
3.1.9 hotkey
Function
The hotkey command sets a shortcut key for a command.
The undo hotkey restores the system shortcut keys to the default values.
By default, the system sets the default values for three shortcut keys CTRL+G,
CTRL+L, and CTRL+O, while does not set default value for CTRL+U.
Format
hotkey { CTRL_G | CTRL_L | CTRL_O | CTRL_U } command-text
undo hotkey { CTRL_G | CTRL_L | CTRL_O | CTRL_U }
Parameters
Parameter Description Value
CTRL_G Specifies the shortcut key Ctrl+G for a -
command.
CTRL_L Specifies the shortcut key Ctrl+L for a -
command.
CTRL_O Specifies the shortcut key Ctrl+O for a -
command.
CTRL_U Specifies the shortcut key Ctrl+U for a -
command.
command-text Specifies the associated command line for The value is a string
shortcut keys. of 1 to 240
characters.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can set a shortcut key for a command that is often used; you can also change
the default value of the shortcut key that is defined by the system according to
your requirements.
Precautions
Four shortcut keys are customized by users: CTRL+G, CTRL+L, CTRL+O, and CTRL
+U.
● By default, the shortcut key CTRL+G corresponds to the display current-
configuration command which displays current configuration.
● By default, the shortcut key CTRL+L corresponds to the undo idle-timeout
command which restores the default timeout period.
● By default, the shortcut key CTRL+O corresponds to the undo debugging all
command which stops the output of all debugging information.
After you use the hotkey command to set a shortcut key for a command, you can
run the command by pressing the shortcut key or entering a command.
NOTE
One shortcut key can be set for only one command. If you set a shortcut key for multiple
commands, only the latest configuration takes effect.
When assigning a command for a shortcut key, you need to mark the command with
double quotation marks if the command consists of several words, that is, the command
includes spaces. You do not need to mark the command with double quotation marks if the
command consists of only one word.
Example
# Assign the display tcp status command for the shortcut key CTRL+L.
<HUAWEI> system-view
[HUAWEI] hotkey ctrl_l "display tcp status"
[HUAWEI] display hotkey
----------------- HOTKEY -----------------
=Defined hotkeys=
Hotkeys Command
CTRL_G display current-configuration
CTRL_L display tcp status
CTRL_O undo debugging all
=Undefined hotkeys=
Hotkeys Command
CTRL_U NULL
=System hotkeys=
Hotkeys Function
CTRL_A Move the cursor to the beginning of the first line
CTRL_B Move the cursor one character left
CTRL_C Stop current command function
CTRL_D Erase current character
CTRL_E Move the cursor to the end of the Last line
CTRL_F Move the cursor one character right
CTRL_H Erase the character left of the cursor
CTRL_I Perform the same fucntion as the "Tab" key
CTRL_J Perform the same fucntion as the "Enter" key
CTRL_K Kill outgoing connection when connecting
CTRL_M Perform the same fucntion as the "Enter" key
CTRL_N Display the next command from the history buffer
CTRL_T Function as a question mark
CTRL_P Display the previous command from the history buffer
CTRL_W Delete the word left of the cursor
CTRL_X Delete all characters up to the cursor
CTRL_Y Delete all characters after the cursor
CTRL_Z Return to the user view
CTRL_] Kill incoming connection or redirect connection
ESC_B Move the cursor one word back
ESC_D Delete remainder of word
ESC_F Move the cursor forward one word
3.1.10 quit
Function
The quit command returns from the current view to a lower-level view. If the
current view is the user view, this command exits from the system.
Format
quit
Parameters
None
Views
All views
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
Three types of views are available and they are listed as follows from a lower level
to a higher level:
● User view
● System view
● Service view, such as route protocol view or interface view
Run the quit command to return to a lower-level command view from the current
view. If you are in the user view currently, after you run the quit command, you
quit from the system.
Example
# Return to the system view from the AAA view, and then return to the user view.
After this, quit the system.
<HUAWEI> system-view
[HUAWEI] aaa
[HUAWEI-aaa] quit
[HUAWEI] quit
<HUAWEI> quit
3.1.11 return
Function
The return command returns to the user view from other views except the user
view.
Format
return
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
In other views, you can use the return command to return to the user view.
● Run this command to return to the user view if the current view is another
view except the user view.
● If the current view is the user view, no change occurs after running this
command.
● The shortcut keys<Ctrl+Z> have the same function as the return command.
Example
# Return to the user view from the user interface view.
<HUAWEI> system-view
[HUAWEI] user-interface vty 0
[HUAWEI-ui-vty0] return
<HUAWEI>
3.1.12 system-view
Function
The system-view command enables you to enter the system view from the user
view.
Format
system-view
Parameters
None
Views
User view
Default Level
2: Configuration level
Usage Guidelines
You must configure the device in the system view. Run this command in the user
view to enter the system view.
Example
# Enter the system view.
<HUAWEI> system-view
Enter system view, return user view with Ctrl+Z.
[HUAWEI]
Format
clock datetime HH:MM:SS YYYY-MM-DD
Parameters
Parameter Description Value
HH:MM:SS Specifies the current HH specifies the hour, which is an integer
time on the wireless ranging from 0 to 23. MM specifies the
access point. minute, which is an integer ranging from 0
to 59. SS specifies the second, which is an
integer ranging from 0 to 59.
YYYY-MM- Specifies the current YYYY specifies the year, which is an integer
DD date (year, month, ranging from 2000 to 2030. MM specifies
and day) on the the month, which is an integer ranging
wireless access point. from 1 to 12. DD specifies the day, which
is an integer ranging from 1 to 31.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
In the scenario where accurate absolute time is required, the current date and
time must be set on the wireless access point.
Prerequisite
The time zone and daylight saving time have been configured using the clock
timezone and clock daylight-saving-time commands. If the time zone and
daylight saving time are not configured, the clock datetime command sets a UTC
time.
Precautions
● The specified time must be in 24-hour format. If you do not specify MM and
SS, their values are 0. You must enter at least one digit to specify HH. For
example, when you enter 0, the time is 00:00:00.
● The specified year must be a four-digit number and the specified month and
day can be a one-digit number. For example, when you enter 2012-9-1, the
time is 2012-09-01.
● If the device is configured to restart at a specified time and if the system time
is changed to be more than 10 minutes later than the specified restart time,
the scheduled restart function will be disabled.
● This configuration is not reset after the reset factory-configuration
command is executed.
Example
# Set the current time and date of the system to 0:0:0 2012-01-01.
<HUAWEI> clock datetime 0:0:0 2012-01-01
Function
The clock daylight-saving-time command sets the name, start time, and end
time of the daylight saving time (DST).
Format
clock daylight-saving-time time-zone-name one-year start-time start-date end-
time end-date offset
Parameters
start-date Specifies the start The start date is in the format YYYY-MM-
date of the DST. DD. The value of YYYY ranges from 2000
to 2030, the value of MM ranges from 1 to
12, and the value of DD ranges from 1 to
31.
end-time Specifies the end The start time is in the 24-hour format
time of the DST. HH:MM. HH specifies the hour, which is an
integer ranging from 0 to 23. MM specifies
the minute, which is an integer ranging
from 0 to 59. If MM is not specified, the
DST starts on the hour. You must enter at
least one digit to specify HH. For example,
when you enter 0, the start time is 00:00.
end-date Specifies the end The end date is in the format YYYY-MM-
date of the DST. DD. The value of YYYY ranges from 2000
to 2030, the value of MM ranges from 1 to
12, and the value of DD ranges from 1 to
31.
first Specifies the first -
workday in a month.
second Specifies the second -
workday in a month.
third Specifies the third -
workday in a month.
fourth indicates the fourth -
workday in a month.
last Specifies the last -
workday in a month.
weekday Specifies a day of The value is Mon, Tue, Wed, Thu, Fri, Sat,
the week. or Sun.
start-year Specifies the start The value is in the format YYYY and ranges
year. from 2000 to 2030.
end-year Specifies the end The value is in the format YYYY and ranges
year. from 2000 to 2030.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Users can customize the DST zone according to their countries' or regions'
convention. In addition, users can set how long clocks are adjusted forward,
usually an hour. With DST enabled, when it is time to start DST, the system time is
adjusted according to the user-specified DST. When it is time to end DST, the
system time automatically returns to original time.
Configuration Impact
● The time in logs and debugging information uses the local time adjusted
based on the time zone and the configured DST.
● The time in the output of the display commands uses the local time adjusted
based on the time zone and the configured DST.
To remove configurations for the DST, note the following:
● If the DST already takes effect when you remove the configurations, the
device will adjust its clock by subtracting the value of the offset parameter
from the current time.
● If the DST does not take effect, removing the configurations will not affect
the system time.
Precautions
● The DST is configured in the summer. The DST duration ranges from one day
to one year.
● You can configure the start time and end time for periodic DST in one of the
following modes: date+date, week+week, date+week, and week+date.
● This configuration is not reset after the reset factory-configuration
command is executed.
Example
# Set the periodic DST.
<HUAWEI> clock daylight-saving-time bj repeating 0 first sun jan 0 first sun apr 2 2009 2009
Format
clock timezone time-zone-name { add | minus } offset
undo clock timezone
Parameters
Parameter Description Value
time-zone- Specifies the time zone name. The name is a string of 1 to 32
name case-sensitive characters without
spaces.
add Specifies the offset from the -
UTC for the time zone
specified by time-zone-name.
That is, the sum of the
default UTC time zone and
offset is equal to the time
zone specified by time-zone-
name.
minus Specifies the offset from the -
UTC for the time zone
specified by time-zone-name.
That is, the remainder
obtained by subtracting offset
from the default UTC time
zone is equal to the time zone
specified by time-zone-name.
offset Specifies the offset from the Format: HH:MM:SS
UTC.
● HH specifies the hour.
– If the local time is earlier
than the UTC, the value is an
integer ranging from 0 to 14.
– If the local time is later than
the UTC, the value is an
integer ranging from 0 to 12.
● MM and SS specify the minute
and second respectively, and
both of them range from 0 to
59.
● When HH is set to the
maximum value, the MM and
SS values must be 0.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The system clock is the time indicated by the system timestamp. Because the rules
governing local time differ in different regions, the system clock can be configured
to comply with the rules of any given region.
The time zone of Fat APs is set to Beijing time zone in factory settings.
Precautions
● The specified time must be in 24-hour format. If you do not specify MM and
SS, their values are 0. You must enter at least one digit to specify HH. For
example, when you enter 0, the time is 00:00:00.
● After configuring the local time zone, run the display clock command to view
the configuration. The time in logs and diagnostic information uses the local
time adjusted based on the time zone and DST.
● This configuration is not reset after the reset factory-configuration
command is executed.
Example
# Set the local time zone name for Beijing China to BJ.
If the default UTC is London time 2012-12-01 00:00:00, Beijing time is London
time plus 08:00 because the offset from UTC is 8 hours.
<HUAWEI> clock datetime 0:0:0 2012-12-01
<HUAWEI> clock timezone BJ add 08:00:00
Function
The display clock command displays the current date and clock setting.
Format
display clock
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display clock command to view the system date and clock setting
and adjust the setting if necessary.
Precautions
The system clock is set using the clock datetime, clock timezone, and clock
daylight-saving-time commands.
● If the three commands are not used, the original system clock is displayed
after you run the display clock command.
● You can use any combination of the three commands to configure the system
time. Table 3-4 lists the formats of the configured time.
The table assumes that the original system time is 08:00:00 on January 1, 2010.
● 1: indicates that the clock datetime command is used, in which the current
time and date is date-time.
● 2: indicates that the clock timezone command is used, in which the time
zone parameter is set and the time offset is zone-offset.
● 3: indicates that the clock daylight-saving-time command is used, in which
the DST parameters are set and the time offset is offset.
● [1]: indicates that the clock datetime command is optional.
Example
# Display the current system date and time.
<HUAWEI> display clock
2012-05-15 20:34:53
Tuesday
Time Zone(Default Zone Name) : UTC+00:00:00
Daylight saving time :
Name : BJ
Repeat mode : one-year
Start year : 2012
End year : 2012
Start time : 08-01 06:00:00
End time : 10-01 06:00:00
Saving time : 01:00:00
3.2.5 sysname
Function
The sysname command sets the device host name.
The undo sysname command restores the default device host name.
By default, the device host name is HUAWEI.
Format
sysname host-name
undo sysname
Parameters
Parameter Description Value
host-name Specifies the host name. The value is a string of 1 to 246 case-
sensitive characters with spaces.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Changing the host name affects the prompt of the command interface. For
example, if the host name is HUAWEI, the prompt of the user interface is
<HUAWEI>.
Example
# Set the host name to HUAWEIA.
<HUAWEI> system-view
[HUAWEI] sysname HUAWEIA
[HUAWEIA]
3.2.6 ip domain-name
Function
The ip domain-name command sets the default domain name suffix.
The undo ip domain-name command deletes the default domain name suffix.
Format
ip domain-name domain-name
undo ip domain-name
Parameters
Parameter Description Value
Views
For a central AP: system view, AP view, AP group view
For a command AP: system view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Devices with the same system name may exist in different domains. In this case,
you can configure a fully qualified domain name (FQDN) for a device to uniquely
identify it. The FQDN of a device consists of the default domain name suffix and
device name. You can run the ip domain-name command to set the default
domain name suffix and the sysname command to set the device name.
Running the ip domain-name command in the system view can set the default
domain name suffix for the device itself. When running this command in the AP or
AP group view, you can set the default domain name suffix for APs managed the
device.
Precautions
If you run the ip domain-name command multiple times, the latest configuration
overrides the previous configurations.
Example
# Set the domain name suffix to com.cn.
<HUAWEI> system-view
[HUAWEI] ip domain-name com.cn
Format
acl acl-number { inbound | outbound }
undo acl { inbound | outbound }
Parameters
Parameter Description Value
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command restricts the login rights of a user interface based on the source IP
address, destination IP address, source port, or destination port. You can use this
command to permit or deny access to a destination or from a source.
Prerequisites
Before running this command, run the acl (system view) in the system view and
run the rule (basic ACL view) or rule (advanced ACL view) command to
configure an ACL.
If no rule is configured, login rights on the user interface are not restricted when
the acl command is executed.
Precautions
After the configurations of the ACL take effect, all users on the user interface are
restricted by the ACL.
Only one ACL (an inbound or outbound ACL) can be configured on a user
interface.
Example
# Restrict the Telnet login rights on user interface VTY 0.
<HUAWEI> system-view
[HUAWEI] acl 3001
[HUAWEI-acl-adv-3001] rule deny tcp source any destination-port eq telnet
[HUAWEI-acl-adv-3001] quit
[HUAWEI] user-interface vty 0
[HUAWEI-ui-vty0] acl 3001 outbound
# Remove the restriction on the Telnet login rights on user interface VTY 0.
<HUAWEI> system-view
[HUAWEI] user-interface vty 0
[HUAWEI-ui-vty0] undo acl outbound
Format
authentication-mode { aaa | password }
undo authentication-mode
Parameters
Parameter Description Value
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When a user needs to log in to the device through console, Telnet, or SSH, run this
command to configure the authentication mode for the user interface login. After
the configuration is complete, you can still run this command to change the
authentication mode for the user interface login as required.
Precautions
● When password is used for the user interface login, you also need to run the
set authentication password command to configure the authentication
password. You need to enter the correct login password to log in to the
device. Therefore, keep the login password properly. The levels of commands
accessible to a user depend on the level configured for the user interface to
which the user logs in.
● When aaa is used for user interface login authentication, the passwords set
for the user interface are automatically deleted. You need to enter the correct
user name and password to log in to the device. Therefore, keep the login
user name and password properly. The levels of commands accessible to a
user depend on the priority of the local user specified in the AAA
configuration. If no user level is configured for a local AAA user, the user level
of the current user interface is used by default.
● When the undo authentication-mode command is run to delete the
authentication mode configured for the user interface login, you are
prompted to confirm whether to clear the password of the user interface.
Example
# Configure password for VTY login authentication.
<HUAWEI> system-view
[HUAWEI] user-interface vty 0
[HUAWEI-ui-vty0] authentication-mode password
Function
The auto-execute command command configures auto-run commands.
Format
auto-execute command command
Parameters
Parameter Description Value
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the auto-execute command command to make the device run a
command automatically on the corresponding interface.
You can run the auto-execute command command to enable automatic
execution for the Telnet command.
Precautions
● The auto-execute command command is applicable to the VTY user
interface.
● When you log in to the device, the device automatically runs the commands
that are configured by the auto-execute command command. The user's
terminal disconnects from the device.
● Before saving the configuration of the auto-execute command command,
ensure that you can log in to the device in other ways so that you can cancel
the command configuration.
● If you use the auto-execute command command, you cannot configure the
device in the user interface view. Therefore, use this command with caution.
Example
# Configure the display version command to automatically run after a user logs
in to the device using the VTY0 interface.
<HUAWEI> system-view
[HUAWEI] user-interface vty 0
[HUAWEI-ui-vty0] auto-execute command display version
Warning: The system will not be configured through ui-vty0.Continue? [Y/N]: y
3.3.4 databits
Function
The databits command sets the number of data bits of the user interface.
The undo databits command restores the default number of data bits.
Format
databits { 5 | 6 | 7 | 8 }
undo databits
Parameters
Parameter Description Value
5 Indicates that the number of data bits is 5. -
6 Indicates that the number of data bits is 6. -
7 Indicates that the number of data bits is 7. -
8 Indicates that the number of data bits is 8. -
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Use this command only when necessary. If the number of data bits of a device's
user interface is changed, ensure that the same number of data bits is set on the
HyperTerminal used for login.
NOTE
The data bit of the console user interface does not support 5 and 6.
Example
# Set the number of data bits to 7.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] databits 7
Function
The display mib-index interface command displays the index value of an
interface in the MIB.
Format
display mib-index interface [ interface-type [ interface-number ] ]
Parameters
Parameter Description Value
interface-type Specifies the interface for which the index value is -
interface- displayed.
number
● interface-type: specifies the interface type, for
example, Ethernet.
If the interface type is not specified, the index values
of all interfaces are displayed.
● interface-number: specifies the number of an
interface. It is used with interface-type to specify an
interface.
If the interface number is not specified, the index
values of all interfaces of the type are displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mib-index interface command as an NMS user to view
the index values of interfaces.
Example
# Display indexes of all interfaces.
<HUAWEI> display mib-index interface
IfName IfIndex PortIndex
--------------------------------------------------
GigabitEthernet0/0/0 8 0
NULL0 2 --
Vlanif1 13 --
Vlanif33 14 --
Vlanif2001 5 --
Wlan-Bss0 7 1
Wlan-Radio0/0/0 6 --
Item Description
Item Description
Format
display user-interface [ ui-type ui-number1 | ui-number ] [ summary ]
Parameters
Parameter Description Value
ui-type Displays information about a The value can be Console or VTY.
specified user interface.
ui-number1 Displays information about a The minimum value is 0. The
user interface with a specified maximum value is smaller by 1
relative number. than the number of user interfaces
the system supports.
ui-number Displays information about a The value is an integer ranging
user interface with a specified from 0 to 25. The value varies
absolute number. according to the device type.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Using the display user-interface command, you can view detailed configuration
information about all user interfaces or a specified user interface.
NOTE
Lower-level users cannot gain access to a user interface information about users of higher
levels.
Example
# Display detailed information about the user interface with the absolute number
0.
<HUAWEI> display user-interface 0
Idx Type Tx/Rx Modem Privi ActualPrivi Auth Int
+ 0 CON 0 9600 - 15 15 P -
+ : Current UI is active.
Idx : Absolute index of UIs.
Type : Type and relative index of UIs.
Privi: The privilege of UIs.
ActualPrivi: The actual privilege of user-interface.
Auth : The authentication mode of UIs.
A: Authenticate use AAA.
N: Current UI need not authentication.
P: Authenticate use current UI's password.
Int : The physical location of UIs.
Parameter Description
UI(s) not in async mode - Interfaces numbered from 1 to 128 are UI interfaces
or- with no hardware that are working in synchronous mode or are not
support: 1-128 supported by the hardware. Currently, the WLAN
supports only the asynchronous mode.
Function
The display user-interface maximum-vty command displays the maximum
number of VTY users.
Format
display user-interface maximum-vty
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display user-interface maximum-vty command to view the
maximum number of users who connect to the device using Telnet or SSH. By
default, the total number of Telnet users and SSH users is five maximum.
Example
# Display the maximum number of VTY users.
<HUAWEI> display user-interface maximum-vty
Maximum of VTY user : 5
Parameter Description
Function
The display users command displays login information for each user interface.
Format
display users [ all ]
Parameters
Parameter Description Value
all Displays information about all users who log in to the device -
through user interfaces, including information about user
interfaces that are not used. If the all parameter is not used,
the command displays only information about user interfaces
that have been connected.
Views
All views
Default Level
3: Management level
Usage Guidelines
You can run this command to view information about users who are connected to
the device. The information includes the user name, IP address, and authentication
and authorization information.
NOTE
Lower-level users cannot gain access to information about users of higher levels.
Example
# Run the display users command to view information about users who log in to
the device through the user interface.
<HUAWEI> display users
User-Intf Delay Type Network Address AuthenStatus AuthorcmdFlag
+ 130 VTY 1 00:00:00 TEL 10.164.6.15 pass
Username : user2
Network Address : 172.16.1.1
,
Item Description
Delay Interval from the user's latest input to the current time, in
seconds.
Username User name for logging in to the device. If the user name is
not specified, Unspecified is displayed.
Item Description
Function
The display vty lines command lists the number of rows displayed on the VTY
screen.
Format
display vty lines
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# List the number of lines displayed on the VTY screen.
<HUAWEI> display vty lines
Current VTY lines is 24
Function
The display vty mode command displays the current VTY mode.
Format
display vty mode
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
VTY modes are classified into the man-to-machine mode and machine-to-machine
mode. You can run this command to check the current VTY mode.
Example
# Display the VTY mode.
<HUAWEI> display vty mode
Current user-interface mode is Human-Machine interface.
Format
free user-interface { ui-number | ui-type ui-number1 }
Parameters
Parameter Description Value
ui-number Specifies the absolute The value is an integer ranging from 0
number of a user interface. to 25. The value varies according to the
device type.
ui-type Specifies the type of a user The value can be Console, or VTY.
interface.
ui-number1 Specifies the relative The minimum value is 0. The
number of a user interface. maximum value is smaller by 1 than
the number of user interfaces the
system supports.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If a user logs in to the device and does not perform an operation or you want to
forbid a user from performing operations on the device, you can run the free
user-interface command to disconnect a specified user's terminal from the device.
After the command is executed, the device logs out the user.
Precautions
The free user-interface command cannot be executed on the current user
interface. For example, if the current user interface is VTY 2, the free user-
interface vty 2 command fails to be executed on VTY 2 and an error message is
displayed.
Example
# Disconnect the device from user-interface 0.
<HUAWEI> free user-interface 0
Warning: User interface Console0 will be freed. Continue? [Y/N]:y
Format
history-command max-size size-value
undo history-command max-size
Parameters
Parameter Description Value
size-value Specifies the size of the historical The value is an integer ranging
command buffer. from 0 to 256.
Views
User interface view
Default Level
3: Management level
Usage Guidelines
The CLI can automatically save the historical commands that you enter. This
function is similar to that of Doskey. You can invoke and run the historical
commands at any time.
Example
# Set the size of the historical command buffer to 20.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] history-command max-size 20
3.3.13 idle-timeout
Function
The idle-timeout command sets the timeout duration for disconnection from a
user interface.
Format
idle-timeout minutes [ seconds ]
undo idle-timeout
Parameters
Parameter Description Value
minutes Specifies the idle timeout The value is an integer ranging from
duration, in minutes. 0 to 35791, in minutes.
seconds Specifies the idle timeout The value is an integer ranging from
duration, in seconds. 0 to 59, in seconds.
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If a user logs in to the device and does not perform an operation, the user
interface is occupied unnecessarily. You can run the idle-timeout command to
disconnect the user's terminal from the device.
Precautions
If AAA authentication is required for login users, the timeout duration configured by the
local-user idle-timeout command takes effect. If no timeout duration is configured or the
undo local-user idle-timeout command is executed in the AAA view, the timeout duration
configured by the idle-timeout command on the user interface takes effect.
Example
# Set the timeout duration to 1 minute and 30 seconds.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] idle-timeout 1 30
Function
The mmi-mode enable command enters the machine-to-machine mode.
Format
mmi-mode enable
Parameters
None
Views
User view, system view
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
For example, to execute a series of commands that have been commissioned, you
can switch the VTY mode to the machine-to-machine mode.
Precautions
After you enter the machine-to-machine mode using the mmi-mode enable
command, commands that you need to use with caution can be used directly.
Therefore, in man-to-machine mode, do not use this command unless necessary.
Example
# Enter the machine-to-machine mode.
<HUAWEI> system-view
[HUAWEI] mmi-mode enable
3.3.15 parity
Function
The parity command sets the parity bit of a user interface.
The undo parity command disables the parity check.
By default, no parity check is configured.
Format
parity { even | none | odd }
undo parity
Parameters
Parameter Description Value
even Specifies even parity check. -
none Specifies no parity check. -
odd Specifies odd parity check. -
Views
User interface view
Default Level
3: Management level
Usage Guidelines
This function takes effect for only serial interfaces.
Example
# Set the transmission parity bit on the console interface to odd parity.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] parity odd
If Telnet is enabled on a device before it is upgraded, Telnet and SSH are enabled by default
after the device is upgraded.
Format
protocol inbound { all | ssh | telnet }
Parameters
Parameter Description Value
all Indicates that all protocols including SSH and Telnet are -
supported.
ssh Indicates that only SSH is supported. -
telnet Indicates that only Telnet is supported. -
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To manage and monitor login users, configure the VTY user interface for login
users and run the protocol inbound command to configure the protocols that the
VTY user interface supports.
Prerequisites
If SSH is configured for the user interface using the protocol inbound command,
you must configure the authentication-mode aaa authentication mode to ensure
successful logins. If the password authentication mode is configured, the protocol
inbound ssh command cannot be executed.
Precautions
● The configuration takes effect at the next login.
● When SSH is specified for the VTY user interface, the SSH server function is
enabled, and the RSA key is not configured, a user cannot log in to the SSH
server using SSH.
Example
# Configure SSH for user interfaces VTY0 to VTY4.
<HUAWEI> system-view
[HUAWEI] user-interface vty 0 4
[HUAWEI-ui-vty0-4] authentication-mode aaa
[HUAWEI-ui-vty0-4] protocol inbound ssh
3.3.17 screen-length
Function
The screen-length command sets the number of lines on each terminal screen
after you run a command.
The undo screen-length command restores the default configuration.
By default, the number of lines to be displayed on a terminal screen is 24.
Format
screen-length screen-length [ temporary ]
undo screen-length [ temporary ]
Parameters
Parameter Description Value
Views
User interface view, User view
Default Level
3: Management level (User interface view)
Usage Guidelines
If you run a command and its output is displayed in more lines than you can see
on one screen, you can reduce the number of lines displayed on each screen.
In general, you do not need to change the number of lines displayed on each
screen. Setting the number of lines to 0 is not recommended. The configuration
takes effect after you log in to the system again.
Example
# Set the number of lines on each screen of the terminal to 30.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] screen-length 30
3.3.18 screen-width
Function
The screen-width command sets the number of columns displayed on a terminal
screen.
Format
screen-width screen-width [ temporary ]
Parameters
Parameter Description Value
Views
Console user interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When logging in to a device using the terminal tool, you can run this command to
adjust the screen width on the device to the same as that specified by the
terminal tool to prevent garbled lines.
Precautions
The configured number of columns displayed on a terminal screen takes effect
only on users logging in through the console port but does not affect those
logging in through VTY or other interfaces.
If you run the screen-width command multiple times, only the latest configuration
takes effect.
Example
# Set the screen width to 100.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] screen-width 100
Format
set authentication password cipher
Parameters
Parameter Description Value
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run this command to change the password for users requiring password
authentication.
Pre-configuration Tasks
Password authentication has been configured for the user interface.
Precautions
● The password must meet the following requirements:
– The local user password is a string of 8 to 128 case-sensitive characters.
– The password must contain at least two of the following characters:
upper-case character, lower-case character, digit, and special character.
The special characters include spaces and the following: `~!@#$%^&*()-
_=+\|[{}];:'",<.>/?
● A password entered in interactive mode is not displayed on the screen. The
configuration file displays only the password encrypted using an irreversible
encryption algorithm.
● You can press CTRL_C to cancel the password setting in interaction mode.
● If a password in ciphertext is configured, enter a ciphertext password contains
68 characters but users must obtain the clear text password. When logging in
to the system, you must enter the password in clear text.
● If password authentication is configured but no password is configured, the
user cannot log in to the device.
● If the set authentication password command is executed multiple times, the
latest configuration overrides the previous ones. You can run this command to
change the local authentication password. After the password is changed, a
user who wants to log in to the device must enter the latest password for
login authentication.
Example
# Set a local authentication password for the user interfaces VTY 0-4.
<HUAWEI> system-view
[HUAWEI] user-interface vty 0 4
[HUAWEI-ui-vty0-4] set authentication password cipher
Info: A plain text password is a string of 8 to 128 case-sensitive characters and must be a combination of at
least two of the follo
wing: uppercase letters A to Z, lowercase letters a to z, digits, and special characters (including spaces and
the following :`~!@#$
%^&*()-_=+\|[{}];:'",<.>/?). A cipher text password contains 68 characters.
New Password:
Confirm New Password:
3.3.20 shell
Function
The shell command enables terminal services on a user interface.
The undo shell command disables terminal services on a user interface.
By default, terminal services are enabled on all user interfaces.
Format
shell
undo shell
Parameters
None
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To log in to a device through a console, or Virtual Type Terminal (VTY), you can
use the shell command to enable terminal services on the user interface.
Otherwise, you will fail in logging in to the device through the user interface.
To configure or maintain the parameters of a user interface, the undo shell
command can be used to disable terminal services on the user interface. During
this period, you cannot log in to the device using the interface. After completing
the configuration for the parameters of the user interface, the shell command
must be used to enable terminal services on the user interface. Otherwise,
authorized users may fail to log in to the device through the interface.
Implementation Procedure
When the undo shell command is executed, determine whether to disable
terminal services on the user interface when the system displays a message like
Warning: ui-vty0-4 will be disabled. Continue? [Y/N]:. Users may fail to log in
to the device through the port after the terminal services are disabled. Exercise
caution before disabling terminal interfaces on a user interface.
Precautions
After the undo shell command is executed in the VTY user interface view to
disable terminal services on the VTY user interface, users cannot log in to the
device using Telnet, Stelnet, and SFTP through the VTY user interface.
The undo shell command cannot be used in the interface view through which the
user logs in.
The console user interface does not support this command.
Example
# Disable terminal services on VTY 0 to VTY 4.
<HUAWEI> system-view
[HUAWEI] user-interface vty 0 4
[HUAWEI-ui-vty0-4] undo shell
Warning: ui-vty0-4 will be disabled. Continue? [Y/N]:y
Format
speed speed-value
undo speed
Parameters
Parameter Description Value
speed-value Specifies the data The value is expressed in bit/s.
transfer rate of a
user interface. The asynchronous serial interface supports the
following data transfer rates:
● 600 bit/s
● 1200 bit/s
● 4800 bit/s
● 9600 bit/s
● 19200 bit/s
● 38400 bit/s
● 57600 bit/s
● 115200 bit/s
NOTE
The console user interface does not support 600 bit/s
and 1200 bit/s.
Views
User interface view
Default Level
3: Management level
Usage Guidelines
This function takes effect for only serial interfaces.
Example
# Set the data transfer rate of a user interface to 115200 bit/s.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] speed 115200
3.3.22 stopbits
Function
The stopbits command sets the stop bit of a user interface.
The undo stopbits command restores the default stop bit of a user interface.
Format
stopbits { 1.5 | 1 | 2 }
undo stopbits
Parameters
Parameter Description Value
1.5 Sets the stop bit to 1.5. -
1 Sets the stop bit to 1. -
2 Sets the stop bit to 2. -
Views
User interface view
Default Level
3: Management level
Usage Guidelines
If the stop bit is 1, the corresponding data bit is 7 or 8.
NOTE
On the console user interface, the stop bit 1.5 is not supported.
Example
# Set the stop bit of a user interface to 2.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0] stopbits 2
The undo user privilege command restores the default user level.
By default, users who log in to the device using the console interface are at level
15 and other users are at level 0.
Format
user privilege level level
Parameters
Parameter Description Value
level level Specifies the user level. The value is an integer ranging from 0 to
15.
Views
User interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The system manages users at levels to control their access permissions. Users who
log in to the device can use only commands at the same or lower level than their
own levels.
Commands are classified into the visit level, monitoring level, configuration level,
and management level that map levels 0, 1, 2, and 3, as listed in Table 3-10.
Precautions
Example
# Set the user level on the VTY0 user interface to 2.
<HUAWEI> system-view
[HUAWEI] user-interface vty 0
[HUAWEI-ui-vty0] user privilege level 2
# Log in to the device using STelnet and view detailed information about the VTY0
user interface.
<HUAWEI> display user-interface vty0
Idx Type Tx/Rx Modem Privi ActualPrivi Auth Int
+ 129 VTY 0 - 2 15 N -
+ : Current UI is active.
F : Current UI is active and work in async mode.
Idx : Absolute index of UIs.
Type : Type and relative index of UIs.
Privi: The privilege of UIs.
ActualPrivi: The actual privilege of user-interface.
Auth : The authentication mode of UIs.
A: Authenticate use AAA.
N: Current UI need not authentication.
P: Authenticate use current UI's password.
Int : The physical location of UIs.
Item Description
Item Description
3.3.24 user-interface
Function
The user-interface command displays one or multiple user interface views.
Format
user-interface [ ui-type ] first-ui-number [ last-ui-number ]
Parameters
Parameter Description Value
ui-type Specifies the type of a user interface. The value can be console
or vty.
● If the user interface is specified,
the relative number is used.
● If the user interface is not
specified, the absolute number is
used.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When the network administrator logs in to the device using the console interface,
Telnet, or SSH, the system manages and monitors the session between the user
and the device on the corresponding user interface. Each user interface
corresponds a user interface view. The network administrator can set parameters
such as authentication and user level to manage sessions in a unified manner.
Precautions
The user interface varies according to the login mode. The user interface views can
be numbered using absolute numbers or relative numbers. Table 3-12 describes
absolute and relative numbers of user interfaces.
NOTE
● The relative numbering uniquely specifies a user interface or a group of user interfaces
of the same type.
● The absolute numbering specifies a user interface or a group of user interfaces.
After you log in to the device, you can run the display user-interface command
to view the supported user interfaces and the corresponding relative and absolute
numbers.
Example
# Enter the Console 0 user interface.
<HUAWEI> system-view
[HUAWEI] user-interface console 0
[HUAWEI-ui-console0]
Function
The user-interface current command displays the current user interface view.
Format
user-interface current
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
To enter the current user interface view, run the display user-interface command
without the user interface number.
Example
# Enter the current user view.
<HUAWEI> system-view
[HUAWEI] user-interface current
[HUAWEI-ui-vty1]
Function
The user-interface maximum-vty command configures the maximum number of
login users.
Format
user-interface maximum-vty number
Parameters
Parameter Description Value
number Specifies the maximum number of The value is an integer ranging
Telnet and SSH users. from 0 to 15.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Example
# Set the maximum number of Telnet users to 7.
<HUAWEI> system-view
[HUAWEI] user-interface maximum-vty 7
Format
config lock
undo config lock
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To prevent other users from modifying or deleting configured data, you can run
the config lock command to lock the configuration management plane before
data configuration. After completing data configuration, run the undo config lock
command to unlock the configuration management plan so that other users can
perform data configuration.
Precautions
The locked system configuration can be unlocked by only the user who locks it,
the super administrator (run the user privilege command to set the user level to
15), or the network management system (NMS) user.
Example
# Lock the system configuration.
<HUAWEI> system-view
Enter system view, return user view with Ctrl+Z.
[HUAWEI] config lock
The system config is locked
Function
The config unlock interval command configures the interval for unlocking a
device.
Format
config unlock interval time
Parameters
Parameter Description Value
time Specifies the interval for The value is an integer ranging from
unlocking a device. 1 to 255, in minutes.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If the device configuration is clocked by the config lock command, other users
cannot modify the configuration. In this case, the config unlock interval
command can be used to configure the unlock interval, after which the device
configuration is unlocked automatically.
Precautions
This command can be used by only the super administrator (run the user
privilege command to set the user level to 15) and NMS user.
If you run the command multiple times, only the latest configuration takes effect.
The unlocking interval starts from the last time the current user configures the
system.
Example
# Set the unlock interval to 2 minutes.
<HUAWEI>system-view
[HUAWEI]config unlock interval 2
# The following message is displayed when the configured unlock interval arrives.
[HUAWEI]
The system config is unlocked
Function
The console ble-mode command configures the mode of Bluetooth-based
console port login.
The undo console ble-mode command restores the default mode of Bluetooth-
based console port login.
Format
Command format for Fat APs: console ble-mode { persistent | disable }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Set the mode of Bluetooth-based console port login to persistent.
<HUAWEI> system-view
[HUAWEI] console ble-mode persistent
Function
The display config lock command displays lock information about the system
configuration.
Format
display config lock
Parameters
None
Views
All views
Default Level
2: Configuration level
Usage Guidelines
The information includes whether the system configuration is locked and the lock
duration If you cannot configure the AP after login, run this command. The
command output helps you locate faults. If the system configuration is locked, the
command output includes the following: type, name, and IP address of the user
who locks the configuration. If no IP address is available, locked user IP address
is blank.
If the current system configuration is locks by a user (user A), only users at the
same level as or higher level than user A can query user A information. If users at
a lower level queries user A information, the system displays a message indicating
that the system configuration is locked by a user with a higher level.
Example
# Display lock information about the system configuration (when configuration is
not locked).
<HUAWEI> display config lock
------------------------------------------------------------------------------
automatically unlocked interval(minute): 5
locked state: unlocked
------------------------------------------------------------------------------
Item Description
Item Description
locked user type Type of the user who locks the system
configuration. The user can be any of
the following types: NMS user, serial
port user, Telnet user, and web user.
locked user name Name of the user who locks the system
configuration.
Function
The display console ble-mode command displays the mode of Bluetooth-based
console port login.
Format
display console ble-mode
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the mode of Bluetooth-based console port
login. To configure the mode of Bluetooth-based console port login, run the
console ble-mode command.
Example
# Display the mode of Bluetooth-based console port login.
<HUAWEI> display console ble-mode
Current ble console mode is persistent
Item Description
Format
display rsa local-key-pair public
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command on the client and configure the client public key in the
command output to the SSH server. This ensures that the SSH client validity check
by the SSH server is successful and enables the secure data exchange between the
SSH server and client.
Example
# Display information about public keys in the local key pair.
<HUAWEI> display rsa local-key-pair public
=====================================================
Key code:
3047
0240
D538B7FC 3AFE1F5B F6C921F9 3D8C5322
905F623A
F0123161 3DA61EEB F5E897CF DC126060
546CC84E
B2AB7424 3EFF5D71 D84C5FE2 3E2BF5B3
D82DD979
A22E4AA1
0203
010001
=====================================================
Key code:
3067
0260
C51C2C01 56B06E6C EBF9055C F7AD9781
46B41A31
5FC87282 E53CFE30 8E6321D3 AC74E948
0A010339
E67C290E 2E0E8E40 BF5E1C97 F9C856EF
568DC159
1A6D28ED AFFB474B 43EFB632 CFB0875F
85420EEA
1919095B A5BC38D0 5FFF169E
0BDB3DC3
0203
010001
Table 3-16 Description of the display rsa local-key-pair public command output
Item Description
Time of Key pair created Time and date when the public key was
created.
Format
display rsa peer-public-key [ brief | name key-name ]
Parameters
Parameter Description Value
brief Displays the brief information -
about all peer public keys.
name key-name Specifies the key name. The value is a string of 1 to 30
case-insensitive characters
without spaces.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to check detailed information about the RSA public key
and whether the local and peer public keys are the same.
Precautions
You must complete the RSA public key configuration before running this
command.
Example
# Display the brief information about all RSA public keys.
<HUAWEI> display rsa peer-public-key brief
Name Bits
-------------------------------------
rsakey001 780
Table 3-17 Description of the display rsa peer-public-key brief command output
Item Description
# Display the detailed information about the RSA public key named rsakey001.
<HUAWEI> display rsa peer-public-key name rsakey001
=====================================
Key name: rsakey001
=====================================
Key Code:
3067
0260
A3158E6C F252C039 135FFC45 F1E4BA9B 4AED2D88 D99B2463 3E42E13A 92A95A37
45CDF037 1AF1A910 AAE3601C 2EB70589 91AF1BB5 BD66E31A A9150911 859CAB0E
1E10548C D70D000C 55A1A217 F4EA2F06 E44BD438 DA472F14 3FB7087B 45E77C05
0203
010001
Table 3-18 Description of the display rsa peer-public-key name command output
Item Description
Format
display ssh server { status | session }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring the SSH attributes, you can run this command to view the
configuration or session connection information on the SSH server to verify that
the SSH connection has been established.
Example
# Display the global configuration on the SSH server.
<HUAWEI> display ssh server status
SSH version :2.0
SSH connection timeout :120 seconds
SSH server key generating interval :0 hours
SSH Authentication retries :3 times
SFTP Server :Enable
Stelnet server :Enable
Table 3-19 Description of the display ssh server status command output
Item Description
SSH server key generating Key update period of the SSH server.
interval To configure this parameter, run the ssh server
rekey-interval command.
Item Description
Table 3-20 Description of the display ssh server session command output
Item Description
Function
The display ssh user-information command displays the configuration of all SSH
users.
Format
display ssh user-information [ username ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays the SSH user name, bound RSA public key name, and
service type.
Example
# Display the configuration of all SSH users.
<HUAWEI> display ssh user-information
-------------------------------------------------------------------------------
Username Auth-type User-public-key-name
-------------------------------------------------------------------------------
a password null
-------------------------------------------------------------------------------
Item Description
Item Description
Format
display telnet server status
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
● You can run this command to check whether the device functions as a Telnet
server.
● You can run this command to check the listening port number of the Telnet
server if you have set the port number by running the telnet server port
port-number command.
Example
# Display the status and configuration of the Telnet server.
Table 3-22 Description of the display telnet server status command output
Item Description
Function
The display telnet-client command displays the source parameters when the
device works as a Telnet client.
Format
display telnet-client
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After setting source parameters of the Telnet client, you can run this command to
check the setting result. If you have not set telnet client-source, the default
source IP address is 0.0.0.0.
Example
# Display the source parameters for the device that works as a Telnet client.
<HUAWEI> display telnet-client
The source address of telnet client is 1.1.1.1
The source address of telnet client is The source IP address of the Telnet
1.1.1.1 client is 1.1.1.1.
Format
display ecc local-key-pair public
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the display ecc local-key-pair public command to check information
about the public key in the local ECC key pair on a client and then copy the public
key to the server. The public key enables a server to authenticate users and
ensures the login of authorized users.
Pre-configuration Tasks
You must run the ecc local-key-pair create command to generate a local ECC
host key pair before using the command.
Example
# Display information about the public key in the local ECC key pair on a client.
<HUAWEI> display ecc local-key-pair public
=====================================================
Time of Key pair created:2016-10-19 11:50:20+00:00
Key name : HUAWEI_Host_ECC
Key modulus : 521
Key type : ECC encryption Key
Key fingerprint:
=====================================================
Key code:
0401CE1E 5EF3B843 CD917648 1D70EF8F CECE8518 5B32ED5F 529E9DC4 D16EDF1A
5F6E6389 10AAE2D4 74FD9DA7 F05AB123 9AF3EE64 9F0BAF99 A0CBF55B E319B2D1
8EDEBB01 7C63469B C62A2256 3EAEA0BD 486F9524 8559C7EF 24D969D1 11093BBF
27F770E7 03E28ABA BB357E5B 28EF04CC EA931C81 C7D7EBD8 5797B1CD 05D9B497
56D91126 E9
Table 3-24 Description of the display ecc local-key-pair public command output
Item Description
Time of Key pair created Time when the public key in the local ECC
key pair is generated, in the format of
YYYY-MM-DD HH:MM:SS.
Host public key for PEM format PEM code of the public key in the local
code ECC key pair on a client.
Public key code for pasting into Public key in the local ECC key pair on a
OpenSSH authorized_keys file client that is used for OpenSSH
authorization. This information can be
used after being copied to the OpenSSH
authorized_keys file.
Format
display ecc peer-public-key [ brief | name key-name ]
Parameters
Parameter Description Value
brief Displays the brief information about -
the ECC public key configured on the
remote end.
name key-name Displays information about an ECC The value is a string of 1
public key with a specified name to 30 case-sensitive
configured on the remote end. characters, spaces not
supported.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the display ecc peer-public-key command on a client to check
information about the public key configured on the remote end. The public key
enables a server to authenticate users and ensures the login of authorized users.
Example
# Display the information about the ECC public keys of 127.0.0.1.
<HUAWEI> display ecc peer-public-key
=====================================
Key name: 127.0.0.1
Encoding type: DER
=====================================
Key Code:
04013184 A3311697 89DF558B 7F67BF9D BD95DBD5 280D659F 0E29852C AEC2FFBA
1913AC2A 88247ADA 46BEBEBE 1829C0DA 3BABC8FC 8F6EAD28 2AE2C6A8 116BAA3A
540E6B00 34E033D8 9D84841B 0D33DAD8 DEDD1C09 2B70B3DB 5AF0FCB2 37DF1C82
C4C622A6 85B23698 195DA60F 06858ADB DD743937 B4A29C4C FB28B40B BCEEE036
1DE61BD2 24
# Display the brief information about all the ECC public keys.
<HUAWEI> display ecc peer-public-key brief
Bits Name
----------------------
521 127.0.0.1
384 10.54.131.203
Format
display wlan ble-link-info
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check connection information about the Bluetooth-
based air interface on an AP.
Example
# Display connection information about the Bluetooth-based air interface on an
AP.
<HUAWEI> display wlan ble-link-info
Info: This operation may take a few seconds. Please wait for a moment.done.
-------------------------------------------------------------------------------------
BLE access MAC : xxxx-xxxx-xxxx
Status : paired
Link status changed time : 2019-04-11 09:12:46
-------------------------------------------------------------------------------------
Format
ecc local-key-pair create
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
A local key pair is a prerequisite to a successful SSH login. Compared with the RSA
algorithm used by the rsa local-key-pair create command, the ECC algorithm
shortens the key length, accelerates the encryption, and improves the security. The
length of the server key pair and the host key pair can be 256 bits, 384 bits and
521 bits. By default, the length of the key pair is 521 bits.
Follow-up Procedure
Perform other SSH configurations.
Precautions
● The generated ECC host key pair is named in the format of wireless access
point name_Host_ECC, such as HUAWEI_Host_ECC. The local DSA private key
is saved in PKCS#8 format to the hostkey_ecc file.
● The ecc local-key-pair create and ecc local-key-pair destroy commands are
not saved in the configuration file. They only need to be run once and take
effect even after the wireless access point restarts.
● Do not delete the ECC key file from the wireless access point. If the ECC key
file is deleted, the ECC key pair cannot be restored after the wireless access
point is restarted.
Example
# Generate a local ECC host key pair.
<HUAWEI> system-view
[HUAWEI] ecc local-key-pair create
Info: The key name will be: HUAWEI_Host_ECC.
Info: The ECC host key named HUAWEI_Host_ECC already exists.
Warning: Do you want to replace it ? [Y/N]: Y
Info: The key modulus can be any one of the following : 256, 384, 521.
Info: If the key modulus is greater than 512, it may take a few minutes.
Please input the modulus [default=521]:521
# Enter an incorrect key length and re-enters the key length for a maximum
number of retry attempts.
<HUAWEI> system-view
[HUAWEI] ecc local-key-pair create
Info: The key name will be: HUAWEI_Host_ECC.
Info: The ECC host key named HUAWEI_Host_ECC already exists.
Warning: Do you want to replace it ?[Y/N]: Y
Info: The key modulus can be any one of the following : 256, 384, 521.
Info: If the key modulus is greater than 512, it may take a few minutes.
Please input the modulus [default=521]:123
Error: Invalid ECC key modulus.
Please input the modulus [default=521]:1024
Error: Invalid ECC key modulus.
Please input the modulus [default=521]:512
Error: Invalid ECC key modulus.
Please input the modulus [default=521]:2048
Error: Invalid ECC key modulus.
Please input the modulus [default=521]:4096
Error: Invalid ECC key modulus.
Error: The maximum number of retries has reached, and the command has already been canceled.
Format
ecc local-key-pair destroy
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If you no longer need the local ECC key pairs, run the ecc local-key-pair destroy
command to delete them.
Configuration Impact
After the ecc local-key-pair destroy command is run, the ECC key files on the
master and slave main control boards are cleared. Exercise caution when running
the command.
Precautions
● The ecc local-key-pair create and ecc local-key-pair destroy commands are
not saved in the configuration file. They only need to be run once and take
effect even after the wireless access point restarts.
● Do not delete the ECC key file from the wireless access point. If the ECC key
file is deleted, the ECC key pair cannot be restored after the wireless access
point is restarted.
Example
# Delete the local ECC host key pair and server key pair.
<HUAWEI> system-view
[HUAWEI] ecc local-key-pair destroy
Info: The name of the key which will be destroyed is HUAWEI_Host_ECC.
Warning: These keys will be destroyed. Continue? [Y/N]:Y
Info: Succeeded in destroying the ECC host keys.
Function
The ecc peer-public-key command creates an ECC public key and enters the
Elliptic Curves Cryptography (ECC) public key view.
Format
ecc peer-public-key key-name encoding-type { der | openssh | pem }
Parameters
Parameter Description Value
key-name Specifies an ECC public key name. The value is a
string of 1 to 64
case-sensitive
characters, spaces
not supported.
encoding- Indicates the encoding type of an ECC public -
type key.
der Specifies DER as the encoding type of an -
ECC public key.
If DER is specified, data is encoded in
hexadecimal notation.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When ECC public key authentication is used, a client's public key must be specified
on the server for an SSH user. When the client logs in to the server, the server
performs authentication on the client based on the public key of the SSH user.
After an ECC public key is created and the ECC public key view is displayed, run
the public-key-code begin command, then you can manually copy the client's
public key to the server.
If an ECC public key has been assigned to an SSH client, delete the binding
between the public key and the SSH client before deleting the ECC public key.
Otherwise, the undo dsa peer-public-key command will fail to delete the ECC
public key.
Follow-up Procedure
After copying the client's ECC public key to the server, run the following
commands to quit the ECC public key view:
1. Run the public-key-code end command to return to the ECC public key view.
2. Run the peer-public-key end command to quit the ECC public key view and
return to the system view.
Precautions
Example
# Create an ECC public key and enter the ECC public key view.
<HUAWEI> system-view
[HUAWEI] ecc peer-public-key ecc-peer-key encoding-type pem
Info: Enter (ECC public key) view, return system view with (peer-public-key end).
[HUAWEI-ecc-public-key] public-key-code begin
Info: Enter (ECC key code) view, return the last view with (public-key-code end).
[HUAWEI-ecc-key-code] ---- BEGIN SSH2 PUBLIC KEY ----
[HUAWEI-ecc-key-code]
AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACDBL5J4v3pqi5S
[HUAWEI-ecc-key-code] ALI9lvLw4cdvtpD2AC6sEJXg9GDCD5vGBnkXlKmnOy6d1TyrXx57ZPNnrSdqVkHC
[HUAWEI-ecc-key-code] sMBa63vSwg1XsVW2qZgx8H57+FJiTPY61b1Vfst9GUif1ymfpB7XrbdYZDownoh0
[HUAWEI-ecc-key-code] FZNadZtIf2CRc0OeiKXbCSPP25dfoT/DTcc=
[HUAWEI-ecc-key-code] ---- END SSH2 PUBLIC KEY ----
[HUAWEI-ecc-key-code] public-key-code end
[HUAWEI-ecc-public-key] peer-public-key end
3.4.18 lock
Function
The lock command locks the current user interface to prevent unauthorized users
from operating the interface.
By default, the system does not automatically lock the current user interface.
Format
lock
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Lock the current user interface using this command to prevent other users from
operating the interface. The user interfaces consist of console ports, and Virtual
Type Terminals (VTYs).
After using the lock command, you are prompted to input the password twice. If
you input the correct password for twice, the user interface is locked.
Precautions
● The passwords must meet the following requirements:
– The password is a string of 8 to 128 case-sensitive characters.
– The password must contain at least two of the following characters:
upper-case character, lower-case character, digit, and special character.
The special characters include spaces and the following:
`~!@#$%^&*()-_=+\|[{}];:'",<.>/?
● Password entered in interactive mode is not displayed on the screen.
● When you run the lock command to lock the user interface and set a locking
password, you can press CTRL_C to cancel the operation.
● To unlock the user interface, press Enter, and then input the correct password
as prompted by the system.
Example
# Lock the current user interface after logging in through the console port.
<HUAWEI> lock
Info: A plain text password is a string of 8 to 128 case-sensitive characters and must be a combination of at
least two of the follow
ing: uppercase letters A to Z, lowercase letters a to z, digits, and special characters (including spaces and
the following :`~!@#$%
^&*()-_=+|[{}];:'",<.>/?).
Enter Password:
Confirm Password:
Info: The terminal is locked.
# To log in to the system after the system is locked, you must press Enter. The
following information is displayed:
Enter Password:
Format
matched upper-view
undo matched upper-view
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When you run the undo command in a view, which is not registered in the current
view, the system searches for the command in the upper view if the system is
allowed to search for the undo command in the upper view. If the system finds
the same undo command, the system executes this command in the upper view. If
the system does not find the same undo command in the upper view, the system
continues to search for this command in other upper views till the system view.
Running this command brings security risks. For example, if you run the undo
ospf command in the interface view, while this command is not registered in the
interface view, the system automatically searches for it in the upper view, that is,
the system view. In this manner, the system disables the OSPF feature globally.
The matched upper-view command is valid only for current login users who run
this command.
Example
# Allow the undo command to be searched for in the upper view.
<HUAWEI> system-view
[HUAWEI] matched upper-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo ftp server
Info: Succeeded in closing the FTP server.
[HUAWEI]
# Prohibit the undo command from being searched for in the upper view.
<HUAWEI> system-view
[HUAWEI] undo matched upper-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo ftp server
^
Error: Unrecognized command found at '^' position.
[HUAWEI-GigabitEthernet0/0/1]
Function
The peer-public-key end command returns to the system view from the public
key view and saves the configured public keys.
Format
peer-public-key end
Parameters
None
Views
Public key view
Default Level
3: Management level
Usage Guidelines
You must save the public key generated on the remote host to the local host,
which ensures that the validity check on the remote end is successful. After editing
a public key in the public key view, you can run this command to return to the
system view.
Example
# Return to the system view from the public key view.
<HUAWEI> system-view
[HUAWEI] rsa peer-public-key rsakey001
[HUAWEI-rsa-public-key] public-key-code begin
[HUAWEI-rsa-key-code] 308188
[HUAWEI-rsa-key-code] 028180
[HUAWEI-rsa-key-code] B21315DD 859AD7E4 A6D0D9B8 121F23F0 006BB1BB
[HUAWEI-rsa-key-code] A443130F 7CDB95D8 4A4AE2F3 D94A73D7 36FDFD5F
[HUAWEI-rsa-key-code] 411B8B73 3CDD494A 236F35AB 9BBFE19A 7336150B
[HUAWEI-rsa-key-code] 40A35DE6 2C6A82D7 5C5F2C36 67FBC275 2DF7E4C5
[HUAWEI-rsa-key-code] 1987178B 8C364D57 DD0AA24A A0C2F87F 474C7931
[HUAWEI-rsa-key-code] A9F7E8FE E0D5A1B5 092F7112 660BD153 7FB7D5B2
[HUAWEI-rsa-key-code] 171896FB 1FFC38CD
[HUAWEI-rsa-key-code] 0203
[HUAWEI-rsa-key-code] 010001
[HUAWEI-rsa-key-code] public-key-code end
[HUAWEI-rsa-public-key] peer-public-key end
[HUAWEI]
Format
public-key-code begin
Parameters
None
Views
Public key view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You must save the public key generated on the remote host to the local host,
which ensures that the validity check on the remote end is successful. Run the
public-key-code begin command to display the public key editing view, and enter
the key data. The key characters can contain spaces. You can press Enter to enter
data in another line.
Prerequisite
A key name has been specified by running the rsa peer-public-key command.
Precautions
● The public key must be a hexadecimal character string in the public key
encoding format, and generated by the client or server that supports SSH.
● The public keys displayed by running the display rsa local-key-pair public
command can be used as the key data to enter.
● You can successfully edit the public key in a public key pair by entering the
public key in the server key pair or client key pair. In SSH application, only the
public key in the client key pair can be entered as key data. If you enter the
public key in the server key pair, authentication fails during SSH login.
Example
# Display the public key editing view and enter the key data.
<HUAWEI> system-view
[HUAWEI] rsa peer-public-key rsakey001
[HUAWEI-rsa-public-key] public-key-code begin
[HUAWEI-rsa-key-code] 308188
[HUAWEI-rsa-key-code] 028180
[HUAWEI-rsa-key-code] B21315DD 859AD7E4 A6D0D9B8 121F23F0 006BB1BB
[HUAWEI-rsa-key-code] A443130F 7CDB95D8 4A4AE2F3 D94A73D7 36FDFD5F
[HUAWEI-rsa-key-code] 411B8B73 3CDD494A 236F35AB 9BBFE19A 7336150B
[HUAWEI-rsa-key-code] 40A35DE6 2C6A82D7 5C5F2C36 67FBC275 2DF7E4C5
[HUAWEI-rsa-key-code] 1987178B 8C364D57 DD0AA24A A0C2F87F 474C7931
[HUAWEI-rsa-key-code] A9F7E8FE E0D5A1B5 092F7112 660BD153 7FB7D5B2
[HUAWEI-rsa-key-code] 171896FB 1FFC38CD
[HUAWEI-rsa-key-code] 0203
[HUAWEI-rsa-key-code] 010001
[HUAWEI-rsa-key-code] public-key-code end
[HUAWEI-rsa-public-key] peer-public-key end
[HUAWEI]
Format
public-key-code end
Parameters
None
Views
Public key editing view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After this command is run, the process of editing the public key ends. Before
saving the public key, the system will check the validity of the key.
● If there are illegal characters in the public key character string configured by
the user, the system will display a relevant error prompt. The public key
previously configured by the user is discarded, thus the configuration fails.
● If the public key configured is valid, it is saved in the public key chain table of
the client.
Precautions
● Generally, in the public key view, only the public-key-code end command can
be used to exit. Thus, in this instance the quit command cannot be used.
● If the legal key coding is not input, the key cannot be generated after the
public-key-code end command is used. The system prompts that generating
the incorrect key fails.
● If the key is deleted in another window, the system prompts that the key does
not exist and returns to the system view directly after you run the public-key-
code end command.
Example
# Exit from the RSA public key editing view and saves the RSA key configuration.
<HUAWEI> system-view
[HUAWEI] rsa peer-public-key rsakey001
[HUAWEI-rsa-public-key] public-key-code begin
[HUAWEI-rsa-key-code] 308188
[HUAWEI-rsa-key-code] 028180
[HUAWEI-rsa-key-code] B21315DD 859AD7E4 A6D0D9B8 121F23F0 006BB1BB
[HUAWEI-rsa-key-code] A443130F 7CDB95D8 4A4AE2F3 D94A73D7 36FDFD5F
[HUAWEI-rsa-key-code] 411B8B73 3CDD494A 236F35AB 9BBFE19A 7336150B
[HUAWEI-rsa-key-code] 40A35DE6 2C6A82D7 5C5F2C36 67FBC275 2DF7E4C5
[HUAWEI-rsa-key-code] 1987178B 8C364D57 DD0AA24A A0C2F87F 474C7931
[HUAWEI-rsa-key-code] A9F7E8FE E0D5A1B5 092F7112 660BD153 7FB7D5B2
[HUAWEI-rsa-key-code] 171896FB 1FFC38CD
[HUAWEI-rsa-key-code] 0203
[HUAWEI-rsa-key-code] 010001
[HUAWEI-rsa-key-code] public-key-code end
[HUAWEI-rsa-public-key] peer-public-key end
[HUAWEI]
Format
rsa local-key-pair create
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To implement secure data exchange between the server and client, run this
command to generate a local key pair.
Precautions
If the RSA key pair exists, the system prompts you to confirm whether to replace
the original key pair.
After you run this command, the system prompts you to enter the number of
digits in the host key. The difference between the bits in the server and host key
pairs must be at least 128 bits. The minimum length of the server key pair and
host key pair is 512 bits, the maximum length is 2048 bits, and the default length
is 2048 bits.
NOTE
An RSA key pair with less than 1024 bits is insecure and not recommended.
The premise to log in to the SSH server successfully is to configure and generate a
local RSA key pair. Before performing other SSH configurations, you must use the
rsa local-key-pair create command to generate the local key pair.
After you run this command, the generated key pair is saved on the device and
will not be lost after the device restarts.
Example
# Configure a device to generate the local host and server key pairs.
<HUAWEI> system-view
[HUAWEI] rsa local-key-pair create
The key name will be: Host
The range of public key size is (512 ~ 2048).
NOTES: If the key modulus is greater than 512,
It will take a few minutes.
Input the bits in the modulus[default = 2048]:3072
Generating keys...
......................++++++++
........................................................++++++++
........+++++++++
.....+++++++++
Function
The rsa local-key-pair destroy command deletes all local RSA keys, including the
host and server key pairs.
Format
rsa local-key-pair destroy
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To delete local key pairs, run the rsa local-key-pair destroy command. If the host
and server key pairs of an SSH server are deleted, run the rsa local-key-pair
create command to create a host key pair and server key pair for the SSH server.
After you run this command, verify that all local RSA keys are deleted. The
command configuration takes effect only once and is not saved into the
configuration file.
Prerequisites
The local RSA keys that can be deleted exist.
Example
# Delete all RSA server keys.
<HUAWEI> system-view
[HUAWEI] rsa local-key-pair destroy
The name for the keys which will be destroyed is Host.
Confirm to destroy these keys? (y/n)[n]:y
Format
rsa peer-public-key key-name [ encoding-type { der | openssh | pem } ]
undo rsa peer-public-key key-name
Parameters
Parameter Description Value
key-name Specifies the rsa public key name. The value is a string
of 1 to 30 case-
insensitive
characters without
spaces.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When you use an RSA public key for authentication, you must specify the public
key of the corresponding client for an SSH user on the server. When the client logs
in to the server, the server uses the specified public key to authenticate the client.
You can also save the public key generated on the server to the client. Then the
client can be successfully authenticated by the server when it logs in to the server
for the first time.
Third-party software, such as PuTTY, OpenSSH, and OpenSSL, can be used to
generate RSA keys in different formats. The details are as follows:
● The PuTTY generates RSA keys in PEM format.
● The OpenSSH generates RSA keys in OpenSSH format.
● The OpenSSL generates RSA keys in DER format.
After you configure an encoding format for an RSA public key, the device
automatically generates an RSA public key in the configured encoding format and
enters the RSA public key view. Then you can run the public-key-code begin
command and manually copy the RSA public key generated on the peer device to
the local device.
Prerequisite
The rsa public key in hexadecimal notation on the remote host has been obtained
and recorded.
Follow-up Procedure
After you copy the RSA public key generated on the peer device to the local
device, perform the following operations to exit the RSA public key view:
1. Run the public-key-code end command to return to the RSA public key view.
2. Run the peer-public-key end command to exit the RSA public key view and
return to the system view.
Precautions
If an RSA public key has assigned to an SSH client, release the binding relationship
between the public key and the SSH client. If you do not release the binding
relationship between them, the undo rsa peer-public-key command will fail to
delete the RSA public key.
Example
# Display the rsa public key view.
<HUAWEI> system-view
[HUAWEI] rsa peer-public-key rsakey001
[HUAWEI-rsa-public-key]
# Configure an encoding format for an RSA public key and enter the RSA public
key view.
<HUAWEI> system-view
[HUAWEI] rsa peer-public-key RsaKey001 encoding-type openssh
[HUAWEI-rsa-public-key]
Function
The ssh client assign command specifies the host public key of an SSH server on
an SSH client.
The undo ssh client assign command cancels the specified host public key of an
SSH server on the SSH client.
Format
ssh client servername assign { rsa-key | ecc-key } keyname
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If an SSH client connects to an SSH server for the first time and first
authentication is not enabled on the SSH client using the ssh client first-time
enable command, the SSH client must determine whether the server is reliable. To
do so, run the ssh client assign command to specify the host public key of the
SSH server and the mapping between the key and SSH server on the SSH client.
The client then uses the correct public key to determine whether the server is
reliable based on the mapping.
Precautions
Ensure that the RSA or ECC public key to be assigned to an SSH server has been
configured on the SSH client using the rsa peer-public-key or ecc peer-public-
key command. If the key is not configured, the verification for the RSA or ECC
public key of the SSH server on the SSH client fails.
Example
# Assign an ECC public key to the SSH server.
<HUAWEI> system-view
[HUAWEI] ssh client 10.164.39.120 assign ecc-key sshecckey01
Format
ssh client first-time enable
undo ssh client first-time enable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When the SSH client accesses the SSH server for the first time and the public key
of the SSH server is not configured on the SSH client, you can enable the first
authentication for the SSH client to access the SSH server and save the public key
on the SSH client. When the SSH client accesses the SSH server next time, the
saved public key is used to authenticate the SSH server.
Precautions
You can run the ssh client assign command to pre-assign the RSA public key to
the SSH server. In this manner, you can log in to the SSH server successfully at the
first time.
Example
# Enable the first authentication on the SSH client.
<HUAWEI> system-view
[HUAWEI] ssh client first-time enable
Format
ssh client key-exchange { dh_group_exchange_sha1 | dh_group14_sha1 } *
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The client and server negotiate the key exchange algorithm used for packet
transmission. You can run the ssh client key-exchange command to configure a
key exchange algorithm list on the SSH client. The SSH server compares the
configured key exchange algorithm list with the counterpart sent by the client and
then selects the first matched key exchange algorithm for packet transmission. If
the key exchange algorithm list sent by the client does not match any algorithm in
the key exchange algorithm list configured on the server, the negotiation fails.
Precautions
The following key exchange algorithms are listed in descending order of security
level: dh_group_exchange_sha1 > dh_group14_sha1. It is recommended that the
dh_group_exchange_sha1 be used.
Example
# Configure a key exchange algorithm list to contain dh_group_exchange_sha1
and dh_group14_sha1 for the SSH client.
<HUAWEI> system-view
[HUAWEI] ssh client key-exchange dh_group_exchange_sha1 dh_group14_sha1
Function
The ssh client secure-algorithms hmac command configures an HMAC algorithm
list for an SSH client.
The undo ssh client secure-algorithms hmac command restores the default
HMAC algorithm list of an SSH client.
Format
ssh client secure-algorithms hmac { sha2_256 } *
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
An SSH server and a client need to negotiate an HMAC algorithm for the packets
exchanged between them. You can run the ssh client secure-algorithms hmac
command to configure an HMAC algorithm list for the SSH client. After the list is
configured, the server matches the list of a client against the local list after
receiving a packet from the client and selects the first HMAC algorithm that
matches the local list. If no HMAC algorithms in the list of the client match the
local list, the negotiation fails.
Precautions
Example
# Configure the HMAC SHA2_256 algorithm for an SSH client.
<HUAWEI> system-view
[HUAWEI] ssh client secure-algorithms hmac sha2_256
Function
The ssh client secure-algorithms cipher command configures an encryption
algorithm list for an SSH client.
The undo ssh client secure-algorithms cipher command restores the default
encryption algorithm list of an SSH client.
Format
ssh client secure-algorithms cipher { aes128_ctr | aes256_ctr } *
Parameters
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
An SSH server and a client need to negotiate an encryption algorithm for the
packets exchanged between them. You can run the ssh client secure-algorithms
cipher command to configure an encryption algorithm list for the SSH client. After
the list is configured, the server matches the encryption algorithm list of a client
against the local list after receiving a packet from the client and selects the first
encryption algorithm that matches the local list. If no encryption algorithms in the
list of the client match the local list, the negotiation fails.
Precautions
Example
# Configure CTR encryption algorithms for an SSH client.
<HUAWEI> system-view
[HUAWEI] ssh client secure-algorithms cipher aes128_ctr aes256_ctr
Format
ssh server authentication-retries times
undo ssh server authentication-retries
Parameters
Parameter Description Value
times Specifies the maximum number of The value is an integer that
authentication retries for an SSH ranges from 1 to 5.
connection.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run this command to configure the maximum number of authentication
retries for an SSH connection, which prevents server overload due to malicious
access.
Precautions
The configured number of retries takes effect upon the next login.
The total number of RSA and password authentication retries on the SSH client
cannot exceed the maximum number that is set using this command.
Example
# Set the maximum number of times for retrying login authentication to 4.
<HUAWEI> system-view
[HUAWEI] ssh server authentication-retries 4
Format
ssh server key-exchange { dh_group_exchange_sha1 | dh_group14_sha1 } *
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
An SSH server and a client need to negotiate a key exchange algorithm for the
packets exchanged between them. You can run the ssh server key-exchange
command to configure a key exchange algorithm list for the SSH server. After the
list is configured, the server matches the key exchange algorithm list of a client
against the local list after receiving a packet from the client and selects the first
key exchange algorithm that matches the local list. If no key exchange algorithms
in the list of the client match the local list, the negotiation fails.
Precautions
The following key exchange algorithms are listed in descending order of security
level: dh_group_exchange_sha1 > dh_group14_sha1. It is recommended that the
dh_group_exchange_sha1 be used.
Example
# Configure a key exchange algorithm list to contain dh_group_exchange_sha1
and dh_group14_sha1 for the SSH server.
<HUAWEI> system-view
[HUAWEI] ssh server key-exchange dh_group_exchange_sha1 dh_group14_sha1
Function
The ssh server permit interface command specifies physical interfaces on the
SSH server to which clients can connect.
The undo ssh server permit interface command restores the default physical
interfaces on the SSH server to which clients can connect.
By default, clients can connect to all the physical interfaces on the SSH server.
Format
ssh server permit interface { interface-type interface-number } &<1-5>
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
● By default, clients can connect to all the physical interfaces on the SSH server.
Once a physical interface is specified using the ssh server permit interface
command, a client cannot connect to the SSH server using other physical
interfaces (excluding MEth interfaces).
● This command can be used only on a Layer 2 physical interface but not on a
Layer 3 physical interface, logical interface, or a non-Ethernet interface.
● A physical interface specified using this command cannot be added to an Eth-
Trunk. If it is added to an Eth-Trunk, a client cannot connect to the SSH server
through this physical interface.
Example
# Specify physical interfaces on the SSH server to which clients can connect.
<HUAWEI> system-view
[HUAWEI] ssh server permit interface gigabitethernet 0/0/1
Info: Succeeded in setting ssh permit interface.
# Restore the default physical interfaces on the SSH server to which clients can
connect.
<HUAWEI> system-view
[HUAWEI] undo ssh server permit interface
Function
The ssh server port command changes the listening port number of the SSH
server.
The undo ssh server port command restores the default listening port number of
the SSH server.
Format
ssh server port port-number
Parameters
Parameter Description Value
port-number Specifies the listening port The value is 22 or an integer
number of the SSH server. ranging from 1025 to 55535.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Configure the listening port number of the SSH server to prevent from malicious
access to the SSH service standard port and ensure security.
Precautions
The SSH client can log in successfully with no port specified only when the server
is listening on port 22. If the server is listening on another port, the port number
must be specified upon login.
Before changing the current port number, disconnect all devices from the port.
After the port number is changed, the server starts to listen on the new port.
Example
# Set the listening port number of the SSH server is 1025.
<HUAWEI> system-view
[HUAWEI] ssh server port 1025
Format
ssh server rekey-interval hours
undo ssh server rekey-interval
Parameters
Parameter Description Value
hours Specifies the interval for The value is an integer that ranges
updating the server key pair. from 1 to 24, in hours.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If the server key pair is not updated for a long time, the key is easy to decrypt and
the server is insecure. After the interval for updating the SSH server key pair is set
using this command, the system will automatically update the key pair at
intervals.
Precautions
If the client is connected to the server, the server public key on the client is not
updated immediately. This key is updated only when the client is reconnected to
the server.
Example
# Set the interval for updating the SSH server key pair to 2 hours.
<HUAWEI> system-view
[HUAWEI] ssh server rekey-interval 2
Format
ssh server secure-algorithms hmac { sha2_256 } *
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
An SSH server and a client need to negotiate an HMAC algorithm for the packets
exchanged between them. You can run the ssh server secure-algorithms hmac
command to configure an HMAC algorithm list for the SSH server. After the list is
configured, the server matches the list of a client against the local list after
receiving a packet from the client and selects the first HMAC algorithm that
matches the local list. If no HMAC algorithms in the list of the client match the
local list, the negotiation fails.
Precautions
Example
# Configure the HMAC SHA2_256 algorithm for an SSH server.
<HUAWEI> system-view
[HUAWEI] ssh server secure-algorithms hmac sha2_256
Format
ssh server secure-algorithms cipher { aes128_ctr | aes256_ctr } *
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
An SSH server and a client need to negotiate an encryption algorithm for the
packets exchanged between them. You can run the ssh server secure-algorithms
cipher command to configure an encryption algorithm list for the SSH server.
After the list is configured, the server matches the encryption algorithm list of a
client against the local list after receiving a packet from the client and selects the
first encryption algorithm that matches the local list. If no encryption algorithms
in the list of the client match the local list, the negotiation fails.
Precautions
Example
# Configure CTR encryption algorithms for an SSH server.
<HUAWEI> system-view
[HUAWEI] ssh server secure-algorithms cipher aes256_ctr aes128_ctr
Function
The ssh server timeout command sets the timeout interval for SSH connection
authentication.
The undo ssh server timeout restores the default timeout interval for SSH
connection authentication.
Format
ssh server timeout seconds
Parameters
Parameter Description Value
seconds Specifies the timeout interval for The value is an integer ranging
SSH connection authentication. from 60 to 120, in seconds.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If you have not logged in successfully at the timeout interval for SSH connection
authentication, the current connection is terminated to ensure security. You can
run the display ssh server command to query the current timeout interval.
Precautions
The setting for the timeout interval takes effect upon next login.
Example
# Set the SSH connection authentication timeout interval to 90 seconds.
<HUAWEI> system-view
[HUAWEI] ssh server timeout 90
Function
The ssh user assign command assigns an existing public key to a user.
The undo ssh user assign command deletes the mapping between a user and a
public key.
Format
ssh user user-name assign { rsa-key | ecc-key } key-name
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When an SSH client needs to log in to the SSH server in RSA or ECC mode, run
this command to assign a public key to the client. If the client has been assigned
keys, the latest assigned key takes effect.
Precautions
The newly configured public key takes effect upon next login.
When a public key is assigned to an SSH user but user-name does not exist, an
SSH user named user-name is created. The authentication type of the new SSH
user is the configured one.
Example
# Assign key1 to the user john.
<HUAWEI> system-view
[HUAWEI] ssh user john assign ecc-key key1
Format
ssh user user-name authentication-type { password | rsa | password-rsa | ecc |
password-ecc | all }
undo ssh user user-name authentication-type
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
A new SSH user cannot log in to the SSH server unless being configured with an
authentication mode. The newly configured authentication mode takes effect
upon next login.
When an authentication type is configured for an SSH user but user-name does
not exist, an SSH user named user-name is created. The authentication type of the
new SSH user is the configured one.
NOTE
Precautions
A new SSH user cannot log in to the SSH server unless being configured with an
authentication mode. The newly configured authentication mode takes effect
upon next login.
Only one login user can be created on an AP. Therefore, user-name must be set to
the name of the current login user.
Example
# Configure password authentication for the SSH user john.
3.4.41 stelnet
Function
The stelnet command enables you to use the STelnet protocol to log in to another
device from the current device.
Format
stelnet [ -a source-address ] host-ip [ port-number ] [ [ identity-key { rsa |
ecc } ] | [ user-identity-key { rsa | ecc } ] | [ prefer_kex prefer_key-exchange ] |
[ prefer_ctos_cipher prefer_ctos_cipher ] | [ prefer_stoc_cipher
prefer_stoc_cipher ] | [ prefer_ctos_hmac prefer_ctos_hmac ] | [ prefer_stoc_hmac
prefer_stoc_hmac ] ] * [ -ki aliveinterval [ -kc alivecountmax ] ]
Parameters
-ki aliveinterval Specifies the interval for The value is an integer that
sending keepalive packets ranges from 1 to 3600, in
when no packet is seconds.
received.
Views
System view
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
Logins through Telnet bring security risks because Telnet does not provide any
authentication mechanism and data is transmitted using TCP in plain text.
Compared with Telnet, SSH guarantees secure file transfer on a traditional
insecure network by authenticating clients and encrypting data in bidirectional
mode. The SSH protocol supports STelnet. You can run this command to use
STelnet to log in to another device from the current device.
STelnet is a secure Telnet service. SSH users can use the STelnet service in the
same way as the Telnet service.
When a fault occurs in the connection between the client and server, the client
needs to detect the fault in real time and proactively release the connection. You
need to set the interval for sending keepalive packets and the maximum number
of times on the client that logs in to the server through STelnet.
● Interval for sending keepalive packets: If a client does not receive any packet
within the specified interval, the client sends a keepalive packet to the server.
Example
# Set keepalive parameters when the client logs in to the server through STelnet.
<HUAWEI> system-view
[HUAWEI] stelnet 10.164.39.209 -ki 10 -kc 4
Format
stelnet ap { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run this command to log in to a Fit AP through STelnet on the AP. You
only need to specify the AP's name or ID but does not need to enter its IP address.
Prerequisites
First-time authentication has been enabled on the SSH client using the ssh client
first-time enable command on the AP.
Example
# Log in to a Fit AP through STelnet by specifying the name of the Fit AP on the
AP.
<HUAWEI> system-view
[HUAWEI] stelnet ap ap-name area_1
Trying 192.168.109.253 ...
Press CTRL+K to abort
Connected to 192.168.109.253 ...
The server is not authenticated. Continue to access it? (y/n)[n]:y
Save the server's public key? (y/n)[n]:y
The server's public key will be saved with the name 192.168.109.253. Please wait...
Function
The stelnet server enable command enables the STelnet service on the SSH
server.
The undo stelnet server enable command disables the STelnet service on the
SSH server.
Format
stelnet server enable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To connect a client to the SSH server through STelnet, you must enable the
STelnet service on the SSH server.
Precautions
After you disable the STelnet service on the SSH server, all clients that have logged
in through STelnet are disconnected.
Example
# Enable the STelnet service.
<HUAWEI> system-view
[HUAWEI] stelnet server enable
3.4.44 telnet
Function
The telnet command enables you to use the Telnet protocol to log in to another
device from the current device.
Format
# Log in to another device through Telnet based on IPv4.
Parameters
port-number Specifies the number of the TCP port The value is an integer
that is used by the remote device to that ranges from 1 to
provide the Telnet service. 65535. The default
value is 23.
Views
User view
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
If one or multiple devices on the network need to be configured and managed,
you do not need to connect each device to your terminal for local maintenance. If
you have learned the IP address of the device, you can run this command to log in
to the device from your terminal for remote device configuration. By doing this,
you can use one terminal to maintain multiple devices on the network.
You can press Ctrl_K to terminate an active connection between the local and
remote devices.
Precautions
● Before you run the telnet command to connect to the Telnet server, the
Telnet client and server must be able to communicate through Layer 3 and
the Telnet service must be enabled on the Telnet server.
● Logins through Telnet bring security risks because Telnet does not provide any
authentication mechanism and data is transmitted using TCP in plain text.
The STelnet mode is recommended for the network that has the high security
requirement.
Example
# Connect to a remote device through Telnet.
<HUAWEI> telnet 10.1.1.1
Format
telnet client-source { -a source-ip-address | -i interface-type interface-number }
undo telnet client-source
Parameters
Parameter Description Value
-a source-ip-address Specifies the IPv4 address of the local -
wireless access point.
-i interface-type interface- Specifies the outbound interface of the -
number local wireless access point.
Views
System view
Default Level
3: Management level
Usage Guidelines
If the source IP address and interface are not specified in the telnet command,
use the default settings specified by telnet client-source. If the source IP address
and interface are specified in the telnet command, use the specified settings.
Check the current Telnet connection on the server. The IP address displayed is the
specified source IP address or the primary IP address of the specified interface.
Example
# Set the source IP address of the Telnet client to 1.1.1.1.
<HUAWEI> system-view
[HUAWEI] telnet client-source -a 1.1.1.1
Format
telnet server permit interface { interface-type interface-number } &<1-5>
Parameters
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
● By default, clients can connect to all physical interfaces on the Telnet server.
Once a specific physical interface is specified, a client cannot connect to the
Telnet server using other physical interfaces.
● This command can be used only on a Layer 2 physical interface but not on a
Layer 3 physical interface, logical interface, or non-Ethernet interface.
Example
# Specify physical interfaces on the Telnet server to which clients can connect.
<HUAWEI> system-view
[HUAWEI] telnet server permit interface gigabitethernet 0/0/0
Info: Succeeded in setting telnet permit interface.
# Restore the default physical interfaces on the Telnet server to which clients can
connect.
<HUAWEI> system-view
[HUAWEI] undo telnet server permit interface
Format
telnet server port port-number
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To protect the Telnet standard port against attacks and ensure network security,
configure the listening port number of the Telnet server.
Precautions
A Telnet client can log in to the server with no port specified only when the server
is listening on port 23. If the server is listening on another port, the port number
must be specified upon login.
Before changing the current port number, disconnect all devices from the port.
After the port number is changed, the server starts to listen on the new port.
Example
# Configure the listening port number to 1026.
<HUAWEI> system-view
[HUAWEI] telnet server port 1026
Warning: After the command is executed, the current Telnet port number is disabled and all Telnet users
are disconnected. Continue? (Y/N):y
Format
telnet server enable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
You can run this command to enable and disable the Telnet server. A Telnet server
can be connected only when it starts.
When the undo telnet server enable command is executed to disable the Telnet
server, an online Telnet user goes offline because the Telnet service is disabled.
When a Telnet server stops, you can log in to the device only through the console
port or SSH.
NOTE
The Telnet protocol poses a security risk, and therefore the STelnet V2 mode is
recommended.
Example
# Start a Telnet server.
<HUAWEI> system-view
[HUAWEI] telnet server enable
Warning: Telnet is not a secure protocol, and it is recommended to use Stelnet.
The AD9430DN-12 supports both flash: and flash1:, while flash1: is used as the storage
space for the attack defense function.
3.5.1 ascii
Function
The ascii command sets the file transfer mode to ASCII on an FTP client.
The default file transfer mode is ASCII.
Format
ascii
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Files can be transferred in ASCII or binary modes.
The ASCII mode is used to transfer plain text files, and the binary mode is used to
transfer application files such as system software (files with name extension .cc,
and .pat.), images, video files, compressed files, and database files.
Example
# Set the file transfer mode to ASCII.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] ascii
200 Type set to A.
3.5.2 binary
Function
The binary command sets the file transmission mode to binary on an FTP client.
Format
binary
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Files can be transferred in ASCII or binary modes.
The ASCII mode is used to transfer plain text files, and the binary mode is used to
transfer application files such as system software (files with name extension .cc,
and .pat.), images, video files, compressed files, and database files.
Example
# Set the file transmission mode to binary.
<HUAWEI> ftp 10.137.217.201
Trying 10.137.217.201 ...
Press CTRL+K to abort
Connected to 10.137.217.201.
220 FTP service ready.
User(10.137.217.201:(none)):huawei
331 Password required for huawei.
Enter password:
230 User logged in.
[HUAWEI-ftp] binary
200 Type set to I.
3.5.3 bye
Function
The bye command terminates the connection with the remote FTP server and
enters the user view.
Format
bye
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
This command is equivalent to the quit command.
You can use the close and disconnect commands to terminate the connection
with the remote FTP server and retain the FTP client view.
Example
# Terminate the connection with the remote FTP server and enter the user view.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] bye
221 server closing.
<HUAWEI>
Format
cd remote-directory
Parameters
Parameter Description Value
remote- Specifies the name of a The value is a string of 1 to 64
directory working directory on the FTP case-insensitive characters
server. without spaces.
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
The FTP server authorizes users to access files in certain directories and their
subdirectories.
NOTE
If the new working directory of the FTP server is on the same file drive as the current
working directory, you do not need to specify the name of the file drive in the command
but only need to specify the differences between two working directories. For example:
● If the current working directory is flash:/ and you want to change it to flash:/temp/
subtemp, run the cd temp/subtemp command.
● If the current working directory is flash:/temp and you want to change it to flash:/temp/
subtemp, run the cd subtemp command.
● If the current working directory is flash:/temp/subtemp and you want to change it to
flash:/temp, run the cd /temp command.
● If the current working directory is flash:/temp and you want to change it to flash:/, run
the cd / command.
Example
# Change the working directory to d:/temp.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] cd d:/temp
250 "D:/temp" is current directory.
Format
cd [ remote-directory ]
Parameters
Parameter Description Value
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
● The SFTP server authorizes users to access files in certain directories and their
subdirectories.
● The specified working directory must exist on the SFTP server. If the remote-
directory parameter is not included in the cd command, only the current
working directory of an SSH user is displayed as the command output.
Example
# Change the current working directory of the SFTP server to /bill.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> cd bill
Current directory is:
/bill
Function
The cd command changes the current working directory of a user.
Format
cd directory
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
● The directory specified in the cd command must exist; otherwise, the error
messages will be displayed.
You can perform the following operations to rectify faults:
a. Run the pwd command to view the current working directory.
b. Run the dir command to view the current working directory and verify
that the directory specified in the cd command exists.
Example
# Change the current working directory from flash:/temp to flash:.
<HUAWEI> pwd
flash:/temp
<HUAWEI> cd flash:
<HUAWEI> pwd
flash:
Format
cdup
Parameters
None
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the cdup command to change the current working directory to its
parent directory.
Precautions
If the current working directory is the SFTP authorization directory, the command
cannot change the current working directory.
Example
# Change the current working directory to its parent directory.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> cd dhcp
Current directory is:
/dhcp
sftp-client> cdup
Current directory is:
/
sftp-client> cdup
Error: Failed to change the current directory.
sftp-client>
Format
cdup
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To exit from the current directory and return to the upper-level directory, run the
cdup command.
Precautions
The accessible directories for an FTP user are restricted by the authorized directory
configured for the user.
Example
# Exit from the current directory and return to the upper-level directory.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] cd security
250 "D:\security" is current directory.
[HUAWEI-ftp] cdup
250 "D:\" is current directory.
3.5.9 close
Function
The close command terminates the connection with the remote FTP server and
retains the FTP client view.
Format
close
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command is equivalent to the disconnect command.
You can run the bye and quit commands to terminate the connection with the
remote FTP server and enter the user view.
Precautions
To enter the user view from the FTP client view, you can run the bye or quit
command.
Example
# Terminate the connection with the remote FTP server and enters the FTP client
view.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] close
221 Server closing.
[HUAWEI-ftp]
3.5.10 copy
Function
The copy command copies a file.
Format
copy source-filename destination-filename
Parameters
Parameter Description Settings
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The following describes the drive name.
● drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary space to
store feature files required for the attack defense function. Startup files and
configuration files can be stored only in flash:, while other files can be flexibly
stored in flash: or flash1.
The path can be an absolute path or relative path.
● flash:/my/test/ is an absolute path.
● selftest/ is related to the current working directory and indicates the selftest
directory in the current working directory.
Precautions
● If the destination file name is not specified, the designation file and the
source file have the same name. If the source file and the destination file are
in the same directory, you must specify the destination file name. If the
destination file name is not specified, you cannot copy the source file
successfully.
● If the destination file name is the same as that of an existing file, the system
prompts you whether to overwrite the existing file. The system prompt is
displayed only when file prompt is set to alert.
Example
# Copy the file config.cfg from the root directory of the flash card to flash:/temp.
The destination file name is temp.cfg.
<HUAWEI> copy flash:/config.cfg flash:/temp/temp.cfg
Copy flash:/config.cfg to flash:/temp/temp.cfg?(y/n)[n]:y
100% complete
Info: Copied file flash:/config.cfg to flash:/temp/temp.cfg...Done
# If the current directory is the root directory of the flash card, you can perform
the preceding configuration using the relative path.
<HUAWEI> pwd
flash:
<HUAWEI> dir
Directory of flash:/
# Copy the file config.cfg from the root directory of the flash card to flash:/temp.
The destination file name is config.cfg.
<HUAWEI> pwd
flash:
<HUAWEI> dir
Directory of flash:/
# Copy the file backup.zip to backup1.zip in the test directory from the current
working directory flash:/test/.
<HUAWEI> pwd
flash:/test
<HUAWEI> copy backup.zip backup1.zip
Copy flash:/test/backup.zip to flash:/test/backup1.zip?(y/n)[n]:y
100% complete
Info: Copied file flash:/test/backup.zip to flash:/test/backup1.zip...Done
3.5.11 debugging
Function
The debugging command enables the debugging function of the FTP client.
The undo debugging command disables the debugging function of the FTP client.
By default, the debugging function of the FTP client is disabled.
Format
debugging
undo debugging
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
You can run the debugging command to check the session information sent by
the FTP client to the FTP server.
Example
# Enable the debugging function of the FTP client.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL + K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):ftp
331 Password required for ftp.
Enter password:
230 User logged in.
[ftp] debugging
Format
delete [ /unreserved ] [ /force ] { filename | devicename }
Parameters
Parameter Description Value
/unreserved Deletes a specified file. -
The deleted file cannot be
restored.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The following describes the drive name.
● drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary space to
store feature files required for the attack defense function. Startup files and
configuration files can be stored only in flash:, while other files can be flexibly
stored in flash: or flash1.
The path can be an absolute path or relative path.
● flash:/my/test/ is an absolute path.
● selftest/ is related to the current working directory and indicates the selftest
directory in the current working directory.
NOTICE
If you delete a file using the /unreserved parameter, the file cannot be
deleted.
● If you delete a specified storage device, all files are deleted from the root
directory of the storage device.
● If you delete two files with the same name from different directories, the last
file deleted is kept in the recycle bin.
● If you attempt to delete a protected file, such as a configuration file, patch
file, or patch status file, a system prompt is displayed.
● You cannot delete a directory by running the delete command. To delete a
directory, run the rmdir (user view) command.
Example
# Delete the file test.txt from the flash:/test/ directory.
<HUAWEI> delete flash:/test/test.txt
Delete flash:/test/test.txt?(y/n)[n]:y
Info: Deleting file flash:/test/test.txt...succeed.
# Delete the file test.txt from the current working directory flash:/selftest.
<HUAWEI> delete test.txt
Delete flash:/selftest/test.txt?(y/n)[n]:y
Info: Deleting file flash:/selftest/test.txt...succeed.
Format
dir [ /all ] [ filename | directory ]
Parameters
Parameter Description Settings
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The wildcard (*) can be used in the dir command. If no parameter is specified, this
command displays information about the files and directories in the current
directory.
The following describes the drive name:
● drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary space to
store feature files required for the attack defense function. Startup files and
configuration files can be stored only in flash:, while other files can be flexibly
stored in flash: or flash1.
The path can be an absolute path or relative path.
● flash:/my/test/ is an absolute path.
● selftest/ is related to the current working directory and indicates the selftest
directory in the current working directory.
You can use the dir /all command to view information about all files and
directories of the storage device, including those stored in the recycle bin. The
name of a file in the recycle bin is placed in square brackets ([]), for example,
[test.txt].
Precautions
If the device name has been changed or the device generates logs during device
name restoration, the logs are recorded in log files with different device names.
With the dir command, you are advised to search for logs by timestamp instead of
by device name.
Example
# Display information about all files and directories stored in the current directory.
<HUAWEI> dir /all
Directory of flash:/
# Display information about all .txt files stored in the current directory.
<HUAWEI> dir *.txt
Directory of flash:/
Format
delete remote-filename
Parameters
Parameter Description Value
remote- Specifies the name of a file The value is a string of 1 to 64
filename to be deleted. case-insensitive characters
without spaces.
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
A file deleted in the FTP client view cannot be restored.
Example
Delete the file temp.c.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] delete temp.c
Warning: The contents of file temp.c cannot be recycled. Continue? (y/n)[n]:y
250 File deleted from remote host.
Format
dir [ remote-filename [ local-filename ] ]
ls [ remote-filename [ local-filename ] ]
Parameters
Parameter Description Value
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The following describes differences between the dir and ls commands.
● After you run the dir command, detailed file information is displayed,
including the file size, date when the file is created, whether the file is a
directory, and whether the file is editable. After you run the ls command, only
the file name is displayed.
● The dir command is used to save detailed file information, while the ls
command is used to save only the file name even if the file is specified and
saved in a local directory.
Precautions
The wildcard (*) can be used in commands dir and ls.
Example
# Display the name or detailed information about a file that is saved in the test
directory.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] cd test
250 CWD command successfully.
[HUAWEI-ftp] dir
# Display the detailed information in file temp.c, and save the displayed
information in file temp1.
[HUAWEI-ftp] dir temp.c temp1
200 PORT command okay
150 File Listing Follows in ASCII mode
\
226 Transfer finished successfully.
FTP: 62 byte(s) received in 0.050 second(s) 1.24Kbyte(s)/sec.
[HUAWEI-ftp] quit
221 Windows FTP Server (WFTPD, by Texas Imperial Software) says goodbye
# Display the name of file test.bat, and save the displayed information in file test.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] ls test.bat test
200 Port command okay.
150 Opening ASCII mode data connection for test.bat.
[HUAWEI-ftp] quit
Parameter Description
Parameter Description
Format
dir [ -l | -a ] [ remote-directory ]
ls [ -l | -a ] [ remote-directory ]
Parameters
Parameter Description Value
-l Displays detailed information about -
all files and directories in a specified
directory.
-a Displays names of all files and -
directories in a specified directory.
remote-directory Specifies the name of a directory on The value is a string of
the SFTP server. 1 to 64 case-insensitive
characters without
spaces.
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
The dir and ls commands are equivalent.
● If -l and -a parameters are not specified, detailed information about all files
and directories in a specified directory is displayed after you run the dir or ls
command. The effect is the same as the dir -l command output.
● By default, if the remote-directory parameter is not specified, the list of
current directory files is displayed after you run the dir or ls command.
Example
# Displays a list of files in the test directory of the SFTP server.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> dir test
drwxrwxrwx 1 noone nogroup 0 Mar 24 18:48 .
drwxrwxrwx 1 noone nogroup 0 Mar 29 14:52 ..
-rwxrwxrwx 1 noone nogroup 0 Mar 24 00:04 yourtest
-rwxrwxrwx 1 noone nogroup 5736 Mar 24 18:38 backup.txt
-rwxrwxrwx 1 noone nogroup 5736 Mar 24 18:38 backup1.txt
sftp-client> dir -a test
.
..
yourtest
backup.txt
backup1.txt
sftp-client> ls test
drwxrwxrwx 1 noone nogroup 0 Mar 24 18:48 .
drwxrwxrwx 1 noone nogroup 0 Mar 29 14:52 ..
-rwxrwxrwx 1 noone nogroup 0 Mar 24 00:04 yourtest
-rwxrwxrwx 1 noone nogroup 5736 Mar 24 18:38 backup.txt
-rwxrwxrwx 1 noone nogroup 5736 Mar 24 18:38 backup1.txt
sftp-client> ls -a test
.
..
yourtest
backup.txt
backup1.txt
3.5.17 disconnect
Function
The disconnect command terminates the connection with the remote FTP server
and displays the FTP client view.
Format
disconnect
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
This command is equivalent to the close command.
You can run the bye and quit commands to terminate the connection with the
remote FTP server and enter the user view.
To enter the user view from the FTP client view, you can run the bye or quit
command.
Example
# Terminate the connection with the remote FTP server and enter the FTP client
view.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] disconnect
221 Windows FTP Server (WFTPD, by Texas Imperial Software) says goodbye
[HUAWEI-ftp]
Format
display ftp-server
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to display FTP server parameter settings.
Example
# Display FTP server parameter settings.
<HUAWEI> display ftp-server
FTP server is running
FTP server's source address Source IP address for the FTP server to
send packets. The default value is
0.0.0.0.
You can run the ftp server-source
command to configure the source IP
address for the FTP server. Here, the
source IP address 10.1.1.1 is displayed.
If a source interface is configured, this
field displays "FTP server's source
interface LoopBack0."
Format
display ftp-users
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can check FTP user parameters on the FTP server, such as the FTP user name,
IP address of the client host, port number, idle duration, and the authorized
directory.
Example
# Display FTP user parameters.
<HUAWEI> display ftp-users
username host port idle topdir
test 10.137.217.159 51156 0 flash:
The preceding information indicates that two users are connected to the FTP
server.
Function
The display ftp-client command displays the source IP address configured for the
FTP client.
Format
display ftp-client
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
The default source IP address is 0.0.0.0 if ftp client-source is not configured.
Example
# Display the source IP address of the FTP client.
<HUAWEI> display ftp-client
Info: The source address of FTP client is 10.1.1.1.
Parameter Description
Info: The source address of FTP client is 10.1.1.1 is the source IP address of the
10.1.1.1. FTP client.
You can run the ftp client-source
command to configure the source IP
address.
If the IP address is configured for the
source port, the message "The source
interface of FTP client is LoopBack0"
is displayed.
Function
The display sftp-client command displays the source IP address configured for
the SFTP client.
Format
display sftp-client
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display sftp client command to display the source IP address of
the SFTP client. By default, the source IP address is 0.0.0.0 if sftp client-source is
not configured.
Example
# Display the source IP address configured for the SFTP client.
<HUAWEI> display sftp-client
Info: The source address of SFTP client is 1.1.1.1
Parameter Description
Info: The source address of SFTP client 1.1.1.1 is the source IP address of the
is 1.1.1.1 SFTP client.
You can run the sftp client-source
command to configure the source IP
address for the SFTP client.
If the IP address is configured for the
source port, the message "The source
interface of SFTP client is LoopBack0"
is displayed.
Function
The display tftp-client command displays the source IP address configured for
the TFTP client.
Format
display tftp-client
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
You can run the display tftp client command to query source IP address of the
TFTP client. The default source IP address is 0.0.0.0 if tftp client-source is not
configured.
Example
# Display the source IP address configured for the TFTP client.
<HUAWEI> display tftp-client
Info: The source address of TFTP client is 1.1.1.1.
Parameter Description
Info: The source address of TFTP client 1.1.1.1 is the source IP address of the
is 1.1.1.1. TFTP client.
You can run the tftp client-source
command to configure the source IP
address for the TFTP client.
If the IP address is configured for the
source port, the message "The source
interface of TFTP client is LoopBack0"
is displayed.
3.5.23 execute
Function
The execute command executes a specified batch file.
Format
execute batch-filename
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a series of commands are frequently executed, write these commands in a batch
file, and store this file in system. In this way, you can only execute this command
to run multiple commands which were manually entered before. This command
improves maintenance and management efficiency.
NOTE
● The batch file is edited in .txt format. When editing the file, ensure that one command
occupies one line. After editing the file, save the file and change the file name extension
to .bat.
● Transfer the batch file in file transmission mode to the device.
Prerequisites
Before running the execute command, ensure that the batch file to be processed
is in the current directory; otherwise, the system cannot find the batch file.
Precautions
● The commands in a batch file are run one by one. A batch file cannot contain
invisible characters (control characters or escape characters, such as \r, \n, and
\b). If any invisible character is detected, the execute command exits from the
current process and no rollback is performed.
● The execute command does not ensure that all commands can be run. If the
system runs a wrong or immature command, it displays the error and goes to
next command. The execute command does not perform the hot backup
operation, and the command format or content is not restricted.
Example
# Execute the test.bat file in the directory flash:/. The test.bat file contains three
commands: system-view, aaa and local-user test service-type web.
<HUAWEI> system-view
[HUAWEI] execute test.bat
[HUAWEI] system-view
^
Error: Unrecognized command found at '^' position.
[HUAWEI] aaa
[HUAWEI-aaa] local-user test service-type web
[HUAWEI-aaa]
When the system runs the first command system-view in current system view, it
displays an error and continues to run the following commands.
The system displays the execution of a batch file in AAA view.
[HUAWEI-aaa] display this
local-user test service-type web
Format
file prompt { alert | quiet }
Parameters
Parameter Description Value
alert Display a prompt message before users perform an -
operation.
quiet Display no prompt message before users perform an -
operation.
Views
System view
Default Level
3: Management level
Usage Guidelines
NOTICE
If the prompt mode is set to quiet, the system does not provide prompt messages
when data is lost because of misoperations such as the operation of deleting or
overwriting files. Therefore, this prompt mode should be used with caution.
Example
# Set the prompt mode to quiet. When you rename a copied file test.txt using an
existing file name test1.txt, no prompt message is displayed.
<HUAWEI> system-view
[HUAWEI] file prompt quiet
[HUAWEI] quit
<HUAWEI> copy test.txt test1.txt
Deleting file permanently from flash will take a long time if needed...Done.
100% complete
Info: Copied file flash:/test.txt to flash:/test1.txt...Done
3.5.25 format
Function
The format command formats a storage device.
NOTE
Format
format drive
Parameters
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When the file system fault cannot be rectified or the data on the storage device is
no longer needed, the storage device can be formatted. When you run the format
command, all files and directories are cleared from the storage device.
Currently, only the USB flash drive and micro SD card of the device can be
formatted.
Precautions
NOTICE
After the format command is run, files and directories are cleared from the
specified storage device and cannot be restored. Therefore, this command should
be used with caution.
If the storage device is still unavailable after the format command is run, a
physical exception may have occurred.
Example
# Format the storage device.
<HUAWEI> format usb:
All data(include configuration and system startup file) on usb: will be lost , proceed with format? (y/n)[n]:y
%Format usb: completed.
3.5.26 ftp
Function
The ftp command connects the FTP client to the FTP server and enters the FTP
client view.
Format
# Connect the FTP client to the FTP server based on the IPv4 address.
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before accessing the FTP server on the FTP client, you must run this command to
connect the FTP client to the FTP server.
Precautions
● You can set the source IP address to the source or destination IP address in
the ACL rule when the parameter -a or -i is specified on the IPv4 network.
This shields the IP address differences and interface status impact, and filters
incoming and outgoing packets, improving device security.
● If no parameter is set in this command, only the FTP view is displayed, and no
connection is set up between the FTP server and client.
● If the port number used by the FTP server is not a standard one, you must
specify a standard port number; otherwise, the FTP server and client cannot
be connected.
● When you run this command, the system prompts you to enter the user name
and password for logging in to the FTP server. You can log in to the FTP server
only when the user name and password are correct.
● If the number of login users exceeds the maximum value allowed by the FTP
server, new authorized users cannot log in to the FTP server. To allow new
authorized users to log in to the FTP server, users who have completed FTP
services need to disconnect their clients from the FTP server. You can run the
bye or quit command to disconnect the FTP client from the FTP server and
return to the user view, or run the close or disconnect command to
disconnect the FTP client from the FTP server and stay in the FTP client view.
● During the connection to the FTP server, you can press Ctrl+K to terminate
the current connection.
Example
# Connect to the remote FTP server whose address is 10.1.1.1.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp]
The undo ftp acl command deletes an ACL number of the current FTP server.
By default, no ACL is configured for FTP server.
Format
ftp acl acl-number
undo ftp acl
Parameters
Parameter Description Value
acl-number Specifies the number of the The value is an integer that ranges
ACL. from 2000 to 2999.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To ensure the security of an FTP server, you need to configure an ACL for it to
specify FTP clients that can access the current FTP server.
Precautions
● The ftp acl command takes effect only after you run the rule command to
configure the ACL rule.
● The FTP only supports the basic ACL whose number ranges from 2000 to
2999.
Example
# Allow the client whose ACL number is 2000 to log in to the FTP server.
<HUAWEI> system-view
[HUAWEI] acl 2000
[HUAWEI-acl-basic-2000] rule permit source 10.10.10.1 0
[HUAWEI-acl-basic-2000] quit
[HUAWEI] ftp acl 2000
The undo ftp client-source command restores the default source IP address for
the FTP client to send packets.
The default source IP address for the FTP client to send packets is 0.0.0.0.
Format
ftp client-source { -a source-ip-address | -i interface-type interface-number }
undo ftp client-source
Parameters
Parameter Description Value
-a source-ip- The value is
Specifies the source IP address. You are
address in dotted
advised to use the loopback interface IP
decimal
address.
notation.
-i interface-type Specifies the source interface. You are -
interface-number advised to use the loopback interface.
The IP address configured for the source
interface is the source IP address for sending
packets. If no IP address is configured for the
source interface, the FTP connection cannot
be set up.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If no source IP address is specified, the client uses the source IP address that the
router specifies to send packets. The source IP address must be configured for an
interface with stable performance. The loopback interface is recommended. Using
the loopback interface as the source interface simplifies the ACL rule and security
policy configuration. This shields the IP address differences and interface status
impact, and incoming and filters outgoing packets, and implements security
authentication.
Precautions
● You can also run the ftp command to configure the source IP address whose
priority is higher than that of the source IP address specified by the ftp client-
source command. If you specify the source IP addresses by running the ftp
client-source and ftp commands, the source IP address specified by the ftp
command is used for data communication and is available only for the
current FTP connection, while the source IP address specified by the ftp
client-source command is available for all FTP connections.
● The IP address that a user displays on the FTP server is the specified source IP
address or source interface IP address.
Example
# Set the source IP address of the FTP client to 1.1.1.1.
<HUAWEI> system-view
[HUAWEI] ftp client-source -a 1.1.1.1
Info: Succeeded in setting the source address of the FTP client to 1.1.1.1.
Function
The ftp server enable command enables the FTP server function to allow FTP
users to log in to the FTP server.
The undo ftp server command disables the FTP server function so that FTP users
cannot log in to the FTP server.
Format
ftp server enable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To manage FTP server files on a client, you must run the ftp server enable
command to enable the FTP server function to allow FTP users to log in to the
FTP server.
Precautions
If the security FTP server function is disabled, no user can log in to the FTP server,
and users who have logged in to the FTP server can perform only the logout
operation.
NOTE
The FTP protocol will bring risk to device security. The SFTP V2 mode is recommended.
Example
# Enable the FTP server function.
<HUAWEI> system-view
[HUAWEI] ftp server enable
Warning: FTP is not a secure protocol, and it is recommended to use SFTP.
Info: Succeeded in starting the FTP server
Function
The ftp server permit interface command specifies physical interfaces on the FTP
server to which clients can connect.
The undo ftp permit interface command restores the default physical interfaces
on the FTP server to which clients can connect.
By default, clients can connect to all the physical interfaces on the FTP server.
Format
ftp server permit interface { interface-type interface-number } &<1-5>
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To prevent a client from connecting to the FTP server through an unauthorized
physical interface or attacking the FTP server by sending a large number of FTP
packets, you can run the ftp server permit interface command to specify physical
interfaces on the FTP server to which the client can connect.
Precautions
● By default, clients can connect to all the physical interfaces on the FTP server.
Once a physical interface is specified using the ftp server permit interface
command, a client cannot connect to the FTP server through other physical
interfaces.
● This command can be used only on a Layer 2 physical interface but not on a
Layer 3 physical interface, logical interface, or non-Ethernet interface.
● A physical interface specified using this command cannot be added to an Eth-
Trunk. If it is added to an Eth-Trunk, a client cannot connect to the FTP server
through this physical interface.
Example
# Specify physical interfaces on the FTP server to which clients can connect.
<HUAWEI> system-view
[HUAWEI] ftp server permit interface gigabitethernet 0/0/0
Info: Succeeded in setting ftp permit interface.
# Restore the default physical interfaces on the FTP server to which clients can
connect.
<HUAWEI> system-view
[HUAWEI] undo ftp server permit interface
Format
ftp server port port-number
Parameters
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
By default, the listening port number of the FTP server is 21. Attackers may
frequently access the default listening port, which wastes bandwidth, deteriorates
server performance, and prevents authorized users from accessing the FTP server
through the listening port. You can run the ftp server port command to specify
another listening port number to prevent attackers from accessing the listening
port.
Prerequisites
Before running the ftp server port command to specify the listening port number,
you must first run the undo ftp server command to disable FTP services.
Precautions
● After the ftp server port command is executed, the FTP server disconnects all
FTP connections and uses the new listening port.
● If the current listening port number is 21, FTP client users do not need to
specify the port number for logging in to the FTP server. If the current
listening port number is not 21, FTP client users must use the FTP server's
listening port number to log in to the FTP server.
● After the listening port number is changed, you must run the ftp server
enable command to enable FTP services to make the configuration take
effect.
Example
# Change the port number of the FTP server to 1028.
<HUAWEI> system-view
[HUAWEI] undo ftp server
[HUAWEI] ftp server port 1028
The undo ftp server-source command restores the default source IP address for
the FTP server to send packets.
The default source IP address for the FTP server to send packets is 0.0.0.0.
Format
ftp server-source { -a source-ip-address | -i interface-type interface-number }
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If no source IP address (0.0.0.0 by default) is specified, the FTP server uses the
source IP address that the router specifies to send packets. The source IP address
must be configured for an interface with stable performance. The loopback
interface is recommended. Using the loopback interface as the source interface
simplifies the ACL rule and security policy configuration. This shields the IP
address differences and interface status impact, and incoming and filters outgoing
packets, and implements security authentication.
Precautions
● After the source IP address is specified for the FTP server, you must use the
specified IP address to log in to the FTP server.
● If FTP services have been enabled, the FTP service restarts after the ftp
server-source command is executed.
Example
# Set the source IP address of the FTP server to the IP address of LoopBack0.
<HUAWEI> system-view
[HUAWEI] ftp server-source -i loopback0
Warning: To make the server source configuration take effect, the FTP server will be restarted. Continue?
(y/n)[n]: y
Info: Succeeded in setting the source interface of the FTP server to LoopBack0
Warning: FTP is not a secure protocol, and it is recommended to use SFTP.
Info: Succeeded in starting the FTP server
Format
ftp timeout minutes
undo ftp timeout
Parameters
Parameter Description Value
minutes Specifies idle timeout The value is an integer that ranges from 1 to
duration. 35791, in minutes. By default, the idle
timeout duration is 30 minutes.
Views
System view
Default Level
3: Management level
Usage Guidelines
After a user logs in to the FTP server, a connection is set up between the FTP
server and the user's client. The idle timeout duration is configured to release the
Example
# Set the idle timeout duration to 36 minutes.
<HUAWEI> system-view
[HUAWEI] ftp timeout 36
Format
get remote-filename [ local-filename ]
Parameters
Parameter Description Value
remote- Specifies the name of the file The value is a string of 1 to 64
filename to be downloaded from the case-sensitive characters
FTP server. without spaces.
local-filename Specifies the name of a The value is a string of 1 to 64
downloaded file to be saved to case-sensitive characters
the local device. without spaces.
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the get command to download system software, backup
configuration files, and patch files from the FTP server to upgrade devices.
Precautions
● If the downloaded file name is not specified on the local device, the original
file name is used.
● If the name of the downloaded file is the same as that of an existing local
file, the system prompts you whether to overwrite the existing file.
Example
# Download the system software devicesoft.cc from the FTP server.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] get devicesoft.cc
Format
get remote-filename [ local-filename ]
Parameters
Parameter Description Value
remote- Specifies the name of the file The value is a string of 1 to 64
filename to be downloaded from the case-sensitive characters
SFTP server. without spaces.
local-filename Specifies the name of a The value is a string of 1 to 64
downloaded file to be saved to case-sensitive characters
the local device. without spaces.
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the get command to download files from the FTP server to upgrade
devices.
Precautions
● If the local-filename is not specified on the local device, the original file name
is used.
● If the name of the downloaded file is the same as that of an existing local
file, the system prompts you whether to overwrite the existing file.
Example
# Download a file from the SFTP server.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> get test.txt
Function
The help command displays the help information in the SFTP client view.
Format
help [ all | command-name ]
Parameters
Parameter Description Value
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
In the SFTP view, you can only enter the question mark (?) to obtain all
commands in the SFTP client view. If you enter a command keyword and the
question mark (?) to query command parameters, an error message is displayed,
as shown in the following:
sftp-client> dir ?
Error: Failed to list files.
You can run the help command to obtain the help information and display all
commands or a command format in the SFTP client view.
Precautions
If you specify no parameter when running the help command, all commands in
the SFTP client view is displayed. This has the same effect as the help all
command or directly entering the question mark (?) in the SFTP client view.
Example
# Display the format of the command get.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> help get
get Remote file name STRING<1-64> [Local file name STRING<1-64>] Download file
Default local file name is the same with remote file.
Function
The mkdir command creates a directory on the remote FTP server.
Format
mkdir remote-directory
Parameters
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
● You can run the mkdir command to create a subdirectory in a specified
directory, and the subdirectory name must be unique.
● If no path is specified when you create a subdirectory, the subdirectory is
created in the current directory.
● The created directory is stored on the FTP server.
Example
# Create a directory test on the remote FTP server.
<HUAWEI> ftp 172.16.104.110
Trying 172.16.104.110 ...
Press CTRL+K to abort
Connected to 172.16.104.110.
220 FTP service ready.
User(172.16.104.110:(none)):huawei
331 Password required for huawei
Enter password:
230 User logged in.
[HUAWEI-ftp] mkdir test
257 "test" new directory created.
Function
The mkdir command creates a directory on the remote SFTP server.
Format
mkdir remote-directory
Parameters
Parameter Description Value
remote- Specifies the The value is a string of case-sensitive
directory directory to be characters without spaces. The absolute
created. path length ranges from 1 to 64, while the
directory name length ranges from 1 to 15.
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
● You can run the mkdir command to create a subdirectory in a specified
directory, and the subdirectory name must be unique.
● If no path is specified when you create a subdirectory, the subdirectory is
created in the current directory.
● The created directory is stored on the SFTP server.
● After a directory is created, you can run the dir/ls (SFTP client view)
command to view the directory.
Example
# Create a directory on the SFTP server.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> mkdir ssh
Info: Succeeded in creating a directory.
Format
mkdir directory
Parameters
Parameter Description Settings
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The following describes the drive name.
● drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary space to
store feature files required for the attack defense function. Startup files and
configuration files can be stored only in flash:, while other files can be flexibly
stored in flash: or flash1.
The path can be an absolute path or relative path.
● flash:/my/test/ is an absolute path.
● selftest/ is related to the current working directory and indicates the selftest
directory in the current working directory.
If you only the subdirectory name is specified, a subdirectory is created in the
current working directory. You can run the pwd command to query the current
working directory. If the subdirectory name and directory path are specified, the
subdirectory is created in the specified directory.
Precautions
● The subdirectory name must be unique in a directory; otherwise, the message
"Error: Directory already exists" is displayed.
● A maximum of four directory levels are supported when you create a
directory.
Example
# Create the subdirectory new in the flash card.
<HUAWEI> mkdir flash:/new
Info: Create directory flash:/new......Done
3.5.40 lcd
Function
The lcd command displays and changes the local working directory of the FTP
client in the FTP client view.
Format
lcd [ local-directory ]
Parameters
Parameter Description Value
local-directory Specifies the local working The value is a string of 1 to 64
directory of the FTP client. case-sensitive characters without
spaces.
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the lcd command to display the local working directory of the FTP
client when uploading or downloading files, and set the upload or download path
to the path of the local working directory.
Precautions
The lcd command displays the local working directory of the FTP client, while the
pwd command displays the working directory of the FTP server. If you specify the
parameter local-directory in the lcd command, you can directly change the local
working directory in the FTP client view.
Example
# Change the local working directory to flash:/test.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] lcd
The current local directory is flash:.
[HUAWEI-ftp] lcd flash:/test
The current local directory is flash:/test.
3.5.41 more
Function
The more command displays the content of a specified file.
Format
more [ /binary ] filename [ offset ] [ all ]
Parameters
offset Specifies the file The value is an integer that ranges from 0
offset. to 2147483647, in bytes.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the more command to display the file content directly on a device.
● The following describes the drive name.
– drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary
space to store feature files required for the attack defense function.
Startup files and configuration files can be stored only in flash:, while
other files can be flexibly stored in flash: or flash1.
● The path can be an absolute path or relative path.
– flash:/my/test/ is an absolute path.
– selftest/ is related to the current working directory and indicates the
selftest directory in the current working directory.
Precautions
● You are not advised to use this command to display non-text files; otherwise,
the terminal is shut down or displays garbled characters, which is harmless to
the system.
● Files are displayed in text format.
● You can display the file content flexibly by specifying parameters before
running the more command:
– You can run the more filename command to view a specified text file.
The content of the specified text file is displayed on multiple screens. You
can press the spacebar consecutively on the current session GUI to
display all content of the file.
To display the file content on multiple screens, you must ensure that:
▪ The total number of file lines is greater than the number of lines
that can be displayed on a terminal screen. (The number of lines that
can be displayed on a terminal screen is set by running the screen-
length command.)
– You can run the more filename offset command to view a specified file.
The content of the specified text file starting from offset is displayed on
multiple screens. You can press the spacebar consecutively on the current
session GUI to display all content of the file.
To display the file content on multiple screens, you must ensure that:
▪ The number of lines starting from offset in the file is greater than
the number of lines that can be displayed on a terminal screen. (The
number of lines that can be displayed on a terminal screen is set by
running the screen-length command.)
– You can run the more file-name all command to view a specified file.
The file content is displayed on one screen.
Example
# Display the content of the file test.bat.
<HUAWEI> more test.bat
user-interface vty 12 14
authentication-mode aaa
protocol inbound ssh
user privilege level 5
quit
ssh user sftpuser authentication-type password
sftp server enable
# Display the content of the file test.bat and set the offset to 10.
<HUAWEI> more test.bat 10
user-interface vty 12 14
authentication-mode aaa
protocol inbound ssh
user privilege level 5
quit
ssh user sftpuser authentication-type password
sftp server enable
3.5.42 mount
Function
The mount command uploads a storage device.
By default, after being installed on the device, the storage device is automatically
uploaded to the device.
NOTE
This command is supported only by devices that support extended storage devices such as
USB.
Format
mount driver
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
After being installed on the device, the storage device is automatically uploaded to
the device. Therefore, you do not need to run this command to upload the storage
device. If you run the umount command to unload the storage device and the
storage device is not removed from the device, run the mount command to
upload the storage device again.
Example
# Upload a USB flash drive.
<HUAWEI> mount usb:
Info: Mount USB device success!
3.5.43 move
Function
The move command moves the source file from a specified directory to a
destination directory.
Format
move source-filename destination-filename
Parameters
Parameter Description Settings
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The following describes the drive name.
● drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary space to
store feature files required for the attack defense function. Startup files and
configuration files can be stored only in flash:, while other files can be flexibly
stored in flash: or flash1.
The path can be an absolute path or relative path.
● flash:/my/test/ is an absolute path.
● selftest/ is related to the current working directory and indicates the selftest
directory in the current working directory.
Precautions
● If the destination file has the same name as an existing file, the system
prompts you whether to overwrite the existing file. The system prompt is
displayed only when file prompt is set to alert.
● This command cannot be used to move files between storage devices.
● The move and copy commands have different effects:
– The move command moves the source file to the destination directory.
– The copy command copies the source file to the destination directory.
Example
# Move a file from flash:/test/sample.txt to flash:/sample.txt.
<HUAWEI> move flash:/test/sample.txt flash:/sample.txt
Move flash:/test/sample.txt to flash:/sample.txt ?(y/n)[n]: y
%Moved file flash:/test/sample.txt to flash:/sample.txt.
3.5.44 open
Function
The open command connects the FTP client and server.
Format
# Connect the FTP client to the FTP server based on the IPv4 address.
open [ -a source-ip-address | -i interface-type interface-number ] host-ip [ port-
number ]
Parameters
Parameter Description Value
port-number Specifies the port number of the FTP The value is an integer
server. that ranges from 1025
to 55535, or 21. The
default value is the
standard port number
21.
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the open command in the FTP client view to connect the FTP client to
the server to transmit files and manage files and directories of the FTP server.
Precautions
● You can run the ftp command in the user view to connect the FTP client and
server and enter the FTP client view.
● You can set the source IP address to the source or destination IP address in
the ACL rule when the -a or -i parameter is specified on the IPv4 network.
This shields the IP address differences and interface status impact, and
incoming and filters outgoing packets, and implements security
authentication.
● If the port number that the FTP server uses is non-standard, you must specify
a standard port number; otherwise, the FTP server and client cannot be
connected.
● When you run the open command, the system prompts you to enter the user
name and password for logging in to the FTP server. You can log in to the FTP
client and enter the FTP client view if the user name and password are
correct.
Example
# Connect the FTP client with the FTP server whose IP address is 10.137.217.204.
<HUAWEI> ftp
[HUAWEI-ftp] open 10.137.217.204
Trying 10.137.217.204 ...
Press CTRL+K to abort
Connected to 10.137.217.204.
220 FTP service ready.
User(10.137.217.204:(none)):test
331 Password required for test.
Enter password:
230 User logged in.
[HUAWEI-ftp]
3.5.45 passive
Function
The passive command sets the data transmission mode to passive.
The undo passive command sets the data transmission mode to active.
Format
passive
undo passive
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
The device supports the active and passive data transmission modes. In active
mode, the server initiates a connection request, and the client and server need to
enable and monitor a port to establish a connection. In passive mode, the client
initiates a connection request, and only the server needs to monitor the
corresponding port. This command is used together with the firewall function.
When the client is configured with the firewall function, FTP connections are
restricted between internal clients and external FTP servers if the FTP transmission
mode is active. If the FTP transmission mode is passive, FTP connections between
internal clients and external FTP servers are not restricted.
Example
# Set the data transmission mode to passive.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] passive
Info: Succeeded in switching passive on.
Function
The put command uploads a local file to the remote FTP server.
Format
put local-filename [ remote-filename ]
Parameters
Parameter Description Value
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the put command to upload a local file to the remote FTP server for
further check and backup. For example, you can upload the local log file to the
FTP server for other users to check, and upload the configuration file to the FTP
server as a backup before upgrading the device.
Precautions
● If the file name is not specified on the remote FTP server, the local file name
is used.
● If the name of the uploaded file is the same as that of an existing file on the
FTP server, the system overwrites the existing file.
Example
# Upload the configuration file vrpcfg.zip to the remote FTP server as a backup,
and save it as backup.zip.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] put vrpcfg.zip backup.zip
200 Port command successful.
150 Opening BINARY mode data connection for file transfer.
226 Transfer complete
FTP: 1098 byte(s) sent in 0.131 second(s) 8.38Kbyte(s)/sec.
Format
put local-filename [ remote-filename ]
Parameters
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command enables you to upload files from the local device to a remote SFTP
server to view the file contents or back up the files. For example, you can upload
log files of a device to an SFTP server and view the logs in the server. During an
upgrade, you can upload the configuration file of the device to the SFTP server for
backup.
Precautions
Example
# Upload a file to the SFTP server.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> put wm.cfg
local file: wm.cfg ---> Remote file: /wm.cfg
Info: Uploading file successfully ended.
Function
The pwd command displays the FTP client's working directory on the remote FTP
server.
Format
pwd
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
After logging in to the FTP server, you can run the pwd command to display the
FTP client's working directory on the remote FTP server.
If the displayed working directory is incorrect, you can run the cd command to
change the FTP client's working directory on the remote FTP server.
Example
# Display the FTP client's working directory on the remote FTP server.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] pwd
257 "/" is current directory.
Function
The pwd command displays the SFTP client's working directory on the remote FTP
server.
Format
pwd
Parameters
None
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
After logging in to the SFTP server, you can run the pwd command to display the
SFTP client's working directory on the remote SFTP server.
If the displayed working directory is incorrect, you can run the cd command to
change the SFTP client's working directory on the remote SFTP server.
Example
# Display the SFTP client's working directory on the remote SFTP server.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> pwd
/
sftp-client> cd test
Current directory is:
/test
sftp-client> pwd
/test
Function
The pwd command displays the current working directory.
Format
pwd
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
You can run the pwd command in any directory to display the current working
directory. To change the current working directory, you can run the cd command.
Example
# Display the current working directory.
<HUAWEI> pwd
flash:/test
Function
The quit command terminates the FTP session from the remote server and exit
from FTP view.
Format
quit
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
By executing the quit command quits from the current view and return to
previous view.
If you execute the quit command in user view, you log out of the system.
Example
# Disconnect from the remote FTP server and return to the user view using quit
command.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] quit
Function
The quit command enables the system to disconnect from the remote SFTP server
and return to the SFTP client view.
Format
quit
Parameters
None
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can use this command to return to the system view from the SFTP client view.
Example
# Disconnect from SFTP server using quit command.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> quit
3.5.53 remotehelp
Function
The remotehelp command displays the help information about an FTP command
when the FTP client and server are connected.
Format
remotehelp [ command ]
Parameters
Parameter Description Value
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
You can run the remotehelp command to display the help information about an
FTP command.
● The help information is provided by the remote server. Different remote
servers may provide different help information for an FTP command.
● The help information can be displayed for FTP commands user, pass, cwd,
cdup, quit, port, pasv, type, retr, stor, dele, rmd, mkd, pwd, list, nlst, syst,
help, xcup, xcwd, xmkd, xpwd, and xrmd.
Example
# Display the syntax of the command cdup.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] remotehelp
214-The following commands are recogized(*=>'s unimplemented). USER PASS ACCT*
CWD CDUP SMNT* QUIT REIN* PORT PASV TYPE STRU* MODE* RETR STOR
STOU* APPE* ALLO* REST* RNFR* RNTO* ABOR* DELE RMD
MKD PWD LIST NLST SITE* SYST STAT* HELP NOOP* XCUP XCWD XMKD
XPWD XRMD 214 Direct comments to Huawei Tech.
Function
The remove command deletes specified files from the remote SFTP server.
Format
remove remote-filename &<1-10>
Parameters
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
● You can configure a maximum of 10 file names in the command and separate
them using spaces and delete them at one time.
● If the file to be deleted is not in the current directory, you must specify the file
path.
Example
# Delete the file 3.txt from the server and backup1.txt from the test directory.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> remove 3.txt test/backup1.txt
Warning: Make sure to remove these files? [y/n][n]:y
Info: Succeeded in removing the file /3.txt.
Info: Succeeded in removing the file /test/backup1.txt.
Function
The rename command renames a file or directory stored on the SFTP server.
Format
rename old-name new-name
Parameters
Parameter Description Value
old-name Specifies the name of a file The value is a string of 1 to 64 case-
or directory. insensitive characters without spaces.
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
You can run the rename command to rename a file or directory.
Example
# Rename the directory yourtest on the SFTP server.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> rename test/yourtest test/test
Warning: Rename /test/yourtest to /test/test? [y/n][n]:y
Info: Succeeded in renaming file.
sftp-client> cd test
Current directory is:
/test
sftp-client> dir
drwxrwxrwx 1 noone nogroup 0 Mar 29 22:44 .
drwxrwxrwx 1 noone nogroup 0 Mar 29 22:39 ..
drwxrwxrwx 1 noone nogroup 0 Mar 24 00:04 test
-rwxrwxrwx 1 noone nogroup 5736 Mar 24 18:38 backup.txt
Format
rename old-name new-name
Parameters
Parameter Description Settings
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The following describes the drive name:
● drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary space to
store feature files required for the attack defense function. Startup files and
configuration files can be stored only in flash:, while other files can be flexibly
stored in flash: or flash1.
The path can be an absolute path or relative path.
● flash:/my/test/ is an absolute path.
● selftest/ is related to the current working directory and indicates the selftest
directory in the current working directory.
Precautions
● You must rename a file or directory in its source directory.
● If the renamed file or directory has the same name as an existing file or
directory, an error message is displayed.
● If you specify old-name or new-name without specifying the file path, the file
must be saved in your current working directory.
Example
# Rename the directory mytest to yourtest in the directory flash:/test/.
<HUAWEI> pwd
flash:/test
<HUAWEI> rename mytest yourtest
Rename flash:/test/mytest to flash:/test/yourtest ?(y/n)[n]:y
Info: Rename file flash:/test/mytest to flash:/test/yourtest ......Done
Format
reset recycle-bin [ filename | devicename ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If you run the delete command without specifying the /unreserved parameter,
the file is moved to the recycle bin and still occupies the memory. To free up the
space, you can run the reset recycle-bin command to permanently delete the file
from the recycle bin.
The following describes the drive name.
● drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary space to
store feature files required for the attack defense function. Startup files and
configuration files can be stored only in flash:, while other files can be flexibly
stored in flash: or flash1.
The path can be an absolute path or relative path.
● flash:/my/test/ is an absolute path.
● selftest/ is related to the current working directory and indicates the selftest
directory in the current working directory.
Like devicename, drive specifies the storage device name.
Precautions
● You can run the dir /all command to display all files that are moved to the
recycle bin from the current directory, and file names are displayed in square
brackets ([ ]).
● If you delete a specified storage device, all files in the root directory of the
storage device are deleted.
● If you run the reset recycle-bin command directly, all files that are moved to
the recycle bin from the current directory are permanently deleted.
Example
# Delete the file test.txt that is moved to the recycle bin from the directory test in
the root directory of flash:.
<HUAWEI> reset recycle-bin flash:/test/test.txt
Squeeze flash:/test/test.txt?(y/n)[n]:y
Clear file from flash will take a long time if needed...Done.
%Cleared file flash:/test/test.txt.
# Delete files that are moved to the recycle bin from the current directory.
<HUAWEI> pwd
flash:/test
<HUAWEI> reset recycle-bin
Squeeze flash:/test/backup.zip?(y/n)[n]:y
Clear file from flash will take a long time if needed...Done.
%Cleared file flash:/test/backup.zip.
Squeeze flash:/test/backup1.zip?(y/n)[n]:y
Clear file from flash will take a long time if needed...Done.
%Cleared file flash:/test/backup1.zip.
Format
rmdir remote-directory
Parameters
Parameter Description Value
remote- Specifies a directory or The value is a string of 1 to 64
directory path on the FTP server. case-insensitive characters
without spaces.
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the rmdir command to delete a specified directory from the remote
FTP server.
Precautions
● Before running the rmdir command to delete a directory, you must delete all
files and subdirectories from the directory.
● If no path is specified when you delete a subdirectory, the subdirectory is
deleted from the current directory.
● The directory is deleted from the FTP server rather than the FTP client.
Example
# Delete the directory d:/temp1 from the remote FTP server.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] rmdir d:/temp1
250 'D:\temp1': directory removed.
Function
The rmdir command deletes a specified directory from the remote SFTP server.
Format
rmdir remote-directory &<1-10>
Parameters
Views
SFTP client view
Default Level
3: Management level
Usage Guidelines
● You can configure a maximum of 10 file names in the command and separate
them using spaces and delete them at one time.
● Before running the rmdir command to delete a directory, you must delete all
files and subdirectories from the directory.
● If the directory to be deleted is not in the current directory, you must specify
the file path.
Example
# Delete the directory 1 from the current directory, and the directory 2 from the
test directory.
<HUAWEI> system-view
[HUAWEI] sftp 10.1.1.1
Please input the username:admin
Trying 10.1.1.1 ...
Press CTRL+K to abort
Enter password:
sftp-client> rmdir 1 test/2
Warning: Make sure to remove these directories? [Y/N]:y
Info: Succeeded in removing the directory /test/1.
Info: Succeeded in removing the directory /test/test/2.
Function
The rmdir command deletes a specified directory from the storage device.
Format
rmdir directory
Parameters
Parameter Description Value
directory Specifies a The value is a string of case-sensitive characters
directory or in the [ drive ] [ path ] directory format. The
directory and its absolute path length ranges from 1 to 64, while
path. the directory name length ranges from 1 to 15.
In the preceding parameter, drive specifies the
storage device name, and path specifies the
directory and subdirectory.
Characters such as ~, *, /, \, :, ', " cannot be used
in the directory name.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
● Before running the rmdir command to delete a directory, you must delete all
files and subdirectories from the directory.
● A deleted directory and its files cannot be restored from the recycle bin.
Example
# Delete the directory test from the current directory.
<HUAWEI> rmdir test
Remove directory flash:/test?(y/n)[n]:y
%Removing directory flash:/test....Done!
Format
set default ftp-directory directory
undo set default ftp-directory
Parameters
Parameter Description Value
directory Specify the default FTP The value is a string of 1 to 64 case-
working directory. sensitive characters without spaces.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the set default ftp-directory command to configure a default FTP
working directory for all FTP users at one time.
Precautions
● You can run the local-user ftp-directory command to configure an
authorized working directory for a local user.
● If you have configured the FTP working directory by running the local-user
ftp-directory command, you must use this FTP working directory.
● If no FTP working directory is specified on the device, FTP users cannot log in
to the device.
Example
# Set the default FTP working directory to flash:/.
<HUAWEI> system-view
[HUAWEI] set default ftp-directory flash:/
3.5.62 sftp
Function
The sftp command connects the device to the SSH server so that you can manage
files that are stored on the SFTP server.
Format
sftp [ -a source-address | -i interface-type interface-number ] host-ip [ port ]
[ [ prefer_kex prefer_key-exchange ] | [ prefer_ctos_cipher prefer_ctos_cipher ] |
[ prefer_stoc_cipher prefer_stoc_cipher ] | [ prefer_ctos_hmac prefer_ctos_hmac ]
| [ prefer_stoc_hmac prefer_stoc_hmac ] ] * [ -ki aliveinterval [ -kc
alivecountmax ] ]
Parameters
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
SFTP is short for SSH FTP that is a secure FTP protocol. SFTP is on the basis of
SSH. It ensures that users can log in to a remote device securely for file
management and transmission, and enhances the security in data transmission. In
addition, you can log in to a remote SSH server from the device that functions as
an SFTP client.
When the connection between the SFTP server and client fails, the SFTP client
must detect the fault in time and disconnect from the SFTP server. To ensure this,
before being connected to the server in SFTP mode, the client must be configured
with the interval and times for sending the keepalive packet when no packet is
received in reply. If the client receives no packet in reply within the specified
interval, the client sends the keepalive packet to the server again. If the maximum
number of times that the client sends keepalive packets exceeds the specified
value, the client releases the connection. By default, when no packet is received,
the function for sending keepalive packets is not enabled.
Precautions
● Enable the SFTP service on the SSH server by sftp server enable command,
before connecting the SSH server by using the SFTP command.
● You can set the source IP address to the source or destination IP address in
the ACL rule when the -a or -i parameter is specified. This shields the IP
address differences and interface status impact, and incoming and filters
outgoing packets, and implements security authentication.
● If the current listening port number is not 22, you must specify a listening
port number for logging in to the SFTP client.
● If you cannot run the sftp command successfully when you configured the
ACL on the SFTP client, or when the TCP connection fails, an error message is
displayed indicating that the SFTP client cannot be connected to the server.
● If multiple APs use the same IP address, you cannot log in to an AP using its
IP address using the stelnet command. In this case, you can run the sftp ap
command to log in to an AP using the AP ID or name.
Example
# Set keepalive parameters when the client is connected to the server in SFTP
mode.
<HUAWEI> system-view
[HUAWEI] sftp 10.164.39.223 -ki 10 -kc 4
Please input the username: client001
Trying 10.164.39.223 ...
Press CTRL+K to abort
Enter password:
sftp-client>
Function
The sftp ap command enables users to log in to a fit AP through SFTP.
Format
sftp ap { ap-name ap-name | ap-id ap-id }
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the sftp ap command to log in to a fit AP through SFTP on the AP.
You only need to specify the fit AP's name or ID but does not need to enter the fit
AP's IP address.
Pre-configuration Tasks
First-time authentication has been enabled on the SSH client using the ssh client
first-time enable command.
Example
# Use the name to log in to the fit AP through SFTP.
<HUAWEI> system-view
[HUAWEI] sftp ap ap-name area_1
The server is not authenticated. Continue to access it? (y/n)[n]:y
Save the server's public key? (y/n)[n]:y
The server's public key will be saved with the name 192.168.109.253. Please wait...
sftp-client>
Format
sftp client-source { -a source-ip-address | -i interface-type interface-number }
undo sftp client-source
Parameters
Parameter Description Value
-a source-ip- The value is
Specifies the source IP address. You are
address in dotted
advised to use the loopback interface IP
decimal
address.
notation.
-i interface-type Specifies the source interface. You are -
interface-number advised to use the loopback interface.
The IP address configured for the source
interface is the source IP address for sending
packets. If no IP address is configured for the
source interface, the FTP connection cannot
be set up.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If no source IP address is specified, the client uses the source IP address that the
router specifies to send packets. The source IP address must be configured for an
interface with stable performance. The loopback interface is recommended. Using
the loopback interface as the source interface simplifies the ACL rule and security
policy configuration. This shields the IP address differences and interface status
impact, and incoming and filters outgoing packets, and implements security
authentication.
Precautions
● You can query the source IP address or primary IP address of the source
interface for the SFTP connection on the SFTP server.
● The sftp command also configures the source IP address whose priority is
higher than that of the source IP address specified in the sftp client-source
command. If you specify source addresses in the sftp client-source and sftp
commands, the source IP address specified in the sftp command is used for
data communication. The source address specified in the sftp client-source
command applies to all SFTP connections. The source address specified in the
sftp command applies only to the current SFTP connection.
Example
# Set the source IP address of the SFTP client to 1.1.1.1.
<HUAWEI> system-view
[HUAWEI] sftp client-source -a 1.1.1.1
Info: Succeeded in setting the source address of the SFTP client to 1.1.1.1
Format
sftp server enable
undo sftp server enable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
To connect the client to the SSH server to transfer files in SFTP mode, you must
first enable the SFTP server on the SSH server.
Example
# Enable the SFTP service.
<HUAWEI> system-view
[HUAWEI] sftp server enable
Info: Succeeded in starting the SFTP server.
3.5.66 tftp
Function
The tftp command uploads a file to the TFTP server or downloads a file to the
local device.
Format
# Upload a file to the TFTP server or download a file to the local device based on
the IPv4 address
tftp [ -a source-ip-address | -i interface-type interface-number ] tftp-server { get |
put } source-filename [ destination-filename ]
Parameters
Parameter Description Value
-a source-ip- Specifies the source IP address for The value is in dotted
address connecting to the TFTP client. You decimal notation.
are advised to use the loopback
interface IP address.
-i interface-type Specifies the source interface used -
interface- by the TFTP client to set up
number connections. It consists of the
interface type and number. It is
recommended that you specify a
loopback interface.
The IP address configured for this
interface is the source IP address for
sending packets. If no IP address is
configured for the source interface,
the TFTP connection cannot be set
up.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When upgrading the system, you can run the tftp command to upload an
important file to the TFTP server or download a system software to the local
device.
Precautions
● When you run the tftp command to upload a file to the TFTP server in TFTP
mode, files are transferred in binary mode by default. The tftp does not
support the ASCII mode for file transfer.
● After specifying a source IP address, you can use this IP address to
communicate with the server and implement packet filtering to ensure data
security.
Example
# Download file vrpcfg.txt from the root directory of the TFTP server to the local
device. The IP address of the TFTP server is 10.1.1.1. Save the downloaded file to
the local device as file vrpcfg.bak.
<HUAWEI> tftp 10.1.1.1 get vrpcfg.txt flash:/vrpcfg.bak
# Upload file vrpcfg.txt from the root directory of the storage device to the
default directory of the TFTP server. The IP address of the TFTP server is 10.1.1.1.
Save file vrpcfg.txt on the TFTP server as file vrpcfg.bak.
<HUAWEI> tftp 10.1.1.1 put flash:/vrpcfg.txt vrpcfg.bak
Function
The tftp client-source command specifies the source IP address for the TFTP
client to send packets.
The undo tftp client-source command restores the default source IP address for
the TFTP client to send packets.
The default source IP address for the TFTP client to send packets is 0.0.0.0.
Format
tftp client-source { -a source-ip-address | -i interface-type interface-number }
Parameters
Parameter Description Value
-a source-ip- The value is
Specifies the source IP address of the TFTP
address in dotted
client. You are advised to use the loopback
decimal
interface IP address.
notation.
-i interface-type Source interface type and ID. You are advised -
interface-number to use the loopback interface.
The IP address configured for this interface is
the source IP address for sending packets. If
no IP address is configured for the source
interface, the TFTP connection cannot be set
up.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If no source IP address is specified, the client uses the source IP address that the
router specifies to send packets. The source IP address must be configured for an
interface with stable performance. The loopback interface is recommended. Using
the loopback interface as the source interface simplifies the ACL rule and security
policy configuration. This shields the IP address differences and interface status
impact, and incoming and filters outgoing packets, and implements security
authentication.
Precautions
● The tftp command also configures the source IP address whose priority is
higher than that of the source IP address specified in the tftp client-source
command. If you specify source addresses in the tftp client-source and tftp
commands, the source IP address specified in the tftp command is used for
data communication. The source address specified in the tftp client-source
command applies to all TFTP connections. The source address specified in the
tftp command applies only to the current TFTP connection.
● You can query the source IP address or source interface IP address specified in
the TFTP connection on the TFTP server.
Example
# Set the source IP address of the TFTP client to 1.1.1.1.
<HUAWEI> system-view
[HUAWEI] tftp client-source -a 1.1.1.1
Info: Succeeded in setting the source address of the TFTP client to 1.1.1.1.
Function
The tftp-server acl command specifies the ACL number for the local device so
that the device can access TFTP servers with the same ACL number.
The undo tftp-server acl command deletes the ACL number from the local device.
Format
tftp-server acl acl-number
Parameters
acl-number Specifies the number of the The value is an integer that ranges
basic ACL. from 2000 to 2999.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To ensure the security of the local device, you need to run the tftp-server acl
command to specify an ACL to specify TFTP servers that the local device can
access.
Precautions
● The tftp-server acl command takes effect only after you run the rule
command to configure the ACL rule. If no ACL rule is configured, the local
device can access a specified TFTP server in TFTP mode.
● The TFTP supports only the basic ACL whose number ranges from 2000 to
2999.
Example
# Allow the local device to the access the TFTP server whose ACL number is 2000.
<HUAWEI> system-view
[HUAWEI] acl 2000
[HUAWEI-acl-basic-2000] rule permit source 10.10.10.1 0
[HUAWEI-acl-basic-2000] quit
[HUAWEI] tftp-server acl 2000
3.5.69 umount
Function
The umount command unloads a storage device.
NOTE
This command is supported only by devices that support extended storage devices such as
USB.
Format
umount driver
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Run this command to unload the storage device before you remove the storage
device from the device. Otherwise, the storage device may be damaged.
Example
# Unload a USB flash drive.
3.5.70 undelete
Function
The undelete command restores a file that has been has been temporally deleted
and moved to the recycle bin.
Format
undelete { filename | devicename }
Parameters
Parameter Description Value
filename Specifies the name The value is a string of 1 to 64 case-sensitive
of a file to be characters without spaces in the [ drive ]
restored. [ path ] file name format.
In the preceding parameter, drive specifies the
storage device name, and path specifies the
directory and subdirectory.
You are advised to add : and / between the
storage device name and directory. Characters
~, *, /, \, :, ', " cannot be used in the directory
name.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the undelete command to restore a file that has been temporally
deleted and moved to the recycle bin. However, files that are permanently deleted
by running the delete or reset recycle-bin command with the /unreserved
parameter cannot be restored.
Example
# Restore file sample.bak from the recycle bin.
<HUAWEI> undelete sample.bak
Undelete flash:/sample.bak ?(y/n)[n]:y
Undeleted file flash:/sample.bak.
# Restore a file that has been moved from the root directory to the recycle bin.
<HUAWEI> undelete flash:
Undelete flash:/test.txt?(y/n)[n]:y
Undeleted file flash:/test.txt.
Undelete flash:/rr.bak?(y/n)[n]:y
Undeleted file flash:/rr.bak.
3.5.71 unzip
Function
The unzip command decompresses a file.
Format
unzip source-filename destination-filename
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can decompress files, especially log files that are stored on the storage device
and run the more command to query the file.
Precautions
● If the destination file path is specified while the file name is not specified, the
designation file name is the same as the source file name.
● The source file persists after being decompressed.
● The compressed file must be a .zip file. If a file to be decompressed is not a
zip file, the system displays an error message during decompression.
● The source file must be a single file. If you attempt to decompress a directory
or multiple files, the decompression cannot succeed.
Example
# Decompress log file syslogfile-2012-02-27-17-47-50.zip that are stored in the
syslogfile directory and save it to the root directory as file log.txt.
<HUAWEI> pwd
flash:/syslogfile
<HUAWEI> unzip syslogfile-2012-02-27-17-47-50.zip flash:/log.txt
Extract flash:/syslogfile/syslogfile-2012-02-27-17-47-50.zip to flash:/log.txt?(y/n)[n]:y
100% complete
Decompressed file flash:/syslogfile/syslogfile-2012-02-27-17-47-50.zip flash
:/log.txt.
3.5.72 user
Function
The user command changes the current FTP user when the local device is
connected to the FTP server.
Format
user user-name [ password ]
Parameters
Parameter Description Value
user-name Specifies the login The value is a string of 1 to 64 case-
password. insensitive characters without space.
password Specifies the login The value is a string of 1 to 16 case-sensitive
password. characters without space, single quotation
mark, or question mark.
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the user command to change the current user on the FTP server.
Precautions
After you run the user command to change the current user, a new FTP
connection is set up, which is the same as that you specify in the ftp command.
Example
# Log in to the FTP server using the user name tom.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] user tom
331 Password required for tom.
Enter password:
230 User logged in.
3.5.73 verbose
Function
The verbose command enables the verbose function on the FTP client.
Format
verbose
undo verbose
Parameters
None
Views
FTP client view
Default Level
3: Management level
Usage Guidelines
After the verbose function is enabled, all FTP response messages are displayed on
the FTP client.
Example
# Enable the verbose function.
<HUAWEI> ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):admin
331 Password required for admin.
Enter password:
230 User logged in.
[HUAWEI-ftp] verbose
Info: Succeeded in switching verbose on.
[HUAWEI-ftp] get h1.txt
200 Port command okay.
150 Opening ASCII mode data connection for h1.txt.
3.5.74 zip
Function
The zip command compresses a file.
Format
zip source-filename destination-filename
Parameters
Parameter Description Value
source- Specifies the The value is a string of 1 to 64 case-sensitive
filename name of a source characters without spaces in the [ drive ]
file to be [ path ] file name format.
compressed.
In the preceding parameter, drive specifies the
storage device name, and path specifies the
directory and subdirectory.
You are advised to add : and / between the
storage device name and directory. Characters
~, *, /, \, :, ', " cannot be used in the directory
name.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The following describes the drive name.
● drive indicates the storage device and is named as flash:. On the
AD9430DN-12, the storage device can also be flash1: as the primary space to
store feature files required for the attack defense function. Startup files and
configuration files can be stored only in flash:, while other files can be flexibly
stored in flash: or flash1.
The path can be an absolute path or relative path.
● flash:/my/test/ is an absolute path.
● selftest/ is related to the current working directory and indicates the selftest
directory in the current working directory.
Precautions
● If the destination file path is specified while the file name is not specified, the
designation file name is the same as the source file name.
● The source file persists after being compressed.
● Directories cannot be compressed.
Example
# Compress file log.txt that is stored in the root directory and save it to the test
directory as file log.zip.
<HUAWEI> dir
Directory of flash:/
Format
autosave interval { value | time | configuration time }
Parameters
Parameter Description Value
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Run this command to set configuration data at preset intervals. When the interval
is set, the system automatically saves the configuration data without requiring the
command delivered by the network management system. The modified data can
be saved in the storage device in real time and cannot be lost after system restart.
Precautions
● When the automatic save function is enabled, you can also run the save
command to save the system configuration data manually. When the
automatic save function is disabled, the system does not save data
automatically and you need to run the save command to save the configured
data.
● The automatic save function is disabled by default.
● After you run the autosave interval command, the frequent data save
operation affects system performance. Do not set the automatic save interval
to less than 1 hour. The automatic save interval of 24 hours or greater is
recommended.
● The automatic save function specified by the autosave interval command
cannot be enabled together with that specified by the autosave time
command.
Example
# Enable the automatic save function.
<HUAWEI> autosave interval on
System autosave interval switch: on
Autosave interval: 1440 minutes
Autosave type: configuration file
Item Description
Item Description
Format
autosave time { value | time-value }
Parameters
Parameter Description Value
time-value Indicates the automatic save time after the The value
device is enabled to automatically save system ranges from
configuration data. After this parameter is 00:00:00 to
configured, the system automatically saves the 23:59:59.
configuration data at intervals of the The default
automatic save time. value is
00:00:00.
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The system can save configuration data at preset intervals or at the preset time.
Run this command to set the automatic save time. When the time is set, the
system automatically saves the configuration data without requiring the
command delivered by the network management system. The modified data can
be saved in the storage device in real time and cannot be lost after system restart.
Precautions
● When the device is enabled to automatically save system configuration data,
the modified configuration is saved at the preset time. When the device is
disabled from automatically saving system configuration data, the system
does not save data automatically and you need to run the save command to
save the configured data.
● The automatic save function specified by the autosave time command
cannot be used with that specified by the autosave interval command.
● If data is frequently read from or written into the storage device, the lifespan
of the storage medium is reduced. You are advised to disable the automatic
save function immediately after the modified data is saved.
Example
# Enable the device to automatically save system configuration data at intervals
of the automatic save time.
<HUAWEI> autosave time on
System autosave time switch: on
Autosave time: 00:00:00
Autosave type: configuration file
Item Description
Function
The compare configuration compares whether the current configurations are
identical with the next startup configuration file.
Format
compare configuration [ configuration-file [ current-line-number save-line-
number ] ]
Parameters
Parameter Description Value
configuration-file Specifies the name of the The value is a string of 5 to
configuration file to be 64 case-sensitive characters
compared with the current without spaces.
configurations.
current-line- Specifies the line number for The value is an integer that
number comparison in the current ranges from 0 to 65535.
configuration.
save-line-number Specifies the line number for The value is an integer that
comparison in the saved ranges from 0 to 65535.
configuration.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Example
# Compare whether the current configurations are identical with the next startup
configuration file.
<HUAWEI> compare configuration
The current configuration is not the same as the next startup configuration file.
====== configuration line 14 ======
undo http server enable
#
drop illegal-mac alarm
#
vlan batch 10 to 11
#
dot1x enable
#
set transceiver-monitoring disable
====== Configuration file line 14 ======
http server enable
#
drop illegal-mac alarm
#
vlan batch 10 to 11
#
dot1x enable
#
set transceiver-monitoring disable
Format
display autosave configuration
Parameters
None
Views
All views
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Run this command when you want to check whether the function for
automatically saving configuration data is enabled, enable or disable the
automatic save function, and modify the automatic save interval or time.
Precautions
● Run the autosave time command to set the time for automatically saving
system configuration data.
● Run the autosave interval command to set the interval for automatically
saving system configuration data.
● The frequent data save operation affects the lifespan of the system storage
device. Do not set the automatic save interval to less than 1 hour. The
automatic save interval of 24 hours or greater is recommended.
Example
# Display the automatic save parameters configured in the system.
<HUAWEI> display autosave configuration
System autosave interval switch: on
Autosave interval: 120 minutes
Autosave type: configuration file
Item Description
Item Description
Function
The display current-configuration command displays the currently running
configuration.
This command does not display parameters that use default settings.
Format
display current-configuration [ configuration [ configuration-type
[ configuration-instance ] ] | interface [ interface-name | interface-type
[ interface-number ] ] ] [ feature feature-name [ filter filter-expression ] | filter
filter-expression ]
Parameters
Views
All views
Default Level
3: Management level
Usage Guidelines
To check whether the configured parameters take effect, run the display current-
configuration command. The parameters that do not take effect are not
displayed.
The command output is relevant to user configuration. The command does not
display the default configuration.
You can use a regular expression to filter the command output. For the regular
expression rules, see Filtering Command Outputs in Configuration Guide.
If the configuration is in the offline state. The offline configuration is marked with
* in the display current-configuration all and display current-configuration
inactive command output.
Example
# Display all configurations that include vlan.
<HUAWEI> display current-configuration | include vlan
vlan batch 10 77 88
port trunk allow-pass vlan 10
Format
display reset-reason
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a device resets unexpectedly, you can run this command to view the device reset
reason for further fault locating.
Example
# Display device reset reasons.
<HUAWEI> display reset-reason
The MPU frame[0] board[0]'s reset total 1, detailed information:
-- 1. 2014-09-01 00:00:06, Reset No.: 1
Reason: Reset for power off
Item Description
Reset for others The device is reset for Contact technical support
other reasons. personnel.
Reset for memory use The memory is used Check the memory usage.
out up.
Reset for power off The AP is powered off If the AP restarts repeatedly,
and then restarted, or check whether the AP power
the BT power supply supply mode matches the
mode is forcibly used. actual power supply.
Reset for kernel panic A kernel panic (KP) Contact technical support
occurs. personnel.
Reset for 11ac target The Wi-Fi chip Contact technical support
chip abnormal firmware is abnormal. personnel.
Reset for tx dma stop The TX DMA stops Contact technical support
and packet personnel.
transmission becomes
abnormal.
Reset for MFPI detect The MFPI module Contact technical support
MSC module abnormal detects an MSC personnel.
module exception.
Reset for MFPI detect The MFPI module Contact technical support
MSU module detects an MSU personnel.
abnormal module exception.
Reset for MFPI detect The MFPI module Contact technical support
KAP module abnormal detects a KAP module personnel.
exception.
Reset for license The license expires. Purchase and activate a new
expiration license.
Reset for a country The country code is Check the country code
code mismatch not supported by the configuration.
AP.
Reset for AP self- The time during which Check the reason why the AP
healing (The time the AP is offline goes offline.
during which the AP is exceeds the specified
offline exceeds the timeout threshold for
specified timeout an AP reset triggered
period for an AP reset by self-healing.
triggered by self-
healing)
Reset for slow task The system runs Check the memory usage.
switching slowly.
Reset for MFPI detect The MFPI module Contact technical support
CAP PBUF use out detects that the PBUF personnel.
for traffic forwarding
is used up.
Reset for the AC The AC license expires. Purchase and activate a new
license expires license.
Reset for the version The AP does not go Check why the AP fails to go
rollback because the online after an online online.
AP does not go online upgrade, and rolls
after the online back to the earlier
upgrade version.
VRP reset selfboard The VRP detects that Check the memory usage.
because of no memory the memory of the
MPU is insufficient.
Reset for patch get The patch status fails Contact technical support
state fail to be obtained. personnel.
Reset for patch load The patch file fails to Contact technical support
file fail be obtained. personnel.
Reset for patch The patch file fails to Contact technical support
synchronize file fail be synchronized. personnel.
Reset for CPLD self- The CPLD self-check Contact technical support
test fail fails. personnel.
Cold reset board for The CPU of a card is Contact technical support
CPU is not active not started, so the personnel.
card is cold reset.
Reset slave board for The memory size of Check the memory usage.
memsize too little the standby card is
too small, so the card
is reset.
Reset for dangerous The card is reset due Contact technical support
temperature to high temperature. personnel.
Reset for mfpi detect The MFPI module Contact technical support
fwd abnormal detects a forwarding personnel.
exception.
Reset for MSC detect The MSC module Contact technical support
PKO module abnormal detects a PKO module personnel.
exception.
Reset for ap disturbed APs are located too Increase the distance
close, causing between APs.
interference.
Reset for the number The number of soft or Contact technical support
of soft or hard failures hard failures on the personnel.
exceeding the NP chip reaches the
threshold threshold.
Format
display saved-configuration [ last | time ]
Parameters
Parameter Description Value
last Displays the system configurations saved last time. -
time Displays the recent time when the configurations are saved -
manually or automatically.
Views
All views
Default Level
3: Management level
Usage Guidelines
If the device has been started and is not working properly, run the display saved-
configuration command to check the device startup configuration in the file
specified by running the startup saved-configuration command.
Run the display saved-configuration last command to check the system
configurations saved last time in the configuration file loaded during the current
startup.
Run the display saved-configuration time command to check the last time when
the system configurations are saved.
The command output is relevant to user configuration.
Example
# Display the configuration file for the next startup.
<HUAWEI> display saved-configuration
#
sysname HUAWEI
#
http timeout 3
#
dns resolve
#
pki realm default
enrollment self-signed
#
interface GigabitEthernet0/0/1
port link-type trunk
undo lldp enable
#
interface NULL0
#
user-interface maximum-vty 15
user-interface con 0
authentication-mode password
......
Format
display schedule reboot
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
After using the schedule reboot command to configure a scheduled restart, you
can use this command to view the configuration of the scheduled restart.
Example
# Display the configuration of the scheduled restart of the device.
<HUAWEI> display schedule reboot
Info:System will reboot at 22:00:00 2013/09/17 (in 1 hours and 43 minutes).
Item Description
in hours and minutes Time span between the restart time and the current
time.
Format
display startup
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before upgrading or degrading a device, run this command to check whether the
files for next startup have been loaded. If the files have been loaded, the device
can be upgraded or degraded successfully after it is restarted. You can also run the
command to view the system software and files for current startup.
Example
# Display the names of system software for current and next startup. The
following information is displayed when the AP is a common AP.
# Display the names of system software for current and next startup. The
following information is displayed when the AP is a central AP.
<HUAWEI> display startup
Current startup system software: V200R019C00SPC200(AD9430DN-24 FAT)
Backup startup system software: V200R019C00SPC100(AD9430DN-24 FAT)
Next startup system software: V200R019C00SPC200(AD9430DN-24 FAT)
Startup saved-configuration file: flash:/vrpcfg.zip
Next startup saved-configuration file: flash:/vrpcfg.zip
Startup patch package: NULL
Next startup patch package: NULL
Current startup system software System software for the current startup
Next startup system software System software for the next startup
Format
reset saved-configuration
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Precautions
● Exercise caution and follow the instructions of the technical support personnel
when you run this command.
● If this command is run, the system checks the configuration file to be loaded
at the next startup and the existing configuration file to be deleted:
– If the two configuration files are consistent, running the reset saved-
configuration command clears the settings for both files. The default
configuration file will be used for the next startup.
– If the two configuration files are inconsistent, running the reset saved-
configuration command clears the settings for the configuration file for
the next startup, and the settings for the current configuration file are
not cleared.
– If the current configuration file is empty, and the configuration file for
the next startup is not empty, running the reset saved-configuration
command clears the settings for the configuration file for the next
startup.
– If the configuration file for the next startup is empty, and the current
configuration file is not empty, after the reset saved-configuration
command is run, the system prompts an error and no settings are
cleared.
● When a user is saving a configuration file, running the reset saved-
configuration command will not delete the existing configuration file.
● If you do not use the startup saved-configuration command to specify a
new configuration file containing correct configurations or do not save the
configuration file after running the reset saved-configuration command, the
device uses factory configurations for startup. If the device does not have
factory configurations, it uses default configurations for startup.
Example
# Clear the next startup configuration file in the storage device and cancel the
configuration file used for next startup.
<HUAWEI> reset saved-configuration
This will delete the configuration in the flash memory.
The device configurations will be erased to reconfigure. Continue? (y/n)[n]:y
Clear the configuration in the device successfully.
3.6.11 reboot
Function
The reboot command restarts the device.
Format
reboot [ fast ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command functions in the same way as a power recycle operation (power off
and then restart the device). The command enables you to restart the device
remotely.
● After the reboot command is run, if the current configuration is modified, the
system displays a message asking you whether to save the configuration
before a restart.
Info: The system is comparing the configuration, please wait................
Warning: All the configuration will be saved to the next startup configuration. Continue ? [y/n]: y
● After the reboot fast command is run, the system restarts quickly without
displaying any message and the configuration is lost.
● After the reboot fast command is run, the system displays the following
message:
Info: system is sync data now, please wait ...
Example
# Restart the device.
<HUAWEI> reboot
Format
reset factory-configuration
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If an incorrect configuration that leads to a malfunction is performed, to restore
the device to factory settings, run the reset factory-configuration command.
Precautions
After being reset to factory settings, the device does not delete the original
configuration file. If you have saved the configuration file in advance, run the
startup saved-configuration configuration-file command to specify the saved
one as the startup configuration file. Then restart the device again to restore the
original device configurations. If the configuration file is not saved before the
device is reset to factory defaults, the configuration information will be lost after
the reset is complete.
After you run the reset factory-configuration command, the configurations of
the following commands will not be reset:
● clock daylight-saving-time
● clock datetime
● clock timezone
Example
# Reset the device to factory defaults.
<HUAWEI> reset factory-configuration
Warning: All of configurations will restore to factory and restart. Continue? [y/n]:y
Format
startup patch patch-name
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To make the patch file take effect after the device restarts, run this command to
specify the patch file for next startup.
Follow-up Procedure
Run the reboot or the schedule reboot command to restart the device.
Precautions
● A patch file uses .pat as the file name extension and must be saved in the
root directory.
● If you use this command to specify another patch for next startup, the
previous patch will be overridden.
● After the patch file is specified for next startup, run the display startup
command to view the patch file.
– If the patch file for next startup is not empty, the device load the patch
automatically after next startup.
– If the patch file for next startup is empty, the device cannot load the
patch after next startup.
● After the startup patch command is run, use either of the following methods
if you do not want the specified patch package to take effect after the system
restart:
– Run the patch delete command to delete the current patch.
– Run the reset patch-configure next-startup command to clear the
patch file to be used at the next startup.
Example
# Specify the patch file for next startup.
<HUAWEI> startup patch patch.pat
Format
reset patch-configure next-startup
Parameters
Parameter Description Value
next-startup Clears the patch status and settings for the next startup. -
Views
User view
Default Level
3: Management level
Usage Guidelines
If you run the reset patch-configure next-startup command, the system clears
the settings for the next startup patch and sets the patch status to idle.
Example
# Clear the patch status and settings for the next startup.
<HUAWEI> reset patch-configure next-startup
The patch will be deleted. Continue? (y/n)[n]:y
Info: Succeeded in resetting the next-startup patch state.
3.6.15 save
Function
The save command saves the configurations to the default directory.
Format
save [ all ] [ configuration-file ]
Parameters
Parameter Description Value
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run commands to modify the current configuration of the device, but the
modified configuration will be lost after the device restarts. To enable the new
configuration to take effect after a restart, save the current configuration in the
configuration file before restarting the device.
When a series of configurations are complete and take effect, you must save the
current configuration file to the storage device.
The save configuration-file command saves the current configuration to a specific
file on the storage device. Generally, running the save configuration-file command
does not affect the current startup configuration file. If the configuration file
specified by configuration-file has the same name with the current configuration
file and the default directory is used, running the save configuration-file
command is equivalent to running the save command.
Run the save all command to save all the current configurations, including the
configurations of the boards that are not running, to the default directory.
The save all configuration-file command saves the current configuration to a
specific file on the storage device. Generally, running the save all configuration-
file command does not affect the current startup configuration file. If the
configuration file specified by configuration-file has the same name with the
current configuration file and the default directory is used, running the save all
configuration-file command is equivalent to running the save all command.
If you do not specify configuration-file when saving the configuration file for the
first time, the system asks you whether to save the configuration file as
vrpcfg.zip.
Precautions
● If you do not specify configuration-file, configurations are saved to the next
startup configuration file. You can run the display startup command to check
the name of the next startup configuration file.
● If the configuration file to be saved using this command has the same name
with the existing configuration file, the existing configuration file is rewritten.
● The configuration file name extension must be .zip or .cfg.
– .cfg: The file is saved in plain text mode. After the file is specified as the
configuration file, all commands in the file are recovered one by one
during startup.
– .zip: The .cfg file is compressed to a .zip file that occupies less space. After
being specified as the configuration file, the .zip file is decompressed to
the .cfg file and all commands in the .cfg file are recovered one by one
during startup.
Example
# Save the current configuration file to the default directory.
<HUAWEI> save
The current configuration will be written to the device. Continue?(y/n):y
It will take several minutes to save configuration file, please wait........
Configuration file had been saved successfully
Note: The configuration file will take effect after being activated
Format
schedule reboot { at time | delay interval }
undo schedule reboot
Parameters
Parameter Description Value
at time Specifies the The format of time is hh:mm YYYY-MM-DD. The
device restart restart time must be later than the current device
time. time by less than 720 hours.YYYY-MM-DD
indicates year, month, and date and is optional.
● hh indicates hour and the value ranges from 0
to 23.
● mm indicates minute and the value ranges
from 0 to 59.
● YYYY indicates year and the value ranges from
2000 to 2099.
● MM indicates month and the value ranges
from 1 to 12.
● DD indicates date and the value ranges from 1
to 31.
delay Specifies the The format of interval is hh:mm or mm. The
interval delay time delay time must be no more than 720 hours.
before the ● In hh:mm, hh indicates hour and the value
device restarts. ranges from 0 to 720 and mm indicates
minute and the value ranges from 0 to 59.
● mm indicates minute and the value ranges
from 0 to 43200.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When upgrading or restarting the device, you can configure the device to restart
at time when few services are running to minimize the impact on services.
Precautions
● If the schedule reboot at command is used to set a specific date (YYYY-MM-
DD) and the date is a future date, the device restarts at the specified time,
with an error within 1 minute. If no date is set, two situations occur: If the
specified time is later than the current time, the device restarts at the
specified time of the day. If the specified time is earlier than the current time,
the device restarts at the set time next day.
● Note that the gap between the specified date and current date must be
shorter than or equal to 720 hours If the scheduled restart has been
configured, the latest configuration overrides the previous one.
● The scheduled restart function becomes invalid when you use the clock
datetime command to set the system time to over 10 minutes later than the
restart time set by the schedule reboot command. If the time difference is
equal to or less than ten minutes, the device immediately restarts and does
not save the configuration.
● This command restarts the device at the specified time, interrupting all
services on the device. Therefore, do not use this command when the device is
running properly.
● Before restarting the device, ensure that the configuration file has been saved.
Example
# Configure the device to restart at 22:00.
<HUAWEI> schedule reboot at 22:00
Info:Reboot system at 22:00:00 2012/07/25(in 10 hours and 10 minutes) confirm?[Y
/N]:y
Format
startup saved-configuration configuration-file
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When the original configuration file cannot be used due to the software upgrade,
run the startup saved-configuration command to specify another configuration
file for next startup. The startup configuration file must be saved in the root
directory of the storage device.
Follow-up Procedure
Run the reboot or the schedule reboot command to restart the device.
Precautions
● The configuration file specified for the next startup must exist.
● The configuration file name extension must be .zip or .cfg.
– A configuration file with the file name extension .cfg is a text file, and
you can view the file content in the text file. After the file is specified as
the configuration file for next startup, the system restores all commands
in the file one by one during a startup.
– A .cfg file is compressed to a .zip file that occupies less space. After being
specified as the configuration file, the .zip file is decompressed to the .cfg
file and the system restores all commands in the .cfg file one by one
during startup.
● Users at level 3 or higher can change the configuration file used for the next
startup.
Example
# Specify the system configuration file for the next startup.
<HUAWEI> startup saved-configuration vrpcfg.cfg
This operation will take several minutes, please wait.....
Info: Succeeded in setting the file for booting system
Format
startup system-software { backup | current }
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To roll back to the backup system software, run the startup system-software
backup command to specify the backup system software for next startup. The
rollback will be complete after a device reset.
Follow-up Procedure
Run the reboot or the schedule reboot command to restart the device.
Example
# Specify the backup system software for next startup.
<HUAWEI> startup system-software backup
3.7.1 ap-mode-switch
Function
The ap-mode-switch command switches an AP's working mode.
Format
ap-mode-switch { fit | cloud }
NOTE
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To switch a Fat AP to the Fit or cloud mode, run the ap-mode-switch command.
Example
# Switch a Fat AP to the Fit mode.
<HUAWEI> system-view
[HUAWEI] ap-mode-switch fit
Warning: All the configuration will be saved to the next startup configuration.
Continue ? [y/n]: y
Warning: The system will reboot and start in fit mode of V200R019C00. Continue? [y/n]: y
Function
The ap-mode-switch check command checks whether an AP allows for switching
between a Fit AP and a Fat AP.
NOTE
Format
ap-mode-switch check
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Before switching the working mode of an AP, run this command to check whether
the AP allows for switching between the Fit AP and Fat AP. The system software of
an AP can be changed or upgraded only after the check result shows that the AP
allows for mode switching.
NOTE
If the AP does not allow for mode switching from a Fit AP to a Fat AP, run the ap-mode-
switch prepare command to configure the file system to allow for such switching.
Example
# Check whether an AP allows for switching between a Fit AP and a Fat AP.
<HUAWEI> system-view
[HUAWEI] ap-mode-switch check
Info: Ap-mode-switch check ok.
Function
The ap-mode-switch ftp command connects an AP to an FTP server to download
the system software package for AP mode switching.
Format
ap-mode-switch ftp filename server-ip-address user-name password [ port ]
AP5030DN/AP5130DN/ Yes No
AP4030DN/AP4130DN/
AP5030DN-S/
AP3030DN/AP9131DN/
AP9132DN/AP4030DN-
E/AP3010DN-V2
AP2051DN/AP2051DN- No Yes
S/AP2051DN-E/
AP5050DN-S/AP4030TN/
AP6050DN/AP6150DN/
AP2050DN/AP2050DN-
S/AP2050DN-E/
AP4050DN-E/
AP4050DN-HD/
AP7050DN-E/AP7050DE/
AP8050DN/AP8150DN/
AP8050DN-S/
AP4050DN/AP4051DN/
AP4151DN/AP4050DN-
S/AP4051DN-S/
AP8030DN/AP8130DN/
AD9430DN-24/
AD9430DN-12/
AP1050DN-S/
AD9431DN-24X/
AP4050DE-M/AP4050DE-
M-S/AP4050DE-B-S/
AP3050DE/AP7060DN/
AP2051DN-L-S/AP5510-
W-GP/AP6750-10T/
AirEngine 5760-10
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To use the FTP server to switch a Fat AP to a Fit AP or cloud AP, run this
command to switch the system software package of the AP.
Due to low security of the FTP mode, the SFTP mode (ap-mode-switch sftp) is
recommended.
Prerequisites
The system software package has been uploaded to the FTP server.
It has been confirmed that the AP allows for switching between a Fit AP and a Fat
AP by running the ap-mode-switch check command.
NOTE
Example
# Switch AP1 from a Fat AP to a Fit AP using the FTP server (192.168.1.1).
<HUAWEI> system-view
[HUAWEI] ap-mode-switch ftp AP1_V200R019C00.bin 192.168.1.1 admin admin
Warning: Switching to the upgrade-assistant-package will reboot the system. Continue? [Y/N]:y
# Switch AP2 from a Fat AP to a Fit AP using the FTP server (192.168.1.1).
<HUAWEI> system-view
[HUAWEI] ap-mode-switch fit ftp AP2_V200R019C00.bin 192.168.1.1 admin admin
Warning: All the configuration will be saved to the next startup configuration.
Continue ? [y/n]: y
Warning: The system will reboot and start in fit mode of V200R019C00. Continue? [y/n]: y
Function
The ap-mode-switch prepare command configures a Fit AP to get prepared for
switching to a Fat AP.
NOTE
Format
ap-mode-switch prepare
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Before switching a Fit AP to a Fat AP, run the ap-mode-switch check command to
check whether the Fit AP allows for switching to a Fat AP. If not, run the ap-
mode-switch prepare command to get the Fit AP prepared for switching to a Fat
AP. Then connect the Fit AP to an FTP, TFTP, or SFTP server and download the Fat
AP system software package from the server so that the Fit AP can switch to a Fat
AP.
NOTE
After the ap-mode-switch prepare command is executed, run the ap-mode-switch check
command again to ensure that the Fit AP allows for switching to a Fat AP.
Example
# Configure a Fit AP to allow for switching to a Fat AP.
<HUAWEI> system-view
[HUAWEI] ap-mode-switch prepare
Info: Prepare is ok, Use ap-mode-switch command to switch to fat ap.
Function
The ap-mode-switch sftp command connects an AP to an SFTP server to
download the system software package for AP mode switching.
Format
ap-mode-switch { fit | cloud } sftp filename server-ip-address user-name
password [ port ]
AD9430DN-24/ No Yes
AD9430DN-12/
AD9431DN-24X/
AP2051DN/AP2051DN-
S/AP2051DN-E/
AP5050DN-S/
AP4050DN/AP4051DN/
AP4151DN/AP4050DN-
S/AP4051DN-S/
AP1050DN-S/AP4030TN/
AP6050DN/AP6150DN/
AP2050DN/AP2050DN-
S/AP2050DN-E/
AP4050DN-E/
AP4050DN-HD/
AP7050DN-E/AP7050DE/
AP4051TN/AP6052DN/
AP7052DN/AP7152DN/
AP7052DE/AP8050DN/
AP8150DN/AP8050DN-
S/AP8030DN/
AP8130DN/AP8050TN-
HD/AP8082DN/
AP8182DN/AP4050DE-
M/AP4050DE-M-S/
AP4050DE-B-S/
AP3050DE/AP7060DN/
AP2051DN-L-S/AP5510-
W-GP/AP6750-10T/
AirEngine 5760-10
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To use the STP server to switch a Fat AP to a Fit AP or a cloud AP, run this
command to switch the system software package of the AP.
Prerequisites
The system software package has been uploaded to the SFTP server.
It has been confirmed that the AP allows for switching between a Fit AP and a Fat
AP by running the ap-mode-switch check command.
NOTE
Example
# Switch AP1 from a Fat AP to a Fit AP using the SFTP server (192.168.1.1).
<HUAWEI> system-view
[HUAWEI]ap-mode-switch sftp AP1_V200R019C00.bin 192.168.1.1 admin admin
Warning: Switching to the upgrade-assistant-package will reboot the system. Continue? [Y/N]:y
# Switch AP2 from a Fat AP to a Fit AP using the SFTP server (192.168.1.1).
<HUAWEI> system-view
[HUAWEI] ap-mode-switch fit sftp AP2_V200R019C00.bin 192.168.1.1 admin admin
Warning: All the configuration will be saved to the next startup configuration.
Continue ? [y/n]: y
Warning: The system will reboot and start in fit mode of V200R019C00. Continue? [y/n]: y
Function
The display paf command displays information about the product adapter file
(PAF) in the system.
Format
display paf { all | { resource | service } item-name }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
A PAF file provides only required resources and features. This command can
display all the specification information about the PAF file.
Example
# Display the value set for a resource item in the PAF file.
<HUAWEI> display paf resource PAF_LCS_NQA_SPECS_NUM_ENTRY
PAF_LCS_NQA_SPECS_NUM_ENTRY = 0, 32, 32, 0
# Display the value set for a service item in the PAF file.
<HUAWEI> display paf service PAF_LCS_BFD_BASIC_SPECS_ENABLED
PAF_LCS_BFD_BASIC_SPECS_ENABLED = 0, 1
Item Description
Item Description
Item Description
1 Service status.
● 1: enabled
● 0: disabled
Format
display patch-information
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a patch package is loaded or deleted, you can run this command to view
information about the patch package in the system, including the version and
name.
Example
# Display information about the patch package in the system.
<HUAWEI> display patch-information
Patch Package Name :flash:/AP6050DN_V200R019C00.pat
Patch Package Version :V200R019C00
The current state is:Running
******************************************************************
* The patch information, as follows *
******************************************************************
Item Description
Function
The patch delete all command deletes patches on the current system.
Format
patch delete all
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
● If you find errors in patches that have been loaded to the system, run this
command to delete the patches to prevent patch errors from affecting system
operating.
● Before loading a non-incremental patch, run this command to delete the
existing patches (if any). Otherwise, the non-incremental patch cannot be
loaded.
Example
# Delete all patches.
<HUAWEI> patch delete all
The patch will be deleted. Continue? (y/n)[n]:y
Function
The patch load command loads the patches to the patch areas in the system.
Format
patch load filename all run
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When you load a patch to the current system, the system searches the patch
package for a matching patch file according to the attributes of the patch file.
● If a matching patch file is found in the patch package, the system loads the
patch.
● If no matching patch file is found in the patch package, the system does not
load any patch.
Prerequisites
The patch package has been uploaded to the root directory of the storage device.
Before loading a patch, the system must resolve the patch package, check the
validity of the patch files in the patch package, and obtain the attributes such as
the patch type and version of the patch file.
Precautions
The patch file cannot be reloaded. When you reload a patch, the system displays
an error message.
Example
# Load the patches to the patch area of the device and run the patches directly.
<HUAWEI> patch load patch.pat all run
Function
The pki-load houp-certificate command loads a certificate to the
defaultPolicy_houp domain.
Format
pki-load houp-certificate
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command is used to load the local certificate from the preset certificates or
system software package to the defaultPolicy_houp domain to implement the
two-way authentication function of the HOUP.
Example
# Load a certificate to the defaultPolicy_houp domain.
<HUAWEI> system-view
[HUAWEI] pki-load houp-certificate
Function
The upgrade version check command checks whether the upgrade assistant
package is available before a device upgrade.
NOTE
Format
upgrade version check
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Before you upgrade a fat AP or fit AP (not by the AC), run this command to check
whether the upgrade assistant package is available. You can upgrade a fat AP or
fit AP using the available upgrade assistant package.
NOTE
If the upgrade assistant package is not available, contact technical support personnel and
update the upgrade assistant package under their guidance.
Example
# Check whether the upgrade assistant package is available.
<HUAWEI> system-view
[HUAWEI] upgrade version check
Info: Upgrade version check ok.
Format
upgrade version ftp filename server-ip-address user-name password [ port ]
[ signature signature-name ]
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To use the FTP server to upgrade a Fat AP to a Fat AP of another version, run the
upgrade version check command to check whether the upgrade assistant
package is successfully loaded. If so, run the upgrade version ftp command to
upgrade the AP.
Due to low security of the FTP mode, the SFTP mode (upgrade version sftp) is
recommended.
Prerequisites
The upgrade assistant package has been uploaded to the FTP server.
It has been confirmed that the upgrade assistant package can be used by running
the upgrade version check command.
NOTE
You need to run the command to check whether the upgrade assistant package can be
used for the AP5030DN, AP5130DN, AP4030DN, AP4130DN, AP5030DN-S, AP3030DN,
AP9131DN, AP9132DN, AP4030DN-E, and AP3010DN-V2.
Example
# Upgrade the AP version using the FTP server (192.168.1.1).
<HUAWEI> system-view
[HUAWEI] upgrade version ftp AP1_V200R019C00.bin 192.168.1.1 admin admin
NOTE
Format
upgrade version sftp filename server-ip-address user-name password [ port ]
[ signature signature-name ]
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To use the SFTP server to upgrade a Fat AP to a Fat AP of another version, run the
upgrade version check command to check whether the upgrade assistant
package is successfully loaded. If so, run the upgrade version sftp command to
upgrade the AP.
Prerequisites
The upgrade assistant package has been uploaded to the SFTP server.
It has been confirmed that the upgrade assistant package can be used by running
the upgrade version check command.
NOTE
You need to run the command to check whether the upgrade assistant package can be
used for the AP5030DN, AP5130DN, AP4030DN, AP4130DN, AP5030DN-S, AP3030DN,
AP9131DN, AP9132DN, AP4030DN-E, and AP3010DN-V2.
Example
# Upgrade the AP version using the SFTP server (192.168.1.1).
<HUAWEI> system-view
[HUAWEI] upgrade version sftp AP1_V200R019C00.bin 192.168.1.1 admin admin
Format
display http server
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can view the HTTP server information, including the status of common and
security HTTP services, port number, maximum number of users allowed to access
the HTTP server, and number of current online users.
Example
# Display information about the current HTTP server.
<HUAWEI> display http server
HTTP server status : Enabled (default: enable)
HTTP server port : 80 (default: 80)
HTTP timeout interval : 10 (default: 10 minutes)
Current online users :0
Maximum users allowed :1
HTTPS server status : Enabled (default: enable)
HTTPS server port : 443 (default: 443)
HTTPS SSL Policy : default fit-ap server policy
Web package : web.7z (default)
HTTP server permit interface :
HTTP server permit interface Interface through which users can access
the web system.
To configure this parameter, run http
server permit interface command.
Format
display http user [ username username ]
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
If username is not specified, this command displays brief information about all
current online HTTP users.
If username is specified, this command displays detailed information about the
specified current online HTTP user.
Example
# Display brief information about all current online HTTP users.
<HUAWEI> display http user
---------------------------------------------------------------------------
User Name IP Address Login Date
---------------------------------------------------------------------------
admin 192.168.0.1 2011-10-13 11:11:12+00:00
---------------------------------------------------------------------------
Total online users is 1
Item Description
Format
http acl acl-number
undo http acl
Parameters
Parameter Description Value
acl-number Specifies the ACL number. The value is an integer that ranges from
2000 to 2999.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To ensure the security of an HTTP server, you need to configure an ACL for it to
specify clients that can log in to the current HTTP server.
Precautions
● The HTTP supports the ACL whose number ranges from 2000 to 2999.
● The http acl command takes effect only after you run the rule command to
configure the ACL rule.
● After an ACL rule is modified, the HTTP server does not forcibly log out an
online user who matches the ACL rule until the user sends the next login
request.
● If the http acl command is configured several times, only the latest
configuration takes effect.
Example
# Set the ACL number to 2000 for the HTTP server.
<HUAWEI> system-view
[HUAWEI] acl 2000
[HUAWEI-acl-basic-2000] rule 1 permit source any
[HUAWEI-acl-basic-2000] quit
[HUAWEI] http acl 2000
Format
http get [ -a source-ip-address | -c count | -t timeout | -v http-version ] * url url
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The http get command detects whether the URL server is reachable. You can use
HTTP request packets to detect the following items:
● Whether the HTTP service is enabled on the URL server
● Round-trip delay in communication
● Packet loss
Example
# Check whether the HTTP service is enabled on the URL server with the URL of
http://www.example.com, and set the source IP address of outgoing HTTP packets
to 10.137.147.142, the transmission count to 5, the period for waiting for a
response packet to 100 ms, and the HTTP version number to 1.1.
<HUAWEI> system-view
Format
http server enable
undo http server enable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After running the http server enable command to enable the HTTP server, you
can use the browser to access the web NMS to manage devices.
If the web page to load does not exist, the HTTP service cannot be enabled.
Precautions
After you run the http server enable command, HTTP and HTTPS services are
both enabled. If you log in to the web platform using HTTP, the user name and
password are encrypted and transmitted through the HTTPS protocol. After user
authentication is completed, data is still transmitted using the HTTP protocol.
After you run the undo http server enable command, you disable only the HTTP
server function but not the HTTPS server function.
Example
# Enable the HTTP server.
<HUAWEI> system-view
[HUAWEI] http server enable
Function
The http server load command loads a web file.
The undo http server load command cancels loading of a specified web page file.
By default, the system loads the default web file contained in the system software
when the HTTP or HTTPS service is enabled.
Format
http server load file-name
Parameters
Parameter Description Settings
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If you need to manage and maintain devices on the graphical user interface (GUI),
configure the Web network management function. When you need to update web
file when using the Web network management function, run this command to
load web file.
Prerequisites
Before loading the web file using the http server load command, ensure that the
web file has been stored to the device; otherwise, file loading will fail.
Example
# Load the web file web_1.7z.
<HUAWEI> system-view
[HUAWEI] http server load web_1.7z
Format
http server permit interface { interface-type interface-number } &<1-5>
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To prevent unauthorized users from accessing the web platform through interfaces
on the device, run the http server permit interface command to configure
interfaces through which users can access the web platform.
Precautions
● By default, no interface is configured. Users can access the web platform
through all physical interfaces, and radio interfaces. Once a physical interface,
or a radio interface is specified, users can only access the web platform
through the specified interface.
Example
# Configure the interfaces through which users can access the web platform.
<HUAWEI> system-view
[HUAWEI] http server permit interface gigabitethernet 0/0/1
# Delete the configured interface and restore the default interfaces through which
users can access the web platform.
<HUAWEI> system-view
[HUAWEI] undo http server permit interface
Format
http server port port-number
undo http server port
Parameters
Parameter Description Value
port-number Specifies the listening port The value is 80, or an integer that
number of the HTTP server. ranges from 1025 to 55535. The
default value is 80.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
By default, the listening port number of the security HTTP server is 80. Attackers
may frequently access the default listening port, which wastes bandwidth,
deteriorates server performance, and prevents authorized users from accessing the
HTTP server through the listening port. You can run the http server port
command to specify another listening port number to prevent attackers from
accessing the listening port.
Precautions
If the http server port command is configured several times, only the latest
configuration takes effect.
Example
# Set the listening port number of the HTTP server to 1025.
<HUAWEI> system-view
[HUAWEI] http server port 1025
Format
http timeout timeout
Parameters
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
A maximum of five web users are supported at present. When the fifth web user
logs in to the HTTP server, any other user cannot log in to the HTTP server even if
any of the five users does not perform operations for a long time. The idle timeout
duration is configured to release web resources in time. To occupy web channels
for a long time, you must set the idle timeout duration to the maximum value.
Precautions
● After you run the http timeout command, the idle timeout durations are the
same for all web users who log in to the HTTP server. If the idle timeout
duration expires, a user is disconnected from the HTTP server and the HTTP
server notifies the user only after the user sends the next login request.
● If the http timeout command is configured several times, only the latest
configuration takes effect.
Example
# Set the idle timeout duration of the HTTP server to 6 minutes.
<HUAWEI> system-view
[HUAWEI] http timeout 6
Function
The cloud-mng controller command configures an IP address or URL for the SDN
controller on a device.
The undo cloud-mng controller command deletes the IP address or URL of the
SDN controller from a device.
Format
cloud-mng controller { url url-string | ip-address ip-address } port port-number
Parameters
url url-string Specifies the URL of the SDN The value is a string of 3 to
controller. Set this parameter 128 case-sensitive characters.
to the domain name To set this parameter to a
corresponding to southbound space or continuous spaces,
service IP address of the SDN enclose the value with double
controller. quotation masks (").
ip-address ip- Specifies the IPv4 address of The value is in dotted decimal
address the SDN controller. Set this notation.
parameter to the southbound
service IP address of the SDN
controller.
port port- Specifies the port number of The value is an integer that
number the SDN controller. ranges from 0 to 65535. In
most cases, the port number
of the SDN controller is
10020.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
After a device is switched to the cloud mode, it needs to register with the SDN
controller for authentication. Before registration authentication, the device needs
to use the IP address of the SDN controller to communicate with it. The device can
use DHCP to obtain the IP address of the SDN controller. You can also run the
cloud-mng controller command to configure an IP address for the SDN
controller.
Precautions
● If the device obtains the IP address of the SDN controller using DHCP and this
command is also run, the IP address obtained using DHCP is preferentially
used.
● If a URL is configured, the device uses the resolved IP address to register with
the SDN controller.
Example
# On a device, configure an IP address and a port number for the SDN controller.
<HUAWEI> system-view
[HUAWEI] cloud-mng controller ip-address 10.1.1.1 port 10020
Function
The cloud-mng register-center disable command disables the device from
proactively querying the registration center.
By default, the device working in cloud mode proactively sends query packets to
the registration center.
Format
cloud-mng register-center disable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
In cloud mode, the device sends query packets to the registration center by default
to obtain plug-and-play information such as the IP address and port number of
the SDN controller. If the plug-and-play function through the registration center is
not needed, run the cloud-mng register-center disable command to disable the
device from proactively querying the registration center.
Example
# Disable the device from proactively querying the registration center.
<HUAWEI> system-view
[HUAWEI] cloud-mng register-center disable
NOTE
Format
display alarm active-to-cloud [ esn esn-value ]
Parameters
Parameter Description Value
esn esn-value Specifies the ESN of the central AP or The value is a string of 1
an RU managed by the central AP. to 31 characters.
Only cloud central APs support this
parameter.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display alarm active-to-cloud command displays active alarms reported to
the SDN controller.
For a cloud central AP:
● If the parameter esn is specified, alarms on the specified device are displayed.
● If the parameter esn is not specified, alarms on the central AP and all its
managed RUs are displayed.
Example
# Display active alarms reported to the SDN controller on the cloud central AP.
<HUAWEI> display alarm active-to-cloud
perceived-severity:
Indeterminate 2
Minor 3
Warning 4
Major 5
Critical 6
------------------------------------------------------------------------------------------------------------------------------
------
ESN:210235396810J2000001
Active alarm information:
------------------------------------------------------------------------------------------------------------------------------
------
resource : oid=1.3.6.1.4.1.2011.6.139.16.1.1.1.2 index=[58.f9.87.5f.9c.60 (hex)]_0
alarm-type-id : equipmentAlarm
alarm-type-qualifier: hwRadioSignalEnvDeteriorationTrap
alt-resource : 0xfff32006
event-time : 2019-06-24T15:31:22Z
perceived-severity : 3
alarm-text : Jun 24 2019 15:31:22.0.1+00:00 AirEngine9700S-S-55.201 WLAN/4/
RADIO_ENV_DETERIORATE:Slot=65535;OID 1.3.6.1.4.1
.2011.6.139.16.1.1.1.2 Radio signal environment deteriorates. (APMAC=[58.f9.87.5f.9c.60 (hex)],RadioID=0,
APName=58f9-875f-9c60, PER
=0%, ConflictRate=0%, APID=1, NoiseFloor=0dBm, Reason=BadChannel, BadChannel=11)
------------------------------------------------------------------------------------------------------------------------------
------
# Display active alarms reported to the SDN controller on a common cloud AP.
<HUAWEI> display alarm active-to-cloud
perceived-severity:
Indeterminate 2
Minor 3
Warning 4
Major 5
Critical 6
------------------------------------------------------------------------------------------------------------------------------
------
Active alarm information:
------------------------------------------------------------------------------------------------------------------------------
------
resource : oid=1.3.6.1.6.3.1.1.5.3 index=[58.f9.87.5f.9b.40 (hex)]_0
alarm-type-id : equipmentAlarm
alarm-type-qualifier: linkDown
alt-resource : 0xcff02001
event-time : 2019-04-12T01:31:25Z
perceived-severity : 4
NOTE
Format
display alarm active-to-cloud sync-record
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display alarm active-to-cloud sync-record command displays the records of
active alarm synchronization between the device and SDN controller.
You can run this command to check the latest three records of active alarm
synchronization on each device based on the ESN.
Example
# Display the records of active alarm synchronization between the device and SDN
controller.
<HUAWEI> display alarm active-to-cloud sync-record
Alarm sync record between device and controller:
Time Esn Result
Item Description
Format
display cloud-mng info
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
you can run this command to view the IP address, port number, device online
status, and device online mode of the SDN controller.
Example
# Display the configuration of the SDN controller in the user view.
<HUAWEI> display cloud-mng info
------------------------------------------------------------
AP status : Online
Controller URL : -
Controller IP address : 10.1.1.1
Controller port : 10020
Controller address source: configuration
------------------------------------------------------------
Item Description
Format
display cloud-mng execute-cli-list
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view the configuration delivered by the SDN
controller on the device.
Example
# Display the configuration delivered by the SDN controller on the device in the
user view.
<HUAWEI> display cloud-mng execute-cli-list
#
Format
display cloud-mng register-center status
Parameters
None
Views
All views
Default Level
2: Configuration level
Usage Guidelines
You can run this command to view the address, port, and status of the registration
center.
Example
# Display the status of the registration center in the user view.
<HUAWEI> display cloud-mng register-center status
------------------------------------------------------------------
------------------------------------------------------------------
Item Description
Item Description
NOTE
Format
display offline roll-back-config
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The offline self-healing function of a cloud AP can prevent the AP from going
offline due to misconfigurations. The mechanism is as follows:
1. When a cloud AP stays online for a specified period of time (10 minutes by
default, which can be configured using the offline save-online-config
interval command), the cloud AP automatically saves the WAN configuration
and certificate.
2. When the cloud AP is offline for a certain period of time (10 minutes by
default, which can be configured using the offline roll-back interval
command), the AP rolls back to the saved WAN configuration and certificate
and attempts to go online again.
3. If you have applied for a CA certificate for the cloud AP, run the offline roll-
back-certificate disable command to disable certificate rollback. Upon
offline self-healing, the cloud AP continues to use the user-defined certificate
to perform two-way authentication with SDN controller.
4. To check the offline self-healing configuration, run the display offline roll-
back-config command.
Example
# Display the configuration for the offline self-healing function for a cloud AP.
Item Description
Format
display offline self-healing-reset configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display offline self-healing-reset configuration command displays the
configuration for the self-healing function for an offline AP.
Example
# Display the configuration for the self-healing function for an offline AP.
Item Description
Format
management-vlan vlan-id
undo management-vlan
Parameters
Parameter Description Value
Views
WAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a cloud AP goes online, its management VLAN is uniformly changed by the
SDN controller. If the cloud AP fails to go online or is not managed by the SDN
controller, you can run this command to change its management VLAN. Create a
VLAN before changing the management VLAN of a cloud AP.
Example
# Configure VLAN 100 as the management VLAN of a cloud AP.
<HUAWEI> system-view
[HUAWEI] interface wan0
[HUAWEI-WAN] management-vlan 100
NOTE
Format
offline roll-back interval interval
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The offline self-healing function of a cloud AP can prevent the AP from going
offline due to misconfigurations. The mechanism is as follows:
1. When a cloud AP stays online for a specified period of time (10 minutes by
default, which can be configured using the offline save-online-config
interval command), the cloud AP automatically saves the WAN configuration
and certificate.
2. When the cloud AP is offline for a certain period of time (10 minutes by
default, which can be configured using the offline roll-back interval
command), the AP rolls back to the saved WAN configuration and certificate
and attempts to go online again.
3. If you have applied for a CA certificate for the cloud AP, run the offline roll-
back-certificate disable command to disable certificate rollback. Upon
offline self-healing, the cloud AP continues to use the user-defined certificate
to perform two-way authentication with SDN controller.
4. To check the offline self-healing configuration, run the display offline roll-
back-config command.
Example
# Set the interval between the time when a cloud AP goes offline and the time
when the AP rolls back its configuration to 15 minutes.
NOTE
Format
offline roll-back-certificate disable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The offline self-healing function of a cloud AP can prevent the AP from going
offline due to misconfigurations. The mechanism is as follows:
1. When a cloud AP stays online for a specified period of time (10 minutes by
default, which can be configured using the offline save-online-config
interval command), the cloud AP automatically saves the WAN configuration
and certificate.
2. When the cloud AP is offline for a certain period of time (10 minutes by
default, which can be configured using the offline roll-back interval
command), the AP rolls back to the saved WAN configuration and certificate
and attempts to go online again.
3. If you have applied for a CA certificate for the cloud AP, run the offline roll-
back-certificate disable command to disable certificate rollback. Upon
offline self-healing, the cloud AP continues to use the user-defined certificate
to perform two-way authentication with SDN controller.
4. To check the offline self-healing configuration, run the display offline roll-
back-config command.
Example
# Disable a cloud AP from rolling back its certificate during offline self-healing.
NOTE
Format
offline save-online-config interval interval
Parameters
interval Specifies the interval between the time The value is an integer
when a cloud AP goes online and the time that ranges from 10 to
when the AP automatically saves its 600.
configuration, in minutes.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The offline self-healing function of a cloud AP can prevent the AP from going
offline due to misconfigurations. The mechanism is as follows:
1. When a cloud AP stays online for a specified period of time (10 minutes by
default, which can be configured using the offline save-online-config
interval command), the cloud AP automatically saves the WAN configuration
and certificate.
2. When the cloud AP is offline for a certain period of time (10 minutes by
default, which can be configured using the offline roll-back interval
command), the AP rolls back to the saved WAN configuration and certificate
and attempts to go online again.
3. If you have applied for a CA certificate for the cloud AP, run the offline roll-
back-certificate disable command to disable certificate rollback. Upon
offline self-healing, the cloud AP continues to use the user-defined certificate
to perform two-way authentication with SDN controller.
4. To check the offline self-healing configuration, run the display offline roll-
back-config command.
Example
# Set the interval between the time when a cloud AP goes online and the time
when the AP automatically saves its configuration to 15 minutes.
NOTE
Format
offline self-healing-reset disable
Parameters
None
Views
System view
Default Level
3: Management level
Usage Guidelines
By default, after a cloud AP is offline from SDN controller for 24 hours, the AP will
self-heal and restart for fault recovery if no STA or administrator user is connected
to it.
Example
# Disable the self-healing function for an offline AP.
<HUAWEI> system-view
[HUAWEI] offline self-healing-reset disable
After reset for self-healing is disabled, if the device is offline for more than
24 hours, the device will not restart for self-healing. Continue? [Y/N]: y
The undo offline self-healing-reset timeout command restores the default time
threshold for self-healing upon disconnection of a cloud AP.
NOTE
Format
offline self-healing-reset timeout time
Parameters
Parameter Description Value
time Specifies the time threshold for The value is an integer ranging
self-healing upon disconnection, from 6 to 168. The default value
in hours. is 24.
Views
System view
Default Level
3: Management level
Usage Guidelines
By default, after a cloud AP is offline from SDN controller for 24 hours, the AP will
self-heal and restart for fault recovery if no STA or administrator user is connected
to it.
Example
# Set the time threshold for self-healing upon disconnection to 10 hours.
<HUAWEI> system-view
[HUAWEI] offline self-healing-reset timeout 10
Succeeded in setting the timeout period for an AP reset triggered by self-healing to 10 hours.
Format
interface wan0
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To perform deployment configurations for a cloud AP, run this command to enter
the WAN view.
Example
# Display the WAN view.
<HUAWEI> system-view
[HUAWEI] interface wan0
[HUAWEI-WAN]
Function
The ip address command configures the IP address, subnet mask, and default
gateway address for a cloud AP's management VLANIF interface.
The undo ip address command deletes the IP address, subnet mask, and default
gateway address of a cloud AP's management VLANIF interface.
By default, no IP address, subnet mask, or default gateway address is configured
for a cloud AP's management VLANIF interface.
Format
ip address ip-address { mask-length | mask } [ gateway gateway ]
undo ip-address
Parameters
Parameter Description Value
mask-length Specifies the IPv4 mask length The value is an integer that
of a cloud AP. ranges from 0 to 32.
Views
WAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure an IP address for a cloud AP's management VLANIF interface to
enable the cloud AP to communicate with the SDN controller. If the dhcp-client
enable command is also executed, the new configuration takes effect.
Example
# Set IPv4 address of a cloud AP's management VLANIF interface to
192.168.1.123/24 and the gateway address to 192.168.1.254.
<HUAWEI> system-view
[HUAWEI] interface wan0
[HUAWEI-WAN] ip address 192.168.1.123 255.255.255.0 gateway 192.168.1.254
The undo dns server command deletes the IP address of a DNS server.
Format
dns-server ip-address1 [ ip-address2 ]
Parameters
Parameter Description Value
Views
WAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A cloud AP sends a request to the primary DNS server to apply for a domain
name. If the AP does not receive any response within a specified period of time, it
sends the request again. If there is still no response from the primary DNS server
after it sends the request for a specified number of times, the cloud AP sends the
request to the secondary DNS server.
Example
# Configure IP addresses of the primary and secondary DNS servers to
192.168.1.11 and 192.168.1.147, respectively.
<HUAWEI> system-view
[HUAWEI] interface wan0
[HUAWEI-WAN] dns-server 192.168.1.11 192.168.1.147
Function
The dhcp-client enable command enables a cloud AP to automatically obtain an
IP address in the management VLAN.
The undo dhcp-client enable command disables a cloud AP from automatically
obtaining an IP address in the management VLAN.
By default, a cloud AP automatically obtains an IP address in management VLAN
1.
Format
dhcp-client enable
undo dhcp-client enable
Parameters
None
Views
WAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Enable a cloud AP to automatically obtain an IP address in management VLAN
100.
<HUAWEI> system-view
[HUAWEI] management-vlan 100
[HUAWEI] interface wan0
[HUAWEI-WAN] dhcp-client enable
Function
The pppoe-client command enables the PPPoE dialup function and configures
account information.
The undo pppoe-client command disables the PPPoE dialup function and deletes
PPPoE dialup account information.
By default, the PPPoE dialup function is disabled and no PPPoE dialup account
information is configured.
Format
pppoe-client username user-name password cipher password
undo pppoe-client
Parameters
Views
WAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
Example
# Enable the PPPoE dialup function, and configure the user name test and
password test@123.
<HUAWEI> system-view
[HUAWEI] interface wan0
[HUAWEI-WAN] pppoe-client username test password cipher test@123
The default username and password are available in WLAN Default Usernames
and Passwords (Enterprise Network or Carrier). If you have not obtained the
access permission of the document, see Help on the website to find out how to
obtain it.
Format
temporary-management psk psk-value
undo temporary-management psk
Parameters
Parameter Description Value
Views
AP system profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Using the default password of an offline management VAP poses security risks.
You can run the temporary-management psk command to change the default
password.
Example
# Configure the password for an offline management VAP as a1234567.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI] ap-system-profile name default
[HUAWEI-wlan-ap-system-prof-default] temporary-management psk a1234567
The default username and password are available in WLAN Default Usernames
and Passwords (Enterprise Network or Carrier). If you have not obtained the
access permission of the document, see Help on the website to find out how to
obtain it.
Format
temporary-management psk psk-value
undo temporary-management psk
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Using the default password of an offline management VAP poses security risks.
You can run the temporary-management psk command to change the default
password.
Example
# Configure the password for an offline management VAP as a1234567.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] temporary-management psk a1234567
Format
display cpu-usage
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
CPU usage is an important index to evaluate device performance. A high CPU
usage will cause service faults. You can use the display cpu-usage command to
view CPU usage to check whether devices are working properly.
Example
# Display the CPU usage on the device.
<HUAWEI> display cpu-usage
CPU Usage Stat. Cycle: 30 (Second)
CPU Usage: 2.4% Max: 90.2%
CPU Usage Stat. Time : 2014-01-08 05:29:48
CPU Usage Max. Time : 2014-01-07 15:26:41
CPU Usage Stat. Time Time when the latest CPU usage
statistics are collected.
CPU Usage Max. Time Time when the CPU usage reaches the
maximum.
Function
The display cpu-usage configuration command displays CPU usage
configuration.
Format
display cpu-usage configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays the alarm threshold and recovery threshold.
● When CPU usage reaches the alarm threshold, the system generates a CPU
usage alarm.
● When CPU usage falls within the recovery threshold, the system generates a
clear alarm.
Example
# Display CPU usage configuration of the main control board.
<HUAWEI> display cpu-usage configuration
The CPU usage monitor is turned on.
The current monitor cycle is 10 seconds.
The current monitor warning threshold is 80%.
The current monitor restore threshold is 75%.
Item Description
The current monitor warning threshold Alarm threshold. To set the CPU usage
alarm threshold, use the set cpu-
usage threshold threshold-value
command.
The current monitor restore threshold Alarm recovery threshold. To set the
CPU usage alarm recovery threshold,
use the set cpu-usage threshold
threshold-value restore restore-
threshold-value command.
Format
display cpu-usage history [ 24hour | 72hour ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
CPU usage is an important indicator to evaluate device performance. A high CPU
usage will cause service faults. You can use this command to view historical CPU
usages on a device, which help you local service faults.
This command displays CPU usages in the latest 8640 monitoring cycles. You can
run the set cpu-usage cycle command in the diagnostic view to set the CPU
usage monitoring cycle.
When the parameter [ 24hour | 72hour ] is not specified, the CPU usages during
the last 1 hour is displayed.
Example
# Display historical CPU usages.
<HUAWEI> display cpu-usage history
100%|
95%|
90%|
85%|
80%|
75%|
70%|
65%|
60%|
55%|
50%|
45%|
40%|
35%|
30%|
25%|
20%|
15%|
10%| * *
5%|*** ******************************* ************************************************************************************
--------------------------------------------------------------------------------------------------------------------------
0 15 30 45 60
(minutes)
Function
The display diagnostic-information command displays diagnostic information on
the device, or stores diagnostic information to a specified file.
Format
Common AP:
Central AP:
Parameters
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When a fault occurs in the system, you can use the display diagnostic-
information command to collect diagnostic information for fault location.
If you do not specify the parameters ap, and sta, the command displays diagnostic
information about all devices. If you specify a parameter (ap, or sta), the
command displays diagnostic information about the specified parameter.
Precautions
● If this command displays a long output, press Ctrl+C to abort this command.
● This command displays diagnostic information, which helps locate faults but
may affect system performance. For example, CPU usage may become high.
Therefore, do not use this command when the system is running properly.
● Running the display diagnostic-information command simultaneously on
multiple terminals connected to the device is prohibited. This is because CPU
usage of the device may obviously increase and the device performance may
be degraded.
● When you run this command, the device obtains or uses some personal data
of users, such as the STA MAC address. Delete the personal data immediately
after the command is executed to ensure user data security.
● The command output does not support split-screen display.
Example
# Display diagnostic information about the device.
<HUAWEI> display diagnostic-information
===================================================
===============display version===============
===================================================
......
Function
The display elabel command displays the electronic label of a device.
Format
display elabel [ slot-id ] [ brief ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Electronic labels identify information about hardware components of a device. You
can use the display elabel command to view electronic label information.
Example
# Display brief information about the electronic label of the card in slot 0.
<HUAWEI> display elabel 0 brief
It is executing, please wait...
[Slot_0]
/$[Board Integration Version]
/$BoardIntegrationVersion=3.0
[Main_Board]
/$[ArchivesInfo Version]
/$ArchivesInfoVersion=3.0
[Board Properties]
BoardType=AP5030DN
BarCode=210235419610CB000473
Item=02354196
Description=Assembling Components,AP5030DN,AP5030DN Mainframe(11ac,General AP In
door,3x3 Double Frequency,Built-in Antenna,No AC/DC adapter)
Manufactured=2014-03-08
VendorName=Huawei
IssueNumber=00
CLEICode=
BOM=
[Rack_1]
[SubRack_0]
[Slot_0]
/$[Board Integration Version]
/$BoardIntegrationVersion=3.0
[Main_Board]
/$[ArchivesInfo Version]
/$ArchivesInfoVersion=3.0
[Board Properties]
BoardType=AP5030DN
BarCode=210235419610CB000473
Item=02354196
Description=Assembling Components,AP5030DN,AP5030DN Mainframe(11ac,General AP In
door,3x3 Double Frequency,Built-in Antenna,No AC/DC adapter)
Manufactured=2014-03-08
VendorName=Huawei
IssueNumber=00
CLEICode=
BOM=
Item Description
Format
display esn
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
An ESN uniquely identifies a device.
Example
# Display the ESN of the device.
<HUAWEI> display esn
ESN of device: **********P0B4000046
5.1.7 display sn
Function
The display sn command displays serial number (SN) information of components
on a device.
Format
display sn [ license | all | interface [ interface-type interface-number ] |
[ interface ] abnormal ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display sn command to view the SNs of the device, optical
module, and device components, which facilitates device management.
Example
# Display the SNs of all components on a device.
<HUAWEI> display sn all
Equipment SN(ESN): **********8SJ8002998
License ESN: --
Slot Sub Type SN P/N
---------------------------------------
0 - AP2051DN **********8SJ8002998 50083572N
SN SN of a component.
Port Interface.
Item Description
Function
The display fan command displays the fan status.
NOTE
Format
display fan [ slot slot-id | verbose ]
Parameters
Parameter Description Value
verbose Displays -
detailed status
information
about the fan.
Views
All views
Default Level
2: Configuration level
Usage Guidelines
Devices can run properly when fans are working properly. If proper heat
dissipation cannot be ensured for devices, devices may overheat, damaging the
hardware. You can use the display fan command to view the fan status.
Example
# Display the fan status of the device.
<HUAWEI> display fan
Slot 0: Fan 1 is normal.
NOTE
Function
The display health command displays the health status of a device.
Format
display health
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
You can run this command to check the information about a device, including the
device temperature, CPU usage, memory usage, and storage medium usage.
Example
# Check the health status of a device.
<HUAWEI> display health
--------------------------------------------------------------------------------
Slot Card Sensor No. SensorName Status Upper Lower Temperature.(C)
--------------------------------------------------------------------------------
0 - 1 AP5030DN TEMP NORMAL 102 -13 48
--------------------------------------------------------------------------
PowerNo Present Mode State Current(A) Voltage(V) Power(W)
--------------------------------------------------------------------------
Info:The device does not support power display!
System CPU Usage Information:
System cpu usage at 2005-08-21 22:40:43 460 ms
-------------------------------------------------------------------------------
SlotID CPU Usage Upper Limit
-------------------------------------------------------------------------------
0 20% 80%
System Memory Usage Information:
System memory usage at 2005-08-21 22:40:43 480 ms
-------------------------------------------------------------------------------
SlotID Total Memory(MB) Used Memory(MB) Used Percentage Upper Limit
-------------------------------------------------------------------------------
0 91 50 55% 90%
System Disk Usage Information:
System disk usage at 2005-08-21 22:40:43 580 ms
-------------------------------------------------------------------------------
SlotID Device Total Memory(MB) Used Memory(MB) Used Percentage Upper Limit
-------------------------------------------------------------------------------
0 flash: 6 0 8% 90%
Item Description
Function
The display memory-usage command displays the memory usage of a device.
Format
display memory-usage
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Memory usage is an important metric to evaluate device performance. High
memory usage may cause service faults. You can run the display memory-usage
command to view the real-time memory usage to check whether the device is
running properly.
The memory usage displayed in the command output indicates the proportion of
the memory actually occupied by running processes to the total available memory
of system processes.
Example
# Check the memory usage on the current active MPU.
<HUAWEI> display memory-usage
Memory utilization statistics at 2013-02-26 11:03:59 413 ms
System Total Memory Is: 14749912 kbytes
Total Memory Used Is: 649924 kbytes
Memory Using Percentage Is: 4%
Item Description
Format
display memory-usage threshold
Parameters
None
Views
All views
Default Level
2: Configuration level
Usage Guidelines
You can view the memory usage alarm threshold to learn about the conditions for
triggering alarms.
● When memory usage reaches the alarm threshold, the system generates an
alarm.
● When memory usage falls within the alarm threshold, the system generates a
clear alarm.
Example
# Display the memory usage threshold of the device.
<HUAWEI> display memory-usage threshold
Current memory threshold of the main board is 83%.
Item Description
Function
The display power command displays the power supply status of the device.
Format
display power
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use this command to check the status of all power supply units and their
voltage and current.
Example
# Display the power module status of the device.
<HUAWEI> display power
--------------------------------------------------------------------------
PowerNo Present Mode State Current(A) Voltage(V) Power(W)
--------------------------------------------------------------------------
PWRI YES AC Normal N/A 12 500
Function
The display temperature command displays the device temperature.
Format
display temperature { all | slot slot-id }
Parameters
Parameter Description Value
slot slot-id Displays the temperature of the The value is an integer and must
specified card. be set according to the device
configuration.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
A proper temperature range is the prerequisite for the device to run stably. A high
or low device temperature may damage the hardware. You can run this command
to view the current device temperature. When the device temperature exceeds the
upper threshold or falls below the lower threshold, the device generates an alarm
to alert you that the device temperature is abnormal.
NOTE
Example
# Display the device's temperature information.
<HUAWEI> display temperature all
--------------------------------------------------------------------------------
Slot Card Sensor No. Sensor Name Status Upper Lower Temperature.(C)
--------------------------------------------------------------------------------
0 - 1 AP5030DN TEMP NORMAL 102 -13 38
Item Description
Function
The display transceiver command displays information about the optical module
on an interface.
NOTE
Format
display transceiver [ interface interface-type interface-number ] [ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
You can run this command to view general, manufacture, and alarm information
about the optical module on an interface. If you specify verbose in the command,
diagnostic information is also displayed in the command output.
Example
# Check general information, manufacture information, and alarm information
about the optical module on a specified interface.
<HUAWEI> display transceiver interface gigabitethernet 0/0/1
GigabitEthernet0/0/1 transceiver information:
-------------------------------------------------------------
Common information:
Transceiver Type :1000_BASE_SX_SFP
Connector Type :LC
Nominal bit rate(MBits/sec) :1200
Wavelength(nm) :850
Transfer Distance(m) :0(9um),300(50um),150(62.5um)
Digital Diagnostic Monitoring :YES
Vendor Name :SumitomoElectric
Ordering Name :
-------------------------------------------------------------
Manufacture information:
Manu. Serial Number :79K056C05802
Manufacturing Date :2007-09-14
Vendor Name :SumitomoElectric
-------------------------------------------------------------
Item Description
Bias High Upper threshold for the bias current of the optical module.
Threshold(mA)
Bias Low Lower threshold for the bias current of the optical module.
Threshold(mA)
RX Power High Upper receive power threshold for the optical module.
Threshold
RX Power Low Lower receive power threshold for the optical module.
Threshold
TX Power High Upper transmit power threshold for the optical module.
Threshold
TX Power Low Lower transmit power threshold for the optical module.
Threshold
Format
display transceiver diagnosis interface [ interface-type interface-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
Before running this command to view the diagnosis parameters of an optical
module, make sure that the optical module is an enhanced one and has been
installed on the device.
Example
# Check the diagnosis parameters of the optical module installed on
GigabitEthernet0/0/1.
<HUAWEI> display transceiver diagnosis interface gigabitethernet 0/0/1
Port GigabitEthernet0/0/1 transceiver diagnostic information:
Parameter Current Low Alarm High Alarm
Type Value Threshold Threshold Status
------------- --------- --------- ---------- --------
TxPower(dBm) -4.64 0.00 0.00 abnormal
RxPower(dBm) -4.37 33.00 0.00 abnormal
Current(mA) 7.42 0.00 0.00 abnormal
Temp.(C) 30.00 0.00 0.00 abnormal
Voltage(V) 3.28 0.00 8.19 normal
Item Description
Function
The display version command displays the version of a device.
Format
display version [ slot slot-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the current software version of the device and
determine whether the device requires an upgrade.
Example
# Display the version of a device.
<HUAWEI> display version
Huawei Versatile Routing Platform Software
VRP (R) software, Version 5.130 (AP5030DN FAT V200R019C00)
Copyright (C) 2015-2017 HUAWEI TECH CO., LTD
Huawei AP5030DN Router uptime is 0 week, 1 day, 0 hour, 52 minutes
Item Description
Item Description
Function
The reset cpu-usage record command clears the maximum CPU usage.
Format
reset cpu-usage record
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Clear the maximum CPU usage.
<HUAWEI> reset cpu-usage record
Info: Succeeding in clear task CPU usage record.
Format
backup elabel file-name filename
backup elabel ftp ip-address ftp-server-address [ port-num ] file-name filename
username password
backup elabel tftp ip-address tftp-server-address file-name filename
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When electronic labels are stored on a board, use the backup elabel command to
save electronic labels to a file. This file can be saved to the storage media of the
device, to the file server. You are advised to use FTP, which is more secure.
Example
# Save electronic labels of the device to the elabel.fls file in the flash memory.
<HUAWEI> backup elabel file-name flash:/elabel.fls
# Save electronic labels of the device to FTP server 10.1.1.1. Set the FTP user name
to user and password to 123. Save electronic labels in the elabel.fls file.
<HUAWEI> backup elabel ftp ip-address 10.1.1.1 file-name elabel.fls user 123
Format
set cpu-usage threshold threshold-value [ restore restore-threshold-value ]
undo set cpu-usage threshold
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure sufficient forwarding CPU resources for the device, run the set cpu-
usage threshold command to set the alarm threshold and alarm clear threshold
of the CPU usage. When CPU resources are insufficient, the device can report an
alarm to alert you in a timely manner. When the CPU usage exceeds the alarm
threshold, the system logs the event and generates an alarm. Based on log
information, you can know the CPU usage. When the CPU usage falls within the
alarm clear threshold, the system generates a clear alarm.
Precautions
The default alarm threshold and alarm clear threshold are recommended. If the
alarm threshold is set small, the system frequently generates alarms. If the alarm
threshold is set large, you cannot learn about the CPU usage in a timely manner.
Example
# Set the alarm threshold of the CPU usage to 85%.
<HUAWEI> system-view
[HUAWEI] set cpu-usage threshold 85
# Set the alarm threshold and alarm clear threshold of the CPU usage to 85% and
80%, respectively.
<HUAWEI> system-view
[HUAWEI] set cpu-usage threshold 85 restore 80
Format
set disk-usage threshold threshold [ restore restore-threshold ]
undo set disk-usage threshold
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If the alarm clear threshold is not specified, it equals the alarm threshold minus 5.
● When the disk usage of the device exceeds the current alarm threshold, the
device generates an alarm.
● When the disk usage of the device exceeds the current alarm threshold, clear
alarm information is displayed.
Example
# Set the disk usage alarm threshold of the device to 60.
<HUAWEI> system-view
[HUAWEI] set disk-usage threshold 60
Function
The set memory-usage threshold command sets the memory usage threshold.
The undo set memory-usage threshold command restores the default memory
usage threshold.
By default:
● If the device memory is less than or equal to 128 MB, the memory usage
alarm threshold is 84%.
● If the device memory is larger than 128 MB, the memory usage alarm
threshold is 90%.
Format
set memory-usage threshold threshold-value
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use the set memory-usage threshold command to set the memory
usage threshold. When memory usage exceeds the threshold, the system logs the
event and generates an alarm. By viewing log information, you can learn about
memory usage.
Precautions
You are advised to use the default threshold. If the memory usage threshold is set
too low, the system frequently generates alarms. If the memory usage threshold is
set too high, you cannot learn about memory usage in a timely manner.
When the memory usage reaches threshold-value, the level 1 alarm
ENTITYTRAP_1.3.6.1.4.1.2011.5.25.219.2.15.1 hwMemUtilizationRising is
generated.
When the memory usage restores to (threshold-value - 3), the
ENTITYTRAP_1.3.6.1.4.1.2011.5.25.219.2.15.2 hwMemUtilizationResume alarm
is generated.
Example
# Set the memory usage threshold of the device to 85%.
<HUAWEI> system-view
[HUAWEI] set memory-usage threshold 85
Only optical ports and combo ports working in optical mode support the ALS function. Electrical
ports and combo ports working in electrical mode do not support the ALS function. For ports
supported on a device, see Hardware Structure in the corresponding Product Description.
Format
als enable
undo als enable
Parameters
None
Views
XGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
The constraints on ALS are as follows:
● Only optical interfaces support ALS. Electrical interfaces do not support ALS.
Example
# Enable ALS on interfaces XGigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] als enable
Format
als restart
Parameters
None
Views
XGE interface view, port group view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run this command to manually restart the laser of an optical module.
After the optical link recovers, the laser is started after a certain interval if the
restart mode is automatic restart. To start the laser immediately after the optical
link recovers, set the restart mode of the laser to manual restart and run the als
restart command. If this command is not executed, the laser automatically sends
a pulse after receiving a pulse from the remote end.
Prerequisites
ALS has been enabled on the interface using the als enable command and the
restart mode of the laser has been set to manual restart mode using the als
restart mode manual command.
Precautions
This command cannot be executed on an interface if the interface has been added
to an interface protection group and is in Protect state.
Example
# Restart lasers on interfaces XGigabitEthernet0/0/1 manually.
<HUAWEI> system-view
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] als enable
[HUAWEI-XGigabitEthernet0/0/1] als restart mode manual
[HUAWEI-XGigabitEthernet0/0/1] als restart
Function
The als restart mode manual command sets the mode of restarting the laser of
the optical module to manual.
The undo als restart mode manual command restores the mode of restarting the
laser of the optical module to automatic.
Format
als restart mode manual
Parameters
None
Views
XGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
The laser of an optical module works in automatic restart mode or manual restart
mode.
● In automatic restart mode, the laser sends pulses at the interval set using the
als restart pulse-interval command to detect whether the link is recovered.
The pulse width is set through the als restart pulse-width command.
● In manual restart mode, you must manually start the laser using the als
restart command so that the laser can send a pulse. The ALS pulse width is
set using the als restart pulse-width command.
If the fiber link recovery is detected in time, you can use the manual restart mode
so that the laser can send pulses immediately. Therefore, data communication can
be recovered rapidly.
Example
# Configure lasers on interfaces XGigabitEthernet0/0/1 to work in manual restart
mode.
<HUAWEI> system-view
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] als restart mode manual
Function
The als restart pulse-interval command sets the ALS pulse interval for the laser
of an optical module.
The undo als restart pulse-interval command restores the default ALS pulse
interval of the laser of an optical module.
Format
als restart pulse-interval pulse-interval
Parameters
Parameter Description Value
pulse-interval Specifies the ALS pulse The value is an integer that ranges
interval of the laser. from 100 to 20000, in seconds.
Views
XGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
In automatic restart mode, the ALS pulse interval affects the frequency of
detecting the LOS on the interface. A long ALS pulse interval is beneficial for
energy saving, but the fiber link recovery cannot be detected in a timely manner.
In contrary, a short ALS pulse interval wastes power but the fiber link recovery can
be detected immediately.
Example
# Set the ALS pulse interval of lasers on XGigabitEthernet0/0/1 to 150s.
<HUAWEI> system-view
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] als restart pulse-interval 150
Format
als restart pulse-width pulse-width
undo als restart pulse-width
Parameters
Parameter Description Value
pulse-width Specifies the ALS pulse width The value is an integer that ranges
of the laser. from 2 to 200, in seconds.
Views
XGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
The ALS pulse width refers to the period between rising edges of pulses. A short
ALS pulse width is beneficial for energy saving, but the fiber link recovery cannot
Example
# Set the ALS pulse width on interfaces XGigabitEthernet0/0/1 to 3s.
<HUAWEI> system-view
[HUAWEI] interface xgigabitethernet 0/0/1
[HUAWEI-XGigabitEthernet0/0/1] als restart pulse-width 3
Format
display als configuration slot slot-id
display als configuration interface interface-type interface-number
Parameters
Parameter Description Value
slot slot-id Displays ALS configuration in a slot with a The value is
specified slot ID. 0.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display ALS configuration on interfaces XGigabitEthernet0/0/1.
Item Description
Function
The alarm correlation-suppress enable command enables NMS-based alarm
correlation suppression.
Format
alarm correlation-suppress enable target-host ip-address securityname
securityname
undo alarm correlation-suppress enable target-host ip-address securityname
securityname
Parameters
Parameter Description Value
target-host ip- Specifies the IPv4 The value is in dotted decimal
address address of an NMS notation.
host.
securityname Specifies the security In the case of a plain text password,
securityname name displayed on the value is a string of 1 to 32 case-
the NMS host. sensitive characters, without spaces.
In the case of a cipher text password,
the value is a string of 48 to 68 case-
sensitive characters, without spaces.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
A lot of alarms are generated and then reported on a running system. If non-root-
cause alarms are unimportant, you can enable NMS-based alarm correlation
suppression to filter out non-root-cause alarms.
Prerequisites
The alarm correlation analysis has been enabled using the correlation-analyze
enable command.
Example
# Enable the alarm correlation suppression of the NMS host whose security name
is user123 and IP address is 192.168.3.1.
<HUAWEI> system-view
[HUAWEI] alarm
[HUAWEI-alarm] correlation-analyze enable
Info: Enable analyze correlation between alarms successfully
[HUAWEI-alarm] quit
[HUAWEI] alarm correlation-suppress enable target-host 192.168.3.1 securityname user123
Format
alarm-name alarm-name severity severity
undo alarm-name alarm-name severity
Parameters
Parameter Description Value
Views
Alarm view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the alarm-name severity command to change the alarm severity.
You can configure filtering conditions to allow the NMS to receive only alarms of
specified alarm severity.
Precautions
The default severity of each alarm is different. To view the default severity of an
alarm, run the undo alarm-name severity and display alarm information
commands in sequence.
Example
# Set the severity of the hwSysSlaveHDError alarm to warning.
<HUAWEI> system-view
[HUAWEI] alarm
[HUAWEI-alarm] alarm-name hwSysSlaveHDError severity warning
Format
alarm
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After running the alarm command to enter the alarm view, you can configuration
alarm management functions.
Example
# Enter the alarm view.
<HUAWEI> system-view
[HUAWEI] alarm
[HUAWEI-alarm]
Format
clear alarm active { all | sequence-number sequence-number }
Parameters
Parameter Description Value
Views
Alarm view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before collecting statistics on alarms generated on the device again, run the clear
alarm active to clear active alarms.
Precautions
After the clear alarm active command is used, all active alarms on the device are
deleted and cannot be restored.
Example
# Clear all active alarms on the device.
<HUAWEI> system-view
[HUAWEI] alarm
[HUAWEI-alarm] clear alarm active all
Format
clear event all
Parameters
None
Views
Event view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before collecting statistics on events generated on the device again, run the clear
event all to clear events.
Precautions
NOTICE
The clear event all command clears events on the device and cleared events
cannot be restored.
Example
# Clear events on the device.
<HUAWEI> system-view
[HUAWEI] event
[HUAWEI-event] clear event all
Format
correlation-analyze enable
undo correlation-analyze enable
Parameters
None
Views
Alarm view
Default Level
3: Management level
Usage Guidelines
A lot of alarms are generated in a running system and reported to the NMS. If
non-root-cause alarms are unimportant, you can run the correlation-analyze
enable command to enable alarm correlation analysis to distinguish between
root-cause alarms and non-root-cause alarms. After alarm correlation analysis is
enabled, the system analyzes types of alarms. For a non-root-cause alarm, the
system marks the sequence number of its root-cause alarm on the non-root-cause
alarm.
Example
# Enable alarm correlation analysis.
<HUAWEI> system-view
[HUAWEI] alarm
[HUAWEI-alarm] correlation-analyze enable
Info: Enable analyze correlation between alarms successfully
Function
The display alarm active command displays active alarms on the device.
Format
display alarm active
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display alarm active command to view active alarms on the
device to locate faults.
Example
# Display active alarms on the device.
<HUAWEI> display alarm active
A/B/C/D/E/F/G/H/I/J/K/L
A=Sequence, B=RootKindFlag(Independent|RootCause|nonRootCause)
C=Generating time, D=Clearing time
E=ID, F=Name, G=MIDname, H=InfoAlias, I=Level, J=State
K=Description information for locating(Para info, Reason info)
L=RootCause alarm sequence(Only for nonRootCause alarm)
1/Independent/2011-08-22 15:27:38/-/0xff8c2028/hwFanInvalid/-/-/Warning/Start/OID
1.3.6.1.4.1.2011.5.25.219.2.6.5 Fan is invalid.(Index=16397, EntityPhysicalIndex
=16397, PhysicalName="FAN Card 0/1", EntityTrapFaultID=139264)
Item Description
Item Description
Format
display alarm history
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display alarm history command to view the alarms that are
cleared or generated on the device.
Example
# Display historical alarms on the device.
<HUAWEI> display alarm history
A/B/C/D/E/F/G/H/I/J
A=Sequence, B=RootKindFlag(Independent|RootCause|nonRootCause)
C=Generating time, D=Clearing time
E=ID, F=Name, G=Level, H=State
I=Description information for locating(Para info, Reason info)
E=ID E=ID
F=Name Alarm ID
Function
The display alarm information command displays alarm configurations.
Format
display alarm information [ name alarm-name ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To view alarm configurations on the device, run the display alarm information
command.
If no alarm name is specified, information about all alarms in the system will be
displayed.
In addition, to change the severity level of an alarm, you can run the alarm-name
alarm-name severity severity command.
Example
# Display information about the LinkUp alarm.
<HUAWEI> display alarm information name linkUp
**********************************
AlarmName: linkUp
AlarmType: Resume Alarm
AlarmLevel: Critical
Suppress Period: 10s
CauseAlarmName: linkDown
Match VB Name: ifIndex
**********************************
Format
display event
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display events on the device.
<HUAWEI> display event
A/B/C/D/E/F/G/H/I/J
A=Sequence, B=RootKindFlag(Independent|RootCause|nonRootCause)
C=Generating time, D=Clearing time
E=ID, F=Name, G=Level, H=State
I=Description information for locating(Para info, Reason info)
J=RootCause alarm sequence(Only for nonRootCause alarm)
1/Independent/2011-08-29 16:36:55/-/0xc0dc2000/entConfigChange/Warning/Start/O
ID 1.3.6.1.2.1.47.2.0.1 Entity MIB change.
2/Independent/2011-08-29 16:37:32/-/0xc0dc2000/entConfigChange/Warning/Start/O
ID 1.3.6.1.2.1.47.2.0.1 Entity MIB change.
D=Clearing time Time when the event is cleared (for non-root-cause alarms
only)
E=ID Event ID
Function
The display event information command displays event configurations.
Format
display event information [ name event-name ]
Parameters
Parameter Description Value
name event- Displays the configuration of a The value is of
name specified event. If this parameter enumeration type and
is not set, configurations of all varies according to the
events are displayed. registered device type.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To view event configurations on the device, run the display event information
command.
Example
# Display registration information about the hwICLogfileNumberUpper event.
<HUAWEI> display event information name hwICLogfileNumberUpper
**********************************
EventName: hwICLogfileNumberUpper
EventType: Critical Event
EventLevel: NA
Suppress Period: 10s
Match VB Name: hwICLogFileNumber
**********************************
Item Description
Item Description
Format
delay-suppression enable
undo delay-suppression enable
Parameters
None
Views
Alarm view or event view
Default Level
2: Configuration level
Usage Guidelines
If an alarm or an event is repeatedly generated, you can run the delay-
suppression enable command to enable the reporting delay function to prevent a
large number of repeated alarms or events from being reported to the NMS in a
specified period.
Example
# Enable the alarm reporting delay function.
<HUAWEI> system-view
[HUAWEI] alarm
[HUAWEI-alarm] delay-suppression enable
Info: alarm delay suppression has already been enabled
5.4.13 event
Function
Using the event command, you can enter the event view.
Format
event
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After running the event command to enter the event view, you can configure
event management functions.
Example
# Enter the event view.
<HUAWEI> system-view
[HUAWEI] event
[HUAWEI-event]
Function
The mask interface command enables interface-based alarm suppression.
Format
mask interface interface-type interface-number
Parameters
Views
Alarm view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When a large number of LinkDown alarms are generated on the interface, you can
run the mask interface command to suppress LinkDown root-cause and non-
root-cause alarms.
Prerequisites
The correlation-analyze enable command has been executed in the alarm view
to enable alarm correlation analysis.
Example
# Enable alarm suppression on the GigabitEthernet0/0/1 interface.
<HUAWEI> system-view
[HUAWEI] alarm
[HUAWEI-alarm] correlation-analyze enable
Info: analyze correlation between alarms has already been enabled
[HUAWEI-alarm] mask interface gigabitethernet0/0/1
Function
The suppression alarm-name command sets a period after which a generated
alarm is reported. After the period is set, the alarm management module does not
send the received alarm to the NMS until the period expires. If the period is set to
0s, the alarm management module sends the alarm to the NMS without any
delay.
Format
suppression alarm-name alarm-name { cause-period cause-seconds | clear-
period clear-seconds }
undo suppression alarm-name alarm-name { cause-period | clear-period }
Parameters
Parameter Description Value
alarm-name Specifies the name of an The value is a string of 1 to 64
alarm for which the delay case-insensitive characters,
period is set. spaces not supported.
cause-period Specifies the period after The value is an integer
cause-seconds which a generated alarm is ranging from 0 to 600, in
reported. seconds.
clear-period Specifies the period after The value is an integer
clear-seconds which a generated recovery ranging from 0 to 600, in
alarm is reported. seconds.
Views
Alarm view
Default Level
2: Configuration level
Usage Guidelines
In the event that a certain alarm is repeatedly generated, you can enable delayed
alarm reporting and set a period after which the alarm is reported to prevent the
alarm from being reported during this period.
Before running the suppression alarm-name command, be sure that delayed
alarm reporting has been enabled.
After the period is set for a certain alarm:
● If no recovery alarm is generated during the period, the alarm is not reported
to the NMS until the period expires.
● If a recovery alarm is generated during this period, the alarm and its recovery
alarm are both deleted from the alarm queue and will not be reported to the
NMS.
The value of cause-period cause-seconds is irrelevant to the value of clear-period
clear-seconds. Each alarm or its recovery alarm has its own default delay period.
If the delay period is too short, alarm reporting is not efficiently delayed. If the
delay period is too long, alarm reporting is postponed and the time when the fault
occurs cannot be correctly obtained. For most alarms, the default delay period is
recommended. For common alarms, such as alarms about hardware and
environment, delayed alarm reporting is not recommended.
If the delay period is changed when an alarm is being sent, the changed delay
period takes effect on the next alarm to be sent.
Example
# Set the period of hwFileError alarm reporting delay to 5 seconds.
<HUAWEI> system-view
[HUAWEI] alarm
[HUAWEI-alarm] delay-suppression enable
[HUAWEI-alarm] suppression alarm-name hwFileError cause-period 5
Format
suppression event-name event-name period seconds
undo suppression event-name event-name period
Parameters
Parameter Description Value
Views
Event view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an event is reported repeatedly, users can use the event reporting delay
function to prevent the event from being reported to the NMS. The suppression
event-name command configures the period of delay in reporting events.
After the event reporting delay function is enabled and the period of delay is
configured, the system discards the event that is generated several times during
the delay. When the delay expires, the system reports only the first event.
Prerequisites
The event reporting delay function has been enabled using the delay-suppression
enable command.
Precautions
● Each event can be configured with a period of reporting different delay. Run
the undo suppression event-name and display event information
commands in sequence to view the default period of reporting delay.
● During event reporting, if you change the period of delay in reporting events,
the new delay takes effect on the next alarm.
Example
# Set the period of delay in reporting the event named hwICLogfileNumberUpper
to 5 seconds.
<HUAWEI> system-view
[HUAWEI] event
[HUAWEI-event] delay-suppression enable
[HUAWEI-event] suppression event-name hwICLogfileNumberUpper period 5
Function
The display binlog-buffer command displays logs recorded in the binlog buffer.
Format
display binlog-buffer [ level { emergency | error | info | warning } | module
module ]
Parameters
Parameter Description Value
level Specifies the level of logs to be
-
displayed.
emergency Displays logs of the emergency level. -
Views
All views
Default Level
3: Management level
Usage Guidelines
If [ level { emergency | error | info | warning } | module module ] are not
specified, all logs in the binlog buffer are displayed.
Example
# Display logs of the info level in the binlog buffer.
<HUAWEI> display binlog-buffer level info
2018:01:01 11:09:04/informational/0/BSP BINLOG_CfgProc_Demo: test1 for DBG_PRINT int: 0 char : A
2018:01:01 11:09:04/informational/3/WIFI BINLOG_CfgProc_Demo: test1 for DBG_PRINT int: 3425 233 233
char : C
2018:01:01 11:09:04/informational/0/BSP BINLOG_CfgProc_Demo: test1 for DBG_PRINT int: 1 char : A
2018:01:01 11:09:04/informational/3/WIFI BINLOG_CfgProc_Demo: test1 for DBG_PRINT int: 3424 233 234
char : C
Item Description
Function
The display binlog-buffer summary command displays the usage of the binlog
memory buffer.
Format
display binlog-buffer summary
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
None.
Example
# Display the usage of the binlog memory buffer.
<HUAWEI> display binlog-buffer summary
-----------------------------------------------------------------------
Buffer Id Buffer Size(KB) Used Size(KB) Free Size(KB) Log Count
1 204 0 204 0
2 204 0 204 0
3 204 0 204 0
4 204 0 204 0
5 204 0 204 0
----------------------------------------------------------------------
Item Description
Function
The display channel command displays the channel configuration.
Format
display channel [ channel-number | channel-name ]
Parameters
2 loghost loghost Log host that can receive logs, traps, and
debugging messages. By default,
information is saved on the log host in file
format for easy reference.
9 channel9 logfile Log file that can receive logs, traps, and
debugging messages. Information is saved
to the USB flash drive or SD card in file
format.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display channel command displays the channel configuration.
When using this command, note the following points:
● When channel-number or channel-name is specified, the display channel
command displays the specified channel that information passes through and
information severity.
● When channel-number or channel-name is not specified, the display channel
command displays all the channels that information passes through and
information severity.
Example
# Display the configuration of channel 0.
<HUAWEI> display channel 0
channel number: 0, channel name: console
MODU_ID NAME ENABLE LOG_LEVEL ENABLE TRAP_LEVEL ENABLE DEBUG_LEVEL
ffff0000 default Y warning Y debugging Y debugging
channel name Channel name. Table 5-22 lists default channel names.
To set the channel name, run the info-center channel
name command.
Item Description
Function
The display debugging command displays debugging messages allowed to be
sent by the device.
Format
display debugging [ interface interface-type interface-number ] [ module-
name ]
Parameters
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Debugging affects device performance. The display debugging command displays
debugging messages allowed to be sent by the AP.
Prerequisites
By default, sending debugging messages is prohibited. The debugging of a
specified module has been enabled.
Example
# Display debugging messages allowed to be sent by the AP.
<HUAWEI> debugging acl4 all
<HUAWEI> display debugging
ACL4 event debugging switch is on
ACL4 packet debugging switch is on
Format
display info-center
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display output configuration of the information center.
<HUAWEI> display info-center
Information Center: enabled
Log host:
10.1.1.1, channel number: 2, channel name: loghost
language: english, host facility: local7
Console:
channel number: 0, channel name: console
Monitor:
channel number: 1, channel name: monitor
SNMP Agent:
channel number: 5, channel name: snmpagent
Log buffer:
enabled
max buffer size: 1024, current buffer size: 512
current messages: 6, channel number: 4, channel name: logbuffer
dropped messages: 0, overwritten messages: 0
Trap buffer:
enabled
max buffer size: 1024, current buffer size: 256
current messages: 0, channel number: 3, channel name: trapbuffer
dropped messages: 0, overwritten messages: 0
Logfile:
channel number: 9, channel name: channel9, language: English
Information timestamp setting:
log - date, trap - date, debug - date
Item Description
Item Description
Format
display info-center filter-id [ id | bymodule-alias modname alias ]
Parameters
Parameter Description Value
id Displays filtered information The value is an integer that
with the specified ID. ranges from 0 to
4294967295.
Views
All views
Default Level
2: Configuration level
Usage Guidelines
ID identifies each function module for log registration. An ID filter list is the
aggregation of the shielded IDs.
If id or bymodule-alias is not specified, all information is filtered.
To prevent output of specified information, run the info-center filter-id command
to add the ID to the filtering list, and then run the display info-center filter-id
command to check whether information with this ID is filtered.
Example
# Display filtered information with ID 3246215177.
<HUAWEI> display info-center filter-id 3246215177
ID : 3246215177
Module : 6OVER4
Alias : DEL_UPTUNN_FAIL
Content : Failed to delete the UPTUNNEL entry when processing ([STRING])
. (Interface=[STRING])
Filtered Number : 0
ID : 3246215177
Module : 6OVER4
Alias : DEL_UPTUNN_FAIL
Content : Failed to delete the UPTUNNEL entry when processing ([STRING])
. (Interface=[STRING])
Filtered Number : 0
ID : 3491254537
Module : BGP
Alias : ADD_DELETED_ROUTE
Content : Add the route [STRING] that have other flags besides deleted f
lag [USHORT]
Filtered Number : 0
Item Description
Filtered Number Number of times that the log to which the log
ID corresponds is filtered.
Function
The display info-center logfile path command displays the path where log files
are saved.
Format
display info-center logfile path
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display info-center logfile path command displays the path where log files
are saved. This command is used in the following scenarios:
● The information is output to the log file.
● The save logfile command is executed to save log files to the specified path.
Example
# Display the path where log files are saved.
<HUAWEI> display info-center logfile path
Info: Logfile save path is flash:/logfile
Format
display info-center rate-limit record
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display info-center rate-limit record command to view the real-
time suppression of the log processing rate in the information center.
Example
# Display the suppression of the log processing rate in the information center.
<HUAWEI> display info-center rate-limit record
Record No.1
InfoID : 417d5000
Module : 6OVER4
Alias : DESTFAIL
Item Description
Rate limit threshold Indicates the maximum number of logs set for
the information center to process every second.
Total receive number Indicates the total number of logs that are
generated during the latest suppression period.
Total drop number Indicates the total number of logs that are
discarded during the latest suppression period.
Total send number Indicates the total number of logs that the
information center process during the latest
suppression period.
Function
The display info-center rate-limit threshold command displays the threshold of
the log processing rate (maximum number of logs that the information center can
process every second).
Format
display info-center rate-limit threshold
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display info-center rate-limit threshold command to view the
threshold of the log processing rate.
The threshold information includes the default threshold contained in the released
version, the default threshold for the specified log ID, and the threshold set
through the command lines after the system startup.
Example
# Display the threshold of the log processing rate set for the information center.
<HUAWEI> display info-center rate-limit threshold
Rate limit threshold(per second):
Module Alias Default Config
default 50 50
Item Description
Function
The display info-center statistics command displays statistics on the information
center.
Format
display info-center statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display info-center statistics command to view statistics on the
information center, including logs, traps, and debugging messages of each
module.
Example
# Display statistics on the information center.
<HUAWEI> display info-center statistics
Information statistics data:
ModuleID ModuleName LogNumber DiagLogNumber TrapNumber DebugNumber
c17d0000 6OVER4 0 0 0 0
c1500000 AAA 0 0 0 0
c06c0000 ACL 0 0 0 0
c0ef0000 ACL6 0 0 0 0
ff1e0000 ACLE 0 0 0 0
c0e70000 ADDR 0 0 0 0
ff120000 ADP_MSTP 0 0 0 0
ff2b0000 ADPIPV4 0 0 0 0
c1a80000 ANTIATTACK 0 0 0 0
c16e0000 ARP 0 0 0 0
c19d0000 ARPLINK 0 0 0 0
Item Description
Function
Using the display log command, you can query all the logs or a specified log.
Format
display log [ cli | snmp ] index index1 [ index2 ]
display log [ cli | snmp ] { all | name username } [ start-date [ start-time ] [ –
end-date [ end-time ] ] ]
Parameters
Parameter Description Value
[ start-date Sets the date and time when you start-date: The real
[ start-time ] [ – query logs by user name or query start date. Date
end-date [ end- logs of all users. format: yyyy-mm-
time ] ] ] dd.
start-time: The real
start time. Time
format: hh:mm:ss.
end-date: The real
end date. Date
format: yyyy-mm-
dd.
end-time: The real
end time. Time
format: hh:mm:ss.
Views
User view
Default Level
1: Monitoring level
Usage Guidelines
● When querying logs by name or by all, you can also query these logs by
period.
● This command can be used to query logs of the user with the level the same
as yours or lower than yours.
● Use parameters to display operation information about different users in
different periods, for example, enter all to display the logs of all users.
● When a configuration is incorrect, a fault will occur. To locate the fault, run
this command to query logs to learn about basic information, such as the
name of the user who operates the system, the IP address of the user, the
specific time when the user performs an operation, and the detailed
operations.
Example
# Query logs with indexes from 1 to 10.
<HUAWEI> display log index 1 10
---------------------------------------------------------------------------
No. UserName Domain IP-Address
4 huawei123 -- 192.168.254.225
Time: 2014-05-20 04:55:34+00:00
Cmd: system-view
---------------------------------------------------------------------------
No. UserName Domain IP-Address
3 huawei123 -- 192.168.254.225
Time: 2014-05-20 04:55:32+00:00
Cmd: log on
---------------------------------------------------------------------------
No. UserName Domain IP-Address
2 huawei123 -- 192.168.254.216
Time: 2014-05-20 04:55:19+00:00
Cmd: log on
---------------------------------------------------------------------------
No. UserName Domain IP-Address
1 huawei123 -- 192.168.254.224
Time: 2014-05-20 04:54:28+00:00
Cmd: log on
---------------------------------------------------------------------------
# Query logs of all users within the period starting at 15:10:10 on 2013-07-31 and
ending at 20:20:10 on 2013-07-31.
<HUAWEI> display log all 2013-07-31 15:10:10 - 2013-07-31 20:20:10
---------------------------------------------------------------------------
No. UserName Domain IP-Address
4 admin -- 192.168.40.1
Time: 2013-07-31 17:10:06+08:00
Cmd: log off
---------------------------------------------------------------------------
No. UserName Domain IP-Address
3 admin -- 192.168.40.1
Time: 2013-07-31 16:40:13+08:00
Cmd: diagnose
---------------------------------------------------------------------------
No. UserName Domain IP-Address
2 admin -- 192.168.40.1
Time: 2013-07-31 16:40:12+08:00
Cmd: system-view
---------------------------------------------------------------------------
No. UserName Domain IP-Address
1 admin -- 192.168.40.1
Time: 2013-07-31 16:40:10+08:00
Cmd: log on
---------------------------------------------------------------------------
Item Description
Format
display log failure
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
● When a configuration fails, or you maintain the system, run this command to
query logs about configuration failure. After this command is executed
successfully, the system displays all the logs about configuration failure on the
command line interface (CLI).
● You can query configuration failure logs of the user with the level the same as
yours or lower than yours.
Example
# Query a log about configuration failure in the system.
<HUAWEI> display log failure
---------------------------------------------------------------------------
No. UserName Domain IP-Address
56 -- 10.138.78.128
Time: 2007-08-25 16:42:10+00:00
Failure Cmd: info-center filter-id 3246215177
---------------------------------------------------------------------------
No. UserName Domain IP-Address
53 -- 10.138.78.128
Time: 2007-08-25 16:41:04+00:00
Failure Cmd: info-center filter-id 1098731530
---------------------------------------------------------------------------
No. UserName Domain IP-Address
52 -- 10.138.78.128
Time: 2007-08-25 16:40:51+00:00
Failure Cmd: undo info-center filter-id 1098731530
---------------------------------------------------------------------------
Item Description
Function
The display logbuffer command displays information recorded in the log buffer.
Format
display logbuffer [ size value | module module-name | level severity | security ] *
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
● You can use the display logbuffer log-offset offset-value size size-value
command to view specified logs in the log buffer. For example, the log buffer
has 100 logs. To view the 20th to 50th logs in the log buffer, run the display
logbuffer log-offset 20 size 30 command.
Example
# Display all the logs in the log buffer.
<HUAWEI> display logbuffer
Logging buffer configuration and contents: enabled
Allowed max buffer size: 1024
Actual buffer size: 512
Channel number: 4, Channel name: logbuffer
Dropped messages: 0
Overwritten messages: 167
Current messages: 512
Count=684)
May 10 2012 11:52:59+00:00 HUAWEI %%01DEFD/4/CPCAR_DROP_MPU(l)[11]:Some packet
s are dropped by cpcar on the MPU. (Packet-type=arp-request, Drop-
Count=684)
May 10 2012 11:42:59+00:00 HUAWEI %%01DEFD/4/CPCAR_DROP_MPU(l)[12]:Some packet
s are dropped by cpcar on the MPU. (Packet-type=arp-request, Drop-
Count=912)
May 10 2012 11:32:59+00:00 HUAWEI %%01DEFD/4/CPCAR_DROP_MPU(l)[13]:Some packet
s are dropped by cpcar on the MPU. (Packet-type=arp-request, Drop-
Count=684)
May 10 2012 11:22:59+00:00 HUAWEI %%01DEFD/4/CPCAR_DROP_MPU(l)[14]:Some packet
s are dropped by cpcar on the MPU. (Packet-type=arp-request, Drop-
Count=684)
May 10 2012 11:12:59+00:00 HUAWEI %%01DEFD/4/CPCAR_DROP_MPU(l)[15]:Some packet
s are dropped by cpcar on the MPU. (Packet-type=arp-request, Drop-
Count=684)
May 10 2012 11:08:37+00:00 HUAWEI %%01IFPDT/4/IF_STATE(l)[16]:Interface Ethern
et5/0/2 has turned into UP state.
May 10 2012 11:08:37+00:00 HUAWEI %%01IFPDT/4/IF_STATE(l)[17]:Interface Ethern
et5/0/1 has turned into UP state.
May 10 2012 11:08:37+00:00 HUAWEI %%01IFNET/4/LINK_STATE(l)[18]:The line proto
col IP on the interface Vlanif20 has entered the UP state.
May 10 2012 11:08:37+00:00 HUAWEI %%01IFNET/4/IF_STATE(l)[19]:Interface Vlanif
20 has turned into UP state.
May 10 2012 11:08:37+00:00 HUAWEI %%01IFPDT/4/IF_STATE(l)[20]:Interface Ether
net5/0/0 has turned into UP state.
May 10 2012 11:08:34+00:00 HUAWEI %%01IFNET/4/IF_ENABLE(l)[21]:Interface Gigab
itEthernet5/0/0 has been available.
May 10 2012 11:08:34+00:00 HUAWEI %%01IFNET/4/IF_ENABLE(l)[22]:Interface Ether
net5/0/7 has been available.
May 10 2012 11:08:34+00:00 HUAWEI %%01IFNET/4/IF_ENABLE(l)[23]:Interface Ether
net5/0/6 has been available.
Item Description
UP state.
May 10 2012 11:08:37+00:00 HUAWEI %%01IFNET/4/LINK_STATE(l)[3]:The line protocol IP on the interface
Vlanif20 has entered the UP state.
May 10 2012 11:08:37+00:00 HUAWEI %%01IFNET/4/IF_STATE(l)[4]:Interface Vlanif20 has turned into UP
state.
May 10 2012 11:08:37+00:00 HUAWEI %%01IFPDT/4/IF_STATE(l)[5]:Interface Ethernet5/0/0 has turned into
UP state.
May 10 2012 11:08:34+00:00 HUAWEI %%01IFNET/4/IF_ENABLE(l)[6]:Interface GigabitEthernet5/0/0 has
been available.
May 10 2012 11:08:34+00:00 HUAWEI %%01IFNET/4/IF_ENABLE(l)[7]:Interface Ethernet5/0/7 has been
available.
May 10 2012 11:08:34+00:00 HUAWEI %%01IFNET/4/IF_ENABLE(l)[8]:Interface Ethernet5/0/6 has been
available.
May 10 2012 11:08:34+00:00 HUAWEI %%01IFNET/4/IF_ENABLE(l)[9]:Interface Ethernet5/0/5 has been
available.
Format
display logfile file-name [ offset | hex ] *
Parameters
Parameter Description Value
file-name Specifies the log file name, which can The value is a string of 1 to
contain the drive and path. 64 case-insensitive
characters without spaces.
offset Displays the log file with the specified The value is an integer that
offset or byte. ranges from 0 to
2147483647.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When encountering problems, you can query log information to know about what
happened during device operation. This is helpful for fault location.
If the version saved in a log file and the version generated by the system are
different, the log file is displayed in hexadecimal notation.
The file name is generated automatically by the system. The file name extension
of the log file is *.log or *.dblg. Generally, a log file name consists of a device
name and log. For example, if the device name is HW, the log file name is HW-
log.log or HW-log.dblg.
If the size of the current log file reaches the upper limit, the system automatically
saves the current log file as a compressed file with the extension *.log.zip or
*.dblg.zip, and names the compressed log file with the device name and current
system time. When the log file exceeds the specified size, excessive information is
stored in a new log file. For example, if the last log is recorded at 06:39:58 on May
2, 2018, the log file name is HW-2018-05 -02.06-39-58.log.zip or HW-2018-05
-02.06-39-58.dblg.zip, except in the following cases:
1. The AP restarts.
2. The system time changes.
The device name can be configured using the sysname host-name command.
Precautions
If the device name contains more than 100 characters, the log file name consists
of only the first 100 characters and the time when the last log is recorded.
If the device name contains special characters (including spaces), replace the
device name with capital letter X in the log file name. - and _ are not regarded as
special characters.
Example
# Display log information saved in the log file in a specified path.
<HUAWEI> display logfile flash:/logfile/HUAWEI-log.log
################################################################
# This logfile is generated at slot 0
################################################################
Format
display trapbuffer [ size value ]
Parameters
Parameter Description Value
size value Displays the specified number of traps The value is an integer
recently generated in the trap buffer. If this that ranges from 1 to
parameter is not specified, all traps are 1024.
displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If the number of traps in the trap buffer is smaller than value, traps of the actual
number are displayed.
Example
# Display all traps in the trap buffer.
<HUAWEI> display trapbuffer
Trapping buffer configuration and contents: enabled
Allowed max buffer size: 1024
Actual buffer size: 256
Channel number: 3, Channel name: trapbuffer
Dropped messages: 0
Overwritten messages: 0
Current messages: 29
Item Description
Item Description
Table 5-34 Default association between the channel number, channel name, and
output direction of information channels
Channel Number Channel Name Output Direction
0 console Console
6 channel6 Unspecified
7 channel7 Unspecified
8 channel8 Unspecified
Format
info-center { console | logbuffer | logfile | monitor | snmp | trapbuffer }
channel { channel-number | channel-name }
undo info-center { console | logbuffer | logfile | monitor | snmp | trapbuffer }
channel
Parameters
Parameter Description Value
console Specifies the channel used to output -
information to the console.
logbuffer Specifies the channel used to output -
information to the log buffer.
logfile Specifies the channel used to output -
information to the log file.
monitor Specifies the channel used to output -
information to the user terminal.
snmp Specifies the channel used to output -
information to the SNMP agent.
trapbuffer Specifies the channel used to output -
information to the trap buffer.
channel- Specifies the channel number. The value is an integer
number ranging from 0 to 9.
channel-name Specifies the name of a channel, The value is a string of
which can be the default channel 1 to 30 case-sensitive
name or a user-defined name. characters. The value
consists of letters or
numbers and must start
with a letter.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can run the info-center channel command in the following scenarios: The
same information is sent to different directions. For example, the log file and log
host record the same content or the trap buffer and the SNMP agent record the
same content.
NOTE
For details on how to configure a channel for outputting information to a log host, see
info-center loghost.
Example
# Configure the channel used to output information to a console.
<HUAWEI> system-view
[HUAWEI] info-center console channel console
Function
The info-center channel name command names a channel with a specified
number.
The undo info-center channel command restores the default channel name.
0 console
1 monitor
2 loghost
3 trapbuffer
4 logbuffer
5 snmpagent
6 channel6
7 channel7
8 channel8
9 channel9
Format
info-center channel channel-number name channel-name
undo info-center channel channel-number
Parameters
Parameter Description Value
channel- Specifies the number The value is an integer that ranges from
number of a channel. 0 to 9. That is, the system has 10
channels.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can rename channels, which facilitates memorization and usage.
Precautions
Channel names must be unique. It is recommended that channel names represent
channel functions.
Example
# Name channel 0 execconsole.
<HUAWEI> system-view
[HUAWEI] info-center channel 0 name execconsole
Format
info-center enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
During device running, the information center records device operation. The
system outputs system information to destinations such as the log host and the
console only after the information center is enabled. Network administrators can
store and query output information to monitor device running and locate faults.
Precautions
After the undo info-center enable command is executed, logs, traps, and
debugging messages are not recorded. The log about running the undo info-
center enable command is not recorded.
Follow-up Procedure
Example
# Enable the information center.
<HUAWEI> system-view
[HUAWEI] info-center enable
Info: Information center is enabled.
Function
The info-center filter-id command configures the AP to filter a specified log or
trap.
The undo info-center filter-id command disables the AP from filtering a specified
log or trap.
Format
info-center filter-id { id | bymodule-alias modname alias } * &<1-50>
&<1-50> }
Parameters
Parameter Description Value
id Specifies the ID of the log or trap to The value is an integer
be filtered. that ranges from 0 to
NOTE 4294967295.
This parameter indicates the ID of a log.
If this parameter fails to be configured,
the log specified by this ID does not
exist.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If some logs or traps are unnecessary, configure the AP not to output the logs and
traps. When the filtering function is enabled, the information center does not send
the traps with a specified ID that satisfy the filtering condition to any channel. As
a result, the trap buffer, log file, console, terminal, or SNMP agent cannot receive
the traps with the specified ID.
An ID filter list is the aggregation of the shielded IDs and is arranged in a specified
order.
Precautions
● To add multiple IDs at a time, use a space to separate IDs. The result of each
ID is displayed.
● Currently, the AP can filter traps with a maximum of 50 IDs. If there are more
than 50 log IDs, the system displays a message indicating that the filtering
table is full. To configure the filtering function, run the undo info-center
Example
# Filter the log with the ID of 1098731530.
<HUAWEI> system-view
[HUAWEI] info-center filter-id 1098731530
Info: Succeeded in appending log ID 1098731530.
Format
info-center logbuffer [ channel { channel-number |channel-name } | size buffer-
size ] *
undo info-center logbuffer [ channel | size ]
Parameters
Parameter Description Value
size buffer-size Sets the size of the log The value is an integer
buffer. buffer-size that ranges from 0 to
specifies the number of 1024. The default value
messages stored in the is 512.
log buffer.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To view logs in the log buffer, run the info-center logbuffer command to enable
the AP to send logs to the log buffer.
Example
# Enable the AP to send logs to the log buffer.
<HUAWEI> system-view
[HUAWEI] info-center logbuffer
Format
info-center logbuffer size logbuffer-size
undo info-center logbuffer size
Parameters
Parameter Description Value
logbuffer-size Specifies the maximum The value is an integer that ranges
number of logs in the log from 0 to 1024. If logbuffer-size is 0,
buffer. logs are not displayed.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Precautions
When you run the info-center logbuffer size command multiple times, only the
latest configuration takes effect.
Example
# Set the maximum number of logs in the log buffer to 50.
<HUAWEI> system-view
[HUAWEI] info-center logbuffer size 50
Format
info-center logfile path path
Parameters
Parameter Description Value
path Specifies the path where log files are Select the path according
saved, which is in the format of storage to device configuration.
medium name:/logfile, for example,
flash:/logfile.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the info-center logfile path command to set the path where log files
are saved. Then log files are saved into the path and the file name is log.log. To
view logs generated by the AP, run the save logfile command to save logs into a
specified file or configure the AP to export information into a specified log file.
Then run the display logfile command to view the log file.
Prerequisites
The information center has been enabled by using the info-center enable
command.
Example
# Configure the flash drive as the path where log files will be saved.
<HUAWEI> system-view
[HUAWEI] info-center logfile path flash:/logfile
Format
info-center logfile size size
undo info-center logfile size
Parameters
size Specifies the log file size. The value is an integer that is 1 or 2, in
MB. The default value is 1 MB.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To configure the AP to export information to a log file, run the info-center logfile
size command to set the log file size.
Precautions
Example
# Set the log file size to 2 MB.
<HUAWEI> system-view
[HUAWEI] info-center logfile size 2
Function
The info-center loghost command configures the device to output information to
a log host.
The undo info-center loghost command disables the device from outputting
information to a log host.
Format
info-center loghost ip-address [ channel { channel-number | channel-name } |
facility local-number | language language-name | port port | transport { udp |
tcp ssl-policy policy-name } ] *
info-center loghost domain domain-name [ channel { channel-number |
channel-name } | facility local-number | language language-name | port port |
transport { udp | tcp ssl-policy policy-name } ] *
undo info-center loghost ip-address
undo info-center loghost domain domain-name
Parameters
Parameter Description Value
facility local- Specifies a syslog server facility The value ranges from
number that is used to identify the log local0 to local7. The
information source. You can use default value is local7.
this parameter to plan a local
value for the log information of a
specified device, so that the syslog
server can handle received log
information based on the
parameter.
port [ port ] Specifies the number of the port The value is an integer that
that sends logs. ranges from 1 to 65535.
The default value in UDP
transport mode is 514, the
default value in TCP
transport mode is 6514.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To query information generated on the AP deployed remotely, configure the AP to
export information to a log host so that you can view device information on the
log host. Run the info-center loghost command to configure the AP to export
information to a log host.
Example
# Configure a device to use channel 6 to output information to the log host at
10.1.1.1.
<HUAWEI> system-view
[HUAWEI] info-center loghost 10.1.1.1 channel channel6
Format
info-center loghost source interface-type interface-number
undo info-center loghost source
Parameters
Parameter Description Value
interface-type interface- Specifies the type and number of an -
number interface.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If multiple devices send log messages to the same log host, you can identify the
devices by setting different source interfaces so as to index the received log
messages.
Prerequisites
There is a reachable route between the source interface and the log host.
Example
# Specify Loopback0 IP address as the source interface address to send
information to a log host.
<HUAWEI> system-view
[HUAWEI] interface loopback 0
[HUAWEI-LoopBack0] ip address 10.1.1.1 255.255.255.0
[HUAWEI-LoopBack0] quit
[HUAWEI] info-center loghost source loopback 0
Format
info-center loghost source-port source-port
undo info-center loghost source-port
Parameters
Parameter Description Value
source-port Specifies the number of the source The value is an integer
interface through which the device sends ranging from 1025 to
information to the log host. 65535.
Views
System view
Default Level
3: Management level
Usage Guidelines
To harden system security, run the info-center loghost source-port source-port
command to change the number of the source interface through which the device
sends information to the log host.
Example
# Change the number of the source interface through which the device sends
information to the log host to 1026.
<HUAWEI> system-view
[HUAWEI] info-center loghost source-port 1026
Function
The info-center max-logfile-number command sets the maximum number of log
files to be saved.
Format
info-center max-logfile-number filenumbers
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a large number of log files exist on the device, they may occupy a large amount
of disk space. To view log files generated recently, run the info-center max-
logfile-number command to set the maximum number of log files that can be
saved.
Precautions
If the number of log files generated on the device exceeds the maximum value,
the system deletes the earliest ones so that the number of log files is not larger
than the maximum value.
The operation.log file is out of the scope for the system to count the maximum
number of log files, and therefore is not automatically deleted.
NOTICE
If the number of saved log files is larger than the default value, more system
resources are consumed. The default value is recommended. Excess log files can
be deleted manually or automatically. When the system deletes them, high CPU
usage may last for a short period.
Example
# Set the maximum number of log files to be saved to 100.
<HUAWEI> system-view
[HUAWEI] info-center max-logfile-number 100
Function
The info-center rate-limit except command prevents logs with a specified log ID
from being suppressed by the information center.
Format
info-center rate-limit except { byinfoid infoID | bymodule-alias modname
alias }
Parameters
Parameter Description Value
byinfoid infoID Specifies the log ID in The value is a string of 8
hexadecimal notation. characters. The value is in
hexadecimal notation, and the valid
characters include 0-9, a-f, and A-F.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When too many logs will never generate under a specified ID, you can run the
info-center rate-limit except command to prevent logs with the specified log ID
from being suppressed by the information center. This can avoid the impact of the
suppression of the log processing rate. After the command is run, the information
center no longer monitor logs with the specified log ID.
Example
# Prevent logs specified by the module name and mnemonic from being
suppressed by the information center.
<HUAWEI> system-view
[HUAWEI] info-center rate-limit except bymodule-alias AAA AUTHEN_ERR_EVENT
# Prevent logs specified by the log ID from being suppressed by the information
center.
<HUAWEI> system-view
[HUAWEI] info-center rate-limit except byinfoid ff011015
# Prevent logs with a specified log ID from being suppressed by the information
center.
<HUAWEI> system-view
[HUAWEI] undo info-center rate-limit except bymodule-alias AAA AUTHEN_ERR_EVENT
Function
The info-center rate-limit global-threshold command sets the total number of
logs that the information center can process every second.
Format
info-center rate-limit global-threshold value
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can run the info-center rate-limit global-threshold command to set the
maximum number of logs that the information center can process every second.
This can adjust the processing capability of the information center. If the number
of logs to be processed exceeds the processing capability of the information
center, the extra logs are discarded.
NOTE
Example
# Set the number of logs that the information center can process every second to
300.
<HUAWEI> system-view
[HUAWEI] info-center rate-limit global-threshold 300
Function
The info-center rate-limit monitor-period command sets the monitoring period
for the information center to suppress the log processing rate.
Format
info-center rate-limit monitor-period value
Parameters
Parameter Description Value
value Specifies the monitoring period The value is an integer ranging
for the information center to from 1 to 60, in seconds. The
suppress the log processing rate. default value is 3.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The info-center rate-limit monitor-period command can be used to set a
monitoring period for the information center to limit the log processing rate.
● In the monitoring period specified by value, if the rate of sending a single log
every second exceeds info-center rate-limit threshold, the information
center will limit the log processing rate.
● Then, in the monitoring period which is five times value, if the number of a
single type of logs that are sent every second is smaller than info-center
rate-limit threshold, the information center will no longer limit the log
processing rate.
Example
# Set the monitoring period for the information center to suppress the log
processing rate to 5 seconds.
<HUAWEI> system-view
[HUAWEI] info-center rate-limit monitor-period 5
Format
info-center rate-limit threshold value [ byinfoid infoID | bymodule-alias
modname alias ]
undo info-center rate-limit threshold [ value ] [ byinfoid infoID | bymodule-
alias modname alias ]
Parameters
Parameter Description Value
byinfoid infoID Specifies the log ID. The value is a string of 8 characters.
The value is in hexadecimal
notation, and the valid characters
include 0-9, a-f, and A-F.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can run the info-center rate-limit threshold command to set the maximum
number of logs with the same log ID that the information center can process
every second. The information center monitors the number of logs that are
generated every second under the same log ID. When the number of logs that are
generated every second under the same log ID exceeds the threshold during the
monitoring period, the information center decides that too many logs are
generated and thus suppresses its log processing rate by processing only the
conforming traffic (logs within the threshold) and discarding the non-conforming
traffic (logs exceeding the threshold). When the number of logs that are
generated every second under the same log ID falls below the threshold and
remains below the threshold for five monitoring periods, the information center
removes the suppression.
NOTE
By default, the information center processes a maximum of 30 logs with the same
log ID in every second. In certain application scenarios, the information center is
required to process a maximum of more than 30 logs with the same log ID in
every second. You can set thresholds for logs with different log IDs.
NOTE
Example
# Set the maximum number of logs that the information center can process every
second to 60.
<HUAWEI> system-view
[HUAWEI] info-center rate-limit threshold 60
# Set the maximum number of logs identified by the same module name and
mnemonic that the information center can process every second to 30.
<HUAWEI> system-view
[HUAWEI] info-center rate-limit threshold 30 bymodule-alias AAA AUTHEN_ERR_EVENT
# Set the maximum number of logs with the same log ID that the information
center can process every second to 20.
<HUAWEI> system-view
[HUAWEI] info-center rate-limit threshold 20 byinfoid ff011015
# Restore the maximum number of logs that the information center can process
every second to the default value.
<HUAWEI> system-view
[HUAWEI] undo info-center rate-limit threshold
# Cancel the restriction on the maximum number of logs with a specified log ID
that the information center can process every second.
<HUAWEI> system-view
[HUAWEI] undo info-center rate-limit threshold bymodule-alias AAA AUTHEN_ERR_EVENT
Format
info-center source { module-name | default } channel { channel-number |
channel-name } [ log { state { off | on } | level severity } * | trap { state { off |
on } | level severity } * | debug { state { off | on } | level severity } * ] *
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To collect and query information generated on the AP, define severities for various
types of information that is output to different channels. You can run the info-
center source channel command to configure a rule for outputting information
to a channel.
The following lists information severities.
Precautions
Each information channel has a default record with the module name default.
The default configuration for logs, traps, and debugging messages in different
channels may differ.
If a module generates a large number of logs, traps, or debugging messages in a
short time, use the following methods to suppress this information:
● Specify level severity to adjust the channel level. Information with lower
severity will be filtered.
● Specify state off to disable information sent by a specified module.
NOTICE
After the lowest severity of output information is specified, information lower than
the severity will be filtered.
Example
# Configure the device to send logs higher than or equal to warning of the CFM
module.
<HUAWEI> system-view
[HUAWEI] info-center source CFM channel snmpagent log level warning
Format
info-center statistic-suppress enable
undo info-center statistic-suppress enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In the system, service modules generate logs and control the volume of generated
logs. The information center processes the received logs.
A large number of repeated logs are generated in a short time in some scenarios,
for example, when ARP and ACL are enabled. This wastes both the storage space
and CPU resources. Generally, users do not want to view the repeated logs. You
can run the info-center statistic-suppress enable command to suppress statistics
on consecutive repeated logs so that the system can still record other logs.
Precautions
Statistics about repeatedly generated logs are first output at the 30th seconds
from the time the first log is output, and then statistics about repeatedly
generated logs are output at the 120th seconds. After being output two times,
statistics about repeatedly generated logs are output every 600 seconds.
Example
# Disable suppression of statistics about consecutive repeated logs.
<HUAWEI> system-view
[HUAWEI] undo info-center statistic-suppress enable
Function
The info-center timestamp command sets the timestamp format of logs, traps,
and debugging messages.
By default, the timestamp format of logs, traps, and debugging messages is date.
Format
info-center timestamp debugging { { date | short-date | format-date }
[ precision-time { tenth-second | second } ] | boot | none }
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The info-center timestamp command sets the timestamp format of logs, traps,
and debugging messages.
mm Month The value can be Jan, Feb, Mar, Apr, May, Jun,
Jul, Aug, Sep, Oct, Nov, or Dec.
When the precision of the timestamp is accurate to 0.1 second or milliseconds, the
system adds identifies to the logs generated at the same time based on the
sequence.
Prerequisites
The information center has been enabled by using the info-center enable
command.
Example
# Set the timestamp format of traps to boot.
<HUAWEI> system-view
[HUAWEI] info-center timestamp trap boot
Function
The info-center trapbuffer command enables the AP to send traps to the trap
buffer.
The undo info-center trapbuffer command disables the AP from sending traps to
the trap buffer.
Format
info-center trapbuffer [ channel { channel-number | channel-name } | size
buffer-size ] *
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To view traps in the trap buffer, run the info-center trapbuffer command to
enable the AP to send traps to the trap buffer.
Example
# Enable the AP to send traps to the trap buffer.
<HUAWEI> system-view
[HUAWEI] info-center trapbuffer
Function
The info-center trapbuffer size command sets the maximum number of traps in
the trap buffer.
The undo info-center trapbuffer size command restores the default maximum
number of traps in the trap buffer.
Format
info-center trapbuffer size trapbuffer-size
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The info-center trapbuffer size command sets the maximum number of traps in
the trap buffer.
Prerequisites
The AP has been enabled to output traps to the trap buffer by using the info-
center trapbuffer command.
Precautions
When you run the info-center trapbuffer size command multiple times, only the
latest configuration takes effect.
Example
# Set the maximum number of traps in the trap buffer to 30.
<HUAWEI> system-view
[HUAWEI] info-center trapbuffer size 30
Function
The reset info-center statistics command clears statistics on each module.
Format
reset info-center statistics
Parameters
None
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To collect statistics on each module again, run the reset info-center statistics
command to clear all historical statistics.
Precautions
The cleared statistics cannot be restored. Exercise caution when you run the reset
info-center statistics command.
Example
# Clear statistics on each module.
<HUAWEI> reset info-center statistics
Format
reset logbuffer
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To record logs in the log buffer again, run the reset logbuffer command to clear
all the information in the log buffer.
Precautions
Statistics cannot be restored after being cleared. Exercise caution when you run
the reset logbuffer command.
Example
# Clear information in the log buffer.
<HUAWEI> reset logbuffer
Warning: This command will reset the log buffer. Logs in the buffer will be lost
. Continue? (y/n)[n]:y
Function
The reset trapbuffer command clears Trap information in the trap buffer.
Format
reset trapbuffer
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To record traps in the trap buffer again, run the reset trapbuffer command to
clear all the information in the trap buffer.
Precautions
Statistics cannot be restored after being cleared. Exercise caution when you run
the reset trapbuffer command.
Example
# Clear information in the trap buffer.
<HUAWEI> reset trapbuffer
Function
The save logfile command saves logs in the log file buffer to a log file.
Format
save logfile
Parameters
None
Views
User view
Default Level
0: Visit level
Usage Guidelines
Usage Scenario
To reduce the number of times information is written into the storage device,
information generated on the AP is saved into the log buffer before the
information is saved into the log file. When the log file buffer is full, the system
saves the logs in the log file buffer to the log file. You can also run the save
logfile command to save the logs in the log file buffer to the log file. After the log
file is generated, the system clears logs in the log file buffer to save new logs.
Prerequisites
The path to save log files has been set by using the info-center logfile path
command.
Precautions
When you run this command, the device obtains or uses some personal data of
users, such as the STA MAC address. Delete the personal data immediately after
the command is executed to ensure user data security.
When this command is executed on a device supporting binlogs, binlogs and data
dictionary information are also saved.
Example
# Save logs in the log file buffer to the log file.
<HUAWEI> save logfile
Format
terminal debugging
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the terminal debugging command to enable debugging message
display on the user terminal to view system debugging message and locate faults.
Prerequisites
The terminal monitor command has been executed to enable display of logs,
traps, and debugging message output on the user terminal.
Example
# Enable debugging message display on the user terminal.
<HUAWEI> terminal debugging
Info: Current terminal debugging is on.
Function
The terminal logging command enables log display on the user terminal.
The undo terminal logging command disables log display on the user terminal.
Format
terminal logging
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To view logs on a terminal, run the terminal logging command to enable log
display on the user terminal.
Prerequisites
The terminal monitor command has been executed to enable display of logs,
traps, and debugging message output on the user terminal.
Example
# Disable log display on the user terminal.
<HUAWEI> undo terminal logging
Info: Current terminal logging is off.
Format
terminal monitor
undo terminal monitor
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Prerequisites
The information center has been enabled by using the info-center enable
command.
Follow-up Procedure
Run the terminal debugging/undo terminal debugging, terminal logging/undo
terminal logging, terminal trapping/undo terminal trapping/ command to
enable or disable terminal debugging message, log, or trap display.
Precautions
Logs, traps, and debugging message are sent to the current terminal only when
the terminal monitor command is used.
Running the undo terminal monitor command is equivalent to running the undo
terminal debugging, undo terminal logging, undo terminal trapping
command.
Example
# Disable display of logs, traps, and debugging message output by the
information center on the user terminal.
<HUAWEI> undo terminal monitor
Info: Current terminal monitor is off.
Format
terminal trapping
undo terminal trapping
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To view traps on a terminal, run the terminal trapping command to enable trap
display on the user terminal.
Prerequisites
The terminal monitor command has been executed to enable display of logs,
traps, and debugging message output on the user terminal.
Example
# Disable trap display on the user terminal.
<HUAWEI> undo terminal trapping
Info: Current terminal trapping is off.
Format
display ntp-service sessions [ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Run the display ntp-service sessions command. If the verbose option is not
specified, only summary information about a session is displayed.
Example
# Display NTP session information of the local device.
<HUAWEI> display ntp-service sessions
clock source: 10.1.1.1
clock stratum: 1
clock status: configured, insane, valid, unsynced
reference clock ID: LOCAL(0)
reach: 0
current poll: 64
now: 9
offset: 0.0000 ms
delay: 0.00 ms
disper: 0.00 ms
Item Description
Item Description
Item Description
Item Description
root delay Total system delay between the local end and the master
reference clock. The default value is 0.
If the value of root delay or root disper is large, clock
synchronization may fail. A larger value indicates that the
packet takes a longer time to reach the local device from
the master reference clock. Therefore, the local device
cannot determine whether the time in the packet is
correct.
orgtime Time when an NTP packet is sent for the last time.
rcvtime Time when an NTP packet is received for the last time.
xmttime Time when an NTP packet is forwarded for the last time.
filter delay Filter delays of the 8 packets received for the last time.
Item Description
filter offset Filter offsets of the 8 packets received for the last time.
filter disper Filter dispersions of the 8 packets received for the last
time.
Format
display ntp-service status
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Based on the displayed status of the NTP service, you can know the
synchronization status and stratum of the local system clock.
Example
# Display the status of the NTP service.
<HUAWEI> display ntp-service status
clock status: synchronized
clock stratum: 2
reference clock ID: LOCAL(0)
nominal frequency: 60.0002 Hz
actual frequency: 60.0002 Hz
clock precision: 2^18
clock offset: 0.0000 ms
root delay: 0.00 ms
root dispersion: 0.00 ms
peer dispersion: 10.00 ms
reference time: 15:51:36.259 UTC Apr 25 2012(C6179088.426490A3)
Item Description
clock offset Offset between the local system clock and the NTP server.
root delay Total delay between the local system clock and the master
reference clock.
root dispersion Total dispersion between the local system clock and the
master reference clock.
peer dispersion Dispersion between the local system clock and the remote
NTP peer.
Function
The display ntp-service trace command displays the trace path of reference clock
source from the local device.
Format
display ntp-service trace
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When you run the display ntp-service trace command, summary information of
NTP servers for synchronizing time on the link from the local device to the
reference clock source can be displayed.
Example
# Display the summary of each passing NTP server when you trace the reference
clock source from the local device.
<HUAWEI> display ntp-service trace
server 127.0.0.1,stratum 5, offset 0.024099, synch distance 0.06337
server 192.168.1.2,stratum 4, offset 0.028786, synch distance 0.04575
server 172.16.1.2,stratum 3, offset 0.035199, synch distance 0.03075
server 10.1.7.1,stratum 2, offset 0.039855, synch distance 0.01096
refid 127.127.1.0
Item Description
The undo ntp-service access command cancels the configured access control
authority.
By default, no access control authority is set.
Format
ntp-service access { peer | query | server | synchronization } acl-number
undo ntp-service access { peer | query | server | synchronization }
Parameters
Parameter Description Value
peer Indicates maximum access. Both time request -
and control query can be performed on the local
NTP service, and the local clock can be
synchronized to the remote server.
query Indicates minimum access. Only control query -
can be performed on the local NTP service.
server Indicates that server access and query are -
permitted. Both time request and control query
can be performed on the local NTP service, but
the local clock cannot be synchronized to the
remote server.
synchronization Indicates that only server access is permitted. -
Only time request can be performed on the
local NTP service.
acl-number Indicates the basic access control list (ACL) The value is
number for IPv4 addresses. an integer
that ranges
from 2000 to
2999.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with NTP authentication, ntp-service access is simpler to ensure the
network security. When an access request reaches the local end, the access request
is successively matched with the access authority from the maximum one to the
minimum one. The first successfully matched access authority takes effect. The
matching order is: peer, server, synchronization, and query.
NTP symmetric peer The two ends are restricted from Symmetric
mode being synchronized with each other active peer
to prevent an unreliable symmetric
passive peer on the network from
synchronizing the client.
NTP broadcast mode The client is restricted from being NTP broadcast
synchronized to a server, so that the client
client will not be synchronized to
an unreliable broadcast NTP server
on the network.
The ntp-service access command ensures the security to the minimal extent. A
safer method is to perform identity authentication. See the ntp-service
authentication enable command for relevant configuration.
Precautions
Check the configuration of the ACL rule before configuring the NTP access control
authority in the ACL. When the ACL rule is permit, the peer device with the source
IP address specified in this rule can access the NTP service on the local device. The
access right of the peer device is configured using the ntp-service access
command. When the ACL rule is deny, the peer device with the source IP address
specified in this rule cannot access the NTP service on the local device.
Example
# Enable the peer in IPv4 ACL 2000 to perform time request, query control and
time synchronization on the local device.
<HUAWEI> system-view
[HUAWEI] ntp-service access peer 2000
# Enable the server in IPv4 ACL 2002 to perform time request and query control
on the local device.
<HUAWEI> system-view
[HUAWEI] ntp-service access server 2002
Format
ntp-service access limited acl-number
undo ntp-service access limited
Parameters
Parameter Description Value
acl-number Indicates the basic access control The value is an integer that
list (ACL) number for IPv4 ranges from 2000 to 2999.
addresses.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the KOD function is enabled on the server, you can run the ntp-service
access limited command to enable control on the rate of incoming NTP packets.
When the rate of incoming NTP packets reaches the upper threshold, the server
sends the kiss code.
Precautions
Before enabling control on the rate of incoming NTP packets, check the ACL rule
configuration. When the ACL rule is deny, the server sends the kiss code DENY.
When the ACL is permit and the rate of incoming NTP packets reaches the upper
threshold, the server sends the kiss code RATE.
Example
# Enable control on the rate of incoming NTP packets.
<HUAWEI> system-view
[HUAWEI] ntp-service access limited 2005
Format
ntp-service authentication enable
undo ntp-service authentication enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
On networks requiring high security, authentication must be enabled for NTP. The
NTP client authenticates NTP servers using a password and synchronizes time with
only the authenticated server. This improves network security.
Example
# Enable identity authentication for NTP.
<HUAWEI> system-view
[HUAWEI] ntp-service authentication enable
Format
ntp-service authentication-keyid key-id authentication-mode { md5 | hmac-
sha256 } [ cipher ] password
undo ntp-service authentication-keyid key-id
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network that requires high security, the NTP authentication must be enabled.
You can configure password authentication between client and server, which
guarantee the client only to synchronize with server successfully authenticated,
and improve network security. If the NTP authentication function is enabled, a
reliable key should be configured at the same time. Keys configured on the client
and the server must be identical.
NOTE
In NTP symmetric peer mode, the symmetric active peer functions as a client and the
symmetric passive peer functions as a server.
Follow-up Procedure
You can configure multiple keys for each device. After the NTP authentication key
is configured, you need to set the key to reliable using the ntp-service reliable
authentication-keyid command. If you do not set the key to reliable, the NTP key
does not take effect.
Precautions
MD5 authentication has potential risks. To ensure security, you are advised to use
the HMAC-SHA256 algorithm, which is more secure, for NTP authentication.
You can configure a maximum of 1024 keys for each device.
If the NTP authentication key is a reliable key, it automatically becomes unreliable
when you delete the key. You do not need to run the undo ntp-service reliable
authentication-keyid command.
Example
# Set the HMAC-SHA256 identity authentication key. The key ID number is 10,
and the key is Betterkey.
<HUAWEI> system-view
[HUAWEI] ntp-service authentication-keyid 10 authentication-mode hmac-sha256 BetterKey
Format
ntp-service broadcast-client
undo ntp-service broadcast-client
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
On a synchronization subnet, when the IP address of a server or a symmetric peer
is not determined, or when the clocks on a large number of devices need to be
When the configuration is complete, you can run the display ntp-service sessions
command to obtain information about sessions between the broadcast server and
the local device.
Example
# Enable VLANIF100 to receive NTP broadcast messages.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.1 24
[HUAWEI-Vlanif100] ntp-service broadcast-client
Function
The ntp-service broadcast-server command configures the local device to work
in NTP broadcast server mode.
The undo ntp-service broadcast-server command removes the device from the
NTP broadcast server mode.
Format
ntp-service broadcast-server [ version number | authentication-keyid key-id ] *
Parameters
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
On a synchronization subnet, when the IP address of a server or a symmetric peer
is not determined, or when the clocks on a large number of devices need to be
synchronized on the network, you can implement clock synchronization by
configuring the broadcast mode.
When the configuration is complete, you can run the display ntp-service sessions
command to obtain information about sessions between the broadcast server and
the client.
Example
# Enable VLANIF100 to send NTP broadcast packets, with the NTP version as 2
and the key number as 4.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.1 24
[HUAWEI-Vlanif100] ntp-service broadcast-server version 2 authentication-keyid 4
Format
ntp-service discard { min-interval min-interval-val | avg-interval avg-interval-
val } *
undo ntp-service discard
Parameters
Parameter Description Value
min-interval Specifies the minimum inter-packet The value of min-
min-interval-val interval of NTP. interval-val is an
integer that ranges
The actual value of the minimum inter- from 1 to 8.
packet interval of NTP is the value
obtained by raising 2 to the power of
min-interval-val, expressed in seconds.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The minimum inter-packet interval and the average inter-packet interval of NTP
are set using the ntp-service discard command. To generate kiss code RATE, we
need to set the minimum inter-packet interval and the average inter-packet
interval of NTP.
Example
# Set both the minimum inter-packet interval and the average inter-packet
interval of NTP to the fourth power of 2, expressed in seconds, namely, 16
seconds.
<HUAWEI> system-view
[HUAWEI] ntp-service discard min-interval 4 avg-interval 4
Format
ntp-service enable
undo ntp-service enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The NTP function can be used on a device only after the NTP service on the device
is enabled.
Example
# Enable the NTP service on the local device.
<HUAWEI> system-view
[HUAWEI] ntp-service enable
Format
ntp-service in-interface disable
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
The ntp-service in-interface disable command provides a method for access
control.
You can disable the interface connected to external devices from receiving NTP
packets in the following scenarios:
● An unreliable clock server exists on the interface. By default, all the interfaces
can receive NTP packets after NTP is enabled on the device. However, an
unreliable clock source makes NTP clock data inaccurate.
● The NTP clock data is modified when the interface is attacked maliciously.
Example
# Disable VLANIF100 from receiving NTP packets.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ntp-service in-interface disable
Function
The ntp-service kod-enable command enables the KOD function.
Format
ntp-service kod-enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The Kiss-o'-Death (KOD) function is a brand new access control technology put
forward by NTPv4, and the KOD function is mainly used for a server to provide
information, such as a status report and access control, for a client. After the KOD
function is enabled on the server, the server sends the kiss code DENY or RATE to
the client according to the operating status of the system.
When the kiss code is generated in a specific situation, run the command ntp-
service kod-enable.
Follow-up Procedure
After the KOD function is enabled on the server, you can run the ntp-service
access limited command to enable control on the rate of incoming NTP packets.
When the rate of incoming NTP packets reaches the upper threshold, the server
sends the kiss code.
Example
# Enable the KOD function.
<HUAWEI> system-view
[HUAWEI] ntp-service kod-enable
Function
The ntp-service max-dynamic-sessions command sets the maximum dynamic
NTP sessions that can be set up.
Format
ntp-service max-dynamic-sessions number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A maximum of 128 sessions can be established on the same device running the
NTP service in the same period, including static and dynamic sessions. In both
unicast server/client mode and symmetric peer mode, command lines are used to
establish static sessions. The dynamic sessions are established in broadcast mode.
Excessive dynamic sessions directly affect the establishment of static sessions. A
user can limit the number of local dynamic sessions solve this problem.
Precautions
When the number of local dynamic sessions on the device is limited,
● NTP dynamic sessions established are not affected. That is, when the number
of the dynamic sessions exceeds the limit, the dynamic sessions established
are not deleted, but a new dynamic session cannot be established.
● The limit on the number of local dynamic sessions allowed should be
configured on the client because the server does not record the number of the
established NTP sessions.
Example
# Set the maximum NTP dynamic sessions allowed to be set up to 50.
<HUAWEI> system-view
[HUAWEI] ntp-service max-dynamic-sessions 50
Format
ntp-service reliable authentication-keyid key-id
undo ntp-service reliable authentication-keyid key-id
Parameters
Parameter Description Value
key-id Indicates the key number. Key ID is an integer and ranges from 1 to
4294967295.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If the identity authentication is enabled, this command is used to specify that one
or more keys are reliable. That is, the client can only be synchronized with the
server that provides the reliable key. The client cannot be synchronized with the
server that provides unreliable keys.
Example
# Enable the identity authentication in NTP and adopt the HMAC-SHA256
encryption mode with key number as 37 and the key as BetterKey. Specify the key
to be reliable.
<HUAWEI> system-view
[HUAWEI] ntp-service authentication enable
[HUAWEI] ntp-service authentication-keyid 37 authentication-mode hmac-sha256 BetterKey
[HUAWEI] ntp-service reliable authentication-keyid 37
Format
ntp-service server disable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
For the security purpose, NTP server functionality can be disabled when the device
does not need to act as a server.
Example
# Disable NTP server functionality.
<HUAWEI> system-view
[HUAWEI] ntp-service server disable
Function
The ntp-service source-interface command specifies the local source interface
that sending and receiving NTP packets.
By default, the local source interface is not specified for sending and receiving NTP
packets. The local source interface is automatically determined based on the
route.
Format
ntp-service source-interface interface-type interface-number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Configure the local source interface for sending/receiving NTP packets, so that the
IP address of another interface on the device cannot be used as the destination
address of a reply packet, which is convenient for a user to subsequently deploy a
flow control policy. If the interface is not specified, the source IP address of the
NTP packets is selected according to the route.
Precautions
In the broadcast mode, the NTP service is performed on a specific interface, that
is, the source interface. Therefore, the ntp-service source-interface command is
invalid for the broadcast mode.
Example
# Specify VLANIF100 as the source interface to send all the NTP packets.
<HUAWEI> system-view
[HUAWEI] ntp-service source-interface vlanif 100
Format
ntp-service unicast-peer ip-address [ version number | maxpoll max-number |
minpoll min-number | authentication-keyid key-id | source-interface interface-
type interface-number | preference ]*
undo ntp-service unicast-peer ip-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Configure the peer 10.10.1.1 to provide the synchronizing time for the local
device. The local device can also provide synchronizing time for the peer. The
version number is 3. The IP address of the NTP packets is the address of
VLANIF100.
<HUAWEI> system-view
[HUAWEI] ntp-service unicast-peer 10.10.1.1 version 3 source-interface vlanif 100
Function
The ntp-service unicast-server command configures the NTP unicast server/client
mode.
The undo ntp-service unicast-server command cancels the NTP unicast server/
client mode.
Format
ntp-service unicast-server ip-address [ version number | authentication-keyid
key-id | maxpoll max-number | minpoll min-number | source-interface interface-
type interface-number | preference ] *
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Configure the server 10.10.1.1 to provide the synchronizing time for the local
device. The NTP version number is 3.
<HUAWEI> system-view
[HUAWEI] ntp-service unicast-server 10.10.1.1 version 3
PoE OUT is supported only by the following models: AP8082DN, AP8182DN, AP4050DN-E,
AP4050DN-HD, AP7050DN-E, AP2050DN-E, AP2051DN-E, AD9431DN-24X, AD9430DN-24,
AD9430DN-12.
The display current power-workmode command is available for all APs supporting PoE IN and
PoE OUT, except the AD9430DN-24 and AD9431DN-24X.
Function
The display current power-workmode command displays the current power
mode of APs.
This command is available for all APs except the AD9430DN-24 and
AD9431DN-24X.
Format
display current power-workmode
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
In DC or PoE power supply mode, APs may fail to work in its full power mode
because the power provided may not meet requirements of this mode. You can
run this command to check the current power mode of the AP.
Example
# Display the current power mode of the AP.
<HUAWEI> display current power-workmode
Current power workmode is AT (FULL), decided by AP capability
Item Description
Function
The display poe device command displays information about the device
supporting Power over Ethernet (PoE).
Format
display poe device
Parameters
None
Views
All views
Default Level
2: Configuration level
Usage Guidelines
Before using the PoE function, run the display poe device command to check
whether the device supports the PoE function. If the command output is displayed,
the device supports the PoE function.
Example
# Display information about the device supporting PoE.
<HUAWEI> display poe device
slot 0 : POE
Item Description
Function
The display poe information command displays PoE running information about
the device.
Format
display poe information [ slot slot-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
This command displays information including the maximum output power set by
the user, current power consumption, peak power consumption, and power
management mode.
Example
# Display the PoE running information about the device.
<HUAWEI> display poe information
PSE Information of slot 0:
User Set Max Power(mW) : 380000
POE Power Supply(mW) : 380000
Available Total Power(mW) : 371784
Total Power Consumption(mW): 8216
Power Peak Value(mW) : 11284
Power-Management Mode : auto
Power High Inrush : disable
Power AF Inrush : disable
Item Description
Power High Inrush State of power high inrush function, including enabled
and disabled state. By default, the power high inrush
function is in disabled state.
To set the state, run the poe high-inrush enable
command.
Function
The display poe power command displays current power information on
interfaces.
Format
display poe power [ slot slot-id | interface interface-type interface-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
The display poe power command displays information including the current
actual power, maximum output power set for an interface, and class, reference
power, and average power of PDs on the interface.
If this parameter is not specified, the output power of all interfaces on the device
is displayed.
Example
# Display power information about interfaces on the device whose ID is 0.
<HUAWEI> display poe power slot 0
Codes: REFPW(Reference power), USMPW(User set max power),
CURPW(Current power), PKPW(Peak power), AVGPW(Average power)
GigabitEthernet0/0/13 - - 15400 0 0 0
GigabitEthernet0/0/14 - - 15400 0 0 0
GigabitEthernet0/0/15 - - 15400 0 0 0
GigabitEthernet0/0/16 - - 15400 0 0 0
GigabitEthernet0/0/17 - - 15400 0 0 0
GigabitEthernet0/0/18 - - 15400 0 0 0
GigabitEthernet0/0/19 - - 15400 0 0 0
GigabitEthernet0/0/20 - - 15400 0 0 0
GigabitEthernet0/0/21 - - 15400 0 0 0
GigabitEthernet0/0/22 - - 15400 0 0 0
GigabitEthernet0/0/23 - - 15400 0 0 0
GigabitEthernet0/0/24 - - 15400 0 0 0
Table 5-47 Description of the display poe power slot command output
Item Description
Table 5-48 Description of the display poe power interface command output
Item Description
Port user set max Maximum output power set for an interface.
power(mW)
Function
The display poe power-state command displays the PoE power supply status of a
device.
Format
display poe power-state [ slot slot-id | interface interface-type interface-
number ]
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
The display poe power-state command displays information including whether
an interface is enabled to check compatibility of non-standard PDs, power supply
status on of an interface, class of PDs on an interface, power supply priority, and
maximum output power of an interface.
Example
# Display the PoE power supply status of GigabitEthernet 0/0/3.
<HUAWEI> display poe power-state interface gigabitethernet 0/0/3
Port legacy detect : disable
Port power enabled : enable
Port power ON/OFF : on
Port power status : Powered
Port PD class :3
Port reference power(mW) : 15400
Port power priority : Low
Port max power(mW) : 15400
Port current power(mW) : 2794
Port peak power(mW) : 2794
Port average power(mW) : 2741
Port current(mA) : 52.73
Port voltage(V) : 53.00
Table 5-49 Description of the display poe power-state interface command output
Item Description
Item Description
Port power status Power supply status of an interface. The status can be:
● Test mode: indicates the testing state.
● Detecting: indicates the detection state.
● Disabled: indicates that PoE is disabled on the
interface.
● Chip fault: indicates that the chip of the interface
fails.
● Power-deny: indicates that the reference power is
greater than the maximum output power of an
interface.
● Classification overcurrent: indicates that the current
of the PDs on the interface exceeds the threshold.
● Unknown class: indicates that the class of the PD is
unknown.
● Power overcurrent: indicates that the current of the
PD on the interface exceeds the maximum current
of the interface.
● Power-on failed: indicates that the interface fails to
be powered on.
● Power-ready: indicates that the interface is ready to
be powered on.
● Powering: indicates that the PSE starts to power on
the interface.
● Powered: indicates that the interface is powered on.
● Over loaded: indicates that the power is overloaded.
● Time-range power-off: indicates that the interface is
in the power-off time range.
● Legacy disable: indicates that compatibility
detection for PDs is disabled. That is, the device
cannot identify or provide power for the non-
standard PD.
Item Description
Table 5-50 Description of the display poe power-state slot command output
Item Description
Item Description
Function
The display poe-power command displays information about the PoE power
supply.
Format
display poe-power [ slot slot-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
The display poe-power displays information including the available total PoE
power, percentage of the reserved power, power alarm threshold, and PoE power
module.
Example
# Display information about the PoE power supply of the devices.
<HUAWEI> display poe-power
Slot 0
Total Available POE Power(mW) : 246400
Reserved POE Power Percent : 20 %
POE Power Threshold Percent : 90 %
POE Power 1
Power Value(mW) : 123200
Type : AD9430DN-12
Supported Mode : Redundancy, Balance
POE Power 2
Power Value(mW) :-
Type :-
Supported Mode :-
Item Description
Total Available POE Total power that can be provided for PDs.
Power(mW)
Reserved POE Power Percentage of the reserved power to the total power.
Percent To set the percentage, run the poe power-reserved
command.
Item Description
Supported Mode Supported PoE power supply mode. The value can be:
● Redundancy: redundancy backup mode
● Balance: current balance mode
Format
poe af-inrush enable [ slot slot-id ]
undo poe af-inrush enable [ slot slot-id ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
The device that conforms to IEEE802.3at cannot power non-standard PDs that do
not support inrush current. To power these PDs, configure the device to provide
power in conformance to IEEE802.3af. When all PDs connected to the device are
standard PDs, run the undo poe af-inrush enable command to cancel the
configuration.
Precautions
● The poe af-inrush enable command takes effect only on PoE devices
conforming to IEEE802.3at.
● The poe af-inrush enable command does not take effect on an interface if
the poe force-power command has been executed on the interface.
● The poe force-power command is applied to some non-standard PDs that
cannot be powered on. After running this command, some devices that need
inrush current may not be powered on.
● After running the poe af-inrush enable command, remove the non-standard
PDs and then install them so that the PDs can be powered on.
Configuration Impact
After running the poe af-inrush enable command, remove the non-standard PDs
and then install them so that the PDs can be powered on.
Example
# Configure the device to provide power in conformance to IEEE802.3af.
<HUAWEI> system-view
[HUAWEI] poe af-inrush enable slot 0
Warning: This operation may cause PD work abnormal. Continue?[Y/N]:y
Format
poe enable
undo poe enable
Parameters
None
Views
GE interface view
Default Level
2: Configuration level
Usage Guidelines
Before providing power for the PD connected to the interface, ensure the PoE
function on the interface is enabled. IF the PoE function is not enabled, run the
poe enable command to enable the PoE function on the interface.
In automatic mode, the power-on or power-off of interfaces is determined by the
PoE power and interface power priority. When the PoE power is sufficient, the
device does not power off one interface. To stop providing power for one PD, run
the undo poe enable command.
Example
# Disable the PoE function on GigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo poe enable
Format
poe force-power
undo poe force-power
Parameters
None
Views
GE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
If the power of the system is sufficient, you can run the poe force-power
command on the interface connected to PDs when the PSE cannot detect the PDs.
Precautions
Example
# Enable forcible powering on GigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] poe force-power
Warning: Is there a valid PD connected to this interface? Yes or No?[Y/N]:y
Format
poe high-inrush enable [ slot slot-id ]
undo poe high-inrush enable [ slot slot-id ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
High inrush current is generated when a non-standard PD is powered on. In this
case, the PSE cuts off the power of the PD to protect itself. If the PSE is required to
provide power for the PD, the PSE must allow high inrush current. The high inrush
current may damage device components.
Example
# Enable the device to allow generation of the high pulse current during power-
on.
<HUAWEI> system-view
[HUAWEI] poe high-inrush enable
Function
The poe { power-off | power-on } interface command manually powers on or
powers off the PD of an interface.
Format
poe { power-off | power-on } interface interface-type interface-number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
In manual power management mode, run the poe { power-off | power-on }
interface command to power on or power off interfaces. To check whether the
command runs successfully, run the display poe power-state command.
Precautions
When the available power of the device is insufficient and the device cannot
provide power for a new PD, the poe power-on interface command is invalid.
Pre-configuration Tasks
Before powering on or powering off an interface, ensure that:
● The power management mode has been in manual mode through running
the poe power-management command.
● PDs have been connected to the interface.
● The PoE function of the interface has been enabled.
● The classification of the PDs connected to the interface has finished and the
PDs have been ready for being powered on.
Example
# Manually power on GigabitEthernet0/0/1 interface.
<HUAWEI> system-view
[HUAWEI] poe power-on interface gigabitethernet 0/0/1
Function
The poe legacy enable command enables the power sourcing equipment (PSE) to
check the compatibility of the power device (PD).
The undo poe legacy enable command disables the PSE from checking the
compatibility of the PD.
By default, the PSE does not check the capability of the PD.
Format
poe legacy enable
undo poe legacy enable
Parameters
None
Views
GE interface view
Default Level
2: Configuration level
Usage Guidelines
When compatibility check is enabled, the device can detect and provide power for
the PD that does not comply with the 802.3af or 802.3at standard. If compatibility
check is not enabled, the device cannot detect and provide power for the non-
standard PD.
Example
# Enable GigabitEthernet0/0/1 to check the compatibility of the PD.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] poe legacy enable
Warning: Is there a valid PD connected to this interface? Yes or No?[Y/N]:y
Format
poe max-power max-power [ slot slot-id ]
undo poe max-power [ [ max-power ] slot slot-id ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
By default, the system automatically obtains the maximum PoE power supported
by the device. You can run the poe max-power command to set the maximum
output power to ensure stable PoE power supply when the total power of the
device is insufficient.
Precautions
If the maximum output power that you set is smaller than the total power
required by PDs, PDs with lower priority are powered off or cannot be powered on
manually.
Example
# Set the maximum output power of the device to 45000 mW.
<HUAWEI> system-view
[HUAWEI] poe max-power 45000 slot 0
Function
The poe power-management command sets the power management mode of
the device.
Format
poe power-management { auto | manual } [ slot slot-id ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
In automatic power management mode, the device first provides power for the
interfaces with higher priority and powers off the interfaces of lower priority when
the power is insufficient. When the power is sufficient, all interfaces connected to
PDs are powered on. To stop providing power for some interfaces, run the undo
poe enable command to disable the PoE function on the interfaces. If the PoE
function is enabled and disabled frequently, faults may occur on the interfaces. To
prevent the faults, you can set the power management mode to manual mode. In
manual mode, the power-on and power-off of an interface are controlled
manually and not affected by the interface power priority.
Precautions
● If all the interfaces are of the same priority, the power supply priority of the
interface with a smaller interface number is higher in automatic mode.
● You can view the power management mode by running the display poe
information command.
Example
# Set the power management mode of a device to automatic mode.
<HUAWEI> system-view
[HUAWEI] poe power-management auto
Function
The poe power-off time-range command makes a configured PoE power-off
time range effective on an interface.
Format
poe power-off time-range time-range-name
undo poe power-off time-range
Parameters
Parameter Description Value
Views
GE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The poe power-off time-range command makes a PoE power-off time range set
in the system view effective on an interface. If the current time is within the
specified time range, the PD connected to the interface cannot be powered on.
The undo poe power-off time-range command cancels the configuration. The
time range does not take effect on the PD connected to the interface; however,
the configuration of the time range is still saved.
NOTE
The poe power-off time-range command is only applied to automatic power management
mode.
Pre-configuration Tasks
Before running the poe power-off time-range command, you must ensure a PoE
power-off time range has been configured through running the time-range
command in the system view.
Example
# Configure a PoE power-off time range from 10:00 to 11:00 for PDs connected to
GigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] time-range PoE 10:00 to 11:00 daily
Function
The poe power-reserved command sets the percentage of the reserved PoE
power against the total PoE power.
The undo poe power-reserved command restores the default percentage of the
reserved PoE power against the total PoE power.
By default, 20% of the total power is reserved.
Format
poe power-reserved power-reserved [ slot slot-id ]
undo poe power-reserved [ power-reserved slot slot-id | slot slot-id ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
The device can dynamically allocate power to each interface according to the
power consumption of each interface. The power consumption of a PD keeps
changing when the PD is running. The system periodically calculates the total
power consumption of all the PDs. If the total power consumption exceeds the
upper threshold of the device, the system cuts off the power of the PDs on the
interfaces of low priority to ensure that other PDs can run normally.
Sometimes, however, the power consumption increases sharply and the available
power of the system cannot support the burst increase of power. At this time, the
system has not calculated and found that the total power consumption exceeded
the upper threshold; therefore, the system does not cut off power low-priority
interfaces in time. As a result, the PoE power supply is shut down for overload
protection, and all PDs are powered off.
This problem can be solved by running the poe power-reserved command to set
proper reserved power. When there is a burst increase in power consumption, the
reserved power can support the system running. Then the system has time to
power off interfaces of low priority to ensure stable running of other PDs.
Precautions
● The reserved power should not be set greater than 20%. If the reserved PoE
power is greater than 20% of the total PoE power, the power capacity of the
device is affected.
● To set the maximum output power of a device, run the poe max-power
command. In this case, the device calculates the reserved power based on the
set maximum output power. If the maximum output power is not set, the
available PoE power is the power provided by the PoE power module.
Example
# Set the percentage of reserved PoE power to the total PoE power to 30%.
<HUAWEI> system-view
[HUAWEI] poe power-reserved 30
Warning: This operation may power off some PDs of slot 0.Continue?[Y/N]:y
Format
poe power-threshold threshold-value [ slot slot-id ]
undo poe power-threshold [ threshold-value slot slot-id | slot slot-id ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to set the alarm threshold of the PoE power
consumption percentage. If the total PoE power is 369.6 W and the alarm
threshold is 90%, an alarm is generated when the power consumption is greater
than 332.64 W. When the power consumption falls below 332.64 W, the alarm is
cleared.
Example
# Set the alarm threshold of the PoE power consumption percentage to 80%.
<HUAWEI> system-view
[HUAWEI] poe power-threshold 80
Format
poe priority { critical | high | low }
Parameters
Parameter Description Value
Views
GE interface view
Default Level
2: Configuration level
Usage Guidelines
When the output power of a device is insufficient, the device in automatic power
management mode provides power for the interfaces of the higher power supply
priorities first and cuts off power of the interfaces of the lower power supply
priorities. If all the interfaces are of the same priority, the power supply priority of
the interface with a smaller interface number is higher.
Example
# Set the power supply priority of GigabitEthernet0/0/1 to critical.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] poe priority critical
Format
bandwidth bandwidth [ kbps ]
undo bandwidth
Parameters
Parameter Description Value
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
The bandwidth command mainly ensures that the network management station
(NMS) can acquire the bandwidth of an interface. The NMS can check the
interface bandwidth through the two objects ifSpeed and ifHighSpeed in IF-MIB.
● If the configured bandwidth is smaller than 4000 Mbit/s, ifSpeed and
ifHighSpeed are respectively displayed as bandwidth x 1000 x 1000 and
bandwidth.
● If the configured bandwidth is equal to or larger than 4000 Mbit/s, ifSpeed
and ifHighSpeed are respectively displayed as 4294967295 (0XFFFFFFFF) and
bandwidth.
Example
# Set the bandwidth of GE0/0/1 to 10000 Mbit/s.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] bandwidth 10000
Format
description description
undo description
Parameters
Parameter Description Value
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To facilitate device management and maintenance, you can configure descriptions
for interfaces. An interface description can contain the device where the interface
is located, interface type, and remote device. For example: To-[DeviceB]GE-0/0/1
indicates that an interface of this device is connected to GE0/0/1 of device B.
Precautions
The interface description is displayed from the first non-space character.
Example
# Configure the description of GE0/0/1 as To-[DeviceB]GE-0/0/1, indicating that
this device is connected to device B through GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] description To-[DeviceB]GE-0/0/1
Format
display default-parameter interface interface-type interface-number
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Default configurations are not saved in the configuration file. To check the default
configuration of an interface, run the display default-parameter interface
command on the interface.
The displayed information varies according to interfaces.
Example
# Display the default configuration of GE0/0/1.
<HUAWEI> display default-parameter interface gigabitethernet 0/0/1
Interface state: undo shutdown
Flow-stat interval: 300s
Trap-threshold: input-rate 100, output-rate 100
Snmp trap updown: enable
Description: HUAWEI, AP Series, GigabitEthernet0/0/1 Interface
Snmp trap updown Whether an alarm is sent to the NMS when the
interface status changes:
● disable: No alarm is sent to the NMS when the
interface status changes.
● enable: An alarm is sent to the NMS when the
interface status changes.
To configure an interface to send an alarm to the NMS
when the interface status changes, run the enable
snmp trap updown command in the interface view.
Format
display interface [ interface-type [ interface-number | main ] | main ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The running status and statistics of an interface includes the physical status, basic
configuration, and packet forwarding of the interface. You can use the display
interface command to collect traffic statistics or locate faults on an interface.
Precautions
If no interface type is specified, the running status and statistics of all the
interfaces is displayed. If the interface type is specified but no interface number is
specified, running status of all the interfaces of this type is displayed.
Example
# Display the running status, basic configuration, and packet forwarding on Layer
2 Ethernet interface GigabitEthernet0/0/1.
<HUAWEI> display interface gigabitethernet 0/0/1
GigabitEthernet0/0/1 current state : UP
Line protocol current state : UP
Description:HUAWEI, AP Series, GigabitEthernet0/0/1 Interface
Switch Port, PVID : 1, TPID : 8100(Hex), The Maximum Frame Length is 9216
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is dcd2-fc21-5d40
Last physical up time : 2013-03-20 19:05:41 UTC-05:13
Last physical down time : 2013-03-20 19:03:54 UTC-05:13
Current system time: 2013-03-22 12:34:24-05:13
Port Mode: COMMON COPPER
Speed : 1000, Loopback: NONE
Duplex: FULL, Negotiation: DISABLE
Mdi : AUTO
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Input peak rate 0 bits/sec,Record time: -
Output peak rate 0 bits/sec,Record time: -
CRC: 0, Giants: 0
Jabbers: 0, Throttles: 0
Runts: 0, Alignments: 0
Symbols: 0, Ignoreds: 0
Frames: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
The Maximum Frame Maximum frame length allowed by the interface. The
Length value varies according to the device model.
Last physical up time Last time the interface went Up physically. If this field
displays "-", the physical status of the interface does not
change.
Last physical down Last time the interface went Down physically. If this
time field displays "-", the physical status of the interface
does not change.
Item Description
Last 300 seconds Incoming packet rate (bits per second and packets per
input rate second) within the last 300 seconds.
Last 300 seconds Outgoing packet rate (bits per second and packets per
output rate second) within the last 300 seconds.
Item Description
Item Description
Format
display interface brief [ main ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display interface brief command displays brief information about interfaces,
including the physical status, link layer protocol status, inbound and outbound
bandwidth usage within a certain period, and numbers of sent and received error
packets. This information helps locate faults on interfaces.
Precautions
To clear statistics on an interface, run the reset counters interface command.
Example
# Display brief information about the status and configuration of interfaces.
<HUAWEI> display interface brief
PHY: Physical
*down: administratively down
(l): loopback
(s): spoofing
(e): ETHOAM down
(d): Dampening Suppressed
InUti/OutUti: input utility/output utility
Interface PHY Protocol InUti OutUti inErrors outErrors
GigabitEthernet0/0/1 up up 0.01% 0.01% 0 0
LoopBack0 up up(s) 0% 0% 0 0
LoopBack1 up up(s) 0% 0% 0 0
NULL0 up up(s) 0% 0% 0 0
Vlanif1 up down -- -- 0 0
Vlanif100 down down -- -- 0 0
Vlanif2001 up up -- -- 0 0
Wlan-Bss0 up up -- -- 0 0
Wlan-Radio0/0/0 up up -- -- 0 0
Wlan-Radio0/0/1 up up -- -- 0 0
Item Description
Format
display interface description [ interface-type [ interface-number ] ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display interface command can also display the description of an interface.
To quickly view the description of an interface, you are advised to use the display
interface description command.
Example
# Display the description of GE0/0/1.
<HUAWEI> display interface description gigabitethernet 0/0/1
PHY: Physical
*down: administratively down
(l): loopback
(s): spoofing
(e): ETHOAM down
(d): Dampening Suppressed
Interface PHY Protocol Description
GE0/0/1 down down HUAWEI, AP Series, GigabitEthernet0/0/1 Interface
Item Description
Item Description
Format
display interface [ interface-type ] counters { inbound | outbound }
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The display interface counters command can be used when you need to:
If no interface type is specified, the statistics of packets sent and received by all
interfaces are displayed. If an interface type is specified, the statistics about
packets sent and received by all interfaces of this type are displayed.
Follow-up Procedure
If you want to collect new traffic statistics, run the reset counters interface
command to clear the current statistics.
Example
# Display statistics about packets received by an interface.
<HUAWEI> display interface gigabitethernet counters inbound
Interface Total UniCast MultiCast BroadCast Err
(pkts) (pkts) (pkts) (pkts) (pkts)
GE0/0/1 375795 37306 14122 324367 0
NOTICE
OverFlow :more than 14 decimal digits (8 digits for column "Err").
-- :not supported.
Item Description
OverFlow :more than The character OverFlow is displayed when the statistics
14 decimal digits (8 value for each type exceeds the maximum value that
digits for column can be displayed.
"Err"). ● For Err frames, OverFlow is displayed when the value
exceeds 8 decimal numbers.
● For other data, OverFlow is displayed when the value
exceeds 14 decimal numbers.
-- :not supported. The device does not support statistics collection for the
specific type.
Function
The display ip interface command displays the IP configuration and statistics on
interfaces. The statistics include the number of packets and bytes received and
sent by interfaces, number of multicast packets sent and received by interfaces,
and number of broadcast packets received, sent, forwarded, and discarded by
interfaces.
Format
display ip interface [ interface-type interface-number ]
Parameters
Parameter Description Value
interface-type Specifies the type and number of an interface. If no -
interface-number interface is specified, IP configuration and statistics
about all interfaces are displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ip interface brief command to view the following
information:
● IP configurations of all interfaces
● IP configurations of interfaces of the specified type and a specified interface
● IP configurations of interfaces that have IP addresses
This command, however, cannot display the IP configurations of Layer 2 interfaces
or Eth-Trunk member interfaces.
NOTE
● You can run the display interface description command to view the interface
description.
● You can run the display interface command to view detailed information about the
running status and statistics on the interface.
Example
# Display IP information about VLANIF15.
<HUAWEI> display ip interface vlanif 15
Vlanif15 current state : UP
Line protocol current state : UP
The Maximum Transmit Unit : 1500 bytes
input packets : 766390, bytes : 41540847, multicasts : 681817
output packets : 242239, bytes : 14679482, multicasts : 172333
Directed-broadcast packets:
received packets: 0, sent packets: 0
forwarded packets: 0, dropped packets: 0
Internet Address is 10.1.1.119/24
Broadcast address : 10.1.1.255
TTL being 1 packet number: 164035
TTL invalid packet number: 0
ICMP packet input number: 0
Echo reply: 0
Unreachable: 0
Source quench: 0
Routing redirect: 0
Echo request: 0
Router advert: 0
Router solicit: 0
Time exceed: 0
IP header bad: 0
Timestamp request: 0
Timestamp reply: 0
Information request: 0
Information reply: 0
Netmask request: 0
Netmask reply: 0
Unknown type: 0
Line protocol current state : Link layer protocol status of the interface:
● UP: The link layer protocol of the interface
is running properly.
● DOWN: The link layer protocol of the
interface is Down or no IP address is
configured on the interface.
The Maximum Transmit Unit : MTU of the interface. The default MTU of an
Ethernet interface or a serial interface is 1500
bytes. Packets longer than the MTU are
fragmented before being transmitted. If
fragmentation is not allowed, the packets are
discarded.
input packets : 766390, bytes : Total number of packets, bytes, and multicast
41540847, multicasts : 681817 packets received by the interface.
Item Description
Function
The display ip interface description command displays IP-related information
(such as the IP address, subnet mask, physical layer status, link layer protocol
status, and number of interfaces in different states) and description of an
interface.
Format
display ip interface description [ interface-type [ interface-number ] | interface-
type &<1-8> ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Instead of running the display ip interface brief and display interface
description commands, you can run the display ip interface description
command to view both IP-related information and description of an interface,
which facilitates the user operation.
Example
# View IP-related information and description of a specified interface.
<HUAWEI> display ip interface description
Codes:
Ana(Analogmodem), Asy(Async), Cell(Cellular),
Dia(Dialer), Eth(Ethernet) GE(GigabitEthernet),
H(Hssi), Ima(Ima-group), Loop(LoopBack),
MTun(MTunnel), S(Serial), Tun(Tunnel),
VE(Virtual-Ethernet), VT(Virtual-Template)
Item Description
Format
display this interface
Parameters
None
Views
Interface view
Default Level
1: Monitoring level
Usage Guidelines
In the interface view, you can run the display this interface command to rapidly
view the status of the interface and packet statistics on the interface.
Although the default level of the display this interface command is monitoring
level, this command must be run in the interface view. Therefore, to run this
command, you need to be of the configuration level or higher.
Example
# Display information about GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] display this interface
GigabitEthernet0/0/1 current state : UP
Line protocol current state : DOWN
Description:HUAWEI, AP Series, GigabitEthernet0/0/1 Interface
Switch Port, PVID : 1, TPID : 8100(Hex), The Maximum Frame Length is 9216
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is dcd2-fcf9-b5ca
Last physical up time : -
Last physical down time : 2011-12-12 03:36:09 UTC+08:00
Current system time: 2011-12-12 10:51:31+08:00
Port Mode: COMMON COPPER
Speed : 1000, Loopback: NONE
Duplex: FULL, Negotiation: ENABLE
Mdi : AUTO
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Input peak rate 0 bits/sec,Record time: -
Output peak rate 0 bits/sec,Record time: -
Broadcast: 0, Jumbo: 0
Discard: 0, Total Error: 0
CRC: 0, Giants: 0
Jabbers: 0, Throttles: 0
Runts: 0, Alignments: 0
Symbols: 0, Ignoreds: 0
Frames: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Item Description
Last physical up time Last time the interface went Up physically. If this field
displays "-", the physical status of the interface does not
change.
Last physical down Last time the interface went Down physically. If this
time field displays "-", the physical status of the interface
does not change.
Last 300 seconds Incoming packet rate (bits per second and packets per
input rate second) within the last 300 seconds.
Last 300 seconds Outgoing packet rate (bits per second and packets per
output rate second) within the last 300 seconds.
Input peak rate 0 Maximum rate of incoming packets and time when the
bits/sec,Record time maximum rate is reached.
Output peak rate 0 Maximum rate of outgoing packets and time when the
bits/sec,Record time maximum rate is reached.
Item Description
6.1.11 interface
Function
The interface command displays the interface view.
Format
interface interface-type interface-number
undo interface interface-type interface-number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the specified interface view is displayed, you can set attributes for the
interface.
Precautions
● The interface command can display only the view of an existing physical
interface and cannot create a physical interface.
● The interface command can create a logical interface and display the view of
the logical interface.
● After an RU goes online, the central AP generates a virtual Ethernet interface.
If you cannot enter the Ethernet interface view, run the wired-port-profile
(WLAN view) command to enter the AP wired port profile view to configure
the Ethernet interface.
Example
# Display the view of GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1]
Function
The reset counters if-mib interface command clears interface traffic statistics in
the Network Management System (NMS).
Format
reset counters if-mib interface [ interface-type [ interface-number ] ]
Parameters
Parameter Description Value
interface-type Clears traffic statistics on a specified interface in the -
[ interface- NMS.
number ]
● interface-type specifies the interface type.
● interface-number specifies the interface number.
If an interface type is specified but no interface
number is specified, traffic statistics on all interfaces
of the specified type are cleared.
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
NOTE
For details on how to view interface traffic statistics in the NMS, see the NMS
documentation.
Precautions
● If no interface type and number are specified, traffic statistics of all interfaces
in the NMS are cleared.
● After you run the reset counters if-mib interface command, traffic statistics
on all interfaces in the NMS are cleared. Therefore, confirm the action before
you run this command.
● Running the reset counters if-mib interface command does not affect the
interface traffic statistics displayed by the display interface command. To
clear the interface traffic statistics displayed by the display interface
command, run the reset counters interface command.
Example
# Clear traffic statistics on GE0/0/1 in the NMS.
<HUAWEI> reset counters if-mib interface gigabitethernet 0/0/1
Function
The reset counters interface command clears traffic statistics about a specified
interface.
Format
reset counters interface [ interface-type [ interface-number ] ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before collecting traffic statistics on an interface within a certain period, run the
reset counters interface command to clear existing traffic statistics.
Precautions
● Statistics cannot be restored after being cleared. Therefore, exercise caution
before clearing the statistics.
● Traffic accounting is based on the packet statistics on an interface. The
clearing of the packet statistics on an interface by using the reset counters
interface command affects the traffic accounting result. Therefore, do not
randomly clear the packet statistics on an interface in a normal application
environment.
● If no interface type is specified, traffic statistics on all types of interfaces are
cleared. If an interface type is specified but no interface number is specified,
traffic statistics on all interfaces of the specified type are cleared.
● Running the reset counters interface command clears the last part of the
display interface command output. That is, statistics about received and
transmitted packets on the interface are cleared.
Example
# Clear traffic statistics on all interfaces.
<HUAWEI> reset counters interface
Format
restart
Parameters
None
Views
GE interface view, Ethernet interface view, VLANIF interface view, MultiGE
interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After modifying parameters of an interface, run the restart command to make the
modification take effect.
Precautions
● Restarting an interface during data transmission will cause data frame loss or
service interruption. Exercise caution when you use the restart command.
● Running the restart command is equivalent to running the shutdown
command and the undo shutdown command in sequence.
Example
# Restart GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] restart
Format
set flow-stat interval interval-time
undo set flow-stat interval
Parameters
Parameter Description Value
Views
Interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By using the set flow-stat interval command to set the interval for collecting
traffic statistics on interfaces, you can collect and analyze traffic statistics
according to your needs. You can also take traffic control measures based on the
traffic statistics to prevent network congestion and service interruption.
● When congestion occurs, set the interval for collecting traffic statistics on an
interface to less than 300 seconds, or 30 seconds if congestion worsens. Then
observe the traffic distribution on the interface within a short period of time.
If data packets cause congestion, take proper measures to control the rate of
the packets.
● When the network bandwidth is sufficient and services are running properly,
set the interval for collecting traffic statistics on an interface to more than
300 seconds. If the value of any traffic parameter is not within the specified
range, change the interval for collecting traffic statistics to observe the traffic
volume in real time.
Precautions
● The interval configured in the system view takes effect on all the interfaces
that use the default interval.
● The interval configured in the interface view takes effect only on the current
interface.
● The interval configured in the interface view takes precedence over the
interval configured in the system view.
Example
# Set the interval for collecting traffic statistics on GE0/0/1 to 400s.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] set flow-stat interval 400
Format
shutdown
undo shutdown
Parameters
None
Views
GE interface view, Ethernet interface view, VLANIF interface view, MultiGE
interface view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After modifying parameters of an interface, run the shutdown and undo
shutdown commands to make the modification take effect.
When an interface is not connected to a cable or fiber, you can use the shutdown
command to disable the interface to prevent exceptions caused by interference.
Precautions
● Disabling an interface during data transmission will cause data frame loss or
service interruption. Exercise caution when you use the shutdown command.
● Some logical interfaces, such as loopback, and null interfaces, do not support
the shutdown and undo shutdown commands.
● If you run the shutdown command in the Eth-Trunk interface view, all Eth-
Trunk member interfaces are disabled.
● Running the shutdown and undo shutdown commands is equivalent to
running the restart command.
● To ensure that the cloud AP is managed by the SDN controller, you cannot
run the shutdown command on the cloud AP to disable the following
interfaces:
– Physical interface and VLANIF interface used to communicate with the
SDN controller
– VLANIF interface corresponding to the management VLAN
Example
# Shut down GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] shutdown
The undo shutdown interval command restores the default minimum interval for
re-enabling an interface.
Format
shutdown interval interval-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In some cases, for example, when parameters of an interface are modified but the
modification does not take effect immediately, run the shutdown and undo
shutdown commands to re-enable the interface. Then the modification can take
effect. To shorten the waiting time, run the shutdown interval command to set
the minimum interval for re-enabling an interface.
Precautions
● The minimum interval configured using this command also applies to the
restart command.
Example
# Set the minimum interval for re-enabling an interface to 5 seconds.
<HUAWEI> system-view
[HUAWEI] shutdown interval 5
6.2.1 am isolate
Function
The am isolate command isolates the current interface from a specified interface
unidirectionally.
The undo am isolate command cancels unidirectional isolation between the
current interface and a specified interface. If no interface is specified,
unidirectional isolation between the current interface and all the other interfaces
is canceled.
By default, no unidirectional isolation is configured between the current interface
and a specified interface
NOTE
Format
am isolate { interface-type interface-number }&<1-8>
undo am isolate [ interface-type interface-number ]&<1-8>
Parameters
Parameter Description Value
Views
GE interface view, XGE interface view, port group view, Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, only Layer 2 packets of the current interface are isolated from a
specified interface, but Layer 3 packets are not isolated. To isolate both Layer 2
and Layer 3 packets on interfaces unidirectionally, run the port-isolate mode all
command.
Precautions
Example
# Isolate GE0/0/1 from GE0/0/2 unidirectionally.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] am isolate gigabitethernet 0/0/2
Function
The auto duplex command configures the duplex mode on an Ethernet electrical
interface in auto-negotiation mode.
The undo auto duplex command restores the default duplex mode on an
Ethernet electrical interface in auto-negotiation mode.
Format
auto duplex { half | full } *
Parameters
Parameter Description Value
Views
GE interface view, MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
Precautions
● For details about the duplex modes that various Ethernet interfaces support,
see see Overview of Ethernet Interfaces in the Configuration Guide-
Overview of Ethernet Interfaces.
● In auto-negotiation mode, a GE electrical interface that works at a rate of
1000 Mbit/s supports the full-duplex mode. If the duplex mode is changed to
half-duplex, the GE electrical interface works at a maximum rate of 100
Mbit/s.
NOTE
The interfaces on both ends of a link must have the same duplex mode.
Example
# Configure Ethernet electrical interface GE0/0/1 in auto-negotiation mode to
work in half-duplex mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] auto duplex half
Format
auto speed { 10 | 100 | 1000 | 2500 | 5000 } *
Parameters
Parameter Description Value
NOTE
Views
GE interface view, MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
Example
# Configure Ethernet electrical interface GE0/0/1 to work at a rate of 100 Mbit/s
in auto-negotiation mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] auto speed 100
6.2.4 cable-snr-test
Function
The cable-snr-test command checks the network cable quality and displays the
check result.
NOTE
This function is supported only by MultiGE electrical interfaces on the AP6052DN, AP7050DN-E,
AP7052DN, AP7152DN, AP7052DE, AP8082DN, and AP8182DN.
Format
cable-snr-test
Parameters
None
Views
MultiGE interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can check the quality of the network cable on a MultiGE electrical interface to
determine whether the network cable quality meets communication requirements.
Precautions
● This command checks real-time quality of the network cable on an interface,
and the network cable quality changes with the external environment.
● A MultiGE electrical interface supports the network cable quality check only
when it works at the rate of 2.5 Gbit/s or higher.
● An interface does not support the network cable quality check when it is
Down or in loopback detection mode.
Example
# Check the network cable quality on MultiGE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface MultiGE 0/0/1
[HUAWEI-MultiGE0/0/1] cable-snr-test
Info: The current network cable is of good quality.
Format
display interface ethernet brief [ main ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can use the display interface ethernet brief command to view brief
information about Ethernet interfaces, including the physical status, auto-
negotiation mode, duplex mode, bandwidth, and average inbound and outbound
bandwidth usages within the last period of time. This information helps you locate
and rectify faults.
Precautions
To clear statistics on an interface, run the reset counters interface command.
Example
# Display brief information about all Ethernet interfaces.
<HUAWEI> display interface ethernet brief
PHY: Physical
*down: administratively down
(l): loopback
InUti/OutUti: input utility/output utility
Interface PHY Auto-Neg Duplex Bandwidth InUti OutUti Trunk
GigabitEthernet0/0/1 up enable full 1000M 0.01% 0.01% --
Table 6-9 Description of the display interface ethernet brief command output
Item Description
Item Description
Item Description
Function
The display port-isolate group command displays the configuration of a port
isolation group.
NOTE
Format
display port-isolate group { group-id | all }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The port isolation feature isolates interfaces in a VLAN. By adding interfaces to a
port isolation group, you can implement Layer 2 isolation between these
interfaces. To view the configuration of the port isolation group, run the display
port-isolate group command.
Example
# Display the configurations of all port isolation groups.
<HUAWEI> display port-isolate group all
The ports in isolate group 3:
GigabitEthernet0/0/1
GigabitEthernet0/0/2
The ports in isolate group 4:
GigabitEthernet0/0/3
GigabitEthernet0/0/4
6.2.7 duplex
Function
The duplex command configures the duplex mode on an Ethernet electrical
interface in non-auto-negotiation mode.
The undo duplex command restores the default duplex mode on an Ethernet
electrical interface in no-auto-negotiation mode.
Format
duplex { full | half }
undo duplex
Parameters
Parameter Description Value
Views
GE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The duplex mode of an interface needs to be set in the following scenarios:
● To enable an interface to send and receive packets at the same time, set the
full-duplex mode on the interface.
● To disable an interface from sending and receiving packets at the same time,
set the half-duplex mode on the interface.
Prerequisites
The interface works in non-auto negotiation mode.
Precautions
● A GE electrical interface that works at 1000 Mbit/s supports only the full-
duplex mode. A GE electrical interface and its peer interface do not need to
negotiate the duplex mode.
NOTE
The interfaces on both ends of a link must have the same duplex mode.
Example
# Configure Ethernet electrical interface GE0/0/1 to work in half-duplex mode
when non-auto negotiation is disabled on the interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo negotiation auto
[HUAWEI-GigabitEthernet0/0/1] duplex half
6.2.8 log-threshold
Function
The log-threshold command sets the inbound and outbound bandwidth usage
thresholds for generating a log.
The undo log-threshold command restores the default inbound and outbound
bandwidth usage thresholds for generating a log.
The default inbound and outbound bandwidth usage thresholds for generating a
log is 100.
Format
log-threshold { input-rate | output-rate } bandwidth-in-use [ resume-rate
resume-threshold ]
Parameters
Views
GE interface view, MultiGE interface view, XGE interface view
Default Level
2: Configuration level
Usage Guidelines
Monitoring bandwidth usage helps you learn about current device load. If the
bandwidth usage exceeds a configured threshold, a log or an alarm is generated,
indicating that bandwidth resources become insufficient and need an increase. For
example, if bandwidth usage exceeds 95% of total bandwidth, an alarm is
generated, indicating that bandwidth is exhausted. Some services may be
interrupted before the bandwidth increases. To help prevent service interruption,
setting two bandwidth usage thresholds, one for generating a log and the other
for generating an alarm helps you increase bandwidth in time.
NOTE
If the offset between the value of bandwidth-in-use and the value of resume-
threshold is too small, log information may be frequently displayed.
Example
# Configure GE0/0/1 to generate a log when the outbound interface rate exceeds
80% of the bandwidth.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] log-threshold output-rate 80
# Configure GE0/0/1 to generate a log when the outbound interface rate exceeds
80% of the bandwidth and to generate a log indicating that bandwidth usage has
been restored, when the outbound interface rate is lower than 60% of the
bandwidth.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] log-threshold output-rate 80 resume-rate 60
6.2.9 loopback
Function
The loopback command enables loopback detection on an interface.
The undo loopback command disables loopback detection on an interface.
By default, loopback detection is not configured.
NOTE
Format
loopback { internal | remote }
undo loopback
Parameters
Parameter Description Value
Views
GE interface view, MultiGE interface view, XGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Loopback detection can be enabled to test some special functions, for example,
locating faults on the Ethernet. After loopback detection is enabled, the Ethernet
interface works in full-duplex mode. After loopback detection is disabled, the
original duplex mode of the Ethernet interface is restored.
After internal loopback detection is enabled on an interface, packets sent from the
interface are sent back to this interface.
After remote loopback detection is configured, the local interface sends a packet
received from the peer interface back to the peer interface, rather than forwarding
the packet to the destination address.
Follow-up Procedure
Use a dedicated test tool to check whether the number of packets received and
the number of packets sent on the Ethernet interface are the same. If not, the
hardware is faulty. If yes, the hardware works properly.
Precautions
Loopback detection interrupts the operation of Ethernet interfaces and links. After
loopback detection is performed, run the undo loopback command to disable
loopback detection immediately.
Example
# Configure internal loopback detection on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] loopback internal
Info: This may interrupt the operation of Ethernet interfaces and links.Continue
? [Y/N]:y
Function
The negotiation auto command configures an Ethernet interface to work in auto-
negotiation mode.
Format
negotiation auto
Parameters
None
Views
GE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Earlier Ethernet worked in 10M half-duplex mode and required mechanisms such
as Carrier Sense Multiple Access (CSMA)/Collision Detection (CD) to ensure
system stability. As Ethernet technology develops, full-duplex Ethernet and 100
Mbit/s Ethernet emerge. This greatly improves Ethernet performance. Auto-
negotiation technology allows new Ethernet to be compatible with earlier
Ethernet. In auto-negotiation mode, interfaces on both ends of a link negotiate
their operating parameters, including the duplex mode and rate. If the negotiation
succeeds, the two interfaces work at the same operating parameters.
Precautions
Example
# Configure GE0/0/1 to work in non-auto negotiation mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo negotiation auto
Format
port-down holdoff-timer holdoff-timer
undo port-down holdoff-timer
Parameters
Parameter Description Value
Views
GE interface view, MultiGE interface view, XGE interface view
Default Level
2: Configuration level
Usage Guidelines
When an interface becomes Down, services on the interface are interrupted even
if this interface becomes Up soon. To prevent services from being interrupted, set
the delay in reporting a Down event on the interface so that the system still
considers that this interface is in Up state within the delay time.
Example
# Set the delay time for an interface to report the Down event to 100 ms.
<HUAWEI> system-view
[HUAWEI] interface gigabitEthernet 0/0/1
[HUAWEI-GigabitEthernet 0/0/1] port-down holdoff-timer 100
NOTE
Format
port-isolate enable [ group group-id ]
undo port-isolate enable [ group group-id ]
Parameters
Parameter Description Value
Views
GE interface view, XGE interface view, port group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To implement Layer 2 isolation between interfaces, add different interfaces to
different VLANs. This, however, wastes VLAN resources. To save VLAN resources,
enable port isolation to isolate interfaces in a VLAN. That is, you can add
interfaces to a port isolation group to implement Layer 2 isolation between these
interfaces. Port isolation provides secure and flexible networking schemes for
customers.
Precautions
● After port isolation is configured, ports are isolated at Layer 2 but can
communicate at Layer 3 by default. To configure both Layer 2 isolation and
Layer 3 isolation, run the port-isolate mode all command.
● Interfaces in a port isolation group are isolated from each other, but
interfaces in different port isolation groups can communicate. If group-id is
not specified, interfaces are added to port isolation group 1 by default.
Example
# Enable port isolation on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port-isolate enable group 1
Function
The port-isolate mode command sets the port isolation mode.
NOTE
Format
port-isolate mode { l2 | all }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
● To isolate ports at both Layer 2 and Layer 3, run the port-isolate mode all
command.
● To isolate ports at Layer 2 but allow them to communicate at Layer 3, run the
port-isolate mode l2 command.
Example
# Configure Layer 2 isolation and Layer 3 communication.
<HUAWEI> system-view
[HUAWEI] port-isolate mode l2
6.2.14 speed
Function
The speed command sets the rate for an Ethernet interface in non-auto
negotiation mode.
The undo speed command restores the default rate of an Ethernet interface in
non-auto negotiation mode.
By default, an Ethernet interface works at its highest rate when it works in non-
auto negotiation mode.
Format
speed { 10 | 100 | 1000 | 2500 | 5000 } *
undo speed
Parameters
Parameter Description Value
NOTE
Views
GE interface view, MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In non-auto negotiation mode, if interfaces on two connected devices work at
different rates, use the speed command to change the rates of the interfaces to
be the same so that the two devices can communicate.
Precautions
● If the remote interface does not support the auto negotiation mode, run the
undo negotiation auto command on the local interface to configure the
interface to work in non-auto negotiation mode. You can then change the
rate of the local interface to be the same as the rate of the remote interface
to ensure proper communication.
Example
# Configure GE0/0/1 to work at 100 Mbit/s in non-auto negotiation mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo negotiation auto
[HUAWEI-GigabitEthernet0/0/1] speed 100
6.2.15 trap-threshold
Function
The trap-threshold command sets the inbound and outbound bandwidth usage
thresholds for generating a trap.
The undo trap-threshold command restores the default inbound and outbound
bandwidth usage thresholds for generating a trap.
The default inbound or outbound bandwidth usage threshold for generating a trap
is 100.
Format
trap-threshold { input-rate | output-rate } bandwidth-in-use [ resume-rate
resume-threshold ]
undo trap-threshold { input-rate | output-rate }
Parameters
Parameter Description Value
Views
GE interface view, XGE interface view, MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The bandwidth usage represents the load on a device. If the bandwidth usage
exceeds the threshold, bandwidth of the device is insufficient for services and
needs expansion. For example, if the bandwidth usage exceeds 95%, an alarm is
generated to indicate that bandwidth resources are used up. Services may be
interrupted before system expansion. You can set the upper and lower thresholds
for bandwidth usage. When the bandwidth usage exceeds the lower threshold, the
system generates a log. When the bandwidth usage exceeds the upper threshold,
the system triggers an alarm.
NOTE
Example
# Configure GE0/0/1 to generate a trap when the outbound bandwidth usage
exceeds 60%.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] trap-threshold output-rate 60
6.2.16 virtual-cable-test
Function
The virtual-cable-test command tests the cable connected to an Ethernet
electrical interface and displays the test result.
Format
virtual-cable-test
Parameters
None
Views
GE interface view, XGE interface view, multi-GE interface view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run the virtual-cable-test command to check whether the cable works
properly. According to the command output, you can locate and rectify cable
faults.
● If the cable works properly, the total length of the cable is displayed.
● If the cable cannot work properly, the distance between the interface and the
failure point is displayed.
Precautions
● Only the electrical interface or combo interface working as an electrical
interface supports the VCT function.
● Running the virtual-cable-test command may affect services on the interface
in a short period of time.
● The VCT function is supported only when the local and peer ends work at
1000 Mbit/s in auto-negotiation mode. The VCT function is supported only by
the R230D when its interfaces work at 100 Mbit/s in auto-negotiation mode.
● When the cable works properly, the VCT function is not supported by all or
some interfaces of the following APs. The cable length is 0 in the command
output of interfaces.
– AD9431DN-24X, AP4030DN and R230D: all interfaces
– AD9430DN-24: GE0 through GE5 and GE7 through GE23
– AP7050DN-E: GE0
– AP8082DN and AP8182DN: all GE interfaces
– AD9430DN-12: all interfaces except GE1, GE3, GE12, and GE13
– AP8030DN and AP4030TN: GE0
– AP5030DN: GE1
● If the cable cannot work properly, the distance between the interface and the
failure point is displayed.
● The test result is only for reference and may be inaccurate for cables of some
vendors.
● The test result is related to the signal attenuation of a cable. When the cable
length is shorter than 3 m, the signal attenuation mostly results from the
connector rather than the cable itself. Therefore, the test result is inaccurate.
● VCT detection cannot be performed on multiple interfaces of the device at the
same time.
● For wire sequence of cables, see Testing the Connection of Assembled Cables
in the Hardware Installation and Maintenance Guide.
Example
# Test the cable connected to GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] virtual-cable-test
Warning: The command will stop service for a while. Continue? [Y/N]y
Pair A length: 4 meter(s)
Pair B length: 4 meter(s)
Pair C length: 4 meter(s)
Pair D length: 4 meter(s)
Pair A state: OK
Pair B state: OK
Pair C state: OK
Pair D state: OK
Item Description
Format
display interface loopback [ loopback-number | main ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
In the scenario where you need to monitor the status of an interface or locate an
interface fault, you can use the display interface loopback command to collect
the statistics on the interface including the status. Through the displayed
information, you can collect the traffic statistics and troubleshoot the interface.
Example
# Display the status of a specified loopback interface.
<HUAWEI> display interface loopback 6
LoopBack6 current state : UP
Line protocol current state : UP (spoofing)
Description:HUAWEI, AP Series, LoopBack6 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is 10.10.1.1/32
Physical is Loopback
Current system time: 2011-12-12 10:14:21+08:00
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Realtime 0 seconds input rate 0 bits/sec, 0 packets/sec
Realtime 0 seconds output rate 0 bits/sec, 0 packets/sec
Input: 0 bytes
Output:0 bytes
Input bandwidth utilization : 0%
Output bandwidth utilization : 0%
Item Description
Item Description
Line protocol current Link layer protocol status of a loopback interface. The
state link layer protocol status of a loopback interface is
always Up after the loopback interface is created.
Last 300 seconds Indicates the rates for sending and receiving the bytes
input rate and the packets by the interface in the last five minutes.
Last 300 seconds
output rate
Output bandwidth Indicates the percentage of the rate for sending packets
utilization to the total bandwidth.
Format
display interface null [ 0 | main ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display interface null command displays the status of a null interface. The
interface status information includes: the physical status, link layer protocol status,
description, MTU, current system time, last time statistics about the null interface
are cleared, incoming and outgoing packet rates in bit/s and pps, total numbers of
packets and bytes received and sent by the null interface, and percentages of the
rates for receiving and sending packets to the total bandwidth.
Precautions
There is only one null interface, namely, NULL 0.
Example
# Display the status of Null 0 interface.
<HUAWEI> display interface null 0
NULL0 current state : UP
Line protocol current state : UP (spoofing)
Description:HUAWEI, AP Series, NULL0 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet protocol processing : disabled
Physical is NULL DEV
Current system time: 2011-12-12 10:28:12+08:00
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Realtime 0 seconds input rate 0 bits/sec, 0 packets/sec
Line protocol current Link layer protocol status of the interface. The
state protocol status of the null interface is always Up.
Last 300 seconds input Rates for sending and receiving the bytes and the
rate packets by the interface in the last five minutes.
Last 300 seconds output
rate
Item Description
Function
The interface loopback command creates a loopback interface.
Format
interface loopback loopback-number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
A loopback interface is always Up at the physical layer and link layer unless it is
manually shut down.
Example
# Create loopback interface 5.
<HUAWEI> system-view
[HUAWEI] interface loopback 5
[HUAWEI-LoopBack5]
Function
Using the interface null command, you can enter the null interface view.
Format
interface null 0
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The Null0 interface never forwards or accepts any traffic. All traffic sent to this
interface is directly discarded. Unnecessary traffic can be sent to the Null0
interface to avoid using ACLs.
Precautions
There is only one null interface, named null0. This interface is always Up and
cannot be shut down or deleted.
Example
# Enter the view of the Null0 interface.
<HUAWEI> system-view
[HUAWEI] interface null 0
[HUAWEI-NULL0]
6.3.5 management-interface
Function
The management-interface command configures a VLANIF or dialer interface as
a management interface.
Format
management-interface
undo management-interface
Parameters
None
Views
VLANIF interface view, dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To manage a device through a VLANIF or dialer interface, run this command to
configure this interface as a management interface.
Precautions
If no interface on a device is configured as a management interface, the device
can be managed through all interfaces. Once an interface on the device is
configured as a management interface, you cannot manage the device through
the other interfaces.
A maximum of four interfaces can be configured as management interfaces.
If an interface is specified as the management interface using the management-
interface command, it will still be considered as the management interface after
the management-plane isolate enable command is executed.
Example
# Configure VLANIF 10 as a management interface.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] management-interface
Format
display bridge mac-address
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When you need to view the bridge MAC address of a device, run the display
bridge mac-address command.
Example
# Display the bridge MAC address of a device.
<HUAWEI> display bridge mac-address
System bridge MAC address: 00e0-f74b-6d00
Format
display mac-address mac-address [ vlan vlan-id ] [ verbose ]
[ verbose ]
display mac-address { authen | guest | security } [ vlan vlan-id | interface-type
interface-number ] * [ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table of the wireless access point stores MAC addresses of other
devices. When forwarding an Ethernet frame, the wireless access point searches
the MAC address table for the outbound interface according to the destination
MAC address and VLAN ID in the Ethernet frame.
The display mac-address command displays all MAC address entries, such as
dynamic MAC address entries, static MAC address entries, and blackhole MAC
address entries. A MAC address entry contains the destination MAC address, VLAN
ID, outbound interface, and entry type.
Follow-up Procedure
If any MAC address entry in the command output is incorrect, run the undo mac-
address command to delete the entry or run the mac-address command to add a
correct one.
Precautions
If you run the display mac-address command without parameters, all MAC
address entries are displayed.
When the wireless access point has a large number of MAC address entries, it is
recommended that you specify parameters in the command to filter the output
information. Otherwise, the following problems may occur due to excessive output
information:
● The displayed information is repeatedly refreshed, so you cannot find the
required information.
● The system traverses and retrieves information for a long time, and does not
respond to any request.
Example
# Display all MAC address entries.
<HUAWEI> display mac-address
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
4c1f-cc25-611b 100/- GE0/0/1 security
-------------------------------------------------------------------------------
Total items displayed = 1
Item Description
Function
The display mac-address aging-time command displays the aging time of
dynamic MAC address entries in the MAC address table.
Format
display mac-address aging-time
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
This command displays the aging time of dynamic MAC address entries on the
wireless access point. You can check whether the aging time is suitable for
network requirements and device performance.
Follow-up Procedure
If the aging time is unsuitable for requirements or device performance, run the
mac-address aging-time command to set the aging time properly.
Precautions
If the aging time is 0, dynamic MAC addresses will not be aged out. In this case,
MAC address entries increase sharply and the MAC address table will be full
quickly.
Example
# Display the aging time of dynamic MAC address entries.
<HUAWEI> display mac-address aging-time
Aging time: 300 second(s)
Item Description
Function
The display mac-address blackhole command displays blackhole MAC address
entries.
Format
display mac-address blackhole [ vlan vlan-id ] [ verbose ]
Parameters
Parameter Description Value
vlan vlan-id Displays blackhole MAC address entries in The value is an integer
a specified VLAN. vlan-id specifies the ID of that ranges from 1 to
a VLAN. 4094.
verbose Displays detailed information about -
blackhole MAC address entries.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table of the wireless access point stores MAC addresses of other
devices. When forwarding an Ethernet frame, the wireless access point searches
the MAC address table for the outbound interface according to the destination
MAC address and VLAN ID in the Ethernet frame.
The MAC address table contains the following MAC address entries:
● Blackhole MAC address entries that are used to discard packets with the
specified MAC addresses or destination MAC addresses. Blackhole MAC
address entries are manually configured and will not be aged out.
● Static MAC entries that are manually configured and will not be aged out.
● Dynamic MAC address entries that are learned by the wireless access point
and will be aged out when the aging time expires.
To check whether blackhole MAC address entries are configured correctly, run this
command. These entries ensure communication between authorized users.
Follow-up Procedure
If any blackhole MAC address entry in the command output is incorrect, run the
undo mac-address command to delete the entry or run the mac-address
command to add a correct one.
Precautions
If you run the display mac-address blackhole command without parameters, all
blackhole MAC address entries are displayed.
If the MAC address table does not contain any blackhole MAC address, no
information is displayed.
Example
# Display all blackhole MAC address entries.
<HUAWEI> display mac-address blackhole
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
0022-0022-0033 100/- - blackhole
0000-0000-0001 200/- - blackhole
-------------------------------------------------------------------------------
Total items displayed = 2
Format
display mac-address dynamic [ vlan vlan-id | interface-type interface-number ] *
[ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table needs to be updated constantly because the network
topology always changes. You can use this command to view learned MAC
addresses in real time.
Follow-up Procedure
If the displayed dynamic MAC address entries are invalid, run the undo mac-
address command to delete dynamic MAC address entries.
Precautions
If you run the display mac-address dynamic command without parameters, all
dynamic MAC address entries are displayed.
If the MAC address table does not contain any dynamic MAC address entry, no
information is displayed.
When the wireless access point has a large number of dynamic MAC address
entries, it is recommended that you specify parameters in the command to filter
the output information. Otherwise, the following problems may occur due to
excessive output information:
● The displayed information is repeatedly refreshed, so you cannot find the
required information.
● The system traverses and retrieves information for a long time, and does not
respond to any request.
Example
# Display all dynamic MAC address entries.
<HUAWEI> display mac-address dynamic
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
0000-0000-0001 100/- GE0/0/1 dynamic
-------------------------------------------------------------------------------
Total items displayed = 1
Item Description
Function
The display mac-address static command displays static MAC address entries.
Format
display mac-address static [ vlan vlan-id | interface-type interface-number ] *
[ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table of the wireless access point stores MAC addresses of other
devices. When forwarding an Ethernet frame, the wireless access point searches
the MAC address table for the outbound interface according to the destination
MAC address and VLAN ID in the Ethernet frame.
The MAC address table contains the following MAC address entries:
● Static MAC entries that are manually configured and will not be aged out.
● Blackhole MAC address entries that are used to discard packets with the
specified source MAC addresses or destination MAC addresses. Blackhole MAC
address entries are manually configured and will not be aged out.
● Dynamic MAC address entries that are learned by the wireless access point
and will be aged out when the aging time expires.
To improve network security, configure static MAC address entries to ensure that
packets destined for specified MAC addresses are forwarded by the specified
interfaces. This prevents attack packets with bogus MAC addresses and guarantees
communication between the wireless access point and the upstream device or
server. After configuring static MAC address entries, you can run the display mac-
address static command to verify the configuration.
Follow-up Procedure
If any static MAC address entry is incorrect, run the undo mac-address command
to delete it.
Precautions
If you run the display mac-address static command without parameters, all static
MAC address entries are displayed.
If the MAC address table does not contain any static MAC address entry, no
information is displayed.
Example
# Display all static MAC address entries.
<HUAWEI> display mac-address static
-------------------------------------------------------------------------------
MAC Address VLAN/VSI Learned-From Type
-------------------------------------------------------------------------------
0000-0000-0033 100/- GE0/0/1 static
0000-0000-0001 200/- GE0/0/1 static
-------------------------------------------------------------------------------
Total items displayed = 2
Item Description
Item Description
Format
display mac-address summary
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The MAC address table of the device stores MAC addresses of other devices. When
forwarding an Ethernet frame, the wireless access point searches the MAC address
table for the outbound interface according to the destination MAC address and
VLAN ID in the Ethernet frame.
When the wireless access point has many MAC address entries of different types,
you can use the display mac-address summary command to view the summary
of MAC address entries in the system. In the command output, Local and Remote
identify the MAC address entries learned by the local device and MAC address
entries synchronized from other devices.
Example
# Display statistics on all MAC address entries in the system.
<HUAWEI> display mac-address summary
Summary information of slot 0:
-----------------------------------
Static : 0
Local interface : 10
Blackhole : 0
Dyn-Local : 0
Dyn-Remote : 0
Dyn-Trunk : 0
Sticky : 0
Security : 1
In-used : 1
Capacity : 4096
-----------------------------------
Item Description
Capacity Capacity of the MAC address table. The actual value varies
according to device models.
Format
display mac-address total-number
display mac-address total-number [ vlan vlan-id | interface-type interface-
number ] *
display mac-address total-number vlan all
display mac-address total-number blackhole [ vlan vlan-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The MAC address table of the wireless access point stores MAC addresses of other
devices. When forwarding an Ethernet frame, the wireless access point searches
the MAC address table for the outbound interface according to the destination
MAC address and VLAN ID in the Ethernet frame.
When the wireless access point has many MAC address entries of different types,
you can use the display mac-address total-number command to view statistics
on MAC address entries of a specified type.
Precautions
If no parameter is specified, the total number of MAC address entries in the
system is displayed.
If interface-type interface-number is not specified, the total number of MAC
addresses learned by all interfaces is displayed.
If vlan vlan-id is not specified, the total number of MAC addresses in all VLANs is
displayed.
Example
# Display the number of dynamic MAC address entries.
<HUAWEI> display mac-address total-number dynamic
Info: total number of mac-address is : 20
Info: total number of mac- Total number of MAC address entries in the
address system.
Format
display mac-limit [ interface-type interface-number | vlan vlan-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To check whether MAC address limiting rules are configured correctly, run the
display mac-limit command. If a rule is incorrect, run the mac-limit command to
modify the rule.
Precautions
If the interface-type and interface-number are not specified, MAC address limiting
rules on all interfaces are displayed.
If vlan vlan-id is not specified, MAC address limiting rules in all VLANs are
displayed.
Example
# Display all the MAC address limiting rules.
<HUAWEI> display mac-limit
MAC limit is enabled
Total MAC limit rule count : 1
7.1.10 mac-address
Function
The mac-address command adds a static MAC address entry or a blackhole MAC
address entry.
The undo mac-address command deletes MAC address entries of a specified type.
Format
mac-address static mac-address interface-type interface-number vlan vlan-id
mac-address blackhole mac-address [ vlan vlan-id ]
undo mac-address blackhole [ mac-address ] [ vlan vlan-id ]
undo mac-address mac-address [ vlan vlan-id ]
undo mac-address static mac-address interface-type interface-number vlan vlan-
id
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MAC address entries are classified into the following types:
● Dynamic MAC address entries that are learned by an interface after MAC
address learning is enabled.
● Static MAC address entries that are manually configured. They take
precedence over dynamic MAC address entries.
● Blackhole MAC address entries that are manually configured. A data frame is
discarded if the source or destination MAC address matches a blackhole MAC
address entry.
Functions of static and blackhole MAC address entries are:
● Static MAC address entries prevent bogus packets with trusted device MAC
addresses sent from attackers and guarantee communication between the
wireless access point and the upstream device or server.
● Blackhole MAC address entries prevent untrusted devices from attacking the
wireless access point.
The undo mac-address command is used in the following scenarios:
● The upstream device or server has changed or the untrusted device has been
removed, and the corresponding static MAC address entry or blackhole MAC
address entry needs to be deleted.
● Dynamic address entries become invalid and need to be deleted to trigger
MAC address relearning.
Prerequisites
The interface has been added to a VLAN.
Precautions
You can configure multiple static MAC address entries or blackhole MAC address
entries by running the mac-address command multiple times.
If you configure a static or blackhole MAC address entry when the MAC table is
full, the wireless access point processes the MAC address entry as follows:
● If a dynamic MAC address entry with the same MAC address exists in the
MAC address table, the wireless access point replaces the dynamic MAC
address entry with the configured entry.
● If no dynamic MAC address entry with the same MAC address exists in the
MAC address table, the MAC address entries cannot be added to the MAC
address table.
When using the undo mac-address command, pay attention to the following
points:
● If interface-type interface-number is not specified, MAC address entries of a
specified type on all interfaces are deleted.
● If vlan vlan-id is not specified, MAC address entries of a specified type in all
VLANs are deleted.
Example
# Add a static MAC address entry to the MAC address table. The destination MAC
address is 0003-0003-0003. The outbound interface is gigabitethernet0/0/1, which
belongs to VLAN 4.
<HUAWEI> system-view
[HUAWEI] mac-address static 0003-0003-0003 gigabitethernet 0/0/1 vlan 4
# Configure a blackhole MAC address entry to discard the Ethernet frames whose
destination MAC address is 0004-0004-0004 and VLAN ID is VLAN 5.
<HUAWEI> system-view
[HUAWEI] mac-address blackhole 0004-0004-0004 vlan 5
Function
The mac-address aging-time command sets the aging time of dynamic MAC
address entries.
The undo mac-address aging-time command restores the default aging time of
dynamic MAC address entries.
By default, the aging time of dynamic MAC address entries is 300 seconds.
Format
mac-address aging-time aging-time
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The network topology changes frequently, and the wireless access point will learn
many MAC addresses. You can run the mac-address aging-time command to set
a proper aging time for dynamic MAC address entries so that aged MAC address
entries are deleted from the MAC address table. This reduces MAC address entries
in the MAC address table.
The system starts an aging timer for each dynamic MAC address entry. If a
dynamic MAC address entry is not updated within a certain period (twice the
aging time), the entry is deleted. If the entry is updated within this period, the
aging timer of this entry is reset. If the aging time is short, the wireless access
point is sensitive to network changes.
When setting the aging time of dynamic MAC address entries, follow these rules:
● Set a longer aging time on a stable network and a shorter aging time on an
unstable network.
● The capacity of the MAC address table on a low end device is small; therefore,
set a relatively short aging time on low end devices to save the MAC address
table space.
Precautions
If the aging time is 0, dynamic MAC addresses will not be aged out. In this case,
MAC address entries increase sharply and the MAC address table will be full
quickly.
If you run the mac-address aging-time command multiple times, only the latest
configuration takes effect.
Dynamic MAC address entries are lost after system restart. Static MAC address
entries and blackhole MAC address entries are not aged or lost.
Example
# Set the aging time of dynamic MAC address entries to 500 seconds.
<HUAWEI> system-view
[HUAWEI] mac-address aging-time 500
Format
(Interface view) mac-address learning disable [ action { discard | forward } ]
(VLAN view) mac-address learning disable
undo mac-address learning disable
Parameters
Parameter Description Value
Views
VLAN view, GE interface view, Eth-Trunk interface view, XGE interface view,
MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If you want an interface to forward only packets with certain MAC addresses, use
this command. For example, if an interface is connected to a server, configure a
static MAC address entry with the MAC address of the server, and then disable
MAC address learning and set the action to discard on the interface. The
configuration prevents other servers or terminals from accessing the interface and
improves network stability and security.
When a wireless access point with MAC address learning enabled receives an
Ethernet frame, it records the source MAC address and inbound interface of the
Ethernet frame in a MAC address entry. When receiving other Ethernet frames
destined for this MAC address, the wireless access point forwards the frames
through the corresponding outbound interface according to the MAC address
entry. MAC address learning reduces broadcast packets on a network.
You can use the mac-address learning disable command to disable MAC address
learning on an interface. The action performed on received packets can be set to
discard or forward.
● When the action is set to forward, the wireless access point forwards packets
according to the MAC address table. If a packet does not match any MAC
address entry, the wireless access point broadcasts the packet.
● When the action is set to discard, the wireless access point searches for the
source MAC address of the packet in the MAC address table. If the source
MAC address is found in the MAC address table, the wireless access point
forwards the packet according to the MAC address entry. If the source MAC
address is not found, the wireless access point discards the packet. The default
action is forward.
Precautions
After MAC address learning is disabled on an interface, the device does not learn
new MAC addresses on the interface, but untrusted terminals can still access the
network.
Example
# Disable MAC address learning in VLAN 2.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] mac-address learning disable
Function
The mac-learning priority command sets the MAC address learning priority of an
interface.
The undo mac-learning priority command restores the default MAC learning
priority of an interface.
Format
mac-learning priority priority-id
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the undo mac-learning priority allow-flapping command to forbid
MAC address flapping between interfaces with the same priority.
Both the undo mac-learning priority allow-flapping command and the mac-
learning priority command can prevent MAC address flapping. The difference
between the two commands is as follows:
Precautions
If you run the mac-learning priority command multiple times in the same
interface view, only the latest configuration takes effect.
Example
# Set the MAC address learning priority of GigabitEthernet0/0/1 to 3.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-learning priority 3
By default, MAC address flapping between interfaces with the same priority is
allowed.
Format
mac-learning priority priority-id allow-flapping
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Both the mac-learning priority command and the undo mac-learning priority
allow-flapping command can prevent MAC address flapping. The difference
between the two commands is as follows:
Example
# Forbid MAC address flapping between interfaces with priority 1.
<HUAWEI> system-view
[HUAWEI] undo mac-learning priority 1 allow-flapping
7.1.15 mac-limit
Function
The mac-limit command configures a rule to limit the number of MAC addresses
that can be learned.
Format
(Interface view) mac-limit { action { discard | forward } | alarm { disable |
enable } | maximum max-num }*
Parameters
Parameter Description Value
Views
VLAN view, GE interface view, Eth-Trunk interface view, XGE interface view,
MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The mac-limit command limits the number of access users and prevents attacks
to the MAC address tables. You can enable the function to improve network
security.
Precautions
Example
# Configure the following MAC address learning rule on GigabitEthernet0/0/1:
● The maximum number of learned MAC addresses is 30.
● When the number of learned MAC addresses exceeds the maximum, and an
alarm is generated.
<HUAWEI> system-view
[HUAWEI] interface GigabitEthernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] mac-limit maximum 30 alarm enable
Format
port bridge enable
undo port bridge enable
Parameters
None
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
By default, an interface does not forward packets whose source and destination
MAC addresses are both learned by this interface. When the interface receives
such a packet, it discards the packet as an invalid packet.
After the port bridge function is enabled on the interface, the interface forwards
such a packet if the destination MAC address of the packet is in the MAC address
table.
The port bridge function is used in the following scenarios:
● The device connects to devices that do not support Layer 2 forwarding. When
users connected to these devices need to send packets, the packets are
directly sent to the device and forwarded by the device. These packets have
the same source and destination MAC address; therefore, you need to enable
port bridge to forward packets with the same source and destination MAC
address.
● The device is used as an access device in a data center and is connected to
servers. Each server is configured with multiple virtual machines. The virtual
machines need to transmit data to each other. If data between virtual
machines is transmitted on the server, the data transmission rate and server
performance may be affected. To improve the data transmission rate and
Example
# Enable the port bridge function on GigabitEthernet0/0/1.
<HUAWEI> system-view
[HUAWEI] interface GigabitEthernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port bridge enable
Ethernet link aggregation is supported only by the following models: AP6750-10T, AirEngine
5760-10, AP7060DN, AP5510-W-GP, AD9430DN-12, AD9430DN-24, AD9431DN-24X, AP2051DN,
AP2051DN-E, AP2051DN-S, AP4030TN, AP4051DN, AP4051DN-S, AP4151DN, AP4051TN,
AP5030DN, AP5050DN-S, AP5130DN, AP6050DN, AP6150DN, AP6052DN, AP7050DE,
AP7050DN-E, AP7052DN, AP7152DN, AP7052DE, AP8030DN, AP8130DN, AP8050DN,
AP8050DN-S, AP8150DN, AP8050TN-HD, AP8082DN, AP8182DN, AP9130DN, AP9131DN,
AP9132DN.
Function
The display eth-trunk command displays the configuration about an Eth-Trunk.
Format
display eth-trunk [ trunk-id [ interface interface-type interface-number |
verbose ] ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After configuring an Eth-Trunk on a device, you can run the display eth-trunk
command to check whether the configuration of the Eth-Trunk is correct.
When using the display eth-trunk command, note that:
● If no optional parameter is specified, the configurations of all Eth-Trunks are
displayed.
● If trunk-id is specified only, the configuration of a specified Eth-Trunk is
displayed.
● If trunk-id and interface interface-type interface-number are specified, the
configuration of member interfaces of the specified Eth-Trunk is displayed.
● If trunk-id is specified and verbose is configured, the detailed configuration of
a specified Eth-Trunk is displayed, including the statistics about interface
traffic.
Prerequisites
The interface specified in this command must be an existing one; otherwise, the
system prompts an error.
Precautions
If there is a great deal of statistics about traffic on Eth-Trunks, you are
recommended to specify Eth-Trunk ID or interface interface-type interface-
number to filter output information. Otherwise, the following problems may occur
due to excessive output information:
● The displayed information is repeatedly updated, and required information
cannot be located.
● The system does not respond because of long-time information traverse and
search.
Example
# Display the configuration of Eth-Trunk 1 in manual load balancing mode.
<HUAWEI> display eth-trunk 1
Eth-Trunk1's state information is:
Format
display interface eth-trunk [ trunk-id | main ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display interface eth-trunk command to view the status and
weight of each member interface of the Eth-Trunk.
To monitor the status of an interface or locate an interface fault, you can use the
display interface eth-trunk command to collect the status of and statistics on
the interface. You can collect traffic statistics and locate faults on the interface
according to the command output.
Example
# Display the status of Eth-Trunk 2.
<HUAWEI> display interface Eth-Trunk 2
Eth-Trunk2 current state : DOWN
Line protocol current state : DOWN
Description:HUAWEI, AP Series, Eth-Trunk5 Interface
Switch Port, PVID : 1, TPID : 8100(Hex), Hash arithmetic : According to src-d
st-ip,The Maximum Frame Length is 9216
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is dcd2-fcf9-b5ca
Current system time: 2011-12-14 04:26:14+08:00
Input: 0 packets, 0 bytes
Unicast: 0, Multicast: 0
Broadcast: 0, Discard: 0
Total Error: 0
Line protocol current state Link layer protocol status of the interface:
● DOWN: indicates that the link layer
protocol of the interface fails or no IP
address is assigned to the interface.
● UP: indicates that the link layer protocol
of the interface is running properly.
Item Description
Function
The display trunk index-map command displays the mapping between Eth-Trunk
interface IDs and internal indexes.
Format
display trunk index-map
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
An ID is manually allocated to an Eth-Trunk during Eth-Trunk creation. For
example, the ID of Eth-Trunk 1 is 1. In addition, the device also allocates an
internal number to each Eth-Trunk. The internal number is the index. When
allocating indexes, the device traverses indexes in ascending order. The
unallocated index is used as the index of an Eth-Trunk. Therefore, the mapping
between Eth-Trunk IDs and indexes is unordered.
Example
# Display the mapping between Eth-Trunk interface IDs and internal indexes.
<HUAWEI> display trunk index-map
Index Interface Name
-----------------------------
1 Eth-Trunk10
2 Eth-Trunk20
3 Eth-Trunk5
Item Description
Format
display trunk resource
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To learn about used trunk resources, run the display trunk resource command to
check the number of created trunks and the number of interfaces added to the
trunk interface.
Example
# Display trunk resources used on a device.
<HUAWEI> display trunk resource
Number of configured trunk interfaces is : 4
Interface Member Count
-----------------------------------------------------------
Eth-Trunk1 2
Eth-Trunk10 0
Eth-Trunk30 0
Eth-Trunk55 0
Format
display trunkmembership eth-trunk trunk-id
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After an Eth-Trunk interface is successfully configured, you can run the display
trunkmembership eth-trunk command to view the configuration of the Eth-
Trunk interface and its member interfaces.
In the scenario where you need to monitor the status of an interface or locate an
interface fault, you can use the display trunkmembership eth-trunk command
to view detailed information about an Eth-Trunk interface and its member
interfaces. You can troubleshoot the interface and its member interfaces according
to the queried information.
Prerequisites
An Eth-Trunk interface is correctly configured. The Eth-Trunk interface must be
created in advance; otherwise, the system prompts an error when you run the
display trunkmembership eth-trunk command.
Example
# Display information about member interfaces of Eth-Trunk 2.
<HUAWEI> display trunkmembership eth-trunk 2
Trunk ID: 2
Item Description
7.2.6 eth-trunk
Function
The eth-trunk command adds an interface to an Eth-Trunk.
Format
eth-trunk trunk-id
undo eth-trunk
Parameters
Parameter Description Value
Views
GE interface view, XGE interface view
Default Level
2: Configuration level
Usage Guidelines
To improve the connection reliability and increase the bandwidth, you can use the
eth-trunk command to bind multiple interfaces into an Eth-Trunk.
When you add an Ethernet interface to an Eth-Trunk, the interface must use the
default settings of certain attributes. Otherwise, the interface cannot be added to
the Eth-Trunk. The attributes that use the default settings include:
● Link type
● VLAN that the interface belongs to
● Interface priority
● Whether the interface allows BPDUs to pass through
● MAC address learning
● Adding the interface to a multicast group statically
● Discarding broadcast packets
● Discarding unknown multicast packets
● Discarding unknown unicast packets
Those attributes must remain consistent and cannot be changed individually. If the
preceding attributes of an Eth-Trunk are changed, the attributes of all the member
interfaces are changed accordingly.
Example
# Add GigabitEthernet0/0/1 to Eth-Trunk 2.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] eth-trunk 2
Format
interface eth-trunk trunk-id
undo interface eth-trunk trunk-id
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If the specified Eth-Trunk already exists, you can directly enter the Eth-Trunk
interface view by using the interface eth-trunk command.
You can delete an Eth-Trunk only if the Eth-Trunk does not contain any member
interface.
Example
# Create Eth-Trunk 2.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 2
[HUAWEI-Eth-Trunk2]
Function
The least active-linknumber command sets the lower threshold for the number
of active member links on an Eth-Trunk.
The undo least active-linknumber command restores the default lower threshold
for the number of active member links.
By default, the lower threshold for the number of active member links on an Eth-
Trunk is 1.
Format
least active-linknumber link-number
Parameters
Parameter Description Value
link-number Specifies the lower threshold for the The value is an integer
number of active member links. ranging from 1 to 8.
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The number of active member links on an Eth-Trunk affects the status and
bandwidth of the Eth-Trunk. The bandwidth of an Eth-Trunk equals the total
bandwidth of all member interfaces in Up state.
The number of Up member links affects the status and bandwidth of the Eth-
Trunk. To ensure that the Eth-Trunk functions properly and is less affected by
member link status change, set the following threshold.
To delete the configured lower threshold for the number of active member links or
restore the default value, use the undo least active-linknumber command or
least active-linknumber 1 command.
Prerequisites
Precautions
If you run the least active-linknumber command multiple times, only the latest
configuration takes effect.
After the upper threshold for the number of active member links is configured,
● The Eth-Trunk interface goes Down when the number of active member links
falls below the configured lower threshold.
● The Eth-Trunk interface goes Up when the number of active member links
reaches the configured lower threshold.
Example
# Set the lower threshold for the number of active member links to 3.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] least active-linknumber 3
7.2.9 load-balance
Function
The load-balance command sets a load balancing mode of an Eth-Trunk.
The undo load-balance command restores the default load balancing mode of an
Eth-Trunk.
Format
load-balance { dst-ip | dst-mac | src-ip | src-mac | src-dst-ip | src-dst-mac }
undo load-balance
Parameters
Parameter Description Value
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure proper load balancing between physical links of an Eth-Trunk and avoid
link congestion, use the load-balance command to set the load balancing mode
of the Eth-Trunk.
Load balancing is valid only for outgoing traffic; therefore, the load balancing
modes for the interfaces at both ends of the link can be different and do not
affect each other.
You can set the load balancing mode based on traffic models. When a parameter
of traffic changes frequently, you can set the load balancing mode based on this
parameter to ensure that the traffic is load balanced evenly. For example, if IP
addresses in packets change frequently, use the load balancing mode based on
dst-ip, src-ip, or src-dst-ip so that traffic can be properly load balanced among
physical links. If MAC addresses in packets change frequently and IP addresses are
fixed, use the load balancing mode based on dst-mac, src-mac, or src-dst-mac so
that traffic can be properly load balanced among physical links.
Precautions
If you run the load-balance command multiple times, only the latest
configuration takes effect.
Example
# Set the load balancing mode of an Eth-Trunk to dst-mac.
<HUAWEI> system-view
[HUAWEI] interface Eth-Trunk 1
[HUAWEI-Eth-Trunk1] load-balance dst-mac
7.2.10 mode
Function
The mode command configures the working mode of an Eth-Trunk.
The undo mode command restores the default working mode of an Eth-Trunk.
Format
mode manual load-balance
undo mode
Parameters
Parameter Description Value
manual load-balance Indicates the manual load balancing mode. -
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenarios
Precautions
If you run the mode command multiple times, only the latest configuration takes
effect.
Example
# Configure Eth-Trunk 1 to work in manual load-balance mode.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] mode manual load-balance
Format
trunk-member trap in private-mib enable
undo trunk-member trap in private-mib enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a trunk member interface changes from Up to Down or from Down to Up,
you are informed of the status change so as to check whether the device fails or
recovers.
If you want to know to which trunk interface the member interface belongs, you
can run the trunk-member trap in private-mib enable command to configure
trunk member interfaces to send trap messages through the private MIB. This is
because the trap message sent through a private MIB carries information about
the trunk interface with the specified ID, whereas the trap messages sent through
the public MIB do not carry information about trunk interfaces with specified IDs.
Prerequisites
Precautions
Example
# Configure the Eth-Trunk member interface to send trap messages through the
private MIB.
<HUAWEI> system-view
[HUAWEI] trunk-member trap in private-mib enable
Function
The damping time command sets the VLAN damping time on a VLANIF interface,
that is, the delay before reporting a VLAN Down event to the VLANIF interface.
The undo damping time command restores the default dumping time.
The default damping time on a VLANIF interface is 0 seconds. That is, the VLANIF
interface is notified immediately after the VLAN becomes Down.
Format
damping time delay-time
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When all interfaces in a VLAN become Down, the wireless access point waits for a
period specified by delay-time and then reports the VLAN Down event to the
VLANIF interface.
Precautions
If any interface in the VLAN becomes Up within the delay time, the VLANIF
interface remains Up.
You can use the display interface vlanif command to view the VLAN damping
time.
If you run the damping time command multiple times in the same VLANIF
interface view, only the latest configuration takes effect.
Example
# Set the VLAN damping time on VLANIF 10 to 10 seconds.
<HUAWEI> system-view
[HUAWEI] vlan 10
[HUAWEI-vlan10] quit
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] damping time 10
Function
The description command sets the description of a VLAN.
By default, the description of a VLAN shows the VLAN ID. For example, the
description of VLAN 2 is "VLAN 0002".
Format
description description
undo description
Parameters
Parameter Description Value
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The description command is used to set the description of a VLAN, which is
convenient for identifying, memorizing, and maintaining the VLAN.
The display vlan vlan-id verbose command can display the description of a
specified VLAN.
Precautions
Set different descriptions for VLANs to distinguish.
If you run the description command multiple times in the same VLAN view, only
the last configuration takes effect.
Example
# Set the description of VLAN 2 as "test".
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] description test
Format
description description
undo description
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use the display interface vlanif command to view the description of a
VLANIF interface.
Precautions
If you run the description command multiple times in the same VLANIF interface
view, only the latest configuration takes effect.
Example
# Set the description of VLANIF 2 to "test".
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] quit
[HUAWEI] interface vlanif 2
[HUAWEI-Vlanif2] description test
Format
display interface vlanif [ vlan-id | main ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To monitor an interface or locate an interface fault, you can use the display
interface vlanif command to view the interface status, interface configuration,
and traffic statistics on the interface.
Prerequisites
Precautions
Example
# Display the status and configuration of VLANIF 3.
<HUAWEI> display interface vlanif 3
Vlanif3 current state : DOWN
Line protocol current state : DOWN
Description:HUAWEI, AP Series, Vlanif3 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet protocol processing : disabled
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 00e0-fc01-00e1
Current system time: 2007-09-12 20:21:13
Input bandwidth utilization : --
Output bandwidth utilization : --
Item Description
Last line protocol up The last time the line protocol is up.
time
Format
display port vlan [ interface-type interface-number | active ] *
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display port vlan command to view information about interfaces
of the VLAN and check whether the VLAN is assigned by the command, protocols,
or services. If a fault occurs on an interface, you can locate the fault based on the
information about the interface and VLAN.
Prerequisite
A VLAN has been created and the Layer 2 interface has joined the VLAN.
Precautions
If a large number of mappings between interfaces and VLANs exist on the device,
you are advised to specify the interface or active to filter the command output.
Otherwise, the following problems may occur due to excessive output information:
Example
# Display information about interfaces that belong to each VLAN on the device.
<HUAWEI> display port vlan
Port Link Type PVID Trunk VLAN List
-------------------------------------------------------------------------------
GigabitEthernet0/0/1 trunk 1 1 2001
Item Description
Trunk VLAN List ● Indicates the VLAN IDs that are dynamically added
by an interface.
● Indicates the VLAN IDs of packets that are statically
configured to pass through an interface.
VLAN List Indicates the VLAN IDs of packets that are statically
configured to pass through an interface.
Format
display vlan [ vlan-id [ verbose ] ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Example
# Display brief information about all VLANs.
<HUAWEI> display vlan
* : management-vlan
---------------------
The total number of vlans is : 6
VLAN ID Type Status MAC Learning Broadcast/Multicast/Unicast Property
--------------------------------------------------------------------------------
1 common enable enable forward forward forward default
10 common enable enable forward forward forward default
100 common enable enable forward forward forward default
199 common enable enable forward forward forward default
900 common enable enable forward forward forward default
4094 common enable enable forward forward forward default
Item Description
VLAN state Indicates the status of the VLAN. The value can
be:
● Up
● Down
The status of a VLAN is determined by the
status of member interfaces in the VLAN. A
VLAN is Up only when at least one member
interface in the VLAN is Up.
Active Tag/Active Untag Port Active interfaces that join a VLAN in tagged or
untagged mode.
Format
interface vlanif vlan-id
undo interface vlanif vlan-id
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a device needs to communicate with devices at the network layer, you can
create a logical interface based on a VLAN on the device, namely, a VLANIF
interface. A VLANIF interface is a network layer interface and can be configured
with an IP address. The device then users the VLANIF interface to communicate
with devices at the network layer.
Prerequisites
The specified VLAN has been created using the vlan command before you create a
VLANIF interface.
Follow-up Procedure
Run the ip address to assign an IP address to the VLANIF interface.
Precautions
If the specified VLANIF interface exists, the interface vlanif command displays the
VLANIF interface view directly.
When a VLANIF interface is used as a management VLANIF interface where you
can telnet to the device, the user VLAN ID cannot be the same as the
management VLAN ID; otherwise, you will fail to telnet to the device.
Example
# Create VLANIF 2 and enter the VLANIF interface view.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] quit
[HUAWEI] interface vlanif 2
[HUAWEI-Vlanif2]
Format
ip pool start-address [ to end-address ]
undo ip pool
Parameters
Parameter Description Value
start-address Specifies the start IP address in an IP It is in dotted
address pool. decimal notation.
to end-address Specifies the end IP address in an IP address It is in dotted
pool. decimal notation.
If end-address is not specified, only one IP
address, that is, start-address, exists in the
IP address pool.
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After assigning an IP address to the super-VLAN by assigning the IP address to a
VLANIF interface, you can specify the IP address range for users in the VLAN. In
this manner, the ARP module filters out packets with IP addresses beyond the IP
address range so that the number of ARP packets can be exactly controlled.
If the super VLAN is enabled with proxy ARP, the system directly sends an ARP
Request packet from a user in the sub-VLAN to the destination sub-VLAN based
on the IP address carried in the packet, which reduces broadcast traffic.
The ip pool command can be used to set an IP address pool for the sub-VLAN. In
the IP address pool, a single IP address or a consecutive IP address segment can be
configured, but inconsecutive IP address segments cannot be configured.
Precautions
If only one IP address is assigned to the VLANIF interface of the super-VLAN, the
range of IP addresses in the IP address pool of a sub-VLAN is determined by the
mask length of the IP address assigned to the VLANIF interface.
If multiple IP addresses are assigned to the VLANIF interface of the super-VLAN,
the range of IP addresses in the IP address pool of a sub-VLAN is determined by
the difference between the largest and smallest IP addresses assigned to the
VLANIF interface.
After the ip pool command is run for a sub-VLAN, only ARP packets (such as ARP
Request, ARP Response, and Proxy ARP) for the IP addresses in the IP address pool
can be processed in the sub-VLAN.
Example
# Configure an IP address pool for VLAN 20, with IP addresses ranging from
10.10.10.10 to 10.10.10.20.
<HUAWEI> system-view
[HUAWEI] vlan 20
[HUAWEI-vlan20] ip pool 10.10.10.10 to 10.10.10.20
7.3.9 management-vlan
Function
Using the management-vlan command, you can configure a VLAN as a
management VLAN.
Using the undo management-vlan command, you can cancel the configuration.
By default, no VLAN is configured as a management VLAN.
Format
management-vlan
undo management-vlan
Parameters
None
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Precautions
You can run the display vlan command to view the management VLAN
configuration. In the command output, the VLAN marked with a * is the
management VLAN.
Example
# Configure VLAN 100 as a management VLAN.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100] management-vlan
Function
Using the mtu command, you can set the maximum transmission unit (MTU) of a
VLANIF interface.
Using the undo mtu command, you can restore the default MTU of a VLAN
interface.
Format
mtu mtu
undo mtu
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The MTU determines the maximum number of bytes in IP packets each time a
sender can send. The MTU of an IP packet refers to the number of bytes from the
IP header of the packet to the data.
The size of data frames is limited at the network layer. Any time the IP layer
receives an IP packet to be sent, it checks to which local interface the packet
needs to be sent and obtains the MTU configured on the interface. Then the IP
layer compares the MTU with the packet length. If the packet length is longer
than the MTU, the IP layer fragments the packet into smaller packets, which are
shorter than or equal to the MTU. If unfragmentation is configured, some packets
may be discarded during data transmission at the IP layer. To ensure jumbo
packets are not dropped during transmission, you need to configure forcible
fragmentation. In this case, you can run the mtu command to set the size of a
fragment.
Therefore, a proper MTU is a prerequisite for normal communication on a
network.
● If the configured MTU is excessively small and the packet size is larger,
packets are discarded when being forwarded through the forwarding chip;
packets are broken into a great number of fragments when being forwarded
through the CPU, affecting proper data transmission.
● If the size of packets exceeds the MTU supported by a transit node or a
receiver, the transit node or receiver fragments the packets or even discards
them, aggravating the network transmission load.
The default MTU is recommended. When the size of packets to be transmitted or
the device that receives packets changes, you can change the MTU based on the
actual network.
Precautions
● DHCP packets cannot be fragmented. When the MTU value set using the mtu
command is smaller than the DHCP packet length, DHCP packets cannot be
forwarded. Therefore, set a larger MTU value.
● If the MTU value is smaller than the DHCP packet length, the AP may be
disconnected. In this case, restart the AP.
● When the MTU is too small and the DF bit is set to 1, packets cannot be
fragmented. In this case, use the forced fragmentation function.
● Configuring the MTU of an interface affects the maximum number of bytes
for IP packets to be sent by the interface at a time. This configuration also
affects the maximum frame length of sent Ethernet packets. The Ethernet
packet size cannot exceed the maximum frame length allowed by the peer
interface, which can be set using the jumboframe enable command.
Example
# Set the MTU of the VLANIF100 interface to 1492 bytes.
<HUAWEI> system-view
[HUAWEI] interface Vlanif 100
[HUAWEI-Vlanif100] mtu 1492
Format
name vlan-name
undo name
Parameters
Parameter Description Value
vlan-name Specifies the VLAN The name is a string of 1 to 31 case-
name. sensitive characters, spaces not supported.
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
If a device is configured with multiple VLANs for transmitting different services,
you can name the VLANs in their corresponding VLAN views to facilitate service
management. In this manner, you can check the deployed services of a VLAN by
the VLAN name.
After VLANs are named, you can run the vlan vlan-name command in the system
view to enter the view of a specific VLAN, and then check or modify the
configuration of the VLAN.
Example
# Create VLAN 2, which is used to transmit voice services, and name it as voice.
<HUAWEI> system-view
[HUAWEI] vlan 2
[HUAWEI-vlan2] name voice
7.3.12 port
Function
Using the port command, you can configure a VLAN as the default VLAN of an
interface and add the interface to the VLAN.
Using the undo port command, you can restore the default VLAN of an interface
to the default setting.
By default, VLAN 1 is the default VLAN of all interfaces.
Format
port interface-type { interface-number1 [ to interface-number2 ] }&<1-10>
undo port interface-type { interface-number1 [ to interface-number2 ] }&<1-10>
Parameters
Parameter Description Value
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
All frames sent from a user device are untagged, and frames sent from a remote
device may also be untagged. However, the device processes only tagged frames.
Therefore, the device adds a tag to each untagged frame received by an interface.
The default VLAN ID of the interface can be added to untagged frames so that
these frames are forwarded in the default VLAN.
After the default VLAN is specified for an access interface, packets passing through
the interface are processed as follows:
● When the interface receives an untagged frame, it tags the frame with the
default VLAN ID.
● When the interface receives a tagged packet:
– If the interface is an access interface, it compares the VLAN ID of the
packet with the default VLAN ID. If they are the same, the interface
forwards the packets; otherwise, the interface discards the packets.
● Before forwarding a tagged packet, the interface removes the VLAN tag from
the packet.
Prerequisites
The link-type of specified interfaces cannot be access or trunk before you run the
port command.
Precautions
A super VLAN cannot be configured as the default VLAN of interfaces. The undo
port command deletes the default VLAN of the specified interfaces only if the
current VLAN is the default VLAN of these interfaces.
If you run the port command multiple times in the same VLAN view, the VLAN is
configured as the default VLAN of all the specified interfaces.
You can also run the port default vlan command in the interface view to
configure the default VLAN for an interface. The two commands have the same
function.
Example
# Configure VLAN 3 as the default VLAN of interfaces GE0/0/1.
<HUAWEI> system-view
[HUAWEI] vlan 3
[HUAWEI-vlan3] port gigabitethernet 0/0/1
Function
The port default vlan command configures the default VLAN of an interface and
adds the interface to the VLAN.
The undo port default vlan command restores the default VLAN of an interface
to the default setting.
Format
port default vlan vlan-id
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
All frames sent from a user device are untagged, and frames sent from a remote
device may also be untagged. However, the AP processes only tagged frames.
Therefore, the AP adds a tag to each untagged frame received by an interface. The
default VLAN ID of the interface can be added to untagged frames so that these
frames are forwarded in the default VLAN.
After the default VLAN is specified for an access interface, packets passing through
the interface are processed as follows:
● When the interface receives an untagged frame, it tags the frame with the
default VLAN tag.
● When the interface receives a tagged packet:
– If the interface is an access interface, it compares the VLAN ID of the
packet with the default VLAN ID. If they are the same, the interface
forwards the packets; otherwise, the interface discards the packets.
● Before forwarding a tagged packet, the interface removes the VLAN tag from
the packet.
Prerequisites
The VLAN to be configured as the default VLAN has been created.
The interface type is access. If not, run the port link-type command to change the
interface type.
Precautions
You can also run the port command in the VLAN view to configure the default
VLAN of an interface. The two commands have the same function.
A super VLAN cannot be configured as the default VLAN of interfaces.
If you run the port default vlan command multiple times in the same interface
view, only the latest configuration takes effect.
Example
# Configure VLAN 3 (an existing VLAN) as the default VLAN of GE0/0/1 (an
access interface).
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type access
[HUAWEI-GigabitEthernet0/0/1] port default vlan 3
Format
port hybrid pvid vlan vlan-id
undo port hybrid pvid vlan
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An interface may receive untagged and tagged frames, but the AP processes only
tagged frames. Therefore, the AP adds a tag to each untagged frame received by
an interface. The default VLAN ID of the interface can be added to untagged
frames so that these frames are forwarded in the default VLAN.
A hybrid interface processes Ethernet frames as follows:
● When the interface receives an untagged frame, it tags the frame with the
default VLAN ID. If the default VLAN ID is allowed by the interface, the
interface accepts the frame. Otherwise, the interface discards the frame.
● When the interface receives a tagged frame, it accepts the frame if the VLAN
ID of the frame is in the list of allowed VLAN IDs. Otherwise, the interface
discards the frame.
● If the VLAN ID of a frame is allowed by the interface, the interface forwards
the frame.
Prerequisites
The VLAN to be specified as the default VLAN has been created.
Precautions
The port hybrid pvid vlan command only specifies the default VLAN for an
interface but does not add the interface to the default VLAN.
If you run the port hybrid pvid vlan command multiple times in the same
interface view, only the latest configuration takes effect.
Example
# Specify VLAN 5 as the default VLAN of GE0/0/1.
<HUAWEI> system-view
[HUAWEI] vlan 5
[HUAWEI-vlan5] quit
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] port hybrid pvid vlan 5
Format
port hybrid tagged vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
undo port hybrid vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A hybrid interface can connect to either a user device or a wireless access point.
This command adds a hybrid interface to VLANs in tagged mode so that the
hybrid interface allows frames from the VLANs to pass.
After a hybrid interface is added to VLANs in tagged mode, the interface forwards
frames without removing VLAN tags of frames.
Prerequisites
If an interface is not a hybrid interface, run the port link-type hybrid command
to change the interface type to hybrid.
Precautions
If you run the port hybrid tagged vlan command multiple times in the same
interface view, the interface is added to all the specified VLANs.
Example
# Add GE0/0/1 to VLAN 3 to VLAN 5 in tagged mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
Format
port hybrid untagged vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
undo port hybrid vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A hybrid interface can connect to either a user device or a wireless access point.
When a hybrid interface is connected to a user device, it must be added to VLANs
in untagged mode so that it sends untagged frames.
Prerequisites
If an interface is not a hybrid interface, run the port link-type hybrid command
to change the interface type to hybrid.
Precautions
If you run the port hybrid untagged vlan command multiple times in the same
interface view, the interface is added to all the specified VLANs.
Example
# Add GE0/0/1 to VLAN 3 to VLAN 5 in untagged mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type hybrid
[HUAWEI-GigabitEthernet0/0/1] port hybrid untagged vlan 3 to 5
Function
The port link-type command sets the link type of an interface.
The undo port link-type command restores the default link type of an interface.
Format
port link-type { access | hybrid | trunk }
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, MultiGE interface view, XGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
Before changing the interface type, restore the default VLAN configuration of the
interface so that the interface belongs to only VLAN 1.
Follow-up Procedure
Precautions
If you run the port link-type command multiple times in the same interface view,
only the latest configuration takes effect.
Example
# Set the link type of GE0/0/1 to trunk.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
Function
The port trunk allow-pass vlan command adds a trunk interface to the specified
VLANs.
The undo port trunk allow-pass vlan command deletes a trunk interface from
the specified VLANs.
By default, a trunk interface is in VLAN 1.
Format
port trunk allow-pass vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
undo port trunk allow-pass vlan { { vlan-id1 [ to vlan-id2 ] }&<1-10> | all }
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A trunk interface can join multiple VLANs and connects to a network device. To
allow all packets from one or multiple VLANs to pass through a trunk interface,
the trunk interface must be added to the VLANs using the port trunk allow-pass
vlan command.
Prerequisites
The link-type of the interface is configured to trunk.
Precautions
If you run the port trunk allow-pass vlan command multiple times in the same
interface view, the interface is added to all the specified VLANs.
Example
# Add GE0/0/1 to VLANs 10 to 30.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk allow-pass vlan 10 to 30
Format
port trunk pvid vlan vlan-id
undo port trunk pvid vlan
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An interface may receive untagged and tagged frames, but the device processes
only tagged frames. Therefore, the device adds a tag to each untagged frame
Prerequisites
Follow-up Procedure
Precautions
The port trunk pvid vlan command only specifies the default VLAN of a trunk
interface but does not add the trunk interface to the default VLAN. A trunk
interface forwards frames with the default VLAN ID only after it is added to the
default VLAN using the port trunk allow-pass vlan command.
If you run the port trunk pvid vlan command multiple times in the same
interface view, only the latest configuration takes effect.
Example
# Specify VLAN 5 as the default VLAN of GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] port link-type trunk
[HUAWEI-GigabitEthernet0/0/1] port trunk pvid vlan 5
Function
Using the reset vlan statistics command, you can clear traffic statistics in a
specified VLAN.
Format
reset vlan statistics vlan-id
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command is used when you need to collect new packet statistics in a VLAN.
After this command is executed, the packet count in the VLAN becomes 0.
Precautions
NOTICE
Traffic statistics cannot be restored after they are cleared. Exercise caution when
you use the command.
Example
# Clear traffic statistics in VLAN 3.
<HUAWEI> reset vlan statistics 3
Function
Using the shutdown command, you can shut down a VLANIF interface.
Using the undo shutdown command, you can enable a VLANIF interface.
Format
shutdown
undo shutdown
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a VLANIF interface fails or is not needed, you can run the shutdown
command on the VLANIF interface.
Precautions
Example
# Enable VLANIF 2.
<HUAWEI> system-view
[HUAWEI] interface vlanif 2
[HUAWEI-Vlanif2] undo shutdown
7.3.22 vlan
Function
The vlan command creates a VLAN and displays the VLAN view. If the VLAN
exists, the VLAN view is displayed.
Format
vlan vlan-id
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To reduce broadcast domains and enhance security on a complex network, VLANs
can be created on the network to isolate the devices that do not need to
communicate each other. The vlan batch command creates multiple VLANs at
one time, simplifying VLAN configuration.
Follow-up Procedure
Assign VLANs according to network requirements.
Precautions
VLAN 1 is the default VLAN, which cannot be deleted and does not need to be
created.
The vlan command can be used to create a VLAN and enter the VLAN view. If a
VLAN has been created, the VLAN view is displayed after this command is used.
The vlan command multiple times creates multiple VLANs. If a VLAN has been
created, using this command cannot be used to create the same VLAN or modify
the configurations of the VLAN.
The vlan batch command can be used to create multiple VLANs in batches. If a
VLAN has been created, using this command cannot be used to create the same
VLAN or modify the configurations of the VLAN. The vlan batch commands
multiple times creates VLANs in multiple batches.
Before deleting a VLAN, run the undo interface vlanif command to delete the
corresponding VLANIF interface.
Example
# Create VLAN 100 and enter the VLAN 100 view. If VLAN 100 exists, the VLAN
100 view is displayed directly.
<HUAWEI> system-view
[HUAWEI] vlan 100
[HUAWEI-vlan100]
Format
vlan vlan-name vlan-name
undo vlan vlan-name vlan-name
Parameters
Parameter Description Value
vlan-name Specifies the VLAN The name is a string of 1 to 31 case-
name. sensitive characters, spaces not supported.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the name command is run to set a VLAN name, you can run the vlan vlan-
name command in the system view to enter the corresponding VLAN view.
Assume that a device has multiple VLANs and each VLAN has a name. If you need
to delete the VLAN that is used to transmit voice services but cannot remember
the ID of the VLAN, you can run the undo vlan vlan-name command to delete
the VLAN by inputting the VLAN name.
Prerequisites
Before running the vlan vlan-name command, ensure that the name command is
run to set the VLAN name.
Precautions
When you run the undo vlan vlan-name command to delete a VLAN, services
configured for the VLAN are deleted at the same time. The deleted services cannot
be restored even if you recreate the VLAN. Therefore, exercise caution when
running the undo vlan vlan-name command.
Example
# Enter the view of the VLAN named user1.
<HUAWEI> system-view
[HUAWEI] vlan vlan-name user1
[HUAWEI-vlan2]
Format
active region-configuration
Parameters
None
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Configuring MST region parameters, especially VLAN mapping tables for MST
regions, is likely to cause network topology flapping. To reduce network flapping,
make sure that newly configured MST region parameters take effect only after the
active region-configuration command is run.
Precautions
Example
# Map VLAN 5 to the spanning tree instance 2 and activate the configuration.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] instance 2 vlan 5
[HUAWEI-mst-region] active region-configuration
Function
The check region-configuration command displays the configuration of an MST
region such as the region name, revision level, and VLAN mapping table.
Format
check region-configuration
Parameters
None
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP divides a switching network into multiple regions, each of which has
multiple spanning trees that are independent of each other. Each region is called
an MST region and each spanning tree is called a multiple spanning tree instance
(MSTI).
Two switching devices belong to the same MST region only when they have the
following same configurations:
● MST region name
To ensure that MST region configurations on each switching device are correct,
you are recommended to run the check region-configuration command to check
the MST region configurations before running the active region-configuration
command. If the MST region configurations are correct, run the active region-
configuration command to activate them.
Precautions
By default, VLANs that are not mapped to any instances with non-zero IDs using
the instance command are mapped to instance 0.
Example
# Display the configuration of an MST region.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] check region-configuration
Admin configuration
Format selector :0
Region name :00b010000001
Revision level :0
Instance VLANs Mapped
0 1 to 9, 11 to 4094
16 10
Item Description
Function
The display stp command displays the status of and statistics on a spanning tree
instance.
Format
display stp [ instance instance-id ] [ interface interface-type interface-number ]
[ brief ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display stp command is used to check whether STP/RSTP/MSTP is run in the
existing switching device or specified interface.
● If the Protocol Status field value is Disabled, STP/RSTP/MSTP is not run.
● If STP/RSTP/MSTP has been run, information such as the working mode of
STP/RSTP/MSTP will be displayed.
When the network planner has deployed STP/RSTP/MSTP on the network, you can
run the display stp command to check whether the configurations and calculation
result.
Example
# When the stp enable command does not run, the status and statistics of STP
are displayed.
Item Description
CIST Bridge Priority Priority of the switch in the CIST. To set the STP
priority, run the stp priority command.
Max age (s) Maximum TTL of BPDU. To set the value of Max Age,
run the stp timer max-age command.
Forward delay (s) Time taken by interface status transition. To set the
value of Forward Delay, run the stp timer forward-
delay command.
Hello time (s) Interval for sending BPDUs from the root switch. To set
the hello time, run the stp timer hello command.
# Display the status of and statistics on a spanning tree instance when the stp
enable command is configured.
<HUAWEI> display stp brief
MSTID Port Role STP State Protection
0 GigabitEthernet0/0/1 DESI FORWARDING NONE
0 GigabitEthernet0/0/2 DESI FORWARDING NONE
0 GigabitEthernet0/0/4 ROOT FORWARDING NONE
Port -
# Display the status of and statistics on the spanning tree instance 0 on GE0/0/1.
<HUAWEI> display stp instance 0 interface GigabitEthernet 0/0/1
CIST Root/ERPC CIST root bridge ID/External path cost (the path cost
from the switch to the CIST root bridge.)
CIST RegRoot/IRPC Region root bridge ID/Internal path cost (the path cost
from the switch to region root bridge.)
CIST RootPortId CIST root port ID. "0.0" indicates the switch is a root
bridge and has no root port.
Item Description
Time since last TC Period from the last topology change to now.
Port Role In CIST area, the four port roles are as follows:
● Root Port
● Designated Port
● Alternate Port
● Backup Port
Port Priority Priority of the port. To set the priority for a port, run
the stp port priority command.
Designated Bridge/ ID of the designated switch and port. The first 16 bits
Port of the switch ID represent the priority of the switch in
the CIST region; the last 48 bits represent the MAC
address of the switch. The first 4 bits of the port ID
represent the priority and the last 12 bits represent the
port number.
Point-to-point Link type of the port. Config indicates that the link
type is configured by running the stp point-to-point
command. Active indicates the actual link type.
Item Description
Transit Limit Limit of the BPDUs sent by the current port during
each Hello time. To set the limit of the BPDUs sent by
the current port during each Hello time, run the stp
transmit-limit (interface view) command.
Port Protocol Type Format of the packets that the interface receives and
sends. The formats are as follows:
● auto
● legacy
● dot1s
The default value is auto.
Last forwarding time Time when the interface last entered the forwarding
state.
Function
The display stp abnormal-interface command displays information about
abnormal interfaces running the Spanning Tree Protocol (STP).
Format
display stp [ instance instance-id ] abnormal-interface
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
If a device has many interfaces and the display stp command output displays vast
information, viewing information about abnormal interfaces running STP is
difficult.
You can use the display stp abnormal-interface command to view information
about abnormal interfaces running STP.
Example
# Display information about abnormal interfaces in process 0 running STP
<HUAWEI> display stp instance 0 abnormal-interface
MSTID Interface Status Reason
0 GigabitEthernet0/0/1 DISCARDING LOOP-Protected
Item Description
Function
The display stp active command displays the status of and statistics on spanning
trees of all Up interfaces.
Format
display stp active
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display stp active command displays information about spanning trees of Up
interfaces only.
Example
# Display information about spanning trees of all Up interfaces.
<HUAWEI> display stp active
-------[CIST Global Info][Mode MSTP]-------
CIST Bridge :32768.dcd2-fc21-5d40
Config Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
Active Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
CIST Root/ERPC :32768.dcd2-fc21-5d40 / 0 (This bridge is the root)
CIST RegRoot/IRPC :32768.dcd2-fc21-5d40 / 0 (This bridge is the root)
CIST RootPortId :0.0
BPDU-Protection :Enabled
TC or TCN received :0
TC count per hello :0
STP Converge Mode :Fast
Time since last TC :0 days 2h:42m:10s
Number of TC :1
Last TC occurred :GigabitEthernet0/0/1
----[Port1(GigabitEthernet0/0/1)][FORWARDING]----
Port Protocol :Enabled
Port Role :Designated Port
Port Priority :128
Port Cost(Dot1T ) :Config=auto / Active=20000
Designated Bridge/Port :32768.dcd2-fc21-5d40 / 128.1
Port Edged :Config=default / Active=disabled
Point-to-point :Config=auto / Active=true
Transit Limit :6 packets/s
Protection Type :Root
Port STP Mode :MSTP
Port Protocol Type :Config=auto / Active=dot1s
PortTimes :Hello 2s MaxAge 20s FwDly 15s RemHop 20
TC or TCN send :1
TC or TCN received :0
BPDU Sent :4802
TCN: 0, Config: 0, RST: 0, MST: 4802
BPDU Received :0
TCN: 0, Config: 0, RST: 0, MST: 0
Last forwarding time: 2005/08/07 15:07:09 UTC+08:00
CIST Bridge ● The 16 leftmost bits are the switch's priority in the
CIST.
● The 48 rightmost bits are the switch's MAC address.
Item Description
CIST Root/ERPC CIST root bridge ID/external path cost from the switch
to the root bridge.
CIST RootPortId CIST root port ID. "0.0" indicates that the switch is the
root switch without the root port.
Item Description
Port Priority Interface priority. For details, see stp port priority.
Item Description
Port Protocol Type Format of packets sent and received on the interface,
which can be:
● auto
● legacy
● dot1s
The default value is auto. Config indicates the packet
format that is specified in the stp compliance
command, and Active indicates the packet format in
use.
Last forwarding time Time when the interface last entered the forwarding
state
Format
display stp bridge { root | local }
Parameters
Parameter Description Value
root Displays details about the spanning tree of the root bridge. -
local Displays details about the spanning tree of the local bridge. -
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When a device provides many interfaces, running the display stp command
displays a large amount of information, and it is difficult to find information about
the spanning trees of the root and local bridges.
Using the display stp bridge command, you can easily view details about the
spanning trees of the root and local bridges.
Example
# Display details about the spanning tree of the root bridge of MSTP.
<HUAWEI> display stp bridge root
MSTID Root ID Root Cost Hello Max Forward Root Port
Time Age Delay
----- -------------------- ---------- ----- --- ------- -----------------
0 0.4c1f-cc48-6514 419998 2 20 15
Format
display stp error packet
Parameters
None.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a device on a Layer 2 network runs MSTP is attacked by MSTP error packets, the
display stp error packet command can be used to view recently received MSTP
error packets.
Example
# Display the statistics about error packets received by MSTP and the contents of
recently received packets.
<HUAWEI> display stp error packet
4 error-packet(s) have been recieved and the last one is recieved at 2011/05/02 12:45:31.
01 80 C2 00 00 00 38 AA D2 11 11 10 00 69 42 42
03 00 00 03 02 7C 00 00 38 AA D2 11 11 10 00 00
00 00 00 00 38 AA D2 11 11 10 80 01 00 00 14 00
02 00 0F 00 00 00 40 00 33 38 61 61 64 32 31 31
31 31 31 30 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 AC 36 17 7F 50 28
3C D4 B8 38 21 D8 AB 26 DE 62 00 00 00 00 00 00
38 AA D2 11 11 10 14
Format
display stp global
Parameters
None.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When a device provides many interfaces, the display stp command output
contains a large amount of information, and it is difficult to find the desired
information quickly and view global information at a glance. The display stp brief
command output, by comparison, displays information about spanning trees on
interfaces, but not global information.
Using the display stp global command, you can view global STP information
conveniently.
Example
# Display brief STP information about MSTP.
<HUAWEI> display stp global
Protocol Status : Enabled
Bpdu-filter default : Disabled
Tc-protection : Disabled
Tc-protection threshold : 1
Tc-protection interval : 2s
Edged port default : Enabled
Pathcost-standard : Dot1t
Timer-factor :3
Transmit-limit : 10
Bridge-diameter :7
-------[CIST Global Info][Mode MSTP]-------
CIST Bridge :61440.781d-ba56-f06c
Config Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
Active Times :Hello 2s MaxAge 20s FwDly 15s MaxHop 20
CIST Root/ERPC :61440.781d-ba56-f06c / 0 (This bridge is the root)
CIST RegRoot/IRPC :61440.781d-ba56-f06c / 0 (This bridge is the root)
CIST RootPortId :0.0
BPDU-Protection :Disabled
TC or TCN received :85
TC count per hello :0
STP Converge Mode :Normal
Time since last TC :0 days 9h:12m:34s
Number of TC :13
Last TC occurred :GigabitEthernet0/0/1
Edged port default Whether the function of configuring all ports of the
switch as edge ports is enabled:
● Enabled: The function is enabled.
● Disabled: The function is disabled.
Item Description
CIST Root/ERPC CIST root switch ID/Cost of the external path (path
from the switch to the CIST root switch)
CIST RootPortId ID of the CIST root interface. 0.0 indicates that the
switch is the root switch and does not provide any root
interface.
Format
display stp region-configuration [ digest ]
Parameters
Parameter Description Value
digest Displays brief information about the effective MST region. -
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After an MST region is configured and takes effect on the network running MSTP,
you can run the display stp region-configuration command to view the name,
revision level, STP instance, and inter-VLAN mapping of the MST region.
Example
# Display the configuration of MST regions.
<HUAWEI> display stp region-configuration
Oper configuration
Format selector :0
Region name :dcd2fc9a2110
Revision level :0
Item Description
Item Description
Instance VLANs Mapped Mapping between the spanning tree instance and
VLANs of the MST region.
Function
The display stp tc-bpdu statistics command displays statistics of sent and
received topology change (TC) and topology change notification (TCN) BPDUs on
interfaces.
Format
display stp [ instance instance-id ] [ interface interface-type interface-number ]
tc-bpdu statistics
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If you need to know whether a fault has occurred on interfaces that send and
receive TC/TCN BPDUs, you can run this command to view statistics of these
BPDUs and locate the fault.
Example
# Display the statistics of TC/TCN BPDUs on interfaces of an MSTP instance.
<HUAWEI> display stp tc-bpdu statistics
-------------------------- STP TC/TCN information --------------------------
MSTID Port TC(Send/Receive) TCN(Send/Receive)
0 GigabitEthernet0/0/1 1/0 0/0
Table 7-27 Description of the display stp tc-bpdu statistics command output
Item Description
Function
The display stp topology-change command displays the statistics about MSTP
topology changes.
Format
display stp [ instance instance-id ] topology-change
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
On a Layer 2 network running MSTP, a device clears ARP entries and MAC entries
after receiving topology change packets. If a device receives too many topology
change packets, the device will frequently clear ARP entries and MAC entries,
causing high CPU usage. As a result, network traffic is unstable.
The display stp topology-change command can be used to display the statistics
about MSTP topology changes. If the statistics increase, network flapping occurs.
Example
# Display statistics about MSTP topology changes.
<HUAWEI> display stp topology-change
CIST topology change information
Number of topology changes :173
Time since last topology change :0 days 0h:1m:15s
Topology change initiator(notified) :GigabitEthernet0/0/1
Topology change last received from :5489-9876-b7d7
Number of generated topologychange traps : 1
Number of suppressed topologychange traps: 0
Item Description
Format
display stp vlan vlan-id
Parameters
Parameter Description Value
vlan-id Displays the STP status on an The value is an integer
interface added to a specified VLAN. ranging from 1 to 4094.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After an interface is added to a VLAN, the display stp vlan command can be used
to the display the STP status on the interface. In this case, the mapping between
VLANs and instances does not need to be concerned with.
Example
# Display the STP status on an interface added to a specified VLAN.
<HUAWEI> display stp vlan 1
InstanceId Port Role State
----------------------------------------------------------
0 GigabitEthernet0/0/1 DESI FORWARDING
InstanceId. Instance ID
Port Interface
7.4.13 instance
Function
The instance command maps a VLAN to a spanning tree instance.
The undo instance command deletes the mapping between a VLAN and a
spanning tree instance.
By default, all VLANs are mapped to CIST, that is, instance 0.
Format
instance instance-id vlan { vlan-id1 [ to vlan-id2 ] } &<1-10>
undo instance instance-id [ vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> ]
Parameters
Parameter Description Value
instance-id Specifies the number The value is an integer ranging from 0 to
of a spanning tree 4094. Value 0 refers to CIST.
instance.
The value of instance-id specified in the
undo instance command cannot be 0. This
means that instance 0 cannot be deleted.
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP divides a switching network into multiple regions, each of which has
multiple spanning trees that are independent of each other. Each spanning tree is
called an MSTI and each region is called an MST region.
Two switching devices belong to the same MST region only when they have the
following same configurations:
● MST region name
Example
# Map VLAN 2 to spanning tree instance 1.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] instance 1 vlan 2
Format
max bandwidth-affected-linknumber link-number
undo max bandwidth-affected-linknumber
Parameters
Parameter Description Value
Views
Eth-Trunk interface view
Default Level
2: Configuration level
Usage Guidelines
The upper threshold for the number of interfaces that determine the bandwidth of
an Eth-Trunk is used for STP calculation.
For example, device A and device B are connected by two Eth-Trunks. Eth-Trunk1
has three member links that are Up; the Eth-Trunk2 has two member links that
are Up. The bandwidth of each member link is 1 Gbit/s, so the bandwidth of Eth-
Trunk1 is 3 Gbit/s and the bandwidth of Eth-Trunk2 is 2 Gbit/s. If device A is the
root bridge during STP calculation, Eth-Trunk1 on device B is the root port and
Eth-Trunk2 is the alternate port. You can run this command to set the upper
threshold to 1. Then the bandwidth of Eth-Trunk1 becomes 1 Gbit/s during STP
calculation. Bandwidth decrease affects the interface cost, causing STP
recalculation. The max bandwidth-affected-linknumber command does not
affect traffic forwarding on the Eth-Trunk. The bandwidth used to forward traffic is
still 3 Gbit/s.
Example
# Set the upper threshold to 3.
<HUAWEI> system-view
[HUAWEI] interface eth-trunk 1
[HUAWEI-Eth-Trunk1] max bandwidth-affected-linknumber 3
7.4.15 region-name
Function
The region-name command configures the MST region name of the switching
device.
By default, the MST region name is the MAC address of the management network
interface on the MPU of the switching device.
Format
region-name name
undo region-name
Parameters
Parameter Description Value
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
MSTP divides a switching network into multiple regions, each of which has
multiple spanning trees that are independent of each other. Each spanning tree is
called an MSTI and each region is called an MST region.
Two switching devices belong to the same MST region only when they have the
following same configurations:
● MST region name
● Mappings between MSTIs and VLANs
● MST region revision level
Example
# Set the MST region name of the switch to "test".
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] region-name test
Function
The reset stp error packet statistics command clears the statistics of error STP
packets.
Format
reset stp error packet statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
Applicable Scenario
You can use the reset stp error packet statistics command to clear the history
statistics when you need to observe the statistics of error STP packets in a period
from the current time.
Precautions
The reset stp error packet statistics command clears the statistics about error
STP packets are cleared and cannot be restored. Therefore, confirm the action
before you use the command.
Example
# Clear the statistics about error STP packets.
<HUAWEI> reset stp error packet statistics
Function
The reset stp statistics command clears the statistics of a spanning tree.
Format
reset stp [ interface interface-type interface-number ] statistics
Parameters
Parameter Description Value
interface interface-type Specifies an interface type and the
-
interface-number number of the interface.
Views
User view
Default Level
3: Management level
Usage Guidelines
Sometimes, traffic statistics within a certain period is needed. In this situation,
clear the existing statistics before restarting the count.
When you run the reset stp statistics command:
● If you specify an interface, you can clear the statistics of a spanning tree on
the interface.
● If you do not specify an interface, you can clear the statistics of spanning
trees on all interfaces.
Example
# Clear the statistics of spanning trees on GE0/0/1.
<HUAWEI> reset stp interface gigabitethernet 0/0/1 statistics
7.4.18 revision-level
Function
The revision-level command configures the revision level of MST region of a
switching device.
The undo revision-level command restores the default level.
By default, the revision level of MST region is 0.
Format
revision-level level
undo revision-level
Parameters
Parameter Description Value
level Specifies the revision level of the The value is an integer ranging
MST region. from 0 to 65535.
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
MSTP divides a switching network into multiple regions, each of which has
multiple spanning trees that are independent of each other. Each region is called
an MST region and each spanning tree is called a multiple spanning tree instance
(MSTI).
Two switching devices belong to the same MST region only when they have the
following same configurations:
● MST region name
● Mappings between MSTIs and VLANs
● MST region revision level
If two switching devices have the same region name and VLAN mapping table, the
revision-level command can be used to set different revision levels for the two
devices so that the two devices belong to different MST regions.
Run the active region-configuration command to activate the MST region so
that the changed configurations can take effect.
Example
# Set the MSTP revision level of the switching device to 5.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] revision-level 5
Format
stp bpdu-filter { enable | disable }
undo stp bpdu-filter
Parameters
None
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running a spanning tree protocol, if the stp edged-port enable
command is used to configure a port as an edge port, the port will not participate
in the spanning tree calculation. This speeds up network convergence and
improves network stability. This port, however, will still send BPDUs. This may
cause BPDUs to be sent to other networks. As a result, these networks flap.
The stp bpdu-filter enable command can be used on the port to address this
problem. After the stp bpdu-filter enable command is used on the port, the port
will become a BPDU-filter port, and will not process BPDUs.
CAUTION
If the stp bpdu-filter enable command is run on a port, the port will not transmit
or process BPDUs. The port cannot negotiate the STP status with the directly
connected port on the remote device. Therefore, exercise cautions when using the
stp bpdu-filter enable command. Running the stp bpdu-filter enable command
only on edge ports is recommended.
Running the stp bpdu-filter enable command in the interface view configures
only the current port as a BPDU-filter port. If multiple BPDU-filter ports are
required on a device, the stp bpdu-filter default command can be used in the
system view to configure all the ports as BPDU-filter ports. If some ports need to
participate in spanning tree calculation but do not need to be configured as
BPDU-filter ports, the stp bpdu-filter disable command can be used in the view
of these ports to configure them as non-BPDU-filter ports. Similarly, if the stp
bpdu-filter disable command has been run on a port, the non-BPDU filter port
attributes of the port will not change after the stp bpdu-filter default command
is run.
Precautions
After the stp bpdu-filter disable command is run on a port, the port becomes a
non-BPDU-filter port. The port is still a non-BPDU-filter port even if the stp bpdu-
filter default command is run in the system view. After the undo stp bpdu-filter
command is run on the port, the BPDU-filter attributes of the port restore to the
default ones.
Example
# On a network edge device, specify GE0/0/1 as a non-BPDU-filter port.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp bpdu-filter disable
Format
stp bpdu-filter default
undo stp bpdu-filter default
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running a spanning tree protocol, if the stp edged-port enable
command is used to configure a port as an edge port, the port will not participate
in the spanning tree calculation. This speeds up network convergence and
improves network stability. This port, however, will still send BPDUs. This may
cause BPDUs to be sent to other networks. As a result, these networks flap.
The stp bpdu-filter enable command can be used on the port to address this
problem. After the stp bpdu-filter enable command is used on the port, the port
will become a BPDU-filter port, and will not process BPDUs.
Running the stp bpdu-filter enable command in the interface view configures
only the current port as a BPDU-filter port. If multiple BPDU-filter ports are
required on a device, the stp bpdu-filter default command can be used in the
system view to configure all ports as BPDU-filter ports. Then run the stp bpdu-
filter disable command in the interface view to change the interfaces that need
not to be configured as BPDU filter interfaces into non-BPDU filter interfaces.
Precautions
After the stp bpdu-filter default command is run, a port that has been
configured with the undo stp bpdu-filter command will become a BPDU-filter
port. After the stp bpdu-filter disable command is run, the port that has been
configured with the undo stp bpdu-filter command, however, will still serve as a
non-BPDU-filter port.
CAUTION
After the stp bpdu-filter default and stp edged-port default commands are run
in the system view, none of the ports on the device will initiate any BPDUs or
initiate a negotiation with the remote device, and all the ports are in the
forwarding state. This may lead to a loop and cause a broadcast storm. Exercise
cautions when using the stp bpdu-filter default and stp edged-port default
commands in the system view.
Example
# On a network edge device, specify all ports as BPDU-filter ports.
<HUAWEI> system-view
[HUAWEI] stp bpdu-filter default
Format
stp bpdu-protection
undo stp bpdu-protection
Parameters
None.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Enable the BPDU protection on the switching device.
<HUAWEI> system-view
[HUAWEI] stp bpdu-protection
Format
stp bridge-diameter diameter
undo stp bridge-diameter
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Set the network diameter to 5.
<HUAWEI> system-view
[HUAWEI] stp bridge-diameter 5
Format
stp compliance { auto | dot1s | legacy }
undo stp compliance
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP protocol packets have two formats: dot1s (IEEE 802.1s standard packets)
and legacy (proprietary protocol packets). The stp compliance command can be
used on a device to set an MSTP packet format based on the format of the MSTP
packet received from a remote device so that this device can better communicate
with the remote device.
The auto mode is set to allow a port to automatically switch to the MSTP protocol
packet format used by the remote end based on the MSTP protocol packet format
received from the remote end. This enables the two interfaces to use the same
MSTP protocol packet format.
Precautions
If you configure different packet formats on the same interface in the system view
and the interface view, the latest configuration overrides the previous one.
Example
# Set the format of the MSTP packets to the standard format of the interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp compliance dot1s
# Restore the self-adaptive format of the MSTP packets that are received and sent
by the switching device.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] undo stp compliance
Format
stp config-digest-snoop
Parameters
None
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
On an MSTP network where Huawei and non-Huawei devices are interconnected,
if the Huawei and non-Huawei devices have the same region name, revision level,
and VLAN mapping table but different BPDU keys, the stp config-digest-snoop
command can be used to enable the Huawei and non-Huawei devices to
exchange BPDUs.
Example
# Enable digest snooping on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp config-digest-snoop
Function
The stp converge command sets the converging mode of a spanning tree
protocol.
Format
stp converge { fast | normal }
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The stp converge command can be used to set a converging mode based on the
method for processing ARP entries.
Precautions
If the stp converge fast command is run on a switching device and the topology
of a spanning tree instance changes, the switching device will directly delete the
ARP entries that need to be updated in the ARP table.
If the stp converge normal command is run on a switching device and the
topology of a spanning tree instance changes, the switching device will age the
ARP entries that need to be updated in the ARP table.
Example
# Set the converging mode of the spanning tree protocol on the Ethernet switch
as normal.
<HUAWEI> system-view
[HUAWEI] stp converge normal
Function
The stp cost command sets the path cost of a port in a spanning tree.
The undo stp cost command restores the default path cost.
By default, the path cost of a port in a spanning tree is the path cost
corresponding to the port rate.
Format
stp [ instance instance-id ] cost cost
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The path cost of a port is an important basis for calculating a spanning tree. Path
costs determine root port selection. In a spanning tree, the port with the lowest
path cost to the root bridge is selected as a root port.
If different path costs are set for a port on an MSTP device in different spanning
tree instances, traffic of different VLANs will be forwarded along different physical
links and VLAN-based load balancing can be carried out.
Path costs depend on path cost calculation standards. After the path cost
calculation standard is determined, set a relatively small path cost within a
specified range for a port that has a high link rate. In the Huawei legacy standard,
default path costs for ports with different link rates are different, as shown in the
following table.
Prerequisites
A path cost calculation standard has been set using the stp pathcost-standard
command.
Precautions
If the path cost of a port, the spanning tree where the port resides needs to be
recalculated.
If the stp pathcost-standard command is used to change the path cost
calculation standard, the path cost set using the stp cost command for a port will
be restored to the default value.
Example
# Set the path cost of GE0/0/1 in spanning tree instance 2 to 200.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp instance 2 cost 200
Format
stp edged-port { enable | disable }
undo stp edged-port
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, a port connected to
terminals does not need to participate in spanning tree calculation. If the port
participates in spanning tree calculation, the network convergence speed will be
affected. In addition, status changes of the port may cause network flapping,
interrupting user traffic. To address this problem, you can run the stp edged-port
enable command to configure the port as an edge port. Then, the port will not
participate in the spanning tree calculation. This speeds up network convergence
and improves network stability.
Precautions
Example
# Configure GE0/0/1 as an edge port.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp edged-port enable
Function
The stp edged-port default command configures the ports on a switching device
as edge ports.
The undo stp edged-port default command restores the default setting.
Format
stp edged-port default
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
CAUTION
After the stp edged-port default command is run on a device, all ports of the
device will be become edge ports. During network topology calculation, running
the stp edged-port default command may cause a loop. Exercise caution when
using this command.
Precautions
Example
# Configure all ports on an edge device as edge ports.
<HUAWEI> system-view
[HUAWEI] stp edged-port default
Warning: All ports of the device will become edge ports, this may cause a loop.
Function
The stp enable command enables STP/RSTP/MSTP on a switching device or an
interface.
Format
stp enable
stp disable
Parameters
None
Views
System view, GE interface view, Eth-Trunk interface view, XGE interface view,
MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Running the stp enable command enables STP/RSTP/MSTP. The devices running
STP/RSTP/MSTP discover loops on the network by exchanging information with
each other and trim the ring topology into a loop-free tree topology by blocking a
certain interface. In this manner, replication and circular propagation of packets
are prevented on the network. In addition, the processing performance of devices
is prevented from deteriorating.
Enabling STP/RSTP/MSTP consumes system resources so that you can run the stp
disable command to disable STP/RSTP/MSTP on devices or interfaces that do not
participate in the spanning tree calculation.
Pre-configuration Tasks
Precautions
Example
# Enable STP/RSTP/MSTP on a switching device.
<HUAWEI> system-view
[HUAWEI] stp enable
Function
The stp loop-protection command enables loop protection on the current port.
The undo stp loop-protection command disables loop protection on the current
port.
Format
stp loop-protection
Parameters
None.
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running a spanning tree protocol, a switching device maintains the
status of the root port and blocked port by continually receiving BPDUs from the
upstream switching device. If ports cannot receive BPDUs from the upstream
switching device due to link congestion or unidirectional link failures, the
switching device will re-select a root port. Then, the previous root port becomes a
designated port and the previous blocked port enters the Forwarding state. As a
result, loops may occur on the network.
The stp loop-protection command can be used to configure loop protection in
order to prevent this problem. If the root port or the Alternate port cannot receive
BPDUs from the upstream device for a long period of time after the loop
protection function is enabled, the root port or the Alternate port will send a
notification message to the NMS. The root port will enter the Discarding state,
and the Alternate port remains in the blocked state and no longer forwards
packets. This prevents loops on the network. The root port or Alternate port
restores the Forwarding state after receiving BPDUs.
NOTE
● An Alternate port is the backup of the root port. When the root port can normally send
and receive BPDUs, the Alternate port is in the blocked state.
● Between two interconnected switching devices in a spanning tree, the switching device
nearer to the root bridge is the upstream device of the other devices.
Precautions
Loop protection and root protection cannot be configured on the same interface
simultaneously.
Example
# Enable loop protection on the GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp loop-protection
Format
stp max-hops hop
undo stp max-hops
Parameters
Parameter Description Value
hop Specifies the maximum hops. The value ranges from 1 to 40.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
In an MST region, the maximum number of hops set on the root switching device
in a CIST or an MSTI is the maximum number of hops in the CIST or MSTI.
Example
# Set the maximum hops in the MST region to 35.
<HUAWEI> system-view
[HUAWEI] stp max-hops 35
Function
The stp mcheck command configures a port to automatically switch from the STP
mode back to the RSTP/MSTP mode.
By default, a port does not switch from the STP mode back to the RSTP/MSTP
mode.
Format
stp mcheck
Parameters
None
Views
System view, GE interface view, Eth-Trunk interface view, XGE interface view,
MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The stp mcheck command can be used to address this problem. After this
command is run on a port, the port will automatically switch from the STP mode
back to the RSTP/MSTP mode.
Precautions
Running the stp mcheck command in the system view configures all ports on the
current switching device to automatically switch back to the RSTP/MSTP mode.
Running the stp mcheck command in the interface view configures only the
current port to automatically switch back to the RSTP/MSTP mode.
Example
# Perform MCheck on GE0/0/1 and switch it to the MSTP mode.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp mcheck
The undo stp mode command restores the default operation mode of the
spanning tree protocol.
Format
stp mode { mstp | rstp | stp }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The stp mode command can be used to set a proper operation mode for a
spanning tree protocol on a switching device and enables the switching device to
identify BPDUs sent by a switching device that runs a different spanning tree
protocol during communication.
automatically switches the operation mode the port directly connected to the STP
switching device to STP.
Configuration Impact
● After the stp mode mstp command is run on a switching device, all ports
running MSTP on the switching device, excluding the ports directly connected
to STP switching devices, operate in MSTP mode and can send MSTP BPDUs.
The ports directly connected to STP switching devices operate in STP mode.
● After the stp mode rstp command is run on a switching device, all ports
running RSTP on the switching device, excluding the ports directly connected
to STP switching devices, operate in RSTP mode and can send RSTP BPDUs.
The ports directly connected to STP switching devices operate in STP mode.
● After the stp mode stp command is run on a switching device, all ports of the
switching device operate in STP mode and send configured BPDUs.
Precautions
● A port operating in MSTP mode can communicate with a port operating in
RSTP mode.
● The stp mode rstp command can be used to enable a switch that does not
support MSTP to communicate with an STP switch.
Example
# Set the operation mode of the switching device to the STP mode.
<HUAWEI> system-view
[HUAWEI] stp mode stp
Format
stp no-agreement-check
undo stp no-agreement-check
Parameters
None
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If Huawei and non-Huawei data communication devices are deployed on a
network running a spanning tree protocol, the Huawei devices and non-Huawei
devices may fail to communicate with each other, because they have different
Proposal/Agreement mechanisms. To address this problem, the stp no-
agreement-check command can be used to set a common fast transition
mechanism or an enhanced transition mechanism on a port.
● Running the stp no-agreement-check command configures a common fast
transition mechanism on a port.
● Running the undo stp no-agreement-check command configures an
enhanced fast transition mechanism on a port.
Precautions
The fast transition mechanism is also called the Proposal/Agreement mechanism.
The device currently supports the following modes:
● Enhanced mode: The current interface counts a root port when it calculates
the synchronization flag bit.
a. An upstream device sends a Proposal message to a downstream device
requesting fast status transition. After receiving the message, the
downstream device sets the port connected to the upstream device as the
root port and blocks all non-edge ports.
b. The upstream device then sends an Agreement message to the
downstream device. After the downstream device receives the message,
the root port transitions to the Forwarding state.
c. The downstream device then responds with an Agreement message. After
receiving the message, the upstream device sets the port connected to
the downstream device as the designated port, and then the status of the
designated port changes to Forwarding.
● Common mode: The current interface ignores the root port when it calculates
the synchronization flag bit.
a. An upstream device sends a Proposal message to a downstream device
requesting fast transition. After receiving the message, the downstream
device sets the port connected to the upstream device as the root port
and blocks all non-edge ports. Then, the status of the root port changes
to Forwarding.
b. The downstream device then responds with an Agreement message. After
receiving the message, the upstream device sets the port connected to
the downstream device as the designated port, and then the status of the
designated port changes to Forwarding.
NOTE
Between two interconnected switching devices in a spanning tree, the switching device
nearer to the root bridge is the upstream device of the other devices.
Example
# Configure the common fast transition mechanism for the GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp no-agreement-check
Format
stp pathcost-standard { dot1d-1998 | dot1t | legacy }
undo stp pathcost-standard
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A path cost is a port parameter, and is used by a spanning tree protocol to select a
link. By calculating path costs, a spanning tree protocol selects stable links, blocks
redundant paths, and trims a network into a loop-free network. The path cost
range is determined by the path cost calculation standard.
Table 7-31 lists path costs defined by the IEEE 802.1D-1998 standard, IEEE 802.1T
standard, and Huawei legacy standard. Different vendors use different standards.
Aggregated 3 6666 16
Link 3 Ports
Aggregated 3 5000 14
Link 4 Ports
Aggregated 1 1000 1
Link 2 Ports
Aggregated 1 666 1
Link 3 Ports
Aggregated 1 500 1
Link 4 Ports
Precautions
If the path cost calculation standard is changed on a port, the path cost of the
port is restored to the default value. The stp cost command can be used to set a
path cost for a port.
Usually, all switching devices on the same network use the same path cost
calculation standard.
Example
# Use the IEEE 802.1d-1998 to calculate the path cost.
<HUAWEI> system-view
[HUAWEI] stp pathcost-standard dot1d-1998
Function
The stp point-to-point command sets the link type of a port.
The undo stp point-to-point command restores the default link type.
By default, the link type of the ports on the switching device is auto. That is, the
spanning tree protocol detects whether a port is connected to a P2P link.
Format
stp point-to-point { auto | force-false | force-true }
Parameters
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, if a port of a switching
device is connected to a non-P2P link, the port cannot perform fast status
transition.
If a port works in full-duplex mode, the port is connected to a P2P link, and force-
true can be set in the stp point-to-point command.
If a port works in half-duplex mode, the stp point-to-point force-true command
can be used to forcibly set the type of the link to which the port is connected to
P2P, implementing rapid network convergence.
Precautions
The stp point-to-point command configuration on a port takes effect in all
spanning tree instances where the port resides.
Example
# Set the link type of GE0/0/1 as P2P.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp point-to-point force-true
Format
stp [ instance instance-id ] port priority priority
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When ports participate in spanning tree calculation, the PIDs of these ports on
switching devices may affect the designated port election result. During spanning
tree calculation, the port with the smallest PID is elected as the designated port.
NOTE
A PID is the ID of a port, and consists of a 4-bit priority and a 12-bit port number.
The stp port priority command can be used to change the priority of a port. This
affects the PID of the port and determines whether the port can be elected as the
designated port.
Precautions
When the priority of a port changes, a spanning tree protocol recalculates the role
of the port and performs status transition for the port.
The priority of a port determines the role of the port in a specified spanning tree
instance. You can set different priorities for a port in different spanning tree
instances so that user traffic can be forwarded along different links and traffic
load balancing can be implemented.
Example
# Set the priority of GE0/0/1 to 16 in the spanning tree instance 2.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp instance 2 port priority 16
Function
The stp priority command sets the priority of the switching device in a spanning
tree.
Format
stp [ instance instance-id ] priority priority
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Set the priority of the switching device in spanning tree instance 1 to 4096.
<HUAWEI> system-view
[HUAWEI] stp instance 1 priority 4096
Format
stp region-configuration
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP divides a switching network into multiple regions, each of which has
multiple spanning trees and these spanning trees are independent of each other.
Each spanning tree is called a multiple spanning tree instance (MSTI) and each
region is called a multiple spanning tree (MST) region.
Two switching devices belong to the same MST region if they have the following
parameters the same:
● MST region name
● Mappings between VLANs and MSTIs
● Revision level of the MST region
If the preceding parameters need to be set for the current switching device, run
the stp region-configuration command to enter the MST region view first.
Follow-up Procedure
After the stp region-configuration command is run to enter the MST region view,
run the following commands:
● Run the region-name command to set the MST region name.
● Run the instance or the vlan-mapping modulo command to set the
mappings between VLANs and MSTIs.
● Run the revision-level name command to set the revision level of the MST
region.
Example
# Enter the MST region view.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region]
Format
stp [ instance instance-id ] root { primary | secondary }
undo stp [ instance instance-id ] root
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On an STP/RSTP/MSTP network, each spanning tree has only one root bridge,
which is responsible for sending BPDUs. Owning to the importance of the root
bridge, the switching device with high performance and network hierarchy is
generally chosen as a root bridge. The priority of such a device, however, may be
not that high. Therefore, setting a high priority for the switching device is
necessary so that the device can function as a root bridge.
To ensure nonstop traffic transmission, run the stp root command to configure
the switching device as the secondary root bridge. When the root bridge is faulty
or is powered off, the secondary root bridge becomes the root bridge during
spanning tree calculation.
NOTE
After the stp root primary command is run to set a switching device to be the primary root
bridge, the priority value of the switching device is 0 in the spanning tree and the priority
cannot be modified.
The secondary root bridge specified using the stp root secondary command has the
priority value of 4096 and the priority cannot be modified.
Precautions
A switching device in a spanning tree cannot function both as the primary root
bridge and as the secondary root bridge.
If multiple secondary root bridges are set in a spanning tree, the one with the
smallest MAC address functions as the secondary root bridge of the spanning tree.
Example
# Set the switching device as the root bridge of spanning tree instance 1.
<HUAWEI> system-view
[HUAWEI] stp instance 1 root primary
# Set the switching device as the secondary root bridge of spanning tree instance
4.
<HUAWEI> system-view
[HUAWEI] stp instance 4 root secondary
Function
The stp root-protection command enables root protection at the current port.
The undo stp root-protection command restores the default setting of root
protection.
Format
stp root-protection
Parameters
None
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a designated port is enabled with the root protection function, the port role
cannot be changed. Once a designated port that is enabled with root protection
receives BPDUs with a higher priority, the port enters the Discarding state and
does not forward packets. If the port does not receive any BPDUs with a higher
priority before a period (generally two Forward Delay periods) expires, the port
automatically enters the Forwarding state.
NOTE
You can run the stp timer forward-delay command to set the Forward Delay period.
Precautions
The root protection function takes effect only on a designated port. In addition,
configuring the root protection function on a port that functions as the designated
port in all instances is recommended.
If the stp root-protection command is run on other types of ports, the root
protection function does not take effect.
Loop protection and root protection cannot be configured on the same interface
simultaneously.
Example
# Enable the root protection function on GE0/0/1.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp root-protection
Format
stp tc-protection
undo stp tc-protection
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network where MSTP is run, a switching device that receives TC
BPDUs will delete the corresponding MAC entries and ARP entries. Frequent
deletion operations will greatly affect the CPU, leading to a high CPU usage. In
this case, you can run the stp tc-protection command to enable the TC BPDU
attack defense function.
After the stp tc-protection command is run to enable the TC BPDU attack
defense function, the number of times that TC BPDUs are processed by the
switching device within a unit time is configurable (the default unit time is 2s, and
the default number of times is 1). If the number of TC BPDUs that the switching
device receives within a unit time exceeds the specified threshold, the switching
device handles TC BPDUs only for the specified number of times. Additional TC
BPDUs are processed by the switching device as a whole for once after the timer
(that is, the specified time period) expires. In this manner, the switching device is
prevented from frequently deleting its MAC entries and ARP entries so that the
CPU is protected against overburden.
NOTE
The value of the unit time is consistent with the MSTP Hello time and can be set using the
stp timer hello command.
Follow-up Procedure
After the stp tc-protection command is run, run the stp tc-protection threshold
command to set the number of times that TC BPDUs are processed by the
switching device within a unit time.
Example
# Enable the TC BPDU protection function.
<HUAWEI> system-view
[HUAWEI] stp tc-protection
Format
stp tc-protection interval interval-value
undo stp tc-protection interval
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network running a spanning tree protocol, a device deletes MAC
address entries and ARP entries after receiving TC packets. Frequent entry deletion
may cause high CPU usage.
After you have run the stp tc-protection command to enable TC protection, you
can configure the time, which the device takes to handle a given number of TC
packets and immediately refresh forwarding entries, by running the stp tc-
protection interval command. Within the time specified by interval-value, the
device handles a given number of TC packets. Excess TC packets are processed by
the device at once after the timer (whose length is the configured time) expires.
This mechanism ensures that the device does not frequently delete its MAC entries
and ARP entries, and therefore does not have excessive CPU usage.
NOTE
You can specify the maximum number of TC packets that the device processes can handle
in the specified time by running the stp tc-protection threshold command.
Prerequisites
Example
# Configure the amount of time, which MSTP process takes to handle a given
number of TC packets and immediately refreshes forwarding entries, to 10
seconds.
<HUAWEI> system-view
[HUAWEI] stp tc-protection interval 10
The undo stp tc-protection threshold command restores the default setting.
By default, after a device receives TC BPDUs, the default number of times that the
device handles the TC BPDUs and updates forwarding entries is 1 within a unit
time.
Format
stp tc-protection threshold threshold
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a Layer 2 network where MSTP is run, a switching device that receives TC
BPDUs will delete the corresponding MAC entries and ARP entries. Frequent
deletion operations will greatly affect the CPU, leading to a high CPU usage.
After the stp tc-protection command is run to enable the TC BPDU attack
defense function, the number of times that TC BPDUs are processed by the
switching device within a unit time is configurable (the default unit time is 2s, and
the default number of times is 1). If the number of TC BPDUs that the switching
device receives within a unit time exceeds the specified threshold, the switching
device handles TC BPDUs only for the specified number of times. Additional TC
BPDUs are processed by the switching device as a whole for once after the timer
(that is, the specified time period) expires. In this manner, the switching device is
prevented from frequently deleting its MAC entries and ARP entries so that the
CPU is protected against overburden.
NOTE
The value of the unit time is consistent with the Hello time and can be set using the stp
timer hello command.
Prerequisites
Before running the stp tc-protection threshold command, ensure that the stp tc-
protection command is run to enable the TC BPDU attack defense function.
Example
# Set the threshold update forwarding entries to 5.
<HUAWEI> system-view
[HUAWEI] stp tc-protection threshold 5
Format
stp timer forward-delay forward-delay
undo stp timer forward-delay
Parameters
forward-delay Specifies the value of the The value ranges from 400 to 3000
Forward Delay. centiseconds by a step of 100.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The stp timer forward-delay command is used to set the Forward Delay timer.
Precautions
The value of the Forward Delay timer set on the root bridge is advertised to other
devices of the same spanning tree using BPDUs. Then it becomes the value of the
Forward Delay timer of all devices in the spanning tree.
The relationships between the Hello Time, Forward Delay, and MaxAge are as
follows. The spanning tree functions properly only if the correct relationships are
established. Otherwise, frequent network flapping occurs.
● 2 x (Forward Delay - 1.0 second) >= Max Age
● Max Age >= 2 x (Hello Time + 1.0 second)
Example
# Set the Forward Delay to 2000 centiseconds.
<HUAWEI> system-view
[HUAWEI] stp timer forward-delay 2000
Function
The stp timer hello command sets the interval of the switching device to send
BPDUs, that is, the value of the Hello Time.
The undo stp timer hello command restores the default setting.
Format
stp timer hello hello-time
Parameters
Parameter Description Value
hello-time Specifies the interval of the The value ranges from 100 to 1000,
switch to send BPDUs. in centiseconds by a step of 100.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If no BPDUs are received by the switching device within the timeout period
(timeout period = Hello Time x 3 x Timer Factor), the spanning tree is calculated
again.
NOTE
In a spanning tree, the device closer to the root bridge is the upstream device of another
connected device.
Precautions
The value of the Hello Time set on the root bridge is advertised to other devices of
the same spanning tree using BPDUs. Then it becomes the value of the Hello Time
of all devices in the spanning tree.
The relationships between the Hello Time, Forward Delay, and Max Age are as
follows. The spanning tree works properly only if the relationships are correctly
established. Otherwise, frequent network flapping occurs.
● 2 x (Forward Delay - 1.0 second) >= Max Age
● Max Age >= 2 x (Hello Time + 1.0 second)
Running the stp bridge-diameter command to set the network diameter is
recommended. After the stp bridge-diameter command is run, the switching
device sets optimum values for the three parameters, Hello Time, Forward Delay,
and Max Age.
Example
# Set the Hello Time to 400 centiseconds.
<HUAWEI> system-view
[HUAWEI] stp timer hello 400
Format
stp timer max-age max-age
undo stp timer max-age
Parameters
Parameter Description Value
max-age Specifies the BPDU aging time The value ranges from 600 to 4000
on a port of the switch. in centiseconds with a step of 100.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In a spanning tree, the device closer to the root bridge is the upstream device of another
connected device.
Precautions
The value of the Max Age set on the root bridge is advertised to other devices of
the same spanning tree using BPDUs. Then it becomes the MaxAge value of all
devices in the spanning tree.
The timer MaxAge value takes effect for only the CIST and does not take effect for
MSTIs.
The relationships between the Hello Time, Forward Delay, and Max Age are as
follows. The spanning tree functions properly only if the relationships are correctly
established. Otherwise, frequent network flapping occurs.
● 2 x (Forward Delay - 1.0 second) >= Max Age
● Max Age >= 2 x (Hello Time + 1.0 second)
Example
# Set the Max Age to 1000 centiseconds.
<HUAWEI> system-view
[HUAWEI] stp timer max-age 1000
Function
The stp timer-factor command sets the timer factor of the timeout period of a
switching device to the Hello Time.
NOTE
If a switching device does not receive BPDUs from an upstream device within the timeout
period (timeout period = Hello Time × 3 × Timer Factor), the spanning tree is calculated
again.
Format
stp timer-factor factor
undo stp timer-factor
Parameters
Parameter Description Value
factor Specifies the timer factor. The value ranges from 1 to 10.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network where a spanning tree protocol is enabled, if a switching device
does not receive BPDUs from an upstream device within the timeout period, it
considers that the upstream device becomes faulty, and will recalculate the
spanning tree.
Sometimes, however, the failure of the upstream device to send BPDUs within the
timeout period is only because it is busy processing services. In this case, the
spanning tree cannot be calculated. Therefore, you can set a long timeout period
on a stable network to avoid the waste of network resources.
NOTE
In a spanning tree, the device closer to the root bridge is the upstream device of another
connected device.
Precautions
If the parameter factor is set smaller, the timeout period of the switching device to
re-calculate the spanning tree is shorter. In this case, there is a higher probability
that the switching device incorrectly considers the upstream device as being faulty.
If the parameter factor is set larger, the timeout period of the switching device to
re-calculate the spanning tree is longer. In this case, there is a higher probability
that the traffic becomes interrupted because the upstream device has become
faulty.
Example
# Set the Time-Factor of the switching device to 6.
<HUAWEI> system-view
[HUAWEI] stp timer-factor 6
Format
stp transmit-limit packet-number
undo stp transmit-limit
Parameters
Parameter Description Value
Views
GE interface view, Eth-Trunk interface view, XGE interface view, MultiGE interface
view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network where a spanning tree protocol is enabled, a switching device
periodically sends BPDUs to other devices in the same spanning tree with the
interval of the Hello Time. Sending BPDUs periodically ensures that the spanning
tree is stable. If the number of sent BPDUs are great in a specified period,
excessive system and bandwidth resources will be consumed.
To prevent this problem from occurring, run the stp transmit-limit command to
set the maximum number of BPDUs that can be sent by an interface in a specified
period. In this manner, the BPDU sending speed is controlled, preventing excessive
use of system and bandwidth resources by MSTP when the network topology
flaps.
Precautions
After the stp transmit-limit command is configured, the maximum number of
BPDUs sent in a specified period by the interface is determined by the set value.
Example
# Set the maximum BPDUs that GE0/0/1 can send in a specified period to 5.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/1
[HUAWEI-GigabitEthernet0/0/1] stp transmit-limit 5
Format
stp transmit-limit packet-number
undo stp transmit-limit
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a network running the Spanning Tree Protocol (STP), a switch sends BPDUs to
other devices in the same spanning tree at the interval of the Hello time, to
maintain the spanning tree stability. If a number of BPDUs are sent every second,
system and bandwidth resources will be greatly consumed.
NOTE
You can configure the Hello time by using the stp timer hello command. The Hello time is
the length of the Hello timer and specifies the interval at which the switch sends BPDUs.
To prevent excessive usage of system and bandwidth resources, you can run the
stp transmit-limit command to configure the maximum number of BPDUs that
each interface of the local device can send per second. This configuration controls
the BPDU sending rate and prevents the Multiple Spanning Tree Protocol (MSTP)
from consuming too many system and bandwidth resources when topology
flapping occurs.
Precautions
You can also configure the maximum number of BPDUs that a specific interface
can send per second by running the stp transmit-limit (interface view)
command in the view of this interface. The stp transmit-limit (interface view)
command configuration in the interface view takes precedence over the stp
transmit-limit command configuration in the system view. That is, if the stp
transmit-limit (interface view) command is configured in the view of an
interface, the stp transmit-limit command configuration in the system view does
not take effect for this interface.
Example
# Configure the maximum number of BPDUs that each interface of the local
device can send per second to 5.
<HUAWEI> system-view
[HUAWEI] stp transmit-limit 5
Function
The vlan-mapping modulo command enables VLAN-to-instance mapping
assignment based on a default algorithm.
By default, all VLANs are mapped to CIST, namely, spanning tree instance 0.
Format
vlan-mapping modulo modulo
Parameters
Parameter Description Value
modulo Specifies the value of a The value is an integer ranging from
module. 1 to 48.
Views
MST region view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
MSTP divides a switching network into multiple regions, each of which has
multiple spanning trees that are independent of each other. Each spanning tree is
called an MSTI and each region is called an MST region.
Two switching devices belong to the same MST region only when they have the
following same configurations:
● MST region name
● Mappings between MSTIs and VLANs
● MST region revision level
In the command, vlan-mapping modulo indicates that the formula (VLAN ID-1)%modulo
+1 is used. In the formula, (VLAN ID-1)%modulo means the remainder of (VLAN ID-1)
divided by the value of modulo. This formula is used to map a VLAN to the corresponding
MSTI. The calculation result of the formula is ID of the mapping MSTI. For example, if the
modulus is 16, the switch maps VLAN 1 to MSTI 1, VLAN 2 to MSTI 2 VLAN 16 to MSTI 16,
VLAN 17 to MSTI 1, and so on.
Precautions
Example
# Map all VLANs to spanning tree instances modulo 16.
<HUAWEI> system-view
[HUAWEI] stp region-configuration
[HUAWEI-mst-region] vlan-mapping modulo 16
7.5.1 ip address
Function
The ip address command configures an IP address for an interface.
The undo ip address command deletes an IP address from an interface.
By default, no IP address is configured for an interface.
Format
ip address ip-address { mask | mask-length } [ sub ]
undo ip address [ ip-address { mask | mask-length } [ sub ] ]
Parameters
Parameter Description Value
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
You must delete all secondary IP addresses before deleting the primary IP address.
Example
# Configure a primary IP address 192.168.0.1 and a secondary IP address
10.38.160.1 for VLANIF100, with subnet mask 255.255.255.0.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 192.168.0.1 255.255.255.0
[HUAWEI-Vlanif100] ip address 10.38.160.1 255.255.255.0 sub
Function
The arp detect-mode unicast command configures an interface to send ARP
aging probe packets in unicast mode.
The undo arp detect-mode unicast command restores the default configuration
of detection modes on an interface.
Format
arp detect-mode unicast
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before an ARP entry is aged, the interface periodically sends ARP aging probe
packets at a set interval to update ARP entries. The device deletes an ARP entry if
it does not receive a reply after a specified number of probes. The aging probe
packet can be a unicast or broadcast packet.
When a non-Huawei device connected to a Huawei wireless access point receives
an ARP aging probe packet whose destination MAC address is a broadcast address,
the non-Huawei device checks the ARP table. If the mapping between the IP
address and the MAC address of the Huawei wireless access point exists in the
ARP table, the non-Huawei device discards the ARP aging probe packet. Then the
Huawei wireless access point cannot receive a response and deletes the
corresponding ARP entry. As a result, traffic from the non-Huawei device cannot
be forwarded. Therefore, when a non-Huawei device is connected to a Huawei
wireless access point, configure the Huawei switch to unicast ARP aging probe
packets. The non-Huawei device needs to respond to the ARP aging probe packet.
Precautions
If the IP address of the peer device remains the same but the MAC address
changes frequently, it is recommended that you configure ARP aging probe
packets to be broadcast.
When the MAC address of the peer device remains the same, and the bandwidth
of the network is insufficient, it is recommended that you set the interface to send
ARP aging probe packets in unicast mode.
Example
# Configure an interface to send ARP aging probe packets in unicast mode.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp detect-mode unicast
Format
arp detect-times detect-times
Parameters
Parameter Description Value
detect-times Specifies the number of ARP The value is an integer ranging
probes for aging dynamic ARP from 0 to 10. The default value is
entries. 3.
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The arp detect-times command sets the number of ARP probes for aging
dynamic ARP entries to reduce address resolution errors. Before aging a dynamic
ARP entry, the system first performs probes. If no response is received after the
number of probes reaches the upper limit, the ARP entry is deleted.
Precautions
If the number of ARP probes is set to 0, the system directly deletes expired ARP
entries.
Example
# Set the number of ARP probes to 5 on VLANIF 10.
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp detect-times 5
Function
The arp expire-time command sets the aging time of dynamic ARP entries.
The undo arp expire-time command restores the default aging time of dynamic
ARP entries.
By default, the aging time of dynamic ARP entries is 1200 seconds, that is, 20
minutes.
Format
arp expire-time expire-time
undo arp expire-time
Parameters
Parameter Description Value
expire-time Specifies the aging time The value is an integer ranging from 30
of dynamic ARP entries. to 62640, in seconds. The default value
is 1200 seconds, that is, 20 minutes.
Views
VLANIF interface view, GE interface view, Ethernet interface view, MultiGE
interface view, XGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The arp expire-time command sets the aging time of dynamic ARP entries to
reduce address resolution errors.
Precautions
After proxy ARP is enabled, the aging time of ARP entries on hosts should be
shortened so that invalid ARP entries can be deleted as soon as possible. Then IP
packet forwarding failures decrease on the router.
Example
# Set the aging time of dynamic ARP entries to 600s on VLANIF 10.
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp expire-time 600
Format
arp fixup
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To prevent a network attacker from sending pseudo ARP packets to modify ARP
entries on a device, run the arp fixup command on the VLANIF interface to enable
fixed ARP. Running this command converts dynamic ARP entries that are
generated on the interface to static ARP entries.
Prerequisites
ARP automatic scanning has been enabled using the arp scan command.
NOTE
ARP automatic scanning is generally used with fixed ARP. A device can use ARP automatic
scanning to generate dynamic ARP entries about all its neighbor devices. Then the device
can use fixed ARP to convert the dynamic ARP entries to static ARP entries. This process
prevents a network from attacks.
Precautions
● The number of static ARP entries converted by fixed ARP must be below the
upper limit of static ARP entries that a device can generate. If the device has a
maximum of static ARP entries, subsequent dynamic ARP entries cannot be
converted into static ones. The limit of static ARP entries may cause some
dynamic ARP entries to be fixed. In this case, the device prompts you with an
error message.
● Like configured static ARP entries, static ARP entries converted by fixed ARP
can be deleted one by one using the undo arp static command or deleted
altogether using the reset arp command.
Example
# Enable fixed ARP.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp fixup
Warning: This operation may generate configuration of static ARP, and take a lon
g time, press CTRL+C to break. Continue?[Y/N]:y
Processing...
Info: ARP fixup is completed.
Function
The arp ip-conflict-detect enable command enables the function to detect IP
address conflicts.
The undo arp ip-conflict-detect enable command disables the function to detect
IP address conflicts.
Format
arp ip-conflict-detect enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When an IP address conflict occurs between network devices, it causes high CPU
usage and route flapping. User services will be affected and even interrupted. To
help users better manage the address of a network device and to prevent IP
address conflicts from affecting user services, run the arp ip-conflict-detect
enable command to enable the function to detect IP address conflicts.
When receiving a non-gratuitous ARP packet, the device compares the source IP
address and the source MAC address of this ARP packet with that of the ARP entry
learned on the device. If the source IP address and the IP address in the ARP entry
are the same but the source MAC address and the MAC address in the ARP entry
are different, the client considers that an IP address conflict occurs in the network.
Example
# Enable the function to detect IP address conflicts.
<HUAWEI> system-view
[HUAWEI] arp ip-conflict-detect enable
Format
arp scan [ start-ip-address to end-ip-address ]
Parameters
Parameter Description Value
start-ip-address Specifies a start IP address for ARP The value is in
automatic scanning. dotted decimal
notation.
The start IP address must be less than or
equal to the end IP address.
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The arp scan command enables ARP automatic scanning to allow a device rapidly
learn MAC addresses from the neighbor devices whose IP addresses are in the
same network segment and generate corresponding ARP entries.
Follow-up Procedure
Enable fixed ARP using the arp fixup command.
NOTE
ARP automatic scanning is generally used with fixed ARP. A device can use ARP automatic
scanning to generate dynamic ARP entries about all its neighbor devices. Then the device
can use fixed ARP to convert the dynamic ARP entries to static ARP entries. This process
prevents a network from attacks.
Precautions
● A start IP address and an end IP address within a specific IP address range
must be in the same network segment with the IP address of the VLANIF
interface. The IP address of the VLANIF interface can be either the primary IP
address or a configured secondary IP address. The start IP address must be
less than or equal to the end IP address.
● If no IP address range is specified, ARP automatic scanning enables a device
to scan all its neighbor devices whose IP addresses are in the same network
segment with the primary IP address of the VLANIF interface.
● If a device has already obtained a MAC address corresponding to the IP
address, ARP automatic scanning is not performed on the device.
● ARP automatic scanning consumes system resources. You are advised to
perform ARP automatic scanning when system resources are available. Other
operations should not be performed during scanning.
● ARP automatic scanning may be time-consuming. You can press Ctrl_C to
stop ARP automatic scanning. If a device receives ARP Reply packets from its
neighbor devices when ARP automatic scanning is stopped, the device
generates dynamic ARP entries about its neighbors. Run the display arp all
command to view all dynamic ARP entries that the device has generated.
Example
# Enable ARP automatic scanning.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp scan
Format
arp static ip-address mac-address [ vid vlan-id [ interface interface-type
interface-number ] ]
undo arp static ip-address [ mac-address ] [ vid vlan-id interface interface-type
interface-number ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
If a static ARP entry to be created exists, the system updates the entry.
Example
# Configure a static ARP entry that maps the IP address 10.0.0.1 to the MAC
address aaaa-fccc-1212.
<HUAWEI> system-view
[HUAWEI] arp static 10.0.0.1 aaaa-fccc-1212
Format
arp topology-change disable
undo arp topology-change disable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Usually, when a ring protocol detects a network topology change, it will send a
protocol packet to notify the ARP module to age or delete ARP entries. Then the
device will re-learn ARP entries.
However, if the network topology changes frequently or a device has a large
number of ARP entries, re-learning of ARP entries will cause flooding of ARP
entries, consuming mass network resources and affecting other services running
on the device. To avoid this problem, the arp topology-change disable command
can be used to disable a device from aging or deleting ARP entries for network
topology changes.
Example
# Disable the device from aging or deleting ARP entries for network topology
changes.
<HUAWEI> system-view
[HUAWEI] arp topology-change disable
Warning: This operation will not age or delete dynamic ARP entries when the topology changes,continue?
[Y/N]:y
Format
arp-proxy enable
undo arp-proxy enable
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If two hosts on different physical networks of the same logical network segment
are not configured with the default gateways, you can use the arp-proxy enable
command to enable routed proxy ARP on a device between the two hosts to
resolve IP addresses of the hosts.
Precautions
Routed ARP proxy allows hosts on different physical networks of the same logical
network segment to communicate. The IP addresses of the hosts on a subnet have
the same network ID; therefore, the default gateway address does not need to be
configured on the hosts.
Example
# Enable routed proxy ARP on VLANIF 10.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp-proxy enable
Function
The arp-proxy inner-sub-vlan-proxy enable command enables intra-VLAN proxy
ARP.
Format
arp-proxy inner-sub-vlan-proxy enable
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
If host isolation is configured on the wireless access point, you need to configure
intra-VLAN proxy ARP to allow hosts to communicate in a VLAN.
Example
# Enable intra-VLAN proxy ARP on VLANIF 10.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp-proxy inner-sub-vlan-proxy enable
Function
The arp-proxy inter-sub-vlan-proxy enable command enables inter-VLAN proxy
ARP.
Format
arp-proxy inter-sub-vlan-proxy enable
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
To allow users in different VLANs to communicate at Layer 3, you must enable
inter-VLAN proxy ARP on the interface.
After inter-VLAN proxy ARP is enabled and packets are sent from different VLANs
but do not have the corresponding ARP entries, ARP packets are replicated in all
VLANs on the involved sub-interface. If a lot of VLANs are configured, a large
number of ARP packets need to be replicated, causing heavy burden on the peer
device and abnormalities (such as high CPU usage and broadcast suppression) on
downstream devices. In addition, the local device may fail to send ARP packets in
time due to the replication of a large number of packets, which may lead to ARP
learning failures. Therefore, do not configure too many VLANs on an interface.
Example
# Enable inter-VLAN proxy ARP on VLANIF 10.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] arp-proxy inter-sub-vlan-proxy enable
Format
arp send-packet ip-address mac-address interface interface-type interface-
number [ vid vid ]
Parameters
Parameter Description Value
vid vid Specifies an outer tag value for The value is an integer
a unicast ARP request packet to ranging from 1 to 4094.
be sent.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To check whether a peer device is reachable and learn a peer device's MAC
address, run the arp send-packet command to configure a local interface to send
a unicast ARP request packet that carries the peer device's IP and MAC addresses
as the destination addresses.
● If the peer is reachable, the peer sends an ARP reply packet to the local
device. Then, the local device uses information carried in the ARP reply packet
to create or update an ARP entry for the peer.
● If the peer is unreachable, the peer device does not send an ARP reply packet.
The local device does not generate an ARP entry.
The ARP entries learned or updated by the local device will be deleted after their
aging time expires and can be updated again after the local device receives ARP
request packets from the peer device.
Example
# Configure VLANIF10 to send a unicast ARP request packet that carries the
destination IP address 10.1.1.1 and destination MAC address 5489-98f4-786e.
<HUAWEI> arp send-packet 10.1.1.1 5489-98f4-786e interface vlanif 10
Using the undo arp-suppress command, you can disable ARP suppression.
Format
arp-suppress enable
undo arp-suppress
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If the system receives a great number of ARP packets from the same source at a
time, it needs to update ARP entries repeatedly, causing performance
deterioration. To ensure system performance, you can enable ARP suppression. The
system then only responds to ARP Request packets but does not update ARP
entries.
If ARP suppression is enabled for all interfaces, ARP entries on some interfaces
cannot be updated temporarily. ARP suppression is applicable to only VLANIF
interfaces. By default, it always takes effect on VLANIF interfaces. It can be
configured on other logical interfaces.
Example
# Enable ARP suppression.
<HUAWEI> system-view
[HUAWEI] arp-suppress enable
Format
display arp [ all | brief ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays all ARP mapping entries, including the aging time of ARP
entries, ARP entry type, and VPN instance to which ARP entries belong.
Example
# Display all ARP mapping entries.
<HUAWEI> display arp all
IP ADDRESS MAC ADDRESS EXPIRE(M) TYPE INTERFACE VPN-INSTANCE
VLAN
------------------------------------------------------------------------------
192.168.120.251 60de-4474-9640 I - Vlanif1
192.168.120.1 7054-f5df-9b40 6 D-0 GE0/0/0
1
192.168.120.252 04f9-3895-8300 20 D-0 GE0/0/0
1
------------------------------------------------------------------------------
Total:3 Dynamic:2 Static:0 Interface:1
Item Description
Format
display arp dynamic
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display all dynamic ARP mapping entries.
<HUAWEI> display arp dynamic
IP ADDRESS MAC ADDRESS EXPIRE(M) TYPE INTERFACE VPN-INSTANCE
VLAN
------------------------------------------------------------------------------
192.168.120.251 60de-4474-9640 I - Vlanif1
192.168.120.1 7054-f5df-9b40 15 D-0 GE0/0/0
1
192.168.120.252 04f9-3895-8300 19 D-0 GE0/0/0
1
------------------------------------------------------------------------------
Total:3 Dynamic:2 Static:0 Interface:1
Format
display arp error packet
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a device cannot learn ARP entries, you can run this command to check the latest
received ARP error packets. The ARP error packets help locate the fault.
Example
# Display the latest ten ARP error packets.
<HUAWEI> display arp error packet
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:34:53]:
00 01 08 00 06 04 00 01 00 25 9E 4B 1F 75 0A 8A
4E 02 00 00 00 00 00 00 0A 8A 4E FF 00 00 00 00
00 00 00 00 00 00 FF FF FF FF FF FF 00 25
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:34:54]:
00 01 08 00 06 04 00 01 00 13 72 FD E7 1C 0A 8A
4E 98 00 00 00 00 00 00 0A 8A 4E 30 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:34:55]:
00 01 08 00 06 04 00 01 00 13 72 9B 21 A7 0A 8A
4E 82 00 00 00 00 00 00 0A 8A 4E 01 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:35:05]:
00 01 08 00 06 04 00 01 00 13 72 9B 21 A7 0A 8A
4E 82 00 00 00 00 00 00 0A 8A 4E 01 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:35:05]:
00 01 08 00 06 04 00 01 00 E0 FC 8F B2 DD 0A 8A
4E 01 00 00 00 00 00 00 0A 8A 4F FA 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:35:08]:
00 01 08 00 06 04 00 01 00 0F E2 5C 8C EA AC 12
3E FE 00 00 00 00 00 00 AC 12 3E FE 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:35:11]:
00 01 08 00 06 04 00 01 00 1B B9 78 25 2E 0A 8A
4E A5 00 00 00 00 00 00 0A 8A 4E 2D 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:35:15]:
00 01 08 00 06 04 00 01 00 13 72 9B 21 A7 0A 8A
4E 82 00 00 00 00 00 00 0A 8A 4E 01 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:35:19]:
00 01 08 00 06 04 00 01 00 13 72 9B 21 A7 0A 8A
4E 82 00 00 00 00 00 00 0A 8A 4E 01 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00
--------------------------------------------------
[interface = Vlanif10, time = 2010-05-24 20:35:22]:
00 01 08 00 06 04 00 01 00 E0 FC 8F B2 DD 0A 8A
4E 01 00 00 00 00 00 00 0A 8A 4F FA 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00
Table 7-34 Description of the display arp error packet command output
Item Description
Function
The display arp interface command displays ARP mapping entries of a specified
interface.
Format
display arp interface interface-type interface-number
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To monitor dynamic ARP entries or locate the faults in ARP, you can run this
command to check the ARP entries.
Example
# Display all the ARP entries of VLANIF 10.
<HUAWEI> display arp interface vlanif 10
IP ADDRESS MAC ADDRESS EXPIRE(M) TYPE INTERFACE VPN-INSTANCE
VLAN
------------------------------------------------------------------------------
192.168.78.1 dcd2-fcf9-b5ca I- Vlanif10
------------------------------------------------------------------------------
Total:1 Dynamic:0 Static:0 Interface:1
Item Description
Function
The display arp ip-conflict track command displays recorded information about
the detected IP address conflict.
Format
display arp ip-conflict track
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Route flapping caused by IP address conflicts affects user services. To help users
quickly locate IP conflicts to better manage IP addresses of network devices, run
the display arp ip-conflict track command to view the recorded information
about the detected IP address conflict.
NOTE
The maximum number of IP conflict information that can be recorded by the system is 200,
and the oldest recorded information will be covered by newly added if the conflicted IP
address is more than 200.
Example
# Display the information of the detected IP address conflict.
<HUAWEI> display arp ip-conflict track
Table 7-36 Description of the display arp ip-conflict track command output
Item Description
Function
The display arp network command displays ARP mapping entries of a specified
network segment.
Format
display arp network net-number [ net-mask | mask-length ] [ dynamic | static ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display all ARP entries of the network segment with network ID 10.10.0.0 and
subnet mask 255.255.0.0.
<HUAWEI> display arp network 10.10.0.0 255.255.0.0
IP ADDRESS MAC ADDRESS EXPIRE(M) TYPE INTERFACE VPN-INSTANCE
VLAN
------------------------------------------------------------------------------
10.10.20.9 0018-2000-0083 I- Vlanif1
10.10.10.6 0018-2000-0083 I- Vlanif20
------------------------------------------------------------------------------
Total:2 Dynamic:0 Static:0 Interface:2
Item Description
Item Description
Function
The display arp packet statistics command displays the statistics on ARP-based
packets.
Format
display arp packet statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To locate and rectify ARP faults, you can run this command to the statistics on
ARP-based packets.
Example
# Display the statistics on ARP-based packets.
<HUAWEI> display arp packet statistics
ARP Pkt Received: sum 10088
ARP Learnt Count: sum 52
ARP Pkt Discard For Limit: sum 0
ARP Pkt Discard For SpeedLimit: sum 31
ARP Pkt Discard For Proxy Suppress: sum 307
ARP Pkt Discard For Other: sum 9274
Table 7-38 Description of the display arp packet statistics command output
Item Description
ARP Pkt Discard For Limit Number of ARP packets discarded due to
the ARP entry limit.
ARP Pkt Discard For SpeedLimit Number of ARP packets discarded when
the number of ARP packets from a
specified source IP address exceeds the
limit.
ARP Pkt Discard For Proxy Suppress Number of packets discarded for the
speed limit.
Item Description
ARP Pkt Discard For Other Number of the packets discarded due to
other causes.
Format
display arp static
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display all static ARP entries.
<HUAWEI> display arp static
IP ADDRESS MAC ADDRESS EXPIRE(M) TYPE INTERFACE VPN-INSTANCE
VLAN
------------------------------------------------------------------------------
172.16.1.1 0efc-0505-86e3 S--
10/-
192.168.0.1 0e00-fc01-0000 S--
10.0.0.1 aa00-fcc0-1200 S--
3/-
------------------------------------------------------------------------------
Total:3 Dynamic:0 Static:3 Interface:0
Item Description
Function
The display arp statistics command displays ARP entry statistics.
Format
display arp statistics { all | interface interface-type interface-number }
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To monitor ARP entries or locate the faults in ARP, you can run this command to
check ARP entry statistics.
Example
# Display ARP entry statistics.
<HUAWEI> display arp statistics all
Dynamic:1 Static:0
Table 7-40 Description of the display arp statistics all command output
Item Description
Format
display arp track
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Precautions
After the display arp track command is executed, changes of ARP entries are
displayed in the following situations:
● Outbound interfaces in dynamic ARP entries learnt by the VLANIF interface
change to other interfaces.
● No outbound interface is specified in the static ARP entries. The outbound
interface changes to other interfaces.
● Dynamic ARP entries or static ARP entries in which no VLAN ID or outbound
interface is specified are deleted.
Example
# Display changes of ARP entries.
Item Description
Op Operation identifier.
● M: Modify, indicating that the outbound
interface changes.
● D: Delete, indicating that the ARP entry
is deleted.
Function
The display snmp-agent trap feature-name arp all command displays all trap
messages of the ARP module.
Format
display snmp-agent trap feature-name arp all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The Simple Network Management Protocol (SNMP) is a standard network
management protocol widely used on TCP/IP networks. It uses a central computer
(a network management station) that runs network management software to
manage network elements. The management agent on the network element
automatically reports traps to the network management station. After that, the
network administrator immediately takes measures to resolve the problem.
After running the snmp-agent trap enable feature-name arp command to
enable or disable a trap function of the ARP module, run the display snmp-agent
trap feature-name arp all command to check the status of all trap functions of
the ARP module.
Example
# Display all trap messages of the ARP module.
<HUAWEI>display snmp-agent trap feature-name arp all
------------------------------------------------------------------------------
Feature name: ARP
Trap number : 6
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwEthernetARPSpeedLimitAlarm on on
hwEthernetARPThresholdExceedAlarm
on on
hwEthernetARPThresholdResumeAlarm
on on
hwEthernetARPIPConflictEvent on on
hwEthernetARPLearnStopAlarm on on
hwEthernetARPLearnResumeAlarm on on
Table 7-42 Description of the display snmp-agent trap feature-name arp all
command output
Item Description
Item Description
Function
The l2-topology detect enable command enables Layer 2 topology detection.
Format
l2-topology detect enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the l2-topology detect enable command is run, all ARP entries in the VLAN
are updated if the Layer 2 interface changes from Down to Up.
Example
# Enable Layer 2 topology detection.
<HUAWEI> system-view
[HUAWEI] l2-topology detect enable
Format
reset arp { dynamic [ ip ip-address ] | interface interface-type interface-number
[ ip ip-address ] | static }
Parameters
Parameter Description Value
dynamic Deletes dynamic ARP entries. -
interface ● interface-type specifies the type of the -
interface-type interface.
interface-number ● interface-number specifies the number
of the interface.
ip ip-address Deletes dynamic ARP entries of a specified The value is in
interface and with a specified IP address. dotted decimal
notation.
If an interface learns excessive ARP entries,
you can specify this parameter to delete a
specified ARP entry.
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If an unauthorized user sends a large number of ARP packets to a device, the
device learns a large number of ARP entries in a short period of time, causing the
buffer to overflow. As a result, users may fail to access the network. To solve the
problem, you can run the reset arp command to delete invalid ARP entries and
create new ARP entries to ensure that users can access the network.
Prerequisites
Before using the reset arp command, ensure that the corresponding ARP entries
exist.
Configuration Impact
After an ARP entry is cleared, the mapping between the IP address and the MAC
address is cleared. As a result, users may fail to assess the network and services
may be interrupted.
Precautions
ARP entries are cleared at an interval of at least 20s.
Example
# Delete dynamic ARP entries in the ARP mapping table.
<HUAWEI> reset arp dynamic
Function
The reset arp packet statistics command clears the statistics on ARP packets.
Format
reset arp packet statistics
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
You can run the display arp packet statistics command to display the statistics
on ARP packets. To obtain correct statistics, run the reset arp packet statistics
command to clear existing statistics first.
Example
# Clear the statistics on all ARP packets.
<HUAWEI> reset arp packet statistics
Function
The snmp-agent trap enable feature-name arp command enables the trap
function for the ARP module.
The undo snmp-agent trap enable feature-name arp command disables the
trap function for the ARP module.
Format
snmp-agent trap enable feature-name arp [ trap-name
{ hwethernetarpspeedlimitalarm | hwethernetarpthresholdexceedalarm |
hwethernetarpthresholdresumealarm | hwethernetarpipconflictevent } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If you do not specify trap-name, all traps of the ARP module will be enabled.
Example
# Enables the trap function of ARP speed limit.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name arp trap-name hwethernetarpspeedlimitalarm
Function
The alarm ip-used percentage command configures the percentage of the alarms
indicating that the addresses in an address pool are used up, and the percentage
of the clear alarms.
The undo alarm ip-used percentage command restores the default percentages
of the alarms and clear alarms.
Format
alarm ip-used percentage alarm-resume-percentage alarm-percentage
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the addresses in an IP address pool are used up, alarms are sent to notify
the administrator.
Precautions
The percentage of the clear alarms cannot exceed that of the alarms.
Example
# Configure the percentage of the alarms indicating that the addresses in an
address pool are used up, and the percentage of the clear alarms in the IP address
pool view.
<HUAWEI> system-view
[HUAWEI] ip pool p1
[HUAWEI-ip-pool-p1] alarm ip-used percentage 80 90
7.7.2 bootfile
Function
The bootfile command configures the name of the startup configuration file for a
DHCP client.
The undo bootfile command deletes the configured name of the startup
configuration file for a DHCP client.
By default, the startup configuration file name is not configured for a DHCP client.
Format
bootfile bootfile
undo bootfile
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
Usually, the startup configuration file is saved on a specified file server. Therefore,
the route between the DHCP client and the file server must be reachable and the
ip address or name of the file server must be specified.
Example
# In the IP address pool view, configure the name of the startup configuration file
as start.ini for the DHCP client.
<HUAWEI> system-view
[HUAWEI] ip pool p1
[HUAWEI-ip-pool-p1] bootfile start.ini
# In the DHCP Option template view, configure the name of the startup
configuration file as start.ini for the DHCP client.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] bootfile start.ini
Format
conflict auto-recycle interval day day [ hour hour [ minute minute ] ]
undo conflict auto-recycle interval
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command is used on a DHCP server. When a DHCP server allocates IP
addresses to clients, IP address conflict may occur because IP addresses of some
hosts have been manually configured. In this case, the DHCP server considers
these IP addresses as conflicting IP addresses, and allocates available IP addresses
from the conflicting IP addresses to clients only after available IP addresses in the
address pool are used up. To reclaim conflicting IP addresses promptly, the
administrator can run the conflict auto-recycle interval command to enable
automatic reclaim and specify the reclaim interval.
Prerequisites
The global address pool has been created using the ip pool command.
Example
# Enable automatic reclaim for conflicting IP addresses in the global address pool
global1, and set the interval for automatic reclaim to one day.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] conflict auto-recycle interval day 1
Format
dhcp anti-attack check duplicate option [ option-start [ to option-end ] ]
&<1-254>
undo dhcp anti-attack check duplicate option [ option-start [ to option-end ] ]
&<1-254>
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp anti-attack check duplicate option command applies to DHCP servers,
DHCP relay agents, DHCP clients, and DHCP snooping-enabled devices. To discard
DHCP messages with duplicate options 1 to 254, run the dhcp anti-attack check
duplicate option command.
Prerequisites
Example
# Configure the device to discard DHCP messages with duplicate options.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp anti-attack check duplicate option
Function
The dhcp client class-id command sets the Option60 field in the DHCP request
packet sent by the DHCP client.
The undo dhcp client class-id command deletes the configured Option60 field in
the DHCP request packet sent by the DHCP client.
Format
dhcp client class-id class-id
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
The DHCP server identifies the devices according to the Option60 field in the
DHCP request packet. You can run the dhcp client class-id class-id command to
customize the Option60 field in the DHCP request packet sent from the DHCP
client.
After you run the dhcp client class-id class-id command in the VLANIF interface
view, the device that functions as the DHCP client fills the set Option60 in the
DHCP request packet on the VLANIF interface.
Example
# Set the class-id of a DHCP client to test on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client class-id test
Function
The dhcp client class-id command is used to set the Option60 field in the DHCP
request packet sent by the DHCP client.
The undo dhcp client class-id command is used to restore the default value of
the Option60 field.
By default, the default value of the Option60 field depends on the device type,
which is "huawei Device Model".
Format
dhcp client class-id class-id
undo dhcp client class-id
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The DHCP server identifies the devices according to the Option60 field in the
DHCP request packet. You can run the dhcp client class-id class-id command to
customize the Option60 field in the DHCP request packet sent from the DHCP
client.
Configuration information of the Option60 field is saved in the storage device:/
dhcp-client.options file. By default, the storage device needs to provide more than
80-byte storage space. You can run the more dhcp-client.options command in
the user view to check configuration information of the Option60 field.
After you run the dhcp client class-id class-id command in the system view, the
device that functions as the DHCP client fills the set Option60 in the DHCP request
packet sent from all of the interfaces.
Example
# Set the class-ID of a DHCP client to test.
<HUAWEI> system-view
[HUAWEI] dhcp client class-id test
Format
dhcp client client-id client-id
undo dhcp client client-id
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
The dhcp client client-id command configures an identifier for a DHCP client. The
identifier is encapsulated into a DHCP Request message. When a DHCP client
requests an IP address from a DHCP server, the DHCP server obtains the identifier
of the DHCP client and assigns an IP address to the DHCP client with the specified
identifier.
Example
# Set the identifier of the DHCP client to test_client on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client client-id test_client
Format
dhcp client expected-lease time
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
The dhcp client expected-lease command applies to DHCP clients. An expected
lease can be contained in Option 51 of a DHCP Request message sent to the
server. The server compares the expected lease with the lease in the address pool
and assigns a shorter lease to the client.
Example
# Set the expected lease to 7200s on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client expected-lease 7200
Function
The dhcp client gateway-detect command enables gateway detection on a
DHCP client.
Format
dhcp client gateway-detect period period retransmit retransmit timeout time
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp client gateway-detect command applies to DHCP clients. After a DHCP
client obtains an IP address, the dhcp client gateway-detect command enables
the DHCP client to detect the status of the gateway being used. If the gateway
has an incorrect address or the gateway device fails, the DHCP client requests a
new IP address from the DHCP server.
Example
# Enable gateway detection on VLANIF100 of the DHCP client. Set the detection
interval to 3600s, retransmission count to 3, and timeout period to 500 ms.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client gateway-detect period 3600 retransmit 3 timeout 500
Function
The dhcp client default-route preference command configures the default route
preference that a DHCP server delivers to a DHCP client.
The undo dhcp client default-route preference command restores the default
value of the default route preference that a DHCP server delivers to a DHCP client.
By default, the default route preference that a DHCP server delivers to a DHCP
client is 60.
Format
dhcp client default-route preference preference-value
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
A DHCP client can obtain the default route through the DHCP server to
dynamically update the routing table. The next-hop address of the default route is
the DHCP client's gateway address carried in Option3.
The default route that a DHCP server delivers is the user network router (UNR)
route with the default preference 60. You can run the dhcp client default-route
preference command to change the default route preference.
Example
# In the view of VLANIF100, set the default route preference that a DHCP server
delivers to a DHCP client to 30.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client default-route preference 30
Function
The dhcp client hostname command configures a host name for a DHCP client.
The undo dhcp client hostname command deletes the configured host name of a
DHCP client.
Format
dhcp client hostname hostname
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
A DHCP server must obtain the host name of a client before assigning an IP
address to the client. To configure a host name for a DHCP client, run the dhcp
client hostname command. The host name is used to match the local domain
name of the DHCP client.
Example
# Set the host name of a DHCP client to gateway1 on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client hostname gateway1
Format
dhcp client renew
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
This command applies to the following scenarios:
● Manually renewing the lease
If a DHCP server assigns the original IP address to the client, only the lease is
renewed. If another DHCP server assigns an IP address to the client, the client
obtains a new IP address and related network parameters.
● Updating the IP address
When the DHCP client is migrated from a network segment to another
network segment and the original IP address lease does not expire, the client
needs to update the IP address.
After the dhcp client renew command is run, the DHCP client sends a lease
renewal request to the DHCP server.
● If the DHCP client receives a positive reply from the server, the client updates
the parameters such as the lease duration.
● If the DHCP client receives a negative reply from the server, the client releases
the applied parameters and re-applies to the DHCP server for an IP address
and other network parameters.
● If no reply is received, the client does not perform any operation.
The dhcp client renew command can be normally run only after the DHCP client
function is enabled on the interface and an IP address is obtained.
Example
# Renew the IP address lease on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client renew
Format
dhcp client request option-list exclude option-code &<1-8>
undo dhcp client request option-list exclude option-code &<1-8>
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
The Option55 field in DHCP Request messages is used to set the request option
list. DHCP clients use this option to specify network configuration parameters that
need to be obtained from the DHCP server. You can run the dhcp client request
option-list exclude command to configure a list of default options that are
excluded from the Option55 field based on network requirements.
For option meanings, see DHCP Options in CLI-based Configuration - Network
Interconnection Configuration Guide - DHCP Configuration.
Example
# Configure the default request option 3 to be excluded from the Option55 field
in DHCP Request messages on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client request option-list exclude 3
Format
dhcp client request option-list option-code &<1-9>
undo dhcp client request option-list option-code &<1-9>
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
The Option55 field in DHCP Request packets is used to set the request option list.
DHCP clients use this option to specify network configuration parameters that
need to be obtained from the DHCP server. Besides the default options, you can
run the dhcp client request option-list option-code command to set a list of
other request options that the Option55 field carries.
For option meanings, see DHCP Options in CLI-based Configuration - Network
Interconnection Configuration Guide - DHCP Configuration.
Example
# Configure the Option55 field in DHCP Request packets to carry option 4 on
VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp client request option-list 4
Format
dhcp enable
undo dhcp enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Network scale and complexity increase makes network configurations complex.
For example, computers frequently change their locations, and IP addresses are
insufficient for these computers. The DHCP protocol is developed to address these
problems. The dhcp enable command enables the DHCP function on the device.
Precautions
The dhcp enable command is the prerequisite for configuring DHCP-related
functions, including DHCP relay, DHCP snooping, and DHCP server. These
functions take effect only after the dhcp enable command is run. After the undo
dhcp enable command is run, all DHCP-related configurations of the device are
deleted. After DHCP is enabled again using the dhcp enable command, all DHCP-
related configurations of the device are restored to the default configurations.
Example
# Enable the DHCP function on the device.
<HUAWEI> system-view
[HUAWEI] dhcp enable
Function
The dhcp option template command creates a DHCP Option template and enters
the DHCP Option template view.
The undo dhcp option template command deletes a configured DHCP Option
template.
Format
dhcp option template template-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
Network parameters configured in the DHCP Option template view take effect
only for static clients. A DHCP Option template can be bound to multiple clients.
Run the static-bind ip-address ip-address mac-address mac-address [ option-
template template-name ] command to configure a DHCP Option template that
is bound to static clients.
Example
# Create a DHCP Option template named test.
<HUAWEI> system-view
[HUAWEI] dhcp option template test
Function
Using the dhcp relay gateway-switch enable command, you can enable DHCP
relay gateway switching.
Using the undo dhcp relay gateway-switch enable command, you can disable
DHCP relay gateway switching.
Format
dhcp relay gateway-switch enable
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp relay gateway-switch enable command is used on DHCP relay agents.
This command allows a DHCP relay agent to use a secondary IP address as the
gateway address to apply for IP addresses for users when it fails to use the
primary IP address to apply for IP addresses.
Prerequisites
● Global DHCP has been enabled by using the dhcp enable command in the
system view.
● DHCP relay has been enabled on an interface by using the dhcp select relay
command.
Precautions
Example
# Enable DHCP relay gateway switching on VLANIF10.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] ip address 192.168.30.1 255.255.255.0
[HUAWEI-Vlanif10] ip address 192.168.31.1 255.255.255.0 sub
[HUAWEI-Vlanif10] dhcp select relay
[HUAWEI-Vlanif10] dhcp relay server-ip 192.168.20.1
[HUAWEI-Vlanif10] dhcp relay gateway-switch enable
Function
The dhcp relay information enable command enables the Option 82 function for
the DHCP relay agent.
The undo dhcp relay information enable command disables the Option 82
function for the DHCP relay agent.
By default, the Option 82 function is disabled for the DHCP relay agent.
Format
dhcp relay information enable
undo dhcp relay information enable
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to the DHCP relay agent. When DHCP Request messages
carry Option 82 information, the DHCP server can locate user positions accurately
and assign IP addresses to users using different policies. After the Option 82
function is enabled on the DHCP relay agent, the device checks the Option 82 field
contained in the packets and processes the packets using corresponding policies.
Prerequisites
DHCP has been enabled by running the dhcp enable command in the system
view.
DHCP relay has been enabled by running the dhcp select relay command in the
interface view.
Follow-up Tasks
Run the dhcp relay information strategy { drop | keep | replace } command in
the interface view to configure strategies for the DHCP relay agent to process
Option 82 information.
Example
# Enable the Option 82 function for the DHCP relay agent on the VLANIF100
interface.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] vlan 100
[HUAWEI-vlan100] quit
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp select relay
[HUAWEI-Vlanif100] dhcp relay information enable
Function
The dhcp relay information strategy command configures the strategies used by
a DHCP relay agent to process Option 82 information.
The undo dhcp relay information strategy command restores the default setting.
By default, the strategy used by a DHCP relay agent to process Option 82
information is replace.
Format
dhcp relay information strategy { drop | keep | replace }
undo dhcp relay information strategy
Parameters
Parameters Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to the DHCP relay agent. When DHCP Request messages
carry Option 82 information, the DHCP server can locate user positions accurately
and assign IP addresses to users using different policies. When a DHCP relay agent
receives DHCP Request messages, it uses one of the following strategies to process
Option 82 information:
● Drop:
– If the received DHCP message does not carry an Option 82 field, the
DHCP relay agent forwards the message directly without processing it.
– If the received DHCP message carries an Option 82 field, the DHCP relay
agent drops the Option 82 field and forwards the message.
● Keep:
– If the received DHCP message does not carry an Option 82 field, the
DHCP relay agent forwards the message directly without processing it.
– If the received DHCP message carries an Option 82 field, the DHCP relay
agent keeps the Option 82 field and forwards the message.
● Replace:
– If the received DHCP message does not carry an Option 82 field, the
DHCP relay agent inserts an Option 82 field configured by the
administrator into the received message and forwards the message.
– If the received DHCP message carries an Option 82 field, the DHCP relay
agent replaces it with the Option 82 field configured by the administrator
and forwards the message.
Prerequisites
DHCP has been enabled by running the dhcp enable command in the system
view.
DHCP relay has been enabled by running the dhcp select relay command in the
interface view.
The Option 82 function has been enabled for the DHCP relay agent by using the
dhcp relay information enable command.
Example
# Configure the DHCP relay agent to drop Option 82 information on VLANIF 100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] vlan 100
[HUAWEI-vlan100] quit
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp select relay
[HUAWEI-Vlanif100] dhcp relay information enable
[HUAWEI-Vlanif100] dhcp relay information strategy drop
Format
dhcp relay release client-ip-address mac-address [ server-ip-address ]
Parameters
Parameter Description Value
Views
VLANIF interface view, system view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP relay agents. In some situations, for example, a
user is forced to go offline, the user's IP address is no longer used. However, the
user cannot access the network, and will not send a DHCP release message to the
DHCP server to release the IP address assigned by the DHCP server. Before the IP
address lease expires, the DHCP server will not assign the user's IP address to
another client, wasting IP addresses. In this case, you can run the dhcp relay
release command to configure a DHCP relay agent to send a DHCP release
message to the DHCP server. After receiving the message, the DHCP server sets
the status of the IP address to idle. The DHCP server then can assign the released
IP address to another client.
If a DHCP server IP address is specified, the DHCP relay agent sends an address
release request only to the specified DHCP server. If no DHCP server address is
specified, the following situations occur:
● When the dhcp relay release command is run in the system view, the DHCP
relay agent sends an address release request to DHCP servers on all the
interfaces working in DHCP relay mode.
● When the dhcp relay release command is run in the interface view, the DHCP
relay agent sends an address release request to all DHCP servers on the
VLANIF interface.
Precautions
The dhcp relay release command only releases the IP addresses dynamically
assigned by DHCP servers.
When multiple DHCP relay agents are connected between the DHCP client and
server, this command must be executed on the first DHCP relay agent.
Example
# Configure a DHCP relay agent to send a release message to the DHCP server at
10.1.1.1 for releasing the IP address 192.168.1.1 assigned to the DHCP client
whose MAC address is 00e0-fc34-2000.
<HUAWEI> system-view
[HUAWEI] dhcp relay release 192.168.1.1 00e0-fc12-3456 10.1.1.1
Function
The dhcp relay request server-match enable command configures a DHCP relay
agent to check the DHCP server identifier (Option54) in a DHCP Request message
to be forwarded.
The undo dhcp relay request server-match enable command configures a DHCP
relay agent not to check the DHCP server identifier (Option54) in a DHCP Request
message to be forwarded.
By default, a DHCP relay agent checks the DHCP server identifier (Option54) in a
DHCP Request message to be forwarded.
Format
dhcp relay request server-match enable
undo dhcp relay request server-match enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
During the four-message exchange process, the DHCP Offer message sent by a
DHCP server carries the DHCP server identifier (Option54) to identify the server.
After receiving the DHCP Offer message, the DHCP client records the DHCP server
identifier and carries it in the DHCP Request message to be replied to indicate
which DHCP server is selected. When the DHCP relay agent forwards the DHCP
Request message, it checks the DHCP server identifier in the message and
forwards the message only to the corresponding DHCP server.
If multiple DHCP servers are deployed on the network and the design of a server
does not comply with standards, the DHCP server identifier carried in the DHCP
Offer message to be sent by the server is not its identifier. As a result, the DHCP
server identifier carried in the DHCP Request message is incorrect, the DHCP relay
agent forwards the message to an incorrect DHCP server rather than the matching
DHCP server, and the client fails to obtain an IP address.
To resolve this issue, you can run the undo dhcp relay request server-match
enable command, so that the DHCP relay agent does not check the DHCP server
identifier (Option54) in the DHCP Request message to be forwarded and forwards
the message to all relayed DHCP servers, ensuring that the matching DHCP server
can receive the DHCP Request message.
Prerequisites
DHCP has been enabled globally using the dhcp enable command.
Example
# Configure a DHCP relay agent not to check the DHCP server identifier
(Option54) in a DHCP Request message to be forwarded.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] undo dhcp relay request server-match enable
Function
The dhcp relay reply forward all enable command configures a DHCP relay
agent to forward all DHCP ACK messages.
The undo dhcp relay reply forward all enable command restores the default
setting.
By default, a DHCP relay agent forwards only the first received DHCP ACK
message.
Format
dhcp relay reply forward all enable
undo dhcp relay reply forward all enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
As defined in RFC2131, the DHCP server that provides only IP addresses for DHCP
clients replies with DHCP ACK messages. After receiving a DHCP ACK message, a
DHCP relay agent searches for the entry based on the DHCP client's MAC address
contained in the message, forwards the message to the corresponding client, and
then immediately deletes the entry matching the client.
If multiple DHCP servers are deployed on the network, the design of a server does
not comply with standards, and a DHCP client requests for an IP address, the
server does not provide an IP address for the DHCP client but replies with a DHCP
ACK message. If the DHCP relay agent first receives the DHCP ACK message
replied by the server, it incorrectly forwards the message to the client and deletes
the corresponding entry. After the DHCP relay agent receives the correct DHCP
ACK message, it cannot forward the message because the entry matching the
client has been deleted. As a result, the client cannot obtain an IP address.
To resolve this issue, you can run the dhcp relay reply forward all enable
command, so that the DHCP relay agent does not immediately delete the entry
matching a client after forwarding a DHCP ACK message to the client. Instead, the
DHCP relay agent deletes the entry that has been aged out to ensure that the
subsequently received DHCP ACK messages can be forwarded to the client.
Prerequisites
DHCP has been enabled globally using the dhcp enable command.
Example
# Configure a DHCP relay agent to forward all DHCP ACK messages.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp relay reply forward all enable
Function
The dhcp relay server-ip command configures a DHCP server address on an
interface enabled with DHCP relay.
The undo dhcp relay server-ip command deletes the configured DHCP server
addresses on an interface enabled with DHCP relay.
Format
dhcp relay server-ip ip-address
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP relay agents. When a DHCP client needs to send a
DHCP Discover message to a DHCP server on a different network segment
through a DHCP relay agent, you must configure the DHCP server address on the
DHCP relay agent.
When a DHCP relay agent forwards a DHCP Discover message, it does not check
whether the DHCP server status is Down. If multiple DHCP server addresses are
configured on an interface, multiple DHCP servers respond with DHCP Offer
messages to the DHCP client. However, the DHCP client uses the first received
DHCP Offer message. As a result, IP addresses in the IP address pool on the first
DHCP server are insufficient, but available IP addresses in the IP address pools on
the other DHCP servers are not allocated. To make each DHCP server allocate the
same number of IP addresses, a DHCP relay agent changes the forwarding order
each time it forwards a DHCP Discover message, so that load balancing is
implemented among DHCP servers. A DHCP relay agent forwards a DHCP
Discover message as follows:
● The DHCP relay agent forwards the message to all DHCP servers by default,
and changes the forwarding order each time it forwards a DHCP Discover
message.
● You can configure the ip relay address cycle command to reduce the number
of packets received by a DHCP server and lessen the load of a DHCP server.
After this command is configured, the DHCP relay agent forwards a received
DHCP Discover message to one DHCP server at a time, and forwards the
DHCP Discover message to a different DHCP server each time it receives the
message.
Prerequisites
DHCP relay has been enabled on the interface using the dhcp select relay
command.
Precautions
If you run the dhcp relay server-ip command for multiple times, multiple DHCP
server addresses are configured.
Each interface that is enabled with DHCP relay can be configured with a
maximum of 8 DHCP server addresses.
Example
# Configure DHCP relay and two DHCP server addresses on VLANIF 100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] vlan 100
[HUAWEI-vlan100] quit
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp select relay
[HUAWEI-Vlanif100] dhcp relay server-ip 10.1.1.2
[HUAWEI-Vlanif100] dhcp relay server-ip 10.1.1.3
Function
The dhcp relay server-select command configures a DHCP server group for a
DHCP relay agent.
The undo dhcp relay server-select command deletes the configured DHCP server
group of a DHCP relay agent.
Format
dhcp relay server-select group-name
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp relay server-select command applies to DHCP relay agents. When a
DHCP client needs to send DHCP requests to a DHCP server using a DHCP relay
agent, you can run the dhcp relay server-select command to specify a DHCP
server group for the DHCP relay agent and configure the DHCP server address.
Prerequisites
1. A DHCP server group has been created using the dhcp server group
command.
2. The DHCP relay function has been enabled using the dhcp select relay
command so that the system can forward DHCP packets to the specified
DHCP server.
Precautions
● Multiple interfaces can be configured with the same DHCP server group, and
one interface can be configured with only one DHCP server group.
● If you run the dhcp relay server-select command in the same interface view
for multiple times, only the latest configuration takes effect. If a specified
DHCP server group does not exist, the configuration fails; however, the latest
configured DHCP server group still takes effect.
Example
# Configure the DHCP server group of a DHCP relay agent as group1 on
VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp server group group1
[HUAWEI-dhcp-server-group-group1] dhcp-server 10.10.10.10
[HUAWEI-dhcp-server-group-group1] quit
[HUAWEI] interface vlanif 100
Function
The dhcp relay trust option82 command enables Option 82 on the DHCP relay
agent.
The undo dhcp relay trust option82 command disables Option 82 on the DHCP
relay agent.
Format
dhcp relay trust option82
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command is used on the DHCP relay agent to enable the Option 82 function.
After receiving a DHCP packet that carries the Option 82 field but the giaddr field
of the packet is 0, the DHCP relay agent processes the packet by default. Using
the undo dhcp relay trust option82 command, the DHCP relay agent discards the
packet.
Prerequisites
DHCP has been enabled globally by using the dhcp enable command.
Example
# Enable Option 82 trusted of the DHCP relay agent.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp relay trust option82
Function
The dhcp set ttl command sets the TTL value for DHCP Discover messages after
they are forwarded by the DHCP relay agent at Layer 3.
The undo dhcp set ttl command restores the default setting.
By default, the TTL value of DHCP Discovery messages decreases by 1 after they
are forwarded by the DHCP relay agent at Layer 3.
Format
dhcp set ttl { unvaried | ttl-value }
Parameters
Parameter Description Value
unvaried Indicates that the TTL value of DHCP Discovery -
messages remains unchanged after the messages
are forwarded by the DHCP relay agent at Layer 3.
That is, the device does not reduce the TTL value
by 1.
ttl-value Specifies a fixed TTL value for DHCP Discovery The value is an
messages after they are forwarded by the DHCP integer that
relay agent at Layer 3. ranges from 1
to 255.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp set ttl command is used on DHCP relay agents. When a DHCP relay
agent forwards DHCP Discovery messages at Layer 3, it reduces the TTL value of
the messages by 1 by default. Assume that the TTL value of a DHCP Discovery
message received by the DHCP relay agent is 1. If the DHCP relay agent reduces
the TTL value by 1, the TTL value changes to 0. The next-hop routing device will
discard the message as its TTL value is 0. As a result, the DHCP server cannot
receive the DHCP Discovery message forwarded by the DHCP relay agent. To
ensure that the DHCP server can receive the DHCP Discovery message sent from
the client, run the dhcp set ttl command to set the TTL value of the DHCP
Discovery message to a non-zero value after the message is forwarded at Layer 3.
NOTE
If the DHCP relay agent connects to a special client whose TTL value of DHCP Discovery
messages is 1, and if there are routing devices between the DHCP relay agent and DHCP
server, run the dhcp set ttl ttl-value command to specify a fixed TTL value (16 is
recommended) for DHCP Discovery messages after they are forwarded by the DHCP relay
agent at Layer 3.
Prerequisites
The DHCP function has been enabled globally using the dhcp enable command.
Example
# Set the TTL value of DHCP Discovery messages to 16 after the messages are
forwarded by the DHCP relay agent at Layer 3.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp set ttl 16
Format
dhcp select global
undo dhcp select global
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp select global command applies to DHCP servers. After receiving a DHCP
Request message from a DHCP client, a DHCP server assigns an IP address from
the local address pool to the client. Run the dhcp select global command to
configure the device to assign IP addresses from the global address pool. When no
interface address pool is created for the DHCP server, the DHCP server assigns an
IP address from the global address pool to an online user.
The device can also assign IP addresses from an interface address pool using the
dhcp select interface command in the interface view.
Prerequisites
● DHCP has been enabled using the dhcp enable command in the system view.
● Before running the dhcp select global command, you need to run the ip
address command to configure the interface IP address.
Precautions
If the DHCP relay and DHCP server functions are simultaneously configured on an
interface, only the DHCP server function takes effect.
Example
# Enable VLANIF100 to use the global address pool.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.1 24
[HUAWEI-Vlanif100] dhcp select global
The undo dhcp select interface command disables an interface from using the
interface address pool.
By default, the DHCP server function using the interface address pool is disabled
on an interface.
Format
dhcp select interface
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp select interface command applies to DHCP servers. After receiving a
DHCP Request message from a DHCP client, a DHCP server assigns an IP address
from the local address pool to the client. Run the dhcp select interface command
to configure a DHCP server to assign IP addresses from the interface address pool
to clients.
The device can also assign IP addresses from a global address pool using the dhcp
select global command.
Prerequisites
DHCP has been enabled globally using the dhcp enable command in the system
view.
Precautions
If the DHCP relay and DHCP server functions are simultaneously configured on an
interface, only the DHCP server function takes effect.
Example
# Enable VLANIF100 to use the interface address pool.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.2 24
[HUAWEI-Vlanif100] dhcp select interface
Function
The dhcp server alarm ip-used percentage command configures the percentage
of the alarms indicating that the addresses in an interface address pool are used
up, and the percentage of the clear alarms.
The undo dhcp server alarm ip-used percentage command restores the default
percentages of the alarms and clear alarms.
Format
dhcp server alarm ip-used percentage alarm-resume-percentage alarm-
percentage
undo dhcp server alarm ip-used percentage
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the addresses in an interface address pool are used up, alarms are sent to
notify the administrator.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
The percentage of the clear alarms cannot exceed that of the alarms.
Example
# Configure the percentage of the alarms indicating that the addresses in an
interface address pool are used up, and the percentage of the clear alarms in the
interface address pool of the VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.10.10.10 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server alarm ip-used percentage 80 90
Format
dhcp select relay
undo dhcp select relay
Parameters
None
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp select relay command applies to DHCP relay agents. If the DHCP server
and client are on the same network segment, they can directly communicate with
each other using DHCP. In this case, no DHCP relay agent is needed. If the DHCP
server and client are on different network segments, the DHCP relay function
must be enabled to forward DHCP messages.
Prerequisites
The DHCP function has been enabled using the dhcp enable command in the
system view.
Follow-up Tasks
● To ensure that a DHCP relay agent can forward DHCP packets to a DHCP
server, run the dhcp relay server-select or dhcp relay server-ip command on
the DHCP relay-enabled interface to configure the correct IP address of the
DHCP server.
● To ensure that a DHCP server can forward DHCP packets to a DHCP relay
agent, you must configure a route to the DHCP relay agent on the DHCP
server.
● If multiple DHCP relay agents exist on the network, run the dhcp relay
detect enable command to enable user entry detection on the DHCP relay
agent to prevent the IP addresses assigned to clients from conflicting with
those of other clients.
Precautions
● If the DHCP relay and DHCP server functions are simultaneously configured
on an interface, only the DHCP server function takes effect.
● The DHCP server must select an IP address in the same network segment with
the DHCP relay agent from the global address pool to ensure that the DHCP
client obtains an IP address on the local network segment. No interface
address pool can be configured on the interface that connects the DHCP
server and relay agent.
Example
# Enable the DHCP relay function on VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp select relay
Format
dhcp server bootfile bootfile
undo dhcp server bootfile
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Besides assigning IP addresses, a DHCP server can also provide the required
network configuration parameters, such as the startup configuration file name for
the DHCP clients. After the name of the startup configuration file is configured
using the dhcp server bootfile command, the Offer and ACK packets sent from
the DHCP server carry this file name. The DHCP client can acquire the startup
configuration file from the specified server based on the file name.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Example
# Configure the name of the startup configuration file as start.ini for the DHCP
client on the Vlanif100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 192.168.1.1 255.255.255.0
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server bootfile start.ini
Format
dhcp server bootp
undo dhcp server bootp
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A DHCP server and a BOOTP server may reside on the same network segment.
The BOOTP server assigns static IP addresses to BOOTP clients. As defined in the
DHCP protocol, a DHCP server can also respond to BOOTP requests to assign IP
addresses to BOOTP clients. BOOTP clients may obtain IP addresses from the
DHCP server but not the BOOTP server.
Prerequisites
DHCP has been enabled globally using the dhcp enable command in the system
view.
Follow-up Procedure
Using the dhcp server bootp automatic command in the system view, you can
enable the DHCP server to allocate IP addresses to BOOTP clients.
Example
# Enable a DHCP server to respond to a BOOTP request.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp server bootp
Format
dhcp server bootp automatic
undo dhcp server bootp automatic
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. When BOOTP clients need to obtain their
IP addresses, DNS server's IP address, and gateway IP address from a DHCP server,
you need to run the dhcp server bootp automatic command to enable the DHCP
server to dynamically allocate IP addresses to BOOTP clients.
Prerequisites
● DHCP has been enabled globally using the dhcp enable command in the
system view.
● The DHCP server has been enabled to respond to BOOTP requests by using
the dhcp server bootp command, or dhcp server bootp automatic cannot
take effect.
Precautions
When the device functions as the DHCP server, the device can allocate IP
addresses to BOOTP clients if the BOOTP clients reside on the same network as
the DHCP server. You can run the dhcp server bootp automatic command to
dynamically allocate IP addresses. You can also run the static-bind command or
the dhcp server static-bind command to allocate IP addresses to BOOTP clients
in the static binding mode.
Example
# Enable the DHCP server to allocate IP addresses to BOOTP clients.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp server bootp
[HUAWEI] dhcp server bootp automatic
Function
The dhcp server conflict auto-recycle interval command enables automatic
reclaim of conflicting IP addresses in the interface address pool and configures the
interval for the automatic reclaim.
Format
dhcp server conflict auto-recycle interval day day [ hour hour [ minute
minute ] ]
undo dhcp server conflict auto-recycle interval
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Example
# Enable automatic reclaim for conflicting IP addresses in the address pool on
VLANIF 100, and set the interval for automatic reclaim to one day.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 192.168.1.1 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server conflict auto-recycle interval day 1
Function
The dhcp server database command enables the function to save the current
DHCP data to storage devices.
The undo dhcp server database command disables the function to save the
DHCP data to storage devices.
Format
dhcp server database { enable | recover | write-delay interval }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the device functions as a DHCP server, run the dhcp server database
enable command to enable the device to save DHCP data to storage devices. This
avoids data loss caused by device faults. Then the system generates lease.txt and
conflict.txt files in the storage device. The two files save address lease
information and address conflict information respectively. Run the display dhcp
server database command to check the storage device for saving DHCP data.
After the dhcp server database enable command is run, current DHCP data is
automatically saved at the specified interval, and previous data files are
overwritten. The interval can be set using the dhcp server database write-delay
interval command.
If a fault occurs on the device, run the dhcp server database recover command
to recover DHCP data from storage devices during the system restarts.
Prerequisites
The dhcp server database enable command has been run to enable the device to
save DHCP data to storage devices, and ensure that the storage devices work
properly.
Precautions
● The lease.txt and conflict.txt files are overwritten periodically; therefore, you
are advised to back up and save the two files to other locations.
● The time displayed in the lease.txt and conflict.txt files is the UTC time rather
than the system time, and you do not need to pay attention to time zone
information.
Example
# Enable the device to save the current DHCP data to storage devices and set the
interval at which DHCP data is saved to 2000s.
<HUAWEI> system-view
[HUAWEI] dhcp server database enable
[HUAWEI] dhcp server database write-delay 2000
# Recover DHCP configuration using the DHCP data saved on storage devices.
<HUAWEI> system-view
[HUAWEI] dhcp server database recover
Function
The dhcp server dns-list command configures DNS server addresses for an
interface address pool.
The undo dhcp server dns-list command deletes the specified DNS server
addresses of an interface address pool.
Format
dhcp server dns-list { ip-address &<1-8> | unnumbered interface interface-type
interface-number }
undo dhcp server dns-list { all | ip-address | unnumbered interface }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. If user hosts access hosts on the network
through the domain name, user hosts need to send DNS Request messages to the
DNS server and resolve the domain name. To enable DNS services on the DHCP
client, specify the DNS server address for the interface address pool on the DHCP
server. The DHCP server can assign both the specified DNS server address and an
IP address to the client. To configure DNS server addresses for a global address
pool, run the dns-list command.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
● Each address pool can be configured with a maximum of eight DNS server
addresses. If multiple DNS server addresses are configured, the first DNS
server address assigned to the DHCP client functions as the primary address
and other addresses are secondary addresses.
● To specify multiple DNS servers, enter multiple DNS server addresses in the
dhcp server dns-list command.
Example
# Specify a DNS server at 10.10.1.254 for domain name resolution when IP
addresses in the interface address pool on VLANIF100 are assigned to clients.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.1 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server dns-list 10.10.1.254
Format
dhcp server domain-name domain-name
undo dhcp server domain-name
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. Run the dhcp server domain-name
command on a DHCP server to specify a domain name for each interface address
pool. When allocating IP addresses to clients, the DHCP server also sends the
domain names to the clients.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
To configure a domain name for the global address pool, run the domain-name
command.
Example
# Set the domain name assigned by the DHCP address pool on the interface to
example.com.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.1 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server domain-name example.com
Function
The dhcp server excluded-ip-address command specifies the range of IP
addresses that cannot be automatically assigned to clients from an interface
address pool.
The undo dhcp server excluded-ip-address command deletes the specified range
of IP addresses that cannot be automatically assigned to clients from an interface
address pool.
Format
dhcp server excluded-ip-address start-ip-address [ end-ip-address ]
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp server excluded-ip-address command applies to DHCP servers. Fixed IP
addresses are allocated to some specific hosts (such as the WWW server) on the
network for a long time. If these hosts' IP addresses are overlapped with IP
addresses in the address pool and the DHCP server allocates these overlapped IP
addresses to other hosts, IP address conflicts may occur. To prevent such IP address
conflicts, you need to exclude these IP addresses from being automatically
assigned in the address pool.
You can run the dhcp server excluded-ip-address command to specify the IP
addresses or the range of IP addresses that cannot be automatically assigned to
clients in the interface address pool.
You can run the excluded-ip-address command to specify the IP addresses or the
range of IP addresses that cannot be automatically assigned to clients in the
global address pool.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
● IP addresses that cannot be automatically assigned must be in the address
pool. If IP address range in the address pool is changed using the dhcp server
ip-range command, IP addresses that are configured not to be automatically
assigned must be within the new IP address range.
● You do not need to exclude the gateway address configured using the dhcp
server gateway-list command from being automatically allocated. The device
automatically adds the gateway address into the list of IP addresses that
cannot be automatically allocated.
You do not need to exclude the IP address of a server's interface connecting
to a client from being automatically allocated. The device automatically sets
the status of the interface IP address to Conflict during address assignment.
● If you run this command multiple times, you can specify multiple IP addresses
or ranges of IP addresses that cannot be automatically assigned to clients
from the specified address pool.
● You can run the display ip pool command to check the IP addresses in use in
the current address pool, so that you can exclude the unused IP addresses
from being automatically assigned to clients. If you need to exclude IP
addresses in use from being automatically assigned to clients, run the reset ip
pool command to reclaim these IP addresses first.
Example
# Disable IP addresses 192.168.1.1 to 192.168.1.20 from being automatically
assigned to clients from the address pool on VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 192.168.1.1 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server excluded-ip-address 192.168.1.1 192.168.1.20
Function
The dhcp server gateway-list command sets the default gateway IP address that
a DHCP server pre-allocates to DHCP clients.
The undo dhcp server gateway-list command deletes the configured default
gateway IP address.
By default, the default gateway IP address that a DHCP server pre-allocates to
DHCP clients is not configured.
Format
dhcp server gateway-list ip-address &<1-8>
undo dhcp server gateway-list { ip-address | all }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To load balance traffic and improve network reliability, you can configure multiple
default gateway addresses.
NOTICE
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Example
# Enable a DHCP server on a VLANIF100 to pre-allocate default gateway address
10.1.1.1 to DHCP clients.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.1 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server gateway-list 10.1.1.1
Function
The dhcp server force insert option command configures a DHCP server to
forcibly insert an Option field specified in the interface address pool to a DHCP
Response packet that it sends to a DHCP client.
The undo dhcp server force insert option command deletes the Option field
forcibly inserted to a DHCP Response packet that a DHCP server sends to a DHCP
client.
By default, a DHCP server does not forcibly insert an Option field to a DHCP
Response packet that it sends to a DHCP client.
Format
dhcp server force insert option code &<1-254>
undo dhcp server force insert option code &<1-254>
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In general, when a DHCP client applies for an IP address from a DHCP server,
parameters contained in the DHCP Request packet specify the options the client
requires. The DHCP server inserts the required options to a DHCP Response
packet.
Sometimes, a device, functioning as a DHCP server, receives a DHCP Request
packet that contains no parameter specifying the options the client requires.
However, the client still wants to obtain the options configured on the interface
address pool. You can run the dhcp server force insert option code &<1-254>
command to configure the DHCP server to forcibly insert an Option field to the
DHCP Response packet.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
4. The Option field has been configured in the interface address pool using the
dhcp server option code [ sub-option sub-code ] { ascii ascii-string | hex
hex-string | cipher cipher-string | ip-address ip-address &<1-8> } command in
the interface view.
Example
# Configure a DHCP server to forcibly insert Option 4 to a DHCP Response packet
on VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] vlan 100
[HUAWEI-vlan100] quit
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server option 4 hex 11 22
[HUAWEI-Vlanif100] dhcp server force insert option 4
Format
dhcp server force response
undo dhcp server force response
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Scenario
When a DHCP client goes online in two steps, the IP address requested by the
DHCP client is in the IP address pool, but no lease record of the DHCP client is
found in the address pool. For example, after obtaining an IP address from
another DHCP server, a wireless user roams to the current DHCP server and the
original IP address is in the address pool of the current DHCP server. Alternatively,
the address pool is reset and the original user needs to go online again. In this
case, when receiving a DHCP Request message from the DHCP client, the DHCP
server keeps silent and does not reply the DHCP client with a DHCP NAK message.
The DHCP client can apply for an IP address to go online again in four steps only
after the two steps for the client to go online time out. As a result, the DHCP
client is slow in obtaining an IP address. To force the DHCP server to reply with a
DHCP NAK message, you can run the dhcp server force response command, so
that the DHCP client can quickly enter the four-step process for going online and
apply for an IP address again.
Prerequisites
DHCP has been enabled on the device using the dhcp enable command.
Example
# Force a DHCP server to reply with a DHCP NAK message.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp server force response
The undo dhcp server group command deletes an existing DHCP server group.
Format
dhcp server group group-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP relay agents. Generally, a DHCP relay agent serves
multiple DHCP servers. To manage these DHCP servers in a unified manner, run
the dhcp server group command to create a DHCP server group. The DHCP server
group then assigns IP addresses to users using the DHCP relay agent.
Follow-up Procedure
● Run the dhcp-server command to add DHCP servers to the DHCP server
group.
● Run the dhcp relay server-select command in the interface view to specify a
DHCP server group for the DHCP relay agent.
Precautions
The maximum number of DHCP server groups that can be configured globally
varies according to the AC models:
● AD9430DN-12: 8
● AD9430DN-24 and AD9431DN-24X: 16
● Other AP models: 32
Example
# Create a DHCP server group named dhcp-srv1.
<HUAWEI> system-view
[HUAWEI] dhcp server group dhcp-srv1
Function
The dhcp server ip-range command sets the range of IP addresses that a DHCP
server pre-allocates to DHCP clients.
The undo dhcp server ip-range command deletes the configured IP address
range.
Format
dhcp server ip-range start-ip-address end-ip-address
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the dhcp server ip-range start-ip-address end-ip-address command
to change the range of IP addresses in an address pool based on actual usage of
IP addresses.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Example
# Enable a DHCP server on a VLANIF100 to pre-allocate IP addresses 192.168.1.2
to 192.168.1.100 to DHCP clients.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 192.168.1.1 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server ip-range 192.168.1.2 192.168.1.100
The undo dhcp server lease command restores the default IP address lease of
addresses in an interface address pool.
Format
dhcp server lease { day day [ hour hour [ minute minute ] ] | unlimited }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Set the IP address lease of the address pool on VLANIF100 to 2 days 2 hours
and 30 minutes.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.10.10.10 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server lease day 2 hour 2 minute 30
By default, the logging function during IP address allocation of the DHCP server is
disabled.
Format
dhcp server logging [ allocation-fail | allocation-success | release | renew-fail |
renew-success | detect-conflict | recycle-conflict ] *
undo dhcp server logging [ allocation-fail | allocation-success | release |
renew-fail | renew-success | detect-conflict | recycle-conflict ] *
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command is used on a DHCP server. When the DHCP server allocates IP
addresses to clients, it records address allocation information to facilitate routine
maintenance and fault location. After the logging function during IP address
allocation of the DHCP server is configured using the dhcp server logging
command, the DHCP server records logs about address allocation, conflict, lease
renewal, and release.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
● With this logging function enabled, if a large number of DHCP clients request
IP addresses from the DHCP server, the server frequently records logs. The
server performance may therefore be affected.
● IP address allocation logs are recorded in the AM module. To view log
information, the information center must be enabled. In addition, default
settings for log output vary depending on various factors including the log
level and output direction.
For example, the level of logs indicating that an IP address is successfully
allocated, an IP address is successfully renewed, and an IP address is
successfully released is informational, and these logs are not recorded in the
log buffer by default. You can run the info-center source AM channel 4 log
level informational command to change the level of the logs to be recorded
in the log buffer. You can then run the display logbuffer command to check
the preceding logs.
Example
# Enable the logging function during IP address allocation of the DHCP server on
the interface VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 192.168.1.1 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server logging
Function
The dhcp server mask command sets the subnet mask of IP addresses that a
DHCP server pre-allocates to DHCP clients.
The undo dhcp server mask command deletes the configured subnet mask.
Format
dhcp server mask { mask | mask-length }
undo dhcp server mask
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After enabling the DHCP server function on an interface, you can configure the
range and subnet mask of IP addresses that a DHCP server pre-allocates to DHCP
clients. Run the dhcp server ip-range command to configure the IP address range
and run the dhcp server mask command to configure the subnet mask of the IP
addresses.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Example
# Set the subnet mask of IP addresses that a DHCP server on a VLANIF100 pre-
allocates to DHCP clients to 255.255.255.0.
<HUAWEI> system-view
[HUAWEI] dhcp enable
Format
dhcp server nbns-list ip-address &<1-8>
undo dhcp server nbns-list { ip-address | all }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. Before hosts communicate with each
other, a NetBIOS server needs to resolve the accessed NetBIOS hostname to an IP
address. To enable hosts to communicate with each other, run the dhcp server
nbns-list command to configure NetBIOS server addresses for an interface
address pool. When assigning IP addresses to clients, a DHCP server also assigns
the configured NetBIOS server addresses to clients. To configure NetBIOS server
addresses for a global address pool, run the nbns-list command.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
Example
# Specify a NetBIOS server at 192.168.1.99 for domain name resolution when IP
addresses in the interface address pool on VLANIF100 are assigned to clients.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.10.10.10 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server nbns-list 192.168.1.99
Function
The dhcp server netbios-type command specifies the NetBIOS node type for a
DHCP client connecting to an interface.
The undo dhcp server netbios-type command deletes the specified NetBIOS
node type of a DHCP client connecting to an interface.
Format
dhcp server netbios-type { b-node | h-node | m-node | p-node }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. When DHCP clients use NetBIOS on the
WAN to communicate, their host names and IP addresses need to be mapped. You
can run the dhcp server netbios-type command to configure the NetBIOS node
type for an interface address pool. When assigning an IP address to the client, the
DHCP server also sends the specified NetBIOS node type to the client.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
To specify the NetBIOS node type for a client in the global address pool, run the
netbios-type command.
Example
# Set the NetBIOS node type for a client in the address pool on VLANIF100 to p-
node.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.10.10.10 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server netbios-type p-node
Format
dhcp server next-server ip-address
undo dhcp server next-server
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp server next-server command is used on DHCP servers. When assigning
a DHCP client an IP address, a DHCP server can also assign the DHCP client an IP
address of the server that provides network services for the client. For example,
some clients like IP phones still need other configuration parameters after
automatically obtaining IP addresses. You can run the dhcp server next-server
command to specify the server address used after a client obtains an IP address.
The client then requests the configuration parameters from the specified server
after obtaining an IP address.
If users use addresses in the interface address pool, run the dhcp server next-
server command to specify the DHCP server IP address. If users use addresses in
the global address pool, run the next-server command to specify the DHCP server
IP address.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
● The dhcp server next-server command takes effect for only users who use
addresses in the interface address pool.
● If you run the dhcp server next-server command multiple times, only the
latest configuration takes effect.
Example
# Specify the server IP address 192.168.1.2 in the interface address pool on
VLANIF100 used to provide services for terminal users.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.2 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server next-server 192.168.1.2
Function
The dhcp server option command sets user-defined option for an interface
address pool.
The undo dhcp server option command deletes user-defined option from an
interface address pool.
Format
dhcp server option code [ sub-option sub-code ] { ascii ascii-string | hex hex-
string | cipher cipher-string | ip-address ip-address &<1-8> }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. The Option field in a DHCP packet carries
control information and parameters, including basic information such as the DNS
service, NetBIOS service, and IP address lease. If a DHCP server is configured with
option, when a DHCP client applies for an IP address from an interface address
pool, the client can obtain configurations in the Option field of the DHCP response
packet from the DHCP server without having to configure the DNS service,
NetBIOS service, or IP address lease separately.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
● When the password is contained in option, the ascii or hex type is insecure.
Set the option type to cipher. A secure password should contain at least two
types of the following: lowercase letters, uppercase letters, number, and
special characters. In addition, the password must consist of six or more than
six characters.
● The dhcp server option command configures basic functions, such as the
NetBIOS service and IP address lease. The system also provides commands to
configure these functions separately. These commands take precedence over
the dhcp server option command.
● To set user-defined option for a global address pool, run the option
command.
● When users on an enterprise's intranet use a proxy server to connect to the
Internet, you need to configure proxy server parameters so that users can use
browsers to access the network. The Web Proxy Auto-Discovery Protocol
(WPAD) implements automatic configuration of these parameters. The
administrator does not need to manually configure these parameters on each
client. To implement the WPAD function, the administrator needs to deploy
the configuration file of the proxy server in advance, and then run the dhcp
server option 252 ascii ascii-string command to specify the URL of the
configuration file. The ascii-string parameter specifies the URL of the
configuration file, in the format of http://xxx/proxy.pac. Set ascii-string
according to the actual location of the configuration file. When a browser
accesses the network, the browser requests the DHCP server to send the URL
of the configuration file on the proxy server, and then downloads the
configuration file to conduct automatic configuration. After the configuration
is completed, the browser can access the network.
NOTE
Example
# Set Option64 to 0x11 (a hexadecimal number) for the interface address pool on
VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.10.10.10 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server option 64 hex 11
Format
dhcp server option121 ip-address { ip-address mask-length gateway-address }
&<1-8>
undo dhcp server option121 [ ip-address ip-address mask-length gateway-
address ]
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp server option121 ip-address command applies to only the DHCP server.
The dhcp server option121 ip-address command configures Option 121 that
defines a classless static route allocated to a client from an interface address pool.
mask-length and gateway-address specify a classless static route. The dhcp server
option121 ip-address command configures a maximum of eight classless static
routes.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
4. The undo dhcp server option121 command will delete all classless static
routes. To delete one classless static route, run the undo dhcp server
option121 ip-address ip-address mask-length gateway-address command.
Example
# Configure a classless static route allocated by a DHCP server to a client in the
interface address pool on VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.2 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server option121 ip-address 10.10.10.10 24 192.168.11.11
Function
The dhcp server option184 command configures Option 184 allocated by a DHCP
server to a client.
The undo dhcp server option184 command deletes Option 184 allocated by a
DHCP server to a client.
Format
dhcp server option184 { as-ip ip-address | fail-over ip-address dialer-string | ncp-
ip ip-address | voice-vlan vlan-id }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp server option184 command applies to only the DHCP server and
configures Option 184 allocated by a DHCP server to a client in an interface
address pool.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Example
# Configure Option 184 allocated by a DHCP server to a client in the interface
address pool on VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.2 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server option184 as-ip 10.10.10.10
By default, the DHCP server sends 0 ping packets and the maximum response
time is 500 ms.
Format
dhcp server ping { packet number | timeout milliseconds } *
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
Example
# Set the maximum number of ping packets to 3 and the maximum response time
to 400 ms.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp server ping packet 3
[HUAWEI] dhcp server ping timeout 400
Function
The dhcp server sip-server command configures the SIP server IP address
assigned to a DHCP client on an interface address pool.
The undo dhcp server sip-server command deletes the configured SIP server IP
address assigned to a DHCP client on an interface address pool.
Format
dhcp server sip-server { ip-address ip-address &<1-2> | list domain-name
&<1-2> }
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to the DHCP server. To enable DHCP clients to normally
access the Internet, the DHCP server needs to specify the SIP server IP address in
the interface address pool when assigning IP addresses to the clients.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
● A maximum of two SIP server addresses can be configured in each address
pool. The first assigned address functions as the primary address, and the
other address functions as a secondary address.
● Before specifying the IP address or name for a SIP server, ensure that the SIP
server exists.
● If you run this command repeatedly, the latest configuration overrides the
previous ones.
Example
# Specify 10.1.1.1 as the IP address of the SIP server when addresses in the
interface VLANIF100 address pool are assigned to clients.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.1 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server sip-server ip-address 10.1.1.1
Function
The dhcp server sname command configures the name of the server where the
DHCP client obtains the startup configuration file.
The undo dhcp server sname command deletes the configured name of the
server where the DHCP client obtains the startup configuration file.
By default, the name of the server where the DHCP client obtains the startup
configuration file is not configured.
Format
dhcp server sname sname
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Besides assigning IP addresses, a DHCP server can also provide the required
network configuration parameters, such as the startup configuration file name for
the DHCP clients. After the name of the server where the DHCP client obtains the
startup configuration file is configured using the dhcp server sname command,
the DHCP client obtains the startup configuration file from this server.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
4. The startup configuration file name has been configured for the DHCP client
using the dhcp server bootfile.
Follow-up Procedures
Ensure that the route between the DHCP client and the file server where the
DHCP client obtains the startup configuration file is reachable.
Example
# Configure the name of the server where the DHCP client obtains the startup
configuration file as Test in the interface address pool on VLANIF100.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] vlan 100
[HUAWEI-vlan100] quit
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.1.1.1 255.255.255.0
Function
The dhcp server static-bind command binds an IP address in an interface address
pool to a MAC address.
Format
dhcp server static-bind ip-address ip-address mac-address mac-address
[ description description ]
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp server static-bind command applies to DHCP servers. When planning a
network, you need to allocate fixed IP addresses to some important hosts to
ensure reliability. In this case, you can bind IP addresses in the address pool to the
MAC addresses of these hosts. After the preceding configuration is complete, if the
host of the MAC address to which the IP address is bound request an IP address
from the DHCP server, the DHCP server finds the bound IP address based on the
host's MAC address and allocates this IP address to the host, ensuring that the IP
address obtained by the host is fixed.
You can run the dhcp server static-bind command to bind an IP address in an
interface address pool to a MAC address.
You can run the static-bind command to bind an IP address in a global address
pool to a MAC address.
Prerequisites
1. The DHCP function has been enabled using the dhcp enable command in the
system view.
2. IP addresses in the interface address pool have been configured using the ip
address command.
3. The DHCP server function has been enabled on the interface using the dhcp
select interface command.
Precautions
● Ensure that the bound IP address is not configured as the IP address that
cannot be allocated using the dhcp server excluded-ip-address command.
● IP addresses that are used can also be statically bound to MAC addresses or
unbound from MAC addresses. When an IP address is statically bound to a
MAC address, ensure that the MAC address to be bound is the same as the
MAC address of the user who actually uses the IP address.
● The DHCP server preferentially allocates the IP address that has been
statically bound to the client's MAC address.
● After an IP address is bound to a MAC address, the IP address does not expire.
After an automatically allocated IP address is statically bound to a MAC
address, the lease time of the IP address becomes unlimited. After the static
binding between the IP address and the MAC address is deleted, the lease
time of the IP address becomes the same as that configured in the address
pool.
Example
# Configure a DHCP server to assign a fixed IP address 10.10.10.20 in the interface
address pool on vlanif 100 to a host with the MAC address 00e0-fcf3-2a3b.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address 10.10.10.10 24
[HUAWEI-Vlanif100] dhcp select interface
[HUAWEI-Vlanif100] dhcp server static-bind ip-address 10.10.10.20 mac-address 00e0-fcf3-2a3b
Format
dhcp server trust option82
undo dhcp server trust option82
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command is used on the DHCP server to enable the Option 82 function. After
receiving a DHCP packet that carries the Option 82 field but the giaddr is 0, the
DHCP server processes the packet by default. Using the undo dhcp server trust
option82 command, the DHCP server discards the packet.
Prerequisites
DHCP has been enabled globally by using the dhcp enable command.
Example
# Enable Option 82 of the DHCP server.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp server trust option82
The undo dhcp speed-limit auto command disables dynamic rate limiting on
DHCP packets.
By default, dynamic rate limiting is disabled on DHCP packets.
Format
dhcp speed-limit auto
undo dhcp speed-limit auto
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To ensure security or facilitate management, users may require that the DHCP
packet processing rate should be limited. If the rate is not limited, CPU and
memory resources can be used up due to malicious attacks.
Table 7-43 and Table 7-44 list the mapping between the DHCP packet rate and
CPU/memory usage after dynamic rate limiting on DHCP packets is enabled.
(70–85) 100
[85–100) 50
100 10
(65–75) 100
[75–85) 50
[85–100) 10
Prerequisites
DHCP has been enabled globally by using the dhcp enable command.
Precautions
Example
# Enable dynamic rate limiting on DHCP packets.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] dhcp speed-limit auto
7.7.59 dhcp-server
Function
The dhcp-server command adds DHCP servers to a DHCP server group.
The undo dhcp-server command deletes DHCP servers from a DHCP server group.
Format
dhcp-server ip-address [ ip-address-index ]
Parameters
Parameter Description Value
Views
DHCP server group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dhcp-server command applies to DHCP relay agents. To ensure that the
DHCP relay agent can forward messages to multiple DHCP servers, configure
multiple DHCP servers in a DHCP server group.
Precautions
Each DHCP server group can be configured with a maximum of twenty DHCP
servers. You can delete a DHCP server by specifying ip-address-index.
Example
# Add the DHCP server at 10.10.78.56 to a DHCP server group dhcp-srv1.
<HUAWEI> system-view
[HUAWEI] dhcp server group dhcp-srv1
[HUAWEI-dhcp-server-group-dhcp-srv1] dhcp-server 10.10.78.56
Function
The display dhcp client command displays DHCP client lease information.
Format
display dhcp client [ interface interface-type interface-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When a device functions as the DHCP client, this command displays DHCP client
lease information.
Example
# Display DHCP client lease information.
<HUAWEI> display dhcp client
DHCP client lease information on interface Vlanif119 :
Current machine state : Bound
Internet address assigned via : DHCP
Physical address : 00e0-fccd-a896
IP address : 192.168.119.254
Subnet mask : 255.255.255.0
Gateway ip address : 192.168.119.1
192.168.119.3
192.168.119.2
DHCP server : 192.168.119.1
Lease obtained at : 2008-10-01 04:35:10
Lease expires at : 2008-10-01 04:36:10
Lease renews at : 2008-10-01 04:35:40
Lease rebinds at : 2008-10-01 04:36:03
AC IP : 192.168.10.1
Classless static route : 192.168.0.0/16 via 192.168.119.1
10.10.0.0/16 via 192.168.119.2
Host name : client Request option list : 1 3 6 15 28 33 44 121 184
Class identifier : example
Client identifier : 00e0-fccd-a896
Item Description
Item Description
Format
display dhcp client statistics [ interface interface-type interface-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When the device functions as the DHCP client, the display dhcp client statistics
command displays message statistics.
Example
# Display message statistics on a DHCP client.
<HUAWEI> display dhcp client statistics
DHCP message statistics on interface GigabitEthernet0/0/1 :
Input: total 0 packets
Bootp reply : 0
Offer : 0
Ack : 0
Nak : 0
Output: total 0 packets
Bootp request : 0
Discover : 0
Request : 0
Request of init-reboot: 0
Request of selecting : 0
Request of renewing : 0
Request of rebinding : 0
Decline : 0
Release : 0
Table 7-46 Description of the display dhcp client statistics command output
Item Description
Item Description
Function
The display dhcp configuration command displays the configuration of a DHCP
public module.
Format
display dhcp configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the configuration of a DHCP public module.
Example
# Display the configuration of a DHCP public module.
<HUAWEI> display dhcp configuration
DHCP global running information :
DHCP : Enable
DHCP speed limit : Disable (default)
DHCP anti-attack check duplicate option : Disable (default)
Item Description
Function
The display dhcp option template command displays the configuration of a
DHCP Option template.
Format
display dhcp option template [ name template-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring a DHCP Option template, you can run the display dhcp option
template command to view the configuration of the DHCP Option template,
including the template name, number, IP address of a server configured for the
client after the client automatically obtains the IP address, domain name, and
values of customized options.
Example
# Display the configuration of the DHCP Option template named test.
<HUAWEI> display dhcp option template name test
-----------------------------------------------------------------------------
Template-Name : test
Template-No : 1
Next-server : 192.168.1.5
Domain-name : example.com
DNS-server0 : 192.168.2.7
DNS-server1 : 192.168.2.8
NBNS-server0 : 192.168.1.7
NBNS-server1 : 192.168.1.8
Netbios-type : b-node
Gateway-0 : 192.168.1.10
-----------------------------------------------------------------------------
Template-Name : template2
Template-No : 1
Next-server : 192.168.1.5
Domain-name : example.com
Option-code : 64
Option-subcode : 3
Option-type : hex
Option-value : 11
DNS-server0 : 192.168.2.7
DNS-server1 : 192.168.2.8
NBNS-server0 : 192.168.2.7
NBNS-server1 : 192.168.2.8
Netbios-type : b-node
Gateway-0 : 192.168.1.10
Table 7-48 Description of the display dhcp option template command output
Item Description
Item Description
Format
display dhcp relay { configuration | all | interface interface-type interface-
number }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check configuration information about DHCP relay
agents configured globally and on interfaces.
Example
# Display configuration information about DHCP relay agents on all interfaces.
<HUAWEI> display dhcp relay configuration
DHCP relay global running information :
DHCP relay address cycle : Disable (default)
DHCP relay trust option82 : Enable (default)
DHCP relay request server-match : Enable (default)
DHCP relay reply forward all : Disable (default)
DHCP relay agent running information of interface Vlanif5 :
Server group name : group1
Gateway address in use : 10.100.100.1
Gateway switch : enable
DHCP relay agent running information of interface Vlanif100 :
Server IP address [00] : 10.2.2.3
Gateway address in use : 10.2.2.2
Table 7-49 Description of the display dhcp relay configuration command output
Item Description
DHCP relay address cycle Whether the DHCP server polling function
is enabled on a DHCP relay agent.
● Enable: The DHCP server polling
function is enabled on a DHCP relay
agent.
● Disable: The DHCP server polling
function is disabled on a DHCP relay
agent.
To configure this item, run the ip relay
address cycle command.
DHCP relay reply forward all Whether a DHCP relay agent is enabled to
forward all DHCP ACK messages.
● Enable: A DHCP relay agent is enabled
to forward all DHCP ACK messages.
● Disable: A DHCP relay agent is disabled
from forwarding all DHCP ACK
messages.
To configure this item, run the dhcp relay
reply forward all enable command.
Item Description
Format
display dhcp relay statistics [ server-group group-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Run the display dhcp relay statistics command to check whether the client is
correctly configured or the network is connected.
● Run the display dhcp relay statistics server-group group-name command to
check message statistics on DHCP relay agents connected to DHCP servers in
a specified DHCP server group. The DHCP server group name needs to be
specified.
● Run the display dhcp relay statistics command to check message statistics
on all DHCP relay agents besides DHCP relay agents connected to DHCP
servers in the DHCP server group.
Follow-up Procedure
After detecting incorrect message statistics on a DHCP relay agent, run the reset
dhcp relay statistics [ server-group group-name ] command to clear message
statistics on the DHCP relay agent.
Example
# Display message statistics on a DHCP relay agent.
<HUAWEI> display dhcp relay statistics
The statistics of DHCP RELAY:
DHCP packets received from clients :0
DHCP DISCOVER packets received :0
Table 7-50 Description of the display dhcp relay statistics command output
Item Description
DHCP ACK packets received DHCP ACK messages received from servers.
DHCP NAK packets received DHCP NAK messages received from servers.
Function
The display dhcp relay user-table command displays user entries on a DHCP
relay agent.
Format
display dhcp relay user-table { all | ip-address ip-address | mac-address mac-
address }
Parameters
Parameter Description Value
mac-address Displays the user entry with a specified The value is in H-H-
mac-address MAC address on the DHCP relay agent. H format. An H
contains 4
hexadecimal digits.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
A DHCP relay agent can dynamically create user entries after user entry detection
is enabled. After this function is enabled, you can use the display dhcp relay
user-table command to check the IP address, MAC address, VLAN ID, and Layer 3
access interface index of each DHCP client.
Prerequisites
User entry detection has been enabled on the DHCP relay agent using the dhcp
relay detect enable command.
Example
# Display all user entries on the DHCP relay agent.
<HUAWEI> display dhcp relay user-table all
IP Address MAC Address VLAN Interface Lease Time
--------------------------------------------------------------------------------
10.1.1.212 5cd9-98bc-0318 3501 Wlan-Dbss11:0 2017.05.05 15:55:22
10.1.1.222 000b-c002-9aed 3501 Wlan-Dbss11:0 2017.05.05 15:55:23
--------------------------------------------------------------------------------
Print count: 2 Total count: 2
Table 7-51 Description of the display dhcp relay user-table command output
Item Description
Function
The display dhcp server database command displays information about the
DHCP database.
Format
display dhcp server database
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The display dhcp server database command displays the storage path and file
name of DHCP data on a DHCP server. This information helps to check:
● Whether the function that saves DHCP data to the storage device is enabled.
If this function is not enabled, run the dhcp server database command to
enable it.
● Whether the interval at which DHCP data is saved is proper.
● Whether the function that recovers DHCP data from the storage device after
the system restarts is enabled.
Precautions
The function that saves DHCP data to storage devices and the function that
recovers DHCP data from storage devices can be enabled in any sequence.
Example
# Display information about the DHCP database.
<HUAWEI> display dhcp server database
Status: disable
Recover from files after reboot: disable
File saving lease items: flash:/dhcp/lease.txt
File saving conflict items: flash:/dhcp/conflict.txt
Save Interval: 300 (seconds)
Table 7-52 Description of the display dhcp server database command output
Item Description
Recover from files after reboot Whether to recover data from the file on
the storage device after the system restarts:
● disable
● enable
The value is set using the dhcp server
database command.
File saving lease items File name and path of the file for storing
address lease information.
File saving conflict items File name and path of the file for storing
address conflict information.
Function
The display dhcp server configuration command displays DHCP server
configuration.
Format
display dhcp server configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When the AP functions as a DHCP server, you can run the display dhcp server
configuration command to check DHCP server configuration.
Example
# Display DHCP server configuration.
<HUAWEI> display dhcp server configuration
DHCP server global running information :
DHCP server bootp : Disable (default)
DHCP server bootp automatic : Disable (default)
DHCP server ping packet :0 (default)
DHCP server ping timeout : 500 (default)
DHCP server trust option82 : Enable (default)
DHCP server force response : Disable (default)
Item Description
Item Description
DHCP server mode DHCP server mode. The value can be:
● Interface: indicates a DHCP server
based on an interface address pool.
To configure this item, run the dhcp
select interface command.
● Global: indicates a DHCP server
based on the global address pool.
To configure this item, run the dhcp
select global command.
Function
The display dhcp server group command displays the configuration of a DHCP
server group.
Format
display dhcp server group [ group-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
This command applies to DHCP relay agents. The display dhcp server group
command displays information about all the DHCP server groups of a DHCP relay
agent and the number of DHCP servers in the DHCP server groups. If group-name
is specified, the display dhcp server group group-name command displays DHCP
server addresses and the number of DHCP servers in a specified DHCP server
group.
Prerequisites
A DHCP server group has been created on a DHCP relay agent using the dhcp
server group command.
Example
# Display the configuration of the DHCP server group myServers.
<HUAWEI> display dhcp server group myServers
Group-name : myServers
(0) Server-IP : 10.1.1.1
Gateway : 10.10.10.1
Table 7-54 Description of the display dhcp server group command output
Item Description
Format
display dhcp server statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display dhcp server statistics command to check whether the
client is correctly configured or the network is connected.
Follow-up Procedure
After detecting incorrect message statistics on a DHCP server, run the reset dhcp
server statistics command to clear message statistics on the DHCP server.
Example
# Display statistics on the DHCP server.
<HUAWEI> display dhcp server statistics
DHCP Server Statistics:
Client Request: 6
Dhcp Discover: 1
Dhcp Request: 4
Dhcp Decline: 0
Dhcp Release: 1
Dhcp Inform: 0
Server Reply: 4
Dhcp Offer: 1
Dhcp Ack: 3
Dhcp Nak: 0
Bad Messages: 0
Table 7-55 Description of the display dhcp server statistics command output
Item Description
Item Description
Dhcp Offer, Dhcp Ack, Dhcp Nak Numbers of different types of DHCP
messages sent from the DHCP server to the
DHCP client.
Format
display dhcp statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display dhcp statistics command displays statistics about sent and received
DHCP messages.
Example
# Display DHCP message statistics.
<HUAWEI> display dhcp statistics
Input: total 172 packets, discarded 0 packets
Bootp request : 0, Bootp reply : 0
Discover : 0, Offer : 172
Request : 0, Ack : 0
Release : 0, Nak : 0
Decline : 0, Inform : 0
Item Description
Item Description
Rx buffers full or L2fdb lookup failed Information displayed when the DHCP
service is abnormal. The displayed
information includes:
● Rx buffers full: Total number of
DHCP packets discarded because
the remaining queue length is
shorter than the reserved threshold.
● L2fdb lookup failed: Total number
of DHCP packets discarded because
entries fail to be queried.
● High cpu occupancy: Total number
of DHCP packets discarded because
the CPU usage is excessively high.
● Port blocked: Total number of
DHCP packets discarded because
the inbound interface is blocked.
● Bad vlan id: Total number of DHCP
packets discarded because the
VLAN ID is incorrect.
● Memory exhausted: Total number
of DHCP packets discarded because
the memory is exhausted.
● L3if protocol down: Total number of
DHCP packets discarded because
the Layer 3 protocol of the source
interface goes Down.
● Rate limit: Total number of DHCP
packets discarded because rates of
the packets exceed the limit.
● Bad packet length: Total number of
DHCP packets discarded because
the packet length is incorrect.
● Bad ip header length: Total number
of DHCP packets discarded because
the IP header length is incorrect.
● Bad ip header checksum: Total
number of DHCP packets discarded
because the checksum of the IP
header is incorrect.
● Bad udp checksum: Total number of
DHCP packets discarded because
the checksum of the UDP header is
incorrect.
● Hops exceeded: Total number of
DHCP packets discarded because
the number of next hops is
incorrect.
Item Description
Item Description
Function
The display ip pool command displays configured IP address pool information.
Format
display ip pool
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ip pool command to view configured IP address pool and
IP address information, including the IP address pool name, lease, lock status, and
status of IP addresses in the IP address pool.
Example
# Display information about conflicting addresses in the IP address pool named
test.
<HUAWEI> display ip pool name test conflict
Pool-name : test
Pool-No :1
Lease : 1 Days 0 Hours 0 Minutes
Domain-name :-
Option-code : 60
Option-subcode : --
Option-type : cipher
Option-value : %^%#5g)NPN1M,$M;pQ-lT\P>Al6QN4#ldIVVjD69XlCN%^%#
DNS-server0 :-
NBNS-server0 :-
Netbios-type :-
Position : Local
Status : Unlocked
Gateway-0 :-
Network : 192.168.0.0
Mask : 255.255.255.0
Bootfile : 43534
Logging : Enable
Conflicted address recycle interval: 1 Days 0 Hours 0 Minutes
Address Statistic: Total :254 Used :1
Idle :252 Expired :2
Conflict :1 Disabled :0
-------------------------------------------------------------------------------
Network section
Start End Total Used Idle(Expired) Conflict Disabled
-------------------------------------------------------------------------------
192.168.0.1 192.168.0.254 254 1 252(2) 1 0
-------------------------------------------------------------------------------
Client-ID format as follows:
DHCP : mac-address PPPoE : mac-address
IPSec : user-id/portnumber/vrf PPP : interface index
L2TP : cpu-slot/session-id SSL-VPN : user-id/session-id
-------------------------------------------------------------------------------
Index IP Client-ID Type Left Status
-------------------------------------------------------------------------------
109 192.168.0.110 - - - Conflict
-------------------------------------------------------------------------------
Item Description
Item Description
Item Description
Item Description
Item Description
Index Index.
IP IP address.
Item Description
Function
The display snmp-agent trap feature-name dhcp all command displays the
status of all traps for the DHCP module.
Format
display snmp-agent trap feature-name dhcp all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After enabling the trap function for the DHCP module, you can run this command
to check the status of all traps for the DHCP module. To enable the trap function
for the DHCP module, run the snmp-agent trap enable feature-name dhcp
command.
Prerequisites
The SNMP function has been enabled on the device. For details, see snmp-agent.
Example
# Display the status of all traps for the DHCP module.
<HUAWEI>display snmp-agent trap feature-name dhcp all
------------------------------------------------------------------------------
Feature name: dhcp
Trap number : 15
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwNomatchSnpBindTblDhcpPktAlarm
off off
hwDhcpSnpChaddrAlarm off off
hwDhcpV6PktPrefixAlarm off on
hwUntrustedReplyPktAlarm off off
hwDhcpPktRateAlarm off on
hwSnpUserNumberAlarmIf on off
hwSnpUserNumberAlarmIfResume on off
hwSnpUserNumberAlarmVlan on off
hwSnpUserNumberAlarmVlanResume on off
hwSnpUserNumberAlarmGlobal on off
hwSnpUserNumberAlarmGlobalResume
on off
hwNdSnpUserNumberAlarmIf on off
hwNdSnpUserNumberAlarmIfResume on off
hwNdSnpUserNumberAlarmGlobal on off
hwNdSnpUserNumberAlarmGlobalResume
on off
hwNomatchSnpBindTblDhcpv6PktAlarm
off off
hwNomatchSnpBindTblNDPktAlarm off off
Table 7-58 Description of the display snmp-agent trap feature-name dhcp all
command output
Item Description
Item Description
Trap name Name of a trap. Traps for the DHCP module include:
● hwNomatchSnpBindTblDhcpPktAlarm: The device
sends a Huawei proprietary trap when the
number of DHCP Request packets that do not
match DHCP snooping binding entries and are
discarded on an interface exceeds the threshold.
● hwDhcpSnpChaddrAlarm: The device sends a
Huawei proprietary trap when the number of
discarded DHCP packets whose CHADDR field
differs from the source MAC address exceeds the
threshold.
● hwDhcpV6PktPrefixAlarm: The device sends a
Huawei proprietary trap message when the
DHCPv6 prefix length exceeds the threshold.
● hwUntrustedReplyPktAlarm: The device sends a
Huawei proprietary trap message when the
number of DHCP Reply packets discarded on an
untrusted interface exceeds the threshold.
● hwDhcpPktRateAlarm: The device sends a Huawei
proprietary trap message when the number of
discarded DHCP packets whose rate exceeds the
limit exceeds the threshold.
● hwSnpUserNumberAlarmIf: The device sends a
Huawei proprietary trap message when the
number of DHCP access users on an interface
exceeds the upper threshold.
● hwSnpUserNumberAlarmIfResume: The device
sends a Huawei proprietary trap message when
the number of DHCP access users on an interface
falls below the lower threshold.
● hwSnpUserNumberAlarmVlan: The device sends a
Huawei proprietary trap message when the
number of DHCP access users in a VLAN exceeds
the upper threshold.
● hwSnpUserNumberAlarmVlanResume: The device
sends a Huawei proprietary trap message when
the number of DHCP access users in a VLAN falls
below the lower threshold.
● hwSnpUserNumberAlarmGlobal: The device sends
a Huawei proprietary trap message when the
number of DHCP access users on the device
exceeds the upper threshold.
● hwSnpUserNumberAlarmGlobalResume: The
device sends a Huawei proprietary trap message
when the number of DHCP access users on the
device falls below the lower threshold.
Item Description
7.7.74 dns-list
Function
The dns-list command configures the DNS server address for the DHCP client.
The undo dns-list command deletes a configured DNS server address.
By default, no DNS server address is configured.
Format
IP address pool view
dns-list { ip-address &<1-8> | unnumbered interface interface-type interface-
number }
undo dns-list { ip-address | unnumbered interface | all }
DHCP Option template view
dns-list ip-address &<1-8>
undo dns-list { ip-address | all }
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. If user hosts access hosts on the network
by domain names, user hosts need to send DNS requests to the DNS server and
resolve the domain name to access for communication. To connect a DHCP client
to the network, configure a DHCP server address so that the DHCP server can
assign both the specified DNS server address and an IP address to the client. To
configure DNS server addresses for an interface address pool, run the dhcp server
dns-list command.
Precautions
In the IP address pool view and DHCP Option template view, a device can be
configured with a maximum of eight DNS server addresses respectively. The
address first assigned to the clients functions as the primary address, and the
other seven addresses function as secondary addresses.
Example
# In the IP address pool view, set the IP address of the DNS server to 10.10.10.10.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] dns-list 10.10.10.10
# In the DHCP Option template view, set the IP address of the DNS server to
10.10.10.10.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] dns-list 10.10.10.10
7.7.75 domain-name
Function
The domain-name command configures the domain name suffix for the DHCP
client.
Format
domain-name domain-name
undo domain-name
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
This command applies to DHCP servers. When allocating IP addresses to the client,
the DHCP server also specifies domain names for clients. Run the domain-name
command on the DHCP server to specify a domain name. When allocating IP
addresses to clients, the DHCP server also sends the domain names to the clients.
To configure a domain name for an interface address pool, run the dhcp server
domain-name (interface view) command.
Example
# In the IP address pool view, configure the domain name suffix assigned to the
DHCP client as example.com.
<HUAWEI> system-view
[HUAWEI] ip pool test
[HUAWEI-ip-pool-test] domain-name example.com
# In the DHCP Option template, configure the domain name suffix assigned to the
DHCP client as example.com.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] domain-name example.com
7.7.76 excluded-ip-address
Function
The excluded-ip-address command specifies the range of IP addresses that
cannot be automatically assigned to clients from an address pool.
The undo excluded-ip-address command deletes the specified range of IP
addresses that cannot be automatically assigned to clients from an address pool.
By default, all IP addresses in an address pool can be automatically assigned to
clients.
Format
excluded-ip-address start-ip-address [ end-ip-address ]
undo excluded-ip-address start-ip-address [ end-ip-address ]
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the excluded-ip-address command to specify the IP addresses or the
range of IP addresses that cannot be automatically assigned to clients in the
global address pool.
You can run the dhcp server excluded-ip-address command to specify the IP
addresses or the range of IP addresses that cannot be automatically assigned to
clients in the interface address pool.
Prerequisites
Network segment addresses that can be assigned from the global address pool
have been configured using the network (IP address pool view) command.
Precautions
Example
# Disable IP addresses 10.10.10.10 to 10.10.10.20 from being automatically
assigned to clients from the address pool global1.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] network 10.10.10.0 mask 24
[HUAWEI-ip-pool-global1] excluded-ip-address 10.10.10.10 10.10.10.20
Function
The force insert option command configures a DHCP server to forcibly insert an
Option field specified in the global address pool or DHCP Option template to a
DHCP Response packet that it sends to a DHCP client.
The undo force insert option command deletes the Option field forcibly inserted
to a DHCP Response packet that a DHCP server sends to a DHCP client.
By default, a DHCP server does not forcibly insert an Option field to a DHCP
Response packet that it sends to a DHCP client.
Format
force insert option code &<1-254>
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a DHCP client applies for an IP address from a DHCP server, parameters
contained in the DHCP Request packet specify the options the client requires. The
DHCP server inserts the required options to a DHCP Response packet.
Sometimes, the DHCP server on the existing network receives a DHCP Request
packet that contains no parameter specifying the options the client requires.
However, the client still wants to obtain the options configured on the global
address pool. You can run the force insert option code &<1-254> command to
configure the DHCP server to forcibly insert an Option field to the DHCP Response
packet.
Prerequisites
The Option field has been configured in the global address pool by running the
option code [ sub-option sub-code ] { ascii ascii-string | hex hex-string | cipher
cipher-string | ip-address ip-address &<1-8> } command in the global address
pool view.
Example
# Configure a DHCP server to forcibly insert Option 4 to a DHCP Response packet
in the address pool pool1.
<HUAWEI> system-view
[HUAWEI] ip pool pool1
[HUAWEI-ip-pool-pool1] option 4 hex 11 22
[HUAWEI-ip-pool-pool1] force insert option 4
Format
gateway ip-address
undo gateway
Parameters
Parameter Description Value
Views
DHCP server group view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP relay agents. If a DHCP server and its DHCP relay
agent are on different network segments, you can run the gateway command to
specify an egress gateway address for the DHCP relay agent. In this way, the
DHCP relay agent can communicate with the DHCP server. Run the gateway-list
command to configure an egress gateway for the DHCP server.
Precautions
● If an egress gateway is not configured for a DHCP relay agent using the
gateway command, the DHCP relay agent uses the interface address as the
gateway address to communicate with the DHCP server.
● When two wireless access point devices function as the DHCP server and
DHCP relay agent respectively, they must use the same egress gateway
address.
Example
# Specify the egress gateway address of the server group myServers as 10.10.10.1.
<HUAWEI> system-view
[HUAWEI] dhcp server group myServers
[HUAWEI-dhcp-server-group-myServers] gateway 10.10.10.1
7.7.79 gateway-list
Function
The gateway-list command configures an egress gateway address for a DHCP
client.
The undo gateway-list command deletes a configured egress gateway address.
By default, no egress gateway address is configured.
Format
gateway-list ip-address &<1-8>
undo gateway-list { ip-address | all }
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. If a DHCP server and its client are on
different network segments, you can run the gateway-list command to specify an
egress gateway address. In this way, the DHCP server and client can communicate
with each other. Then the DHCP server can assign both an IP address and the
specified egress gateway address to the client. You can configure multiple
gateways in a global address pool to load balance traffic and improve network
reliability.
To configure an egress gateway for a DHCP relay agent, run the gateway (DHCP
server group view) command.
Configuration Impact
If a gateway address is configured on the DHCP server, a DHCP client will obtain
the gateway address from the DHCP server and automatically generates a default
route to the gateway address. If you run the option121 command on the DHCP
server to allocate classless static routes to DHCP clients, the DHCP client uses an
allocated classless static route and does not automatically generate a default
route to the gateway address.
Precautions
● The IP addresses specified in the excluded-ip-address command cannot be
configured as a gateway address.
● After an IP address is configured as a gateway address, the device adds the IP
address to the list of IP addresses that cannot be automatically allocated,
removing the need to run the excluded-ip-address command.
● In the IP address pool view or DHCP Option template view, a maximum of
eight egress gateway addresses can be configured on the device. These
gateway addresses cannot be subnet broadcast addresses.
● When configuring an egress gateway address for the global address pool of a
DHCP server, ensure that this egress gateway address is the same as that of
the DHCP relay agent.
Example
# In the IP address pool view, set the egress gateway address for the DHCP client
to 10.1.1.1.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] gateway-list 10.1.1.1
# In the DHCP Option template view, set the egress gateway address for the
DHCP client to 10.1.1.1.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] gateway-list 10.1.1.1
Format
ip pool ip-pool-name
undo ip pool ip-pool-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. When configuring a DHCP server, run the
ip pool (system view) command in the system view to create a global IP address
pool and set parameters for the global IP address pool, including a gateway
address, and the IP address lease. Then the configured DHCP server can assign IP
addresses in the IP address pool to clients.
Follow-up Procedure
Run the network command to specify the range of the IP addresses in the pool.
Example
# Create a global address pool named global1.
<HUAWEI> system-view
[HUAWEI] ip pool global1
Function
The ip relay address cycle command enables the DHCP server polling function on
a DHCP relay agent.
The undo ip relay address cycle command disables the DHCP server polling
function on a DHCP relay agent.
By default, DHCP server polling is disabled on a DHCP relay agent.
Format
ip relay address cycle
undo ip relay address cycle
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP relay agents. When multiple DHCP server
addresses are configured on a DHCP relay agent, the DHCP relay agent forwards
DHCP Discover messages to all servers by default. As a result, DHCP servers need
to process a large number of messages, leading to heavy loads of servers. To solve
this problem, configure the ip relay address cycle command. After this command
is configured, the DHCP relay agent forwards a received DHCP Discover message
to one DHCP server at a time, and forwards the DHCP Discover message to a
different DHCP server each time it receives the message. Multiple DHCP servers
then can allocate the same number of IP addresses, implementing load balancing
among DHCP servers.
Prerequisites
DHCP has been enabled globally using the dhcp enable command.
Example
# Enable DHCP server polling on the wireless access point in the system view.
<HUAWEI> system-view
[HUAWEI] dhcp enable
[HUAWEI] ip relay address cycle
Format
ip address bootp-alloc [ unicast ]
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
DHCP is developed based on the BOOTP protocol. The device supports both DHCP
and BOOTP and allows hosts to obtain IP addresses by BOOTP.
To enable an interface to obtain IP addresses using BOOTP, you can enable the
BOOTP client function on the interface. A BOOTP client requests for an IP address
from the server using BOOTP. The BOOTP client has two functions:
● Sends BOOTP Request messages to the server.
● Processes BOOTP Reply messages from the server.
To obtain an IP address, the BOOTP client sends a BOOTP Request message to the
server. When the server receives the BOOTP Request message, it sends a BOOTP
response message to the BOOTP client. The BOOTP client obtains the assigned IP
address from the response message.
Example
# Enable the BOOTP client function on VLANIF100 to obtain an IP address.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address bootp-alloc
Format
ip address dhcp-alloc [ unicast ]
undo ip address dhcp-alloc
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To enable an interface of the AP to obtain IP addresses using DHCP, enable the
DHCP client function on the interface. A BOOTP client applies for an IP address
from the server using DHCP. The DHCP client has two functions:
● Sends DHCP Request messages to the server.
● Processes DHCP Reply messages from the server.
To obtain an IP address, the DHCP client sends a DHCP Request message to the
server. After the server receives the DHCP Request message, it sends a DHCP
response message to the DHCP client. The DHCP client obtains the assigned IP
address from the response message.
Example
# Enable the DHCP client function on VLANIF100 to obtain an IP address.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip address dhcp-alloc
7.7.84 lease
Function
The lease command sets the lease for IP addresses in a global IP address pool.
The undo lease command restores the default lease of IP addresses in a global IP
address pool.
Format
lease { day day [ hour hour [ minute minute ] ] | unlimited }
undo lease
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Different hosts require different IP address leases. For example, if some hosts such
as a DNS server need to use certain IP addresses for a long time, run the lease
command to set the IP address lease of the current global address pool to
unlimited. If some hosts such as a portable computer just need to use temporary
IP addresses, run the lease command to set the IP address lease of the current
global address pool to the required time so that the expired IP addresses can be
released and assigned to other clients.
When a DHCP client starts and 50% or 87.5% of its IP address lease has passed,
the DHCP client sends a DHCP Request message to the DHCP server to renew the
lease.
● If the IP address can be assigned to the client, the DHCP server informs the
client that the IP address lease can be renewed.
● If the IP address can no longer be assigned to the client, the DHCP server
informs the client that the IP address lease cannot be renewed. The client
needs to request for another IP address.
You can run the display ip pool command to view information about the IP
address lease. The values of the lease and left fields in the command output
indicate the configured lease time and remaining lease time, respectively.
Prerequisites
A global IP address pool has been created using the ip pool command.
Precautions
Different IP address leases can be specified for different global address pools on a
DHCP server. In a global address pool, all addresses have the same lease.
To specify the IP address lease for an interface address pool, run the dhcp server
lease command.
If the IP address lease of an address pool is changed using this command, newly
assigned IP addresses use the new IP address lease. IP addresses assigned before
the change still use the original IP address lease before the lease is updated, and
use the new lease after the lease is updated.
Example
# Set the lease of a global address pool global1 to 2 days 2 hours and 30
minutes.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] lease day 2 hour 2 minute 30
Format
lock
undo lock
Parameters
None
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
After the lock command is run, the specified IP address pool is locked and IP
addresses in this address pool cannot be assigned to clients. When a DHCP server
needs to be redeployed, you need to migrate address pools on the DHCP server to
another DHCP server on the live network. To retain the addresses that have been
assigned to clients from a global address pool, run the lock command to lock the
global address pool. When new users get online after the address pool migration,
they apply for IP addresses from a new address pool.
Example
# Lock the IP address pool global1.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] lock
By default, the logging function during IP address allocation of the DHCP server is
disabled.
Format
logging [ allocation-fail | allocation-success | release | renew-fail | renew-
success | detect-conflict | recycle-conflict ] *
undo logging [ allocation-fail | allocation-success | release | renew-fail |
renew-success | detect-conflict | recycle-conflict ] *
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command is used on a DHCP server. When the DHCP server allocates IP
addresses to clients, it records address allocation information to facilitate routine
maintenance and fault location. After the logging function during IP address
allocation of the DHCP server is configured using the logging command, the
DHCP server records logs about address allocation, conflict, lease renewal, and
release.
Run the display ip pool name ip-pool-name command to check the status of the
logging function during IP address allocation of the DHCP server.
Prerequisites
The global address pool has been created using the ip pool (system view)
command.
Precautions
● With this logging function enabled, if a large number of DHCP clients request
IP addresses from the DHCP server, the server frequently records logs. The
server performance may therefore be affected.
● IP address allocation logs are recorded in the AM module. To view log
information, the information center must be enabled. In addition, default
settings for log output vary depending on various factors including the log
level and output direction.
For example, the level of logs indicating that an IP address is successfully
allocated, an IP address is successfully renewed, and an IP address is
successfully released is informational, and these logs are not recorded in the
log buffer by default. You can run the info-center source AM channel 4 log
level informational command to change the level of the logs to be recorded
in the log buffer. You can then run the display logbuffer command to check
the preceding logs.
Example
# Enable the logging function during IP address allocation of the DHCP server in
the IP address pool pool1.
<HUAWEI> system-view
[HUAWEI] ip pool pool1
[HUAWEI-ip-pool-pool1] logging
7.7.87 nbns-list
Function
The nbns-list command configures the NetBIOS server address for the DHCP
client.
The undo nbns-list command deletes a configured NetBIOS server address.
By default, no NetBIOS server address is configured.
Format
nbns-list ip-address &<1-8>
undo nbns-list { ip-address | all }
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. Before hosts communicate with each
other, a NetBIOS server needs to resolve the accessedNetBIOS hostname to an IP
address. To enable hosts to communicate with each other, run the nbns-list
command to configure NetBIOS server addresses. When assigning IP addresses to
clients, a DHCP server also assigns the configured NetBIOS server addresses to
clients. To configure NetBIOS server addresses for an interface address pool, run
the dhcp server nbns-list command.
Precautions
In the IP address pool view and DHCP Option template view, a device can be
configured with a maximum of eight NetBIOS server addresses respectively. The
first assigned address functions as the primary address, and the other seven
addresses function as secondary addresses.
Example
# In the IP address pool view, set the IP address of the NetBIOS server to
192.168.1.1.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] nbns-list 192.168.1.1
# In the DHCP Option template view, set the IP address of the NetBIOS server to
10.1.1.1.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] nbns-list 10.1.1.1
7.7.88 netbios-type
Function
The netbios-type command configures the NetBIOS node type for the DHCP
client.
Format
netbios-type { b-node | h-node | m-node | p-node }
undo netbios-type
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. When a DHCP client uses NetBIOS for
communication, its host name needs to be mapped to an IP address, and the
NetBIOS node type needs to be specified for it using the netbios-type command.
When a DHCP server assigns an IP address to clients, it also sends the specified
NetBIOS node type to clients.
Prerequisites
To specify the NetBIOS node type for a client in the interface address pool, run the
dhcp server netbios-type command.
Example
# In the IP address pool view, set the NetBIOS node type for the DHCP client to b-
node.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] netbios-type b-node
# In the DHCP Option template view, set the NetBIOS node type for the DHCP
client to b-node.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] netbios-type b-node
Function
The network command sets a network segment address for a global address pool.
The undo network command restores the default network segment address.
Format
network ip-address [ mask { mask | mask-length } ]
undo network
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. Before a DHCP server assigns IP addresses
to clients from a global address pool, run the network command to set a network
segment address for the global address pool so that the DHCP server can select
and assign IP addresses on this network segment to clients. When a DHCP server
assigns an IP address to the client from the interface address pool, the network
segment of the interface IP address is that of the interface address pool.
Precautions
● Each IP address pool can be configured with only one network segment. If the
system needs multiple address segments, multiple IP address pools are
required.
● The size of an address pool can be controlled by setting the mask length. The
mask length is in reverse proportion to the address pool size.
● When configuring an address pool, ensure that IP addresses on the network
address segment must be class A, B, or C IP addresses, and the mask cannot
be set to 0, 1, 31, or 32.
● If you need to assign IP addresses with a 16-bit mask in the network segment
10.1.1.0 to clients, the number of IP addresses in an IP address pool is 64K
after the network 10.1.1.0 mask 16 command is executed in the view of the
IP address pool. If the number of IP addresses in the IP address pool is less
than 64K, the network 10.1.1.0 mask 16 command cannot be executed in
the view of the IP address pool. In this case, perform the following operations:
Example
# Set the network segment address of the IP address pool global1 to 192.168.1.0
and mask length to 24.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] network 192.168.1.0 mask 24
7.7.90 next-server
Function
The next-server command configures the IP address of a server for the DHCP
client after the client automatically obtains the IP address.
The undo next-server command deletes a configured IP address of a server for
the DHCP client after the client automatically obtains the IP address.
By default, no IP address of a server is configured for the DHCP client after the
client automatically obtains the IP address.
Format
next-server ip-address
undo next-server
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The next-server command is used on DHCP servers. When assigning a client an IP
address, a DHCP server can also assign the client an IP address of the server that
provides network services for the client. For example, after obtaining IP addresses,
clients such as IP phones need parameters such as the startup configuration file to
work normally. You can run the next-server command to specify the server
address used after a client obtains an IP address. The client then requests the
configuration parameters from the specified server after obtaining an IP address.
If users use addresses in the interface address pool, run the dhcp server next-
server command to specify the DHCP server IP address. If users use addresses in
the global address pool, run the next-server command to specify the DHCP server
IP address.
Precautions
● Only one IP address of a server that provides network services can be
configured in each IP address pool view or DHCP Option template view. If the
system needs multiple IP addresses of servers that provide network services,
configure multiple IP address pools or DHCP Option templates.
● If you run the next-server command multiple times, only the latest
configuration takes effect.
Example
# In the IP address pool view, set the IP address of a server for the DHCP client
after the client automatically obtains the IP address to 10.1.2.2.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] next-server 10.1.2.2
# In the DHCP Option template view, set the IP address of a server for the DHCP
client after the client automatically obtains the IP address to 10.1.2.2.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] next-server 10.1.2.2
7.7.91 option
Function
The option command configures the user-defined option that a DHCP server
assigns to a DHCP client.
The undo option command deletes the user-defined option that a DHCP server
assigns to a DHCP client.
By default, no user-defined option that a DHCP server assigns to a DHCP client is
configured.
Format
option code [ sub-option sub-code ] { ascii ascii-string | hex hex-string | cipher
cipher-string | ip-address ip-address &<1-8> }
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to DHCP servers. The option field in a DHCP packet carries
control information and parameters. If a DHCP server is configured with options,
when a DHCP client applies for an IP address, the client can obtain the
configurations in the option field of the DHCP response packet from the DHCP
server. To configure user-defined options for an interface address pool, run the
dhcp server option command.
Precautions
● To ensure configuration accuracy, read the Request For Comments (RFC)
before configuring options.
● When an option contains a password, the option code in ascii or hex type is
insecure. You are advised to set the option code type to cipher. For security
purposes, a password must contain at least two types of the following:
Example
# In the global address pool global1, configure Option64 to 0x11 (a hexadecimal
number).
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] option 64 hex 11
7.7.92 option121
Function
The option121 command configures the classless static route for the DHCP client.
Format
option121 ip-address { ip-address mask-length gateway-address } &<1-8>
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The option121 command applies to only the DHCP server. The option121
command configures Option 121 that defines a classless static route allocated to a
client.
Precautions
● The undo option121 command will delete all classless static routes. To delete
one classless static route, run the undo option121 ip-address ip-address
mask-length gateway-address command.
Example
# In the IP address pool view, configure classless static routes delivered by the
DHCP server.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] option121 ip-address 10.10.10.10 24 10.11.11.11
# In the DHCP Option template view, configure classless static routes delivered by
the DHCP server.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] option121 ip-address 10.10.10.10 24 10.11.11.11
7.7.93 option184
Function
The option184 command configures the Option 184 field for the DHCP client.
The undo option184 command deletes a configuration in the Option 184 field.
By default, no content in the Option 184 field is configured.
Format
option184 { as-ip ip-address | fail-over ip-address dialer-string | ncp-ip ip-address
| voice-vlan vlan-id }
undo option184 [ as-ip | fail-over | ncp-ip | voice-vlan ]
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
The option184 command applies to only the DHCP server and configures Option
184 allocated by a DHCP server to a client in a global address pool.
Example
# In the IP address pool view, configure the Option 184 field.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] option184 as-ip 192.168.1.10
# In the DHCP Option template view, configure the Option 184 field.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] option184 as-ip 10.10.10.10
Format
reset dhcp client statistics [ interface interface-type interface-number ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The reset dhcp client statistics command is applicable to DHCP client. During
DHCP troubleshooting, statistics about the packets sent and received within a
specified period need to be checked. Therefore, before collecting packet statistics,
run the reset dhcp client statistics command to clear the existing packet
statistics. Then you can run the display dhcp client statistics command to check
packet statistics about the DHCP client.
Precautions
The reset dhcp client statistics command can be run multiple times at any
interval.
Example
# Clear packet statistics about the DHCP client.
<HUAWEI> reset dhcp client statistics
Format
reset dhcp relay statistics [ server-group group-name ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command applies to DHCP relay agents. Collecting statistics on the DHCP
messages sent and received within a specified period helps you locate DHCP
faults. Run the reset dhcp relay statistics [ server-group group-name ]
command to clear original statistics on DHCP messages, and run the display dhcp
relay statistics [ server-group group-name ] command to view packet statistics
about the DHCP relay agent.
● Run the reset dhcp relay statistics server-group group-name command to
clear message statistics on DHCP relay agents connected to DHCP servers in a
specified DHCP server group. The DHCP server group name needs to be
specified.
● Run the reset dhcp relay statistics command to clear message statistics on
all DHCP relay agents besides DHCP relay agents connected to DHCP servers
in the DHCP server group.
Precautions
The reset dhcp relay statistics command can be run multiple times at any
interval.
Example
# Clear message statistics on the DHCP relay agent.
<HUAWEI> reset dhcp relay statistics
Function
The reset dhcp server statistics command clears statistics on the DHCP server.
Format
reset dhcp server statistics
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Example
# Clear message statistics on the DHCP server.
<HUAWEI> reset dhcp server statistics
Format
dhcp relay detect enable
undo dhcp relay detect enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
This command applies to the device that functions as a DHCP relay agent. After
receiving Ack messages from a DHCP server, the DHCP relay agent sends all Ack
messages in which the giaddr field value is the same as DHCP clients' network
segment to DHCP clients. After DHCP clients successfully obtain IP addresses
through the DHCP relay agent, the DHCP relay agent adds corresponding user
entries. In some cases, for example, multiple DHCP servers exist on the network or
the address pool on the DHCP server is reset, DHCP clients may obtain the same
IP address, resulting in an address conflict.
To address this issue, you can enable user entry detection on the DHCP relay
agent. If the DHCP relay agent receives an Ack message from a DHCP server after
this function is enabled, the DHCP relay agent detects the IP address to be
allocated to a DHCP client in the message and the client's MAC address, and
checks whether the addresses are consistent with the corresponding user entry.
● If the addresses are consistent with the user entry, the DHCP relay agent
forwards the Ack message to the DHCP client, and the DHCP client
successfully obtains the IP address.
● If the addresses are inconsistent with the user entry, the DHCP relay agent
sends a Decline message indicating that the IP address has been used by
another client to the DHCP server, and sends a Nak message to the DHCP
client to instruct the DHCP client to request an IP address again.
If the DHCP relay agent receives a Release or Decline message from a DHCP
client, the DHCP relay agent deletes the corresponding user entry.
NOTE
When the number of user entries reaches the maximum value, the device does not record user
entries for new online users, and does not perform address conflict detection for these users.
Therefore, it is recommended that you reduce the lease time appropriately based on the actual
usage scenario after configuring user entry detection on the DHCP relay agent. This
configuration ensures that user entries of offline users can be cleared promptly and the device
can perform address conflict detection for online users.
If the device is configured as a DHCP relay agent in proxy mode, new users cannot obtain IP
addresses when the number of user entries reaches the maximum value. It is recommended that
you reduce the lease time appropriately based on the actual usage scenario so that user entries
of offline users can be cleared promptly and new users can go online properly.
Example
# Enable user entry detection on the device that functions as a DHCP relay agent.
<HUAWEI> system-view
[HUAWEI] dhcp relay detect enable
Format
reset dhcp statistics
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
During DHCP troubleshooting, statistics about the packets sent and received
within a specified period need to be checked. Therefore, before collecting packet
statistics, run the reset dhcp statistics command to clear the existing packet
statistics. Then you can run the display dhcp statistics command to view DHCP
message statistics.
Example
# Clear packet statistics about the DHCP.
<HUAWEI> reset dhcp statistics
Format
reset ip pool { interface interface-name | name ip-pool-name } { start-ip-address
[ end-ip-address ] | all | conflict | expired | used }
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The reset ip pool command resets the IP addresses that cannot be released in an
IP address pool. If an IP address conflict occurs because two clients use the same
IP address, run the reset ip pool command to reset the specified IP address pool.
Precautions
If a user's IP address is within the IP address range specified when this command
is run, the user cannot continue to use the IP address after this command is run,
and needs to send an IP address application request again.
The address pool status cannot be restored after this command is run. Therefore,
exercise caution when deciding to run this command.
Follow-up Procedure
After the address pool is set to idle, the client can obtain an IP address from the
global address pool.
Example
# Reset the conflicting IP addresses in the IP address pool mypool.
<HUAWEI> reset ip pool name mypool conflict
Function
The section command configures the IP address segment in an IP address pool.
Format
section section-id start-address [ end-address ]
Parameters
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
An IP address pool consists of one or more IP address segments. The IP addresses
on each address segment cannot overlap.
Example
# Configure an IP address segment 10.1.1.10-10.1.1.15 with the ID 0 for the IP
address pool abc.
<HUAWEI> system-view
[HUAWEI] ip pool abc
[HUAWEI-ip-pool-abc] section 0 10.1.1.10 10.1.1.15
Function
The sip-server command configures the SIP server IP address assigned to a DHCP
client in a global address pool.
The undo sip-server command deletes the configured SIP server IP address
assigned to a DHCP client in a global address pool.
By default, the SIP server IP address assigned to a DHCP client in a global address
pool is not configured.
Format
sip-server { ip-address ip-address &<1-2> | list domain-name &<1-2> }
undo sip-server
Parameters
Parameter Description Value
ip-address ip- Specifies an IP address for The value is in dotted
address the SIP server. decimal notation.
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command applies to the DHCP server. To enable DHCP clients to normally
access the Internet, the DHCP server needs to specify the SIP server IP address in
the address pool when assigning IP addresses to the clients.
Precautions
Example
# Specify 192.168.1.1 as the IP address of the SIP server when addresses in the
global address pool global1 are assigned to clients.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] sip-server ip-address 192.168.1.1
7.7.102 sname
Function
The sname command configures the name of the server from which the DHCP
client obtains the startup configuration file.
The undo sname command deletes the configured name of the server from which
the DHCP client obtains the startup configuration file.
By default, no name is configured for the server from which the DHCP client
obtains the startup configuration file.
Format
sname sname
undo sname
Parameters
Parameter Description Value
Views
IP address pool view, DHCP Option template view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Besides assigning IP addresses, a DHCP server can also provide the required
network configuration parameters, such as the startup configuration file name for
the DHCP client. After the name of the server from which the DHCP client obtains
the startup configuration file is configured using the sname command, the DHCP
client obtains the startup configuration file from this server.
Precautions
Ensure that the route between the DHCP client and the file server from which the
DHCP client obtains the startup configuration file is reachable.
Example
# In the IP address pool view, configure the name of the server from which the
DHCP client obtains the startup configuration file as example.
<HUAWEI> system-view
[HUAWEI] ip pool p1
[HUAWEI-ip-pool-p1] sname example
# In the DHCP Option template view, configure the name of the server from
which the DHCP client obtains the startup configuration file as example.
<HUAWEI> system-view
[HUAWEI] dhcp option template template1
[HUAWEI-dhcp-option-template-template1] sname example
Format
snmp-agent trap enable feature-name dhcp [ trap-name
{ hwdhcppktratealarm | hwdhcpsnpchaddralarm | hwdhcpv6pktprefixalarm |
hwndsnpusernumberalarmglobal | hwndsnpusernumberalarmglobalresume |
hwndsnpusernumberalarmif | hwndsnpusernumberalarmifresume |
hwnomatchsnpbindtbldhcppktalarm | hwsnpusernumberalarmglobal |
hwsnpusernumberalarmglobalresume | hwsnpusernumberalarmif |
hwsnpusernumberalarmifresume | hwsnpusernumberalarmvlan |
hwsnpusernumberalarmvlanresume | hwuntrustedreplypktalarm |
hwnomatchsnpbindtbldhcpv6pktalarm | hwnomatchsnpbindtblndpktalarm } ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the trap function is enabled, the device generates traps during operation and
sends the traps to the NMS through the SNMP module. If the trap function is
disabled, the device does not generate traps and the SNMP module does not send
traps to the NMS.
You can specify snmp-agent to enable the trap function for one or more events.
NOTE
For traps that are enabled by default, the device has the trap suppression function configured
and does not report traps within 10 minutes.
Example
# Enable the hwdhcppktratealarm trap function for the DHCP module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name dhcp trap-name hwdhcppktratealarm
7.7.104 static-bind
Function
The static-bind command binds an IP address in a global address pool to a MAC
address of a client.
The undo static-bind command unbinds the IP address in a global address pool
from a MAC address.
By default, the IP address in a global address pool is not bound to any MAC
address.
Format
static-bind ip-address ip-address mac-address mac-address [ option-template
template-name | description description ]
Parameters
Parameter Description Value
Views
IP address pool view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the static-bind command to bind an IP address in a global address
pool to a MAC address.
You can run the dhcp server static-bind command to bind an IP address in an
interface address pool to a MAC address.
Prerequisites
Network segment addresses that can be assigned from the global address pool
have been configured using the network (IP address pool view) command.
Precautions
● Ensure that the bound IP address is not configured as the IP address that
cannot be allocated using the excluded-ip-address command.
● IP addresses that are used can also be statically bound to MAC addresses or
unbound from MAC addresses. When an IP address is statically bound to a
MAC address, ensure that the MAC address to be bound is the same as the
MAC address of the user who actually uses the IP address.
● The DHCP server preferentially allocates the IP address that has been
statically bound to the client's MAC address.
● After an IP address is bound to a MAC address, the IP address does not expire.
After an automatically allocated IP address is statically bound to a MAC
address, the lease time of the IP address becomes unlimited. After the static
binding between the IP address and the MAC address is deleted, the lease
time of the IP address becomes the same as that configured in the address
pool.
● A maximum of 256 IP addresses and MAC addresses can be bound.
Example
# Configure a DHCP server to assign a fixed IP address 192.168.1.10 in the global
address pool global1 to a host with the MAC address 00e0-fc96-e4c0.
<HUAWEI> system-view
[HUAWEI] ip pool global1
[HUAWEI-ip-pool-global1] network 192.168.1.10 mask 24
[HUAWEI-ip-pool-global1] static-bind ip-address 192.168.1.10 mac-address 00e0-fc96-e4c0
Function
The display dns configuration command displays the global DNS configurations.
Format
display dns configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display the global DNS configurations.
<HUAWEI> display dns configuration
-------------------------------------------------------------------------------
Dns resolve : Disabled
DNS-server-select-algorithm : Auto
Dns server source ip address : -
Dns proxy : Disabled
Dns forward retry-number : 2
Dns forward retry-timeout : 3
-------------------------------------------------------------------------------
Item Description
Item Description
Dns server source ip Source IP address of the local device for communication.
address To set the source IP address of the local device, run the
dns server source-ip command.
Dns proxy Whether DNS proxy is enabled. The value can be:
● Enabled: DNS proxy is enabled.
● Disabled: DNS proxy is disabled.
To enable DNS proxy, run the dns proxy enable
command.
Dns forward retry- Retransmission timeout period that the device sends
timeout query messages to the destination DNS server.
To set the retransmission timeout period that the device
sends query messages to the destination DNS server, run
the dns forward retry-timeout command.
Format
display dns domain [ verbose ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display dns domain command to view the configuration and
sequence of domain name suffixes.
Example
# Display the list of domain name suffixes.
<HUAWEI> display dns domain
Type:
D:Dynamic S:Static
Item Description
NO. Domain name suffix numbers, that is, the configuration sequence
of domain name suffixes.
Type Domain name suffixes type, including dynamic and static domain
name suffix.
Format
display dns dynamic-host [ ip | naptr | srv ] [ domain-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display dns dynamic-host command to view dynamic DNS
entries saved in the domain name cache and check whether domain names match
the mapping entries.
Example
# Display the dynamic DNS entries saved in the domain name cache.
<HUAWEI> display dns dynamic-host
Host TTL Type Address
sipx.autosrv.com 114 IP 192.168.1.1
sip.autosrv.com 237 IP 192.168.1.2
sip.autonaptr.com 117 IP 192.168.1.3
Total : 5
Item Description
Format
display dns forward table [ source-ip ip-address ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After DNS proxy or DNS relay is enabled, you can run the display dns forward
table command to view the DNS table of IP addresses.
NOTE
When the device receives DNS request packets form the client but does not receive DNS reply
packets from the server, you need to run the display dns forward table command to view the
DNS forwarding table.
Example
# Display the DNS table on the DNS proxy or DNS relay.
<HUAWEI> display dns forward table
Domain name : www.domain.com
Source IP : 10.136.128.53
Source port : 2055
Source packet id : 3562
Forward packet id : 60669
Query type :1
Table 7-62 Description of the display dns forward table command output
Item Description
Function
The display dns server command displays the configuration and sequence of the
current DNS server.
Format
display dns server [ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring DNS, run the display dns server command to view the
configuration and sequence of current DNS servers.
Example
# Display configurations of a DNS server.
<HUAWEI> display dns server
Type:
D:Dynamic S:Static
Item Description
Item Description
Format
display dns statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use this command to check statistics on DNS packets.
Example
# Display statistics on DNS packets.
<HUAWEI> display dns statistics
SumFromDNSv4Client :0
SumToDNSv4Client :0
SumFromDNSv4Server :0
SumToDNSv4Server :0
RetryFromClient :0
NotQueryFromClient :0
ParseFailFromClient :0
TooLongFromClient :0
LocalQueryFromClient :0
NotStandardQueryFromClient : 0
NotRespFromServer :0
NoAnswerFromServer :0
ParseFailFromServer :0
TooLongFromServer :0
ErrorRespFromServer :0
NotStandardQueryFromServer : 0
Item Description
Format
display dns zone zone-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display information about the DNS zone named com.
<HUAWEI> display dns zone com
Dns zone : com
TTL : 1200
Resource records as follows:
Hostname : example
Class : IN
Type :A
Address : 10.1.1.1
Hostname : example123
Class : IN
Type : AAAA
Address : FC00::1
Item Description
Function
The display ip host command displays mappings between hosts and IP addresses.
Format
display ip host
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring static DNS entries, you can run the display ip host command to
view the mapping between hosts and IP addresses.
Example
# Display mappings between hosts and IP addresses.
<HUAWEI> display ip host
Host Age Flags Address
example 0 static 10.2.2.2
Item Description
Format
dns domain domain-name
undo dns domain [ domain-name ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Application Scenario
Generally, the domain name suffixes of some servers or hosts that a DNS client
accesses are the same, for example, com.cn. In this case, you can set the domain
name suffixes. When a DNS client accesses a host:
● If the entered domain name does not carry dots (.), for example, "huawei",
the system first adds the suffix com.cn to the domain name and sends a
domain name request of "huawei.com.cn" to the DNS server to find the IP
address corresponding to the domain name. If the DNS client does not receive
any response from the server, it sends a domain name request of "huawei" to
the DNS server to find the IP address corresponding to the domain name.
● If the entered domain name carries dots (.), for example, "ilite.huawei", the
system first sends a domain name request of "ilite.huawei" to the DNS server
to find the IP address corresponding to the domain name. If the DNS client
does not receive any response from the server, it adds the suffix com.cn to the
domain name and sends a domain name request of "ilite.huawei.com.cn" to
the DNS server to find the IP address corresponding to the domain name.
Precautions
A DNS client supports a maximum of 10 domain name suffixes. To configure
multiple domain name suffixes, you can run the dns domain command
repeatedly.
If the name of the suffix to be deleted is specified, the specified suffix is deleted.
Otherwise, all the suffixes are deleted.
When a DNS client attempts to query a domain name suffix, it queries the suffix
only in local dynamic DNS entries. If the suffix is not found, the DNS client sends a
domain name request to the DNS server.
Example
# Configure a domain name suffix as com.cn.
<HUAWEI> system-view
[HUAWEI] dns domain com.cn
Format
dns forward retry-number number
undo dns forward retry-number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The mode for a device to select the destination DNS server can be auto and fixed.
For how a device sends DNS request packets to the destination DNS server in each
mode and the corresponding precautions, see dns-server-select-algorithm.
If the number of times for the device to retransmit DNS request packets to each
destination DNS server is relatively large and the packet retransmission timeout
period is relatively long, the time for the DNS client to wait for the response from
the DNS server is too long. However, the request timeout period of the DNS client
is shorter, so that the DNS client fails to properly receive response packets from
the server. To enable the DNS server to rapidly respond DNS request packets, you
can run the dns forward retry-number and dns forward retry-timeout
commands to adjust the number of times for the device to retransmit DNS request
packets to each DNS server and the packet retransmission timeout period for
ensuring that the DNS client can properly receive response packets from the
server.
You need to consider the number of times for the device to retransmit DNS query
requests to the destination DNS server, retransmission timeout period, and mode
for the device to select the DNS server into consideration before configuring the
query timeout period on a device.
● When the mode for a device to select the destination DNS server is auto, the
query timeout period of a DNS device is calculated as follows: (Number of
retransmission times + 1) x Retransmission timeout period
● When the mode for a device to select the destination DNS server is fixed, the
query timeout period of a DNS device is calculated as follows: (Number of
retransmission times + 1) x Retransmission timeout period x Number of DNS
servers
Example
# Set the retransmission count that the device sends query packets to the
destination DNS server to 1.
<HUAWEI> system-view
[HUAWEI] dns forward retry-number 1
Format
dns forward retry-timeout time
undo dns forward retry-timeout
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The mode for a device to select the destination DNS server can be auto and fixed.
For how a device sends DNS request packets to the destination DNS server in each
mode and the corresponding precautions, see dns-server-select-algorithm.
If the number of times for the device to retransmit DNS request packets to each
destination DNS server is relatively large and the packet retransmission timeout
period is relatively long, the time for the DNS client to wait for the response from
the DNS server is too long. However, the request timeout period of the DNS client
is shorter, so that the DNS client fails to properly receive response packets from
the server. To enable the DNS server to rapidly respond DNS request packets, you
can run the dns forward retry-number and dns forward retry-timeout
commands to adjust the number of times for the device to retransmit DNS request
packets to each DNS server and the packet retransmission timeout period for
ensuring that the DNS client can properly receive response packets from the
server.
You need to consider the number of times for the device to retransmit DNS query
requests to the destination DNS server, retransmission timeout period, and mode
for the device to select the DNS server into consideration before configuring the
query timeout period on a device.
● When the mode for a device to select the destination DNS server is auto, the
query timeout period of a DNS device is calculated as follows: (Number of
retransmission times + 1) x Retransmission timeout period
● When the mode for a device to select the destination DNS server is fixed, the
query timeout period of a DNS device is calculated as follows: (Number of
retransmission times + 1) x Retransmission timeout period x Number of DNS
servers
Example
# Set the retransmission timeout period that the device sends Query packets to
the destination DNS server to 2 seconds.
<HUAWEI> system-view
[HUAWEI] dns forward retry-timeout 2
Function
The dns proxy enable command enables DNS proxy.
By default, DNS proxy is disabled. The DNS proxy function is enabled in the
delivery configuration file of common FAT APs and Cloud APs..
Format
dns proxy enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
DNS proxy is used to forward DNS requests and reply packets between the DNS
client and DNS server. The DNS client sends a DNS request packet to the device on
which DNS proxy is enabled. The device sends the request packet to the DNS
server and sends the reply packet to the DNS client. The device functions as the
DNS proxy to provide services of the DNS server. Users do not need to interact
with the DNS server directly. This function simplifies route deployment and
improves performance and security of the DNS server.
Example
# Enable DNS proxy.
<HUAWEI> system-view
[HUAWEI] dns proxy enable
Function
The dns resolve command enables dynamic DNS resolution.
Format
dns resolve
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
To obtain IP addresses mapping domain names using the DNS server, run the dns
resolve command to enable dynamic DNS resolution on the device.
Example
# Enable dynamic DNS resolution.
<HUAWEI> system-view
[HUAWEI] dns resolve
Function
The dns server command configures an IP address for a DNS server.
The undo dns server command deletes the DNS server IP address.
Format
dns server ip-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
A maximum of six DNS servers can be specified on AP. During dynamic DNS
resolution, query messages are sent to DNS servers based on the configuration
sequence of DNS servers.
The system sends a query to the DNS server first configured. If no response is
received in the specified period of time (which can be configured by running the
dns forward retry-timeout) command, it resends the query twice. If receiving no
response for the specified times (which can be configured by running the dns
forward retry-number command), the system sends the query to the next DNS
server and so on.
NOTE
For cloud APs, run the dns-server (WAN view) command to configure the DNS server. This
is because DNS server information configured using the dns server command cannot be
saved on cloud APs and will be lost after the APs restart.
Example
# Assign the IP address 10.2.0.70 to the DNS server.
<HUAWEI> system-view
[HUAWEI] dns server 10.2.0.70
Function
The dns server source-ip command configures the source IP address for the
device to send and receive DNS packets.
The undo dns server source-ip command deletes the source IP address for the
device to send and receive DNS packets.
Format
dns server source-ip ip-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the device sends and receives DNS packets, the administrator can specify a
source IP address for the device to ensure the communication security. The route
from the DNS server to the specified source IP address must be reachable. The
DNS server uses the specified source IP address as the destination address and
sends a DNS response packet to the local device.
When the device functions as a DNS proxy or relay, run the dns server source-ip
ip-address command to configure the source IP address for communicating with
the DNS server.
Precautions
To make the command take effect, pay attention to the following points:
● Ensure that the source IP address is the IP address of an interface or logical
interface on the device, and there are reachable routes between the interface
and the DNS server.
● Ensure that the source IP address and the IP address of the DNS server are on
the same VPN or public network.
Example
# Specify source IP address 172.16.1.1 for the local device.
<HUAWEI> system-view
[HUAWEI] dns server source-ip 172.16.1.1
7.8.16 dns-server-select-algorithm
Function
The dns-server-select-algorithm command configures the mode in which the
device selects a DNS server.
Format
dns-server-select-algorithm { fixed | auto }
undo dns-server-select-algorithm
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The device can select a DNS server in either of the following modes:
● auto: The device uses the internal algorithm to calculate the priorities of all
configured DNS servers (IP addresses of DNS servers can be configured by
running the dns server command), and then sends a DNS query request to
the DNS server with the highest priority. If no response is received within a
specified period of time, the device retransmits the DNS query request. If the
device still does not receive a response from the DNS server after sending
query requests multiple times, the device sends the DNS query request to the
next server in sequence until it receives a response or has sent to all of the
configured DNS servers.
● fixed: The device sends a DNS query request to the first DNS server. If no
response is received within a specified period of time, the device retransmits
the DNS query request. If the device still does not receive a response from the
DNS server after sending query requests multiple times, the device sends the
DNS query request to the next server in sequence until it receives a response
or has sent to all of the configured DNS servers.
NOTE
This function is supported when the device functions as a DNS client or DNS proxy/relay.
When the device functions as a DNS client:
● This function is supported only for DNS query requests sent by IPSec, voice, PKI, and DDNS
services.
● This function is not supported for DNS query requests sent by other services. The device
sends the requests according to the order in which DNS servers are configured. If no
response is received, the device retransmits the requests according to the order in which
DNS servers are configured.
Example
# Configure the device to select a DNS server in fixed mode.
<HUAWEI> system-view
[HUAWEI] dns-server-select-algorithm fixed
Function
The dns zone command creates a DNS zone and displays the DNS zone view.
Format
dns zone zone-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Static domain name resolution is implemented using static resource records. Static
resource records of type A and type AAAA can be queried. The manually created
mappings between some common domain names and IP addresses are stored
locally as static resource records. When a client requests for the IP address
corresponding to a domain name, the device first queries the IP address
information locally, improving the efficiency of domain name resolution.
Static resource records can be configured using ip host host-name ip-address or
configured in the DNS zone. You can select the static resource record configuration
method based on the following rules: When the domain name length does not
exceed 24 characters, use ip host to configure static resource records; when the
domain name length exceeds 24 characters, configure static resource records in
the DNS zone. When you configure static resource records in the DNS zone, use
the domain name consisting of the host name (in the static resource records of
type A or type AAAA) and DNS zone name.
If the static resource records configured using the preceding two methods both
exist on the device, when the device performs DNS query, the static resource
records configured using ip host host-name ip-address take precedence over those
configured in the DNS zone. For example, when receiving a DNS query request,
the device first queries the static resource records configured using ip host based
on the domain name. If no matching record can be found, the device queries the
static resource records configured in the DNS zone based on the domain name. If
the matching record can be found in the static resource records configured in the
DNS zone, the device sends a response; otherwise, the device forwards the DNS
query request to the remote DNS server.
Follow-up Procedure
In the DNS zone view, run the rr a hostname host-name ip-address ip-address or
rr aaaa hostname host-name ipv6-address ipv6-address command to configure
static resource records of type A or type AAAA.
Example
# Create the DNS zone com.
<HUAWEI> system-view
[HUAWEI] dns zone com
7.8.18 ip host
Function
The ip host command configures static DNS entries.
The undo ip host command deletes static DNS entries.
By default, no static DNS entries are configured.
Format
ip host host-name ip-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A static domain name resolution table is manually set up using the ip host
command, describing the mappings between host names and IP addresses. In
addition, some common host names are added to the table. Then, static host
name resolution can be performed according to the static domain name resolution
table. When requiring the IP address corresponding to a host name, the client first
searches the static host name resolution table for the specified host name and
obtains the corresponding IP address. In this manner, the efficiency of host name
resolution is improved.
Precautions
The ip host command configures a maximum of 50 static DNS entries. Each host
name can be mapped to only one IP address. When multiple IP addresses are
mapped to a host name, only the latest configuration takes effect.
Example
# Configure the IP address 10.110.0.1 for the host test.
<HUAWEI> system-view
[HUAWEI] ip host test 10.110.0.1
Function
The reset dns dynamic-host command deletes dynamic DNS entries saved in the
domain name cache.
Format
reset dns dynamic-host
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
NOTICE
Clear dynamic DNS entries with caution because they cannot be restored after
being cleared.
After confirming the action of clearing DNS entries, you can run the reset
command to clear them.
Example
# Clear dynamic DNS entries from the domain name cache.
<HUAWEI> reset dns dynamic-host
Format
reset dns forward table [ source-ip ip-address ]
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
When the AP as a DNS proxy or relay is attacked, the DNS table will be full. The
reset dns forward table command can delete all DNS entries.
Example
# Clear DNS entries in the DNS table on the DNS proxy or DNS relay.
<HUAWEI> reset dns forward table
Function
The reset dns statistics command clears statistics on DNS packets.
Format
reset dns statistics
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
The reset dns statistics command clears statistics on DNS packets. The cleared
statistics cannot be restored.
Example
# Clear statistics on DNS packets.
<HUAWEI> reset dns statistics
7.8.22 rr a
Function
The rr a command configures static resource records of type A.
The undo rr a command deletes static resource records of type A.
By default, no static resource record of type A is configured.
Format
rr a hostname host-name ip-address ip-address
undo rr a [ hostname host-name [ ip-address ip-address ] ]
Parameters
Parameter Description Value
Views
DNS zone view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In the DNS zone, you can configure resource records of type A and create
mappings between host names and IP addresses. When a client requests for the IP
address corresponding to a domain name, the device sends a response using the
locally configured resources of type A.
You can run the display dns zone zone-name command to check the currently
configured static resource records of type A.
Prerequisites
A DNS zone has been created using the dns zone zone-name command.
Precautions
Each host name can be mapped to only one IP address. When multiple IP
addresses are mapped to a host name, only the latest configuration takes effect.
Example
# In the DNS zone com, configure resource records of type A and create the
mapping between the host name example and IP address 10.1.1.1.
<HUAWEI> system-view
[HUAWEI] dns zone com
[HUAWEI-dns-zone-com] rr a hostname example ip-address 10.1.1.1
7.8.23 rr aaaa
Function
The rr aaaa command configures static resource records of type AAAA.
The undo rr aaaa command deletes static resource records of type AAAA.
Format
rr aaaa hostname host-name ipv6-address ipv6-address
Parameters
Parameter Description Value
Views
DNS zone view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In the DNS zone, you can configure resource records of type AAAA and create
mappings between host names and IPv6 addresses. When a client requests for the
IPv6 address corresponding to a domain name, the device sends a response using
the locally configured resources of type AAAA.
You can run the display dns zone zone-name command to check the currently
configured static resource records of type AAAA.
Prerequisites
A DNS zone has been created using the dns zone zone-name command.
Precautions
Each host name can be mapped to only one IPv6 address. When multiple IPv6
addresses are mapped to a host name, only the latest configuration takes effect.
Example
# In the DNS zone com, configure resource records of type AAAA and create the
mapping between the host name example and IPv6 address FC00::1.
<HUAWEI> system-view
[HUAWEI] dns zone com
[HUAWEI-dns-zone-com] rr aaaa hostname example ipv6-address fc00::1
7.8.24 ttl
Function
The ttl command configures the storage time of static resource records in the DNS
zone.
The undo ttl command restores the default storage time of static resource records
in the DNS zone.
By default, the storage time of static resource records in the DNS zone is 1200
seconds.
Format
ttl ttl-value
undo ttl
Parameters
Parameter Description Value
Views
DNS zone view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Static resource records in the DNS zone can be saved in the cache. For example,
after the storage time of static resource records in the DNS zone is configured on
the device functioning as the DNS proxy, a client sends a DNS protocol packet to
obtain the storage time. The client saves the parsed mapping between a domain
name and an IP address in the cache each time the client uses the static resource
records configured in the DNS zone. When the client queries records based on the
same domain name next time, it can directly read the records from the cache,
without repeatedly sending a request to the DNS proxy. The mappings saved in
the client's cache will be aged and deleted after the storage time expires, so that
the static resource records can be updated in real time.
You can run the display dns zone zone-name command to check the currently
configured storage time of static resource records in the DNS zone.
Prerequisites
A DNS zone has been created using the dns zone zone-name command.
Example
# In the DNS zone com, configure the storage time of static resource records to
1300 seconds.
<HUAWEI> system-view
[HUAWEI] dns zone com
[HUAWEI-dns-zone-com] ttl 1300
Format
display app-inspect { servermap | session } table statistics
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view statistics on Session entries and Servermap
entries at the application layer to facilitate NAT related fault diagnosis and
troubleshooting.
Example
# Display statistics on all session entries at the application layer.
<HUAWEI> display app-inspect session table statistics
App-inspect Session History Maximum Info:
Maximum Number : 124
Record Time : 2013-12-23 11:35:19
Table 7-67 Description of the display app-inspect session table statistics command
output
Item Description
Item Description
Format
display app-inspect session table [ application-protocol application-protocol-
name ] [ source-ip ip-address [ port-number ] ] [ destination-ip ip-address
[ port-number ] ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view information about a specified application-layer
session table or all application-layer session tables. The application-layer session
table information is displayed only when some traffic on the device is sent to the
application layer.
Example
# Display information about all application-layer session tables.
<HUAWEI> display app-inspect session table
The total number of session tables is 1.
NO.1.
APP-Protocol : RTSP
Initiator-VPN: ----
Responder-VPN: ----
Connection Info:
Initiator(IP:Port) Responder(IP:Port) Protocol
1.1.1.2 :33713 ---> 2.2.2.2 :554 TCP(6)
1.1.1.2 :33713 <--- 2.2.2.2 :554 TCP(6)
Table 7-69 Description of the display app-inspect session table command output
Item Description
Format
display nat address-group [ group-index ] [ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can check the configuration and application of the NAT address pool.
Example
# Display all the NAT address pools.
<HUAWEI> display nat address-group
NAT Address-Group Information:
--------------------------------------
Index Start-address End-address
--------------------------------------
1 10.1.1.1 10.1.1.10
2 10.10.10.10 10.10.10.15
--------------------------------------
Total : 2
# Display the NAT address pool according to the index of the NAT address pool.
<HUAWEI> display nat address-group 1
NAT Address-Group Information:
--------------------------------------
Index Start-address End-address
--------------------------------------
1 10.1.1.1 10.1.1.10
--------------------------------------
Total : 1
Item Description
Function
The display nat alg command displays whether NAT application level gateway
(ALG) is enabled for an application layer protocol.
Format
display nat alg
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display the status of NAT ALG.
<HUAWEI> display nat alg
NAT Application Level Gateway Information:
----------------------------------
Application Status
----------------------------------
dns Disabled
ftp Disabled
rtsp Enabled
pptp Disabled
----------------------------------
Item Description
Function
The display nat dns-map command displays the configuration of DNS mapping.
Format
display nat dns-map [ domain-name ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display the configuration of NAT DNS mapping.
<HUAWEI> display nat dns-map
NAT DNS mapping information:
Domain-name : www.example.com
Global IP : vlanif300 (Real IP : 1.1.1.1)
Global port : 2
Protocol : tcp
Total : 1
Item Description
Function
The display nat filter-mode command displays the current NAT filtering mode.
Format
display nat filter-mode
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the current NAT filtering mode. The modes
include:
● endpoint-independent: independent of the external address and port.
● endpoint-dependent: dependent on the external address and independent of
the port.
● endpoint-and-port-dependent: dependent on the external address and port.
Example
# Display the current NAT filtering mode.
<HUAWEI> display nat filter-mode
Nat filter mode is : endpoint-independent
Item Description
Function
The display nat log configuration command displays the configuration of NAT
session logs.
Format
display nat log configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display the configuration of NAT session logs.
<HUAWEI> display nat log configuration
Session log :
Status : disabled
Log-interval : 30 s
Binary-log host :
Host Source
10.10.10.1:3456 10.10.10.2:20000
Table 7-74 Description of the display nat log configuration command output
Item Description
Format
display nat mapping table { all | number }
display nat mapping table inside-address ip-address protocol protocol-name
port port-number
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display nat mapping table command displays information about all entries in
a NAT table or the number of entries in the NAT table. You can also enter
keywords to view a specified entry.
Example
# Display the number of entries in the NAT table.
<HUAWEI> display nat mapping table number
The total number of NAT dynamic mapping tables is: 1
Protocol : UDP(17)
InsideAddr Port Vpn : 192.168.1.121 555
GlobalAddr Port : 1.1.1.1 10491
Protocol : UDP(17)
InsideAddr Port Vpn : 192.168.1.119 555
GlobalAddr Port : 2.2.2.2 23099
Total : 2
Table 7-75 Description of the display nat mapping table command output
Item Description
InsideAddr Port Vpn Private IP address, port number, and VPN instance name.
The device does not support Vpn.
Function
The display nat mapping-mode command displays the NAT mapping mode.
Format
display nat mapping-mode
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After NAT mapping is configured, you can view the NAT mapping information. For
example, you can view:
Example
# Display NAT mapping information.
<HUAWEI> display nat mapping-mode
NAT Mapping Mode Information:
-----------------------------------------------------------
nat mapping-mode endpoint-independent tcp
-----------------------------------------------------------
Total : 1
Item Description
Function
The display nat outbound command displays information about outbound NAT.
Format
display nat outbound [ acl acl-number | address-group group-index | interface
interface-type interface-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display all information about outbound NAT.
<HUAWEI> display nat outbound
NAT Outbound Information:
--------------------------------------------------------------------------
Interface Acl Address-group/IP/Interface Type
--------------------------------------------------------------------------
Vlanif300 2000 1 no-pat
--------------------------------------------------------------------------
Total : 1
Format
display nat server [ global global-address | inside host-address | interface
interface-type interface-number | acl acl-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use this command to check whether the NAT server is configured
correctly.
Example
# Display the configuration of all NAT servers.
<HUAWEI> display nat server
Nat Server Information:
Interface : Vlanif300
Global IP/Port : current-interface/0(any) (Real IP : 2.2.2.2)
Inside IP/Port : 10.1.1.1/0(any)
Protocol : 6(tcp)
VPN instance-name : ----
Acl number : ----
Vrrp id : ----
Description : ----
Total : 1
Item Description
Function
The display nat session command displays the NAT mapping table.
Format
display nat session { all [ verbose ] | number }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays information about the NAT mapping table. You can view
information about all entries or display information by specifying keywords. The
entries in a NAT mapping table are triggered by service packets. If the device does
not receive any service packet, no entry is generated.
Example
# Display details about all entries in the NAT mapping table.
Table 7-79 Description of the display nat session all verbose command output
Item Description
Function
The display nat session aging-time command displays the aging time of NAT
session entries for each protocol.
Format
display nat session aging-time
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the aging time of NAT session entries for
each protocol.
Example
# Display the aging time of NAT session entries for each protocol on the current
device.
<HUAWEI> display nat session aging-time
---------------------------------------------
tcp protocol timeout : 600 (s)
http protocol timeout : 120 (s)
udp protocol timeout : 120 (s)
icmp protocol timeout : 20 (s)
dns protocol timeout : 120 (s)
ftp protocol timeout : 120 (s)
ftp-data protocol timeout : 120 (s)
rtsp protocol timeout : 60 (s)
rtsp-media protocol timeout : 120 (s)
pptp protocol timeout : 600 (s)
pptp-data protocol timeout : 600 (s)
---------------------------------------------
Table 7-80 Description of the display nat session aging-time command output
Item Description
dns protocol timeout The aging time of the DNS protocol. The
default value is 120 seconds.
Item Description
rtsp protocol timeout The aging time of the RTSP protocol. The
default value is 60 seconds.
rtsp-media protocol timeout The aging time of the RTSP media protocol.
The default value is 120 seconds.
Format
display nat static [ global global-address | inside host-address | interface
interface-type interface-number | acl acl-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After static NAT is configured, you can use the display nat static command to view
the configuration of static NAT.
Example
# Display the global configuration of static NAT.
<HUAWEI> display nat static
Static Nat Information:
Global Nat Static
Global IP/Port : 1.1.1.1/0(any)
Inside IP/Port : 10.1.1.1/0(any)
Protocol : 6(tcp)
VPN instance-name : ----
Acl number : ----
Vrrp id : ----
Netmask : 255.255.255.255
Description : ----
Total : 1
Format
display nat static interface enable
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display the interface enabled with the static NAT function.
<HUAWEI> display nat static interface enable
Static Nat enable Information :
------------------------------------------------
interface Vlanif300
------------------------------------------------
Total : 1
Table 7-82 Description of the display nat static interface enable command output
Item Description
Static Nat enable Interface enabled with the static NAT function.
Information
Function
The display port-mapping command displays mappings between the specified
application-layer protocols and ports.
Format
display port-mapping [ protocol-name | port port-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display port-mapping command displays the port mappings, including the
mappings between application-layer protocols and ports, condition (ACL) in which
each mapping takes effect, and the type of each mapping (defined by the system
or user).
Example
# Display the mapping between the DNS protocol and port.
<HUAWEI> display port-mapping dns
-------------------------------------------------
Service Port Acl Type
-------------------------------------------------
dns 53 system defined
-------------------------------------------------
Total number is : 1
Item Description
Function
The nat address-group command configures a NAT address pool.
Format
nat address-group group-index start-address end-address
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The address pool is a set of consecutive IP addresses. When a packet from the
private network reaches the public network through address translation, the
source address of the packet will be translated to another address by the address
pool.
Precautions
The start IP address of the address pool must be smaller than or equal to the end
IP address of the address pool and up to 255 IP addresses can be configured in the
address pool.
Example
# Configure an address pool ranging from 10.110.10.10 to 10.110.10.15, with the
address pool index being 1.
<HUAWEI> system-view
[HUAWEI] nat address-group 1 10.110.10.10 10.110.10.15
Function
The nat alg command enables the NAT ALG function for application protocols.
The undo nat alg command disables the NAT ALG function for application
protocols.
By default, NAT ALG is disabled on Fat APs. For cloud APs, DNS NAT ALG is
disabled, and NAT ALG for other protocols is enabled.
Format
nat alg { all | protocol-name } enable
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the NAT ALG function is enabled for an application protocol, packets of the
application protocol can traverse the public network through NAT. Otherwise, the
application protocol cannot work normally.
Example
# Enable the NAT ALG function for FTP.
<HUAWEI> system-view
[HUAWEI] nat alg ftp enable
Format
nat dns-map domain-name { global-address | interface interface-type interface-
number } global-port protocol-name
undo nat dns-map domain-name { global-address | interface interface-type
interface-number } global-port protocol-name
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use this command to configure the mapping from the domain name to
the public IP address, port number, and protocol type for internal hosts. In this
manner, internal hosts can differentiate and access corresponding internal servers
according to domain names when no DNS server is deployed on the private
network.
By default, DNS mapping is not configured. In this case, after the external DNS
server resolves public IP addresses from domain name requests of internal hosts,
the internal hosts can be mapped to only one internal server. In addition, internal
hosts cannot differentiate and access corresponding internal servers according to
domain names.
Follow-up Procedure
Run the nat alg dns enable command to enable the DNS NAT ALG function. The
NAT ALG function allows hosts on a private network to access servers on the
private network through the external DNS server.
Example
# Configure a mapping entry from a domain name to public IP address, port
number, and protocol type.
<HUAWEI> system-view
[HUAWEI] nat dns-map www.test.com 10.1.1.1 2012 tcp
Function
The nat filter-mode command sets the NAT filtering mode.
Format
nat filter-mode { endpoint-dependent | endpoint-independent | endpoint-and-
port-dependent }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
NAT filtering allows applications using the STUN and TURN technologies to
traverse the NAT server.
NAT is performed on the traffic from the external network to the internal
network:
● If the NAT filtering mode is set to endpoint-independent, the system uses
"destination IP address+destination port number+protocol number" as the key
to search the mapping table. If a corresponding entry is found, the system
generates a reverse mapping entry. The destination address and port in the
entry are the IP address and port number on the internal network.
● If the NAT filtering mode is set to endpoint-dependent, the system uses
"source IP address+destination IP address+destination port number+protocol
number" as the key to search the mapping table. If a corresponding entry is
found, the system generates a reverse mapping entry. The behavior in the
reverse mapping entry is the same as the behavior in the mapping table entry.
● If the NAT filtering mode is set to endpoint-and-port-dependent, the system
uses "source IP address+source port number+destination IP address
+destination port number+protocol number" as the key to search the
mapping table. If a corresponding entry is found, the system generates a
reverse mapping entry. The behavior in the reverse mapping entry is the same
as the behavior in the mapping table entry.
You can change the NAT filtering mode only when no traffic is transmitted
between the external network and internal network.
Example
# Set the NAT filtering mode independent of the external address and port.
<HUAWEI> system-view
[HUAWEI] nat filter-mode endpoint-independent
Format
nat log binary-log host host-ip-address host-port source source-ip-address
source-port
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Only one binary NAT session log server can be configured globally. The old binary
NAT session log server is directly replaced by the newly configured binary NAT
session log server.
Example
# Configure a binary NAT session log server whose IP address is 10.10.10.1 and
port number is 3456. Set the IP address of the peer device to 10.10.10.2 and its
port number to 20000.
<HUAWEI> system-view
[HUAWEI] nat log binary-log host 10.10.10.1 3456 source 10.10.10.2 20000
Function
The nat log session enable command enables the NAT session log function.
The undo nat log session enable command disables the NAT session log
function.
Format
nat log session enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to enable the NAT session log function. The session
logs record the sessions that match the specified ACL rules and sessions processed
by the NAT server.
Example
# Enable the NAT session log function.
<HUAWEI> system-view
[HUAWEI] nat log session enable
Function
The nat log session log-interval command sets the interval for generating NAT
session logs.
The undo nat log session log-interval command restores the default interval for
generating NAT session logs.
Format
nat log session log-interval interval-time
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
NAT session logs are classified into binary logs and text logs. Binary logs are sent
to the binary log server in real time, and text logs are sent to the text log server at
intervals. You can run this command to set the interval for sending text logs.
Example
# Set the interval for generating NAT session logs to 200 seconds.
<HUAWEI> system-view
[HUAWEI] nat log session log-interval 200
Function
The nat mapping-mode command sets the NAT mapping mode.
The undo nat mapping-mode command restores the NAT mapping mode.
Format
nat mapping-mode endpoint-independent [ protocol-name [ dest-port port-
number ] ]
undo nat mapping-mode endpoint-independent [ protocol-name [ dest-port
port-number ] ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
The NAT function resolves the problem of IPv4 address shortage and improves
network security. NAT implementation of different vendors may be different, so
the applications using the STUN, TURN, and ICE technologies may fail to traverse
the NAT devices of these vendors. NAT mapping enables these applications to
traverse the NAT devices.
Example
# Enable the endpoint-and-port-independent mapping mode for TCP packets.
<HUAWEI> system-view
[HUAWEI] nat mapping-mode endpoint-independent tcp
Format
nat outbound acl-number address-group group-index [ no-pat ]
undo nat outbound acl-number address-group group-index [ no-pat ]
Parameters
Parameter Description Value
Views
VLANIF interface view, Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Use Scenario
After an ACL is associated with a NAT address pool, NAT translates the source IP
address of a data packet matching the ACL to an IP address in the NAT address
pool.
On the same interface, different IP addresses can be translated and associated.
This interface usually connects to an ISP network and is the egress of the internal
network.
NOTE
This command can only be used on Layer 3 interfaces, except the Loopback and NULL
interfaces.
Example
# Select the addresses from 1.1.1.1 to 1.1.1.3 to form NAT address pool 1, and
configure the hosts in the network segment 10.110.10.0/24 to use the addresses in
address pool 1 for many-to-one address translation (using TCP/UDP port
information).
<HUAWEI> system-view
[HUAWEI] acl number 2001
[HUAWEI-acl-basic-2001] rule permit source 10.110.10.0 0.0.0.255
[HUAWEI-acl-basic-2001] quit
[HUAWEI] nat address-group 1 1.1.1.1 1.1.1.3
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] nat outbound 2001 address-group 1
Format
nat outbound acl-number [ interface interface-type interface-number ]
undo nat outbound acl-number [ interface interface-type interface-number ]
Parameters
Parameter Description Value
Views
VLANIF interface view, Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Easy IP indicates that the IP address of the interface is used as the translated IP
address.
NOTE
This command can only be used on Layer 3 interfaces, except the Loopback, NULL
interfaces.
Example
# Set the IP address of the interface to the translated IP address.
<HUAWEI> system-view
[HUAWEI] acl number 2001
[HUAWEI-acl-basic-2001] rule permit source 10.110.10.0 0.0.0.255
[HUAWEI-acl-basic-2001] quit
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] nat outbound 2001
Format
nat server protocol { tcp | udp } global { global-address | current-interface |
interface interface-type interface-number } global-port [ global-port2 ] inside
host-address [ host-address2 ] [ host-port ] [ acl acl-number ] [ description
description ]
nat server [ protocol { protocol-number | icmp | tcp | udp } ] global { global-
address | current-interface | interface interface-type interface-number } inside
host-address [ acl acl-number ] [ description description ]
undo nat server protocol { tcp | udp } global { global-address | current-
interface | interface interface-type interface-number } global-port [ global-
port2 ] inside host-address [ host-address2 ] [ host-port ]
undo nat server [ protocol { protocol-number | icmp | tcp | udp } ] global
{ global-address | current-interface | interface interface-type interface-number }
inside host-address
Parameters
Parameter Description Value
Views
VLANIF interface view, Tunnel interface view
VLANIF interface view, Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure an internal server so that the external network can access the
server in an active manner. When a host on the public network sends a connection
request to the public address (global-address) of the internal NAT server, the NAT
server translates the destination address of the request into a private address
(inside-address). The request is then forwarded to the server on the private
network.
NOTE
● This command can only be used on Layer 3 interfaces, except loopback and NULL
interfaces.
● If you run the undo nat server command, static mapping entries are not deleted within
the aging-time period. To clear static mapping entries, run the reset nat session
command.
Precautions
If you need to map the private address of an internal server into the IP address of
the public network interface when configuring this command on the public
network interface, you must set the current-interface parameter to specify a
global address as the current interface address.
Example
# Add a NAT server and translate public address 1.1.1.1 of the TCP service to
private address 192.168.0.1.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] nat server protocol tcp global 1.1.1.1 inside 192.168.0.1
Function
The nat session aging-time command sets the aging time of the NAT session
table for each protocol.
The undo nat session aging-time command restores the default aging time of
the NAT session table for each protocol.
For the default aging time of the NAT session table for each protocol, see Table
7-84.
Format
nat session protocol-name aging-time time-value
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the nat session aging-time command to set the aging time of the
protocol session table for each protocol. If an entry in a session table is not used
within the specified period, the entry expires. For example, the user with the IP
address 10.110.10.10 initiates a TCP connection through port 2000. If the TCP
connection is not used within the timeout duration, the system deletes the TCP
connection.
Table 7-84 lists the default aging time of the NAT session table for each protocol.
Table 7-84 Default aging time of the NAT session table for each protocol
icmp 20 seconds
rtsp 60 seconds
Precautions
For some services such as the voice service, you must increase the TCP/UDP
connection aging time to prevent service interruption.
Example
# Set the aging time of DNS sessions to 60 seconds.
<HUAWEI> system-view
[HUAWEI] nat session dns aging-time 60
Function
The nat static enable command enables static NAT on an interface.
The undo nat static enable command disables static NAT on an interface.
Format
nat static enable
Parameters
None
Views
VLANIF interface view, Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Using the nat static enable command, you can enable static NAT on an interface.
NOTE
This command can only be used on Layer 3 interfaces, except the Loopback and NULL
interfaces.
Example
# Enable static NAT on an interface.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] nat static enable
Function
The nat static command configures the static mapping between a private IP
address and a public IP address.
The undo nat static command deletes the static mapping between a private IP
address and a public IP address.
Format
nat static protocol { tcp | udp } global { global-address | current-interface |
interface interface-type interface-number } global-port [ global-port2 ] inside
host-address [ host-address2 ] [ host-port ] [ netmask mask ] [ acl acl-number ]
[ description description ]
Parameters
Parameter Parameters Value
Views
VLANIF interface view, Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If devices on a private network allow access from devices on a public network
through a fixed IP address, for example, a private server provides services to public
network devices, the public network devices can access the server through a fixed
public IP address. You can configure static NAT to translate the private IP address
of the private server into the specified public IP address.
Static NAT also supports IP address translation between network segments, that
is, private IP addresses within a specified range and public IP addresses within a
specified range can be translated into each other.
Precautions
After the undo nat static command is run on the device, static mapping entries
on the device will not be cleared immediately. To clear static mapping entries
immediately, run the reset nat session command.
When the global-port, global-port2, host-port, and host-port2 parameters are
specified to configure mappings between public and private port numbers, the
number of public port numbers must be the same as the number of private port
numbers and the port numbers must be mapped in sequence. For example, when
nat static protocol tcp global 1.1.1.1 11 20 inside 10.10.10.1 21 30 is
configured, the public IP address 1.1.1.1 maps the private IP address 10.10.10.1,
and public port numbers 11 to 20 map private port numbers 21 to 30 in sequence.
When host-address2 is specified, global-port2 and host-port must also be
specified. The number of private addresses must be the same as the number of
public port numbers. That is, the same public address maps different private
addresses, and different public port numbers map the same private port number.
For example, when nat static protocol tcp global 1.1.1.1 11 12 inside 10.10.10.1
10.10.10.2 30 is configured, 1.1.1.1 and public port 11 map 10.10.10.1 and private
port 30, and 1.1.1.1 and public port 12 map 10.10.10.2 and private port 30.
Example
# Translate the combination of the public IP address 1.1.1.1 and port 200 in TCP
packets to the combination of the private IP address 10.10.10.1 and port 300.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] nat static protocol tcp global 1.1.1.1 200 inside 10.10.10.1 300
Function
The nat static command configures one-to-one NAT between private addresses
and public addresses in the system view.
The undo nat static command deletes one-to-one NAT configured between
private addresses and public addresses in the system view.
Format
nat static protocol { tcp | udp } global global-address global-port [ global-
port2 ] inside host-address [ host-address2 ] [ host-port ] [ netmask mask ]
[ description description ]
undo nat static protocol { tcp | udp } global interface loopback interface-
number global-port [ global-port2 ] inside host-address [ host-address2 ] [ host-
port ] [ netmask mask ] [ description description ]
undo nat static [ protocol { protocol-number | icmp | tcp | udp } ] global
{ global-address | interface loopback interface-number } inside host-address
[ netmask mask ] [ description description ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Static NAT indicates that a private address is statically bound to a public address
when NAT is performed. The public IP address in static NAT is only used for
translation of the unique and fixed private IP address of a host.
Static PAT indicates that a combination of the private address of a host, TCP/UDP
protocol number, and internal port number is statically bound to a combination of
the public address, TCP/UDP protocol number, and external port number. The
public IP address in static PAT can be used for translation of multiple private
addresses.
Using static NAT or PAT, hosts on the private network and hosts on the public
network can access each other.
NOTE
● If you run the undo nat static command, static mapping entries are not immediately
deleted. To clear static mapping entries, run the reset nat session command.
● When the global-port, global-port2, host-port, and host-port2 parameters are specified to
configure mappings between public and private port numbers, the number of public port
numbers must be the same as the number of private port numbers and the port numbers
must be mapped in sequence. For example, when nat static protocol tcp global 1.1.1.1 11
20 inside 10.10.10.1 21 30 is configured, the public IP address 1.1.1.1 maps the private IP
address 10.10.10.1, and public port numbers 11 to 20 map private port numbers 21 to 30 in
sequence.
When host-address2 is specified, global-port2 and host-port must also be specified. The
number of private addresses must be the same as the number of public port numbers. That
is, the same public address maps different private addresses, and different public port
numbers map the same private port number. For example, when nat static protocol tcp
global 1.1.1.1 11 12 inside 10.10.10.1 10.10.10.2 30 is configured, 1.1.1.1 and public port 11
map 10.10.10.1 and private port 30, and 1.1.1.1 and public port 12 map 10.10.10.2 and
private port 30.
● nat static protocol { tcp | udp } global interface loopback interface-number global-port
[ global-port2 ] inside host-address [ host-address2 ] [ host-port ] [ netmask mask ]
[ description description ]
In the command, the first vpn-instance-name parameter specifies the VPN instance bound to
the loopback interface, and the second vpn-instance-name parameter specifies a private
network-side VPN instance.
● If the ip binding vpn-instance vpn-instance-name command is run in the interface view to
bind a public network-side VPN instance to the interface, the nat static command in the
system view does not take effect. In this case, you need to run the nat static or nat server
command in the interface view.
Example
# Translate the combination of Loopback 4 interface address and port 43 in TCP
packets to private address 192.168.2.55.
<HUAWEI> system-view
[HUAWEI] interface loopback 4
[HUAWEI-LoopBack4] ip address 192.168.8.8 24
[HUAWEI-LoopBack4] quit
[HUAWEI] nat static protocol tcp global interface loopback 4 43 inside 192.168.2.55 netmask
255.255.255.255
7.9.32 port-mapping
Function
The port-mapping command configures the mappings between ports and
application-layer protocols.
The undo port-mapping command deletes the mappings between ports and
application-layer protocols.
For the default mapping between application-layer protocols and ports, see Table
7-85.
dns 53
ftp 21
rtsp 554
pptp 1723
Format
port-mapping protocol-name port port-number acl acl-number
undo port-mapping { all | protocol-name port port-number acl acl-number }
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Port mapping enables a server to provide various application-layer services for
external systems through non-well-known ports. For example, the well-known
port of the FTP service is port 21. After port mapping is configured on the nat
device, the nat device can use a non-well-known port to provide the FTP service.
Example
# Map the FTP service to port 10 and apply ACL 2000 to control the packets to
which the mapping takes effect.
<HUAWEI> system-view
[HUAWEI] acl 2000
[HUAWEI-acl-basic-2000] rule permit
[HUAWEI-acl-basic-2000] quit
[HUAWEI] port-mapping ftp port 10 acl 2000
Format
reset app-inspect { servermap | session } table statistics
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can run this command when you need to collect new NAT application entry
statistics. After you run this command, all statistics on NAT application entries are
cleared.
Precautions
Statistics on NAT application entries cannot be restored after they are cleared.
Exercise caution when you use the command.
Example
# Clear statistics on NAT session entries at the application layer.
<HUAWEI> system-view
[HUAWEI] reset app-inspect session table statistics
Format
reset nat session { all | transit interface interface-type interface-number }
Parameters
Parameter Description Value
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If the configurations of nat alg, nat server, and nat outbound are changed, the
packets are not forwarded based on new configurations. You can run the reset nat
session command to make the new configurations take effect. This command can
be used to delete all entries or the entries of traffic passing a specified interface
from the NAT mapping table.
Precautions
● After this command is used, entries are deleted from the NAT mapping table
and the NAT configurations are modified immediately.
● After this command is executed, you must wait at least 10 seconds if you
need to run the command again; otherwise, an error message is displayed.
● If all entries are deleted, communication among certain sessions may be
affected for a short period.
Example
# Delete all entries from the NAT mapping table.
<HUAWEI> system-view
[HUAWEI] reset nat session all
Warning:The current all NAT sessions will be deleted.
Are you sure to continue?[Y/N] y
Format
reset session all
Parameters
None.
Views
System view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
This command will delete all entries that are generated during service processing.
Precautions
After this command is executed, entries are deleted from session tables and the
session table configurations are modified immediately. You must wait at least 10
seconds before running the command again; otherwise, an error message is
displayed.
Example
# Display entries from all session tables.
<HUAWEI> system-view
[HUAWEI] reset session all
Warning:The current all sessions will be deleted.
Are you sure to continue?[Y/N]y
7.10.1 clear ip df
Function
The clear ip df command enables an interface to fragment outgoing IP packets.
Format
clear ip df
undo clear ip df
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
After forcible IP packet fragmentation is enabled on a device, the device sets the
Don't Fragment (DF) field to 0 and fragments IP packets that meet the following
conditions:
Example
# Enable forcible fragmentation for outgoing packets on VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] clear ip df
7.10.2 discard ra
Function
The discard ra command discards IP packets with route-alert options.
The undo discard ra command restores the default configurations.
By default, packets with route-alert options are processed by the CPU.
Format
discard ra
undo discard ra
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
When a device receives a huge number of packets with route-alert options that
increase the traffic loads, performance of the device is affected. The discard ra
command is used to discard IP packets with route-alert options, which reduces
pressure on CPU and improves network performance and security.
NOTE
Example
# Configure the device to discard the IP packets with route-alert options.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] discard ra
7.10.3 discard rr
Function
The discard rr command discards IP packets with record-route options.
The undo discard rr command restores the default configurations.
By default, packets with record-route options are processed by the CPU.
Format
discard rr
undo discard rr
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
When a device receives a huge number of packets with record-route options that
increase the traffic loads, performance of the device is affected. The discard rr
command is used to discard IP packets with record-route options, which reduces
pressure on CPU and improves network performance and security.
NOTE
Example
# Configure the device to discard the IP packets with record-route options.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] discard rr
Format
discard srr
undo discard srr
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
After the discard srr command is run, the device does not process but discard the
IP packets with source-route options (including the packets to be forwarded and
the packets for itself). This prevents attackers from snooping into the network
structure and enhances network security.
srr indicates the source-route options, which are actually called the source and
record route (SRR) options. During packet routing, the IP address list is updated on
each hop. Therefore, each hop needs to record the routes for sending the response
packet along the reverse path. The SRR options are classified into the Loose
Source and Record Route (LSRR) option and Strict Source and Record Route
(SSRR) option.
NOTE
Example
# Configure the device to discard the IP packets with source-route options on
VLANIF100.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] discard srr
7.10.5 discard ts
Function
The discard ts command discards IP packets with time-stamp options.
Format
discard ts
undo discard ts
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
When a device receives a huge number of packets with time-stamp options that
increase the traffic loads, performance of the device is affected. The discard ts
command is used to discard IP packets with time-stamp options, which reduces
pressure on CPU and improves network performance and security.
NOTE
Example
# Configure the device to discard the IP packets with time-stamp options.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] discard ts
Function
The display icmp statistics command displays ICMP traffic statistics.
Format
display icmp statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display ICMP traffic statistics.
<HUAWEI> display icmp statistics
Input: bad formats 0 bad checksum 0
echo 0 destination unreachable 0
source quench 0 redirects 0
echo reply 0 parameter problem 0
timestamp request 0 information request 0
mask requests 0 mask replies 0
time exceeded 0 timestamp reply 0
Output:echo 0 destination unreachable 39735
source quench 0 redirects 0
echo reply 0 parameter problem 0
timestamp request 0 information reply 0
mask requests 0 mask replies 0
time exceeded 0 timestamp reply 0
Format
display ip interface [ interface-type interface-number ]
display ip interface brief [ interface-type [ interface-number ] ]
display ip interface brief [ interface-type ] &<1-8>
Parameters
Parameter Description Value
interface-type Specifies the type and number of an interface. If no -
interface-number interface is specified, IP configuration and statistics
about all interfaces are displayed.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ip interface brief command to view the following
information:
● IP configurations of all interfaces
● IP configurations of interfaces of the specified type and a specified interface
● IP configurations of interfaces that have IP addresses
This command, however, cannot display the IP configurations of Layer 2 interfaces
or Eth-Trunk member interfaces.
NOTE
● You can run the display interface description command to view the interface
description.
● You can run the display interface command to view detailed information about the
running status and statistics on the interface.
Example
# Display IP information about VLANIF15.
<HUAWEI> display ip interface vlanif 15
Vlanif15 current state : UP
Line protocol current state : UP
The Maximum Transmit Unit : 1500 bytes
input packets : 766390, bytes : 41540847, multicasts : 681817
output packets : 242239, bytes : 14679482, multicasts : 172333
Directed-broadcast packets:
received packets: 0, sent packets: 0
forwarded packets: 0, dropped packets: 0
Internet Address is 10.1.1.119/24
Broadcast address : 10.1.1.255
TTL being 1 packet number: 164035
TTL invalid packet number: 0
ICMP packet input number: 0
Echo reply: 0
Unreachable: 0
Source quench: 0
Routing redirect: 0
Echo request: 0
Router advert: 0
Router solicit: 0
Time exceed: 0
IP header bad: 0
Timestamp request: 0
Timestamp reply: 0
Information request: 0
Information reply: 0
Netmask request: 0
Netmask reply: 0
Unknown type: 0
Item Description
Line protocol current state : Link layer protocol status of the interface:
● UP: The link layer protocol of the interface
is running properly.
● DOWN: The link layer protocol of the
interface is Down or no IP address is
configured on the interface.
The Maximum Transmit Unit : MTU of the interface. The default MTU of an
Ethernet interface or a serial interface is 1500
bytes. Packets longer than the MTU are
fragmented before being transmitted. If
fragmentation is not allowed, the packets are
discarded.
input packets : 766390, bytes : Total number of packets, bytes, and multicast
41540847, multicasts : 681817 packets received by the interface.
Item Description
Format
display ip socket [ monitor ] [ task-id task-id socket-id socket-id | socket-type
socket-type ]
Parameters
Parameter Description Value
1 TCP socket
2 UDP socket
3 RAWIP socket
4 RAWLINK socket
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
A socket monitor monitors and records each connection. A RawLink also monitors
interfaces. The socket monitor records specific protocol events that occur during
operations. In addition, it logs information in the disk space.
The socket monitor is similar to a black box of the system. It records specific
events that happen during system operations. When the system fails, you can use
information recorded by the socket monitor to locate faults.
You can also set the filtering rules, such as the task ID, socket ID, and socket type
so that only the information matching the rules is displayed. This reduces
information output and helps you locate faults accurately and efficiently.
Example
# Display information about the IP socket.
<HUAWEI> display ip socket monitor
SOCK_STREAM:
Task = VTYD(30), socketid = 1, Proto = 6,
LA=0.0.0.0:23, FA=0.0.0.0:0,
sndbuf = 8192, rcvbuf = 8192, sb_cc = 0, rb_cc = 0,
socket option = SO_ACCEPTCONN SO_REUSEADDR SO_KEEPALIVE SO_LINGER SO_SENDVPNID(2
3553) SO_SETKEEPALIVE SO_SETACL,
socket state = SS_PRIV
Socket Monitor:
Asyn Que status:
read = 0, write = 0, connect = 0, close = 0,
peer close = 0, accept = 0, keep alive down = 0,
Item Description
Item Description
Item Description
Function
The display ip socket register-port command displays non-well-known port
numbers that have been assigned to services on the device.
Format
display ip socket register-port
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
As defined in RFC standards, port numbers larger than 1024 are non-well-known
port numbers and can be assigned to desired services, such as NQA and SSH
services. However, a non-well-known port number can be assigned to only one
service on the same device. If you assign a non-well-known port number to two or
more services, this port number takes effect for only the latest configured service.
As a result, the other services using this port number will fail.
Before you assign a non-well-known port number to a service, run the display ip
socket register-port command to check non-well-known port numbers that have
been assigned to other services, preventing service failures caused by conflicts of
non-well-known port numbers.
Example
# Display non-well-known port numbers that have been assigned to services on
the device.
<HUAWEI> display ip socket register-port
Port Task Type
3232 mdt UDP4
3503 MPLSFW UDP4
3784 BFD UDP4
4784 BFD UDP4
Item Description
Function
The display ip statistics command displays IP traffic statistics.
Format
display ip statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
IP traffic statistics include statistics about received packets (including discarded
packets that carry source-route options), sent packets, fragmented packets, and
reassembled packets. If a large number of bad protocol and no route fields is
displayed in the command output, the device receives a large volume of IP packets
of unknown protocol types and IP packets for which no routes can be found. In
this situation, the device may be attacked by the connected devices.
Example
# Display IP traffic statistics.
<HUAWEI> display ip statistics
Input: sum 49617 local 40133
bad protocol 0 bad format 0
bad checksum 0 bad options 0
discard srr 0 discard rr 0
discard ra 0 discard ts 0
TTL exceeded 0
Output: forwarding 0 local 44518
dropped 0 no route 0
Fragment: input 0 output 0
dropped 0
fragmented 0 couldn't fragment 0
Reassembling:sum 0 timeouts 0
Item Description
Item Description
Format
display network status { all | tcp | udp | port port-number }
Parameters
Parameter Description Value
all Displays all the network -
information.
tcp Displays TCP. -
udp Displays UDP. -
port port-number Specifies the number of an The value is an integer
interface. ranging from 1 to 65535.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display network status command is used to check the network status, such
as the running interfaces and services on the network. For example, when you find
that an interface is being used by an unknown module during a security scan, run
the command to check out the module.
Example
# Display the IPv4 RawIP connection status.
<HUAWEI> display network status all
Proto Task/SockId Local Addr&Port Foreign Addr&Port State
TCP VTYD/1 0.0.0.0:23 0.0.0.0:0 Listening
TCP VTYD/3 10.23.23.1:23 10.23.23.201:4332 Established
TCP6 VTYD/2 ::->23 ::->0 Listening
UDP NTPT/1 0.0.0.0:123 0.0.0.0:0
UDP AGNT/1 0.0.0.0:161 0.0.0.0:0
UDP RDS /1 0.0.0.0:1812 0.0.0.0:0
UDP WEB /1 0.0.0.0:2000 0.0.0.0:0
UDP L2_P/1 0.0.0.0:40000 0.0.0.0:0
UDP NAP /1 0.0.0.0:53535 0.0.0.0:0
UDP6 NTPT/2 ::->123 ::->0
UDP6 AGT6/1 ::->161 ::->0
Item Description
Format
display rawip statistics [ verbose ]
Parameters
Parameter Description Value
verbose Displays detailed RawIP traffic statistics based on the ICMP, -
OSPF, RSVP, and Others protocols.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The statistics about RawIP packets include the number of sent RawIP packets and
the number of received RawIP packets.
RSVP, OSPF, and ICMP packets are encapsulated into RawIP packets to be sent.
During the ping operation, for example, you can run the display rawip statistics
command to view the number of RawIP packets sent by the local device to check
whether the abnormality on the network is caused by abnormal sending and
receiving of RawIP packets.
If you want to diagnose problems and monitor information of specific
applications, configure verbose in the display rawip statistics command to
NOTE
RawIP traffic statistics are collected based on the well-known protocol number. The
protocol number is identified by the protocol field in the IP packet header.
● The protocol number of ICMP statistics is 1.
● The protocol number of OSPF statistics is 89.
● The protocol number of RSVP statistics is 46.
● Statistics about packets with other protocol numbers are collected into the Others field.
Example
# View the statistics about RawIP packets.
<HUAWEI> display rawip statistics
Received packets:
dropped packets because the socket buffer is full : 0
dropped packets because no matching socket is found : 0
Sent packets:
dropped packets : 0
dropped packets because the Indicates the number of RawIP packets that
socket buffer is full are discarded because the socket buffer is
full.
Sent packets:
------------------------------------------------------------------
Application Dropped Packets
------------------------------------------------------------------
ICMP 0
OSPF 0
RSVP 0
Others 0
------------------------------------------------------------------
Table 7-94 Description of the display rawip statistics verbose command output
Item Description
Format
display snmp-agent trap feature-name tcp all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display snmp-agent trap feature-name tcp all command to
view all trap messages of the TCP module.
Example
# Display all trap messages of the TCP module.
<HUAWEI> display snmp-agent trap feature-name tcp all
------------------------------------------------------------------------------
Feature name: TCP
Trap number : 1
------------------------------------------------------------------------------
Trap name Default switch status Current switch status
hwTCPMD5AuthenFail off off
Table 7-95 Description of the display snmp-agent trap feature-name tcp all
command output
Item Description
Format
display tcp statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The command displays TCP traffic statistics including different types of received
and sent packets. For example, duplicate received packets and packets with
checksum errors. In addition, connection-related statistics are displayed, for
example, times of accepted connections, the number of retransmitted packets, and
the number of keepalive packets.
Most of the preceding statistics are expressed in number of packets, and some of
them are expressed in number of bytes.
Example
# Display TCP traffic statistics.
<HUAWEI> display tcp statistics
Received packets:
Total: 0
Total(64bit high-capacity counter): 0
packets in sequence: 0 (0 bytes)
window probe packets: 0, window update packets: 0
checksum error: 0, offset error: 0, short error: 0
Sent packets:
Total: 0
Total(64bit high-capacity counter): 0
urgent packets: 0
control packets: 0 (including 0 RST)
window probe packets: 0, window update packets: 0
Other information:
Retransmitted timeout: 0, connections dropped in retransmitted timeout: 0
Keep alive timeout: 0, keep alive probe: 0, Keep alive timeout, so connections disconnected : 0
Initiated connections: 0, accepted connections: 0, established connections: 0
Closed connections: 0 ( dropped: 0, initiated dropped: 0)
Packets dropped with MD5 authentication: 0
Packets permitted with MD5 authentication: 0
Send Packets permitted with Keychain authentication: 0
Receive Packets permitted with Keychain authentication: 0
Receive Packets Dropped with Keychain authentication: 0
packets of data after window Number of bytes in the packets whose size
(bytes) is greater than the window size.
Item Description
Packets dropped with MD5 Number of packets that fail to pass MD5
authentication authentication.
Send Packets permitted with Number of sent packets that carry keychain
Keychain authentication options.
Function
The display tcp status command displays current TCP connection status.
Format
display tcp status [ [ task-id task-id ] [ socket-id socket-id ] | [ local-ip ip-
address ] [ local-port local-port-number ] [ remote-ip ip-address ] [ remote-port
remote-port-number ] ]
Parameters
Parameter Description Value
task-id task-id Displays the TCP connection The value is an integer
status of the task with a that ranges from 1 to
specified ID. 150.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
The transmission control protocol defined in RFC 793 ensures high reliability of
transmission between hosts. TCP provides reliable and connection-oriented
services in full duplex mode. Run the display tcp status command to monitor the
TCP connection status. The following information is displayed.
● ID of the TCP task control block.
● ID of the IPv4 TCP task and socket.
● Local IPv4 address and port ID.
● Remote IPv4 address and port ID.
● ID of the VPN instance to which the TCP connection belongs.
● IPv4 TCP connection status.
You can set filtering rules based on the Task ID, socket ID, IP address and port
number of the local device, and IP address and port number of the remote device
so that only the information matching the rules is displayed. This prevents
unnecessary information from being displayed and helps you locate faults
accurately and efficiently.
Precautions
The command output is null if there is no TCP connection.
Example
# Display the TCP connection status on the local device.
<HUAWEI> display tcp status
TCPCB Tid/Soid Local Add:port Foreign Add:port VPNID State
0a5d560c 30 /1 0.0.0.0:23 0.0.0.0:0 14849 Listening
# Display the status of the TCP connection originated from the local IP address
0.0.0.0 and port 23.
<HUAWEI> display tcp status local-ip 0.0.0.0 local-port 23
TCPCB Tid/Soid Local Add:port Foreign Add:port VPNID State
0a5d560c 30 /1 0.0.0.0:23 0.0.0.0:0 14849 Listening
# Display the status of the TCP connection originated from the local IP address
0.0.0.0 and port 24.
<HUAWEI> display tcp status local-ip 0.0.0.0 local-port 24
TCPCB Tid/Soid Local Add:port Foreign Add:port VPNID State
Local Add: port IP address and port number of the local device. If the
value of Local Add is 0.0.0.0, TCP connections of all IP
addresses are monitored. If the value of port is 0, the
TCP connection of all ports is monitored.
Foreign Add: port IP address and port number of the remote device. If the
value of Foreign Add is 0.0.0.0, the TCP connection of all
IP addresses is monitored. If the value of port is 0, TCP
connections of all ports are monitored.
Field Description
Function
The display udp statistics command displays UDP traffic statistics.
Format
display udp statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The command displays UDP traffic statistics including different types of received
and sent packets. For example, packets with checksum errors. In addition,
connection-related statistics are displayed, for example, the number of broadcast
packets. The preceding statistics are expressed in number of packets.
Example
# Display UDP traffic statistics.
<HUAWEI> display udp statistics
Received packets:
Total: 104808
Total(64bit high-capacity counter): 104808
checksum error: 0
shorter than header: 0
data length larger than packet: 0
unicast(no socket on port): 0
broadcast/multicast(no socket on port): 104808
not delivered, input socket full: 0
input packets missing pcb cache: 0
Sent packets:
Total: 4957
Total(64bit high-capacity counter): 4957
Item Description
data length larger than packet: Number of packets whose data length is
greater than the packet length.
not delivered, input socket full: Number of packets that are not sent out
because the socket buffer is full.
input packets missing pcb cache: Number of sent packets that are not found
in the PCB cache.
Item Description
Format
icmp blackhole unreachable send
undo icmp blackhole unreachable send
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If static IPv4 blackhole routes are configured on the BRAS and a user goes offline,
only the IPv4 blackhole route corresponding to the user's address segment exists
on the BRAS. When a tracert packet matches the IPv4 blackhole route, the BRAS
discards the packet. As a result, an initiator cannot detect that the user has gone
offline.
After you run the icmp blackhole unreachable send command, the BRAS sends a
Destination Unreachable ICMP packet to an initiator, notifying the initiator that
the user has gone offline if a user goes offline and a tracert packet matches the
IPv4 blackhole route.
Pre-configuration Tasks
Example
# Enable the BRAS to send a Destination Unreachable ICMP packet to an initiator
when a tracert packet matches an IPv4 blackhole route.
<HUAWEI> system-view
[HUAWEI] icmp blackhole unreachable send
Format
icmp host-unreachable send
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
The command is used on the interface that receives ICMP packets.
Example
# Enable VLANIF10 to send ICMP host unreachable packets.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] icmp host-unreachable send
Function
The icmp port-unreachable send command enables the device to send ICMP port
unreachable packets.
The undo icmp port-unreachable send command disables the device from
sending ICMP port unreachable packets.
Format
icmp port-unreachable send
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the function of sending ICMP port unreachable packets is disabled, the
device does not send ICMP port unreachable packets. This can reduce the number
of ICMP packets on the network and reduce the workload on the peer device.
Example
# Enable the device to send ICMP port unreachable packets.
<HUAWEI> system-view
[HUAWEI] icmp port-unreachable send
Function
The icmp receive command enables the device to receive ICMP messages.
The undo icmp receive command disables the device from receiving ICMP
messages.
Format
icmp { type icmp-type code icmp-code | name icmp-name | all } receive
undo icmp { type icmp-type code icmp-code | name icmp-name | all } receive
Parameters
Parameter Description Value
type icmp-type Specifies the type number of an ICMP The value is an integer
message. ranging from 0 to 255.
code icmp- Specifies the code of an ICMP message. The value is an integer
code ranging from 0 to 255.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The undo icmp receive command can be used to disable the device from
receiving ICMP messages for the purpose of improving network performance or
enhancing network security.
● On secure networks, the device can normally receive ICMP messages. In the
case of heavy traffic on the network, if hosts or ports are frequently
unreachable, the device will receive a large number of ICMP packets, which
causes heavier traffic burdens over the network and degrades the
performance of the device.
● On insecure networks, network attackers often make use of ICMP error
messages to spy on the internal structure of the network.
Configuration Impact
After the undo icmp receive command is run, the device no longer process ICMP
messages of a certain type, causing the host to fail to ping the device.
Precautions
If the network status is normal and the device is required to receive ICMP
messages, you can run the icmp receive command.
Example
# Disable the device from receiving ICMP messages with the type number being 3
and the code number being 1.
<HUAWEI> system-view
[HUAWEI] undo icmp type 3 code 1 receive
Function
The icmp redirect send command enables the system to send ICMP redirection
packets.
The undo icmp redirect send command disables the system from sending ICMP
redirection packets.
Format
icmp redirect send
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
The command is used on the interface that receives ICMP packets.
ICMP redirection packets are a type of ICMP control packets. When the device
detects that a host uses a non-optimal route, it sends an ICMP redirection packet
to the host, requesting the host to change the route. The device also sends an
ICMP redirection packet to the destination.
Example
# Enable VLANIF100 to send ICMP redirection packets.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] icmp redirect send
Function
The icmp ttl-exceeded drop command enables the device to discard the ICMP
packets whose TTL values are 1.
The undo icmp ttl-exceeded drop command disables the device from discarding
the ICMP packets whose TTL values are 1.
By default, the device does not discard the ICMP packets whose TTL values are 1.
Format
icmp ttl-exceeded drop
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the device receives a large number of IGMP packets, the function enables
the device to discard some ICMP packets to reduce the workload on the device.
Example
# Enable the device to discard the ICMP packets whose TTL values are 1.
<HUAWEI> system-view
[HUAWEI] icmp ttl-exceeded drop
Format
icmp ttl-exceeded send
undo icmp ttl-exceeded send
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
By default, an interface replies with an ICMP Time Exceeded message after it
receives a message with TTL 1. The interface adds its IP address as the source IP
address in the ICMP Time Exceeded message, exposing the interface itself to
attackers. In addition, after being attacked, the interface replies with numerous
ICMP Time Exceeded messages, consuming CPU resources and degrading system
performance. To resolve these problems, run the undo icmp ttl-exceeded send
command to disable the interface from replying with ICMP Time Exceeded
messages.
Example
# Disable VLANIF 10 from sending ICMP Time Exceeded messages.
<HUAWEI> system-view
[HUAWEI] interface vlanif 10
[HUAWEI-Vlanif10] undo icmp ttl-exceeded send
Function
The icmp unreachable drop command enables the function of discarding ICMP
destination unreachable packets.
The undo icmp unreachable drop command disables the function of discarding
the ICMP destination unreachable packets.
Format
icmp unreachable drop
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the function is enabled on the device, the device discards some ICMP
packets. This reduces the workload on the device.
Example
# Enable the function of discarding ICMP destination unreachable packets.
<HUAWEI> system-view
[HUAWEI] icmp unreachable drop
Format
icmp with-options drop
undo icmp with-options drop
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When the device receives a large number of ICMP packets, the function enables
the device to discard some ICMP packets to reduce the workload on the device.
Example
# Enable the device to discard the ICMP packets that carry options.
<HUAWEI> system-view
[HUAWEI] icmp with-options drop
Format
icmp-reply fast
undo icmp-reply fast
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After the fast ICMP reply function is enabled on a wireless access point, the
wireless access point quickly responds to received ICMP echo request packets
destined for its own address.
After the fast ICMP reply function is enabled on a wireless access point, the
wireless access point responds to ICMP echo packets quickly in the following
situation:
● The wireless access point does not have the ARP entry of the device that
initiates the ping. However, the wireless access point cannot learn the ARP
entries of this device in this case.
Example
# Enable the fast ICMP reply function on a wireless access point.
<HUAWEI> system-view
[HUAWEI] icmp-reply fast
7.10.27 ip forward-broadcast
Function
Using the ip forward-broadcast command, you can enable an interface to
forward broadcast packets.
Using the undo ip forward-broadcast command, you can disable an interface
from forwarding broadcast packets.
By default, disable the interface from forwarding broadcast packets.
Format
ip forward-broadcast [ acl acl-number ]
undo ip forward-broadcast
Parameters
Parameter Description Value
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
The ip forward-broadcast command can not be used on Layer 2 interfaces.
Example
# Enable VLANIF100 to forward broadcast packets.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip forward-broadcast
Format
ip soft-forward enhancement disable
Parameters
None.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure forwarding policies (such as QoS policies) for data packets to
implement differentiated services. In some scenarios, you may need to manage
control packets generated by the device to process different control packets. For
example, carriers have limited the bandwidth of data packets through QoS policies
and also want to limit the bandwidth of control packets. In this situation, QoS
policies take effect only for data packets. You can configure the enhanced
forwarding function to make QoS policies take effect for control packets.
Currently, the enhanced forwarding function is valid only for the control packets
generated by the device but not for the control packets forwarded by other
devices.
You can run the undo ip soft-forward enhancement disable command to enable
the enhanced forwarding function for control packets generated by the device.
Follow-up Procedures
After enabling the enhanced forwarding function on the device, you can perform
some configurations on the control packets generated by the device. For example,
you can configure different QoS policies for different types of packets generated
by the device.
Example
# Disable the enhanced forwarding function for control packets generated by the
device.
<HUAWEI> system-view
[HUAWEI] ip soft-forward enhancement disable
Format
ip verify source-address
undo ip verify source-address
Parameters
None
Views
VLANIF interface view, loopback interface view
Default Level
2: Configuration level
Usage Guidelines
The following IP addresses are illegal source addresses:
● Addresses with all 0s or 1s
● Multicast addresses (class D addresses)
● Class E addresses
● Loopback addresses that are not generated on local hosts (in 127.x.x.x
format)
● Broadcast addresses of classes A, B, and C
● Subnet broadcast addresses that are on the same network segment as the
address of the inbound interface
Run the display this command in the VLANIF interface view to check
configuration of checking validity of source IP addresses.
The interface only checks validity of source IP addresses of the packets that are
forwarded to the CPU and does not check validity of source IP addresses of the
packets that will be directly forwarded according to the FIB table.
Example
# Enable VLANIF100 to check validity of source addresses of received packets.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] ip verify source-address
Format
reset ip socket monitor [ task-id task-id socket-id socket-id ]
Parameters
Views
User view
Default Level
3: Management level
Usage Guidelines
You can specify the task ID and socket ID for deleting information about the
socket monitor that meets the filtering condition.
Example
# Clear information in a socket monitor.
<HUAWEI> reset ip socket monitor
Function
The load-balance command enables the per-packet load balancing mode of IP
Packet Forwarding.
Format
load-balance { flow | packet } [ all ]
Parameters
Parameter Description Value
flow Indicates flow-based load balancing. -
packet Indicates packet-based load balancing. -
all Configure per-flow load balancing on the local device. -
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The per-flow load balancing mode does not prevent packet loss in some services,
such as a voice service that has fixed source and destination IP addresses.
Therefore, if the per-flow load balancing mode does not meet the service
reliability requirement, run the load-balance packet command to enable the per-
packet load balancing mode.
Configuration Impact
This command takes effect for packets delivered by hosts and those processed by
the CPU.
Example
# Configure packet-based load balancing for IP packet forwarding.
<HUAWEI> system-view
[HUAWEI] load-balance packet
Function
The reset ip socket pktsort command resets statistics on the dual receive buffer
of the socket.
Format
reset ip socket pktsort task-id task-id socket-id socket-id
Parameters
Parameter Description Value
task-id task-id Specifies the ID of a task. The value is an integer ranging
from 1 to 150.
socket-id socket-id Specifies the ID of a The value is an integer range
socket. from 1 to 131072.
Views
User view
Default Level
3: Management level
Usage Guidelines
This command resets statistics on the dual receive buffer of the socket and thus
the count restarts. Therefore, confirm the action before you use the command.
Example
# Reset statistics on the dual receive buffer of the socket with the task ID of 2 and
the socket ID of 6.
<HUAWEI> reset ip socket pktsort task-id 2 socket-id 6
Function
The reset ip statistics command clears IP traffic statistics on an interface.
Format
reset ip statistics [ interface interface-type interface-number ]
Parameters
Parameter Description Value
interface interface-type Specifies the type and ID of an interface. If no -
interface-number optional parameter is specified, all the IP
statistics will be deleted.
Views
User view
Default Level
3: Management level
Usage Guidelines
To collect IP traffic statistics on an interface in a period of time, you must clear the
existing traffic statistics and collect IP statistics after a period of time. Run the
display ip statistics command to display information.
Example
# Clear IP statistics on all interfaces.
<HUAWEI> reset ip statistics
Function
The reset rawip statistics command clears RawIP packet statistics.
Format
reset rawip statistics
Parameters
None
Views
user view
Default Level
3: Management level
Usage Guidelines
The reset rawip statistics command clears RawIP packet statistics. Confirm your
action before running this command.
Example
# Clear RawIP packet statistics.
<HUAWEI> reset rawip statistics
Function
The reset tcp statistics command deletes TCP traffic statistics.
Format
reset tcp statistics
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
The reset tcp statistics command deletes TCP traffic statistics. Confirm your
action before running this command.
Example
# Delete TCP traffic statistics.
<HUAWEI> reset tcp statistics
Function
The reset udp statistics command deletes UDP traffic statistics.
Format
reset udp statistics
Parameters
None
Views
User view
Default Level
3: Management level
Usage Guidelines
The reset udp statistics command deletes UDP traffic statistics. Confirm your
action before running this command.
Example
# Delete UDP traffic statistics.
<HUAWEI> reset udp statistics
Format
snmp-agent trap enable feature-name tcp [ trap-name hwtcpmd5authenfail ]
undo snmp-agent trap enable feature-name tcp [ trap-name
hwtcpmd5authenfail ]
Parameters
Parameter Description Value
trap-name Enables the traps of TCP events of specified types. -
hwtcpmd5authenfail Indicates that the TCP MD5 authentication fails. It -
is an excessive trap.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If you do not specify trap-name, all traps of the TCP module will be enabled.
Example
# Enables the TCP MD5 authentication fails trap of TCP module.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name tcp trap-name hwtcpmd5authenfail
Format
tcp adjust-mss value
undo tcp adjust-mss
Parameters
Parameter Description Value
Views
ETH interface view, GE interface view, XGE interface view, MultiGE interface view,
Eth-Trunk interface view, VLANIF interface view, WAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The MSS of TCP packets is an option defined in TCP. It refers to the maximum
length of a TCP packet segment that can be received by the peer device. When
establishing the TCP connection, the local and peer ends negotiate the MSS value
to determine the maximum data length of TCP packets. If the length of a TCP
packet sent by the peer device exceeds the negotiated MSS, the TCP packet is
fragmented.
Precautions
● To prevent TCP packets from being fragmented, you must configure a proper
MSS based on the maximum transmission unit (MTU). The MTU is the option
to determine whether IP packets will be fragmented. If the size of an IP
packet exceeds the MTU, the IP packet will be fragmented. To ensure that a
complete packet is transmitted properly, the MSS value plus all the header
lengths (TCP header and IP header) cannot exceed the MTU. For example, a
CAPWAP-encapsulation TCP packet consists of an outer IP header (20 bytes),
a UDP header (8 bytes), a CAPWAP header (8 bytes), an ETH header (18
bytes), an inner IP header (20 bytes), a TCP header (20 bytes), and TCP data.
If the default MTU is 1500 on the device, the MSS value can be set to a
maximum of 1406 bytes so that the CAPWAP-encapsulated TCP packet is not
fragmented by the device. In case that the CAPWAP header or TCP header
carries option fields, it is recommended that you set the MSS to 1380 bytes.
● The tcp adjust-mss command does not only take effect for the wireless
access point functioning as the client or server used for TCP connections.
When another device functions as the client to perform MSS negotiation
through the wireless access point, the negotiation result is modified based on
the MSS configured on the wireless access point. In addition, the MSS value is
changed to the value configured using the tcp adjust-mss command only
when the MSS value received by the wireless access point is larger than the
value configured using the tcp adjust-mss command executed on the wireless
access point.
● If you run the tcp adjust-mss multiple times in the same interface view, only
the latest configuration takes effect.
Example
# Set the MSS of TCP packets on VLANIF100 to 1200 bytes.
<HUAWEI> system-view
[HUAWEI] interface vlanif 100
[HUAWEI-Vlanif100] tcp adjust-mss 1200
Format
tcp max-mss mss-value
undo tcp max-mss
Parameters
Parameter Description Value
mss-value Specifies the maximum MSS The value is an integer ranging
value for a TCP connection. from 32 to 9600, in bytes.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To establish a TCP connection, the MSS value is negotiated, which indicates the
maximum length of packets that the local device can receive. This length is the
TCP payload length, excluding that of the TCP header. If the path MTU is
unavailable on one end of a TCP connection, this end cannot adjust the TCP
packet size based on the MTU. As a result, this end may send TCP packets that are
longer than the MTUs on intermediate devices, which will discard these packets.
To prevent this problem, run the tcp max-mss command on either end of a TCP
connection to set the maximum MSS value of TCP packets. Then the MSS value
negotiated by both ends will not exceed this maximum MSS value, and
accordingly TCP packets sent from both ends will not be longer than this
maximum MSS value and can travel through the intermediate network.
Precautions
The maximum MSS value configured using the tcp max-mss command must be
greater than the minimum MSS value configured using the tcp min-mss
command.
Example
# Set the maximum MSS value for a TCP connection to 1024 bytes.
<HUAWEI> system-view
[HUAWEI] tcp max-mss 1024
Format
tcp min-mss mss-value
Parameters
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To establish a TCP connection, the MSS value is negotiated, which indicates the
maximum length of packets that the local device can receive. The TCP client on a
network may send a request packet for establishing a TCP connection carrying a
small MSS value. For example, the MSS value is 1. After the TCP server receives
the request packet carrying the MSS value, the TCP connection is established. The
TCP client then may send large numbers of requests to the server by an
application, causing the TCP server to generate large numbers of reply packets.
This may burden the TCP server or network, causing denial of service (DoS)
attacks. To resolve this problem, run the tcp min-mss command to set the
minimum MSS value for a TCP connection. This configuration prevents a server
from receiving packets carrying a small MSS value.
Precautions
If the tcp min-mss command is run more than once in the same view, the latest
configuration overrides the previous one.
Example
# Set the minimum MSS value for a TCP connection to 512 bytes.
<HUAWEI> system-view
[HUAWEI] tcp min-mss 512
Function
The tcp timer fin-timeout command configures the value of the TCP FIN-Wait
timer.
The undo tcp timer fin-timeout command restores the default value of the TCP
FIN-Wait timer.
Format
tcp timer fin-timeout interval
Parameters
Parameter Description Value
interval Specifies the value of the The value is an integer that ranges
TCP FIN-Wait timer. from 76 to 3600, in seconds. The
default value is 675s.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a TCP connection changes from FIN_WATI_1 to FIN_WAIT_2, the TCP FIN-
Wait timer is started. If no response packet is received after the TCP FIN-Wait
timer expires, the TCP connection is closed.
If you run this command in the same view for multiple times, only the last
configuration takes effect.
You are advised to configure this parameter under the supervision of technical
support personnel.
Example
# Set the value of the TCP FIN-Wait timer to 400s.
<HUAWEI> system-view
[HUAWEI] tcp timer fin-timeout 400
Function
The tcp timer syn-timeout command configures the value of the TCP SYN-Wait
timer.
The undo tcp timer syn-timeout command restores the default value of the TCP
SYN-Wait timer.
Format
tcp timer syn-timeout interval
Parameters
Parameter Description Value
interval Specifies the value of the The value is an integer ranging from
TCP SYN-Wait timer. 2 to 600, in seconds. The default
value is 75s.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When an SYN packet is sent, the TCP SYN-Wait timer is started. If no response
packet is received after the TCP SYN-Wait timer expires, the TCP connection is
closed.
If you run this command in the same view for multiple times, only the last
configuration takes effect.
You are advised to configure this parameter under the supervision of technical
support personnel.
Example
# Set the value of the TCP SYN-Wait timer to 100s.
<HUAWEI> system-view
[HUAWEI] tcp timer syn-timeout 100
Format
tcp window window-size
undo tcp window
Parameters
Parameter Description Value
window-size Specifies the size of the receive The value is an integer that ranges
or send buffer of a connection- from 1 to 32, in K bytes. The
oriented socket. default value is 8K bytes.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
If you run this command in the same view for multiple times, only the last
configuration takes effect.
You are advised to configure this parameter under the supervision of technical
support personnel.
Example
# Set the size of the receive or send buffer of a connection-oriented socket to 3K
bytes.
<HUAWEI> system-view
[HUAWEI] tcp window 3
Format
display fib [ slot-id ] [ verbose ]
Parameters
Parameter Description Value
slot-id The value is an integer and the
Displays information about the FIB
value range depends on the
table with a specified slot ID.
device configuration.
verbose Displays detailed information -
about the FIB table.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The display fib command displays information about the FIB table. Each row
represents a route.
NOTE
If there are lots of routes, using wildcard (|, begin, exclude, include, regular-expression) to
display information or details lasts a long time. You can press Ctrl+C to terminate information
display.
Example
# Display brief information about the FIB table.
<HUAWEI> display fib
Route Flags: G - Gateway Route, H - Host Route, U - Up Route
S - Static Route, D - Dynamic Route, B - Black Hole Route
L - Vlink Route
--------------------------------------------------------------------------------
FIB Table:
Total number of Routes : 8
Item Description
Item Description
Item Description
Format
display fib interface interface-type interface-number
Parameters
Parameter Description Value
interface-type interface- Specifies the type and number of the outbound -
number interface to a specified destination address.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display FIB entries with a specified outbound interface.
<HUAWEI> display fib interface vlanif10
Destination/Mask Nexthop Flag TimeStamp Interface TunnelID
10.1.1.0/24 10.1.1.2 U t[115] Vlanif10 0x0
Item Description
Function
The display fib ip-prefix command displays information about the FIB table.
Format
display fib ip-prefix prefix-name [ verbose ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The command displays FIB entries that match a specified IP prefix list.
If 0 FIB entries match, the command output displays that zero FIB entries match.
If the name of an IP prefix list is not found, all FIB entries are displayed.
Example
# Display FIB entries matching the IP prefix list abc0.
<HUAWEI> display fib ip-prefix abc0
Route Entry matched by prefix-list abc0
Summary Counts: 4
Destination/Mask Nexthop Flag TimeStamp Interface TunnelID
127.0.0.0/8 127.0.0.1 U t[0] InLoop0 0x0
127.0.0.1/32 127.0.0.1 U t[0] InLoop0 0x0
172.16.0.0/8 10.1.1.1 SU t[0] Vlanif10 0x0
172.16.0.0/15 10.1.1.1 SU t[0] Vlanif10 0x0
Item Description
Item Description
Format
display fib [ slot-id ] destination-address1 [ destination-mask1 ] [ longer ]
[ verbose ]
display fib [ slot-id ] destination-address1 destination-mask1 destination-
address2 destination-mask2 [ verbose ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display FIB entries that match destination address 172.16.0.0 in the natural
mask range or based on the longest match principle.
<HUAWEI> display fib 172.16.0.0
Route Entry Count: 1
Destination/Mask Nexthop Flag TimeStamp Interface TunnelID
172.16.0.0/16 10.1.1.1 U t[0] Vlanif10 0x0
# Display the FIB entries with the destination addresses in the range of
172.16.0.0/16 to 172.16.0.6/16.
<HUAWEI> display fib 172.16.0.0 255.255.0.0 172.16.0.6 255.255.0.0
Route Entry Count: 1
Destination/Mask Nexthop Flag TimeStamp Interface TunnelID
172.16.0.1/8 10.1.1.1 U t[0] Vlanif10 0x0
Format
display fib next-hop ip-address
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display FIB entries that match a specified next-hop IP address.
<HUAWEI> display fib next-hop 10.1.1.1
Destination/Mask Nexthop Flag TimeStamp Interface TunnelID
10.1.1.1/32 10.1.1.1 HU t[115] Vlanif10 0x0
Item Description
Item Description
Function
The display fib statistics command displays the total number of IPv4 FIB entries.
Format
display fib [ slot-id ] statistics [ all ]
Parameters
Parameter Description Value
slot-id Slot ID. The value is an integer and the value
range depends on the device
configuration.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
None
Example
# Display the total number of FIB entries on the device.
<HUAWEI> display fib statistics
Route Entry Count : 30
Route Prefix Count : 30
IPv4 FIB Total Route Prefix Count: Numbers of route prefix entries and FIB
Entry Count: entries.
IPv4 FIB Public Route Prefix Numbers of IP route prefix entries and FIB
Count: Entry Count: entries on a public network.
Format
display ip routing-table [ verbose ]
display ip routing-table ip-address [ mask | mask-length ] [ longer-match ]
[ verbose ]
display ip routing-table ip-address { mask | mask-length } nexthop nexthop-
address [ verbose ]
display ip routing-table ip-address1 { mask1 | mask-length1 } ip-address2
{ mask2 | mask-length2 } [ verbose ]
Parameters
Parameter Description Value
ip-address Displays the routes with the specified The value is in dotted
destination address. decimal notation.
nexthop Displays the routes with the specified The value is in dotted
nexthop-address next-hop address. decimal notation.
mask1 Specifies the subnet mask of the start The value is in dotted
IP address. decimal notation.
mask-length1 Specifies the mask length of the start The value is an integer
IP address. that ranges from 0 to
32.
mask2 Specifies the subnet mask of the end The value is in dotted
IP address. decimal notation.
mask-length2 Specifies the mask length of the end The value is an integer
IP address. that ranges from 0 to
32.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If the verbose keyword is not specified in the display ip routing-table command,
each line in the command output indicates a route, including the destination
address, mask length, protocol, preference, cost, flag, next hop, and outbound
interface of the route.
NOTE
An iterated route is counted as one route regardless of how many outbound interfaces and
next hops the route finds.
Example
# Display brief information about the current IPv4 routing table. The command
output shows that there are two static routes with the same destination address
10.1.1.1/32 but different next hops.
<HUAWEI> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public Destinations : 8 Routes : 9
# Display brief information about the current routing table. Route 10.2.2.2/32 is a
static route with next hop 10.1.1.1. This route is an iterated route and has two
outbound interfaces because 10.1.1.1 has two outbound interfaces.
<HUAWEI> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Destination: 10.0.0.36/32
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
NextHop: 127.0.0.1 Neighbour: 0.0.0.0
State: Active Adv Age: 01h03m56s
Tag: 0 Priority: high
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: InLoopBack0
TunnelID: 0x0 Flags: D
Destination: 10.35.36.0/24
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
NextHop: 10.35.36.2 Neighbour: 0.0.0.0
State: Active Adv Age: 00h26m36s
Tag: 0 Priority: high
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: Vlanif10
TunnelID: 0x0 Flags: D
Destination: 10.35.36.2/32
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
NextHop: 127.0.0.1 Neighbour: 0.0.0.0
State: Active Adv Age: 00h26m46s
Tag: 0 Priority: high
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: Vlanif10
TunnelID: 0x0 Flags: D
Destination: 10.35.36.255/32
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
NextHop: 127.0.0.1 Neighbour: 0.0.0.0
State: Active Adv Age: 00h26m46s
Tag: 0 Priority: high
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: Vlanif10 TunnelID: 0x0 Flags: D
Destination: 127.0.0.0/8
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
Destination: 127.0.0.1/32
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
NextHop: 127.0.0.1 Neighbour: 0.0.0.0
State: Active NoAdv Age: 3d01h20m39s
Tag: 0 Priority: high
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: InLoopBack0
TunnelID: 0x0 Flags: D
Destination: 127.255.255.255/32
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
NextHop: 127.0.0.1 Neighbour: 0.0.0.0
State: Active NoAdv Age: 3d01h20m46s
Tag: 0 Priority: high
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: InLoopBack0
TunnelID: 0x0 Flags: D
Destination: 255.255.255.255/32
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
NextHop: 127.0.0.1 Neighbour: 0.0.0.0
State: Active NoAdv Age: 3d01h20m54s
Tag: 0 Priority: high
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: InLoopBack0
TunnelID: 0x0 Flags: D
Item Description
Format
display ip routing-table protocol protocol [ inactive | verbose ]
display ip routing-table protocol unr [ type unr-type ] [ inactive | verbose ]
Parameters
Parameter Description Value
type unr-type Displays the information about user The value of unr-type
network routes of a specified type. can be set only to
aaa-download.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If neither verbose nor inactive is specified, brief information about all the routes
of each routing protocol is displayed.
Example
# Display brief information about all direct routes.
Item Description
Function
The display ip routing-table statistics command displays statistics about routes
in an IPv4 routing table.
Format
display ip routing-table statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Route statistics include:
● Total number of routes that are added or deleted through routing protocols
● Number of active or inactive routes that are labeled for deletion but are not
deleted
Example
# Display statistics about routes in an IPv4 routing table.
<HUAWEI> display ip routing-table statistics
Summary Prefixes: 9
Proto total active added deleted freed
routes routes routes routes routes
DIRECT 6 6 42 36 36
STATIC 3 3 21 18 18
UNR 0 0 0 0 0
Total 9 9 63 54 54
Format
display ip routing-table time-range min-age max-age [ verbose ]
Parameters
Parameter Description Value
min-age Specifies the end The value is in xxdxxhxxmxxs format.
time of the period
when routes are ● d indicates days. The value is an integer
generated. that ranges from 0 to 10000.
● h indicates hours. The value is an integer
that ranges from 0 to 23.
● m indicates minutes. The value is an
integer that ranges from 0 to 59.
● s indicates seconds. The value is an integer
that ranges from 0 to 59.
For example, you can enter 5d4h30m20s to
specify 5 days, 4 hours, 30 minutes, and 20
seconds.
NOTE
If the value of d is 10000, the values of h, m, and s
can only be 0.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
If route flapping occurs on a network, you can run the display ip routing-table
time-range command and specify a small time range for the command. You can
then find the flapping route rapidly and accelerate fault location.
Precautions
If max-age is larger than min-age but no route was generated within this time
range, the display ip routing-table time-range command displays only the table
heading.
Example
# Display information about public network routes generated in the last 20
minutes.
<HUAWEI> display ip routing-table time-range 0 20m
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 2 Routes : 2
Item Description
Item Description
# Display detailed information about public network routes generated in the last
20 minutes.
<HUAWEI> display ip routing-table time-range 0 20m verbose
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 3 Routes : 3
Destination: 3.3.3.3/32
Protocol: Direct Process ID: 0
Preference: 0 Cost: 0
NextHop: 127.0.0.1 Neighbour: 0.0.0.0
State: Active Adv Age: 00h14m06s
Tag: 0 Priority: high
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: LoopBack1
TunnelID: 0x0 Flags: D
Destination: 4.4.4.0/24
Protocol: Static Process ID: 0
Preference: 60 Cost: 0
NextHop: 0.0.0.0 Neighbour: 0.0.0.0
State: Active Adv Age: 00h01m38s
Tag: 0 Priority: medium
Label: NULL QoSInfo: 0x0
IndirectID: 0x0
RelayNextHop: 0.0.0.0 Interface: NULL0
TunnelID: 0x0 Flags: D
Destination: 4.4.4.4/32
Protocol: Static Process ID: 0
Preference: 60 Cost: 0
NextHop: 4.4.4.0 Neighbour: 0.0.0.0
State: Invalid Adv Relied Age: 00h01m38s
Tag: 0 Priority: medium
Label: NULL QoSInfo: 0x0
IndirectID: 0x80000002
RelayNextHop: 0.0.0.0 Interface: NULL0
TunnelID: 0x0 Flags: R
Item Description
Function
The display rm interface command displays routing management (RM)
information on an interface.
Format
display rm interface [ interface-type interface-number ]
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use this command to view IPv4 RM information on an interface, including
information about physical and logical interfaces of the interface. This information
helps locate routing problems.
Example
# Display RM information on interfaces.
<HUAWEI> display rm interface
Name: InLoopBack0
Physical IF Info:
IfnetIndex: 0x1
State: UP LOOP MULT
Slot: 0(Logic Slot: 0)
IntType: 26, PriLog: 1, MTU: 1500, Reference Count 16
Bandwidth: 0, 0
Baudrate: 0, 0
Delay: 0, Reliability: 0, Load: 0
LDP-ISIS sync capability: disabled
LDP-OSPF sync capability: disabled
InstanceID: 0, Instance Name: Public
Age: 20601sec
Logical IF Info:
IfnetIndex: 0x1, PhyIndex: 1 Logical Index : 1,
Dest: 127.0.0.1, Mask: 255.0.0.0
State: UP LOOP PRM MULT , Reference Count 14
Age: 20601sec
......
Item Description
Item Description
Function
The display route resource command displays statistics about IPv4 and IPv6 route
prefixes in the routing table.
Format
display route resource
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To check statistics about IPv4 and IPv6 route prefixes in the routing table, run the
display route resource command.
Example
# Display statistics about IPv4 and IPv6 route prefixes in the routing table.
<HUAWEI> display route resource
Total number of IPv4 Prefixes: 16
Total number of IPv6 Prefixes: 13
Item Description
Function
The reset ip routing-table statistics protocol command clears route statistics in
an IPv4 routing table.
Format
reset ip routing-table statistics protocol { all | protocol }
Parameters
Parameter Description Value
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use this command to clear route statistics in an IPv4 routing table,
including statistics about the routes added, deleted, and released by each routing
protocol. Subsequently, the system can collect route statistics of each routing
protocol again to monitor route changes and locate network faults.
Precautions
IPv4 route statistics cannot be restored after being cleared. Exercise caution when
you use this command.
Example
# Clear route statistics of all routing protocols in an IPv4 routing table.
<HUAWEI> reset ip routing-table statistics protocol all
7.12.1 ip route-static
Function
The ip route-static command configures a unicast static route.
By default, the system does not configure IPv4 unicast static routes.
Format
ip route-static ip-address { mask | mask-length } { nexthop-address | interface-
type interface-number [ nexthop-address ] } [ preference preference | tag tag ] *
[ permanent | inherit-cost ] [ description text ]
Parameters
tag tag Specifies the tag value of a static The value is an integer
route. By configuring different tag that ranges from 1 to
values, you can classify static 4294967295. The default
routes to implement different value is 0.
routing policies. For example,
other routing protocols can
import static routes with specified
tag values through routing
policies.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On a simple network, you only need to configure static routes to ensure that the
network runs properly. When the wireless access point cannot use dynamic routing
protocols or establish a route to the destination network, configure static routes.
Precautions
Example
# Set the next-hop address of the default route to 172.16.0.1.
<HUAWEI> system-view
[HUAWEI] ip route-static 0.0.0.0 0.0.0.0 172.16.0.1
Function
The ip route-static default-preference command sets the default preference for
IPv4 static routes.
Format
ip route-static default-preference preference
Parameters
Parameter Description Value
preference Specifies the default preference The value is an integer that
for IPv4 static routes. ranges from 1 to 255.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can change the preference of a static route to change the status of the route.
To change the default preference of a new IPv4 static route, run the ip route-
static default-preference command.
Example
# Set the default preference of IPv4 static routes to 70.
<HUAWEI> system-view
[HUAWEI] ip route-static default-preference 70
Function
The ip route-static selection-rule relay-depth command enables static routes to
be selected based on the iteration depth.
Format
ip route-static selection-rule relay-depth
undo ip route-static selection-rule relay-depth
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Use the ip route-static selection-rule relay-depth command to enable static
routes to be selected based on the iteration depth.
Precautions
In the system, some static routes have the same prefix and preference but
different iteration depths. After the system enables static routes to be selected
based on the iteration depth, the static route module selects the static route with
the smallest iteration depth as the active route and delivers it to the FIB table.
Other static routes then become inactive.
Example
# Enable static routes to be selected based on the iteration depth.
<HUAWEI> system-view
[HUAWEI] ip route-static selection-rule relay-depth
Format
display igmp-snooping configuration
Parameters
None.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
This command displays only the IGMP snooping configuration so that you can
check whether the IGMP snooping configuration made in the system is proper.
Prerequisites
Example
# Display the IGMP snooping configuration in all VLANs.
<HUAWEI> display igmp-snooping configuration
IGMP Snooping Configuration for VLAN 7
igmp-snooping enable
igmp-snooping version 3
igmp-snooping ssm-mapping enable
igmp-snooping ssm-policy 2000
igmp-snooping ssm-mapping 232.1.1.0 255.255.255.0 10.1.2.1
Item Description
Item Description
Function
The display l2-multicast forwarding-table command displays the Layer 2
multicast forwarding table.
Format
display l2-multicast forwarding-table vlan vlan-id
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After completing IGMP snooping configuration, you can use the display l2-
multicast forwarding-table command to view the Layer 2 multicast forwarding
table. This command displays dynamic learned multicast forwarding entries.
Precautions
This command displays Layer 2 multicast forwarding entries in a VLAN only when
at least one interface in the VLAN is in Up state.
Example
# Display Layer 2 multicast forwarding entries in VLAN 10.
<HUAWEI> display l2-multicast forwarding-table vlan 10
VLAN ID: 10
--------------------------------------------------------------------------------
(Source, Group) Interface
--------------------------------------------------------------------------------
(*, 225.1.1.1) GigabitEthernet0/0/0
(*, 225.1.1.2) GigabitEthernet0/0/0
--------------------------------------------------------------------------------
Total Group(s): 2
Format
igmp-snooping enable
undo igmp-snooping enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
IGMP snooping runs on a Layer 2 device between a Layer 3 multicast device and
hosts. By listening on the multicast protocol packets exchanged between the Layer
3 device and hosts, IGMP snooping maintains a multicast forwarding table to
control Layer 2 multicast forwarding.
Precautions
When you disable IGMP snooping globally, all the IGMP snooping configurations
are deleted. When you run the igmp-snooping enable command to enable IGMP
snooping globally again, the wireless access point uses the default IGMP snooping
configuration.
Example
# Enable IGMP snooping globally.
<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
Function
The igmp-snooping enable command enables IGMP snooping in a VLAN.
Format
igmp-snooping enable
Parameters
None
Views
VLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
By default, IGMP snooping is disabled in a VLAN after IGMP snooping is enabled
in the system view. To enable IGMP snooping in a VLAN, run the igmp-snooping
enable command in the VLAN view.
Prerequisites
IGMP snooping has been enabled globally using the igmp-snooping enable
(system view) command.
Configuration Impact
After IGMP snooping is enabled in a VLAN, this function takes effect only on
interfaces in this VLAN.
Example
# Enable IGMP snooping in VLAN 2.
<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] vlan 2
[HUAWEI-vlan2] igmp-snooping enable
8 WAN Commands
Function
Using the dialer queue-length command, you can set the buffer queue length on
a dial interface.
Using the undo dialer queue-length command, you can restore the default
queue length.
Format
dialer queue-length packets
Parameters
Parameter Description Value
packets Indicates the number of packets The value is an integer that
allowed in the buffer queue. ranges from 1 to 100.
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a dialer interface receives a packet but the call connection is not established, the
dialer interface discards the packet. However, if a buffer queue is configured on
the dialer interface, the dialer interface stores the packet in the buffer, and sends
the packet after the call connection is established.
Precautions
● If you run the dialer queue-length command multiple times in the same
view, only the latest configuration takes effect.
● If the buffer queue is long, the interface discards less packets, but a lot of
system resources will be occupied. It is recommended that the queue length
value be equal to or smaller than 20.
Example
# Set the buffer queue length on Dialer1 to 10.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] dialer queue-length 10
Function
The dialer retry limit command sets the quiet duration and retransmission times
in the quiet duration.
The undo dialer retry limit command restores the default settings.
By default, the quiet duration and retransmission times in the quiet duration are
not set on a router.
Format
dialer retry limit counts quiet-period period
Parameters
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a device of other vendors functions as the PPPoE server, it limits the number
of connection attempts of a client in a specified period (quiet duration). When the
number of connection attempts exceeds the threshold, the device no longer
receives connection requests from the client.
To address this problem, set the quiet duration and retransmission times in the
quiet duration. When the number of retransmission times in the quiet duration
exceeds the threshold, the client stops sending connection requests to the server
until the quiet duration times out.
Precautions
If you run the dialer retry limit command multiple times in the same view, only
the latest configuration takes effect.
Example
# Set the quiet duration to 10s and retransmission times in the quiet duration to
20.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] dialer retry limit 20 quiet-period 10
Function
Using the dialer timer idle command, you can set the maximum link idle time on
an interface. During this period of time, no Interesting packet is transmitted over
the link.
Using the undo dialer timer idle command, you can restore the default link idle
time.
Format
dialer timer idle seconds
Parameters
Parameter Description Value
seconds Specifies the maximum The value is an integer that ranges from
link idle time. 0 to 65535, in seconds. The default value
is 120.
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The dialer timer idle command sets the maximum idle time for links. If no data is
transmitted over a link within the idle time, the link is disconnected. This saves
resources and costs.
Precautions
● If you run the dialer timer idle command multiple times in the same view,
only the latest configuration takes effect.
● This command affects only new calls but not the established calls.
Example
# Set the maximum link idle time on Dialer1 to 100 seconds.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] dialer timer idle 100
8.1.4 dialer-rule
Function
The dialer-rule command configures a dialer access control list (ACL) to define
conditions for initiating DCC calls.
The undo dialer-rule command deletes a dialer ACL.
By default, no dialer ACL is configured.
Format
dialer-rule { acl { acl-number | name acl-name } | ip { deny | permit } }
undo dialer-rule [ acl | ip ]
Parameters
Parameter Description Value
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Create dialer interface 1, which permits all IPv4 packets.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] dialer-rule ip permit
Format
display interface dialer [ main | number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When monitoring the interface status or locating faults on a dialer interface, run
the display interface dialer command on the interface. According to the
command output, you can collect traffic statistics and locate faults on the
interface.
Example
# Display information about interface dialer 1.
<HUAWEI> display interface dialer 1
Dialer1 current state : UP
Line protocol current state : UP (spoofing)
Description:HUAWEI, AP Series, Dialer1 Interface
Route Port,The Maximum Transmit Unit is 1500, Hold timer is 10(sec)
Internet Address is 10.10.10.10/24
Link layer protocol is PPP
LCP opened
Physical is Dialer
Current system time: 2010-08-24 22:57:27-05:13
Last 300 seconds input rate 0 bits/sec, 0 packets/sec
Last 300 seconds output rate 0 bits/sec, 0 packets/sec
Realtime 0 seconds input rate 0 bits/sec, 0 packets/sec
Realtime 0 seconds output rate 0 bits/sec, 0 packets/sec
Input: 0 bytes
Output:0 bytes
Input bandwidth utilization : 0%
Output bandwidth utilization : 0%
Item Description
Hold timer Heartbeat interval after the PPP LCP negotiation status
becomes Opened.
Item Description
Item Description
Last 300 seconds Rates of packets sent and received in the last 300 seconds,
input rate 0 bits/ expressed in bits per second and packets per second.
sec, 0 packets/sec
Last 300 seconds
output rate 0 bits/
sec, 0 packets/sec
Realtime 0 seconds Rates of packets sent and received when the display
input rate 0 bits/ interface dialer command is being executed.
sec, 0 packets/sec
Realtime 0 seconds
output rate 0 bits/
sec, 0 packets/sec
Input: 0 bytes Total number of bytes sent and received by the interface.
Output:0 bytes
Format
display pppoe-client session { packet | summary } [ dial-bundle-number
number ]
Parameters
Parameter Description Value
packet Displays the packet statistics of PPPoE -
sessions.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To monitor PPPoE sessions on the PPPoE client, use this command to obtain the
session status and statistics. You can locate PPPoE faults according to the
command output.
Example
# Display the summary of all PPPoE sessions on the PPPoE client.
<HUAWEI> display pppoe-client session summary
PPPoE Client Session:
ID Bundle Dialer Intf Client-MAC Server-MAC State
1 1 1 Vlanif1 00e0fc030201 0819a6cd0680 UP
ID ID of a PPPoE session.
Item Description
Item Description
ID ID of a PPPoE session.
Function
The display pppoe fail-reason command displays PPPoE dialup failure reasons.
Format
display pppoe fail-reason
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
When PPPoE dialup fails, you can run this command to check for PPPoE dialup
failure reasons and locate faults.
Example
# Display PPPoE dialup failure reasons.
<HUAWEI> display pppoe fail-reason
--------------------------------------------------------------------------
Dialer Last fail time Reason
--------------------------------------------------------------------------
1 2017-08-21/16:57:14 Incorrect user name or password
--------------------------------------------------------------------------
Item Description
Last fail time Time when PPPoE dialup fails last time.
Reason Reason why PPPoE dialup fails. Table 8-5 lists PPPoE
dialup failure reasons and handling suggestions.
Failed to find The device fails to find the Check whether the network
the server PPPoE server. connection between the
active and standby servers is
normal.
Incorrect user The user name or password is Enter the correct user name
name or incorrect. and password. If the fault
password persists, contact technical
support personnel.
Failed to set Connection setup fails due to Wait for the device to set up a
up a a session establishment connection again
connection failure. automatically. If the fault
(session persists, contact technical
establishment support personnel.
failure)
Format
interface dialer number
undo interface dialer number
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
A dialer interface is a logical interface for connecting a PPPoE client to a PPPoE
server.
Example
# Create interface dialer 1.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
Format
ip address ppp-negotiate
undo ip address ppp-negotiate
Parameters
None
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the local interface runs PPP at the link layer but is not assigned an IP address,
and the remote device has IP addresses, you can configure IP address negotiation
on the local interface so that it can obtain an IP address from the remote device.
For example, when the client accesses the Internet through an Internet Server
Provider (ISP) network, it can obtain an IP address from the ISP.
Prerequisites
The address assignment function has been enabled on the remote device.
Example
# Configure IP address negotiation on Dialer1.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] ip address ppp-negotiate
Function
The ppp chap password command configures a password for CHAP
authentication.
The undo ppp chap password command deletes the password of CHAP
authentication.
Format
ppp chap password { cipher | simple } password
Parameters
Parameter Description Value
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the authenticating device uses CHAP as PPP authentication, configure the user
name and password for CHAP authentication on the authenticated device.
Precautions
After the ppp chap password and ppp chap user commands are used, the device
sends the configured password and user name to the remote device for
authentication.
The ppp chap password command must be used on the authenticated device,
and the configured password must be the same as that configured on the
authenticating device.
Example
# Configure password test@123 for CHAP authentication on Dialer1.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] ppp chap password cipher test@123
Format
ppp chap user username
undo ppp chap user
Parameters
Parameter Description Value
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the authenticating device uses CHAP as PPP authentication, configure the user
name and password for CHAP authentication on the authenticated device.
Precautions
After the ppp chap password and ppp chap user commands are used, the device
sends the configured password and user name to the remote device for
authentication.
The ppp chap user command must be used on the authenticated device, and the
configured user name must be the same as that configured on the authenticating
device.
Example
# Configure user name test for CHAP authentication on Dialer1.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] ppp chap user test
Format
ppp keepalive retry-times retry-times
undo ppp keepalive retry-times
Parameters
Parameter Description Setting
Views
dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device sends PPP heartbeat packets to detect PPP link quality. When the link
quality is low and the number of times for retransmitting PPP heartbeat packets
reaches the upper limit, the device tears down the PPP connection.
● When services have high PPP link quality requirements and will be greatly
affected by poor link quality, decrease the number of times for retransmitting
PPP heartbeat packets to detect link quality and take measures in a timely
manner.
● When services have low PPP link quality requirements and will be slightly
affected by poor link quality, increase the number of times for retransmitting
PPP heartbeat packets to prevent frequent disconnection of PPP links.
Precautions
The command configuration on a PPP link takes effect on new online users, but
not existing online users.
Example
# Set the number of times for retransmitting PPP heartbeat packets to 5.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] ppp keepalive retry-times 5
Function
The ppp pap local-user command configures the user name and password to be
sent from the local device to the remote device in PAP authentication.
The undo ppp pap local-user command deletes the configured user name and
password.
By default, the local device sends a request to the remote device without the user
name and password in PAP authentication.
Format
ppp pap local-user username password { cipher | simple } password
Parameters
Parameter Description Value
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If the authenticating device uses PAP as PPP authentication, configure the user
name and password for PAP authentication on the authenticated device.
In PAP authentication, the local device needs to send the user name and password
to the remote device. The remote device checks its user table to determine
whether the local device passes the authentication or sends the user name and
password to the remote authentication server.
Precautions
The user name and password configured by using the ppp pap local-user
command must be the same as those configured on the remote device.
NOTE
In PAP authentication, the password is transmitted in plain text on the network no matter
whether you specify cipher or simple, which brings potential security risks.
Example
# Configure user name papuser1 and password test@123 on Dialer1.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] ppp pap local-user papuser1 password cipher test@123
Function
The ppp timer negotiate command sets the timeout period of PPP negotiation.
The undo ppp timer negotiate command restores the default setting.
Format
ppp timer negotiate seconds
Parameters
Parameter Description Value
Views
Dialer interface view
Default Level
2: Configuration level
Usage Guidelines
In PPP negotiation, if the local end does not receive any response from the remote
end within the specified timeout period, the local end retransmits the last packet
until it receives a response from the remote end.
Example
# Set the timeout period of PPP negotiation to 4 seconds on Dialer1.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] ppp timer negotiate 4
Format
pppoe-client dial-bundle-number number [ on-demand ] [ no-hostuniq ]
[ ppp-max-payload value ] [ service-name name ]
undo pppoe-client dial-bundle-number number
Parameters
Parameter Description Value
Views
VLANIF interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a device serves as a PPPoE client, PPPoE sessions can be configured on a
VLANIF interface.
Prerequisites
A dialer interface has been configured before the PPPoE session configuration.
Precautions
● If on-demand is not specified, the PPPoE session works in permanent online
mode. If this parameter is specified, the PPPoE session works in on-demand
dialing mode. The device supports the packet triggering mode for on-demand
dialing.
– In permanent online mode, the device initiates a PPPoE session
immediately after the physical link becomes Up. The PPPoE session
persists until you use the undo pppoe-client dial-bundle-number
number command to delete it.
– In triggered online mode, the device does not initiate a PPPoE session
immediately after the physical link becomes Up. Instead, the device
initiates a PPPoE session only when data needs to be transmitted on the
link. If the maximum idle time of the PPPoE link expires, the device
terminates the PPPoE session. When data needs to be transmitted on the
PPPoE link, the device sets up the PPPoE session again.
NOTE
Example
# Specify dialer bundle 1 for the PPPoE session on VLANIF 1.
<HUAWEI> system-view
[HUAWEI] interface vlanif 1
[HUAWEI-Vlanif1] pppoe-client dial-bundle-number 1
Function
The reset pppoe-client command resets all PPPoE sessions or a specified PPPoE
session on the PPPoE client. After a PPPoE session is reset, the PPPoE client will
establish the session later.
Format
reset pppoe-client { all | dial-bundle-number number }
Parameters
Parameter Description Value
all Resets all PPPoE sessions on the -
PPPoE client.
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The PPP parameters of a PPPoE session set after a PPP link is created do not take
effect immediately. To make the parameter settings effective, run the reset
pppoe-client command to reset the PPPoE session. The parameter settings take
effect after the PPPoE session is established again.
Configuration Impact
If all is specified, all the online PPPoE users are disconnected. If dial-bundle-
number is specified, the PPPoE users that dial up from the specified dialer
interface are disconnected.
If a PPPoE session in permanent online mode is reset, the device will establish the
session again after 16 seconds. If a PPPoE session in packet triggered mode is
reset, the device will establish the session again when data needs to be
transmitted using the session.
NOTE
The reset pppoe-client command terminates PPPoE sessions temporarily, and the sessions
will be established later; the undo pppoe-client dial-bundle-number command deletes
PPPoE sessions permanently.
Example
# Reset the PPPoE session created on dialer bundle 1.
<HUAWEI> reset pppoe-client dial-bundle-number 1
Format
timer hold seconds
undo timer hold
Parameters
Parameter Description Value
Views
dialer interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The polling interval of an interface is the interval at which the interface sends
Keepalive packets.
Keepalive packets are used to monitor and maintain the link status. If an interface
does not receive any Keepalive packet after five Keepalive intervals, it considers
that the link fails.
Precautions
On a low-speed link, the seconds parameter cannot be set to a small value
because it may take a long time to transmit oversized packets on the link. If the
interval for sending Keepalive packets is set to a small value, transmission of
Keepalive packets is delayed. If an interface does not receive any Keepalive packet
from the remote interface after five Keepalive intervals, the interface considers
that the link fails.
Example
# Set the interval for sending Keepalive packets to 15 seconds on Dialer1.
<HUAWEI> system-view
[HUAWEI] interface dialer 1
[HUAWEI-Dialer1] timer hold 15
9.87 utmost-power
9.88 vap-profile (WLAN view)
9.89 vap-profile (radio interface view)
9.90 vap-service-backup auth-server-down
9.91 vht a-mpdu max-length-exponent
9.92 vht a-msdu enable
9.93 vht a-msdu max-frame-num
9.94 vht mcs-map
9.95 vht mcs-map (SSID profile)
9.96 wlan
Format
active-dull-client enable
undo active-dull-client enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Due to individual reasons, some terminals may not run services normally when
entering energy-saving mode. You can run the active-dull-client enable
Example
# Enable the function of preventing terminals from entering energy-saving mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] active-dull-client enable
Format
advertise-ap-name enable
undo advertise-ap-name enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
In certain scenarios, you can run the advertise-ap-name enable command to
enable Beacon frames to carry the AP name. In this way, you can quickly locate
and identify APs by identifying the AP name carried in an SSID or display the AP
name on STAs that can receive and resolve the host name carried in SSIDs of
multiple APs.
Example
# Enable Beacon frames to carry the AP name in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] advertise-ap-name enable
9.3 agile-antenna-polarization
Function
The agile-antenna-polarization enable command enables self-adaptive
polarization for agile antennas.
The undo agile-antenna-polarization enable command disables self-adaptive
polarization for agile antennas.
By default, self-adaptive polarization is disabled for agile antennas.
NOTE
Format
agile-antenna-polarization enable
undo agile-antenna-polarization enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Self-adaptive polarization for agile antennas can reduce interference between
transmit signals of antennas, and increase the transmit power of antennas and the
demodulation SNR of STAs. When providing wireless coverage, you can enable this
function when the following types of STA exist:
● STA with one transmit antenna and one receive antenna in 1x1 mode
● STA with two transmit antennas and two receive antennas in 2x2 mode
After this function is enabled, the AP uses two mutually orthogonal antennas to
communicate with STAs but not a third antenna.
Prerequisites
Dual-polarized antennas have been connected to radio ports A and B on the same
frequency band.
Example
# Enable self-adaptive polarization for agile antennas in a 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] agile-antenna-polarization enable
9.4 antenna-gain
Function
The antenna-gain command configures the antenna gain of an AP radio.
Format
antenna-gain antenna-gain
undo antenna-gain
Parameters
Parameter Description Value
antenna-gain Specifies the The value is an integer that ranges from –10 to
antenna gain. 30, in dB.
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The antenna gain is the ratio of the power density produced by an antenna to the
power density that should be obtained at the same point if the power accepted by
the antenna were radiated equally. It can measure the capability for an antenna to
receive and send signals in a specified direction, which is one of the most
important parameters to select a BTS antenna. In the same condition, if the
antenna gain is high, the wave travels far.
Precautions
Example
# Set the antenna gain to 4 for the radio interface Wlan-Radio 0/0/0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] antenna-gain 4
9.5 association-timeout
Function
The association-timeout command configures an association aging time for STAs.
Format
association-timeout association-timeout
undo association-timeout
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The administrator can run the association-timeout command to set the
association aging time for STAs. If the AP receives no data packet from a STA in a
specified time, the STA goes offline after the association aging time expires.
Precautions
Changing the association aging time of a STA may interrupt the STA services.
Example
# Set the association aging time of STAs to 15 minutes in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] association-timeout 15
Warning: This action may cause service interruption. Continue?[Y/N]y
Format
auto-off service start-time start-time end-time end-time
Parameters
Parameter Description Value
Views
VAP profile view, 2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an enterprise does not want employees to access the internal WLAN from
01:00 to 05:00, the administrator can run the auto-off service command to
enable the scheduled VAP auto-off function.
Precautions
● After the service mode of a VAP is enabled using the undo service-mode
disable command, you can run the auto-off service command to configure
the scheduled VAP auto-off function. In the scheduled time, the VAP is
disabled and cannot be enabled using the undo service-mode disable
command. To enable the VAP, run the undo auto-off service command.
● The scheduled VAP auto-off function takes effect in the scheduled time only
after the undo service-mode disable command is executed. If the service
mode of a VAP is disabled using the service-mode disable command, the
VAP auto-off function does not take effect.
● You can run the auto-off service time-range time-range-name command to
set the time range when a VAP is disabled.
● The scheduled VAP auto-off function enabled in a VAP profile view takes
effect only on the APs using the VAP profile, and the scheduled VAP auto-off
function enabled in a radio profile view takes effect only on the APs using the
radio profile.
● auto-off service, start-time start-time, end-time end-time, and auto-off
service time-range time-range-name cannot be configured at the same time.
Example
# Configure the scheduled VAP auto-off function in the VAP profile vap1, and
configure the VAP to be disabled from 1:00:00 to 7:00:00.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] auto-off service start-time 1:00:00 end-time 7:00:00
# Configure the scheduled VAP auto-off function in the 2G radio profile default,
and configure the VAP to be disabled from 1:00:00 to 7:00:00.
<HUAWEI> system-view
[HUAWEI] time-range VAP 1:00 to 7:00 daily
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] auto-off service time-range VAP
9.7 beacon-2g-rate
Function
The beacon-2g-rate command sets the transmit rate of management frames
(including Beacon frames, Probe Response frames, Assoc/Reassoc Response
frames, and Auth frames) on a 2.4 GHz radio.
The undo beacon-2g-rate command restores the default transmit rate of 2.4 GHz
management frames.
Format
beacon-2g-rate beacon-2g-rate
undo beacon-2g-rate
Parameters
Parameter Description Value
Views
SSID profile view, Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In high-density wireless scenarios, too many management frames occupy a large
number of wireless resources. To reduce wireless resource occupation of
management frames and improve channel usage efficiency, you can run the
beacon-2g-rate command to set a large transmit rate for 2.4 GHz management
frames.
Precautions
Modifying the transmit rate of management frames will cause service interruption
of STAs. Exercise caution when running the command.
The 802.11b protocol supports only 1 Mbit/s, 2 Mbit/s, 5.5 Mbit/s, and 11 Mbit/s.
If you set the transmit rate of management frames to a rate not supported by the
802.11b protocol, STAs supporting only 802.11b cannot connect to the wireless
network.
If you run the radio-type dot11b command in the 2G radio profile view to set the
radio type to dot11b, and the 2G radio profile is applied to an AP, beacon-2g-rate
that takes effect on the 2 GHz radio of the AP is fixed as 1 Mbit/s, and beacon-2g-
rate configured in the SSID profile view does not take effect on the AP.
Example
# Set the transmit rate of 2.4 GHz management frames to 18 Mbit/s in the SSID
profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] beacon-2g-rate 18
9.8 beacon-5g-rate
Function
The beacon-5g-rate command sets the transmit rate of management frames
(including Beacon frames, Probe Response frames, Assoc/Reassoc Response
frames, and Auth frames) on a 5 GHz radio.
The undo beacon-5g-rate command restores the default transmit rate of 5 GHz
management frames.
Format
beacon-5g-rate beacon-5g-rate
undo beacon-5g-rate
Parameters
Parameter Description Value
Views
SSID profile view, Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In high-density wireless scenarios, too many management frames occupy a large
number of wireless resources. To reduce wireless resource occupation of
management frames and improve channel usage efficiency, you can run the
beacon-5g-rate command to set a large transmit rate for 5 GHz management
frames.
Precautions
Modifying the transmit rate of management frames will cause service interruption
of STAs. Exercise caution when running the command.
Example
# Set the transmit rate of 5 GHz management frames to 18 Mbit/s in the SSID
profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] beacon-5g-rate 18
9.9 beacon-interval
Function
The beacon-interval command sets the interval for sending Beacon frames.
The undo beacon-interval restores the default interval for sending Beacon
frames.
By default, the interval for sending Beacon frames is 100 TUs.
Format
beacon-interval beacon-interval
undo beacon-interval
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
An AP broadcasts Beacon frames at intervals to notify STAs of an existing 802.11
network. After receiving a Beacon frame, a STA can modify parameters used to
connect to the 802.11 network.
A long interval for sending Beacon frames lengthens the dormancy time of STAs,
while a short interval for sending Beacon frames increases air interface costs.
Therefore, you are advised to set the interval for sending Beacon frames for an AP
based on the VAP quantity. The following intervals for sending Beacon frames are
recommended for APs with different VAP quantities on a single radio:
● No more than 4 VAPs: about 100 TUs
● 5 to 8 VAPs: about 200 TUs
● 9 to 12 VAPs: about 300 TUs
● 13 to 16 VAPs: about 400 TUs
Ensure that the air scan interval meets the following condition: scan-interval ≥
beacon-interval + 100 ms
Example
# Set the interval for sending Beacon frames to 200 TUs in the 2G radio profile
default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] beacon-interval 200
NOTE
This configuration is valid only for APs of V200R019C00 and earlier versions.
Format
beamforming enable
undo beamforming enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Beamforming is a signal processing technique that controls signal transmission
direction, and transmission and reception of radio signals. The transmit end uses
weight to transmit signals. The signals are transmitted to the destination as
narrow beams. Beamforming increases the signal-to-noise ratio (SNR) for the
destination device.
Precautions
Table 9-1 describes the support of Huawei APs for beamforming.
AP5030DN,
AP5130DN,
AP2030DN,
AP2030DN-S,
AP3030DN,
AP4030DN,
AP4130DN,
AP3010DN-
V2,
AP5030DN-S,
AP9131DN, Y
AP9132DN,
AD9430DN-1 For
2 (with N AP4030TN, N N
R230D, only the radio
R240D), 0 supports
AD9430DN-2 this feature.
4 (with
R230D,
R240D),
AD9431DN-2
4X (with
R230D,
R240D),
AP4030DN-E,
AP4030TN,
AP430-E
AP8030DN,
AP8130DN, N N N N
AP1050DN-S
AD9430DN-1
2 (with
R250D,
R251D),
AD9430DN-2
4 (with
R250D,
R251D,
R450D,
R251D-E and
R250D-E),
AD9431DN-2
4X (with
R250D,
R251D,
R450D,
R251D-E and
R250D-E),
AP2050DN,
AP2050DN-S, Y Y
AP2050DN-E,
AP2051DN, For For
AP2051DN-E, AP2051DN-L- AP2051DN-L-
AP2051DN-S, S, only the N N S, only the
AP2051DN-L- 2.4G 2.4G
S, AP4050DN- frequency frequency
E, AP4050DN- band supports band supports
HD, this feature. this feature.
AP5050DN-S,
AP6050DN,
AP6150DN,
AP7050DN-E,
AP7050DE,
AP4050DN,
AP4051DN,
AP4050DN-S,
AP4151DN,
AP4051DN-S,
AP8050DN,
AP8150DN,
AP8050DN-S,
AP6052DN,
AP7052DN,
AP7152DN,
AP7052DE,
AP8050TN-
HD,
AP8082DN,
AP8182DN,
AP7060DN,
AP3050DE,
AP4050DE-M,
AP4050DE-M-
S, AP4050DE-
B-S,
AP4051TN,
WA375DD-
CE, AP5510-
W-GP,
AP6750-10T,
AirEngine
5760-10
AP7030DE,
N N N Y
AP9330DN
Example
# Enable Beamforming.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] beamforming enable
9.11 channel
Function
The channel command configures the working bandwidth and channel for a
specified radio.
The undo channel command restores the default working bandwidth and channel
of a radio.
By default, the working bandwidth of a radio is 20 MHz, and no working channel
is configured for a radio.
To check the channel used by a radio, run the display ap config-info command.
Format
channel { 20mhz | 40mhz-minus | 40mhz-plus | 80mhz | 160mhz } channel
channel 80+80mhz channel1 channel2
NOTE
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Different radios use different channels. Channels for radios also vary in different
countries and regions. Select channels based on the actual situations.
Precautions
The channel parameter settings must match the radio frequency band. For details
about mappings between channel parameters and frequency bands, see Country
Codes & Channels Compliance. You can obtain this table at Huawei technical
support website.
● Enterprise technical support website: https://support.huawei.com/enterprise
● Carrier technical support website: https://support.huawei.com
The configured channels must be supported by STAs; otherwise, the STAs cannot
discover radio signals.
If an AP works in dual-5G mode, configure the two 5 GHz radios to work on non-
adjacent channels.
For example, a country supports 40 MHz+ 5G channels 36, 44, 52, and 60. When
deploying 5 GHz radio channels, if one radio is deployed to work on channel 36, it
is recommended that channel 52 or 60 be configured for the other radio. Channel
44 is not recommended in this case.
NOTE
● You can configure the 80 MHz, 160 MHz, or 80+80 MHz bandwidth only in the 5G radio
view.
● For details about AP models that support 80 MHz, 160 MHz, and 80+80 MHz, see
Configuration Limitations for Basic WLAN Services in Configuration Guide - WLAN Service
Configuration Guide.
Example
# Set the working bandwidth to 20 MHz and working channel to 6 for the radio
interface Wlan-Radio 0/0/0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] channel 20mhz 6
Warning: This action may cause service interruption. Continue?[Y/N]y
Format
channel-switch announcement disable
undo channel-switch announcement disable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
When the AP works on a Depth First Select (DFS) channel, a radar detection is
performed. The AP automatically switches to another channel because the DFS
channel frequency may interfere with the radar frequency.
After the undo channel-switch announcement disable command is run, if the
AP channel switches, the AP sends an Action frame to instruct STAs to switch
channels after multiple Beacon intervals. The AP also switches the channel after
the same intervals. The AP and STAs switch channels at the same time to prevent
STA reassociations and ensure rapid service recovery.
NOTE
The channel switching announcement function must be supported by both the AP and STA.
Example
# Disable the AP from sending an announcement after the channel is switched.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] channel-switch announcement disable
Format
channel-switch mode { stop-transmitting | continue-transmitting }
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
During channel switching, STA communication is interrupted. The administrator
can stop an associated STA sending data on the current channel until channel
switching is complete. Alternatively, data transmission from STAs can be continued
on the current channel before channel switching is complete.
Example
# Stop data transmission from STAs on the current channel during channel
switching.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] channel-switch mode stop-transmitting
9.14 copy-from
Function
The copy-from command copies data to the current profile from a profile of the
same type.
Format
copy-from profile-name
Parameters
Parameter Description Value
profile-name Specifies the name of the profile from The profile name
which data is copied. must already exist.
Views
All WLAN profile views except the WIDS profile, WIDS whitelist profile view, WIDS
spoof SSID profile
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the copy-from command to copy data to the current profile from a
profile of the same type. This simplifies profile configuration and improves
configuration efficiency.
● To create a profile that has the same configuration as an existing profile,
enter the view of the profile to be created and run the copy-from command
to copy data from the existing profile.
● To create a profile that has most configurations the same as an existing
profile, enter the view of the new profile, run the copy-from command to
copy data from the existing profile, and modify the different configurations.
Precautions
If the current profile is referenced by another profile, you cannot run the
command to copy data to the current profile.
When the WAPI certificate or private key configuration exists in the security
profile, you must manually perform the configuration instead of using this
command to copy data.
Example
# Create the VAP profile huawei and copy data from the profile sample.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name huawei
[HUAWEI-wlan-vap-prof-huawei] copy-from sample
9.15 country-code
Function
The country-code command configures a country code.
The undo country-code command restores the default country code.
By default, the country code CN is configured.
Format
country-code country-code
undo country-code
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
AM Armenia
AR Argentina
AT Austria
AU Australia
AZ Azerbaijan
BE Belgium
BG Bulgaria
BH Bahrain
BN Brunei Darussalam
BO Bolivia
BR Brazil
BY Belarus
BZ Belize
CA Canada
CH Switzerland
CL Chile
CN China (default)
CO Colombia
CR Costa Rica
CY Cyprus
CZ Czech Republic
DE Germany
DK Denmark
DO Dominican Republic
EC Ecuador
EE Estonia
EG Egypt
ES Spain
FI Finland
FR France
GB United Kingdom
GE Georgia
GR Greece
GT Guatemala
HN Honduras
HR Croatia
HU Hungary
ID Indonesia
IE Ireland
IL Israel
IN India
IQ Iraq
IR Iran
IS Iceland
IT Italy
JO Jordan
JP Japan
KR Republic of Korea
KW Kuwait
KZ Kazakhstan
LB Lebanon
LI Liechtenstein
LK Sri Lanka
LT Lithuania
LU Luxembourg
LV Latvia
MA Morocco
MC Monaco
MK Macedonia
MT Malta
MX Mexico
MY Malaysia
NG Nigeria
NL Netherlands
NO Norway
NZ New Zealand
OM Oman
PA Panama
PE Peru
PH Philippines
PK Pakistan
PL Poland
PR Puerto Rico
PT Portugal
QA Qatar
RO Romania
RS Serbia
RU Russia
SA Saudi Arabia
SE Sweden
SG Singapore
SI Slovenia
SK Slovakia
SV El Salvador
SY Syria
TH Thailand
TN Tunisia
TR Turkey
UA Ukraine
US United States
UY Uruguay
UZ Uzbekistan
VE Venezuela
VN Vietnam
YE Yemen
ZA South Africa
ZW Zimbabwe
Usage Scenario
You can configure country codes for devices to satisfy different radio features in
different countries or regions, such as power and channel codes.
Configuration Impact
Example
# Set the country code to US.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] country-code us
Warning: Modifying the country code will clear channel, power and antenna gain configurations of the
radio. Continue?[Y/N]:y
Format
deny-broadcast-probe enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
Example
# Configure an AP not to respond to broadcast Probe Request frames.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] deny-broadcast-probe enable
Function
The dhcp option82 insert enable command enables the function of adding the
Option 82 field to DHCP packets sent by STAs.
The undo dhcp option82 insert enable command disables the function of adding
the Option 82 field to DHCP packets sent by STAs.
By default, the function of adding the Option 82 field to DHCP packets sent by
STAs is disabled.
Format
dhcp option82 insert enable
undo dhcp option82 insert enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After going online, a STA obtains the IP address through DHCP. When the DHCP
Request packet from the STA reaches an AP, the AP adds the Option 82 field to
the packet and sends the packet to the DHCP server. The Option 82 field contains
the MAC address or SSID of the associated AP. Therefore, the DHCP server knows
the AP on which the STA goes online.
Prerequisites
Before enabling the function of adding the Option 82 field to DHCP packets sent
by STAs, run the undo learn-client-address disable command to enable the STA
IP address learning. By default, STA IP address learning is enabled.
Example
# Enable the function of adding the Option 82 field to DHCP packets sent by STAs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] dhcp option82 insert enable
Format
dhcp option82 { circuit-id | remote-id } format { ap-mac [ mac-format
{ normal | compact | hex } ] | ap-mac-ssid [ mac-format { normal | compact } ]
| user-defined text | ap-name | ap-name-ssid }
Parameters
user-defined text Sets the format of Option 82 to the user- The value is a
defined format. string of 1 to 255
characters.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
After an AP is enabled to insert the Option 82 field in DHCP packets sent from a
STA, you can run the dhcp option82 format command to configure the format of
the Option 82 field.
You can use the following keywords to define the Option 82 field.
● ap-mac: MAC address of the AP. After DHCP packets from a STA reach an AP,
the AP inserts its MAC address into the Option 82 field of the DHCP packets.
● ap-mac-ssid: MAC address and SSID of the AP. After DHCP packets from a
STA reach an AP, the AP inserts its MAC address and SSID associated with the
STA into the Option 82 field of the DHCP packets.
● ap-name: AP name. After DHCP packets from a STA reach an AP, the AP
inserts its name into the Option 82 field of the DHCP packets.
● ap-name-ssid: AP name and SSID. After DHCP packets from a STA reach an
AP, the AP inserts its name and associated SSID into the Option 82 field of the
DHCP packets.
When you define the format of the Option 82 field, the total length of the circuit-
id and remote-id options in the Option 82 field cannot exceed 255 bytes.
Otherwise, some Option 82 information may be lost. Note that a Chinese
character may occupy 2 or 3 bytes.
Example
# Set the format of remote-id in Option 82 carried in DHCP packets sent by STAs
to ap-mac-ssid.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] dhcp option82 remote-id format ap-mac-ssid
9.19 display ap
Function
The display ap command displays AP information.
Format
display ap
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To view information about APs, run this command.
Example
# Display AP information.
<HUAWEI> display ap
AP detail information:
--------------------------------------------------------------------------------
AP type: AP8130DN
AP MAC: 00e0-fc3f-e900
State: normal
AP high temperature threshold(degree C) : 83
AP low temperature threshold(degree C) : -43
--------------------------------------------------------------------------------
Item Description
Format
display ap configurable channel
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Different countries or regions use different wireless channels and powers. Setting
country and area codes can specify channels that can be used on WLANs of
different countries. The display ap configurable channel command displays the
configurable channels supported by a specified AP.
Example
# Display configurable channels supported by AP.
<HUAWEI> display ap configurable channel
2.4G 20M : 1,2,3,4,5,6,7,8,9,10,11,12,13.
2.4G 40M+: 1,2,3,4,5,6,7.
2.4G 40M-: 5,6,7,8,9,10,11.
5G 20M : 36,40,44,48,52,56,60,64,149,153,157,161,165.
5G 40M+: 36,44,52,60,149,157.
5G 40M-: 40,48,56,64,153,161.
5G 80M : 36,40,44,48,52,56,60,64,149,153,157,161.
Item Description
Item Description
Format
display interface wlan-radio [ wlan-radio-number | main ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To check the status of a radio interface or locate an interface fault, you can run
the display interface wlan-radio command to obtain the status and
configuration of the radio interface. The information can help you locate interface
faults.
Precautions
If [ wlan-radio-number | main ] is not specified, the display interface wlan-radio
command displays the status and configuration of all radio interfaces in the
system.
Example
# Display the status and configuration of the specified radio interface.
<HUAWEI> display interface wlan-radio 0/0/0
Wlan-Radio0/0/0 current state : UPLine protocol current state : UP
Description:HUAWEI, AP Series, Wlan-Radio0/0/0 Interface
Switch Port, TPID : 8100(Hex), The Maximum Transmit Unit is 1500
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 00bc-da3f-e900
Last physical up time : 2005-07-31 15:12:29 UTC+08:00
Last physical down time : 2005-07-31 15:12:24 UTC+08:00
Current system time: 2005-08-04 15:52:09+08:00
Input bandwidth utilization : --
Output bandwidth utilization : --
Last physical up time Last time the interface went Up physically. If this field
displays "-", the physical status of the interface does not
change.
Last physical down Last time the interface went Down physically. If this
time field displays "-", the physical status of the interface
does not change.
Format
display radio all
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view the working status of AP radios.
Example
# Display the working status of AP radios.
<HUAWEI> display radio all
CH/BW:Channel/Bandwidth
CE:Current EIRP (dBm)
ME:Max EIRP (dBm)
CU:Channel utilization
ST:Status
WM:Working Mode (normal/monitor/monitor dual-band-scan)
-------------------------------------------------------------------
RfID Band Type ST CH/BW CE/ME STA CU WM
-------------------------------------------------------------------
0 2.4G bgn on 6/20M 24/24 0 55% normal
1 5G an on 56/20M 25/25 0 3% normal
--------------------------------------------------------------------
Total:2
Item Description
Item Description
CU Channel utilization.
When an AP radio works in monitor
mode, this parameter is displayed as -.
Format
display radio-2g-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view configuration and reference information about
a 2G radio profile.
Example
# Display information about all 2G radio profiles.
<HUAWEI> display radio-2g-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
----------------------------------------------------------
Total: 1
Item Description
Item Description
Item Description
Item Description
Item Description
Item Description
Item Description
Format
display radio-5g-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view configuration and reference information about
a 5G radio profile.
Example
# Display information about all 5G radio profiles.
<HUAWEI> display radio-5g-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
----------------------------------------------------------
Total: 1
Smart-antenna : disable
Agile-antenna-polarization : disable
CCA threshold(dBm) :-
High PER threshold(%) : 80
Low PER threshold(%) : 20
Training interval(s) : auto
Training mpdu num : 640
Throughput trigger training threshold (%) : 10
------------------------------------------------------------
AP EDCA parameters:
------------------------------------------------------------
ECWmax ECWmin AIFSN TXOPLimit(32us) Ack-Policy
AC_VO 3 2 1 47 normal
AC_VI 4 3 1 94 normal
AC_BE 6 4 3 0 normal
AC_BK 10 4 7 0 normal
------------------------------------------------------------
Item Description
Item Description
Item Description
Item Description
Item Description
Item Description
Format
display references radio-2g-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references radio-2g-profile command to view reference
information about a 2G radio profile.
Example
# Display reference information about the 2G radio profile default.
<HUAWEI> display references radio-2g-profile name default
----------------------------------------------------------------------
Reference type Reference name Reference radio
----------------------------------------------------------------------
AP-group Wlan-Radio0/0/0 Radio-0
----------------------------------------------------------------------
Total:1
Item Description
Format
display references radio-5g-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references radio-5g-profile command to view reference
information about a 5G radio profile.
Example
# Display reference information about the 5G radio profile default.
<HUAWEI> display references radio-5g-profile name default
----------------------------------------------------------------------
Reference type Reference name Reference radio
----------------------------------------------------------------------
AP-group Wlan-Radio0/0/0 Radio-0
----------------------------------------------------------------------
Total:1
Format
display references ssid-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references ssid-profile command to view reference
information about an SSID profile.
Example
# Display reference information about the SSID profile default.
<HUAWEI> display references ssid-profile name default
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
VAP profile vap-profile1
-------------------------------------------------------------------
Total:1
Format
display references vap-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references vap-profile command to view reference
information about a VAP profile.
Example
# Display reference information about the VAP profile default.
<HUAWEI> display references vap-profile name default
--------------------------------------------------------------------------------
Reference type Reference name WLAN ID
--------------------------------------------------------------------------------
Interface Wlan-Radio0/0/0 1
--------------------------------------------------------------------------------
Total: 1
Item Description
Format
display resource occupancy message
Parameters
None
Views
All views
Default Level
2: Configuration level
Usage Guidelines
None
Example
# Display average usage of the Dopra message unit within the latest 10 minutes.
<HUAWEI> display resource occupancy message
Average usage rate of system message in 10 minutes: 0%
Format
display ssid-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ssid-profile command to check configuration and
reference information about SSID profiles.
Example
# Display information about all SSID profiles.
<HUAWEI> display ssid-profile all
---------------------------------------------------------------
Profile name Beacon 2.4G/5G rate(Mbps) Reference SSID
---------------------------------------------------------------
default 1/6 2 HUAWEI-WLAN
---------------------------------------------------------------
Total: 1
AC_VO 3 2 2 47
AC_VI 4 3 2 94
AC_BE 10 4 3 0
AC_BK 10 4 7 0
-------------------------------------------------------------------
Item Description
Action upon reaching the max STA Action to take when the number of
number access users reaches the maximum.
● SSID hide: hiding the SSID
● SSID broadcast: broadcasting the
SSID
● priority-based STA replacement:
allowing access of VIP users instead
of non-VIP users based on priorities
To configure this parameter, run the
reach-max-sta command.
Item Description
Item Description
Item Description
Item Description
Format
display station { sta-mac sta-mac-address | all | interface interface }
Parameters
Parameter Description Value
sta-mac sta- Displays access information about a STA The STA's MAC
mac-address with the specified MAC address. address must exist.
STA information can
be displayed only
when the AP
associated with the
STA is in normal
state.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display station command to view access information about STAs.
You can run the display access-user command to view access information about
online wired and wireless users. The information includes users' authentication,
authorization, and accounting information.
Example
# Display access information about all STAs.
<HUAWEI> display station all
Rf/WLAN: Radio ID/WLAN ID
Rx/Tx: link receive rate/link transmit rate(Mbps)
-----------------------------------------------------------------------------------------------------------
STA MAC Ap name Rf/WLAN Band Type Rx/Tx RSSI VLAN IP address SSID Status
-----------------------------------------------------------------------------------------------------------
00e0-fc12-3456 1047-8007-6f80 0/2 2.4G 11n 3/8 -70 10 10.10.10.253 tap1 Normal
-----------------------------------------------------------------------------------------------------------
Total: 1 2.4G: 1 5G: 0
Item Description
Ap name AP name.
Item Description
Station's HT capability : WQ
Station capabilities :E
Station PMF capabilities : PMFC=0,PMFR=0
Station VHT capabilities
256QAM capabilities : Yes
VHT explicit beamforming capabilities : Yes
MU-MIMO capabilities : Yes
Station HE capabilities
OFDMA capabilities : No
BSS color capabilities : No
Station's RM capabilities
Neighbor Report : Yes
Beacon Passive Measurement : Yes
Beacon Active Measurement : Yes
Beacon Table Measurement : Yes
Station's RSSI(dBm) : -28
Station's radio mode : 11n
Station's AP ID :0
Station's AP Name : area_3
Station's Radio ID :1
Station's Authentication Method : Open
Station's Cipher Type : NO CIPHER
Station's User Name : b8782eb42689
Station's Vlan ID : 22
Station's Channel Band-width : 20MHz
Station's asso BSSID : 00e0-fc12-3457
Station's state : Asso with auth
Station's QoS Mode : WMM
Station's HT Mode : HT20
Station's MCS value :9
Station's NSS value :2
Station's Short GI : nonsupport
Station's roam state : No
HAC CAPWAP IP :-
HAP CAPWAP IP : 10.23.100.1
Supported band : 2.4G/5G
Supported 2.4G channels :-
Supported 5G channels : 36,40,44,48,52,56,60,64
: 149,153,157,161,165
802.11k support : Yes
802.11r support : Yes
802.11v support : No
Station device type : windows
U-APSD list:
-------------------------------------------------------
AC-VI AC-VO AC-BE AC-BK
-------------------------------------------------------
not-support not-support not-support not-support
-------------------------------------------------------
------------------------------------------------------------------------------
Item Description
Item Description
Item Description
Item Description
Format
display station offline-record { all | sta-mac sta-mac }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After a STA goes offline, you can use this command to check the reason why the
STA goes offline.
Example
# Display all STAs' going-offline records.
<HUAWEI> display station offline-record all
Reason distribution
----------------------------------------------------------------------------------------
Reason Count Percent
----------------------------------------------------------------------------------------
The STA ages out. 1 14.29%
Other Reasons. 6 85.71%
----------------------------------------------------------------------------------------
Total Count: 7
Recent records
Rf/WLAN: Radio ID/WLAN ID
------------------------------------------------------------------------------
STA MAC Ap name Rf/WLAN Last record time
Reason
------------------------------------------------------------------------------
Last record time Time when the STA went offline last
time.
Format
display station online-fail-record { all | sta-mac sta-mac-address }
Parameters
Parameter Description Value
sta-mac sta- Displays online failure records of the STA The STA's MAC
mac-address with the specified MAC address. address must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
If a STA fails to go online, you can run the command to check the failure reason,
which helps locate the fault.
After the number of records of STAs' failures to go online reaches the maximum
that can be stored, new records overwrite existing ones.
Example
# Display online failure records of all STAs.
<HUAWEI> display station online-fail-record all
Reason distribution
----------------------------------------------------------------------------------------
Reason Count Percent
----------------------------------------------------------------------------------------
The key is incorrect or the STA uses the cached PMK. 1 100.00%
----------------------------------------------------------------------------------------
Total Count: 1
Recent records
Rf/WLAN: Radio ID/WLAN ID
------------------------------------------------------------------------------
STA MAC Ap name Rf/WLAN Last record time
Reason
------------------------------------------------------------------------------
00e0-fc12-3456 area_11 0/1 2018-04-11/15:53:18
The key is incorrect or the STA uses the cached PMK.
------------------------------------------------------------------------------
Total stations: 1 Total records: 1
STA authentication times out. Reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Invalid association request packet. Reassociate the STA with the network.
If this fault persists, the STA may be
incompatible. Contact technical
support personnel.
Authentication fails in the association Reassociate the STA with the network.
stage. If this fault persists, contact technical
support personnel.
The STA is not authenticated. Reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
The AP does not support the rate set Reassociate the STA with the network
specified in the association request or modify the basic rate set in the
packet of the STA. radio profile.
Failed to decrypt the challenge packet. Reassociate the STA with the network
or check whether the STA works
properly. If this fault persists, contact
technical support personnel.
Access from legacy STAs is denied. Check whether the configuration for
denying access of legacy STAs is
required. To modify this configuration,
run the undo legacy-station disable
command to permit access of legacy
STAs.
The number of STAs exceeds the Expand the network capacity or retain
physical specifications allowed by the the current configuration as required.
AP.
The WMM capability of the STA and Check whether WMM is forcibly
VAP does not match. enabled in the radio profile or check
the specified configuration of the STA.
STAs have a compatibility issue(STAs Check whether the STA supports the
do not support short timeslots). 802.11g protocol.
STAs have a compatibility issue(STAs Check whether the STA supports the
do not support DFS.) 802.11h protocol.
The STA is not in the global whitelist. Check whether the STA needs to be
added to the global whitelist.
The STA is in the global blacklist. Check whether the STA needs to be
added to the global blacklist.
The STA is not in the VAP's whitelist. Check whether the STA needs to be
added to the VAP's whitelist.
The STA is in the VAP's blacklist. Check whether the STA needs to be
added to the VAP's blacklist.
The STA associates with a heavily Check whether the load balancing
loaded radio. configuration is proper.
The STA is in the dynamic blacklist. View the attack record to check
whether the STA is an attacker.
The number of users exceeds the Expand the network capacity or run
maximum allowed on the VAP defined the max-sta-number command to
by the AC. increase the maximum number of STAs
associated with the VAP.
Batch backup is in progress. STA access Reassociate the STA with the network.
is denied. If this fault persists, contact technical
support personnel.
STA access failed due to other reasons. Reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
During roaming association, the SSID Check whether the SSID is the same
is inconsistent with that before before and after roaming. If this fault
roaming. persists, contact technical support
personnel.
During roaming association, the STA Reassociate the STA with the network.
status is abnormal. If this fault persists, contact technical
support personnel.
The STA fails the roaming check due Reassociate the STA with the network.
to other reasons. If this fault persists, contact technical
support personnel.
The STA uses a static IP address. Check whether the static IP address is
configured by the user. If so, configure
the STA to dynamically obtain an IP
address.
The STA's SNR is below the user CAC Check whether the SNR-based user
threshold. CAC threshold is properly set. To
modify this threshold, run the uac
client-snr threshold command and
reassociate the STA with the WLAN.
Alternatively, determine the STA
location and provide coverage to the
location.
The number of STAs exceeds the UAC Check whether the CAC threshold
threshold of the radio. based on the number of users is
properly set. To modify this threshold,
run the uac client-number threshold
command and reassociate the STA
with the WLAN.
The channel utilization of the radio Check whether the user CAC threshold
has reached the upper threshold. based on the channel utilization is
properly set. To modify this threshold,
run the uac channel-utilization
threshold command and reassociate
the STA with the WLAN.
The STA does not send an Reassociate the STA with the network.
authentication request before If this fault persists, contact technical
associating with the network. support personnel.
The encryption mode used by STAs is Check the encryption modes used by
different from that used by the VAP. STAs and the VAP.
The possible cause is that the STA Reassociate the STA with the network.
configuration is incorrect, the signal If this fault persists, contact technical
quality on the air interface is low, or support personnel.
the AC forces the STA to reassociate
with the network to ensure
uninterrupted STA services.
The client capability does not match. The client capability does not meet the
requirements. Upgrade the client
version or Wi-Fi version.
Received an Authentication frame with Reassociate the STA with the network.
authentication transaction sequence If this fault persists, contact technical
number out of expected sequence. support personnel.
Invalid pairwise master key Forget the network and reassociate the
identifier(PMKID). STA with the network. If this fault
persists, contact technical support
personnel.
The key is incorrect or the STA uses Check whether the key is correct or
the cached PMK. reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Failed to receive the handshake packet Check whether the key is correct or
(2/4) from the STA. reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Failed to receive the handshake packet Check whether the key is correct or
(4/4) from the STA. reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
802.11r EAPOL Msg 2/4 did not Check whether the station has some
contain R1 name. compatibility problems and please
disable dot1x reauthenticate when
enable 802.11r. If this fault persists,
contact technical support personnel.
Key negotiation fails(the length of the Verify that the correct password is
key data is invalid). entered on the STA. If this fault
persists, contact technical support
personnel.
Key negotiation fails(the length of the Verify that the correct password is
key data(2/4) is invalid). entered on the STA. If this fault
persists, contact technical support
personnel.
Key negotiation fails(the length of the Verify that the correct password is
key data(4/4) is invalid). entered on the STA. If this fault
persists, contact technical support
personnel.
Key negotiation fails(fail to send the Verify that the correct password is
handshake packet). entered on the STA. If this fault
persists, contact technical support
personnel.
The MAC address of the access user is Run the display wlan ppsk-user all
different from that configured for the command to check whether a PPSK
PPSK account. account allows the access from this
MAC address. If so, use this PPSK
account for access. If not, configure a
PPSK account mapping this MAC
address and use the new PPSK account
for access.
The PPSK account does not exist. Run the display wlan ppsk-user all
command to check whether any PPSK
account maps the access SSID. If not,
create the PPSK account and bind it to
the SSID.
The number of PPSK users exceeds the Run the display wlan ppsk-user all
maximum value. command to query the maximum
number of access users supported by
the PPSK account, and then modify the
maximum number of access users as
required.
The PPSK account expires. Run the display wlan ppsk-user all
command to check the timeout period
of the PPSK account, and change it to
a valid time.
Key negotiation fails (message 2/4 Check whether the key is correct or
processing error). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (message 4/4 Check whether the key is correct or
processing error). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (message 1/2 Check whether the key is correct or
processing error). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (start unicast Check whether the key is correct or
negotiation fails because of incorrect reassociate the STA with the network.
input parameters). If this fault persists, contact technical
support personnel.
Key negotiation fails (start multicast Check whether the key is correct or
negotiation fails because of incorrect reassociate the STA with the network.
input parameters). If this fault persists, contact technical
support personnel.
Key negotiation fails (message 2/4 Check whether the key is correct or
authentication mode or encryption reassociate the STA with the network.
type mismatch). If this fault persists, contact technical
support personnel.
Key negotiation fails (message 4/4 Check whether the key is correct or
authentication mode or encryption reassociate the STA with the network.
type mismatch). If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid length of Check whether the key is correct or
the message 2/2). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid length of Check whether the key is correct or
WPA data packets). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid length of Check whether the key is correct or
the message 2/4). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid length of Check whether the key is correct or
the message 4/4). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid length of Check whether the key is correct or
the message 4/4 packet key). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid length of Check whether the key is correct or
the message 2/2 packet key). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid key Check whether the key is correct or
information in the message 2/4 reassociate the STA with the network.
packet). If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid key Check whether the key is correct or
information in the message 4/4 reassociate the STA with the network.
packet). If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid key Check whether the key is correct or
information in the message 2/2 reassociate the STA with the network.
packet). If this fault persists, contact technical
support personnel.
Key negotiation fails (message 2/4 Check whether the key is correct or
handshake status mismatch). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (message 4/4 Check whether the key is correct or
handshake status mismatch). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (message 2/2 Check whether the key is correct or
handshake status mismatch). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid number Check whether the key is correct or
of message 2/4 replay times). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid number Check whether the key is correct or
of message 4/4 replay times). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid number Check whether the key is correct or
of message 2/2 replay times). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (message 4/4 Check whether the key is correct or
MIC verification failure). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (message 2/2 Check whether the key is correct or
MIC verification failure). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (packet length Check whether the key is correct or
calculation failure). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (the EAP packet Check whether the key is correct or
length is 0). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (the EAP packet Check whether the key is correct or
is too long). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (the key body Check whether the key is correct or
length of EAP packets is 0). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid length of Check whether the key is correct or
the EAP packet key). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (incorrect EAP Check whether the key is correct or
packet descriptor). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid EAP Check whether the key is correct or
packet type). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (PMK parse Check whether the key is correct or
failure). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (the type is not Check whether the key is correct or
FTIE). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (invalid FTIE Check whether the key is correct or
length). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (MIC generation Check whether the key is correct or
failure). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (failure to modify Check whether the key is correct or
the rsnie field). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (failure to fill Check whether the key is correct or
FTIE data). reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Re-authentication fails (failure to fill Reassociate the STA with the network.
the start negotiation message). If this fault persists, contact technical
support personnel.
Authentication fails (failure to fill the Reassociate the STA with the network.
start negotiation message). If this fault persists, contact technical
support personnel.
Authentication fails (start negotiation Reassociate the STA with the network.
failure). If this fault persists, contact technical
support personnel.
Authentication fails (failure to receive Reassociate the STA with the network.
EAP key packets). If this fault persists, contact technical
support personnel.
Authentication fails (MAC address Reassociate the STA with the network.
authentication processing error). If this fault persists, contact technical
support personnel.
Authentication fails (MAC address Reassociate the STA with the network.
authentication failure). If this fault persists, contact technical
support personnel.
The authentication request times out. Reassociate the STA with the network.
If this fault persists, contact technical
support personnel.
Key negotiation fails (WPA key Verify that the correct password is
negotiation failure). entered on the STA. If this fault
persists, contact technical support
personnel.
Key negotiation fails (access security Verify that the correct password is
processing failure). entered on the STA. If this fault
persists, contact technical support
personnel.
Format
display station statistics [ sta-mac sta-mac-address ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When you run the display station statistics command to check statistics
information about STAs,
● If no parameter is specified, statistics information about all STAs associated
with the device is displayed.
● If sta-mac is specified, the number of packets exchanged between the
specified STA and device and the corresponding rate are displayed.
Prerequisites
To view statistics information about STAs based on sta-mac, ensure that the STA
has been associated with an AP.
Example
# Display statistics information about all STAs.
<HUAWEI> display station statistics
------------------------------------------------------------------------------
Successful associations on the AC :0
AC authentication failures due to a password error :0
AC authentication failures due to an invalid algorithm :0
AC authentication failures due to timeout :0
AC authentication failures due to rejection :0
AC authentication failures due to other reasons :0
STAs supporting neighbor report :0
STAs supporting beacon report :0
Beacon passive measurement :0
Beacon active measurement :0
Beacon table measurement :0
2.4G-only STAs :0
5G-only STAs :0
Dual-band STAs :0
Online STAs :0
STAs associated with 2.4G band :0
STAs associated with 5G band :0
------------------------------------------------------------------------------
Item Description
Item Description
STAs associated with 2.4G band Number of STAs associated with the
2.4 GHz band. The number of STAs of
different types is displayed, including
802.11b, 802.11g, 802.11n 20 MHz,
and 802.11n 40 MHz STAs.
Item Description
Packets received from the station Number of packets sent by the STA.
Bytes received from the station Number of bytes sent by the STA.
Wireless data rate sent to the Rate at which packets are sent to the
station(kbps) STA, in kbit/s.
Wireless data rate received from the Rate at which packets are received
station(kbps) from the STA, in kbit/s.
Format
display vap { all | ssid ssid }
Parameters
Parameter Description Value
ssid ssid Displays information about service VAPs The SSID must exist.
of a specified SSID.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display vap command to view information about service VAPs.
Example
# Display information about all service VAPs.
<HUAWEI> display vap all
WID : WLAN ID
---------------------------------------------------------------------
AP MAC RfID WID BSSID Status Auth type STA SSID
---------------------------------------------------------------------
00bc-da3f-e900 0 3 00BC-DA3F-E902 ON Open 0 GUEST-WLAN
---------------------------------------------------------------------
Total: 1
Format
display vap-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check configuration and reference information
about VAP profiles.
Example
# Display information about all VAP profiles.
<HUAWEI> display vap-profile all
STA U/D : Rate limit client up/down
VAP U/D : Rate limit VAP up/down
BR2G/5G : Beacon 2.4G/5G rate
------------------------------------------------------------------------------------------------------------
Name Type VLAN AuthType STA U/D(Kbps) VAP U/D(Kbps) BR2G/5G(Mbps) Reference
SSID
------------------------------------------------------------------------------------------------------------
default service VLAN 1 Open -/- -/- 1/6 0 HUAWEI-WLAN
vap-profile1 service VLAN 1 Open -/- -/- 1/6 0 HUAWEI-WLAN
------------------------------------------------------------------------------------------------------------
Total: 2
Item Description
Item Description
Item Description
Item Description
ARP flood STA rate threshold Rate threshold for ARP flood detection.
To configure this parameter, run the
anti-attack flood sta-rate-threshold
command.
Item Description
IGMP flood STA rate threshold Rate threshold for IGMP flood
detection.
To configure this parameter, run the
anti-attack flood sta-rate-threshold
command.
DHCP flood STA rate threshold Rate threshold for DHCP flood
detection.
To configure this parameter, run the
anti-attack flood sta-rate-threshold
command.
Item Description
DHCPv6 flood STA rate threshold Rate threshold for DHCPv6 flood
detection.
To configure this parameter, run the
anti-attack flood sta-rate-threshold
command.
mDNS flood STA rate threshold Rate threshold for mDNS flood
detection.
To configure this parameter, run the
anti-attack flood sta-rate-threshold
command.
Item Description
Other broadcast flood STA rate Rate threshold for flood detection of
threshold broadcast packets other than ARP,
DHCP, DHCPv6, and ND packets.
To configure this parameter, run the
anti-attack flood sta-rate-threshold
command.
Other multicast flood STA rate Rate threshold for flood detection of
threshold multicast packets other than IGMP
and mDNS packets.
To configure this parameter, run the
anti-attack flood sta-rate-threshold
command.
Item Description
Item Description
Format
display wlan config-errors
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check WLAN configuration errors.
Example
# Display WLAN configuration errors.
<HUAWEI> display wlan config-errors
--------------------------------------------------------------------------------
Profile Error
--------------------------------------------------------------------------------
vap-profile 1 The authentication type specifie
d in the authentication-profile 1 does not match that in the security-profile 1.
--------------------------------------------------------------------------------
Total: 1
Format
display station online-track sta-mac-address
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view online time information about a STA.
Example
# Display online time information about a specified STA.
<HUAWEI> display station online-track 00e0-fc08-9abf
------------------------------------------------------------------------------
Event Event Start(hh:mm:ss) Event End(hh:mm:ss) Cost(ms)
------------------------------------------------------------------------------
Association 14:20:28 14:20:28 10
Auth 14:20:28 14:20:30 2240
WPA 14:20:30 14:20:31 330
DHCP 14:20:31 14:20:31 10
------------------------------------------------------------------------------
Total cost: 2590ms
Item Description
Format
display vap create-fail-record { ap-mac ap-mac | all }
Parameters
Parameter Description Value
ap-mac ap- Displays records about VAP creation The AP's MAC
mac failures on an AP with the specified MAC address must exist.
address.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display vap create-fail-record command to check records about
VAP creation failures.
Example
# Display all records about VAP creation failures.
<HUAWEI> display vap create-fail-record all
Rf/WLAN: Radio ID/WLAN ID
-------------------------------------------------------------------------------
AP MAC Rf/WLAN Profile Name
VAP Type Reason
-------------------------------------------------------------------------------
00e0-fc76-e360 0/4 1
Service Preshared key is not configured.
00e0-fc76-e370 1/4 1
Service Preshared key is not configured.
00e0-fc76-e360 0/6 1
Service Preshared key is not configured.
00e0-fc76-e370 1/6 1
Service Preshared key is not configured.
-------------------------------------------------------------------------------
Total records: 4
Table 9-29 Description of the display vap create-fail-record all command output
Item Description
The bridge is enabled. WLAN IDs 13 and 14 are Select another WLAN ID
Please undo first. used to set up a WDS or delete the WDS
bridge. Select other configuration.
WLAN IDs or delete the
WDS configuration.
Format
display vap-service-backup auth-server-down [ vap-profile profile-name ]
Parameters
Parameter Description Value
vap-profile profile- Specifies the name of a VAP The VAP profile name
name profile. must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the status of an authentication-server-down
backup service VAP.
Example
# Display the status of an authentication-server-down backup service VAP.
<HUAWEI> display vap-service-backup auth-server-down
----------------------------------------------------------------------------------------------------
Vap-profile VapSwitch Mode Radius-template RadiusState
----------------------------------------------------------------------------------------------------
vap-1 ON Auto Radius-1 Down
vap-2 ON Manual Radius-2 Down
vap-3 OFF Manual Radius-3 Up
----------------------------------------------------------------------------------------------------
Total:3
Item Description
Format
dot11a basic-rate { dot11a-rate-value &<1-8> | all }
undo dot11a basic-rate
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The rates specified in the basic rate set must be supported by both the AP and
STA; otherwise, the STA cannot associate with the AP. For example, if you
configure the basic rate set to contain rates 6 Mbps and 9 Mbps and deliver the
configuration to an AP, only STAs supporting the two rates can associate with the
AP. The AP and STA select a rate from the basic rate set or the supported rate set
to transmit packets.
After you run this command to configure a basic rate set in a radio profile, bind
the radio profile to an AP radio interface. If a STA associates with the AP in
802.11a mode, the STA must support all rates specified by the basic rate set;
otherwise, the STA cannot associate with the AP.
Precautions
This configuration applies only to STAs associated with an AP in 802.11a mode but
does not take effect on STAs associated with the AP in other modes.
The basic rate set and supported rate set cannot be empty simultaneously.
Example
# Configure the 802.11a basic rate set to contain rates 6 Mbps and 9 Mbps in the
5G radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] dot11a basic-rate 6 9
Format
dot11a supported-rate { dot11a-rate-value &<1-8> | all }
undo dot11a supported-rate
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The supported rate set contains rates supported by the AP except the basic rates.
The AP and STA can transmit data at all rates specified by the supported rate set.
The AP and STA select a rate from the basic rate set or the supported rate set to
transmit packets.
When a STA supports rates specified in the basic rate set, the STA can associate
with the AP regardless of whether the STA supports rates specified in the
supported rate set. In this case, the AP and STA can only select a rate from the
basic rate set to transmit packets. For example, assume that you configure the
basic rate set to contain rates 6 Mbps and 9 Mbps and the supported rate set to
contain rates 48 Mbps and 54 Mbps. After you deliver the configurations to an AP,
the STA supporting 6 Mbps and 9 Mbps can associate with the AP, and select
either of the two rates to transmit packets with the AP. However, if the STA
supports 6 Mbps, 9 Mbps, and 54 Mbps, the STA and AP select any of the three
rates to transmit packets after the STA associates with the AP.
After you run this command to configure a supported rate set in a radio profile,
bind the radio profile to an AP radio interface. If a STA associates with the AP in
802.11a mode, the AP and STA select a rate from the basic rate set or supported
rate set to transmit packets.
Precautions
This configuration applies only to STAs associated with an AP in 802.11a mode but
does not take effect on STAs associated with the AP in other modes.
The basic rate set and supported rate set cannot be empty simultaneously.
Example
# Configure the 802.11a supported rate set to contain rates 6 Mbps and 9 Mbps in
the 5G radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] dot11a supported-rate 6 9
Format
dot11bg basic-rate { dot11bg-rate-value &<1-12> | all }
undo dot11bg basic-rate
Parameters
Parameter Description Value
Views
2G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The rates specified in the basic rate set must be supported by both the AP and
STA; otherwise, the STA cannot associate with the AP. For example, if you
configure the basic rate set to contain rates 6 Mbps and 9 Mbps and deliver the
configuration to an AP, only STAs supporting the two rates can associate with the
AP. The AP and STA select a rate from the basic rate set or the supported rate set
to transmit packets.
After you run this command to configure a basic rate set in a radio profile, bind
the radio profile to an AP radio interface. If a STA associates with the AP in
802.11bg mode, the STA must support all rates specified by the basic rate set;
otherwise, the STA cannot associate with the AP.
Precautions
This configuration applies only to STAs associated with an AP in 802.11bg mode
but does not take effect on STAs associated with the AP in other modes.
The basic rate set and supported rate set cannot be empty simultaneously.
Example
# Configure the 802.11bg basic rate set to contain rates 6 Mbps and 9 Mbps in the
2G radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] dot11bg basic-rate 6 9
The undo dot11bg supported-rate command restores the default supported rate
set of the 802.11bg protocol in a 2G radio profile.
By default, the supported rate set of the 802.11bg protocol in a 2G radio profile
includes rates 1 Mbps, 2 Mbps, 5.5 Mbps, 6 Mbps, 9 Mbps, 11 Mbps, 12 Mbps, 18
Mbps, 24 Mbps, 36 Mbps, 48 Mbps, and 54 Mbps.
Format
dot11bg supported-rate { dot11bg-rate-value &<1-12> | all }
Parameters
Parameter Description Value
Views
2G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The supported rate set contains rates supported by the AP except the basic rates.
The AP and STA can transmit data at all rates specified by the supported rate set.
The AP and STA select a rate from the basic rate set or the supported rate set to
transmit packets.
When a STA supports rates specified in the basic rate set, the STA can associate
with the AP regardless of whether the STA supports rates specified in the
supported rate set. In this case, the AP and STA can only select a rate from the
basic rate set to transmit packets. For example, assume that you configure the
basic rate set to contain rates 6 Mbps and 9 Mbps and the supported rate set to
contain rates 48 Mbps and 54 Mbps. After you deliver the configurations to an AP,
the STA supporting 6 Mbps and 9 Mbps can associate with the AP, and select
either of the two rates to transmit packets with the AP. However, if the STA
supports 6 Mbps, 9 Mbps, and 54 Mbps, the STA and AP select any of the three
rates to transmit packets after the STA associates with the AP.
After you run this command to configure a supported rate set in a radio profile,
bind the radio profile to an AP radio interface. If a STA associates with the AP in
802.11bg mode, the AP and STA select a rate from the basic rate set or supported
rate set to transmit packets.
Precautions
This configuration applies only to STAs associated with an AP in 802.11bg mode
but does not take effect on STAs associated with the AP in other modes.
The basic rate set and supported rate set cannot be empty simultaneously.
Example
# Configure the 802.11bg supported rate set to contain rates 6 Mbps and 9 Mbps
in the 2G radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] dot11bg supported-rate 6 9
9.45 dtim-interval
Function
The dtim-interval command sets the delivery traffic indication map (DTIM)
interval in an SSID profile.
The undo dtim-interval command restores the default DTIM interval in an SSID
profile.
By default, the DTIM interval is 1.
Format
dtim-interval dtim-interval
undo dtim-interval
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
DTIM refers to delivery traffic indication map. After a STA enters the dormancy
mode, the associated AP saves the broadcast and multicast frames for the STA.
When a Beacon frame sent to the STA by the AP contains DTIM, the saved
broadcast and multicast frames will be transmitted to the STA. The DTIM interval
refers to the number of Beacon frames sent before the Beacon frame that contains
the DTIM. To set the interval for sending Beacon frames in an SSID profile, run the
beacon-interval command.
● When the STA is in the dormancy status, the AP saves data transmitted to the
STA and notifies the STA with a bit in broadcast Beacon frames. The STA
receives data according to this bit. You can run this command to set the DTIM
interval in the specified SSID profile.
● The DTIM interval specifies how many Beacon frames are sent before the
Beacon frame that contains the DTIM. A long DTIM interval lengthens the
dormancy time of the STA and saves power, but degrades the transmission
capability of the STA. A short interval helps transmitting data in a timely
manner, but the STA is waken up frequently, causing high power consumption.
Example
# Set the DTIM interval to 5 in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
9.46 eirp
Function
The eirp command configures the transmit power for a radio.
The undo eirp command restores the transmit power for a radio.
By default, the transmit power of a radio is 127 dBm. The transmit power that
takes effect on APs is related to the AP type, country code, channel, and channel
bandwidth. It is the maximum transmit power supported by the AP radio under
the current configuration.
Format
eirp eirp
undo eirp
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure the transmit power for a radio based on actual network
environments, enabling radios to provide the required signal strength and
improving signal quality on WLANs.
Precautions
The value of antenna-gain in the antenna-gain antenna-gain command must be
consistent with the gain of the antenna connected to an AP.
If automatic transmit power selection is enabled by running the calibrate auto-
txpower-select enable command, the transmit power configured by running the
eirp command does not take effect. The automatically selected transmit power
prevails.
Example
# Set the transmit power to 30 dBm for the radio interface Wlan-Radio 0/0/0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] eirp 30
Info: The EIRP value takes effect only when automatic transmit power selection i
s disabled, and the value depends on the AP specifications and local laws and re
gulations.
9.47 fragmentation-threshold
Function
The fragmentation-threshold command sets the fragmentation threshold in a
radio profile.
Format
fragmentation-threshold fragmentation-threshold
undo fragmentation-threshold
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A proper packet fragmentation threshold can improve channel bandwidth usage.
Set the fragmentation threshold as required. A large threshold is recommended.
Precautions
When the packet fragmentation threshold is too small, packets are fragmented
into smaller frames. These frames are transmitted at a high extra cost, resulting in
low channel efficiency.
When the packet fragmentation threshold is too large, long packets are usually
not fragmented, which increases the transmission time and error probability. If an
error occurs, packets are retransmitted, resulting in a waste of channel bandwidth.
Example
# Set the fragmentation threshold to 1500 bytes in the 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] fragmentation-threshold 1500
9.48 frequency
Function
The frequency command sets the working frequency of radio 0 to the 5 GHz
frequency band.
The undo frequency command restores the working frequency of radio 0 to the
2.4 GHz frequency band.
By default, radio 0 works on the 2.4 GHz frequency band, and radio 2 works on
the 5 GHz frequency band.
Format
frequency { 2.4g | 5g }
undo frequency
Parameters
None.
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On APs supporting radio switching between the 2.4 GHz and 5 GHz frequency
bands, some radios support both the two bands. However, such radios can work
on one band at a time. You can configure the working frequency band of the AP
based on the frequency band of STAs.
Precautions
When working in dual-5G mode, some APs support only low-band channels (36 to
64) or high-band channels (100 to 165) on the 5 GHz band.
● AP4030TN: Radio 0, radio 1, and radio 2 on all bands
● AP8130DN: Radio 0 and radio 1 on all bands
● AP8150DN: Radio 0 and radio 1 on all bands
● AP6052DN: Radio 0 on low bands and radio 1 on high bands
● AP7052DN: Radio 0 on low bands and radio 1 on high bands
● AP7152DN: Radio 0 on low bands and radio 1 on high bands
● AP8182DN: Radio 0 on low bands and radio 1 on high bands
● AP4051TN: Radio 1 on high bands and radio 2 on low bands
● AP8050TN-HD: Radio 1 on high bands and radio 2 on low bands
● AP6750-10T: Radio 1 on high bands and radio 2 on low bands
Changing the working frequency of radio 0 and radio 2 will delete the channel,
power, and antenna gain configurations on radio 0 and radio 2. If an AP uses an
external antenna, run the antenna-gain antenna-gain command to reconfigure
the antenna gain to be consistent with the gain of the external antenna connected
to the AP.
If an AP works in dual-5G mode, configure the two 5 GHz radios to work on non-
adjacent channels.
For example, a country supports 40 MHz+ 5G channels 36, 44, 52, and 60. When
deploying 5 GHz radio channels, if one radio is deployed to work on channel 36, it
is recommended that channel 52 or 60 be configured for the other radio. Channel
44 is not recommended in this case.
Example
# Set the working frequency to the 5 GHz frequency band for radio 0 of AP.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] frequency 5g
Warning: Modifying the frequency band will delete the channel, power, and antenn
a gain configurations of the current radio on the AP. Continue?[Y/N]:Y
9.49 guard-interval-mode
Function
The guard-interval-mode command configures the guard interval (GI) mode.
By default, the GI mode for 802.11n/ac is short, and the GI mode for 802.11ax is
0.8 us.
Format
guard-interval-mode { short | normal }
undo guard-interval-mode
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
During data transmission, the receive and transmit ends do not receive and send
data at all times. When data is transmitted and received or transmitted for
multiple times, multi-path interference exists during radio transmission in the
space. Setting the GI can reduce interference impact on signals.
A smaller GI indicates higher transmission efficiency. A larger GI indicates a higher
anti-interference capability. In indoor environments with little interference, a small
GI is recommended. In outdoor environments with high interference, a large GI is
recommended.
● The GI for 802.11a/b/g is fixed at 800 ns.
● The GI for 802.11n and 802.11ac is 400 ns (short) or 800 ns (normal).
● The GI for 802.11ax can be 0.8 us (800 ns), 1.6 us, or 3.2 us.
Example
# Set the GI mode to short.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] guard-interval-mode short
Format
he { tx | rx } mcs-map nss nss-value map mcs-value
undo he { tx | rx } mcs-map
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
● When the value of nss-value is greater than or equal to the number of spatial
streams actually supported by an AP, the MCS value corresponding to all the
spatial streams of the AP is the value of mcs-value.
● When the value of nss-value is smaller than the number of spatial streams
actually supported by an AP, only the MCS value corresponding to the spatial
streams on the AP is the value of mcs-value, and the maximum MCS value
corresponding to other spatial streams does not take effect.
For example, if the value of nss-value is 2, and the AP supports three spatial
streams, only the MCS value corresponding to spatial streams 1 and 2 is the
value of mcs-value, and the MCS value corresponding to spatial stream 3 does
not take effect.
Precautions
This configuration takes effect only when the AP communicates with STAs through
802.11ax.
Example
# Set the MCS value corresponding to spatial stream 4 to 9 when data is received
in an SSID profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] he rx mcs-map nss 4 map 9
The undo ht a-mpdu disable command enables the MPDU aggregation function.
Format
ht a-mpdu disable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
To reduce costs, 802.11n uses MPDU aggregation technology that aggregates two
or more frames into one frame for transmission.
The 802.11ac and 802.11ax protocols require that the A-MPDU aggregation mode
be enabled. Therefore, this command takes effect only for 2.4 GHz and 5 GHz
radios on 802.11n APs or 2.4 GHz radios on 802.11ac APs.
Example
# Disable the MPDU aggregation function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] ht a-mpdu disable
By default, the index for the maximum length of an A-MPDU is 3. The maximum
length of the A-MPDU is 65535 bytes.
Format
ht a-mpdu max-length-exponent max-length-exponent-index
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
To reduce costs, 802.11n uses frame aggregation technology that aggregates two
or more frames into an A-MPDU to transmit.
Example
# Set the index of the maximum length of the A-MPDU to 2 in the 2G radio
profile default. The index 2 corresponds to a maximum length of 32767 bytes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] ht a-mpdu max-length-exponent 2
Format
interface wlan-radio wlan-radio-number
Parameters
Parameter Description Value
wlan-radio- Displays the specified radio interface The value can be:
number view. ● 0/0/0
● 0/0/1
● 0/0/2
NOTE
All types of APs
support 2.4 GHz and
5 GHz radio
interfaces.
On APs supporting
radio switching
between the 2.4 GHz
and 5 GHz frequency
bands, some radios
support both the two
bands. However, such
radios can work on
one band at a
time.You can run the
frequency command
to change the
working frequency
band of Radio 0.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
● You can configure the radio after enter the wlan-radio interface.
● you can create a VAP by binding a VAP profile to WLAN-radio interface.
Example
# Display the view of Wlan-Radio0/0/0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio0/0/0
[HUAWEI-Wlan-Radio0/0/0]
Format
legacy-station [ only-dot11b ] disable
undo legacy-station disable
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Non-HT STAs support only 802.11a/b/g and provide a data transmission rate far
smaller than the rate of 802.11n/ac STAs. If the non-HT STAs access the wireless
network, the data transmission rate of 802.11n/ac STAs will be reduced. To prevent
the transmission rate of 802.11n/ac STAs from being affected, you can run the
legacy-station [ only-dot11b ] disable command to deny access of all or only
802.11b-compliant non-HT STAs.
Configuration Impact
After the legacy-station disable command is run, non-HT STAs supporting only
802.11a/b/g cannot access the wireless network.
After the legacy-station only-dot11b disable command is run, non-HT STAs
supporting only 802.11b cannot access the wireless network.
After access of non-HT STAs is denied, services may be interrupted.
Precautions
After the legacy-station disable command is run, the access of non-HT STAs
supporting only 802.11a/b/g fails to be denied if any of the following functions is
configured on the non-HT STAs:
● WMM function in a 2G or 5G radio profile disabled using the wmm disable
command
● Pre-shared key authentication and TKIP encryption for WPA/WPA2 configured
using the security { wpa | wpa2 | wpa-wpa2 } psk { pass-phrase | hex } key-
value tkip command when the security profile is used
● 802.1X authentication and TKIP encryption for WPA/WPA2 configured using
the security { wpa | wpa2 | wpa-wpa2 } dot1x tkip command when the
security profile is used
● WEP authentication configured using the security wep [ share-key |
dynamic ] command when the security profile is used
● 802.11b/g radio type in the 2G radio profile configured using the radio-type
{ dot11b | dot11g } command
● 802.11a radio type in the 5G radio profile configured using radio-type dot11a
command
After the legacy-station only-dot11b disable command is run, the access of non-
HT STAs supporting only 802.11b is denied. If 802.11b radio type in the 2G radio
profile has been configured using the radio-type dot11b command, the access of
non-HT STAs supporting only 802.11b fails to be denied.
Example
# Deny access of non-HT STAs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] legacy-station disable
Warning: If the wmm disable command, TKIP, WEP, or radio type of 802.11a/b/g is configured, the function
of denying access of legac
y STAs cannot take effect.
Format
max-sta-number max-sta-number
undo max-sta-number
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
More access users on a VAP indicate fewer network resources that each user can
occupy. To ensure Internet experience of users, you can run the max-sta-number
command to set a proper maximum number of successfully associated STAs on a
VAP.
Configuration Impact
After th max-sta-number command is executed, online STAs are forcibly to go
offline. When STAs reassociate with the VAP and the number of associated STAs
on the VAP reaches the maximum, new STAs fail to associate with this VAP.
The max-sta-number max-sta-number command sets the maximum number of
successfully associated STAs on a VAP.
Precautions
The maximum number of successfully associated STAs on a specified VAP refers to
the maximum number of successfully associated STAs on a VAP of a single AP.
Example
# Set the maximum number of successfully associated STAs on a VAP to 50.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] max-sta-number 50
Warning: This action may cause service interruption. Continue?[Y/N]y
9.56 multicast-rate
Function
The multicast-rate command configures the multicast rate of wireless packets in
a radio profile.
The undo multicast-rate command restores the default multicast rate of wireless
packets in a radio profile.
By default, the multicast rate of wireless packets is not configured in a radio
profile. That is, the multicast rate is set to auto-sensing.
Format
multicast-rate multicast-rate
undo multicast-rate
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
After this command is run, the multicast rate of wireless packets is the configured
value and irrelevant to the STA access mode.
If the configured multicast rate is not in the basic rate set and the STA does not
support this rate, the STA cannot receive multicast data.
If you run the radio-type dot11b command in the 2G radio profile view to set the
radio type to dot11b, and the 2G radio profile is applied to an AP, multicast-rate
that takes effect on the 2 GHz radio of the AP is fixed as 1 Mbps, and multicast-
rate configured in the 2G radio profile view does not take effect on the AP.
Example
# Set the multicast rate of wireless packets to 54 Mbps in the 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] multicast-rate 54
Format
mu-mimo disable
undo mu-mimo disable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Carrier sense multiple access with collision avoidance (CSMA-CA) allows an air
interface channel to be occupied only by one STA, and other STAs cannot
communicate with the AP. After MU-MIMO is enabled, STAs supporting MU-
MIMO can form an MU group to simultaneously receive downlink data from the
same air interface channel, improving channel efficiency and overall downlink
throughput.
Precautions
Example
# EnableMU-MIMO in the SSID profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name test
[HUAWEI-wlan-ssid-prof-test] undo mu-mimo disable
Format
mu-mimo optimize enable
undo mu-mimo optimize enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In an environment with less interference, you can run the mu-mimo optimize
enable command to enable the MU-MIMO optimization function to meet
requirements for high downlink throughput of the AP. The expected effect may fail
to be achieved in some scenarios.
Prerequisites
The MU-MIMO function has been enabled using the undo mu-mimo disable
command.
Example
# Enable the MU-MIMO optimization function in the SSID profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name test
[HUAWEI-wlan-ssid-prof-test] undo mu-mimo disable
[HUAWEI-wlan-ssid-prof-test] mu-mimo optimize enable
9.59 probe-response-retry
Function
The probe-response-retry command sets the number of times Probe Response
packets are retransmitted.
The undo probe-response-retry command restores the default number of times
Probe Response packets are retransmitted.
By default, the number of Probe Response retransmissions is 1.
Format
probe-response-retry retry-time
undo probe-response-retry
Parameters
Parameter Description Value
retry-time Specifies the number of The value is an integer that ranges from
times Probe Response 0 to 3.
packets are retransmitted.
When the value is set to 0, Probe
Response packets are not retransmitted.
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In high-density wireless scenarios, too many Probe Response frames occupy a
large number of wireless resources. To reduce wireless resource occupation of the
frames, you can run the probe-response-retry command to set a small number of
or forbid Probe Response packet retransmissions.
Precautions
A small number of Probe Response packet retransmissions may reduce the
channel scan efficiency of some STAs while a large number of Probe Response
packet retransmissions may lower the wireless network performance.
Example
# Set the number of times Probe Response packets are retransmitted to 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] probe-response-retry 0
Format
qbss-load enable
undo qbss-load enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
After the qbss-load enable command is executed, STAs are notified of the AP load
status during the STA association. The notified information includes the number of
STAs associated with AP radios and channel utilization. A STA selects the optimal
AP based on the load of each AP to improve air interface performance.
NOTE
This command takes effect only when dynamic load balancing is disabled, because with
dynamic load balancing enabled, APs will definitely notify STAs of their loads.
Modifying this configuration will cause STAs connected to the SSID to go offline and then
online, interrupting STAs' services.
Example
# Enable the function of notifying STAs of AP load information in the SSID profile
ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] qbss-load enable
Format
radio disable
undo radio disable
Parameters
None
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to enable or disable a specified radio.
Example
# Disable the radio interface Wlan-Radio 0/0/0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] radio disable
Warning: This action may cause service interruption. Continue?[Y/N]y
Format
radio-2g-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a 2G radio profile. The device supports
name only one 2G radio
profile named
default.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A 2G radio profile is used to configure and optimize the 2G radio of an AP, but
does not take effect on the 5G radio.
Example
# Display the 2G radio profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default]
Format
radio-5g-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a 5G radio profile. The device supports
name only one 5G radio
profile named
default.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A 5G radio profile is used to configure and optimize the 5G radio of an AP, but
does not take effect on the 2G radio.
Example
# Display the 5G radio profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default]
Format
radio-type { dot11b | dot11g | dot11n | dot11ax }
undo radio-type
Parameters
Parameter Description Value
Views
2G radio profile
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Usually, the default radio type is used and does not need to be modified. If the
default radio mode cannot meet requirements or a fault needs to be located,
configure the radio type as required.
Precautions
If a rate in the basic rate set or supported rate set, or the multicast rate is not
supported by the 802.11b protocol, the radio type cannot be set to 80211b.
When the radio type is set to dot11b or dot11g, the function of denying access
from non-HT STAs becomes invalid.
If WDS- or Mesh-enabled radios are configured not to support 802.11n/ac, the air
interface backhaul performance will be degraded.
If you run the radio-type dot11b command in the 2G radio profile view to set the
radio type to dot11b, and the 2G radio profile is applied to an AP, the rates of
management frames and multicast packets that take effect on the 2 GHz radio of
the AP are fixed as 1 Mbps, and the values configured using the beacon-2g-rate
Example
# Set the radio type to dot11g in a 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] radio-type dot11g
The undo radio-type command restores the default radio type in a 5G radio
profile.
Format
radio-type { dot11a | dot11n | dot11ac | dot11ax }
undo radio-type
Parameters
Parameter Description Value
Views
5G radio profile
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Usually, the default radio type is used and does not need to be modified. If the
default radio mode cannot meet requirements or a fault needs to be located,
configure the radio type as required.
Precautions
When the radio type is set to dot11a, the function of denying access from non-HT
STAs becomes invalid.
If the configured radio type is not supported by an AP, the actual radio type
supported by the AP takes effect. For example, if you set the 802.11ac radio type
for an 802.11n AP, the 802.11n radio type takes effect on the AP.
If WDS- or Mesh-enabled radios are configured not to support 802.11n/ac, the air
interface backhaul performance will be degraded.
Example
# Set the radio type to dot11n in a 5G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] radio-type dot11n
9.66 reach-max-sta
Function
The reach-max-sta command controls access of new STAs when the number of
STAs of a VAP reaches the maximum value.
By default, when the number of access users reaches the maximum value, you can
determine whether to enable SSID hiding or enable the VAP to replace low-
priority STAs with high-priority STAs.
Format
reach-max-sta { hide-ssid disable | priority-replace }
undo reach-max-sta
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
When the number of access users reaches the maximum value, you can enable
SSID hiding or enable the VAP to replace low-priority STAs with high-priority STAs.
The two functions cannot be configured simultaneously.
● SSID hiding: New STAs cannot search for the SSID of the VAP and need to
access other VAPs.
● Replacing low-priority STAs with high-priority STAs: A new VIP user will
replace a common user. This ensures access experience of VIP users.
Example
# Disable automatic SSID hiding when the number of users reaches the maximum.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] reach-max-sta hide-ssid disable
Format
report-sta-assoc enable
undo report-sta-assoc enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
If a STA is associated or goes online after this function is enabled, the device
records the STA association or login information in the log.
NOTE
Enabling this function will generate a large number of logs. If there are a large number of
STAs, log files may overwrite each other due to limited storage space, which affects fault
locating.
Example
# Enable the function of recording STA association information or STA login
information in the log.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] report-sta-assoc enable
Format
reset channel switch-record all
Parameters
Parameter Description Value
all Deletes all channel switching records. -
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can use this command to delete existing channel switching records so that the
system can record new channel switching events.
Precautions
Deleted channel switching records cannot be restored.
Example
# Delete all channel switching records.
<HUAWEI> reset channel switch-record all
Format
reset station offline-record { all | sta-mac sta-mac }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
You can use this command to delete existing STAs' going-offline records so that
the system can record new STAs' going-offline events.
Precautions
The deleted STAs' going-offline records cannot be restored.
Example
# Delete all STAs' going-offline records.
<HUAWEI> reset station offline-record all
Format
reset station online-fail-record { all | sta-mac sta-mac-address }
Parameters
Parameter Description Value
sta-mac sta- Deletes online failure records of the STA The specified STA's
mac-address with the specified MAC address. MAC address must
exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
To re-collect records about STA online failures, run this command to delete
existing records.
Precautions
The deleted records cannot be restored.
Example
# Delete online failure records of all STAs.
<HUAWEI> reset station online-fail-record all
Format
reset station statistics [ sta-mac sta-mac-address ]
Parameters
Parameter Description Value
sta-mac sta- Specifies the MAC address of an online The STA's MAC
mac-address STA. address must exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Before recollecting statistics about online STAs, run the command to clear the
existing statistics.
Precautions
After the command is run, statistics about online STAs are cleared and cannot be
restored.
Example
# Delete statistics about the STA with MAC address 00e0-fc88-b74f.
<HUAWEI> reset station statistics sta-mac 00e0-fc88-b74f
9.72 rf-ping
Function
The rf-ping command enables an AP to automatically detect wireless link quality.
Format
rf-ping [ -m time | -c number ] [ -p { be | bk | vi | vo }] * mac-address
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Use Scenario
Prerequisites
Example
# Configure an AP to automatically detect quality of the link between the AP and
STA with the MAC address 00e0-fc12-3456.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rf-ping 00e0-fc12-3456
Tx rate=52.0 Mbps, Reply from 00e0-fc12-3456: RSSI=-58 dBm time < 1 ms
1 packets transmitted, 1 received, 0% packet loss, time < 1 ms, RSSI -58 dBm
Item Description
9.73 rts-cts-mode
Function
The rts-cts-mode command sets the request to send (RTS)-clear to send (CTS)
operation mode in a radio profile.
The undo rts-cts-mode command restores the default RTS-CTS operation mode in
a radio profile.
Format
rts-cts-mode { cts-to-self | disable | rts-cts }
undo rts-cts-mode
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
● In rts-cts mode, when an AP needs to send data to a STA, the AP sends an
RTS packet to all STAs associated with it. After receiving the RTS packet, none
of the devices within the AP's coverage area sends data within a specified
period. After the destination STA receives the RTS packet, it sends a CTS
packet. After receiving the CTS packet, none of the devices within the STA's
coverage area sends data within a specified period. Using the rts-cts mode to
avoid conflicts requires two packets (RTS and CTS packets), increasing packet
overhead.
● In cts-to-self mode, when an AP needs to send data to STAs, it sends a CTS
packet with its IP address as the source and destination addresses. Then none
of the devices within the AP's coverage area sends data within a specified
period. In cts-to-self mode, an AP only needs to send a CTS packet to avoid
channel conflicts in most scenarios. However, if there is a device within the
STA's coverage area but not within the AP's coverage area, a channel conflict
may still occur.
Compared to the rts-cts mode, the cts-to-self mode reduces the number of control
packets sent on the network. In some situations, however, a channel conflict may
still occur when hidden nodes do not receive the CTS packet from the AP.
Therefore, the rts-cts mode is more effective in avoiding channel conflicts than the
cts-to-self mode.
To avoid a data transmission failure caused by channel conflicts, run the rts-cts-
mode command to set the RTS-CTS operation mode in a radio profile according to
networking requirements.
Example
# Set the RTS-CTS operation mode to rts-cts in the 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] rts-cts-mode rts-cts
9.74 rts-cts-threshold
Function
The rts-cts-threshold command sets the RTS-CTS threshold in a radio profile.
The undo rts-cts-threshold command restores the default RTS-CTS threshold in a
radio profile.
The default RTS-CTS alarm threshold is 1400 bytes.
Format
rts-cts-threshold rts-cts-threshold
undo rts-cts-threshold
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
The IEEE 802.11 MAC protocol provides an RTS-CTS handshake protocol to prevent
conflicts between channels and failure to transmit data. STA A sends an RTS frame
before sending data to STA B. STA A can send data after receiving a CTS frame
from STA B. If multiple STAs send RTS frames to a STA, only the STA that receives
a CTS frame can send data, and other STAs have channel conflicts by default and
must wait and send RTS frames again.
If STAs implement RTS-CTS handshakes before sending data, the channel
bandwidth is consumed by too much RTS frames. You can set an RTS threshold to
specify the length of frames to be sent. When the length of frames to be sent by
the STA is smaller than the RTS threshold, no RTS/CTS handshake is implemented.
Example
# Set the RTS-CTS threshold to 2300 bytes in the 2G radio profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] rts-cts-threshold 2300
The undo service-mode disable command enables the service mode of a VAP.
Format
service-mode disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the service-mode disable command to disable the service mode of a
VAP. After the service mode of a VAP is disabled, the VAP is disabled.
● After the service mode of a VAP is enabled, run the auto-off service
command to enable the scheduled VAP auto-off function. In the scheduled
time, the VAP is disabled. To enable the VAP, run the undo auto-off service
command.
● After the service mode of a VAP is disabled, the scheduled VAP auto-off
function does not take effect.
Example
# Disable the service mode of VAP vap1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] service-mode disable
Warning: This action may cause service interruption. Continue?[Y/N]y
Format
service-vlan vlan-id vlan-id
undo service-vlan
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Each VAP has a service VLAN. Layer 2 data packets delivered from a VAP to an AP
carry the service VLAN ID.
Precautions
Modifying the service VLAN of a VAP will interrupt services of STAs connected to
the VAP. Exercise caution when you run the command.
Example
# Set the service VLAN to VLAN 2 in the VAP profile vap1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] service-vlan vlan-id 2
Format
short-preamble disable
undo short-preamble disable
Parameters
None
Views
2G radio profile view
Default Level
2: Configuration level
Usage Guidelines
The preamble is a section of bits in the header of a data frame. It synchronizes
signals transmitted between the sender and receiver. The preamble is classified
into the long preamble and short preamble. The short preamble ensures better
synchronization performance and therefore is recommended. The long preamble is
usually used for compatibility with earlier network adapters of clients.
Example
# Configure the 2G radio profile default to support the short preamble.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] short-preamble disable
Format
single-txchain enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Some non-HT STAs that support 802.11a/b/g cannot receive packets sent by APs
using multiple antennas. As a result, network access failures, frequent STA
roaming, or network instability is caused. After running the single-txchain enable
command to enable the single-antenna transmission mode in an SSID profile,
management packets on the corresponding VAP and data packets sent by the AP
to non-HT STAs on the VAP will be sent in single-antenna transmission mode. For
a radio that is bound to a VAP with the single-antenna transmission mode
enabled, control packets of the radio are sent in single-antenna transmission
mode as long as non-HT STAs is connected to the VAP. When no non-HT STA is
connected to the VAP, the control packets are still sent in multi-antenna
transmission mode.
Precautions
After the single-antenna transmission mode is enabled in an SSID profile, the RSSI
of STAs may be affected.
Example
# Enable the single-antenna transmission mode in SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] single-txchain enable
Format
snmp-agent trap enable feature-name wlan [ trap-name trap-name ]
undo snmp-agent trap enable feature-name wlan [ trap-name trap-name ]
Parameters
Parameter Description Value
trap-name trap- Specifies the name of The value is a string and must be
name a trap. set according to the device
configuration.
Views
System view
Default Level
2: Configuration level
Usage Guidelines
You can specify trap-name to enable the trap function for one or more events of
the WLAN module.
Example
# Enable the hwapfaulttrap trap.
<HUAWEI> system-view
[HUAWEI] snmp-agent trap enable feature-name wlan trap-name hwapfaulttrap
9.80 ssid
Function
The ssid command sets a service set identifier (SSID) for an SSID profile.
Format
ssid ssid
undo ssid
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An SSID specifies a wireless network. When you search for available wireless
networks on your wireless terminal, SSIDs are displayed to identify the available
wireless networks.
Precautions
Example
# Set the SSID to wlan-net in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] ssid wlan-net
The undo ssid-hide enable command disables SSID hiding in Beacon frames in an
SSID profile.
Format
ssid-hide enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A STA listens on the Beacon frames that an AP periodically sends in each channel
to obtain AP information. The STA can obtain SSIDs from Beacon frames that
contain the SSIDs.
The STA can actively send a probe frame with a specified SSID, only the AP with
the same SSID will respond to the STA. If the STA broadcasts a probe frame
without an SSID, only the APs on which SSID hiding in Beacon frames is disabled
will respond to the STA.
● After the ssid-hide enable command is used, an AP periodically sends Beacon
frames that contain empty SSID character strings and does not reply to the
broadcast probe requests sent from STAs. The STAs can send probe frames
with the AP's SSID to discover the SSID.
● After the undo ssid-hide enable command is used, an AP periodically sends
Beacon frames that contain valid SSID character strings and replies to the
broadcast probe requests sent from STAs. The STAs can send probe frames
with the AP's SSID to discover the SSID.
Precautions
If the ssid-hide enable or undo ssid-hide enable command is run in the SSID
profile after STAs are associated with an SSID, service interruptions may occur for
all online STAs.
Example
# Configure SSID hiding in Beacon frames in the SSID profile ssid1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] ssid-hide enable
NOTE
Format
ssid-profile name profile-name
undo ssid-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of an SSID profile. The value is a string
name of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An SSID profile is mainly used to configure STA association and access parameters
based on SSIDs, including the SSID name, STA association timeout period, non-HT
STA access, and QoS CAR.
Follow-up Procedure
Run the ssid-profile (VAP profile view) command to bind the SSID profile to a
VAP profile and run the vap-profile command to bind the VAP profile to an AP
group, AP, AP radio, or AP group radio so that the SSID profile can take effect.
Precautions
● The SSID profile default cannot be deleted.
● The SSID profile referenced by a VAP profile cannot be deleted. To delete the
SSID profile, unbind it from the VAP profile first.
● If the VAP profile has been applied to an AP group or an AP, modifying the
SSID profile will interrupt services.
Example
# Create an SSID profile ssid1 and enter the SSID profile view.
<HUAWEI> system-view
[HUAWEI] wlan
Format
ssid-profile profile-name
undo ssid-profile
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create an SSID profile using the ssid-profile (WLAN view) command,
bind it to a VAP profile to make the SSID profile take effect.
Precautions
After an SSID profile is bound to a VAP profile, parameter settings in the SSID
profile take effect on all APs using the VAP profile.
Example
# Create the SSID profile ssid1 and bind it to the VAP profile vap1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] quit
Format
sta-network-detect disable
undo sta-network-detect disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
After the device is enabled to monitor user traffic and forcibly disconnect STAs
without traffic, a STA meeting all the following conditions is forcibly disconnected
after reassociation and going online:
● The STA does not send DHCP Request messages or receive ARP Reply packets
within 5s after going online.
● The IP address of the STA changes after roaming.
● The STA has only uplink traffic but no downlink traffic.
When you do not require user traffic monitoring or want to prevent STAs from
being forcibly disconnected, run the sta-network-detect disable command.
Example
# Enable the device to monitor user traffic and forcibly disconnect STAs without
traffic.
<HUAWEI> system-view
[HUAWEI] wlan
Format
type service-backup auth-server-down radius-server template template-name
undo type
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
● If the type of a VAP is set to service-backup auth-server-down, the VAP is
automatically enabled to allow network access of associated STAs when the
authentication server is not accessible. When the authentication server
recovers, this VAP is not automatically disabled. You can manually disable it if
needed. If the authentication server is accessible but rejects user access, this
VAP is not automatically enabled. You can manually enable it if needed. To
enable or disable this VAP, run the vap-service-backup auth-server-down
command.
Precautions
● After the VAP type is configured in the VAP profile view, the VAPs generated
by the VAP profile use the configured VAP type. The new VAP type will
overwrite the old one.
Example
# Create the VAP profile vap1 and set the VAP type to authentication-server-
down backup service.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] type service-backup auth-server-down radius-server template temp1
Format
u-apsd enable
undo u-apsd enable
Parameters
None
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
U-APSD is a new energy saving mode defined for WMM, which can improve the
energy-saving capability of STAs.
If some STAs on the network do not support the U-APSD function, disable the U-
APSD function.
Precautions
The U-APSD function takes effect only when WMM is enabled.
Example
# Enable the U-APSD function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] u-apsd enable
Warning: This action may cause service interruption. Continue?[Y/N]y
9.87 utmost-power
Function
The utmost-power disable command disables radios from sending packets at the
maximum power.
The utmost-power enable command enables radios to send packets at the
maximum power.
The undo utmost-power command restores the adaptive mode for radios to send
packets.
By default, radios are enabled to send packets in adaptive mode.
Format
utmost-power { disable | enable }
undo utmost-power
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
This command is valid for all country codes. You can run the utmost-power
enable command to enable radios to send packets at the maximum power or run
the utmost-power disable command to enable radios to send packets at the
power specified by the country code. After you run the undo utmost-power
command to restore the adaptive mode, radios send packets at the maximum
power if the country code is CN or at the power specified by other country codes.
Precautions
802.11ac and 802.11ax APs can send packets at the maximum power.
Example
# Disable radios from sending packets at maximum power.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] utmost-power disable
Format
vap-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a VAP profile. The value is a string
name of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a radio profile is applied to a radio, the AP can transmit and receive radio
signals. After a VAP profile is applied to a radio, VAPs are generated and provide
wireless access services for STAs. You can configure parameters in the VAP profile
to enable APs to provide different wireless services.
Follow-up Procedure
Run the vap-profile command to apply the VAP profile in the radio interface view
so that the VAP profile can take effect.
Precautions
Example
# Create a VAP profile vap1 and enter the VAP profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1]
Format
vap-profile profile-name wlan wlan-id
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you create a VAP profile using the vap-profile (WLAN view) command,
bind it to a radio so that the VAP profile can take effect.
Precautions
After a VAP profile is bound to a radio, parameter settings in the VAP profile apply
to the radio using the profile.
Example
# Create the VAP profile vap1 and bind it to radio Wlan-Radio 0/0/0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] quit
[HUAWEI-wlan-view] quit
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] vap-profile vap1 wlan 1
Format
vap-service-backup auth-server-down { active | inactive } [ vap-profile profile-
name ]
Parameters
Parameter Description Value
vap-profile profile- Specifies the name of a VAP The VAP profile name
name profile. If this parameter is must exist.
not specified, VAPs of this
type on all referenced radios
are enabled.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If an authentication-server-down backup service VAP is not automatically disabled
after the authentication server is restored, the administrator can manually disable
this VAP. When the authentication server rejects access of STAs, the administrator
can manually enable an authentication-server-down backup service VAP to enable
the STAs to enter the survival state.
Precautions
After an authentication-server-down backup service VAP is manually disabled,
STAs associated with this VAP go offline.
Example
# Manually enable an authentication-server-down backup service VAP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-service-backup auth-server-down active vap-profile vap1
Format
vht a-mpdu max-length-exponent max-length-exponent-index
undo vht a-mpdu max-length-exponent
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
To reduce costs, 802.11ac uses frame aggregation technology that aggregates two
or more frames into an A-MPDU to transmit.
Example
# Set the index of the maximum length of the A-MPDU to 2 in the 5G radio
profile default. The index 2 corresponds to a maximum length of 32767 bytes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] vht a-mpdu max-length-exponent 2
Function
The vht a-msdu enable command enables the function of sending 802.11 frames
in A-MSDU mode.
The undo vht a-msdu enable command disables the function of sending 802.11
frames in A-MSDU mode.
Format
vht a-msdu enable
Parameters
None
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Aggregated MAC Service Data Unit (A-MSDU) technology aggregates multiple
MAC Service Data Units (MSDUs) into an MAC Protocol Data Unit (MPDU), which
reduces MAC layer costs of the 802.11 packets and improves packet transmission
efficiency especially when short MSDUs are aggregated.
Precautions
The function of sending 802.11 frames in A-MSDU mode can be enabled on the
802.11ac and 802.11ax radios.
Example
# Enable the function of sending 802.11 frames in A-MSDU mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] vht a-msdu enable
Function
The vht a-msdu max-frame-num command sets the maximum number of
subframes that can be aggregated into an A-MSDU at one time.
The undo vht a-msdu max-frame-num command restores the default maximum
number of subframes that can be aggregated into an A-MSDU at one time.
By default, a maximum of two subframes can be aggregated into an A-MSDU at
one time.
Format
vht a-msdu max-frame-num max-frame-number
undo vht a-msdu max-frame-num
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A-MSDU technology aggregates multiple MSDUs into an MPDU, which reduces
MAC layer costs of the 802.11 packets.
● When the wireless network quality is satisfactory, increase the maximum
number of subframes that can be aggregated into an A-MSDU at one time to
improve the network usage efficiency and wireless service performance.
● When the wireless network quality is unsatisfactory or delay-sensitive services,
such as voice services are transmitted, reduce the maximum number of
subframes that can be aggregated into an A-MSDU at one time to minimize
the impact of packet loss on services and reduce packet transmission delay.
Some STAs have restrictions on the number of subframes aggregated into a
received A-MSDU. If the number of subframes sent by the AP exceeds the
threshold, the STAs cannot receive the frames properly.
Prerequisite
The function of sending 802.11 frames in A-MSDU mode has been enabled using
the vht a-msdu enable command.
Precautions
The function of sending 802.11 frames in A-MSDU mode can only be enabled on
the 802.11ac and 802.11ax radios.
Example
# Set the maximum number of subframes that can be aggregated into an A-
MSDU at one time to 3.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] vht a-msdu max-frame-num 3
Format
vht mcs-map nss nss-value max-mcs max-mcs-value
Parameters
Parameter Description Value
Views
5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Rates of 802.11ac APs depend on the index value of MCS. A larger MCS value
indicates a higher transmission rate.
Precautions
This configuration takes effect only when the AP communicates with STAs through
802.11ac and 802.11ax.
Example
# In the 5G radio profile, set the maximum number of available spatial streams to
2 and the maximum MCS value to 8.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-5g-profile name default
[HUAWEI-wlan-radio-5g-prof-default] vht mcs-map nss 2 max-mcs 8
Format
vht { tx | rx } mcs-map nss nss-value map mcs-value
undo vht { tx | rx } mcs-map
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Rates of 802.11ac APs depend on the index value of MCS. A larger MCS value
indicates a higher transmission rate.
Precautions
This configuration takes effect only when the AP communicates with STAs through
802.11ac and 802.11ax.
Example
# In the SSID profile, set the maximum number of available spatial streams to 2
and the maximum MCS value to 8.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] vht rx mcs-map nss 2 map 8
9.96 wlan
Function
The wlan command displays the WLAN view.
Format
wlan
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Before performing WLAN configurations, run the wlan command to enter the
WLAN view. All WLAN configuration commands need to be used in the WLAN
view or WLAN sub-view.
Example
# Enter the WLAN view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view]
10 AP Management Configuration
Commands
Format
access-user syslog-restrain enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
After a STA passes authentication or successfully associates with the AP, the AP
sends system logs to the NMS server. A system log contains MAC addresses of the
STA and AP, AP name and current time, and authentication result.
Example
# Enable system log suppression.
<HUAWEI> system-view
[HUAWEI] access-user syslog-restrain enable
Format
access-user syslog-restrain period period
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
When a STA is authenticated or successfully associates with an AP, the AP sends
system logs to the NMS server. A system log contains the MAC addresses of the
STA and AP, AP name, current time, and authentication result.
Example
# Set the period of system log suppression to 600s.
<HUAWEI> system-view
[HUAWEI] access-user syslog-restrain period 600
Format
channel-load-mode indoor
undo channel-load-mode indoor
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
In scenarios where indoor and outdoor boundaries are unclear, such as subway
and train platforms, it is recommended that outdoor APs be deployed. When a
large volume of data is transmitted, outdoor APs in outdoor channel mode have
no sufficient channels to meet data transmission requirements. In this case, you
can run the channel-load-mode indoor command to set the channel mode of the
APs to indoor mode, so that data can be transmitted on more channels.
Precautions
This command will cause an AP running V200R019C10 or earlier to automatically
restart. Therefore, exercise caution when running this command.
This function is available only for the following models: AP8030DN, AP8130DN,
AP8050TN-HD, AP8050DN, AP8150DN, AP8050DN-S, AP8082DN, AP8182DN.
This function is not supported by cloud APs running versions earlier than
V200R019C00SPC803.
Example
# Set the AP channel mode to indoor mode.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan] channel-load-mode indoor
Warning: Modifying the channel set mode may delete channels of AP radios in this
domain and restart the AP. Continue?[Y/N]:y
Format
display ap around-ssid-list
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view SSIDs of neighbors of a specified AP.
Example
# Display SSIDs of neighbors of the AP.
<HUAWEI> display ap around-ssid-list
In control AP(2.4G):
----------------------------------------------------
SSID
----------------------------------------------------
admin-edf
----------------------------------------------------
Total: 1
Uncontrol AP(2.4G):
----------------------------------------------------
SSID
----------------------------------------------------
admin-abc
----------------------------------------------------
Total: 1
Format
display ap led
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view the indicator blinking status of an AP.
Example
# Display the indicator blinking status of the AP.
<HUAWEI> display ap led
Led status : blink
Blink left time(s) : 100
Item Description
Format
display ap optical-info
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to view optical module information, including the
optical module type, transmit optical power, and receive optical power.
Prerequisites
The AP supports optical modules. You can run the display version command to
view the AP model.
NOTE
Example
# Display optical module information about the AP.
<HUAWEI> display ap optical-info
-------------------------------------------------------------------------------
Common information:
Transceiver Type :
Connector Type :LC
Wavelength(nm) :1310
Transfer Distance(m) :10000(9um)
Copper Link Length(m) :0
Digital Diagnostic Monitoring :NO
Vendor Name :FINISAR CORP.
Vendor Part Number :FTLF1318P2BTL-HW
Vendor IEEE Company ID :36965
Vendor Revision Level :A
Nominal Bit Rate(MBits/sec) :1200
--------------------------------------------------------------------------------
Manufacture information:
Manu. Serial Number :PMK2K62
Manufacturing Date :2012-05-09
Vendor Name :FINISAR CORP.
--------------------------------------------------------------------------------
Diagnostic information:
Temperature(degree C) :49
Temp High Threshold(degree C) :90
Temp Low Threshold(degree C) :-45
Voltage(0.1mV) :33161
Volt High Threshold(0.1mV) :37000
Volt Low Threshold(0.1mV) :29000
Bias Current(mA) :19
Bias High Threshold(mA) :25430
Bias Low Threshold(mA) :1929
RX Power(0.1uw) :0
RX Power High Threshold(0.1uw) :5012
RX Power Low Threshold(0.1uw) :126
TX Power(0.1uw) :2886
TX Power High Threshold(0.1uw) :6310
TX Power Low Threshold(0.1uw) :708
--------------------------------------------------------------------------------
Item Description
Item Description
Item Description
Format
display ap run-info
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
This command displays the AP running status. You can run this command to
monitor an AP in real time.
Prerequisites
The AP works properly.
Example
# Display the running status of the AP.
<HUAWEI> display ap run-info
--------------------------------------------------------------------------------
Country code : CN
Software version : V200R007C20
Hardware version : Ver.A
Memory size(MB) : 256
Flash size(MB) : 64
Run time(ddd:hh:mm:ss) : 4D:0H:7M:31S
--------------------------------------------------------------------------------
Format
display ap uncontrol all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view information about all uncontrolled APs. The
command output includes channel of the controlled AP closest to the uncontrolled
AP and the strength of signals that the controlled AP received from the
uncontrolled AP.
Example
# View information about all uncontrolled APs.
Item Description
R230D/R240D 40
AP4050DN-HD 79
AP8050DN/AP8050DN-S/AP8150DN/ 83
AP9330DN/AP7030DE
AP9131DN/AP9132DN 84
AP8030DN/AP6050DN/AP6150DN/ 86
AP5050DN-S
AP4030TN/AP5030DN/AP5130DN/ 87
AP5030DN-S
AP8130DN/AP7050DE/AP7052DN/ 88
AP7152DN/AP6052DN/AP4051TN/
AP6750-10T
AP7050DN-E 89
AP4050DE-M/AP4050DE-M-S/ 90
AirEngine 5760-10
AP8082DN/AP8182DN/AP8050TN-HD 91
AP4050DN-E 92
AP7052DE/R251D/R251D-E 95
AP4050DN/AP1050DN-S/R450D 96
R250D/R250D-E 102
NOTE
Format
high-temperature threshold threshold
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to set the upper temperature alarm threshold for an
AP. When an AP's temperature exceeds the upper threshold, the AP generates an
alarm and a log.
Example
# Set the upper temperature alarm threshold for APs to 65°C.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] high-temperature threshold 65
The undo led blink-time command cancels the indicator blinking configuration of
an AP.
Format
led blink-time blink-time
Parameters
Parameter Description Value
Views
User view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When this function is enabled, the SYS indicator on an AP blinks orange and green
alternatively.
Precautions
The configuration using the led blink-time command takes precedence over that
using the led off command. That is, if AP indicators are configured to blink and to
turn off or turn off during the specified time range, the configuration performed
using the led off command takes effect after the RU indicators blink.
Example
# Configure the AP indicator to blink for 300 seconds.
<HUAWEI> led blink-time 300
Format
led off [ time-range time-range-name ]
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Blinking indicators of indoor APs deployed in hospitals and hotels may affect
people's nighttime rest. To prevent this, run the led off command to turn off AP
indicators or turn them off during the specified time range.
If you need to locate AP faults by observing AP indicator status, run the undo led
off command to allow the AP indicators to turn on.
Precautions
The configuration performed using the led blink-time command takes precedence
over that performed using the led off command. That is, if AP indicators are
configured to blink and to turn off or turn off during the specified time range, the
configuration performed using the led off command takes effect after the RU
indicators blink.
Example
# Turn off AP indicators.
R230D/R240D 0
R250D/R250D-E/R251D/R251D-E -3
AP5030DN-S/AP5130DN/AP5030DN/ -13
AP6150DN/AP4050DN-HD/
AP4050DN-E/AP4030TN/AP4050DN/
AP1050DN-S/AP7052DN/AP7152DN/
AP7052DE/AP6052DN/AP4051TN/
AP6050DN/AP7050DE/AP7050DN-E/
R450D/AP5050DN-S/AP9330DN/
AP6750-10T
AP7030DE -23
AP8030DN/AP8050DN/AP8150DN/ -43
AP8050DN-S/AP8130DN/AP9131DN/
AP9132DN/AP8082DN/AP8182DN/
AP8050TN-HD
NOTE
Format
low-temperature threshold threshold
Parameters
Parameter Description Value
threshold Specifies the The value is an integer that ranges from -70
lower to +10, in °C.
temperature
alarm
threshold.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
You can run this command to set the lower temperature alarm threshold for an
AP. When an AP's temperature exceeds the lower threshold, the AP generates an
alarm and a log.
Example
# Set the lower temperature alarm threshold for APs to 5°C.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] low-temperature threshold 5
Format
mtu mtu
undo mtu
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The MTU determines the maximum number of bytes in IP packets each time a
sender can send. The MTU of an IP packet refers to the number of bytes from the
IP header of the packet to the data.
The size of data frames is limited at the network layer. Any time the IP layer
receives an IP packet to be sent, it checks to which local interface the packet
needs to be sent and obtains the MTU configured on the interface. Then the IP
layer compares the MTU with the packet length. If the packet length is longer
than the MTU, the IP layer fragments the packet into smaller packets, which are
shorter than or equal to the MTU. If unfragmentation is configured, some packets
Precautions
● DHCP packets cannot be fragmented. When the MTU value set using the mtu
command is smaller than the DHCP packet length, DHCP packets cannot be
forwarded. Therefore, set a larger MTU value.
● If the MTU value is smaller than the DHCP packet length, the AP may be
disconnected. In this case, restart the AP.
● The MTU configured on the management VLANIF and CAPWAP takes effect
on both IPv4 and IPv6 packets. However, the IPv6 packets support only a
minimum MTU of 1280 bytes. If the configured MTU is smaller than 1280
bytes, the length of 1280 bytes takes effect.
● When the MTU is too small and the DF bit is set to 1, packets cannot be
fragmented. In this case, use the forced fragmentation function.
Example
# Set the MTU value of the AP's CAPWAP tunnel to 1492 bytes.
<HUAWEI> system-view
[HUAWEI] mtu 1492
Function
The sta-ipv6-service enable command enables the function of processing STA
IPv6 services.
Format
sta-ipv6-service enable
undo sta-ipv6-service enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On an IPv6 network, the AP needs to forward IPv6 packets. After this function is
enabled, the AP can forward received STA IPv6 packets transparently to other
devices rather than discarding these packets.
Example
# Enable the function of processing STA IPv6 services.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta-ipv6-service enable
The USB function can be enabled or disabled only for the following models:
● AP7060DN, AirEngine 5760-10, AP6750-10T, AP2050DN, AP2050DN-E, AP2050DN-S,
AP2051DN, AP2051DN-E, AP2051DN-S, AP4030TN, AP4050DN-E, AP4051DN, AP4151DN,
AP4051DN-S, AP4051TN, AP5050DN-S, AP6050DN, AP6150DN, AP6052DN, AP7050DE,
AP7050DN-E, AP7052DE, AP7052DN, AP7152DN
Format
usb enable
Parameters
None
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When users need to save or transfer files using the USB interface provided on
some APs, the USB function can be enabled using the usb enable command.
When the USB function is enabled, the power consumption of the AP will increase,
which may affect other functions. You are advised to run the undo usb enable
command to disable the USB function after using it.
Precautions
Some AP functions may be affected after the USB function is enabled. For details,
see Understanding PoE in the Configuration - AP Management Configuration
Guide-Managing the PoE Function of an AP.
The affected AP functions are restored after the USB function is disabled.
Example
# Enable the USB function.
<HUAWEI> system-view
[HUAWEI] usb enable
11.1 amc-policy
11.2 air-scan-profile
11.3 air-scan-profile (radio profile view)
11.4 band-steer balance gap-threshold
11.5 band-steer balance start-threshold
11.6 band-steer client-band-expire
11.7 band-steer deny-threshold
11.8 band-steer disable
11.9 band-steer snr-threshold
11.10 calibrate auto-bandwidth-selection
11.11 calibrate auto-channel-select
11.12 calibrate auto-txpower-select
11.13 calibrate enable { auto | manual | schedule time }
11.14 calibrate environment-deterioration-blacklist
11.15 calibrate error-rate-check
11.16 calibrate error-rate-threshold
11.17 calibrate tpc threshold
11.18 calibrate flexible-radio
11.19 calibrate flexible-radio manual-recognize
11.20 calibrate max-tx-power
11.1 amc-policy
Function
The amc-policy command configures an adaptive modulation and coding (AMC)
algorithm for a radio.
The undo amc-policy command restores the default AMC algorithm for a radio.
By default, a radio uses the AMC algorithm auto-balance.
NOTE
Format
amc-policy { auto-balance | high-stability | high-throughput }
undo amc-policy
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Radios need to adjust the AMC algorithm according to different scenarios to
deliver the optimal user experience. Three AMC algorithms are available:
● auto-balance: applicable to most wireless scenarios
● high-stability: applicable to scenarios with continuous interference.
● high-throughput: applicable to scenarios with good wireless signals and non-
continuous interference.
Example
# Set the AMC algorithm of a radio to high-stability.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name test
[HUAWEI-wlan-rrm-prof-test] amc-policy high-stability
11.2 air-scan-profile
Function
The air-scan-profile command creates an air scan profile and displays the air scan
profile view.
By default, the system provides the air scan profile default. You can run the
display air-scan-profile command to view configuration of the air scan profile
default.
Format
air-scan-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of an air scan profile. The value is a string
name of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
all Deletes all air scan profiles. The air scan profile
default can be
modified but cannot
be deleted.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an air scan profile is created using the air-scan-profile command and bound
to a radio profile, and scanning functions are enabled, such as radio calibration,
smart roaming, WLAN location, and WIDS, the AP periodically scans surrounding
radio signals and reports the collected information to a server. The information is
used for radio calibration, smart roaming, WLAN location, or WIDS data analysis.
Follow-up Procedure
Run the air-scan-profile (radio profile view) command to bind the air scan
profile to a 2G radio profile or 5G radio profile so that the air scan profile can take
effect.
Example
# Create the air scan profile air-scan01.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name air-scan01
[HUAWEI-wlan-air-scan-prof-air-scan01]
The undo air-scan-profile command unbinds an air scan profile from a radio
profile.
Format
air-scan-profile profile-name
undo air-scan-profile
Parameters
Parameter Description Value
profile-name Specifies the name of an air scan profile. The air scan profile
name must already
exist.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
After you create an air scan profile using the air-scan-profile command, bind it to
a radio profile so that the air scan profile can take effect.
Example
# Bind the air scan profile air-scan01 to the radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name air-scan01
[HUAWEI-wlan-air-scan-prof-air-scan01] quit
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] air-scan-profile air-scan01
By default, the percentage threshold for access STAs on 5 GHz radios during band
steering is 90%.
Format
band-steer balance gap-threshold gap-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
After the band steering function is configured on a multi-radio AP, the AP instructs
STAs that support multiple frequency bands to preferentially connect to a 5 GHz
radio.
NOTE
In most cases, you are advised to use the default values of the start threshold for the number of
access STAs and the percentage threshold for access STAs on 5 GHz radios. If the two thresholds
are set low, the AP may allow STAs to freely select the access frequency band when the number
of STAs on 5 GHz radios is small. As a result, the 5G-prior access mechanism does not take
effect, and the 5 GHz band utilization cannot be maximized.
Example
# Set the percentage threshold for access STAs on 5 GHz radios to 85% in the
RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] band-steer balance gap-threshold 85
Format
band-steer balance start-threshold start-threshold
undo band-steer balance start-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
After the band steering function is configured on a multi-radio AP, the AP instructs
STAs that support multiple frequency bands to preferentially connect to a 5 GHz
radio.
NOTE
In most cases, you are advised to use the default values of the start threshold for the number of
access STAs and the percentage threshold for access STAs on 5 GHz radios. If the two thresholds
are set low, the AP may allow STAs to freely select the access frequency band when the number
of STAs on 5 GHz radios is small. As a result, the 5G-prior access mechanism does not take
effect, and the 5 GHz band utilization cannot be maximized.
Example
# Set the start threshold for the number of access STAs during band steering to 90
in the RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] band-steer balance start-threshold 90
Format
band-steer client-band-expire probe-counters
undo band-steer client-band-expire
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the band steering function is enabled on an AP, the AP records frequency
band information of terminals so that the terminals can preferentially access the
supported and lightly loaded frequency band.
Users may change terminals' configurations, which causes the supported
frequency band of terminals to change. Therefore, the AP needs to update
frequency band information of terminals in a timely manner. If the AP keeps
receiving Probe frames of a terminal from a specific frequency band, and the
number of receiving times exceeds a certain threshold, the AP updates the
frequency band information of the terminal and considers that the terminal
supports only the frequency band.
For example, the supported frequency bands of a terminal are 2.4 and 5 GHz
frequency bands on an AP. If the AP only receives Probe frames of the terminal
from the 2.4 GHz frequency band, and the number of times that the AP
consecutively receives Probe frames from the 2.4 GHz frequency band exceeds the
specified threshold, the AP considers that users change the terminal configuration
and the terminal supports only the 2.4 GHz frequency band.
Precautions
If you set the aging condition to a large number of times that an AP consecutively
receives Probe frames of a terminal from the same frequency band, the AP detects
terminal band change more slowly. A smaller number indicates quicker response.
Set the aging condition according to the difference in the number of Probe frames
sent from the two frequency bands.
Example
# Configure the supported band information of the terminal named default to
age out when the number of times that an AP consecutively receives Probe frames
from a frequency band exceeds 80.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] band-steer client-band-expire 80
Format
band-steer deny-threshold deny-threshold
undo band-steer deny-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
If a STA requests to associate with an AP from the 2.4 GHz frequency band but the
AP steers the STA to the 5 GHz frequency band according to the band steering
algorithm, the AP will reject the association. However, after the number of
rejections exceeds the maximum value specified by the band-steer deny-
threshold command, the AP allows the STA to associate from the 2.4 GHz
frequency band.
Example
# Set the maximum number of rejections to 8.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] band-steer deny-threshold 8
Function
The band-steer disable command disables the band steering function.
The undo band-steer disable command enables the band steering function.
By default, the band steering function is enabled.
Format
band-steer disable
undo band-steer disable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Compared with the 2.4 GHz frequency band, the 5 GHz frequency band has less
interference and more available channels, and provides higher access capability.
Most STAs support both 5 GHz and 2.4 GHz frequency bands and usually associate
with the 2.4 GHz radio by default when connecting to the Internet. To connect the
STAs to the 5 GHz radio, you must manually select the 5 GHz radio. The band
steering function frees you from the manual selection.
After you enable band steering for a specific SSID on the device, the AP
preferentially associates the terminals connected to the SSID with the 5 GHz
frequency band. After the 5 GHz frequency band is fully loaded, the AP steers the
terminals to the 2.4 GHz frequency band.
Configuration Impact
After the band steering function is enabled, it takes a long time for dual-band
terminals to associate or roam. You are advised to disable band steering for delay-
sensitive services.
Precautions
If both radios of an AP use the same VAP profile, the band steering function takes
effect on both radios as long as the function is enabled for an SSID on one radio
of the AP. For example, if band steering is enabled for the SSID test on the 2.4
GHz radio but not on the 5 GHz radio, the AP preferentially steers terminals
associated with the SSID to the 5 GHz radio.
Single-radio devices do not support the band steering function.
Example
# Disable band steering.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name test
[HUAWEI-wlan-vap-prof-test] band-steer disable
Format
band-steer snr-threshold snr-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the undo band-steer disable command to enable the band steer
function and the band-steer snr-threshold command to configure a start SNR
threshold for triggering 5G-prior access. When the SNR in 5G Probe frames sent by
a multi-band STA to a multi-radio AP exceeds the specified threshold, the STA
connects to the 5G radio preferentially, improving user experience.
Example
# Set the start SNR threshold for triggering 5G-prior access in the RRM profile
default to 20 dB.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] band-steer snr-threshold 20
NOTE
Format
calibrate auto-bandwidth-selection { enable | disable }
undo calibrate auto-bandwidth-selection
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In non-high-density indoor scenarios, the DBS function can leverage the radio
calibration mechanism to automatically select proper bandwidth, improving the
overall system capacity.
Prerequisites
● Radio calibration has been enabled using the calibrate enable { auto |
manual | schedule time } command.
● Automatic channel selection has been enabled using the calibrate auto-
channel-select enable command.
Precautions
● The DBS function is valid only for 5 GHz radios.
● The DBS function is applicable only to indoor APs with omnidirectional
antennas. The adjustment effect cannot be ensured for indoor APs with
directional antennas and outdoor APs.
● The DBS function takes effect only between cloud APs on the same site but
not between APs on different sites.
● The DBS effect is not obvious for high-density scenarios.
Example
# Enable the DBS function.
<HUAWEI> system-view
[HUAWEI] interface Wlan-Radio 0/0/1
[HUAWEI-Wlan-Radio0/0/1] calibrate auto-bandwidth-selection enable
Format
calibrate auto-channel-select { enable | disable }
Parameters
None
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Two channel selection modes are available:
● Automatic mode (enabling automatic channel selection): An AP automatically
selects a proper channel based on the WLAN radio environment, removing the
need to specify channels manually.
● Fixed mode (disabling automatic channel selection): Channels must be
manually specified.
NOTE
When automatic channel selection is enabled, the manually configured channels do not take
effect to ensure that the radio works in the optimal channel environment.
Example
# Disable automatic channel selection.
<HUAWEI> system-view
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] calibrate auto-channel-select disable
Format
calibrate auto-txpower-select { enable | disable }
undo calibrate auto-txpower-select
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Two power selection modes are available:
● Automatic mode (enabling automatic transmit power selection): An AP
automatically selects or adjusts the transmit power based on the WLAN radio
environment, removing the need to specify AP power manually.
● Fixed mode (disabling automatic transmit power selection): The transmit
power must be manually specified.
NOTE
For common Fat APs, to ensure the signal strength of the default SSID, automatic transmit
power selection is disabled and the transmit power is fixed at 20 dBm when no country code is
configured. You can configure the country code according to local laws and regulations and
then enable automatic transmit power selection.
Example
# Disable automatic transmit power selection.
<HUAWEI> system-view
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] calibrate auto-txpower-select disable
Function
The calibrate enable { auto | manual | schedule time } command configures the
radio calibration mode.
By default, the radio calibration mode is auto, the radio calibration interval is
1440 minutes, and the start time for radio calibration is 03:00:00.
Format
calibrate enable { auto [ interval interval-value [ start-time start-time ] ] |
manual | schedule time time-value }
Parameters
time time- Specifies the time for The value is in the format of hh:mm:ss.
value triggering the ● hh: indicates the hour. The value is
scheduled radio an integer that ranges from 0 to 23.
calibration.
● mm: indicates the minute. The value
is an integer that ranges from 0 to
59.
● ss: indicates the second. The value is
an integer that ranges from 0 to 59.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
There are three radio calibration modes:
● Automatic radio calibration mode: The device periodically implements radio
calibration at certain intervals (the interval is specified by interval and the
default interval is 1440 minutes).
● Manual radio calibration mode: Radio calibration is not automatically
implemented by the device but manually triggered through the calibrate
manual startup command.
● Schedule radio calibration mode: The device triggers radio calibration only at
a specified time point (specified by time).
The three modes cannot be configured simultaneously. You can choose any of the
modes as required.
In any mode, you can run the calibrate manual startup command to trigger the
calibration. In manual radio calibration mode, the device implements radio
calibration only after the calibrate manual startup command is executed.
Example
# Set the radio calibration mode to manual.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate enable manual
# Set the radio calibration mode to schedule and set the time for scheduled radio
calibration to 20:30:00.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate enable schedule time 20:30:00
Format
calibrate environment-deterioration-blacklist threshold threshold
undo calibrate environment-deterioration-blacklist
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
When detecting that the environment of a channel deteriorates, the device
generates an environment deterioration alarm and accumulates the number of
environment deterioration times on the channel. If this number exceeds the
threshold, the channel is added to the calibration blacklist. The device will skip this
channel when performing radio calibration next time. If the number of
environment deterioration times does not exceed the threshold, interference
penalty is performed accordingly.
NOTE
If the number of environment deterioration times on more than half of calibration channels
exceeds the threshold, the device performs interference penalty on all channels in the next
calibration but does not add the channels to the blacklist.
Example
# Set the blacklist threshold for the number of times the channel environment
deteriorates to 20.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate environment-deterioration-blacklist threshold 20
Format
calibrate error-rate-check interval interval traffic-threshold traffic-threshold
undo calibrate error-rate-check
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the calibrate error-rate-check command to lower the sensitivity for
collecting radio retransmission rate statistics. When the rate of network traffic
reaches the threshold, retransmission rate check is performed at the specified
interval.
Example
# Set the interval and traffic threshold for checking the retransmission rate in the
RRM profile default to 2 minutes and 1000 kbit/s, respectively.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] calibrate error-rate-check interval 2 traffic-threshold 1000
Format
calibrate error-rate-threshold error-rate-threshold
undo calibrate error-rate-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
The retransmission rate is the ratio of retransmitted packets to all packets sent by
a radio.
The retransmission rate threshold determines whether the radio environment is
normal. When the retransmission rate of a radio reaches the threshold, the system
considers that the radio environment deteriorates. When this occurs, the system
may start radio calibration or take measures to avoid signal interference.
Example
# Set the retransmission rate threshold to 70% in the RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] calibrate error-rate-threshold 70
Format
calibrate tpc threshold threshold
undo calibrate tpc threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When radio calibration is enabled, the TPC coverage threshold is different
depending on AP deployment scenarios because the AP deployment distance or
height differs. To ensure the optimal coverage effect, adjust the TPC coverage
threshold based on the actual AP deployment situations. A large threshold
indicates a wider transmit power range that can be adjusted through TPC.
Example
# Set the TPC coverage threshold to -70 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] calibrate tpc threshold -70
Format
calibrate flexible-radio { auto-switch | auto-off }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
DFA applies to scenarios where indoor APs with omnidirectional antennas are
densely deployed, the 2.4 GHz frequency band has severe co-channel interference,
and most STAs on the network support the 5 GHz frequency band.
Prerequisites
The radio calibration function has been enabled using the calibrate enable { auto
| manual | schedule time } command.
Precautions
DFA reduces the deployment density of 2.4 GHz radios and increases the transmit
power of 2.4 GHz radios. To ensure the 5 GHz access ratio of STAs, keep the band
steering function enabled.
When DFA is disabled, redundant radios are switched back to 2.4 GHz radios and
the system automatically triggers radio calibration, which may degrade wireless
service experience.
Example
# Enable global DFA and set the mode for processing redundant radios to
automatic switchover.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate enable auto
[HUAWEI-wlan-view] calibrate flexible-radio auto-switch
Format
calibrate flexible-radio manual-recognize
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The network administrator can run this command to manually trigger
identification of redundant radios, and can enable DFA if discovering that
redundant radios exist on the network.
Prerequisites
The radio calibration function has been enabled using the calibrate enable { auto
| manual | schedule time } command.
Precautions
This command only triggers identification of redundant radios but does not switch
or disable identified redundant radios.
Radio scanning is required for identifying redundant radios, which may degrade
wireless service experience.
Follow-up Procedure
After redundant radios are identified, you can run the display flexible-radio
status command to check the status of the redundant radios.
Example
# Trigger identification of redundant radios.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate enable auto
[HUAWEI-wlan-view] calibrate flexible-radio manual-recognize
Format
calibrate max-tx-power { 2g-power | radio-5g 5g-power }
undo calibrate max-tx-power [ radio-5g ]
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After radio calibration is enabled, an AP uses the Transmit Power Control (TPC)
algorithm to calculate the transmit power to be adjusted based on detected
neighbor information. If the transmit power to be adjusted calculated using the
TPC algorithm is to large, signal interference between APs may occur. You can run
the calibrate max-tx-power command to set the maximum transmit power that
can be adjusted through TPC.
Precautions
The maximum radio calibration power must be larger or equal to the minimum
radio calibration power. You can run the calibrate min-tx-power command to set
the minimum calibration power.
You can adjust the maximum and minimum calibration powers using the calibrate
max-tx-power and calibrate min-tx-power commands. The valid power after
radio calibration is between the two values.
Example
# Set the maximum transmit power that can be adjusted through 2.4 GHz radio
calibration to 30 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] calibrate max-tx-power 30
By default, the minimum transmit power that can be adjusted through 2.4 GHz
radio calibration is 9 dBm, and that through 5 GHz radio calibration is 12 dBm.
Format
calibrate min-tx-power { 2g-power | radio-5g 5g-power }
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After radio calibration is enabled, an AP uses the Transmit Power Control (TPC)
algorithm to calculate the transmit power to be adjusted based on detected
neighbor information. If the transmit power calculated using the TPC algorithm is
too small, radio coverage requirements may not be met. You can run the calibrate
min-tx-power command to set the minimum transmit power that can be adjusted
through TPC.
Precautions
The maximum radio calibration power must be larger or equal to the minimum
radio calibration power. You can run the calibrate max-tx-power command to set
the maximum calibration power.
You can adjust the maximum and minimum calibration powers using the calibrate
max-tx-power and calibrate min-tx-power commands. The valid power after
radio calibration is between the two values.
Example
# Set the minimum transmit power that can be adjusted through 2.4 GHz radio
calibration to 10 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] calibrate min-tx-power 10
Function
The calibrate manual startup command manually triggers radio calibration.
Format
calibrate manual startup
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
To trigger radio calibration immediately, run the calibrate enable { auto | manual
| schedule time } command to enable radio calibration and then run the calibrate
manual startup command to manually trigger radio calibration.
Example
# Manually trigger radio calibration.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate enable auto
[HUAWEI-wlan-view] calibrate manual startup
Warning: The operation may cause business interruption, Continue? [Y/N]:y
The default noise floor threshold for triggering radio calibration is -75 dBm.
Format
calibrate noise-floor-threshold threshold
undo calibrate noise-floor-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The noise floor indicates the noise strength in the current environment. A high
noise floor value will make noise drown out valid data, affecting user services.
The noise floor threshold for triggering radio calibration can be used to determine
whether the environment noise is normal. When detecting a noise floor value
higher than the threshold, an AP reports a high noise floor message, and then
performs radio calibration to avoid channels with high noise floor values to
improve user experience.
Example
# Set the noise floor threshold for triggering radio calibration to -60 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] calibrate noise-floor-threshold -60
Function
The calibrate policy command creates a radio calibration policy.
The undo calibrate policy command deletes a radio calibration policy.
Format
calibrate policy { rogue-ap | load | non-wifi | noise-floor }
undo calibrate policy { rogue-ap | load | non-wifi | noise-floor }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Radio calibration policies are classified into:
● Rogue AP policy: When rogue APs exist on a network, set the radio calibration
policy to rogue-ap. The device then immediately takes actions to avoid
interference. This policy may lead to frequency channel switchovers. You are
advised to use this policy under the instruction of technical support personnel.
● Load policy: When this radio calibration policy is used, the AP traffic load
difference is considered for channel allocation. The device allocates channels
with less interference to APs with heavier loads. The AP load changes with
times. You are advised to use this policy under the instruction of technical
support personnel.
● Non-Wi-Fi policy: When non-Wi-Fi interference occurs on a network, the
device immediately takes actions to avoid interference.
● Noise floor policy: When the noise floor of APs is high due to special external
interference, service experience may deteriorate. With this radio calibration
policy, the device takes actions to avoid interference. When detecting that the
noise floor of the current channel exceeds the threshold for three consecutive
times, the AP switches its channel and does not switch back in 30 minutes.
NOTE
The noise floor, rogue AP and non-Wi-Fi policies take effect only in automatic radio
calibration mode.
Radio calibration triggers channel changes. Some STAs may go offline and then go
online again. If these STAs exist on the network, to ensure service experience, you
are advised to perform radio calibration when no service is running and disable
policies that frequently trigger radio calibration. You can run the display channel
switch-record calibrate command to check policies that frequently trigger radio
calibration.
The three radio calibration policies can be used together. You can run the
command multiple times to configure different radio calibration policies according
to service requirements.
Prerequisites
The noise floor threshold for triggering radio calibration has been specified using
the calibrate noise-floor-threshold threshold command.
Example
# Set the radio calibration policy to rogue AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate policy rogue-ap
NOTE
Format
calibrate reference data-analysis disable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After Big Data calibration is enabled, the device performs calculation based on the
variations in interference and load according to Big Data information obtained
from the CampusInsight. This function helps better avoid interference and improve
network capacity. If the Big Data calibration function is disabled, radio calibration
is performed based only on the locally collected data.
The Big Data calibration function takes effect only when radio calibration is
enabled.
Example
# Disable the Big Data calibration function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate reference data-analysis disable
NOTE
Format
calibrate reference data-analysis { disable | enable }
undo calibrate reference data-analysis
Parameters
None
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
After Big Data calibration is enabled, the device performs calculation based on the
variations in interference and load according to Big Data information obtained
from the CampusInsight. This function helps better avoid interference and improve
network capacity. If the Big Data calibration function is disabled, radio calibration
is performed based only on the locally collected data.
NOTE
The Big Data calibration function takes effect on an AP only when the following
configurations are performed:
● Configure the function of reporting KPIs to the Big Data analyzer.
● Enable radio calibration.
● Run the undo calibrate reference data-analysis command in the WLAN view to enable
the global Big Data calibration function.
● Enable the Big Data calibration function on the AP.
Example
# Enable Big Data calibration on radio 0.
<HUAWEI> system-view
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] calibrate reference data-analysis enable
Function
The calibrate sensitivity command configures the radio calibration sensitivity for
a device.
The undo calibrate sensitivity command restores the default radio calibration
sensitivity.
Format
calibrate sensitivity { high | medium | low | insensitivity | custom-threshold
custom-threshold }
undo calibrate sensitivity
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Radio calibration sensitivity is valid only in automatic radio calibration mode
(enabled using the calibrate enable auto command). The default value is
recommended.
You are advised to customize the sensitivity threshold when the wireless environment is stable
(APs are online with fixed interference or no surrounding interference). If the customized
sensitivity threshold (5 or higher) is used in other scenarios, radio transmission cannot avoid
high-interference channels due to low sensitivity, affecting user experience.
Example
# Set the radio calibration sensitivity to high.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] calibrate sensitivity high
11.28 cca-threshold
Function
The cca-threshold command sets the clear channel assessment (CCA) threshold
for APs.
The undo cca-threshold command restores the default CCA threshold of APs.
By default, no CCA threshold is specified. APs use the default CCA threshold of the
chip.
Format
cca-threshold cca-threshold
undo cca-threshold
Parameters
Parameter Description Value
cca-threshold Specifies the CCA threshold The value is an integer that ranges
for APs. from -85 to -40, in dBm.
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
The CCA mechanism enables a WLAN chip to determine whether the channel is
idle before transmitting signals to the air interface. If so, the chip transmits signals.
If not, the chip waits until the channel is idle.
The CCA threshold is used by a WLAN chip to determine whether the channel is
idle. If the noise on the channel exceeds the threshold, the chip considers the
channel busy. Otherwise, the chip considers the channel idle.
When deploying a WLAN, set a proper CCA threshold to reduce signal interference
and improve the channel reuse rate.
● If APs are densely deployed, a high CCA threshold is recommended to narrow
down the coverage and ignore remote weak signals.
● If APs are sparsely deployed, a low CCA threshold is recommended to
maximize the effective coverage of signals.
Example
# Set the CCA threshold for a 2G radio to -70 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] cca-threshold -70
Warning: This parameter may affect uplink access coverage or STA access. Modify this parameter only
under the guidance of technical
personnel. Continue? [Y/N]Y
Format
dca-channel 5g bandwidth { 20mhz | 40mhz | 80mhz }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The 5 GHz frequency band has richer spectrum resources. In addition to 20 MHz
channels, APs working on the 5 GHz frequency band support 40 MHz and 80 MHz
channels. Larger-bandwidth channels mean higher transmission rates. However, at
least three channels are required in radio calibration to achieve the optimal
calibration effect. When configuring the calibration bandwidth, ensure that
enough calibration channels are available for use.
You can use the dca-channel bandwidth command to configure the calibration
bandwidth and the dca-channel channel-set command to configure calibration
channels as prompted.
Configuration Impact
When the calibration bandwidth is changed, the device recalculates the calibration
channels.
Precautions
Only the following APs support 80 MHz calibration bandwidth.
● AP1050DN-S, AP2050DN, AP2050DN-E, AP2050DN-S, AP2051DN, AP2051DN,
AP2051DN-E, AP2051DN-E, AP2051DN-S, AP2051DN-S, AP3010DN-V2,
AP3030DN, AP4030DN, AP4030TN, AP4050DN, AP4050DN-E, AP4050DN-HD,
AP4050DN-S, AP4051DN, AP4051DN-S, AP4051TN, AP4130DN, AP4151DN,
AP5030DN, AP5030DN-S, AP5050DN-S, AP5130DN, AP6050DN, AP6052DN,
AP6150DN, AP7050DE, AP7050DN-E, AP7052DE, AP7052DN, AP7152DN,
AP8030DN, AP8050DN, AP8050DN-S, AP8050TN-HD, AP8082DN, AP8130DN,
AP8150DN, AP8182DN, AP4050DE-M, AP4050DE-M-S, AP4050DE-B-S,
AP3050DE, AP7060DN, AP2051DN-L-S, AP5510-W-GP, AP6750-10T, AirEngine
5760-10, AP9130DN, AP9131DN, and AP9132DN
When configuring 40 MHz or 80 MHz calibration bandwidth, check whether
channels of the corresponding bandwidth exist under the country code.
Example
# Set the calibration bandwidth to 40 MHz.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] dca-channel 5g bandwidth 40mhz
Format
dca-channel { 2.4g | 5g } channel-set channel-value
undo dca-channel { 2.4g | 5g } channel-set
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
The 5 GHz frequency band has richer spectrum resources. In addition to 20 MHz
channels, APs working on the 5 GHz frequency band support 40 MHz and 80 MHz
channels. Larger-bandwidth channels mean higher transmission rates. However, at
least three channels are required in radio calibration to achieve the optimal
calibration effect. When configuring the calibration bandwidth, ensure that
enough calibration channels are available for use.
You can run this command to specify a calibration channel set for an AP. The AP
selects channels from the channel set to calibrate. This reduces the burden on the
AP.
NOTE
To ensure a good calibration effect, you are advised to configure at least three calibration
channels.
To prevent signal interference, ensure that adjacent APs work in non-overlapping channels. The
2.4 GHz frequency band has overlapping channels. When configuring calibration channels, you
are advised to configure a non-overlapping calibration channel set containing channels 1, 6, and
11 or containing channels 1, 5, 9, and 13.
NOTE
Example
# Configure a calibration channel set composed of 40 MHz channels 149, 153,
157, and 161 on the 5 GHz frequency band.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] dca-channel 5g bandwidth 40mhz
[HUAWEI-wlan-view] dca-channel 5g channel-set 149,153,157,161
Format
dfs recover-delay delay-time
undo dfs recover-delay
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When an AP is working on the manually planned channel, if radar signals are
detected, the AP randomly selects a channel (the calibration channel
preferentially) allowed by the country code. The AP channel will be switched back
to the manually planned channel after the configured switchback delay and
legitimate aging time (30 minutes). A proper delay in switching back the DFS
channel will prevent frequent channel switchovers.
Example
# Set the delay in switching back the DFS channel to 10 minutes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] dfs recover-delay 10
Format
dfs smart-selection disable
undo dfs smart-selection disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the DFS smart selection function is enabled, an AP working on the 5 GHz
band detects radar signals. Upon detecting radar channels, the AP automatically
switches to another channel to prevent radar interference.
When an AP switches its working channel upon detecting radar signals, it
randomly selects a channel (the calibration channel preferentially) allowed by the
country code. The selected channel may be the same as or adjacent to the
working channel of surrounding 5 GHz radios, thereby causing severe interference
and poor network access experience. By default, the DFS smart selection function
is enabled so that the AP switches to a 5 GHz channel with the minimum
interference, preventing interference.
After the dfs smart-selection disable command is executed, the DFS smart
selection function is disabled, affecting user experience. Configure this function as
required.
Precautions
The DFS smart selection function is valid only when the air scan is enabled.
Example
# Disable DFS smart selection.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] dfs smart-selection disable
Info: This function does not take effect when air scan is disabled.
Format
display air-scan-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display air-scan-profile command to view information about air
scan profiles.
Example
# Display information about all air scan profiles.
<HUAWEI> display air-scan-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
default 2
test 1
------------------------------------------------------------
Total: 2
Format
display ap neighbor [ radio radio ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
APs' neighbor information reflects the APs' locations and neighbor relationships,
helping you plan the network.
If a neighboring AP is an unauthorized one, the system displays only the RSSI of
signals received from the neighboring AP.
Prerequisites
The radio calibration function has been enabled using the calibrate enable { auto
| manual | schedule time } command.
Example
# Display information about neighbors on the AP.
<HUAWEI> display ap neighbor
Uncontrol AP:
--------------------------------------------------------------------------------------------------------
Item Description
Format
display ap neighbor { dev-id device-id | ap-mac ap-mac } [ radio radio ]
Parameters
Parameter Description Value
ap-mac ap- Specifies the MAC The MAC address must exist.
mac address of an AP.
radio radio Specifies radio ID The value is an integer that ranges from 0
of an AP. to 2.
Three radios are available only on the ,
AP4030TN, AP4051TN, AP6750-10T,
AP8050TN-HD.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
APs' neighbor information reflects the APs' locations and neighbor relationships,
helping you plan the network.
If a neighboring AP is an authorized one, the system displays the RSSI of signals
received from the neighboring AP as well as the path loss.
If a neighboring AP is an unauthorized one, the system displays only the RSSI of
signals received from the neighboring AP.
Prerequisites
The radio calibration function has been enabled using the calibrate enable { auto
| manual | schedule time } command.
Example
# Display information about neighbors of the slave AP with the ID of 10 on the
leader AP.
<HUAWEI> display ap neighbor dev-id 10 radio 0
Radio: Radio ID of AP
Dev ID: Device ID of AP
In control AP:
------------------------------------------------------------------------------
Radio Dev ID AP MAC Channel Received RSSI(dbm) Path loss(db)
------------------------------------------------------------------------------
0 20 9c50-ee7b-a810 4 -16 44
------------------------------------------------------------------------------
Total: 1
Uncontrol AP:
------------------------------------------------------------------------------
Radio BSSID Channel RSSI(dBm) SSID
------------------------------------------------------------------------------
0 7079-90ac-7100 1 -32 2g-se
------------------------------------------------------------------------------
Total: 1
Format
display ap traffic statistics wireless radio radio-id [ ssid ssid ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display ap traffic statistics wireless command to view statistics
about packets with the specified SSID on the radio of an AP.
Example
# Display statistics about packets with the SSID cmcc on radio 0 of the AP.
<HUAWEI> display ap traffic statistics wireless radio 0 ssid cmcc
----------------------------------------------------------------
Wireless bytes(RX) : 14583149
Wireless error frames(RX) : 10
Wireless frames(RX) : 97419
Wireless unicast frames(RX) : 16
Wireless dropped frames(RX) : 0
Wireless bytes(TX) : 1725974
Wireless error frames(TX) : 6
Wireless frames(TX) : 9704
Wireless unicast frames(TX) : 9680
Wireless dropped frames(TX) : 6
Wireless retransmitted frames: 32674
Current accessed STA number : 0
----------------------------------------------------------------
Table 11-5 Description of the display ap traffic statistics wireless radio radio-id
ssid ssid command output
Item Description
Item Description
Table 11-6 Description of the display ap traffic statistics wireless radio radio-id
command output
Item Description
Wireless private key and decrypt fail Number of frames with incorrect keys
frames(RX) received by the radio.
Wireless PER of the last 5min(%) Packet error rate of the radio in the
last statistical period.
Item Description
Wireless port drop rate of the last Packet loss ratio of the radio in the
5min(%) last statistical period.
Wireless retransmitted rate of the last Retransmission ratio of the radio in the
5min(%) last statistical period.
Format
display channel switch-record { all | calibrate | radio radio-id }
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check channel switching records on a device.
Example
# Display all channel switching records.
<HUAWEI> display channel switch-record all
Old/New: Old channel/New channel
RfID : Radio ID
----------------------------------------------------------------------------------------------
RfID Old/New Switch reason Switch time
----------------------------------------------------------------------------------------------
0 1/6 calibration 11:03:30 2014/9/28
----------------------------------------------------------------------------------------------
Total : 1
Item Description
Item Description
Item Description
Format
display channel switch-record { all | calibrate | dev-id device-id radio radio-id |
ap-mac ap-mac radio radio-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check channel switching records of APs.
Run the display channel switch-record calibrate command to query channel or
power switching records caused by radio calibration to check the calibration
results.
Example
# Display all channel switching records of slave APs and leader AP on the leader
AP.
<HUAWEI> display channel switch-record all
Old/New: Old channel/New channel
RfID : Radio ID
Dev ID : Device ID of AP
----------------------------------------------------------------------------------------------
Dev ID AP MAC RfID Old/New Switch reason Switch time
----------------------------------------------------------------------------------------------
14 88cf-98ba-5a40 0 1/6 configuration 11:03:30 2017/9/28
----------------------------------------------------------------------------------------------
Total : 1
Dev ID ID of an AP.
Dev ID ID of an AP.
Format
display flexible-radio status
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display flexible-radio status command to check the status and
switching result of the redundant radio.
Example
# Display the status and switching result of the redundant radio.
<HUAWEI> display flexible-radio status
Redundancy Results:
R: The current radio is a redundant radio that has not been switched
S(5G): The redundant radio is switched to the 5 GHz mode
S(monitor): The redundant radio is switched to the monitor mode
S(off): This redundant radio is disabled
-: This radio is not a redundant radio
Recognize time: 2019-06-11/16:59:52 DST
----------------------------------------------------------
AP ID Name RfID Band ST Redundancy Result
----------------------------------------------------------
2 00e0-fc12-3455 0 2.4G on R
3 00e0-fc12-3456 0 2.4G on S(5G)
----------------------------------------------------------
Total:4
AP ID AP ID.
Name AP name.
ST Radio status.
Format
display flexible-radio switch-record [ detail ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display flexible-radio switch-record command to check the
switching record of the redundant radio.
Example
# Display the switching record of the redundant radio.
<HUAWEI> display flexible-radio switch-record
-------------------------------------------------------------
Time ApID Name RfID Switch
-------------------------------------------------------------
2019-06-10/20:45:58 DST 5 00e0-fc12-3456 0 monitor
-------------------------------------------------------------
Total : 1
Item Description
ApID AP ID.
Item Description
Name AP name.
Format
display references air-scan-profile name profile-name
Parameters
name profile-name Displays reference information The air scan profile name
about a specified air scan must already exist.
profile.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references air-scan-profile command to view reference
information about an air scan profile.
Example
# Display reference information about the air scan profile test.
<HUAWEI> display references air-scan-profile name test
------------------------------------------------------------
Reference type Reference name
------------------------------------------------------------
radio-2g-profile default
------------------------------------------------------------
Total: 1
Item Description
Format
display references rrm-profile name profile-name
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references rrm-profile command to view reference
information about an RRM profile.
Example
# Display reference information about the RRM profile default
<HUAWEI> display references rrm-profile name default
------------------------------------------------------------
Reference type Reference name
------------------------------------------------------------
radio-2g-profile radio0
radio-5g-profile radio1
------------------------------------------------------------
Total: 2
Item Description
Format
display rrm-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display rrm-profile command to view information about RRM
profiles.
Example
# Display information about all RRM profiles.
<HUAWEI> display rrm-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
default 2
------------------------------------------------------------
Total:1
Item Description
Item Description
Calibrate error rate check traffic Traffic threshold for checking the
threshold(kbps) retransmission rate.
To configure this parameter, run the
calibrate error-rate-check command.
Dynamic EDCA be-service threshold Threshold for the dynamic EDCA Best-
Effort service.
To configure this parameter, run the
dynamic-edca threshold command.
Item Description
Action upon reaching the UAC Action to take when the number of
threshold access users reaches the user CAC
threshold.
● SSID hide: hiding the SSID
● SSID broadcast: broadcasting the
SSID
● priority-based STA replacement:
allowing access of VIP users instead
of non-VIP users based on priorities
To configure this parameter, run the
uac reach-access-threshold
command.
Band steer SNR threshold(dB) Start SNR threshold for triggering 5G-
prior access.
To configure this parameter, run the
band-steer snr-threshold command.
Item Description
Item Description
Smart-roam low level SNR margin(dB) Lower SNR difference threshold that
triggers STA roaming.
To configure this parameter, run the
smart-roam snr-margin command.
Item Description
Item Description
Format
display sta-load-balance fairness
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
STAs may access 2.4 GHz or 5 GHz radios on a WLAN. Even STA access indicates
high fairness.
Example
# Display the load balancing fairness.
<HUAWEI> display sta-load-balance fairness
2.4G sta-load-balance fairness : -
5G sta-load-balance fairness : 0.85
Item Description
Function
The display station neighbor command displays the neighbor list of a specified
STA.
Format
display station neighbor sta-mac mac-address
Parameters
Parameter Description Value
sta-mac mac-address Specifies the MAC address of a The MAC address must
STA. exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the neighbor list of the STA with a specified
MAC address.
Example
# Display the neighbor list of the STA with a specified MAC address.
<HUAWEI> display station neighbor sta-mac 00e0-fc00-0001
------------------------------------------------------------------------------------------------------------------------------
--
Device MAC Device ID Device Name Radio ID Channel Probe info(RSSI/HH:MM:SS) 11k
info[RCPI/RSNI/HH:MM:SS]
------------------------------------------------------------------------------------------------------------------------------
--
00e0-fc76-e360 0 00e0-fc76-e360 1 165 -44/15:05:11 -
------------------------------------------------------------------------------------------------------------------------------
--
Total neighbors: 1, total records: 1
System Response
Item Description
Probe info(RSSI/ Probe information about the STA, including the RSSI
HH :MM:SS) and timestamp.
Function
The display station neighbor all command displays STA neighbor information.
Format
display station neighbor all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view STA neighbor information.
Example
# Display STA neighbor information.
<HUAWEI> display station neighbor all
Probe neighbor number : Number of neighbors detected through Probe frames in 5 minutes
11k neighbor number : Number of neighbors detected through 802.11k frames in 5 minutes
Last update time : Time when neighbors are detected through Probe or 802.11k frames in 5 minutes
formatted: probe/11k
----------------------------------------------------------------------------------------------
STA MAC Probe neighbor number 11k neighbor number Last update time
----------------------------------------------------------------------------------------------
00e0-fc00-0001 4 0 11:43:08/-
00e0-fc00-0002 1 0 11:42:30/-
00e0-fc00-0003 33 0 11:43:26/-
----------------------------------------------------------------------------------------------
Total:3
System Response
Table 11-19 Description of the display station neighbor all command output
Item Description
Last update time Time when neighbors are detected through Probe or
802.11k frames in 5 minutes.
Format
display station steer-history
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the load balancing, band steering, or smart roaming function is enabled,
STAs are steered. You can run this command to check historical information about
STA steering.
Example
# Display historical information about steering of all STAs.
<HUAWEI> display station steer-history
S/T/A:Source/Target/Actual
Flag:V[Voice/Video/Active STA]
BTM success times/BTM total times:1/2 Deauth success times/Deauth total times:0/0
------------------------------------------------------------------------------------------------------------------------------
------
Time Sta Device(S/T/A) Radio(S/T/A) Rssi(S/T/A) Reason Move-mode
BTM_CODE Flag Result
------------------------------------------------------------------------------------------------------------------------------
------
2019-01-11/15:56:49 00e0-fc00-0001 3/5/5 0/1/1 -27/-27/-25 BandSteer BTM -
- Success
2019-01-11/15:48:49 00e0-fc00-0001 3/3/3 0/1/1 -28/-/-57 BandSteer BTM -
- Success
2019-01-11/15:43:49 00e0-fc00-0001 3/5/3 0/1/0 -29/-26/-44 BandSteer BTM -
- Not Move
2019-01-11/15:43:29 00e0-fc00-0001 3/5/3 0/1/0 -29/-26/-44 BandSteer BTM -
- Not Move
------------------------------------------------------------------------------------------------------------------------------
------
Total: 4
Item Description
Format
display station steer-info { all | weak-rssi | non-best-load | unsteerable }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view STA migration information based on the weak
RSSI, non-optimal load, and migration inability.
Example
# Display migration information about all STAs, including the weak RSSI, non-
optimal load, and migration inability.
Item Description
Format
display station steer-statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the load balancing, band steering, or smart roaming function is enabled,
STAs may be steered. You can run this command to check STA steering statistics.
Example
# Display steering statistics of all STAs.
<HUAWEI> display station steer-statistics
------------------------------------------------------------------------------------------------------------------------------
------
Reason Total/Success Deauth(Total/Success) BTM(Total/Accept/REJ1/REJ2/REJ3/REJ4/REJ5/REJ6/
REJ7/REJ8/TimeOut)
------------------------------------------------------------------------------------------------------------------------------
------
Sticky 0/0 0/0 0/0/0/0/0/0/0/0/0/0/0
Load-balance 0/0 0/0 0/0/0/0/0/0/0/0/0/0/0
Band-steer 0/0 0/0 0/0/0/0/0/0/0/0/0/0/0
Total 0/0 0/0 0/0/0/0/0/0/0/0/0/0/0
------------------------------------------------------------------------------------------------------------------------------
------
Item Description
Format
display station unsteerable
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display station unsteerable command to check "unable to
roam" records of STAs.
Example
# Display "unable to roam" records of STAs.
<HUAWEI> display station unsteerable
-------------------------------------------------------------------------------
STA MAC Left aging time Status
-------------------------------------------------------------------------------
00E0-FC12-3456 3h 20m online
00E0-FC45-7890 2h 30m offline
-------------------------------------------------------------------------------
Total: 2
Format
display wlan calibrate channel-set
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After configuring the radio calibration function, you can run the display wlan
calibrate channel-set command to check the effective calibration channels and
bandwidth.
Example
# Display the calibration channels and bandwidth that take effect globally.
<HUAWEI> display wlan calibrate channel-set
Country code: CN
--------------------------------------------------------------------------------
Radio band Bandwidth Channel Set
--------------------------------------------------------------------------------
2.4G 20MHz 1,6,11
5G 20MHz 149,153,157,161,165
--------------------------------------------------------------------------------
Format
display wlan calibrate global configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan calibrate global configuration command to check
the global configuration of radio calibration.
Example
# Display the global configuration of radio calibration.
<HUAWEI> display wlan calibrate global configuration
--------------------------------------------------------------------------------
----------
Mode : manual
Auto start time :-
Auto interval(min) :-
Schedule time :-
Flexible radio mode : auto-switch
Policy :-
Sensitivity : medium
Virtual group size : 50
K-value : 70
Reference data analysis : enable
Environment deterioration blacklist threshold : 16
--------------------------------------------------------------------------------
----------
Item Description
Item Description
Format
display wlan calibrate statistics radio radio-id
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan calibrate statistics command to view radio
calibration statistics, helping check whether the radio environment is stable.
Example
# Display calibration statistics about radio 0.
<HUAWEI> display wlan calibrate statistics radio 0
-----------------------------------------------------------------------
Signal environment deterioration :1
Power calibration :1
Channel calibration :0
-----------------------------------------------------------------------
Table 11-26 Description of the display wlan calibrate statistics command output
Item Description
Format
dynamic-edca enable
undo dynamic-edca enable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
A WLAN has only three non-overlapping channels on the 2.4 GHz frequency band.
When APs are deployed densely, multiple APs have to work in the same channel,
resulting in co-channel interference. This interference degrades network
performance.
The dynamic EDCA parameter adjustment function allows APs to adjust EDCA
parameters flexibly to reduce the possibility of collision, improve the throughput,
and enhance user experience.
Example
# Enable dynamic EDCA parameter adjustment.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name test
[HUAWEI-wlan-rrm-prof-test] dynamic-edca enable
The undo dynamic-edca threshold command restores the default threshold for
the dynamic EDCA Best-Effort service.
The default threshold for the dynamic EDCA Best-Effort service is 6 pps.
Format
dynamic-edca threshold be-service be-service-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When dynamic EDCA is enabled, the system dynamically adjusts EDCA parameters
for the Best-Effort service and Background service based on the number of Best-
Effort users, improving user experience.
If the number of Best-Effort service packets from a user in the radio's internal
statistics queue exceeds the threshold (specified using the dynamic-edca
threshold command) per unit time (1s), the user is considered a Best-Effort user.
Before running this command, you must run the dynamic-edca enable command
to enable dynamic EDCA.
Example
# Set the threshold for the dynamic EDCA Best-Effort service to 10 pps.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] dynamic-edca enable
[HUAWEI-wlan-rrm-prof-default] dynamic-edca threshold be-service 10
Format
high-density amc-optimize enable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
● This function is not applicable to scenarios where STAs move fast between
APs.
Precautions
● This function is available only for 802.11ac Wave 2 and 802.11ax series APs.
Currently, the adaptive modulation and coding (AMC) optimization function
in high-density scenarios is not supported by AirEngine series APs (except the
AirEngine 5760-10).
● This function does not take effect in MU-MIMO mode.
Example
# Enable the AMC optimization function in high-density scenarios on the RRM
profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] high-density amc-optimize enable
Format
interference adjacent-channel threshold threshold-value
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Two APs with different center frequencies have overlapping areas, resulting in
adjacent-channel interference. When APs are placed too close to each other or
have strong signals, more noise is produced, degrading network performance.
Example
# Set the alarm threshold for adjacent-channel interference to 52%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] interference detect-enable
[HUAWEI-wlan-radio-2g-prof-default] interference adjacent-channel threshold 52
Format
interference co-channel threshold threshold-value
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Two APs working in the same frequency band interfere with each other. For
example, on a large-scale WLAN (a university campus network), different APs
often use the same channel. When there are overlapping areas among these APs,
co-channel interference exists, degrading network performance.
Example
# Set the alarm threshold for co-channel interference to 60%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] interference detect-enable
[HUAWEI-wlan-radio-2g-prof-default] interference co-channel threshold 60
Format
interference detect-enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
WLAN wireless channels are vulnerable to interference in surrounding radio
environments, and the service quality is therefore degraded. If interference
detection is configured, a monitor AP can know the radio environment in real time
and generate alarms in a timely manner.
Example
# Enable interference detection.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] interference detect-enable
The undo interference station threshold command restores the default alarm
threshold for STA interference.
Format
interference station threshold threshold-value
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
If there are many STAs that are managed by other APs around an AP, services of
the STAs managed by the local AP may be affected.
Example
# Set the alarm threshold for STA interference to 50.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] interference station threshold 50
Format
power auto-adjust enable
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The traditional radio power control function sets the power of an AP to a fixed
value to keep the power of all STAs connecting to the AP the same.
You can run the power auto-adjust enable command to enable signal-strength-
based power adjustment. This function enables an AP to detect the signal strength
of a STA in a timely manner. If the AP detects that the signal strength of the STA is
strong (for example, the STA is near the AP), the AP reduces its transmit power
when sending packets. If the AP detects that the signal strength of the STA is
weak (for example, the STA is far from the AP), the AP uses the normal transmit
power to send radio signals.
Prerequisites
The power mode has been set to automatic using the calibrate auto-txpower-
select enable command.
Example
# Enable signal-strength-based power adjustment for APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] power auto-adjust enable
Format
reset ap traffic statistics wireless radio radio-id
Parameters
Parameter Description Value
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
You can run this command to clear packet statistics on a specified AP radio.
Example
# Clear packet statistics on radio 2 of the AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] reset ap traffic statistics wireless radio 2
Format
reset station steer-history
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
You can run this command to delete historical information about STA migrations.
Example
# Delete historical information about migrations of all STAs.
<HUAWEI> reset station steer-history
Format
reset station steer-statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
You can run this command to delete statistics about STA steering.
Example
# Delete statistics about STA steering.
<HUAWEI> reset station steer-statistics
Format
reset flexible-radio switch-record all
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
You can run the reset flexible-radio switch-record command to clear switching
records of redundant radios.
Example
# Clear switching records of all redundant radios.
<HUAWEI> reset flexible-radio switch-record all
Format
reset wlan calibrate statistics radio radio-id
Parameters
Parameter Description Value
Views
User view
Default Level
3: Management level
Usage Guidelines
Run the reset wlan calibrate statistics command to clear radio calibration
statistics, including the number of times the radio environment deteriorates and
number of times the radio channel and power are calibrated.
Example
# Clear calibration statistics about radio 0.
<HUAWEI> reset wlan calibrate statistics radio 0
Format
rrm-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of an RRM profile. The value is a string
name of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WLAN technology uses radio signals (such as 2.4 GHz or 5 GHz radio waves) as
transmission medium. Radio signals will attenuate when transmitted over the air,
degrading service quality for wireless users. Radio resource management (RRM)
enables a WLAN to adapt to changes in the radio environment by dynamically
adjusting radio resources. This improves service quality for wireless users.
Follow-up Procedure
Run the rrm-profile (radio profile view) command to bind the RRM profile to a
radio profile so that the RRM profile can take effect.
Example
# Display the view of the RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default]
The undo rrm-profile command unbinds an RRM profile from a radio profile.
Format
rrm-profile profile-name
undo rrm-profile
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
After you create an RRM profile using the rrm-profile (WLAN view) command,
bind the RRM profile to a radio profile so that the RRM profile can take effect.
Example
# Bind the RRM profile default to the radio profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] quit
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] rrm-profile default
11.69 scan-channel-set
Function
The scan-channel-set command configures an air scan channel set.
The undo scan-channel-set command restores the default air scan channel set.
By default, an air scan channel set contains all channels supported by the country
code of an AP.
Format
scan-channel-set { country-channel | dca-channel | work-channel }
undo scan-channel-set
Parameters
Parameter Description Value
Views
Air scan profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you run the scan-channel-set command to specify an air scan channel set
for an AP, the AP scans channels in the channel set. The collected information is
reported to the server for radio calibration, smart roaming, terminal location, or
WIDS data analysis.
Precautions
● If the air scan channel set you specified contains all channels supported by
the country code of the AP, the AP scans data on many channels but the
channel scanning lasts for a long time, which may affect real-time data
analysis.
● If you specify a calibration channel set as the air scan channel set, the AP
scans data on a few channels. This reduces the channel scanning time,
increases the terminal location accuracy, and reduces burden on the device.
● If you add only working channels of an AP to the air scan channel set, the AP
only scans the working channels.
Example
# Configure an air scan channel set that contains all calibration channels.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name test
[HUAWEI-wlan-air-scan-prof-test] scan-channel-set dca-channel
11.70 scan-disable
Function
The scan-disable command disables the air scan function.
The undo scan-disable command enables the air scan function.
By default, the air scan function is enabled.
Format
scan-disable
undo scan-disable
Parameters
None
Views
Air scan profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an AP does not require air scan, you can run the scan-disable command to
disable the air scan function. The AP then will stop scanning surrounding wireless
signals.
Precautions
Disabling air scan will affect scanning functions, such as radio calibration,
spectrum analysis, terminal location, WIDS, smart roaming, and DFS smart
selection.
Example
# Disable the air scan function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name test
[HUAWEI-wlan-air-scan-prof-test] scan-disable
Warning: This operation will affect scanning-related services such as radio calibration, spectrum analysis,
terminal location, WIDS
function, smart roaming and DFS smart selection.Continue? [Y/N]y
11.71 scan-enhancement
Function
The scan-enhancement command enables the scanning enhancement function.
The undo scan-enhancement command disables the scanning enhancement
function.
By default, the scanning enhancement function is disabled.
Format
scan-enhancement
undo scan-enhancement
Parameters
None
Views
Air scan profile view
Default Level
2: Configuration level
Usage Guidelines
The third radio of some APs is used specifically for radio scanning and does not
support configuration or STA access. After the scanning enhancement function is
enabled, the current radio works with the third radio to perform radio scanning
and provide scanning feature data. When multiple radios collect and provide data
simultaneously, the scanning performance and precision are improved. After the
scanning enhancement function is disabled, scanning feature data on the current
radio is provided by the third radio. The third radio does not involve in scanning.
Therefore, scanning features on the radio do not affect STA access.
The third radio of these APs supports scanning only on the single spatial stream.
When functions such as location and WIDS detection, it is recommended that the
scanning enhancement function be enabled if high performance and precision are
required.
When services that are sensitive to packet loss or delay (for example, voice or
video services) are used, it is recommended that the scanning enhancement
function be disabled.
Example
# Enable the scanning enhancement function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name test
[HUAWEI-wlan-air-scan-prof-test] scan-enhancement
11.72 scan-interval
Function
The scan-interval command sets an air scan interval.
The undo scan-interval command restores the default air scan profile.
Format
scan-interval scan-time
undo scan-interval
Parameters
Parameter Description Value
Views
Air scan profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an air scan interval is specified using the scan-interval command, APs scan
channels at the specified intervals.
Precautions
The air scan interval also applies to radio calibration, smart roaming, WLAN
location, and WIDS functions.
Ensure that the air scan interval meets the following condition: scan-interval ≥
beacon-interval + 100 ms
In vehicle-ground communication scenarios, the air scan interval ranges from 300
ms to 1000 ms.
Example
# Set the air scan interval to 3000 ms for APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name test
[HUAWEI-wlan-air-scan-prof-test] scan-interval 3000
11.73 scan-period
Function
The scan-period command sets the air scan period.
The undo scan-period command restores the default air scan period.
Format
scan-period scan-time
undo scan-period
Parameters
Parameter Description Value
Views
Air scan profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the air scan period is configured using the scan-period command, an AP
continuously scans surrounding radio signals in the configured period. After the
period expires, the AP reports the collected information to server. The information
is used for radio calibration, smart roaming, WLAN location, or WIDS data
analysis.
Precautions
A longer air scan period indicates more collected data and a more accurate data
analysis result. However, if the air scan period is set too large, WLAN services are
affected. You are advised to use the default value.
Example
# Set the air scan period to 80 ms for APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] air-scan-profile name test
[HUAWEI-wlan-air-scan-prof-test] scan-period 80
Format
smart-antenna { enable | disable }
undo smart-antenna
Parameters
None
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
With the smart antenna selection algorithm, an AP can adjust the antenna mode
for transmitting signals based on STA locations and select a proper combination of
antenna arrays to communicate with STAs. This improves the RSSIs of STAs and
improves user experience.
Precautions
The AP2051DN, AP2051DN-E, AP2051DN-S, AP3050DE, AP4050DE-B-S,
AP4050DE-M, AP4050DE-M-S, AP5510-W-GP, AP6750-10T, AP7030DE, AP7050DE,
AP7052DE, R251D, R251D-E support the smart antenna selection algorithm.
Example
# Enable the smart antenna selection algorithm for an AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] smart-antenna enable
Format
smart-antenna throughput-triggered-training threshold threshold
undo smart-antenna throughput-triggered-training threshold
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
In a smart antenna system, the device monitors performance (throughput) of
transmit ends. If the detected throughput of a transmit end exceeds the sudden
performance change threshold specified using the smart-antenna throughput-
triggered-training command, a new round of antenna training is triggered.
● In a good air interface environment, set a high sudden performance change
threshold to prevent frequent antenna training from affecting user services.
● In a poor air interface environment, set a low sudden performance change
threshold to improve the WLAN's anti-interference capability.
Example
# Set the sudden performance change threshold that triggers antenna training to
10%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] smart-antenna throughput-triggered-training threshold 10
The default smart antenna training interval is auto, indicating that a smart
antenna is trained in self-adaptation mode.
Format
smart-antenna training-interval { training-interval | auto }
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the smart-antenna training-interval command to set the smart
antenna training interval. When the period since the last round of smart antenna
training exceeds the specified interval, a new round of smart antenna training is
triggered.
● A long antenna training interval causes the device's failure to switch the
antenna combination in time to adapt to WLAN environment changes.
When the default smart antenna training interval is restored, that is, smart
antennas are trained in self-adaptation mode, the device adaptively calculates the
antenna training interval based on the number of concurrent STAs.
Example
# Set the smart antenna training interval to 100 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] smart-antenna training-interval 100
By default, 640 MPDUs are sent by an AP to a STA during smart antenna training.
Format
smart-antenna training-mpdu-number training-mpdu-number
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
In the smart antenna algorithm, an AP uses different antenna combinations to
send training packets for antenna training. During smart antenna training, the
transmit end (AP) sends training packets to a receive end (STA). The receive end
measures the PER and RSSI in the received packets, and then sends the PER and
RSSI to the transmit end. The transmit end collects information about all antenna
combinations and corresponding PERs and RSSIs to determine the optimal
antenna combination for the receiver.
You can run the smart-antenna training-mpdu-number command to set the
number of MPDUs sent by an AP to a STA during smart antenna training.
If the traffic rate, bandwidth, and air interface rate of the STA are high, set a small
value. Otherwise, set a large value.
Example
# Set the number of MPDUs sent by an AP to a STA during smart antenna training
to 600.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] smart-antenna training-mpdu-number 600
Format
smart-antenna valid-per-scope { high-per-threshold high-per-threshold | low-
per-threshold low-per-threshold }
undo smart-antenna valid-per-scope { high-per-threshold | low-per-
threshold }
Parameters
Parameter Description Value
Views
2G radio profile view, 5G radio profile view
Default Level
2: Configuration level
Usage Guidelines
In the smart antenna algorithm, an AP uses different antenna combinations to
send training packets for antenna training. During smart antenna training, the
transmit end (AP) sends training packets to a receive end (STA). The receive end
measures the PER and RSSI in the received packets, and then sends the PER and
RSSI to the transmit end. The transmit end collects information about all antenna
combinations and corresponding PERs and RSSIs to determine the optimal
antenna combination for the receiver.
The PER is a key basis for the smart antenna algorithm. After proper upper and
lower valid PER thresholds are configured, the smart antenna algorithm can select
a proper antenna combination to improve the coverage and anti-interference
capability of a WLAN in indoor coverage scenarios.
Example
# Set the upper valid PER threshold to 80%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] radio-2g-profile name default
[HUAWEI-wlan-radio-2g-prof-default] smart-antenna valid-per-scope high-per-threshold 80
Format
smart-roam advanced-scan disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
During the roaming steering for sticky STAs, real-time information about
neighboring APs is required to determine the target AP. If STAs do not support
802.11k radio resource measurement, you can run the undo smart-roam
advanced-scan disable command to enable the coordinated scanning function of
smart roaming. In this way, APs can collect real-time information about
neighboring APs through synchronized radio resource measurement, and generate
a neighbor AP table of the STAs.
Prerequisites
Smart roaming has been enabled using the undo smart-roam disable command.
Example
# Enable the coordinated scanning function of smart roaming.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam disable
[HUAWEI-wlan-rrm-prof-default] undo smart-roam advanced-scan disable
Format
smart-roam disable
undo smart-roam disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When STAs connected to an AP have weak signals, their network access rates are
low. In this situation, if many low-rate STAs connect to the AP, air interface
occupation time of other STAs is reduced. As a result, the AP throughput
decreases, degrading user experience. To prevent this situation, configure forced
logout of weak-signal STAs. When detecting that the SNR or access rate of a STA
is lower than the specified threshold, the AP sends a Disassociation packet to the
STA to force the STA offline so that the STA can reconnect to the WLAN.
Follow-up Procedure
Run the smart-roam roam-threshold { check-snr | check-rate } command to
configure the trigger mode of smart roaming and the smart-roam roam-
threshold { snr | rate } command to configure the smart roaming threshold. After
that, APs forcibly disconnect STAs with SNR or access rate lower than the
threshold.
Example
# Enable smart roaming.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam disable
Format
smart-roam quick-kickoff back-off-time back-off-time
undo smart-roam quick-kickoff back-off-time
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the function of quickly disconnecting STAs is enabled, you can run the
smart-roam quick-kickoff back-off-time command to set the backoff time for
Example
# Set the backoff time for quickly disconnecting STAs to 60 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] smart-roam quick-kickoff back-off-time 60
Format
smart-roam quick-kickoff-snr check-interval check-interval
undo smart-roam quick-kickoff-snr check-interval
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the mode for quickly disconnecting STAs is set to check-snr, you can run
the smart-roam quick-kickoff-snr check-interval command to set the interval
for checking the SNR to determine whether to quickly disconnect STAs. A shorter
interval allows the system to determine whether to disconnect STAs more quickly.
Prerequisites
The function of quickly disconnecting STAs has been enabled using the undo
smart-roam quick-kickoff-threshold disable command.
Example
# Set the interval for checking the SNR to determine whether to quickly
disconnect STAs to 600 ms.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam quick-kickoff-threshold disable
[HUAWEI-wlan-rrm-prof-default] smart-roam quick-kickoff-snr check-interval 600
Format
smart-roam quick-kickoff-snr p-n criteria observe-time observe-value qualify-
time qualify-value
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the mode for quickly disconnecting STAs is set to check-snr, you can run
the smart-roam quick-kickoff-snr p-n criteria command to configure the PN
threshold for quickly disconnecting STAs.
PN criteria: When N conditions are met in the P range, an event is triggered.
Assume that the value of observe-value is 6 and that of qualify-value is 4, and
the interval for checking the SNR to determine whether to quickly disconnect STAs
is 500 ms. The system detects the SNR of a STA for six consecutive times and
calculates the average SNR value. If the average value is smaller than the total
average value four times, the STA is forced offline.
Prerequisites
The function of quickly disconnecting STAs has been enabled using the undo
smart-roam quick-kickoff-threshold disable command.
Precautions
The value of observe-value must be greater than or equal to that of qualify-
value.
Example
# Set the value of observe-value to 10 and that of qualify-value to 5.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam quick-kickoff-threshold disable
[HUAWEI-wlan-rrm-prof-default] smart-roam quick-kickoff-snr p-n criteria observe-time 10 qualify-
time 5
Format
smart-roam quick-kickoff-threshold { snr snr-threshold | rate rate-threshold }
undo smart-roam quick-kickoff-threshold { snr | rate }
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the function of quickly disconnecting STAs is enabled and the threshold for
quickly disconnecting STAs is specified for an AP using this command, the AP
acquires a STA's SNR or rate from data packets sent from the STA. If the STA's SNR
or rate is lower than the specified threshold, the AP forcibly disconnects the STA so
that the STA can reinitiate a connection with the AP or roam to another AP with
strong signals.
● A large threshold may cause STAs to go offline frequently.
● A small threshold may disable STAs from roaming to an AP with stronger
signals.
This command is applicable to scenarios that have high requirements on real-time
transmission, such as voice and video scenarios.
Prerequisites
The function of quickly disconnecting STAs has been enabled using the undo
smart-roam quick-kickoff-threshold disable command.
The mode for triggering the function of quickly disconnecting STAs has been set
using the smart-roam quick-kickoff-threshold { check-snr | check-rate }
command.
Precautions
STAs may be forced to go offline through the smart roaming function or the
function of quickly disconnecting STAs. If the SNR-based thresholds for the two
functions are both configured, the function with a larger value is preferentially
effective.
Example
# Set the mode for triggering the function of quickly disconnecting STAs to check-
snr and the threshold for quickly disconnecting STAs to 20 dB.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam quick-kickoff-threshold disable
[HUAWEI-wlan-rrm-prof-default] smart-roam quick-kickoff-threshold check-snr
[HUAWEI-wlan-rrm-prof-default] smart-roam quick-kickoff-threshold snr 20
Format
smart-roam quick-kickoff-threshold { check-snr | check-rate } *
undo smart-roam quick-kickoff-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the function of quickly disconnecting STAs is enabled, you can run the
smart-roam quick-kickoff-threshold { check-snr | check-rate } command to set
the mode for triggering the function of quickly disconnecting STAs, and set the
threshold for quickly disconnecting STAs. When the SNR or access rate of a STA
detected by an AP is lower than the specified threshold, the AP disconnects the
STA. The STA then can connect to another AP with stronger signals.
Prerequisites
The function of quickly disconnecting STAs has been enabled using the undo
smart-roam quick-kickoff-threshold disable command.
Follow-up Procedure
Run the smart-roam quick-kickoff-threshold command to set the threshold for
quickly disconnecting STAs.
Example
# Set the mode for triggering the function of quickly disconnecting STAs to check-
rate.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam quick-kickoff-threshold disable
[HUAWEI-wlan-rrm-prof-default] smart-roam quick-kickoff-threshold check-rate
Format
smart-roam quick-kickoff-threshold disable
undo smart-roam quick-kickoff-threshold disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the function of quickly disconnecting STAs is enabled and the threshold for
quickly disconnecting STAs is specified, the AP disconnects STAs whose SNR or
access rate is lower than the specified threshold. The STAs then can connect to
another AP with stronger signals.
Follow-up Procedure
Run the smart-roam quick-kickoff-threshold { check-snr | check-rate }
command to set the mode for triggering the function of quickly disconnecting
STAs, and the smart-roam quick-kickoff-threshold command to set the
threshold for quickly disconnecting STAs. The AP will disconnect STAs whose SNR
or access rate is lower the specified threshold.
Example
# Enable the function of quickly disconnecting STAs.
<HUAWEI> system-view
[HUAWEI] wlan
Format
smart-roam roam-threshold { check-snr | check-rate }*
undo smart-roam roam-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the smart roaming function is enabled, the AP forces STAs to log out based
on the configured trigger mode and threshold of smart roaming. When an AP
receives a STA's data packet, the AP learns the STA's SNR or rate from the data
packet. If the STA's SNR or rate is lower than the configured threshold, roaming is
triggered. Then, the AP sends a Disassociation frame to the STA so that the STA
can reinitiate a connection with the AP.
Prerequisites
Smart roaming has been enabled.
Follow-up Procedure
Run the smart-roam roam-threshold { snr | rate } command to configure the
smart roaming threshold.
Example
# Set the trigger mode of smart roaming to check-rate.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam disable
[HUAWEI-wlan-rrm-prof-default] smart-roam roam-threshold check-rate
Format
smart-roam roam-threshold { snr snr-threshold | rate rate-threshold }
undo smart-roam roam-threshold { snr | rate }
Parameters
Parameter Description Value
snr snr- Specifies the SNR threshold for smart The value is an
threshold roaming. integer that ranges
If the SNR threshold is 25 dB and noise from 15 to 35, in
floor is -95 dBm, a STA's SNR is lower dB.
than the threshold when the STA's RSSI is
lower than -70 dBm (25 dB + (-95 dBm)
= -70 dBm).
rate rate- Specifies the rate threshold for smart The value is an
threshold roaming. integer that ranges
The rate here refers to the negotiated from 1 to 100, in
rate based on the protocol and signal percentage.
strength when a STA associates with an
AP, instead of the actual rate of the STA.
If the maximum capability of the AP and
STA is 54 Mbit/s and the rate threshold is
50%, the lower rate threshold is
considered 27 Mbit/s (54 Mbit/s x 50% =
27 Mbit/s).
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the smart roaming function is enabled, the AP forces STAs to log out based
on the configured trigger mode and threshold of smart roaming. When an AP
receives a STA's data packet, the AP learns the STA's SNR or rate from the data
packet. If the STA's SNR or rate is lower than the configured threshold, smart
roaming is triggered. Then, the AP sends a Disassociation frame to the STA so that
the STA can reinitiate a connection with the AP.
● A large threshold may cause STAs to go offline frequently.
● A small threshold may disable STAs from roaming to an AP with stronger
signals.
Prerequisites
Smart roaming has been enabled.
The trigger mode of smart roaming has been configured using the smart-roam
roam-threshold { check-snr | check-rate } command.
Precautions
STAs may be forced to go offline through the smart roaming function or the
function of quickly disconnecting STAs. If the SNR-based thresholds for the two
functions are both configured, the function with a larger value is preferentially
effective.
Example
# Set the trigger mode of smart roaming to check-snr and set the smart roaming
threshold to 25 dB.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam disable
[HUAWEI-wlan-rrm-prof-default] smart-roam roam-threshold check-snr
[HUAWEI-wlan-rrm-prof-default] smart-roam roam-threshold snr 25
Format
smart-roam snr-margin high-level-margin high-level-margin low-level-margin
low-level-margin
undo smart-roam snr-margin
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In smart roaming scenarios, you can configure the thresholds for determining
whether to steer STA roaming. When determining whether to steer a STA to roam
to a neighboring AP, the AP compares the RSSIs of the STA on the neighboring AP
with that on the current AP, which are reported by the STA through coordinated
measurement. If the RSSI difference is higher than a specified threshold, that is,
the STA has a significantly increased RSSI after associating with the neighboring
AP, the AP steers the STA to roam to the neighboring AP.
The parameters low-level-margin and high-level-margin are used to determine
whether to steer sticky STAs and common STAs, respectively, to roam to
neighboring APs. In most cases, you are advised to set high-level-margin larger
than low-level-margin so that sticky STAs can roam to neighboring APs with
better experience as soon as possible.
The default difference thresholds are recommended. If APs are deployed close to
each other and have high transmit power, set larger values for the upper and
lower RSSI difference thresholds.
Prerequisites
Smart roaming has been enabled.
Example
# Set the upper and lower RSSI difference thresholds that trigger STA roaming
steering to 10 dB and 6 dB, respectively.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam disable
[HUAWEI-wlan-rrm-prof-default] smart-roam snr-margin high-level-margin 10 low-level-margin 6
Format
smart-roam unable-roam-client expire-time expire-time
undo smart-roam unable-roam-client expire-time
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After smart roaming is enabled, you can run the smart-roam unable-roam-client
expire-time command to set the aging time of the "unable to roam" record for
STAs. When the device requests a STA to roam but the STA keeps sending
association requests to the original AP or does not initiate an association request,
the device records the terminal as "unable to roam" and does not trigger STA
roaming within the specified time. After the aging time is reached, the "unable to
roam" record for STAs is automatically cleared, and the system can trigger
roaming of the STAs.
A STA is recorded as "unable to roam" due to the following reasons:
● Due to different software configurations, some STAs preferentially send
association requests to APs with which they have once associated.
● In some environments, STAs cannot scan APs with strong signals.
● STAs enter the dormancy state and do not roam once they are forcibly
disconnected.
The aging time to configure varies for different reasons. A large aging time is used
for the software configuration reason so that the AP will trigger roaming of the
STAs as less as possible. However, a small aging time is used in other situations so
that the AP will attempt to trigger roaming of the STAs marked "unable to roam."
Prerequisites
Smart roaming has been enabled.
Example
# Set the aging time of the "unable to roam" record to 50 minutes.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] undo smart-roam disable
[HUAWEI-wlan-rrm-prof-default] smart-roam unable-roam-client expire-time 50
Format
sta-load-balance dynamic btm-fail-times btm-fail-times
undo sta-load-balance dynamic btm-fail-times
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device preferentially uses the BTM mode to trigger STA steering to the target
AP. Due to differences of STAs, some STAs can be successfully steered in BTM
mode after multiple attempts. You can run the sta-load-balance dynamic btm-
fail-times command to set the maximum number of attempts to steer STAs in
BTM mode. If the number of attempts exceeds the specified value, the device
attempts to steer STAs in deauthentication mode.
Precautions
You are advised to retain the default value. If the success rate of STA steering in
BTM mode is low, you can set a smaller value to improve the steering efficiency.
This command takes effect only in sta-number mode.
Example
# Set the maximum number of attempts to steer STAs in BTM mode to 4 in RRM
profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic btm-fail-times 4
Format
sta-load-balance dynamic deauth-fail-times deauth-fail-times
undo sta-load-balance dynamic deauth-fail-times
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The device attempts to use the 802.11v and deauthentication modes to trigger
STA steering to the target AP. Due to differences of STAs, some STAs can be
successfully steered in deauthentication mode after multiple attempts. You can
run the sta-load-balance dynamic deauth-fail-times command to set the
maximum number of attempts to steer STAs in deauthentication mode. If the
number of attempts exceeds the specified value, STAs cannot be steered.
Precautions
You are advised to retain the default value. If the success rate of STA steering in
deauthentication mode is low or STA services are affected, set the parameter value
to 0 to disable STA steering in deauthentication mode.
This command takes effect only in sta-number mode.
Example
# Set the maximum number of attempts to steer STAs in deauthentication mode
to 1 in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic deauth-fail-times 1
Format
sta-load-balance dynamic deny-threshold deny-threshold
undo sta-load-balance dynamic deny-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a STA requests to associate with an AP enabled with load balancing but the AP
forbids the association according to the dynamic load balancing algorithm, the AP
will reject the STA's request. However, after the number of rejections exceeds the
maximum value specified by sta-load-balance dynamic deny-threshold
command, the AP allows the STA to associate.
Precautions
This command takes effect only in channel-utilization mode.
Example
# Set the maximum number of rejections to 8 for the terminal.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic deny-threshold 8
Format
sta-load-balance dynamic disable
undo sta-load-balance dynamic disable
Parameters
None
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
On a Layer 2 network, multiple APs (less than 50) that can discover each other
can form a dynamic load balancing group and elect a leader AP. After a STA
connects to an AP, the leader AP checks whether the AP reaches the load
balancing threshold, and determines whether to steer the STA to a neighboring AP
that meets load balancing requirements based on the load balancing algorithm.
Example
# Disable dynamic load balancing.
<HUAWEI> system-view
[HUAWEI] wlan
Format
sta-load-balance dynamic sta-number gap-threshold { percentage percentage-
value | number number-value }
undo sta-load-balance dynamic sta-number gap-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When a user requests to connect to an AP, the AP counts the total number of
access users on all radios. If the total number of access users does not exceed the
start threshold configured using the sta-load-balance dynamic sta-number
start-threshold command, the AP does not implement dynamic load balancing.
The AP implements dynamic load balancing only when the total number of access
users on all radios exceeds the start threshold.
One of the conditions for directing a STA to a new AP is that the radio of the
target load is lower than that of the current access radio. The radio load is
identified by the number or percentage (Number of users associated with the
current radio/Maximum number of access users supported by the radio x 100%) of
access users. If the load difference between the target radio and current radio
exceeds the specified threshold, the condition is met.
NOTE
The start threshold and load difference threshold for dynamic load balancing are used to adjust
the sensitivity for triggering load balancing, and the default values are recommended. If the
start and load difference thresholds are set low, load balancing becomes far easier to be
triggered. As a result, STAs are frequently switched between APs, affecting user experience. If
the start and load difference thresholds are set high, the load balancing mechanism may
become invalid.
Example
# Set the load difference threshold for dynamic load balancing based on the
number of users to 25% in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic sta-number gap-threshold percentage 25
By default, the start threshold for dynamic load balancing based on the number of
users is 10.
Format
sta-load-balance dynamic sta-number start-threshold start-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
When a user requests to connect to an AP, the AP counts the total number of
access users on all radios. If the number of access users on the requested radio
does not exceed the start threshold, the AP does not implement dynamic load
balancing based on the number of users. The AP implements dynamic load
balancing based on the number of users only after the number of access users
exceeds the start threshold.
NOTE
The start and load difference thresholds for dynamic load balancing configured using the sta-
load-balance dynamic sta-number gap-threshold command can be used to adjust sensitivity
for triggering load balancing. The default values are recommended in typical scenarios. A higher
threshold is recommended in high-density scenarios. If the start and load difference thresholds
are set low, load balancing becomes far easier to be triggered. As a result, STAs are frequently
switched between APs, affecting user experience. If the start and load difference thresholds are
set high, the load balancing mechanism may become invalid.
Example
# Set the start threshold for dynamic load balancing based on the number of
users to 20 in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic sta-number start-threshold 20
Format
sta-load-balance dynamic channel-utilization gap-threshold gap-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When dynamic load balancing based on the channel usage is implemented, the
SDN controller calculates the channel usage of each member in a dynamic load
balancing group. The SDN controller then compares the channel usage values of
all members in the dynamic load balancing group and obtains the smallest
channel usage value. When a STA requests to associate with an AP radio, the SDN
controller calculates the difference between the radio's channel usage and the
smallest channel usage value, and compares this difference with the specified
threshold. If the difference is smaller than the threshold, the SDN controller allows
the STA to associate with the radio. If not, the SDN controller performs dynamic
load balancing calculation and allows the STA to associate with the radio with a
lower load.
Example
# Set the channel usage difference threshold for load balancing in the dynamic
load balancing group to 30%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic channel-utilization gap-threshold 30
Format
sta-load-balance dynamic channel-utilization start-threshold start-threshold
undo sta-load-balance dynamic channel-utilization start-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the start threshold is configured for dynamic load balancing based on the
channel usage, an AP calculates the channel usage of the radio with which a STA
associates when the STA requests to connect to the AP. If the channel usage does
not exceed the start threshold, the STA access is permitted. If the channel usage
exceeds the start threshold, the AP calculates the load difference for dynamic load
balancing based on the channel usage. You can run the sta-load-balance
dynamic channel-utilization gap-threshold command to configure the load
difference threshold for dynamic load balancing based on the channel usage.
Example
# Set the start threshold for dynamic load balancing based on the channel usage
to 60%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic channel-utilization start-threshold 60
Format
sta-load-balance dynamic probe-report interval interval
undo sta-load-balance dynamic probe-report interval
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After an AP receives information about neighboring APs of STAs, it reports the
information to the Leader AP for determining the target APs to which the STAs
will roam. You can run the sta-load-balance dynamic probe-report interval
command to set the interval at which the AP reports information about
neighboring APs of the STAs.
Precautions
You are advised to retain the default value. If the device has high performance
pressure, you can set a longer interval.
Example
# Set the interval for reporting Probe frames to 125 seconds in RRM profile
default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic probe-report interval 125
Format
sta-load-balance dynamic rssi-diff-gap diff-gap-threshold
undo sta-load-balance dynamic rssi-diff-gap
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
To achieve load balancing, an AP may steer connected STAs to other APs with
smaller RSSIs. If the RSSI of the AP with which a STA currently associates minus
the RSSI of the target AP is larger than the specified RSSI difference threshold, the
STA is denied from being steered to the target AP; otherwise, the STA can be
steered to the target AP.
Precautions
If STAs have high signal quality deterioration tolerance for the target AP, you can
set a larger RSSI difference threshold to achieve better load balancing effect. If
STAs have low signal quality deterioration tolerance for the target AP, set a
smaller RSSI difference threshold. You are advised to retain the default value.
This command takes effect only in sta-number mode.
Example
# Set the RSSI difference threshold of members in a dynamic load balancing
group to 6 dB in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic rssi-diff-gap 6
Format
sta-load-balance dynamic rssi-threshold rssi-threshold
undo sta-load-balance dynamic rssi-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the RSSI threshold of member devices in a dynamic load balancing group is
set an AP compares the RSSI of a STA with the configured RSSI threshold after
receiving the Probe Request packet sent by the STA. If the STA's RSSI exceeds the
configured RSSI threshold, the AP reports the STA information to the leader AP,
and the AP is added to the dynamic load balancing group. Otherwise, the AP
directly filters the STA information and does not report the information to the
leader AP, and the AP will not be added to the dynamic load balancing group.
Setting an RSSI threshold for member devices in a dynamic load balancing group
is to filter APs with weak signals, so that STAs can be load-balanced between APs
with better signals. This prevents STAs from associating with APs with weak
signals but light loads. This function does not affect STAs' going online.
Precautions
Example
# Set the RSSI threshold for members in a dynamic load balancing group to –70
dBm in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic rssi-threshold -70
Format
sta-load-balance dynamic steer-restrict auth-threshold auth-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA is triggered to steer to a specified target AP, non-target APs will
suppress association of the STA temporarily to improve the STA's steering success
rate. You can run the sta-load-balance dynamic steer-restrict auth-threshold
command to set the maximum number of times non-target APs suppress
authentication of STAs during STA steering.
Precautions
You can set a larger value of this parameter to improve the STAs' steering success
rate, which, however, may affect users' network experience.
The default value is applicable to mainstream STAs. You are advised to retain the
default value. If users' service experience deteriorates due to STA steering, set a
smaller value for this parameter.
Example
# Set the maximum number of times non-target APs suppress authentication of
STAs during STA steering to 1 in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic steer-restrict auth-threshold 1
Format
sta-load-balance dynamic steer-restrict probe-threshold probe-threshold
undo sta-load-balance dynamic steer-restrict probe-threshold
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA is triggered to steer to a specified target AP, non-target APs will
suppress association of the STA temporarily to improve the STA's steering success
rate. You can run the sta-load-balance dynamic steer-restrict probe-threshold
command to set the maximum number of times non-target APs suppress probing
of STAs during STA steering.
Precautions
You can set a larger value of this parameter to improve the STAs' steering success
rate, which, however, may affect users' network experience.
The default value is applicable to mainstream STAs. You are advised to retain the
default value. If users' service experience deteriorates due to STA steering, set a
smaller value for this parameter.
Example
# Set the maximum number of times non-target APs suppress probing of STAs
during STA steering to 4 in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic steer-restrict probe-threshold 4
By default, the duration within which non-target APs suppress association of STAs
during STA steering is 5 seconds.
Format
sta-load-balance dynamic steer-restrict restrict-time restrict-time
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA is triggered to steer to a specified target AP, non-target APs will
suppress association of the STA temporarily to improve the STA's steering success
rate. You can run the sta-load-balance dynamic steer-restrict restrict-time
command to set the duration within which non-target APs suppress association of
STAs during STA steering.
Precautions
You can set a larger value of this parameter to improve the STAs' steering success
rate, which, however, may affect users' network experience.
The default value is applicable to mainstream STAs. You are advised to retain the
default value. If users' service experience deteriorates due to STA steering, set a
smaller value for this parameter.
This command takes effect only in sta-number mode.
Example
# Set the duration within which non-target APs suppress association of STAs
during STA steering to 4 seconds in RRM profile default.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance dynamic steer-restrict restrict-time 4
Format
sta-load-balance mode { sta-number | channel-utilization }
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the sta-load-balance mode command to configure the dynamic load
balancing mode based on the actual environment to provide better network
experience for users.
● Dynamic load balancing based on the channel usage uses a complex
algorithm but is accurately implemented to ensure service quality. This mode
is recommended when service types and traffic volumes differ greatly among
users.
● Dynamic load balancing based on the number of users is less accurate but
uses a simple algorithm. This mode is recommended when most users have
the same type of services and similar service traffic volumes.
Example
# Configure dynamic load balancing based on the channel usage.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] sta-load-balance mode channel-utilization
Format
uac channel-utilization threshold access access-threshold [ roam roam-
threshold ]
undo uac channel-utilization threshold
Parameters
Parameter Description Value
access access- Specifies the user CAC access The value is an integer that
threshold threshold based on channel ranges from 1 to 100, in
usage. percentage.
roam roam- Specifies the user CAC roaming The value is an integer that
threshold threshold based on channel ranges from 1 to 100, in
utilization, that is, the channel percentage.
utilization threshold for
reassociated roaming STAs.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios,
users compete fiercely to occupy resources as the number of online users
increases. As a result, network quality deteriorates. To ensure network access
experience of online users, configure the user CAC function. The user CAC function
allows an AP to control user access based on the number of online usersradio
Example
# Set the user CAC access and roaming thresholds both to 50%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name huawei
[HUAWEI-wlan-rrm-prof-huawei] uac channel-utilization enable
[HUAWEI-wlan-rrm-prof-huawei] uac channel-utilization threshold access 50 roam 50
Format
uac { client-number | channel-utilization | client-snr } enable
undo uac { client-number | channel-utilization | client-snr } enable
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios,
users compete fiercely to occupy resources as the number of online users
increases. As a result, network quality deteriorates. To ensure network access
experience of online users, configure the user CAC function. The user CAC function
allows an AP to control user access based on the number of online usersradio
channel utilization, or terminal SNR, which enables provisioning of high-quality
network access services.
CAC is implemented in the following modes:
● User CAC based on channel utilization uses a complex algorithm but is
accurately implemented to ensure service quality. This mode is recommended
when service types and traffic volumes differ greatly among users.
● User CAC based on the number of users is less accurate but uses a simple
algorithm. This mode is recommended when most users have the same type
of services and similar service traffic volumes.
● SNR-based user CAC controls access from weak-signal users, and is applicable
to scenarios where the WLAN has good signal coverage and weak signals only
at the edge of WLAN coverage areas.
CAC based on channel utilization and CAC based on the number of users cannot
be configured together, but either of them can be configured together with SNR-
based CAC.
Follow-up Procedure
Run the uac client-number threshold command to set the user CAC threshold
based on the number of users, or run the uac channel-utilization threshold
command to set the user CAC threshold based on channel utilization.
Run the uac client-snr threshold command to set the user CAC threshold based
on terminal SNR.
Run the uac reach-access-threshold hide-ssid command to configure the AP to
automatically hide its SSID when the number of users reaches the user CAC
threshold for new users.
Example
# Enable user CAC based on the number of users.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name test
[HUAWEI-wlan-rrm-prof-test] uac client-number enable
The undo uac client-number threshold command restores the default user CAC
threshold based on the number of users.
By default, the user CAC access and roaming thresholds based on the number of
users are both 64.
Format
uac client-number threshold access access-threshold [ roam roam-threshold ]
Parameters
Parameter Description Value
access access- Specifies the user CAC access The value is an integer.
threshold threshold based on the number of The range of the integer is
users. dependent on the specific
device.
roam roam- Specifies the user CAC roaming The value is an integer.
threshold threshold based on the number of The range of the integer is
users. This threshold is the total dependent on the specific
number of users who can be device.
associate with the AP, including all
local and reassociated roaming
users.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios,
users compete fiercely to occupy resources as the number of online users
increases. As a result, network quality deteriorates. To ensure network access
experience of online users, configure the user CAC function. The user CAC function
allows an AP to control user access based on the number of online usersradio
channel utilization, or terminal SNR, which enables provisioning of high-quality
network access services.
NOTE
The user CAC access threshold is invalid for roaming users. For example, the user CAC access
threshold is 20, and the user CAC roaming threshold is 24. If 20 local users have already
connected to the network, not more local users can connect to the network but another four
roaming users can.
Example
# Set the user CAC access threshold based on the number of users to 50 and the
roaming threshold to 60.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name test
[HUAWEI-wlan-rrm-prof-test] uac client-number enable
[HUAWEI-wlan-rrm-prof-test] uac client-number threshold access 50 roam 60
The undo uac client-snr threshold command restores the default user CAC
threshold based on terminal SNR.
By default, the user CAC threshold based on terminal SNR is 15 dB.
Format
uac client-snr threshold threshold
undo uac client-snr threshold
Parameters
Parameter Description Value
threshold Specifies the user CAC threshold The value is an integer that ranges
based on terminal SNR. from 5 to 25, in dB.
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On WLANs where many users exist, such as WLANs in high density scenarios,
users compete fiercely to occupy resources as the number of online users
increases. As a result, network quality deteriorates. To ensure network access
experience of online users, configure the user CAC function. The user CAC function
allows an AP to control user access based on the number of online usersradio
channel utilization, or terminal SNR, which enables provisioning of high-quality
network access services.
The configured user CAC threshold based on terminal SNR takes effect for new
STAs. When a new STA (or a roaming STA) attempts to connect to an AP, the AP
checks the STA's SNR. If the SNR is smaller than the threshold, the AP denies the
STA's access.
SNR-based user CAC controls access from weak-signal users, applicable to
scenarios where the WLAN has good signal coverage and weak signals only at the
edge of WLAN coverage areas.
CAC is implemented in the following modes:
● User CAC based on channel utilization uses a complex algorithm but is
accurately implemented to ensure service quality. This mode is recommended
when service types and traffic volumes differ greatly among users.
● User CAC based on the number of users is less accurate but uses a simple
algorithm. This mode is recommended when most users have the same type
of services and similar service traffic volumes.
● SNR-based user CAC controls access from weak-signal users, and is applicable
to scenarios where the WLAN has good signal coverage and weak signals only
at the edge of WLAN coverage areas.
CAC based on channel utilization and CAC based on the number of users cannot
be configured together, but either of them can be configured together with SNR-
based CAC.
Prerequisites
The user CAC function based on terminal SNR has been enabled using the uac
client-snr enable command.
Example
# Set the user CAC threshold based on terminal SNR to 16 dB.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name default
[HUAWEI-wlan-rrm-prof-default] uac client-snr enable
[HUAWEI-wlan-rrm-prof-default] uac client-snr threshold 16
Format
uac reach-access-threshold { hide-ssid | priority-replace }
Parameters
Parameter Description Value
Views
RRM profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After user CAC is configured, you can configure the action to take when the
number of access users reaches the threshold. The following actions are available:
● Deny new user access. This is the default configuration.
● Deny new user access and hide the SSID.
● Disconnect common users to make room for access of high-priority users.
Prerequisites
User CAC has been enabled using the uac { client-number | channel-utilization |
client-snr } enable command.
Precautions
● When you run the undo uac { client-number | channel-utilization | client-
snr } enable command to disable user CAC and automatically cancel SSID
hiding.
● The uac reach-access-threshold priority-replace command takes effect only
when UAC based on the number of users is enabled.
Example
# Enable SSID hiding.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rrm-profile name test
[HUAWEI-wlan-rrm-prof-test] uac client-number enable
[HUAWEI-wlan-rrm-prof-test] uac reach-access-threshold hide-ssid
NOTE
Format
display station roam-track sta-mac mac-address
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
During the roaming process of a STA, the device records the STA's roaming track
(that is, information about the APs that the STA connects to). You can run the
display station roam-track command to view the roaming track of the STA.
Example
# Display the roaming track of the STA with the MAC address 00e0-fc00-0001.
<HUAWEI> display station roam-track sta-mac 00e0-fc00-0001
Access SSID:test
Rx/Tx:link receive rate/link transmit rate(Mbps)
c:PMK Cache Roam r:802.11r Roam
------------------------------------------------------------------------------
L2/L3 AP IP AP name Radio ID
BSSID TIME In/Out RSSI Out Rx/Tx
------------------------------------------------------------------------------
-- 192.168.109.1 test1 1
00e0-fc76-e360 2015/01/12 16:52:58 -51/-48 46/13
L2 192.168.109.1 test2 1
00e0-fc74-9640 2015/01/12 16:55:45 -58/- -/-
------------------------------------------------------------------------------
Number: 1
Item Description
Item Description
NOTE
Format
display station roam-statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display station roam-statistics command to view STA roaming
statistics.
Example
# Display roaming statistics about all STAs.
Item Description
Station roam from/to other AC statistic Statistics about STAs roaming from
another AP to the local AP or STAs
roaming from the local AP to another
AP.
NOTE
Format
dot11r enable [ reassociate-timeout time ]
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
During roaming, the STA needs to be reauthenticated and re-negotiate a key, so
services are interrupted for a short period of time. You can enable 802.11r to
reduce the number of information exchanges during roaming, thus reducing
latency.
Precautions
● Security policies supported by 802.11r include open system, WPA2+PSK+AES,
WPA2+PPSK+AES, and WPA2+802.1X+AES.
Example
# Enable the 802.11r function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] dot11r enable
13.1 ble
13.2 ble low-power-threshold
13.3 ble monitoring-list
13.4 broadcaster enable
13.5 broadcasting-content
13.6 broadcasting-interval
13.7 display ble-profile
13.8 display location-profile
13.9 display references ble-profile
13.10 display references location-profile
13.11 display wlan ble global configuration
13.12 display wlan ble monitoring-list
13.13 display wlan ble site-info
13.14 location-profile
13.15 location-profile (WLAN view)
13.16 private mu protocol-version
13.17 private mu-enable
13.18 private report-frequency
13.19 private server
13.20 report-mode
13.21 report-to-server
13.22 reset wlan ble site-info
13.23 sniffer enable
13.24 tx-power (BLE profile view)
13.1 ble
Function
The ble command enters the default BLE profile view.
NOTE
Format
ble
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
To perform BLE-related configurations on cloud APs, run this command to enter
the default BLE profile view.
Example
# Enter the default BLE profile view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble
[HUAWEI-wlan-ble-prof-default]
Function
The ble low-power-threshold command sets a low power alarm threshold for
BLE devices.
The undo ble low-power-threshold command restores the low power alarm
threshold of BLE devices to the default value.
By default, the low power alarm threshold of BLE devices is 20%.
Format
ble low-power-threshold low-power-threshold
undo ble low-power-threshold
Parameters
Parameter Description Value
low-power- Specifies the low power The value is an enumerated type. The
threshold alarm threshold of BLE options are as follows:
devices.
● 0: 0%
● 20: 20%
● 40: 40%
● 60: 60%
● 80: 80%
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After the sniffer enable command is executed to enable the Bluetooth monitoring
function of an AP's built-in Bluetooth module, the built-in Bluetooth module will
scan and obtain information about surrounding BLE devices. The information
includes battery power of BLE devices. When the obtained battery power of a BLE
device is lower than the low power alarm threshold, the AP generates an alarm
indicating that the BLE device has low battery power.
Example
# Set the low power alarm threshold for BLE devices to 40%.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble low-power-threshold 40
Function
The ble monitoring-list command adds specified Bluetooth devices to the
Bluetooth device monitoring list.
The undo ble monitoring-list command deletes specified Bluetooth devices from
the Bluetooth device monitoring list.
NOTE
Format
ble monitoring-list mac mac-address1 [ to mac-address2 ]
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Bluetooth devices with all-0 or all-F MAC addresses cannot be added to the
monitoring list.
Example
# Add the Bluetooth device with MAC address 00e0-fc12-3456 to the monitoring
list.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble monitoring-list mac 00e0-fc12-3456
Function
The broadcaster enable command enables the Bluetooth broadcast function of
an AP's built-in Bluetooth module.
The undo broadcaster enable command disables the Bluetooth broadcast
function of an AP's built-in Bluetooth module.
By default, the Bluetooth broadcast function of an AP's built-in Bluetooth module
is disabled.
NOTE
Format
broadcaster enable
undo broadcaster enable
Parameters
None
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
When an AP's built-in Bluetooth module is used as a BLE device, you can run this
command to enable the Bluetooth broadcast function. After this function is
enabled, the built-in Bluetooth module sends BLE broadcast frames to surrounding
devices. The frame content complies with the iBeacon protocol.
Example
# Enable the Bluetooth broadcast function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name example
[HUAWEI-wlan-ble-prof-example] broadcaster enable
13.5 broadcasting-content
Function
The broadcasting-content command configures the content of a BLE broadcast
frame sent by an AP's built-in Bluetooth module.
By default, the UUID, Major, and Minor fields in a BLE broadcast frame sent by an
AP's built-in Bluetooth module are null, and the RSSI calibration value is -65 dBm.
NOTE
Format
broadcasting-content { uuid { uuid-character-string uuid-value | uuid-hex uuid-
value } | major { major-character-string major-value | major-hex major-value |
major-decimal major-value } | minor { minor-character-string minor-value |
minor-hex minor-value | minor-decimal minor-value } | reference-rssi reference-
rssi-value }*
Parameters
Parameter Description Value
uuid uuid- Specifies the UUID field in a BLE The value is a string of 1
character-string broadcast frame. UUID is the to 16 characters. The
uuid-value universally unique identifier of a default value is null.
BLE device.
major major- Specifies the Major field in a BLE The value is a string of 1
character-string broadcast frame. This field or 2 characters. The
major-value specifies a major group and is default value is null.
combined with the Minor field to
define information about a BLE
device, for example, location of a
BLE device.
major major- Specifies the Major field in a BLE The value is an integer
decimal major- broadcast frame. This field that ranges from 0 to
value specifies a major group and is 65535. The default value
combined with the Minor field to is null.
define information about a BLE
device, for example, location of a
BLE device.
minor minor- Specifies the Minor field in a BLE The value is a string of 1
character-string broadcast frame. This field or 2 characters. The
minor-value specifies a minor group and is default value is null.
combined with the Major field to
define information about a BLE
device, for example, location of a
BLE device.
minor minor- Specifies the Minor field in a BLE The value is an integer
decimal minor- broadcast frame. This field that ranges from 0 to
value specifies a minor group and is 65535. The default value
combined with the Major field to is null.
define information about a BLE
device, for example, location of a
BLE device.
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After enabling the broadcast function of an AP's built-in Bluetooth module using
the broadcaster enable command, you can run the broadcasting-content
command to configure the content of BLE broadcast frames sent by the module.
Precautions
The RSSI calibration value in a BLE broadcast frame is set based on the actual
measurement result.
After changing the transmit power of a built-in Bluetooth module using the tx-
power (BLE profile view) command, you need to remeasure and reconfigure the
RSSI calibration value. Therefore, you are advised to run the tx-power (BLE
profile view) command to configure the transmit power of a built-in Bluetooth
module before configuring the RSSI calibration value.
Example
# Configure the content of a BLE broadcast frame sent by an AP's built-in
Bluetooth module. Set UUID uuid-hex to 12345678123456789, Major major-hex
to A22, Minor minor-hex to 011, and reference-rssi to –70.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name example
[HUAWEI-wlan-ble-prof-example] broadcasting-content uuid uuid-hex 12345678123456789 major
major-hex A22 minor minor-hex 011 reference-rssi -70
13.6 broadcasting-interval
Function
The broadcasting-interval command configures the interval for an AP's built-in
Bluetooth module to send BLE broadcast frames.
NOTE
Format
broadcasting-interval broadcasting-interval-value
undo broadcasting-interval
Parameters
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
After enabling the broadcast function of an AP's built-in Bluetooth module using
the broadcaster enable command, you can run the broadcasting-interval
command to set the interval for the module to send BLE broadcast frames.
Example
# Set the interval for an AP's built-in Bluetooth module to send BLE broadcast
frames to 1000 ms.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name example
[HUAWEI-wlan-ble-prof-example] broadcasting-interval 1000
Function
The display ble-profile command displays configuration and reference
information about a BLE profile.
NOTE
Format
display ble-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile-name Displays information about the BLE The BLE profile
profile with a specified name. name must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view configuration and reference information about
BLE profiles.
Example
# Display information about all BLE profiles.
<HUAWEI> display ble-profile all
---------------------------------------------------------------------------
Profile name Reference
---------------------------------------------------------------------------
example 1
---------------------------------------------------------------------------
Total: 1
Item Description
Format
display location-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view configuration information about a location
profile to verify the configuration.
Example
# Display all location profiles.
<HUAWEI> display location-profile all
----------------------------------------------------------
Profile name Reference
----------------------------------------------------------
default 1
----------------------------------------------------------
Total: 1
Item Description
Function
The display references ble-profile command displays reference information
about a BLE profile.
Format
display references ble-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view reference information about a BLE profile.
Example
# Display reference information about BLE profile example.
<HUAWEI> display references ble-profile name example
--------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------
AP group default
--------------------------------------------------------------------------
Total: 1
Item Description
Format
display references location-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view reference information about a location profile.
Example
# Display reference information about the location profile default.
<HUAWEI> display references location-profile name default
------------------------------------------------------------
Reference type Reference name
------------------------------------------------------------
Interface Wlan-Radio0/0/0
------------------------------------------------------------
Total: 1
Function
The display wlan ble global configuration command displays global
configurations of Bluetooth devices.
Format
display wlan ble global configuration
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view global configurations of Bluetooth devices and
know the configuration about the Bluetooth device information report function.
Example
# Display global configurations of Bluetooth devices.
<HUAWEI> display wlan ble global configuration
--------------------------------------------------------------------------------
BLE report interval(min) :10
BLE low power threshold(%) :20
BLE source IP address :0.0.0.0
--------------------------------------------------------------------------------
Table 13-7 Description of the display wlan ble global configuration command
output
Item Description
Function
The display wlan ble monitoring-list command displays BLE devices that have
been added to the monitoring list.
NOTE
Format
display wlan ble monitoring-list
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After running the ble monitoring-list command to add BLE devices to the
monitoring list, you can run the display wlan ble monitoring-list command to
check BLE devices that have been added to the monitoring list.
Example
# Check all BLE devices that have been added to the monitoring list.
<HUAWEI> display wlan ble monitoring-list
--------------------------------------------------------------------------------
Index MAC
--------------------------------------------------------------------------------
0 00e0-fc34-0000
1 00e0-fc34-7777
--------------------------------------------------------------------------------
Total: 2
Table 13-8 Description of the display wlan ble monitoring-list command output
Item Description
Index Index.
Function
The display wlan ble site-info command displays information about Bluetooth
devices that are scanned by an AP's built-in Bluetooth module.
NOTE
Format
display wlan ble site-info { all | mac-address mac-address | host-ap { valid |
host-ap-id ap-id | host-ap-name ap-name } }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After you enable the Bluetooth monitoring function using the sniffer enable
command, an AP's built-in Bluetooth module scans surrounding Bluetooth devices
and obtains their information. You can then run this command to view obtained
information about Bluetooth devices scanned by the built-in Bluetooth module.
After the Bluetooth broadcast function is enabled for an AP with the built-in
Bluetooth module, the Bluetooth module works as a Bluetooth station, whose
Example
# Display information about all Bluetooth devices.
<HUAWEI> display wlan ble site-info all
------------------------------------------------------------------------------------------------------------------------------
---------------------
Index MAC Host AP ID Host AP name RSSI Power Type DetachedFlag Aging-Timeout(m)
Broadcast count Advertisement data
------------------------------------------------------------------------------------------------------------------------------
---------------------
0 0000-0101-0202 4 AP4 -30 50% asset-tag N 57 10
02-02-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-fa
------------------------------------------------------------------------------------------------------------------------------
---------------------
Total: 1
Table 13-9 Description of the display wlan ble site-info command output
Item Description
Index Index.
Item Description
13.14 location-profile
Function
The location-profile command binds a location profile to an AP radio interface.
The undo location-profile command unbinds a location profile from an AP radio
interface.
By default, no location profile is bound to a radio interface.
Format
location-profile profile-name
undo location-profile
Parameters
Parameter Description Value
Views
radio interface view
Default Level
2: Configuration level
Usage Guidelines
You can also run this command to bind a location profile to a radio interface.
After the binding, the parameters of the location profile will be applied to the
radio interface.
Example
# Bind the location profile default to the 2.4G radio interface.
<HUAWEI> system-view
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] location-profile default
Format
location-profile name profile-name
undo location-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a location profile, The value is a string
name which uniquely identifies a location of 1 to 35 case-
profile. insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
The location-profile command creates or deletes a location profile or displays the
location profile view in which you can configure the profile. If the specified profile
name does not exist, the command creates a new location profile and displays the
view of this location profile, and all parameters in the location profile use default
values. You can also change values of these parameters.
NOTE
Example
# Create the location profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name test
[HUAWEI-wlan-location-prof-test]
Function
The private mu protocol-version command sets the terminal location protocol
version.
Format
private mu protocol-version { v3 | v5 }
Parameters
Parameter Description Value
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When the terminal location protocol version is v5, APs report more information to
the location server, such as the timestamp (the time when APs scan STAs). The
location server obtains the information to improve location accuracy.
Precautions
The terminal location protocol version must be the supported by the location
server.
Example
# Set the terminal location protocol version to v5.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name example
[HUAWEI-wlan-location-prof-example] private mu protocol-version v5
Function
The private mu-enable command enables terminal location of APs.
The undo private mu-enable command disables terminal location of APs.
By default, terminal location of APs is disabled.
Format
private mu-enable
undo private mu-enable
Parameters
None
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the private mu-enable command to enable terminal location of APs.
Example
# Enable terminal location of APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name example
[HUAWEI-wlan-location-prof-example] private mu-enable
Function
The private report-frequency command sets the interval at which an AP reports
channel scan information.
The undo private report-frequency command restores the default interval at
which an AP reports channel scan information.
By default, an AP reports channel scan information every 20000 ms.
Format
private report-frequency time
undo private report-frequency
Parameters
Parameter Description Value
time Specifies the interval at which an The value is an integer that
AP reports channel scan ranges from 500 ms to 60000
information. ms.
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
During terminal location, an AP periodically scans channels to collect data. The
collected data is buffered and updated on the AP, then reported to the location
server at specified intervals.
Example
# Set the interval at which an AP reports channel scan information to 30000 ms.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name example
[HUAWEI-wlan-location-prof-example] private report-frequency 30000
Function
The private server command configures the destination IP address and port
number for APs to report STA location data.
The undo private server command restores the default destination IP address and
port number for APs to report STA location data.
By default, no destination IP address or port number is configured for APs to
report STA location data.
Format
private server { ip-address ip-address | domain domain } port port-num
Parameters
Parameter Description Value
ip-address ip- Specifies the server's IPv4 address to The value is in dotted
address which APs report STA location data. decimal notation.
domain domain Specifies the domain name to which The value is a string of
APs report STA location data. 1 to 255 characters.
Views
Location profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After scanning channels, the AP reports the collected location information to the
eSight for analysis. You can run this command to configure the destination IP
address and port number for the AP to report STA location data.
Precautions
You cannot configure a port number that has been occupied by other services;
otherwise, the port configuration fails.
Example
# Configure APs to report STA location data directly to the location server, and set
the server's IP address and port number to 192.168.1.2 and 32180, respectively.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] location-profile name example
[HUAWEI-wlan-location-prof-example] private server ip-address 192.168.1.2 port 32180
13.20 report-mode
Function
The report-mode command sets the mode and interval for APs to send Bluetooth
packets.
The undo report-mode command cancels the configured mode and interval for
APs to send Bluetooth packets.
By default, an AP sends Bluetooth packets at an interval of 10 seconds.
Format
report-mode { immediate | periodic [ interval interval ] }
undo report-mode
Parameters
Parameter Description Value
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When APs are enabled to send Bluetooth packets immediately, the location
accuracy is high but AP performance may be affected. When APs are enabled to
send Bluetooth packets periodically, the location accuracy is low but AP
performance is not affected.
Precautions
When APs are enabled to send Bluetooth packets periodically, set a proper interval
at which Bluetooth packets are sent. Otherwise, location results may be
inaccurate.
Example
# Enable APs to send Bluetooth packets immediately.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name example
[HUAWEI-wlan-ble-prof-example] report-mode immediate
13.21 report-to-server
Function
The report-to-server command configures the destination server and port
number to which APs report Bluetooth packets.
The undo report-to-server command restores the default destination server and
port number to which APs report Bluetooth packets.
NOTE
Format
report-to-server ip-address ip-address port port-num [ via-ac ac-port ac-port-
num ]
undo report-to-server
Parameters
ip-address ip- Specifies the IPv4 address of the The value is in dotted
address location server to which APs report decimal notation.
Bluetooth packets.
domain domain Specifies the domain name of the The value is a string of
location server to which APs report 1 to 255 characters.
Bluetooth packets.
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the Bluetooth function is enabled, APs need to report collected Bluetooth
data to a server. APs report the data using either of the following two methods:
● Report the data directly to the server.
● Report the data to the server through an AC.
Precautions
When configuring a port number, ensure that the port is not occupied by other
services. If the port is occupied by other services, the port fails to be created.
For the same Bluetooth location function, Bluetooth data reporting through an AC
can be configured only in one BLE profile. If Bluetooth data reporting through an
AC has been configured in the current BLE profile for a Bluetooth location mode,
the forwarding mode cannot be configured in other BLE profiles for the same
Bluetooth location function.
Example
# Enable APs to report Bluetooth packets to the server with destination IP address
192.168.1.2 and port number 8569.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name example
[HUAWEI-wlan-ble-prof-example] report-to-server ip-address 192.168.1.2 port 8569
Function
The reset wlan ble site-info command deletes information about BLE devices
stored on an AC.
Format
reset wlan ble site-info { all | mac-address mac-address }
Parameters
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
When the remaining aging time of BLE devices is long and some BLE devices are
not in the current WLAN coverage area, but entries on the AC still exist, you can
run this command to delete information about these BLE devices.
Precautions
Deleted information about BLE devices cannot be recovered. If the aging time of a
BLE device is zero, information about the BLE device is automatically deleted from
the device list on the AC.
Example
# Delete information about all BLE devices from the AC.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] reset wlan ble site-info all
Function
The sniffer enable command enables and configures the working mode of an
AP's built-in Bluetooth module.
The undo sniffer enable command disables the Bluetooth function of an AP's
built-in Bluetooth module.
By default, the Bluetooth function of an AP's built-in Bluetooth module is disabled.
NOTE
Format
sniffer enable { ibeacon-mode | tag-mode | transparent-mode }
undo sniffer enable
Parameters
Parameter Description Value
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the Bluetooth monitoring or Bluetooth tag location function is enabled, the
built-in Bluetooth module of an AP will scan and obtain information about
surrounding BLE devices or Bluetooth tags. The built-in Bluetooth module then
reports the obtained information such as MAC addresses, RSSIs, BLE broadcast
frame contents, and battery power.
After the Bluetooth monitoring function is enabled, an AP obtains battery power
information about surrounding BLE devices at WLAN service off-peak hours, for
example, from 2:00 a.m. to 2:30 a.m. (UTC time), and then reports the obtained
information to the AC. Precisely configure the system time of an AC to ensure that
WLAN services are not affected when the AC obtains battery power of BLE
devices.
After the Bluetooth data transparent transmission function is enabled, the built-in
Bluetooth module of an AP scans surrounding Bluetooth clients, and reports
information about the scanned Bluetooth clients, such as packet data, MAC
addresses, and RSSIs.
The Bluetooth broadcast and Bluetooth monitoring functions can be enabled
simultaneously for an AP's built-in Bluetooth module. When the two functions are
both enabled, the AP's built-in Bluetooth module is also monitored.
After you run the undo sniffer enable command to disable the BLE monitoring or
Bluetooth tag location function, the AC will trigger an alarm indicating that BLE
devices or Bluetooth tags are offline.
Example
# Enable the Bluetooth monitoring function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name example
[HUAWEI-wlan-ble-prof-example] sniffer enable ibeacon-mode
Warning: Modifying the monitoring mode may cause BLE devices in the original monitoring mode to go
offline and age.
Function
The tx-power command configures the transmit power of an AP's built-in
Bluetooth module.
The undo tx-power command restores the default transmit power of an AP's
built-in Bluetooth module.
By default, the transmit power of an AP's built-in Bluetooth module is 0 dBm.
Format
tx-power tx-power-value
undo tx-power
Parameters
Parameter Description Value
tx-power-value Transmit power of an The value is an enumerated type. The
AP's built-in Bluetooth options are -21, -18, -15, -12, -9, -6, -3,
module. 0, 1, 2, 3, 4, and 5, in dBm.
Views
BLE profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run this command to change the transmit power of an AP's built-in
Bluetooth module. Increasing transmit power can improve Bluetooth signal
transmission quality but causes more severe interference to other wireless devices.
Reducing transmit power can reduce interference to other wireless devices but
affects Bluetooth signal transmission quality. Configure proper transmit power of
an AP's built-in Bluetooth module according to actual situations.
Precautions
After changing the transmit power of an AP's built-in Bluetooth module, you need
to run the broadcasting-content command to reconfigure the RSSI calibration
value in BLE broadcast frames.
Example
# Configure the transmit power of an AP's built-in Bluetooth module to 2 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ble-profile name example
[HUAWEI-wlan-ble-prof-example] tx-power 2
Function
The anti-attack flood blacklist enable command enables the flood blacklist
function.
The undo anti-attack flood blacklist enable command disables the flood
blacklist function.
Format
anti-attack flood { arp | dhcp | dhcpv6 | igmp | mdns | nd | other-broadcast |
other-multicast } blacklist enable
Parameters
Parameter Description Value
nd Indicates whether to -
enable the ND flood
blacklist function.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the protocol-based flood blacklist function is enabled, the device considers
traffic of a specified protocol (such as DHCP or ARP) with a rate higher than that
specified in anti-attack flood sta-rate-threshold a flood attack and adds the STA
to the blacklist.
Prerequisites
The flood prevention function has been enabled using the undo anti-attack flood
disable command.
Example
# Enable the DHCP flood blacklist function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-wlan-vap-prof-profile1] anti-attack flood dhcp blacklist enable
Function
The anti-attack flood disable disables the flood prevention function.
The undo anti-attack flood disable command enables the flood prevention
function.
Format
anti-attack flood { all | arp | dhcp | dhcpv6 | igmp | mdns | nd | other-broadcast
| other-multicast } disable
undo anti-attack flood { all | arp | dhcp | dhcpv6 | igmp | mdns | nd | other-
broadcast | other-multicast } disable
Parameters
Parameter Description Value
nd Indicates whether to -
enable the ND flood
prevention function.
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a large number of packets are sent to a device in a short time, the device
becomes busy processing the packets and cannot process normal services. To
prevent flood attacks, you can configure protocol-based flood prevention.
Precautions
The flood prevention function takes effect only for incoming traffic on an AP's
wired interface.
Example
# Disable the DHCP flood prevention function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-vap-prof-profile1] anti-attack flood dhcp disable
Function
The anti-attack flood sta-rate-threshold command sets the flood threshold.
The default flood threshold is 4 pps for ARP, DHCP, DHCPv6, IGMP, and mDNS
packets, 8 pps for ND packets, 10 pps for broadcast packets other than ARP, DHCP,
DHCPv6, and ND packets, and 10 pps for multicast packets other than IGMP and
mDNS packets.
Format
anti-attack flood { arp | dhcp | dhcpv6 | igmp | mdns | nd | other-broadcast |
other-multicast } sta-rate-threshold sta-rate-threshold
Parameters
Parameter Description Value
nd Specifies ND packets. -
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the flood prevention function is enabled, you can run this command to set
the broadcast traffic threshold.
When the traffic rate exceeds the threshold, the device considers a flood attack
from the STA and discards the traffic. This prevents the upper-layer network from
being affected by the flood.
If the flood blacklist function is enabled using the anti-attack flood blacklist
enable command, the device adds flood STAs to the blacklist.
Prerequisites
The flood prevention function has been enabled using the undo anti-attack flood
disable command.
Precautions
The flood prevention function takes effect only for incoming traffic on an AP's
wired interface.
Example
# Set the DHCP flood threshold to 100 pps.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name profile1
[HUAWEI-vap-prof-profile1] anti-attack flood dhcp sta-rate-threshold 100
Format
arp anti-attack check user-bind enable
undo arp anti-attack check user-bind enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
DAI allows an AP to detect the ARP Request and Reply packets transmitted on the
VAPs of the AP, to discard invalid and attack ARP packets, and to record an alarm.
This function prevents ARP packets of unauthorized users from accessing the
external network through the AP, protecting authorized users against interference
or spoofing, and protecting the AP.
● Invalid ARP packets: The source IP and MAC addresses of ARP Request and
Reply packets do not match.
● Attack ARP packets: When an AP receives a large number of consecutive ARP
packets and the number of ARP packets exceeds the ARP attack alarm
threshold, an ARP attack occurs.
Example
# Enable DAI.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] arp anti-attack check user-bind enable
The undo brute-force-detect interval command restores the default interval for
brute force key cracking detection.
By default, the interval for brute force key cracking detection is 60 seconds.
Format
brute-force-detect interval interval
Parameters
Parameter Description Value
interval Specifies the interval for brute force key The value is an
interval cracking detection. integer that ranges
from 10 to 120, in
seconds.
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In a brute force key cracking attack, an attacker tries all possible key combinations
one by one to obtain the correct password. To improve password security, enable
defense against brute force key cracking to prolong the time used to crack
passwords.
Follow-up Procedure
Example
# Set the interval for brute force key cracking detection to 100 seconds.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable wpa-psk
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] brute-force-detect interval 100
By default, the quiet time for an AP to record brute force key attacks is 600
seconds.
Format
brute-force-detect quiet-time quiet-time-value
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After attack detection is enabled on an AP, the AP reports alarms upon attack
detection. If an attack source launches attacks repeatedly, a large number of
repeated alarms are generated. To prevent this situation, configure the quiet time
function for attack detection. When detecting attack sources of the same MAC
address, the AP does not report alarms in the quiet time. However, if the AP still
detects attacks from the attack source after the quiet time expires, the AP reports
alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small
value. If attacks are frequently detected, set the quiet time to a large value to
prevent frequent alarm reports.
Follow-up Procedure
Example
# Set the quiet time for an AP to record brute force key attacks to 300 seconds.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable wpa-psk
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] brute-force-detect quiet-time 300
Format
brute-force-detect threshold threshold
undo brute-force-detect threshold
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In a brute force key cracking attack, an attacker tries all possible key combinations
one by one to obtain the correct password. To improve password security, enable
defense against brute force key cracking to prolong the time used to crack
passwords.
An AP checks whether the number of key negotiation failures during WPA/WPA2-
PSK, WAPI-PSK, or WEP-Share-Key authentication of a user exceeds the threshold
configured using the brute-force-detect threshold command. If so, the AP
considers that the user is using the brute force method to crack the password. If
the dynamic blacklist function is enabled, the AP adds the user to the dynamic
blacklist and discards all the packets from the user until the dynamic blacklist
entry ages out. If the threshold is set to a small value, the AP may incorrectly add
authorized users to the dynamic blacklist, causing the users unable to go online.
Follow-up Procedure
Run the dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the maximum number of key negotiation failures allowed within a brute
force key cracking attack detection period to 60.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable wpa-psk
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] brute-force-detect threshold 60
14.8 contain
Function
The contain command enables containment of rogue and interfering devices
based on the RSSI and number of associated STAs on the devices.
The undo contain command disables containment of rogue and interfering
devices based on the RSSI and number of associated STAs on the devices.
By default, containment of rogue and interfering devices based on the RSSI and
number of associated STAs on the devices is disabled.
Format
contain { min-rssi min-rssi | min-sta-num min-sta-num }
undo contain { min-rssi | min-sta-num }
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After RSSI-based containment is enabled, if the RSSIs of detected rogue and
interfering devices are no more than the specified minimum RSSI value, the
devices are not contained. They are contained only when their RSSIs exceed the
specified minimum RSSI value.
After containment based on the number of associated STAs is enabled, if the
number of STAs associated with detected rogue and interfering devices is smaller
than the specified minimum value, the devices are not contained. They are
contained only when the number of STAs associated with them reaches the
specified minimum value.
Prerequisites
Detection and containment of rogue and interfering devices have been enabled.
Precautions
Example
# Enable containment of rogue and interfering APs with spoofing SSIDs and set
the number of associated STAs that triggers containment to 5.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids contain enable
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] contain-mode spoof-ssid-ap
[HUAWEI-wlan-wids] contain min-sta-num 5
14.9 contain-mode
Function
The contain-mode command sets the containment mode against rogue or
interference devices.
The undo contain-mode command deletes the containment mode against rogue
or interference devices.
Format
contain-mode { open-ap | spoof-ssid-ap | client [ protect sta-whitelist-profile
profile-name ] | adhoc }
undo contain-mode { open-ap | spoof-ssid-ap | client [ protect ] | adhoc }
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Rogue or interference devices pose serious security threats to enterprise networks.
After the containment mode is set against rogue or interference APs, the monitor
AP uses the identity of the rogue or interference AP to broadcast deauthentication
frames to forcibly disconnect STAs. To prevent the STAs from connecting to the
rogue or interference AP again, the monitor AP will periodically and continuously
send deauthentication frames.
After the containment mode is set against rogue STAs, interference STAs or Ad-hoc
devices, the monitor AP uses the MAC address of a rogue device to continuously
send unicast deauthentication frames.
Example
# Counter rogue and interference APs with spoofing SSIDs.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids contain enable
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] contain-mode spoof-ssid-ap
The undo device report-interval command restores the default interval at which
an AP detects incremental wireless device information.
Format
device report-interval interval
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
The device detection function has been enabled using the wids device detect
enable command for the AP.
Example
# Set the interval at which an AP detects incremental wireless device information
to 120 seconds.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids device detect enable
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] device report-interval 120
Format
dhcp trust port
Parameters
None
Views
GE interface view, Eth-Trunk interface view, , MultiGE interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Configure GE0/0/0 on the AP as a DHCP trusted interface.
<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 0/0/0
[HUAWEI-GigabitEthernet0/0/0] dhcp trust port
Format
display ap radio-environment [ radio radio-id ]
Parameters
Parameter Description Value
Views
All views
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When WLAN access experience is poor, you can run this command to view air
interface environment information and Wi-Fi interference sources. The interference
can be determined based on the noise floor, signal to interference plus noise ratio
(SINR), co-channel interference, and adjacent-channel interference. After this
command is executed, radio scanning of the AP is automatically enabled, and the
AP starts to scan the air interface environment of radios. You can run this
command again to view air interface environment scanning results.
Precautions
When you run this command for the first time, no air interface environment
scanning result is displayed. To view air interface environment scanning results,
run this command again.
After AP radio scanning is enabled using this command, the air interface
performance of an AP is affected. If this command is not executed again after five
minutes, AP radio scanning is automatically disabled.
If the radio radio-id parameter is not specified, air interface environment
information about all radios of the AP is displayed.
NOTE
In the scanning result, the channel utilization, co-channel interference, and adjacent-channel
interference are calculated with the impact of non-Wi-Fi interference. However, non-Wi-Fi
interference devices are not displayed in the interference source list.
Example
# Display air interface environment information about radio 0.
<HUAWEI> display ap radio-environment radio 0
Warning: This operation will enable scanning for the specified radio, affecting AP's air interface
performance. Scanning will be aut
omatically disabled 5 minutes after you run this command. Continue? [Y/N]y
Info: This operation may take a few seconds. Please wait for a moment.done.
p: permit
i: interference
Ch: Channel
CU: Channel Utility
NF: Noise Floor
CommIf: Common-Channel Interference
AdjaceIf: Adjacent-Channel Interference
SINR: Signal to Interference and Noise Ratio
#AP: Number of APs detected
Radio: 0
ScanChannel: 1
WorkChannel: 1
ScanCycle: 1
---------------------------------------------------------------------------
Ch NF CU(%) CommIf(%) AdjaceIf(%) SINR #APs
---------------------------------------------------------------------------
1 -105 75 19 - 245 57
---------------------------------------------------------------------------
Total: 1
---------------------------------------------------------------------------
Ch MAC Type RSSI SSID
---------------------------------------------------------------------------
1 c88d-833a-8d41 i -65 xw9-2g-tunnel
1 00e0-fc3a-8d41 i -65 xw9-2g-tunnel
Total: 1
Item Description
NF Noise floor.
Item Description
NOTE
If an AP detects that a channel has a high co-channel interference (higher than 50%), another
Wi-Fi device is using this channel and affects the local AP. In this case, it is recommended that
the AP channel be switched using radio calibration or other methods.
Format
display wlan wids manual-contain device-mac-list
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After the manual containment function is enabled, you can run this command to
check the list of MAC addresses of devices to be manually contained.
Example
# Display the list of MAC addresses of devices to be manually contained.
<HUAWEI> display wlan wids manual-contain device-mac-list
--------------------------------------------------------------------------------
Index MAC
--------------------------------------------------------------------------------
0 1211-2222-3331
1 1211-2222-3332
2 1211-2222-3333
3 1211-2222-3334
4 1211-2222-3335
5 1211-2222-3336
6 1211-2222-3337
7 1211-2222-3338
8 1211-2222-3339
--------------------------------------------------------------------------------
Total: 9
Item Description
Format
display wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv |
wep-share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After attack detection is enabled, you can run this command to view information
about the attacking devices.
Prerequisites
The attack detection functions of all types have been enabled using the wids
attack detect enable command.
Example
# Display information of all current attacking devices.
Table 14-3 Description of the display wlan ids attack-detected all command
output
Item Description
Format
display wlan ids attack-detected statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
After attack detection is enabled, you can run the display wlan ids attack-
detected statistics command to view the total number of all types of attacks.
Prerequisites
The attack detection functions of all types have been enabled using the wids
attack detect enable command.
Example
# Display the number of attacks detected.
<HUAWEI> display wlan ids attack-detected statistics
Attack tracking since: 2015-01-27/12:02:11
--------------------------------------------------------------------------------
Type Total
--------------------------------------------------------------------------------
Probe request frame flood attack :0
Authentication request frame flood attack :0
Deauthentication frame flood attack :0
Association request frame flood attack :0
Disassociation request frame flood attack :0
Reassociation request frame flood attack :0
Action frame flood attack :0
EAPOL start frame flood attack :0
EAPOL logoff frame flood attack :0
Weak IVs detected :0
Spoofed deauthentication frame attack :0
Spoofed disassociation frame attack :0
Other types of spoofing frame attack :0
Format
display wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-
share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
Prerequisites
The attack detection functions of all types have been enabled using the wids
attack detect enable command.
Example
# Display historical records of all attacking devices.
<HUAWEI> display wlan ids attack-history all
act: Action frame asr: Association request
aur: Authentication request daf: Deauthentication frame
dar: Disassociation request wiv: Weak IV detected
pbr: Probe request rar: Reassociation request
eaps: EAPOL start frame eapl: EAPOL logoff frame
saf: Spoofed disassociation frame
sdf: Spoofed deauthentication frame
otsf: Other types of spoofing frames
AP: Name of the monitor AP that has detected the device
AT: Attack type CH: Channel number
-------------------------------------------------------------------------------
MAC address AT CH RSSI(dBm) Last detected time AP
-------------------------------------------------------------------------------
00e0-fc12-37ec pbr 165 -86 2014-11-20/15:51:43 ap-13
00e0-fc12-171d pbr 165 -88 2014-11-20/15:41:43 ap-13
00e0-fc12-0bf4 pbr 165 -81 2014-11-20/15:41:53 ap-13
-------------------------------------------------------------------------------
Total: 3, printed: 3
Table 14-6 Description of the display wlan ids attack-history all command
output
Item Description
Item Description
Format
display wlan ids contain { all | ap | adhoc | client | ssid | mac-address mac-
address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
After WIDS or WIPS is enabled, you can run the display wlan ids
countermeasures device command to view information about countered devices.
Example
# Display the list of all countered devices.
<HUAWEI> display wlan ids contain all
#Rf: Number of monitor radios that have contained the device
CH: Channel number
Reason: open-encrypt, spoof-ssid-ap, protect-client,
client, adhoc, manual
-------------------------------------------------------------------------------
MAC address CH Authentication Last detected time #Rf Reason SSID
-------------------------------------------------------------------------------
00e0-fc12-3456 11 open 2014-11-20/16:16:57 1 manual -
-------------------------------------------------------------------------------
Total: 1, printed: 1
Table 14-7 Description of the display wlan ids contain all command output
Item Description
CMCC 2 2012-07-27/16:41:55
----------------------------------------------------------------------
Total: 1, printed: 1
Table 14-8 Description of the display wlan ids contain ssid command output
Item Description
Table 14-9 Description of the display wlan ids contain mac-address command
output
Item Description
Item Description
Number of monitor radios that have Number of radios that contain the
contained the device device.
If WIDS is enabled on multiple APs,
the type of the device may be
contained by these APs' radios.
Format
display wlan ids device-detected { all | [ interference | rogue ] ap | [ rogue ]
bridge | [ rogue ] client [ bssid bssid ] | adhoc | [ rogue ] ssid | mac-address
mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
To ensure the WLAN reliability, all the wireless devices on the current WLAN must
be monitored. You can run the display wlan ids detected command to view
information about the wireless devices detected.
Prerequisites
The device detection function has been enabled on the AP using the wids device
detect enable command.
Example
# Display all devices detected on a WLAN.
<HUAWEI> display wlan ids device-detected all
Flags: r: rogue, p: permit, i: interference, a: adhoc, w: AP, b: wireless-bridge, c: client
#Rf: Number of monitor radios that have detected the device
CH: Channel number
RSSI(dBm): Maximum RSSI of detected device
StaNum: Number of detected STAs associated with the device
-------------------------------------------------------------------------------------------------
MAC address Type CH RSSI(dBm) StaNum Authentication Last detected time #Rf SSID
-------------------------------------------------------------------------------------------------
00e0-fc20-de2b i/w 1 -60 5 open 2014-11-20/11:03:44 1 -
-------------------------------------------------------------------------------------------------
Total: 1, printed: 1
Table 14-10 Description of the display wlan ids device-detected all command
output
Item Description
Item Description
Table 14-11 Description of the display wlan ids device-detected ssid command
output
Item Description
Table 14-12 Description of the display wlan ids device-detected rogue ssid
command output
Item Description
Number of monitor radios that have Number of radios that detect the
detected the device device.
If WIDS is enabled on multiple APs,
the type of the device may be detected
by these APs' radios.
Item Description
Format
display wlan ids device-detected statistics
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan ids device-detected statistics command to view
statistics on all wireless devices detected on a WLAN.
Example
# Display statistics on wireless devices detected on a WLAN.
<HUAWEI> display wlan ids device-detected statistics
------------------------------------------------------------------------------------------------
Rogue Adhoc :0
Contain Adhoc :0
Rogue AP :0
Permit AP :0
Interference AP :0
Contain AP :0
Rogue client :2
Permit client :0
Interference Client : 0
Contain client :2
Permit Bridge :2
Rogue Bridge :0
Interference Bridge : 0
------------------------------------------------------------------------------------------------
Item Description
Item Description
Format
display wlan dynamic-blacklist { all | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
An AP uses attack detection and dynamic blacklist functions to add a detected
attack device to the dynamic blacklist, and rejects packets sent from this device
until the device entry in the dynamic blacklist ages. You can run this command to
view information about devices in the dynamic blacklist.
Example
# Display information about all devices in the dynamic blacklist.
<HUAWEI> display wlan dynamic-blacklist all
#AP: Number of monitor APs that have detected the device
LAT: Left aging time(s)
act: Action frame asr: Association request
aur: Authentication request daf: Deauthentication frame
dar: Disassociation request eapl: EAPOL logoff frame
pbr: Probe request rar: Reassociation request
eaps: EAPOL start frame sti: Static IP
brf: Broadcast flood
-------------------------------------------------------------------------------
MAC address Last detected time Reason #AP LAT
-------------------------------------------------------------------------------
00e0-fc12-3451 2015-07-27/12:51:25 brf 1 100
00e0-fc12-3452 2015-07-27/12:51:25 pbr 1 200
00e0-fc12-3453 2015-07-27/12:51:25 pbr 1 200
00e0-fc12-3454 2015-07-27/12:51:25 sti 1 200
00e0-fc12-3455 2015-07-27/12:51:25 pbr 1 200
00e0-fc12-3456 2015-07-27/12:51:25 pbr 1 200
-------------------------------------------------------------------------------
Total: 6, printed: 6
-------------------------------------------------------------
wcw 2015-07-27/12:51:25 pbr 100 900
wcw2 2015-07-27/12:51:25 pbr 100 1900
-------------------------------------------------------------
Total: 2, printed: 2
Item Description
Format
display wlan ids rogue-history { all | ap | bridge | client | adhoc | ssid | mac-
address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run the display wlan ids rogue-history command to view the historical
records of rogue devices.
Prerequisites
The device detection function has been enabled on the AP using the wids device
detect enable command.
Example
# Display historical records of all rogue devices.
<HUAWEI> display wlan ids rogue-history all
Flags: a: adhoc, w: AP, b: wireless-bridge, c: client
CH: Channel number
-------------------------------------------------------------------------------
MAC address Type CH Authentication Last detected time SSID
-------------------------------------------------------------------------------
00e0-fc12-3456 w 11 open 2014-11-20/11:20:37 wlan
00e0-fc12-3457 c 11 - 2014-11-20/11:16:07 -
-------------------------------------------------------------------------------
Total: 2, printed: 2
Table 14-17 Description of the display wlan ids rogue-history all command
output
Item Description
Item Description
Table 14-18 Description of the display wlan ids rogue-history ssid command
output
Item Description
Item Description
Format
display wlan ids spoof-ssid fuzzy-match regex regex-value
Parameters
Parameter Description Value
regex regex- Specifies the matching rules for spoofing The rules must exist.
value SSIDs and displays spoofing SSIDs that The value is in text
match the rules. format and can
contain 1 to 48
case-sensitive
characters. It
supports Chinese
characters or
mixture of Chinese
and English
characters.
NOTE
You can only use a
command editor of
the UTF-8 encoding
format to edit
Chinese characters.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
To view SSIDs that match a specific rule, run the display wlan ids spoof-ssid
fuzzy-match regex regex-value command.
Example
# Display SSIDs that match a specific rule.
<HUAWEI> display wlan ids spoof-ssid fuzzy-match regex ^HUAWE[1l]$
#Dev: Number of devices using SSID
--------------------------------------------------------------------------------
Match SSID #Dev Last detected time WIDS spoof profile
--------------------------------------------------------------------------------
HUAWE1 2 2014-03-06/12:44:37 huawei
HUAWEl 1 2014-03-06/12:44:50 huawei
--------------------------------------------------------------------------------
Total: 2
Table 14-20 Description of the display wlan ids spoof-ssid fuzzy-match regex
command output
Item Description
Format
dynamic-blacklist aging-time time
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
When detecting attacks from a STA, an AP forbids the STA to go online, and
rejects any packets sent from the STA. As long as the STA is blacklisted, it cannot
go online again even if it no longer launches attacks. To avoid that, you can run
the dynamic-blacklist aging-time command to configure an aging time for the
dynamic blacklist. If the configured aging time expires and the AP detects no
attack from the STA, the STA is once again allowed to go online.
Example
# Set the aging time of the dynamic blacklist to 200 seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] dynamic-blacklist aging-time 200
Format
dynamic-blacklist enable
undo dynamic-blacklist enable
Parameters
None
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Attack detection is enabled to detect flood attacks, weak IV attacks, spoofing
attacks, and brute force key cracking attacks. When detecting attacks initiated by
a device, an AP reports an alarm. In addition, you can run the dynamic-blacklist
enable command to enable the dynamic blacklist function on the AP for handling
flood attacks and brute force key cracking attacks. The AP then automatically adds
the attacking device to a dynamic blacklist and discards packets sent from the
attacking device till the dynamic blacklist ages out.
An AP can use the dynamic blacklist to filter out the blacklisted wireless devices to
avoid malicious attacks.
Follow-up Procedure
Run the dynamic-blacklist aging-time command to set an aging time for the
dynamic blacklist.
Example
# Enable the dynamic blacklist function.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] dynamic-blacklist enable
Format
flood-detect interval interval
undo flood-detect interval
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A flood attack occurs when an AP receives a large number of packets of the same
type within a short period. As a result, the AP is flooded by too many attack
packets to process service packets from authorized wireless terminals.
After the flood attack detection function is enabled, an AP counts the number of
packets of the same type that it receives from a user at regular intervals. When
the number exceeds a specified threshold, the AP considers that the user launches
a flood attack. If the dynamic blacklist function is enabled, the user will be added
to a dynamic blacklist.
Follow-up Procedure
Run the dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the flood attack detection interval to 120s.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable flood
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] flood-detect interval 120
Format
flood-detect quiet-time quiet-time-value
undo flood-detect quiet-time
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After attack detection is enabled on an AP, the AP reports alarms upon attack
detection. If an attack source launches attacks repeatedly, a large number of
repeated alarms are generated. To prevent this situation, configure the quiet time
for an AP to report alarms. When detecting attack sources of the same MAC
address, the AP does not report alarms in the quiet time. However, if the AP still
detects attacks from the attack source after the quiet time expires, the AP reports
alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small
value. If attacks are frequently detected, set the quiet time to a large value to
prevent frequent alarm reports.
Follow-up Procedure
Run the dynamic-blacklist enable command to enable the dynamic blacklist
function.
Example
# Set the quiet time to 300 seconds for an AP to record the detected flood attacks.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable flood
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] flood-detect quiet-time 300
Format
flood-detect threshold threshold
undo flood-detect threshold
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A flood attack occurs when a device receives a large number of packets of the
same type within a short period. As a result, the device is flooded by too many
attack packets to process service packets from authorized wireless terminals.
After the flood attack detection function is enabled, a device counts the number
of packets of the same type that it receives from a user at regular intervals. When
the number exceeds a specified threshold, the device considers that the user
launches a flood attack. If the dynamic blacklist function is enabled, the user will
be added to a dynamic blacklist. If the threshold is set to a small value, the device
may incorrectly add authorized users to the dynamic blacklist, causing the users
unable to go online.
Follow-up Procedure
Example
# Set the flood attack detection threshold to 350.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable flood
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] flood-detect threshold 350
The undo ip source check user-bind enable command disables IPSG on APs.
Format
ip source check user-bind enable
Parameters
None
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Users can configure static IP addresses for their clients and connect to the Internet
after passing 802.1X authentication. To defend against source IP address spoofing
attacks, you need to enable IPSG on APs.
Example
# Enable IPSG on APs.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] ip source check user-bind enable
Format
learn-client-address dhcp-strict [ blacklist enable ]
undo learn-client-address dhcp-strict
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA associates with an AP, the following situation occurs after strict STA IP
address learning through DHCP is enabled:
● If the STA obtains an IP address through DHCP, the AP will save the IP
address. The STA IP address can be used to maintain the mapping between
STA IP addresses and MAC addresses.
Example
# Enable strict STA IP address learning through DHCP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] learn-client-address dhcp-strict
Format
learn-client-address ipv4 disable
undo learn-client-address ipv4 disable
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Prerequisites
● Before STA address learning is disabled, strict STA IPv4 address learning has
been disabled using the undo learn-client-address dhcp-strict command.
Precautions
Example
# Disable STA IPv4 address learning.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap1
[HUAWEI-wlan-vap-prof-vap1] learn-client-address ipv4 disable
14.31 permit-ap
Function
The permit-ap command configures a WIDS whitelist.
Format
permit-ap { mac-address mac-address | oui oui | ssid ssid }
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After WIDS/WIPS is enabled, rogue APs can be detected and countered. However,
there may be APs of other vendors or other networks working in the existing
signal coverage areas. If these APs are countered, their services will be affected. To
prevent this situation, configure an authorized AP list, including an authorized
MAC address list, OUI list, and SSID list. If an unauthorized AP is detected but
matches the authorized AP list, the AP is considered an authorized AP and will not
be countered.
For example, APs of other vendors are deployed on the existing WLAN to expand
network capacity. To prevent the APs from being countered, add OUIs of the
vendors to a whitelist and add SSIDs of these APs to a whitelist. In this way, the
device will consider the APs as authorized APs.
Precautions
If you add or delete an entry, the device will re-check the validity of the
unauthorized APs. If an unauthorized AP becomes authorized, the device stops
countering the AP. If an authorized AP becomes unauthorized, the device starts
countering the AP.
Example
# Add an MAC address, an OUI, and an SSID to the WIDS whitelist.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] permit-ap mac-address 0011-2233-4455
[HUAWEI-wlan-wids] permit-ap oui 00-11-22
[HUAWEI-wlan-wids] permit-ap ssid huawei
Format
reset wlan ids attack-detected { all | flood | spoof | wapi-psk | weak-iv | wep-
share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, information about attacking devices detected is
recorded. When there is excessive information recorded or the recorded
information is useless, you can run the reset wlan ids attack-detected command
to delete the information.
Example
# Delete information about all the current attacking devices.
<HUAWEI> reset wlan ids attack-detected all
Format
reset wlan ids attack-detected statistics
Parameters
None
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, the number of attacks detected is recorded.
When there is excessive information recorded or the recorded information is
useless, you can run the reset wlan ids attack-detected statistics command to
delete the information.
Example
# Delete the number of attacks detected.
<HUAWEI> reset wlan ids attack-detected statistics
Format
reset wlan ids attack-history { all | flood | spoof | wapi-psk | weak-iv | wep-
share-key | wpa-psk | wpa2-psk | mac-address mac-address }
Parameters
Parameter Description Value
Views
All views
Default Level
3: Management level
Usage Guidelines
After attack detection is enabled, historical records about attacking devices
detected are recorded. When there is excessive information recorded or the
recorded information is useless, you can run the reset wlan ids attack-history
command to delete the information.
Example
# Delete historical records about all the current attacking devices.
<HUAWEI> reset wlan ids attack-history all
Format
reset wlan dynamic-blacklist { mac-address mac-address | all }
Parameters
Parameter Description Value
mac-address Deletes the device with a specified MAC The MAC address
mac-address address from the dynamic blacklist. must exist.
Views
All views
Default Level
3: Management level
Usage Guidelines
Usage Scenario
The reset wlan dynamic-blacklist command is applicable to the following
scenarios:
● To re-collect the dynamic blacklist information, run the reset wlan dynamic-
blacklist all command to delete all information in the dynamic blacklist.
After that, the AP re-collects the information.
● To remove an authorized device from the dynamic blacklist, run the reset
wlan dynamic-blacklist mac-address command to remove the MAC address
of the device from the dynamic blacklist. After that, information sent from the
device is not rejected.
Precautions
Running the reset wlan dynamic-blacklist command affects packet receiving of
APs. Exercise caution when running this command.
Example
# Delete the device with the MAC address 00e0-FC12-3456 from the dynamic
blacklist.
<HUAWEI> reset wlan dynamic-blacklist mac-address 00e0-fc12-3456
Format
reset wlan ids rogue-history { all | ap | bridge | client | adhoc | ssid [ ssid ] |
mac-address mac-address }
Parameters
Parameter Description Value
ssid [ ssid ] Deletes historical records of devices with The SSID must exist.
specified SSIDs. To specify an SSID
starting with a
space, include the
SSID with double
quotation marks ("
"). For example, in
the SSID " hello",
the double
quotation marks at
the start and end of
the SSID occupy two
characters. To
specify an SSID
starting with a
double quotation
mark ("), enter an
escape character (\)
before the double
quotation mark. For
example, in the
SSID \"hello, the
escape character (\)
occupies one
character.
Views
All views
Default Level
3: Management level
Usage Guidelines
When there are excessive historical records of rogue devices or their historical
records are useless, you can run the reset wlan ids rogue-history command to
delete the historical records.
Example
# Delete all detected historical records of the rogue devices.
<HUAWEI> reset wlan ids rogue-history all
Format
rogue-device log enable
undo rogue-device log enable
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If a rogue device is detected after this function is enabled, information about the
device is recorded in the log.
Example
# Enable the function of recording rogue device information in the log.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] rogue-device log enable
The undo spoof-detect quiet-time command restores the default quiet time for
an AP to record the detected spoofing attacks.
By default, the quiet time is 600 seconds for an AP to record the detected spoofing
attacks.
Format
spoof-detect quiet-time quiet-time-value
undo spoof-detect quiet-time
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
After attack detection is enabled on an AP, the AP reports alarms upon attack
detection. If an attack source launches attacks repeatedly, a large number of
repeated alarms are generated. To prevent this situation, configure the quiet time
for an AP to report alarms. When detecting attack sources of the same MAC
address, the AP does not report alarms in the quiet time. However, if the AP still
detects attacks from the attack source after the quiet time expires, the AP reports
alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small
value. If attacks are frequently detected, set the quiet time to a large value to
prevent frequent alarm reports.
Example
# Set the quiet time to 300 seconds for an AP to record the detected spoofing
attacks.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable spoof
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] spoof-detect quiet-time 300
14.39 spoof-ssid
Function
The spoof-ssid command configures a fuzzy matching rule for spoofing SSIDs.
The undo spoof-ssid command deletes a fuzzy matching rule for spoofing SSIDs.
By default, no fuzzy matching rule is configured for spoofing SSIDs.
Format
spoof-ssid fuzzy-match regex regex-value
undo spoof-ssid { fuzzy-match regex regex-value | all }
Parameters
Parameter Description Value
regex regex- Specifies the regular expression for an The value is in text
value SSID. If an SSID matches the regular format and can
expression, the SSID is considered a contain 1 to 48
spoofing SSID. case-sensitive
characters. It
supports Chinese
characters or
mixture of Chinese
and English
characters.
When the regular
expression is used,
you can press Ctrl+T
to enter a question
mark (?). For how
to set the regular
expression, see
"Filtering the
Command Outputs"
in Configuration
Guide.
NOTE
You can only use a
command editor of
the UTF-8 encoding
format to edit
Chinese characters.
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
WLAN services are available in public places, such as banks and airports. Users can
connect to the WLANs after associating with corresponding SSIDs. If a rogue AP is
deployed and provides spoofing SSIDs similar to authorized SSIDs, the users may
be misled and connect to the rogue AP, which brings security risks. To address this
problem, configure a fuzzy matching rule to identify spoofing SSIDs. The device
compares a detected SSID with the matching rule. If the SSID matches the rule,
the SSID is considered a spoofing SSID. The AP using the spoofing SSID is a rogue
AP. After rogue AP containment is configured, the device contains the rogue AP
and disconnects users from the spoofing SSID.
Precautions
To make fuzzy matching rules for spoofing SSIDs take effect, enable device
detection and rogue device containment so that the device can take
countermeasures against rogue APs.
To contain all SSIDs except those on the local device, set the fuzzy matching rule
to * and then run the contain-mode command to set the containment mode to
spoof-ssid-ap.
Example
# Configure a fuzzy matching rule using the regular expression ^TES[1l]$ to
identify spoofing SSIDs TEST1 or TESL similar to TEST.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] spoof-ssid fuzzy-match regex ^TES[1l]$
By default, an AP does not send ARP/ND proxy packets for a STA before the STA is
successfully associated.
Format
sta arp-nd-proxy before-assoc
undo sta arp-nd-proxy before-assoc
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If an AP is enabled to send ARP/ND proxy packets for a STA before the STA
succeeds in authentication or key negotiation, the Layer 2 switch connected to the
AP will learn the MAC address of the STA. If an attack floods thousands of STA
MAC addresses, the MAC address table on the switch will be seriously corrupted,
bringing security risks. To avoid this issue, you can run the undo sta arp-nd-proxy
before-assoc command to configure the AP to send ARP/ND proxy packets for a
STA after the STA succeeds in authentication or key negotiation.
In scenarios with low security requirements, you can run the sta arp-nd-proxy
before-assoc command to configure the AP to send ARP/ND proxy packets for a
STA before the STA is successfully associated to improve link update efficiency.
Precautions
After the undo sta arp-nd-proxy before-assoc command is run on an AP, the AP
does not send ARP/ND proxy packets for a STA that goes online in open or WEP
mode.
Example
# Configure an AP to send ARP/ND proxy packets for a STA before the STA is
successfully associated.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] sta arp-nd-proxy before-assoc
The undo weak-iv-detect quiet-time command restores the default quiet time
for an AP to record the detected weak IV attacks.
By default, the quiet time is 600 seconds for an AP to record the detected weak IV
attacks.
Format
weak-iv-detect quiet-time quiet-time-value
undo weak-iv-detect quiet-time
Parameters
Parameter Description Value
Views
WIDS view
Default Level
2: Configuration level
Usage Guidelines
After attack detection is enabled on an AP, the AP reports alarms upon attack
detection. If an attack source launches attacks repeatedly, a large number of
repeated alarms are generated. To prevent this situation, configure the quiet time
for an AP to report alarms. When detecting attack sources of the same MAC
address, the AP does not report alarms in the quiet time. However, if the AP still
detects attacks from the attack source after the quiet time expires, the AP reports
alarms. You can set the quiet time based on attack types.
To obtain attack information in a timely manner, set the quiet time to a small
value. If attacks are frequently detected, set the quiet time to a large value to
prevent frequent alarm reports.
Example
# Set the quiet time to 300 seconds for an AP to record the detected weak IV
attacks.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/1
[HUAWEI-wlan-Radio0/0/1] wids attack detect enable weak-iv
[HUAWEI-wlan-Radio0/0/1] quit
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids] weak-iv-detect quiet-time 300
14.42 wids
Function
The wids command displays the WIDS view.
Format
wids
Parameters
None
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
To perform WIDS configurations, run the wids command to enter the WIDS view.
All WIDS configuration commands need to be run in the WIDS view.
Example
# Display the WIDS view.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids
[HUAWEI-wlan-wids]
Format
wids attack detect enable { all | flood | weak-iv | spoof | wpa-psk | wpa2-psk |
wapi-psk | wep-share-key }
undo wids attack detect enable { all | flood | weak-iv | spoof | wpa-psk | wpa2-
psk | wapi-psk | wep-share-key }
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
increase the time required for password cracking and improve password
security.
Follow-up Procedure
Example
# Enable brute force attack detection for WPA-PSK authentication on radio 0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-wlan-Radio0/0/0] wids attack detect enable wpa-psk
The undo wids contain enable command disables rogue or interference device
containment on an AP radio.
Format
wids contain enable
Parameters
None
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the containment mode is set against rogue or interference APs, the monitor
AP uses the identity of the rogue or interference AP to broadcast deauthentication
frames to forcibly disconnect STAs. To prevent the STAs from connecting to the
After the containment mode is set against rogue or interference STAs or ad-hoc
devices, the monitor AP uses the MAC address of a rogue or interference device to
continuously send unicast deauthentication frames.
Follow-up Procedure
Example
# Enable rogue or interference device containment on radio 0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-wlan-Radio0/0/0] wids contain enable
The undo wids device detect enable command disables device detection on an
AP radio.
Format
wids device detect enable
Parameters
None
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After the wireless device detection function is enabled, the monitoring AP detects
information about wireless devices in its coverage range. The AP determines
whether unauthorized devices exist on the WLAN.
Example
# Enable device detection on radio 0.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-wlan-Radio0/0/0] wids device detect enable
Format
wids manual-contain device-mac device-mac
undo wids manual-contain { all | device-mac device-mac }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can run the wids manual-contain command in the WLAN view to manually
contain a specified device in a complicated environment.
Precautions
Wireless bridges are not contained.
Example
# Contain the AP with the MAC address of 0004-0004-0004.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] wids manual-contain device-mac 0004-0004-0004
14.47 work-mode
Function
The work-mode command sets the radio working mode in the radio profile view.
The undo work-mode command restores the default radio working mode.
By default, AP radios work in normal mode.
Format
work-mode { monitor | normal }
undo work-mode
Parameters
Parameter Description Value
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
An AP can work in two modes:
● normal: indicates the normal mode.
– If air scan functions (such as WIDS and terminal location) are disabled on
a radio, the radio is used to transmit common WLAN services.
Example
# Set the working mode of radio 0 to monitor.
<HUAWEI> system-view
[HUAWEI] interface wlan-radio 0/0/0
[HUAWEI-wlan-Radio0/0/0] work-mode monitor
Warning: Modify the work mode may cause business interruption, continue?[y/n]
:y
Format
display mesh-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh-profile command to view the number of times a
Mesh profile is referenced or configuration information of a specified Mesh profile.
Example
# Display reference information about all Mesh profiles.
<HUAWEI> display mesh-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Item Description
Item Description
Item Description
Item Description
Format
display mesh-whitelist-profile { all | name whitelist-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh-whitelist-profile command to view the number of
times a Mesh whitelist profile is referenced or MAC addresses added in a specified
Mesh whitelist profile.
Example
# Display reference information about all Mesh whitelist profiles.
<HUAWEI> display mesh-whitelist-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Format
display mesh vap { all | mesh-id mesh-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh vap command to view information about a
specified Mesh VAP or all Mesh VAPs.
Example
# Display information about all Mesh VAPs.
<HUAWEI> display mesh vap all
WID : WLAN ID
------------------------------------------------------------------------------------------------
AP ID AP name RfID WID Mesh ID BSSID Auth type Mesh links
------------------------------------------------------------------------------------------------
0 dcd2-fc21-5d40 0 16 WLAN-MESH DCD2-FC21-5D4F WPA2-PSK 3
------------------------------------------------------------------------------------------------
Total: 1
Item Description
AP ID AP ID.
Item Description
AP name AP name.
Format
display references mesh-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a Mesh profile. The Mesh profile
name must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references mesh-profile command to check reference
information about a Mesh profile.
Example
# Display reference information about the Mesh profile test.
<HUAWEI> display references mesh-profile name test
--------------------------------------------------------------------------------
Reference type Reference name WLAN ID
--------------------------------------------------------------------------------
Interface Wlan-Radio0/0/0 16
--------------------------------------------------------------------------------
Total: 1
<HUAWEI> display references mesh-profile name test
--------------------------------------------------------------------------------
Reference type Reference name Reference radio WLAN ID
--------------------------------------------------------------------------------
AP group test Radio-0 1
--------------------------------------------------------------------------------
Total: 1
Item Description
Format
display references mesh-whitelist-profile name whitelist-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references mesh-whitelist-profile command to check
reference information about a specified Mesh whitelist profile.
Example
# Display reference information about the Mesh whitelist profile test.
<HUAWEI> display references mesh-whitelist-profile name test
--------------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------------
AP group default
--------------------------------------------------------------------------------
Total: 1
Item Description
Format
display wlan mesh link { all | mesh-profile profile-name | peer-mac peer-mac }
Parameters
Parameter Description Value
peer-mac Displays information about the Mesh link The MAC address
peer-mac on a specified peer MAC address. must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan mesh link command to view information about a
Mesh link.
Example
# Display information about all Mesh links.
<HUAWEI> display wlan mesh link all
Rf : radio ID Dis : coverage distance(100m)
Ch : channel Per : drop percent(%)
TSNR : total SNR(dB) P- : peer
Mesh : Mesh mode Re : retry ratio(%)
RSSI : RSSI(dBm) MaxR : max RSSI(dBm)
------------------------------------------------------------------------------------------------------------------------------
----
APMAC P-APName P-APMAC Rf Dis Ch Mesh P-Status RSSI MaxR Per Re
TSNR SNR(Ch0~3:dB)
Index Tx(Mbps) Rx(Mbps) Mesh ID
------------------------------------------------------------------------------------------------------------------------------
----
00e0-fc75-04e0 AP_0 00e0-fc5a-adc0 1 3 157 node - -15 -15 0 15 76
68/75/66/-
0 54 54 mesh-id
------------------------------------------------------------------------------------------------------------------------------
----
Total: 1
# Display information about the Mesh link on a specified peer MAC address.
<HUAWEI> display wlan mesh link peer-mac 00e0-fc90-6180
Rf : radio ID Dis : coverage distance(100m)
Ch : channel Per : drop percent(%)
TSNR : total SNR(dB) P- : peer
Mesh : Mesh mode Re : retry ratio(%)
RSSI : RSSI(dBm) MaxR : max RSSI(dBm)
------------------------------------------------------------------------------------------------------------------------------
----
Table 15-8 Description of the display wlan mesh link command output
Item Description
Format
link-aging-time aging-time
undo link-aging-time
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
If a Mesh node cannot receive keepalive packets from a neighboring node for a
period of time greater than or equal to the aging time of a Mesh link, the Mesh
node considers the Mesh link disconnected and will reselect a link.
In a fast changing radio environment, if the aging time of a Mesh link is set to a
small value, Mesh links may be frequently disconnected or reselected, causing
network flapping. If the aging time of a Mesh link is set to a large value, a Mesh
node cannot reselect Mesh links in a timely manner, causing service interruption.
Therefore, you need to configure a proper aging time for Mesh links based on
actual situations.
Example
# Set the aging time of a Mesh link to 10s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-aging-time 10
Format
link-report-interval report-interval
undo link-report-interval
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Example
# Set the interval at which an AP reports Mesh link information to the system to
20s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-report-interval 20
Format
link-rssi-threshold threshold-value
undo link-rssi-threshold
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The RSSI threshold of a mesh link indicates the minimum RSSI of the mesh link. If
the RSSI of an MP that joins a WMN is lower than the RSSI threshold configured
using the link-rssi-threshold command, the routing information table of the mesh
link is updated and routing information about the MP is deleted.
Example
# Set the RSSI threshold of mesh links to -60 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-rssi-threshold -60
Format
max-link-number link-num
undo max-link-number
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an AP sets up too many Mesh links with neighboring APs, network
indicators, such as the throughput cannot meet customer needs, affecting user
experience. To improve user experience, you can run the max-link-number
command to set the maximum number of mesh links that can be established
between APs according to actual situations.
Impact
If the number of mesh links of an AP has reached the maximum, the AP does not
set up new mesh links with neighboring APs.
Example
# Set the maximum number of mesh links that can be established between APs to
3.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] max-link-number 3
Format
mesh-id name
undo mesh-id
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
The Mesh ID of a Mesh profile is similar to the SSID. On a Mesh network, AP
radios discover available Mesh services of other APs based on the Mesh ID.
Each Mesh profile must have a Mesh ID. The default Mesh ID of a Mesh profile is
HUAWEI-WLAN-MESH. You can run the mesh-id command to set a Mesh ID for
a Mesh profile.
Example
# Create the Mesh profile test and set the Mesh ID of the profile to mesh-net.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-id mesh-net
Function
The mesh-profile command creates a Mesh profile or displays the Mesh profile
view.
The undo mesh-profile command deletes a Mesh profile.
By default, the system provides the Mesh profile default.
Format
mesh-profile name profile-name
undo mesh-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Specifies the name of a Mesh profile. The value is a string
name of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh profile is applied to an AP radio, Mesh VAPs are created on the radio.
Each Mesh profile must have a Mesh ID. The default Mesh ID of a Mesh profile is
HUAWEI-WLAN-MESH. You can run the mesh-id command to set a Mesh ID for
a Mesh profile.
Example
# Create the Mesh profile test and set the Mesh ID of the profile to mesh-net.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-id mesh-net
Function
The mesh-profile command binds a Mesh profile to an AP radio.
The undo mesh-profile command unbinds a Mesh profile from an AP radio.
By default, no Mesh profile is bound to an AP radio.
Format
mesh-profile profile-name [ index index ]
undo mesh-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the Mesh profile The Mesh profile
bound to an AP radio. must exist.
index index Specifies the index of the Mesh profile. The value can be 0
or 1. The default
value is 0.
Views
WLAN radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh profile is bound to an AP radio, the radio can create a Mesh VAP to
provide Mesh services.
Prerequisites
A Mesh profile has been created and properly configured.
Precautions
Among the VAPs created after a Mesh profile is bound to a radio, the VAP with
the WLAN ID 16 cannot be occupied.
An AP radio can only have one Mesh profile bound.
Example
# Bind the Mesh profile test to radio 0 of an AP.
<HUAWEI> system-view
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] mesh-profile test
Format
mesh-whitelist-profile name whitelist-name
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After a Mesh whitelist profile is created, run the peer-ap mac (Mesh whitelist
profile view) command in the Mesh whitelist profile view to add MAC addresses
of the allowed peer APs to the profile.
Example
# Create the Mesh whitelist profile whitelist and add the MAC address
0001-0001-0001 to the whitelist profile. Bind the Mesh whitelist profile whitelist
to radio 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] quit
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] mesh-whitelist-profile whitelist
Format
mesh-whitelist-profile whitelist-name [ index index ]
undo mesh-whitelist-profile
Parameters
Parameter Description Value
whitelist- Specifies the name of the Mesh whitelist The Mesh whitelist
name profile bound to an AP radio. profile must exist.
index index Specifies the index of the Mesh whitelist The value can be 0
profile. or 1. The default
value is 0.
Views
Radio interface view
Default Level
2: Configuration level
Usage Guidelines
After a Mesh whitelist profile is applied to an AP radio, the AP radio can only set
up Mesh links with neighboring APs whose MAC addresses are in the Mesh
whitelist profile.
You can configure different values of index index for radios on an AP to reference
different Mesh whitelist profile. If you specify index index for multiple times in the
same radio view, the latest configuration overwrites the old one.
Example
# Create the Mesh whitelist profile whitelist and add the MAC address
0001-0001-0001 to the whitelist profile. Bind the Mesh whitelist profile whitelist
to radio 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] quit
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] mesh-whitelist-profile whitelist
The undo peer-ap mac command deletes the MAC addresses of neighboring APs
from a Mesh whitelist profile.
Format
peer-ap mac mac-address
Parameters
Parameter Description Value
Views
Mesh whitelist profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh whitelist profile is created, you can run the peer-ap mac command
to add neighboring APs' MAC addresses to the profile.
If a Mesh whitelist profile is bound to a Mesh profile, only APs with MAC
addresses in the Mesh whitelist profile can access the local AP, and other APs are
denied access.
In vehicle-ground fast handover application scenarios, you need to configure Mesh
whitelists for trackside APs and vehicle-mounted APs, which can prevent a vehicle-
mounted AP from connecting to trackside APs along a different track or a
trackside AP from connecting to the vehicle-mounted AP along a different track.
Precautions
A maximum of 512 MAC addresses can be added to a Mesh whitelist.
Example
# Create the Mesh whitelist profile whitelist and add the MAC address
0001-0001-0001 to the whitelist profile. Bind the Mesh whitelist profile whitelist
to radio 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] quit
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] mesh-whitelist-profile whitelist
Format
security-profile profile-name
undo security-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the security profile The security profile
bound to a Mesh profile. must exist.
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before a Mesh profile is applied to an AP radio to establish Mesh links, the Mesh
profile must have a security profile bound to ensure Mesh link security.
Precautions
After a security profile is bound to a Mesh profile, the authentication policy and
encryption mode in the security profile cannot be changed, but the authentication
key can be changed.
A Mesh profile can only have one security profile bound. If you run the command
multiple times in the same Mesh profile view, the latest configuration overwrites
the old one.
Example
# Create the security profile sec and set the security policy to WPA2+PSK+AES.
Create the Mesh profile test and bind the security profile to the Mesh profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name sec
[HUAWEI-wlan-sec-prof-sec] security wpa2 psk pass-phrase password@123 aes
[HUAWEI-wlan-sec-prof-sec] quit
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] security-profile sec
16.19 link-report-interval
16.20 link-rssi-threshold
16.21 location-based-algorithm enable
16.22 max-link-number
16.23 max-rssi-threshold
16.24 mesh-handover-profile
16.25 mesh-handover-profile (Mesh profile view)
16.26 mesh-id
16.27 mesh-profile
16.28 mesh-profile (WLAN radio interface view)
16.29 mesh-proxy onboard-equip
16.30 mesh-proxy trackside-equip
16.31 mesh-whitelist-profile
16.32 mesh-whitelist-profile (WLAN radio interface view)
16.33 min-rssi-threshold
16.34 peer-ap mac (Mesh whitelist profile view)
16.35 priority-map dscp (Mesh profile view)
16.36 priority-map trust (Mesh profile view)
16.37 p-n criteria
16.38 rssi-margin
16.39 security-profile (Mesh profile view)
16.40 switch-probe-interval
16.41 urgent-handover low-rate
16.42 urgent-handover punishment
16.1 antenna-output
Function
The antenna-output command configures an output mode of a 2.4G/5G antenna.
The undo antenna-output command restores the default output mode of a
2.4G/5G antenna.
By default, a 2.4G/5G antenna uses split output.
Format
antenna-output { split | combine }
undo antenna-output
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
This command is supported only by APs supporting antenna combination and split
modes.
Example
# Configure the combination mode of a 2.4G/5G antenna.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] antenna-output combine
The undo client-mode enable command disables the Mesh client mode.
Format
client-mode enable
Parameters
None
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Trackside APs are deployed by segment (for example, only in stations) instead of
along the railway line. To meet throughput or coverage efficiency requirements,
you need to configure trackside APs to work in different channels. Vehicle-
mounted APs scan channels of neighboring APs to perform Mesh link handovers.
Precautions
The Mesh handover mode and Mesh client mode are mutually exclusive in a Mesh
profile.
Radios of a trackside AP cannot have both the Mesh handover and client modes
configured. For example, if radio 1 and radio 2 of a trackside AP have the Mesh
handover mode and Mesh client mode configured, respectively, the AP will fail to
set up a Mesh link with a vehicle-mounted AP.
Example
# Enable the Mesh client mode for Mesh profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] client-mode enable
Format
dhcp trust port
undo dhcp trust port
Parameters
None
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
After a DHCP trusted port is enabled in a Mesh profile and the Mesh profile is
applied to an AP, the AP receives the DHCP OFFER, ACK, and NAK packets sent by
authorized DHCP servers and forwards the packets to STAs so that the STAs can
obtain valid IP addresses and go online.
Example
# Enable a DHCP trusted port in the Mesh profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] dhcp trust port
Format
display mesh vap { all | mesh-id mesh-id }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to view information about a specified Mesh VAP or all
Mesh VAPs.
Example
# Display information about all Mesh VAPs.
<HUAWEI> display mesh vap all
WID : WLAN ID
------------------------------------------------------------------------------------------------
AP MAC RfID WID Mesh ID BSSID Auth type Mesh links
------------------------------------------------------------------------------------------------
dcd2-fc21-5d40 0 16 HUAWEI-WLAN-MESH 00E0-FC21-5D4F WPA2-PSK 3
------------------------------------------------------------------------------------------------
Total: 1
Item Description
AP MAC AP MAC.
Format
display mesh-handover-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh-handover-profile command to view the number of
times a Mesh handover profile is referenced by a Mesh profile or parameter
settings of a specified Mesh handover profile.
Example
# Display reference information about all Mesh handover profiles.
<HUAWEI> display mesh-handover-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Item Description
Handover P-N criteria observe time Observing value in the P/N criterion.
To configure this parameter, run the p-
n criteria command.
Handover P-N criteria qualify time Qualified value in the P/N criterion.
To configure this parameter, run the p-
n criteria command.
Urgent handover low rate period Minimum rate holding time for an
emergency handover.
To configure this parameter, run the
urgent-handover low-rate command.
Format
display mesh-handover-trace
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
This command displays roaming traces of a vehicle-mounted AP, which helps you
to determine trackside APs connected to the vehicle-mounted AP and link
handover information.
Example
# Display roaming traces of a vehicle-mounted AP.
<HUAWEI> display mesh-handover-trace
Index Timestamp From AP MAC/RSSI/Location-ID To AP MAC/RSSI/Location-ID
------------------------------------------------------------------------------
1 15:31:20 0000-0000-0001/-60/- 0000-0000-0002/-50/-
2 15:31:40 0000-0000-0002/-60/- 0000-0000-0003/-50/-
3 15:32:00 0000-0000-0003/-60/- 0000-0000-0004/-50/-
------------------------------------------------------------------------------
Item Description
Item Description
Format
display mesh-neighbor-rssi [ interface radio-interface ] [ max-neighbor-
number max-number ]
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
The command can also display RSSI information of trackside APs. If a vehicle-
mounted AP and a trackside AP are on Mesh whitelists of each other, the vehicle-
mounted AP can collect RSSI information of the trackside AP.
Example
# Display RSSI information collected by an AP.
<HUAWEI> display mesh-neighbor-rssi
AP MAC/Radio/Location-ID Neighbor AP/MAC/Location-ID RSSI Update Time
--------------------------------------------------------------------------------
00e0-fc12-3457/dcd2-fc21-5d40/0/- -/00e0-fc12-3458/0 -37 22:29:47
00e0-fc12-3457/dcd2-fc21-5d40/0/- -/00e0-fc12-3458/0 -36 22:29:47
00e0-fc12-3457/dcd2-fc21-5d40/0/- -/00e0-fc12-345/0 -37 22:29:47
--------------------------------------------------------------------------------
Total: 3
Format
display mesh-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh-profile command to view the number of times a
Mesh profile is referenced or configuration information of a specified Mesh profile.
Example
# Display reference information about all Mesh profiles.
<HUAWEI> display mesh-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Item Description
Item Description
Format
display mesh-proxy-equip
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can use the command to view ground and vehicle-mounted devices that use
the vehicle-mounted AP as a proxy device.
Example
# Display devices that use the vehicle-mounted AP as a proxy device.
<HUAWEI> display mesh-proxy-equip
--------------------------------------------------------------------------------
Proxy mode MAC address VlAN ID
--------------------------------------------------------------------------------
trackside 0000-0000-0001 100
onboard 0000-0000-0001 100
--------------------------------------------------------------------------------
Item Description
Format
display mesh-whitelist-profile { all | name whitelist-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display mesh-whitelist-profile command to view the number of
times a Mesh whitelist profile is referenced or MAC addresses added in a specified
Mesh whitelist profile.
Example
# Display reference information about all Mesh whitelist profiles.
<HUAWEI> display mesh-whitelist-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
default 0
test 2
--------------------------------------------------------------------------------
Total: 2
Item Description
--------------------------------------------------------------------------------
0 00e0-fc76-e360
1 00e0-fc74-9640
--------------------------------------------------------------------------------
Total: 2
Format
display references mesh-handover-profile name profile-name
Parameters
Parameter Description Value
name profile- Displays information about the Mesh The Mesh handover
name profiles by which a specified Mesh profile must exist.
handover profile is referenced.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references mesh-handover-profile command to check
the Mesh profiles by which a Mesh handover profile is referenced.
Example
# Display information about Mesh profiles by which the Mesh handover profile
test is referenced.
<HUAWEI> display references mesh-handover-profile name test
--------------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------------
Mesh profile profile-1
Mesh profile profile-2
--------------------------------------------------------------------------------
Total: 2
Item Description
Format
display references mesh-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a Mesh profile. The Mesh profile
name must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references mesh-profile command to check reference
information about a Mesh profile.
Example
# Display reference information about the Mesh profile test.
<HUAWEI> display references mesh-profile name test
--------------------------------------------------------------------------------
Reference type Reference name WLAN ID
--------------------------------------------------------------------------------
Interface Wlan-Radio0/0/0 16
--------------------------------------------------------------------------------
Total: 1
Item Description
Format
display references mesh-whitelist-profile name whitelist-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references mesh-whitelist-profile command to check
reference information about a specified Mesh whitelist profile.
Example
# Display reference information about the Mesh whitelist profile test.
<HUAWEI> display references mesh-whitelist-profile name test
--------------------------------------------------------------------------------
Reference type Reference name
--------------------------------------------------------------------------------
AP group default
--------------------------------------------------------------------------------
Total: 1
Format
display wlan mesh link { all | mesh-profile profile-name | peer-mac peer-mac }
Parameters
Parameter Description Value
peer-mac Displays information about the Mesh link The MAC address
peer-mac on a specified peer MAC address. must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display wlan mesh link command to view information about a
Mesh link.
Example
# Display information about all Mesh links.
<HUAWEI> display wlan mesh link all
Rf : radio ID Dis : coverage distance(100m)
Ch : channel Per : drop percent(%)
TSNR : total SNR(dB) P- : peer
Mesh : Mesh mode Re : retry ratio(%)
RSSI : RSSI(dBm) MaxR : max RSSI(dBm)
------------------------------------------------------------------------------------------------------------------------------
----
APMAC P-APName P-APMAC Rf Dis Ch Mesh P-Status RSSI MaxR Per Re
TSNR SNR(Ch0~3:dB)
Index Tx(Mbps) Rx(Mbps) Mesh ID
------------------------------------------------------------------------------------------------------------------------------
----
# Display information about the Mesh link on a specified peer MAC address.
<HUAWEI> display wlan mesh link peer-mac 00e0-fc90-6180
Rf : radio ID Dis : coverage distance(100m)
Ch : channel Per : drop percent(%)
TSNR : total SNR(dB) P- : peer
Mesh : Mesh mode Re : retry ratio(%)
RSSI : RSSI(dBm) MaxR : max RSSI(dBm)
------------------------------------------------------------------------------------------------------------------------------
----
APMAC P-APName P-APMAC Rf Dis Ch Mesh P-Status RSSI MaxR Per Re
TSNR SNR(Ch0~3:dB)
Index Tx(Mbps) Rx(Mbps) LinkStatus Mesh ID
------------------------------------------------------------------------------------------------------------------------------
----
00e0-fc15-d2e0 00e0-fc90-6180 00e0-fc90-6180 1 3 157 node - -51 -40 0 0 39
28/38/29/-
0 243 40 - y-mesh
------------------------------------------------------------------------------------------------------------------------------
----
Table 16-14 Description of the display wlan mesh link command output
Item Description
Item Description
Format
display wlan mesh switch-record all
Parameters
None
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
You can run this command to view the records about Mesh configuration
switching of vehicle-mounted APs.
Precautions
A maximum of latest 50 records can be displayed.
Example
# Display the records about Mesh configuration switching of vehicle-mounted APs.
<HUAWEI> display wlan mesh switch-record all
---------------------------------------------------------------------------------------
RfID Ch Mesh ID Auth type Index Time
---------------------------------------------------------------------------------------
0 1 Mesh1 WPA2-PSK 0 19:30:00 2018/04/11
0 25 Mesh0 WPA2-PSK 1 19:25:00 2018/04/11
---------------------------------------------------------------------------------------
Total:2
Table 16-15 Description of the display wlan mesh switch-record all command
output
Item Description
Ch Channel.
16.16 link-aging-time
Function
The link-aging-time command sets the aging time of a Mesh link.
The undo link-aging-time command restores the default aging time of a Mesh
link.
Format
link-aging-time aging-time
undo link-aging-time
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
If a Mesh node cannot receive keepalive packets from a neighboring node for a
period of time greater than or equal to the aging time of a Mesh link, the Mesh
node considers the Mesh link disconnected and will reselect a link.
In a fast changing radio environment, if the aging time of a Mesh link is set to a
small value, Mesh links may be frequently disconnected or reselected, causing
network flapping. If the aging time of a Mesh link is set to a large value, a Mesh
node cannot reselect Mesh links in a timely manner, causing service interruption.
Therefore, you need to configure a proper aging time for Mesh links based on
actual situations.
Example
# Set the aging time of a Mesh link to 10s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-aging-time 10
16.17 link-hold-period
Function
The link-hold-period command sets the holding time of a Mesh link.
The undo link-hold-period command restores the default holding time of a Mesh
link.
Format
link-hold-period value
undo link-hold-period
Parameters
Parameter Description Value
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
Unstable radio environments may cause frequent handovers of the active Mesh
link, degrading quality of vehicle-ground communications. To prevent frequent
handovers, you can configure a proper holding time for the active link. The serving
time of the active link must be longer than or equal to the configured holding
time; otherwise, the vehicle-mounted AP can only implement an emergency
handover, not a common handover.
Example
# Set the holding time of a Mesh link to 5000 ms in the Mesh handover profile
huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name huawei
[HUAWEI-wlan-mesh-handover-huawei] link-hold-period 5000
16.18 link-probe-interval
Function
The link-probe-interval command sets a Mesh link probe interval in a Mesh
handover profile.
The undo link-probe-interval command restores the default Mesh link probe
interval in a Mesh handover profile.
By default, the Mesh link probe interval is 100 ms in a Mesh handover profile.
Format
link-probe-interval value
undo link-probe-interval
Parameters
Parameter Description Value
value Specifies the interval for The value is an integer that ranges
detecting Mesh links. from 50 to 6000, in milliseconds. The
default value is 100.
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
In vehicle-ground communication scenarios, a vehicle-mounted AP periodically
sends unicast probe frames to detect RSSIs of Mesh links and executes the
handover algorithm based on the detection result. A larger interval delays link
handover, interrupting vehicle-ground communications. A smaller interval
increases air port costs and burden on the vehicle-mounted AP. Therefore, you
need to configure a proper interval for detecting Mesh links according to train
operating conditions.
Precautions
You are advised to set the same Mesh link probe interval for vehicle-mounted APs
and trackside APs.
Example
# Set the Mesh link probe interval to 150 ms in the Mesh handover profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name test
[HUAWEI-wlan-mesh-handover-test] link-probe-interval 150
16.19 link-report-interval
Function
The link-report-interval command sets the interval at which an AP reports Mesh
link information to the system.
Format
link-report-interval report-interval
undo link-report-interval
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
In vehicle-ground communication scenarios, a vehicle-mounted AP connects to a
limited number of trackside APs. Frequent reports of Mesh link information occupy
a few system resources. Therefore, you do not need to run the link-report-
interval command in the vehicle-ground communication scenarios.
Example
# Set the interval at which an AP reports Mesh link information to the system to
20s.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-report-interval 20
16.20 link-rssi-threshold
Function
The link-rssi-threshold command sets the received signal strength indicator
(RSSI) threshold of a mesh link.
The undo link-rssi-threshold command restores the default RSSI threshold of a
mesh link.
By default, the RSSI threshold of a mesh link is -75 dBm.
Format
link-rssi-threshold threshold-value
undo link-rssi-threshold
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The RSSI threshold of a mesh link indicates the minimum RSSI of the mesh link. If
the RSSI of an MP that joins a WMN is lower than the RSSI threshold configured
using the link-rssi-threshold command, the routing information table of the mesh
link is updated and routing information about the MP is deleted.
Example
# Set the RSSI threshold of mesh links to -60 dBm.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] link-rssi-threshold -60
Format
location-based-algorithm enable [ moving-direction { backward | forward |
undetermined } ]
Parameters
Parameter Description Value
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
NOTICE
Moving directions of the vehicle-mounted APs in the front and rear of a train
cannot be backward or forward at the same time; otherwise, the location-based
link handover algorithm makes incorrect calculations when the train switches its
forward direction. For example, if the moving direction of the vehicle-mounted AP
in the front is set to forward, the moving direction of the vehicle-mounted AP in
the rear must be set to backward.
Example
# Enable the location-based enhanced link handover algorithm and set the
moving direction of the vehicle-mounted AP to forward.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name huawei
[HUAWEI-wlan-mesh-handover-huawei] location-based-algorithm enable moving-direction forward
16.22 max-link-number
Function
The max-link-number command sets the maximum number of mesh links that
can be established between APs.
The undo max-link-number command restores the default maximum number of
mesh links that can be established between APs.
By default, a maximum of eight mesh links can be established between APs.
Format
max-link-number link-num
undo max-link-number
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an AP sets up too many Mesh links with neighboring APs, network
indicators, such as the throughput cannot meet customer needs, affecting user
experience. To improve user experience, you can run the max-link-number
command to set the maximum number of mesh links that can be established
between APs according to actual situations.
Impact
If the number of mesh links of an AP has reached the maximum, the AP does not
set up new mesh links with neighboring APs.
Example
# Set the maximum number of mesh links that can be established between APs to
3.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] max-link-number 3
16.23 max-rssi-threshold
Function
The max-rssi-threshold command sets the maximum RSSI threshold of a Mesh
link in a Mesh handover profile.
By default, the maximum RSSI threshold of a Mesh link is -20 dBm in a Mesh
handover profile.
Format
max-rssi-threshold value
undo max-rssi-threshold
Parameters
Parameter Description Value
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
During a vehicle-ground fast link handover, the vehicle-mounted AP selects the
candidate link of the best quality as the active link from the candidate area (the
RSSI range of a candidate area is from the minimum RSSI threshold to the
maximum RSSI threshold of the Mesh link). An emergency handover is triggered
when the RSSI of the current active link is out of the RSSI range of the candidate
area (falls below the minimum RSSI threshold of a Mesh link or exceeds the
maximum RSSI threshold of a Mesh link).
In actual scenarios, set proper minimum and maximum RSSIs of a Mesh link
according to network deployment. Improper values result in frequent emergency
handovers or untimely handovers, degrading vehicle-ground fast link handover
performance.
Example
# Set the maximum RSSI threshold of a Mesh link to -15 dBm in the Mesh
handover profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name huawei
[HUAWEI-wlan-mesh-handover-huawei] max-rssi-threshold -15
16.24 mesh-handover-profile
Function
The mesh-handover-profile command creates a Mesh handover profile or
displays the Mesh handover profile view.
The undo mesh-handover-profile command deletes a Mesh handover profile.
By default, the system provides the Mesh handover profile default.
Format
mesh-handover-profile name profile-name
undo mesh-handover-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Specifies the name of a Mesh handover The value is a string
name profile. of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After a Mesh handover profile is bound to a Mesh profile, the Mesh profile can
provide the vehicle-ground fast link handover function and apply to vehicle-
ground communication scenarios.
Example
# Create the Mesh handover profile handover and bind it to the Mesh profile test.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name handover
[HUAWEI-wlan-mesh-handover-handover] quit
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-handover-profile handover
Function
The mesh-handover-profile command binds a Mesh handover profile to a Mesh
profile.
The undo mesh-handover-profile command unbinds a Mesh handover profile
from a Mesh profile.
By default, no Mesh handover profile is bound to a Mesh profile.
Format
mesh-handover-profile profile-name
undo mesh-handover-profile
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the mesh-handover-profile command to bind a Mesh handover
profile to a Mesh profile so that the Mesh profile can provide the vehicle-ground
fast link handover function and apply to vehicle-ground communication scenarios.
Example
# Create the Mesh handover profile handover and bind it to the Mesh profile test.
<HUAWEI> system-view
[HUAWEI] wlan
16.26 mesh-id
Function
The mesh-id command sets a Mesh ID for a Mesh profile.
The undo mesh-id command restores the Mesh ID of a Mesh profile to the
default value.
By default, the Mesh ID of a Mesh profile is HUAWEI-WLAN-MESH.
Format
mesh-id name
undo mesh-id
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
The Mesh ID of a Mesh profile is similar to the SSID. On a Mesh network, AP
radios discover available Mesh services of other APs based on the Mesh ID.
Each Mesh profile must have a Mesh ID. The default Mesh ID of a Mesh profile is
HUAWEI-WLAN-MESH. You can run the mesh-id command to set a Mesh ID for
a Mesh profile.
Example
# Create the Mesh profile test and set the Mesh ID of the profile to mesh-net.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-id mesh-net
16.27 mesh-profile
Function
The mesh-profile command creates a Mesh profile or displays the Mesh profile
view.
The undo mesh-profile command deletes a Mesh profile.
By default, the system provides the Mesh profile default.
Format
mesh-profile name profile-name
undo mesh-profile { all | name profile-name }
Parameters
Parameter Description Value
name profile- Specifies the name of a Mesh profile. The value is a string
name of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh profile is applied to an AP radio, Mesh VAPs are created on the radio.
Each Mesh profile must have a Mesh ID. The default Mesh ID of a Mesh profile is
HUAWEI-WLAN-MESH. You can run the mesh-id command to set a Mesh ID for
a Mesh profile.
Example
# Create the Mesh profile test and set the Mesh ID of the profile to mesh-net.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] mesh-id mesh-net
Function
The mesh-profile command binds a Mesh profile to an AP radio.
Format
mesh-profile profile-name [ index index ]
undo mesh-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the Mesh profile to The Mesh profile
be bound to an AP radio. must exist.
index index Specifies the index of the Mesh profile. The value is an
integer that can be
0 or 1. The default
value is 0. If this
parameter is not
specified, the
default value is
used.
Views
WLAN radio interface view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh profile is bound to an AP radio, a Mesh VAP will be generated on the
AP radio to provide Mesh services for users.
When each train travels on a fixed line, bind only one Mesh profile to a radio on a
vehicle-mounted AP so that the AP can connect to trackside APs, without the need
to specify index index.
When a train switch between lines, bind multiple Mesh profiles to a radio on a
vehicle-mounted AP. In this manner, the vehicle-mounted AP can connect to
trackside APs on different lines. You need to specify index index. A vehicle-
mounted AP attempts to set up links with trackside APs configured in the
corresponding Mesh profiles by the order in which the profiles are referenced. If
the link setup fails after the probe interval elapses, the vehicle-mounted AP
attempts to set up a links using the next Mesh profile. If the vehicle-mounted AP
fails to set up with trackside APs using any Mesh profile, the AP initiates link setup
again by the order in which the profiles are referenced until a link is successfully
set up.
Prerequisites
A Mesh profile has been created and properly configured.
Precautions
Among the VAPs created after a Mesh profile is bound to an AP radio, the VAP
with the WLAN ID 16 cannot be occupied.
To allow APs to attempt to set up links using different Mesh profiles, configure the
Mesh handover function in each Mesh profile.
Example
# Bind the Mesh profile test to radio 0 of an AP.
<HUAWEI> system-view
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] mesh-profile test
Format
mesh-proxy onboard-equip mac-address mac-address vlan vlan-id
undo mesh-proxy onboard-equip mac-address { mac-address | all }
Parameters
Parameter Description Value
vlan vlan-id Specifies the VLAN ID of The value is an integer that ranges
a proxied vehicle- from 1 to 4094.
mounted device.
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
As a train moves forward, the vehicle-mounted AP keeps switching connections
with trackside APs. After switching the active Mesh link to a trackside AP, the
vehicle-mounted AP broadcasts an RARP message carrying MAC addresses of the
proxied vehicle-mounted devices to the ground network device (such as a gateway
device). After receiving the message, the ground network device updates the MAC
forwarding entries. In this way, data traffic from the ground network can be
forwarded to the vehicle-mounted AP through the trackside AP.
NOTE
You can add MAC addresses of a maximum of 16 proxied vehicle-mounted devices on a vehicle-
mounted AP.
Example
# Add the vehicle-mounted device with MAC address 0000-0000-0001 in VLAN
100 on the vehicle-mounted AP as a proxied device.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-proxy onboard-equip mac-address 0000-0000-0001 vlan 100
Format
mesh-proxy trackside-equip mac-address mac-address vlan vlan-id
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a train switches the forward direction, the working vehicle-mounted AP
broadcasts an RARP message carrying MAC addresses of the proxied ground
devices to the vehicle-mounted switch through a wired interface. After receiving
the message, the vehicle-mounted switch updates MAC forwarding entries. In this
way, the vehicle-mounted switch can forward data packets to the working vehicle-
mounted AP.
If the proxied ground devices are incorrectly configured on the vehicle-mounted
AP, the vehicle-mounted switch will forward data traffic to the vehicle-mounted
AP in dormancy state, causing service interruption.
NOTE
You can add MAC addresses of a maximum of 16 proxied ground devices on a vehicle-mounted
AP.
Example
# Add the ground device with MAC address 0000-0000-0001 in VLAN 100 on the
vehicle-mounted AP as a proxied device.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-proxy trackside-equip mac-address 0000-0000-0001 vlan 100
16.31 mesh-whitelist-profile
Function
The mesh-whitelist-profile command creates a Mesh whitelist profile or displays
the Mesh whitelist profile view.
The undo mesh-whitelist-profile command deletes a Mesh whitelist profile.
By default, no Mesh whitelist profile is available in the system.
Format
mesh-whitelist-profile name whitelist-name
undo mesh-whitelist-profile { all | name whitelist-name }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
After a Mesh whitelist profile is created, run the peer-ap mac (Mesh whitelist
profile view) command in the Mesh whitelist profile view to add MAC addresses
of the allowed peer APs to the profile.
Example
# Create the Mesh whitelist profile whitelist and add the MAC address
0001-0001-0001 to the whitelist profile. Bind the Mesh whitelist profile whitelist
to radio 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] quit
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] mesh-whitelist-profile whitelist
Format
mesh-whitelist-profile whitelist-name [ index index ]
undo mesh-whitelist-profile
Parameters
Parameter Description Value
whitelist- Specifies the name of the Mesh whitelist The Mesh whitelist
name profile to be bound to an AP radio. profile must exist.
index index Specifies the index of the Mesh whitelist The value is an
profile. integer that can be
0 or 1. The default
value is 0. If this
parameter is not
specified, the
default value is
used.
Views
WLAN radio interface view
Default Level
2: Configuration level
Usage Guidelines
After a Mesh whitelist profile is applied to an AP radio, the AP radio can only set
up Mesh links with neighboring APs whose MAC addresses are in the Mesh
whitelist profile.
You can configure different values of index index for radios on an AP to reference
different Mesh whitelist profile. If you specify index index for multiple times in the
same radio view, the latest configuration overwrites the old one.
Example
# Create the Mesh whitelist profile whitelist and add the MAC address
0001-0001-0001 to the whitelist profile. Bind the Mesh whitelist profile whitelist
to radio 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] quit
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] mesh-whitelist-profile whitelist
16.33 min-rssi-threshold
Function
The min-rssi-threshold command sets the minimum RSSI threshold of a Mesh
link in a Mesh handover profile.
By default, the minimum RSSI threshold of a Mesh link is -60 dBm in a Mesh
handover profile.
Format
min-rssi-threshold value
undo min-rssi-threshold
Parameters
Parameter Description Value
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
During a vehicle-ground fast link handover, the vehicle-mounted AP selects the
candidate link of the best quality as the active link from the candidate area (the
RSSI range of a candidate area is from the minimum RSSI threshold to the
maximum RSSI threshold of the Mesh link). An emergency handover is triggered
when the RSSI of the current active link is out of the RSSI range of the candidate
area (falls below the minimum RSSI threshold of a Mesh link or exceeds the
maximum RSSI threshold of a Mesh link).
In actual scenarios, set proper minimum and maximum RSSIs of a Mesh link
according to network deployment. Improper values result in frequent emergency
handovers or untimely handovers, degrading vehicle-ground fast link handover
performance.
Example
# Set the minimum RSSI threshold of a Mesh link to -50 dBm in the Mesh
handover profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name huawei
[HUAWEI-wlan-mesh-handover-huawei] min-rssi-threshold -50
The undo peer-ap mac command deletes the MAC addresses of neighboring APs
from a Mesh whitelist profile.
Format
peer-ap mac mac-address
Parameters
Parameter Description Value
Views
Mesh whitelist profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After a Mesh whitelist profile is created, you can run the peer-ap mac command
to add neighboring APs' MAC addresses to the profile.
If a Mesh whitelist profile is bound to a Mesh profile, only APs with MAC
addresses in the Mesh whitelist profile can access the local AP, and other APs are
denied access.
Precautions
Example
# Create the Mesh whitelist profile whitelist and add the MAC address
0001-0001-0001 to the whitelist profile. Bind the Mesh whitelist profile whitelist
to radio 0.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-whitelist-profile name whitelist
[HUAWEI-wlan-mesh-whitelist-whitelist] peer-ap mac 0001-0001-0001
[HUAWEI-wlan-mesh-whitelist-whitelist] quit
[HUAWEI-wlan-view] quit
[HUAWEI] interface Wlan-Radio 0/0/0
[HUAWEI-Wlan-Radio0/0/0] mesh-whitelist-profile whitelist
The undo priority-map dscp command restores the default mapping from DSCP
priorities to 802.11e user priorities on the Mesh air interface.
Table 16-16 describes the mapping from DSCP priorities to 802.11e user priorities
by default.
0-7 0
8-15 1
16-23 2
24-31 3
32-39 4
40-47 5
48-55 6
56-63 7
Format
priority-map dscp { dscp-value1 [ to dscp-value2 ] } &<1-10> dot11e dot11e-
value
undo priority-map dscp
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
On a Mesh network, you can run this command to configure the mapping from
DSCP priorities of 802.3 packets to 802.11e user priorities on the Mesh air
interface of an AP.
Example
# Map DSCP priorities 0-6 to 802.11e user priority 0 on the Mesh air interface.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] priority-map dscp 0 to 6 dot11e 0
Format
priority-map trust { dot1p | dscp }
undo priority-map trust
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
On a Mesh network, when 802.1p or DSCP priorities in data packets need to be
mapped to 802.11e user priorities and the packets are transmitted through a Mesh
link, run this command.
Example
# Configure the Mesh air interface to trust the mapping from 802.1p priorities to
802.11e user priorities.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] priority-map trust dot1p
The undo p-n criteria command restores the default P/N criterion of a handover.
By default, the observing value in the P/N criterion is three detection times and
the qualified value is two detection times.
Format
p-n criteria observe-time observe-value qualify-time qualify-value
Parameters
Parameter Description Value
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
The vehicle-mounted AP determines whether a Mesh link meets handover, setup,
or teardown conditions based on multiple detection results rather than a single
detection, according to the P/N criterion. Only when there are qualify-value or
more than qualify-value qualified detections out of observe-value detections, the
Mesh link can be switched, set up, or torn down.
Example
# Set the P value in the P/N criterion to 5 and the N value to 3.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name huawei
[HUAWEI-wlan-mesh-handover-huawei] p-n criteria observe-time 5 qualify-time 3
16.38 rssi-margin
Function
The rssi-margin command sets the RSSI threshold for a Mesh link handover.
The undo rssi-margin command restores the default RSSI threshold for a Mesh
link handover.
Format
rssi-margin value
undo rssi-margin
Parameters
Parameter Description Value
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
A common handover is triggered when the following conditions are met: The RSSI
of a candidate link is in the RSSI range of the candidate area, the RSSI difference
between the candidate link and current active link is greater than or equal to the
RSSI threshold for a Mesh link handover, and the serving time of the current active
link is longer than or equal to the link holding time. In actual scenarios, set the
proper RSSI threshold for a Mesh link handover. If the RSSI threshold is set too
large, the active Mesh link cannot be switched in a timely manner. If the RSSI
threshold is set too small, emergency handovers repeatedly occur, degrading
vehicle-ground fast link handover performance.
Example
# Set the RSSI threshold of a Mesh link handover to 20 dB in the Mesh handover
profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile huawei
[HUAWEI-wlan-mesh-handover-huawei] rssi-margin 20
Format
security-profile profile-name
undo security-profile
Parameters
Parameter Description Value
profile-name Specifies the name of the security profile The security profile
bound to a Mesh profile. must exist.
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Before a Mesh profile is applied to an AP radio to establish Mesh links, the Mesh
profile must have a security profile bound to ensure Mesh link security.
Precautions
After a security profile is bound to a Mesh profile, the authentication policy and
encryption mode in the security profile cannot be changed, but the authentication
key can be changed.
A Mesh profile can only have one security profile bound. If you run the command
multiple times in the same Mesh profile view, the latest configuration overwrites
the old one.
Example
# Create the security profile sec and set the security policy to WPA2+PSK+AES.
Create the Mesh profile test and bind the security profile to the Mesh profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] security-profile name sec
[HUAWEI-wlan-sec-prof-sec] security wpa2 psk pass-phrase password@123 aes
[HUAWEI-wlan-sec-prof-sec] quit
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] security-profile sec
Warning: This action may cause service interruption. Continue?[Y/N]y
16.40 switch-probe-interval
Function
The switch-probe-interval command specifies the Mesh handover probe interval.
Format
switch-probe-interval interval
undo switch-probe-interval
Parameters
Parameter Description Value
Views
Mesh profile view
Default Level
2: Configuration level
Usage Guidelines
In vehicle-ground communication scenarios, if a train switches its traveling line,
configure Mesh parameters for vehicle-mounted APs that may switch between
multiple lines. This ensures normal vehicle-ground communication. A vehicle-
mounted AP attempts to set up links with trackside APs configured in the
corresponding Mesh profile by the order in which the profiles are referenced. If the
link setup fails after the probe interval elapses, the vehicle-mounted AP attempts
to set up a links using the next Mesh profile. If the vehicle-mounted AP fails to set
up with trackside APs using any Mesh profile, the AP initiates link setup again by
the order in which the profiles are referenced until a link is successfully set up.
Example
# Create the Mesh profile test and set the Mesh handover probe interval to 15
seconds.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-profile name test
[HUAWEI-wlan-mesh-prof-test] switch-probe-interval 15
Format
urgent-handover low-rate threshold rate-value period time
Parameters
Parameter Description Value
period time Specifies the minimum The value is an integer that ranges
rate holding time. from 0 to 10000, in milliseconds. The
default value is 2000.
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
In certain scenarios (for example, when fast frequency offset occurs), a link has a
high RSSI but a very low rate. If a link handover is not implemented in these
scenarios, vehicle-ground communications will be affected. If the link rate has
fallen below the minimum rate threshold and stayed in this low-speed state
longer than the minimum rate holding time, the vehicle-mounted AP implements
an emergency handover to switch the active link.
NOTE
rate-value refers to the packet transmission rate on the air interface. In actual situations, the
rate depends on the radio type, channel bandwidth, GI mode, and spatial streams. For details
about the rate ranges supported by different protocols, see the corresponding IEEE802.11
protocol document. Set a proper low rate threshold based on actual requirements.
Example
# Set the minimum rate threshold for an emergency handover to 20 Mbit/s and
the minimum rate holding time to 1000 ms in the Mesh handover profile huawei
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name huawei
[HUAWEI-wlan-mesh-handover-huawei] urgent-handover low-rate threshold 20 period 1000
Format
urgent-handover punishment period time rssi value
undo urgent-handover punishment
Parameters
Parameter Description Value
period time Specifies the penalty The value is an integer that ranges
period for an emergency from 0 to 10000, in milliseconds. The
handover. default value is 2000.
rssi value Specifies the penalty The value is an integer that ranges
level for an emergency from 0 to 50, in dB. The default
handover. value is 10.
Views
Mesh handover profile view
Default Level
2: Configuration level
Usage Guidelines
An emergency handover may occur when the radio environment is unstable or a
trackside AP fails. To prevent back and forth handovers between trackside APs
(ping-pong handovers), you can configure penalty parameters for an emergency
handover. The penalty parameters include the penalty period and penalty level.
When an emergency handover occurs, the vehicle-mounted AP disconnects the
active link from a trackside AP. If the RSSI of the trackside AP falls within the RSSI
range of the candidate area before the penalty period expires, the vehicle-
mounted AP deducts the penalty level from the RSSI of the trackside AP before
making handover calculations based on the handover algorithm.
Example
# Set the penalty period for an emergency handover to 1000 ms and penalty level
to 20 dB in the Mesh handover profile huawei.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] mesh-handover-profile name huawei
[HUAWEI-wlan-mesh-handover-huawei] urgent-handover punishment period 1000 rssi 20
17 Hotspot2.0 Configuration
Commands (Common AP)
17.1 cellular-network-profile
17.2 cellular-network-profile (Hotspot2.0 profile view)
17.3 connection-capability-profile
17.4 connection-capability-profile (Hotspot2.0 profile view)
17.5 connection-capability
17.6 display cellular-network-profile
17.7 display connection-capability-profile
17.8 display hotspot2-profile
17.9 display nai-realm-profile
17.10 display operating-class-profile
17.11 display operator-domain-profile
17.12 display operator-name-profile
17.13 display references cellular-network-profile
17.14 display references connection-capability-profile
17.15 display references hotspot2-profile
17.16 display references nai-realm-profile
17.17 display references operating-class-profile
17.18 display references operator-domain-profile
17.19 display references operator-name-profile
17.20 display references roaming-consortium-profile
17.1 cellular-network-profile
Function
The cellular-network-profile command creates a cellular network profile or
displays the view of an existing cellular network profile.
Format
cellular-network-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a cellular network The value is a string
name profile. of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure Hotspot 2.0 services on cellular networks. When connecting to
the networks, user terminals can obtain network information from APs, which
helps them to select desired networks.
Follow-up Procedure
Run the plmn-id command to configure the PLMN identifier and run the cellular-
network-profile (Hotspot2.0 profile view) command to bind the cellular
network profile to a Hotspot2.0 profile to make the cellular network profile take
effect.
Precautions
Example
# Create the cellular network profile cellular-network-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] cellular-network-profile name cellular-network-profile1
[HUAWEI-wlan-cellular-network-prof-cellular-network-profile1]
Format
cellular-network-profile profile-name
undo cellular-network-profile
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure Hotspot 2.0 services on a cellular network. When connecting to
the network, user terminals need to obtain the cellular network identifier (3GPP
Cellular PLMN) from APs to select desired networks. You can run the cellular-
network-profile command to create a cellular network profile and the plmn-id
command to configure the Public Land Mobile Network (PLMN) identifier of the
network operator, and then bind the cellular network profile to a Hotspot 2.0
profile to make the configuration take effect.
Example
# Bind cellular network profile cellular-network-profile1 to the Hotspot 2.0
profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] cellular-network-profile cellular-network-profile1
17.3 connection-capability-profile
Function
The connection-capability-profile command creates a connection capability
profile or displays the view of an existing connection capability profile.
The undo connection-capability-profile command deletes a connection
capability profile.
By default, no connection capability profile exists in the system.
Format
connection-capability-profile name profile-name
undo connection-capability-profile { name profile-name | all }
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure Hotspot2.0 services for networks. When user terminals connect
to the networks, they can obtain network connection capability information from
APs, including allowed protocols and ports, which helps them to select desired
networks.
Follow-up Procedure
Precautions
Example
# Create the connection capability profile connection-capability-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] connection-capability-profile name connection-capability-profile1
[HUAWEI-wlan-co-cap-prof-connection-capability-profile1]
Format
connection-capability-profile profile-name
undo connection-capability-profile
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure Hotspot2.0 services for networks. When user terminals connect
to the networks, they can obtain network connection capability information from
APs, including allowed protocols and ports, which helps them to select desired
networks. You can run the connection-capability-profile command to create a
connection capability profile and run the connection-capability command to set
whether networks support specific IP protocols and ports. After that, you bind the
connection capability profile to a Hotspot2.0 profile.
Example
# Bind the connection capability profile connection-capability-profile1 to the
Hotspot2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] connection-capability-profile connection-capability-profile1
17.5 connection-capability
Function
The connection-capability command sets whether Hotspot2.0 networks support
common IP protocols and ports.
Format
connection-capability { esp | icmp | tcp-ftp | tcp-http | tcp-pptp-vpn | tcp-ssh |
tcp-tls-vpn | tcp-voip | udp-ike2-4500 | udp-ike2-500 | udp-voip } { on | off }
Parameters
Parameter Description Value
Views
Connection capability profile view
Default Level
2: Configuration level
Usage Guidelines
You can run the connection-capability command to set whether Hotspot2.0
networks support common IP protocols and ports.
You can use the connection-capability command to set multiple supported
protocols at the same time.
Example
# Set the supported protocol to ICMP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] connection-capability-profile name connection-capability-profile1
[HUAWEI-wlan-co-cap-prof-connection-capability-profile1] connection-capability icmp on
Format
display cellular-network-profile { all | name profile-name }
Parameters
Parameter Description Value
all Displays information about all -
cellular network profiles.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display cellular-network-profile command to view information
about cellular network profiles.
Example
# Display information about all cellular network profiles.
<HUAWEI> display cellular-network-profile all
-------------------------------------------------------------------------------
Profile name Reference
-------------------------------------------------------------------------------
cellular-network-profile1 1
-------------------------------------------------------------------------------
Total: 1
Index PLMN ID
-------------------------------------------------------------------------------
0 10001
-------------------------------------------------------------------------------
Total: 1
Index Index.
Format
display connection-capability-profile { all | name profile-name }
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display connection-capability-profile command to view
information about connection capability profiles.
Example
# Display information about all connection capability profiles.
<HUAWEI> display connection-capability-profile all
-------------------------------------------------------------------------------
Profile name Reference
-------------------------------------------------------------------------------
connection-capability-profile1 1
-------------------------------------------------------------------------------
Total: 1
Item Description
Item Description
Format
display hotspot2-profile { name profile-name | all }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When configuring Hotspot2.0 services, you can run this command to view the
configuration of Hotspot2.0 profiles.
Example
# Display all Hotspot2.0 profiles on a device.
<HUAWEI> display hotspot2-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
hotspot 1
--------------------------------------------------------------------------------
Total: 1
Item Description
Item Description
Format
display nai-realm-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view the configuration of NAI realm profiles.
Example
# Display the configuration of all NAI realm profiles.
<HUAWEI> display nai-realm-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
nai-realm-profile1 1
------------------------------------------------------------
Total: 1
Item Description
Item Description
Item Description
Format
display operating-class-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view the configuration of operating class profiles.
Example
# Display the configuration of all operating class profiles.
<HUAWEI> display operating-class-profile all
-------------------------------------------------------------------------------
Profile name Reference
-------------------------------------------------------------------------------
operating-class-profile1 1
-------------------------------------------------------------------------------
Total: 1
Item Description
Format
display operator-domain-profile { all | name profile-name }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view the configuration of operator domain profiles.
Example
# Display the configuration of all operator domain profiles.
<HUAWEI> display operator-domain-profile all
------------------------------------------------------------
Profile name Reference
------------------------------------------------------------
operator-domain-profile1 1
------------------------------------------------------------
Total: 1
Item Description
Format
display operator-name-profile { all | name profile-name }
Parameters
Parameter Description Value
all Displays information about all -
operator name profiles.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display operator-name-profile command to view information
about an operator name profile.
Example
# Display information about all operator name profiles.
Item Description
Format
display references cellular-network-profile name profile-name
Parameters
Parameter Description Value
name profile-name Displays reference information The cellular network
about a specified cellular network profile must exist.
profile.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references cellular-network-profile command to view
reference information about a cellular network profile.
Example
# Display reference information about the cellular network profile cellular-
network-profile1.
<HUAWEI> display references cellular-network-profile name cellular-network-profile1
-------------------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------------------
hotspot2-profile hotspot
-------------------------------------------------------------------------------
Total: 1
Item Description
Format
display references connection-capability-profile name profile-name
Parameters
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references connection-capability-profile command to
view reference information about a connection capability profile.
Example
# Display reference information about the connection capability profile
connection-capability-profile1.
<HUAWEI> display references connection-capability-profile name connection-capability-profile1
-------------------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------------------
hotspot2-profile hotspot
-------------------------------------------------------------------------------
Total: 1
Item Description
Format
display references hotspot2-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When configuring Hotspot2.0 services, you can run this command to view
reference information about a Hotspot2.0 profile.
Example
# Display reference information about the Hotspot2.0 profile hotspot.
<HUAWEI> display references hotspot2-profile name hotspot
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
VAP profile vap-profile1
-------------------------------------------------------------------
Total:1
Format
display references nai-realm-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view reference information about a NAI realm
profile.
Example
# Display reference information about the NAI realm profile nai-realm-profile1.
<HUAWEI> display references nai-realm-profile name nai-realm-profile1
-------------------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------------------
hotspot2-profile hotspot
-------------------------------------------------------------------------------
Total: 1
Item Description
Format
display references operating-class-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view reference information about an operating class
profile.
Example
# Display reference information about the operating class profile operating-class-
profile1.
<HUAWEI> display references operating-class-profile name operating-class-profile1
-------------------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------------------
hotspot2-profile hotspot
-------------------------------------------------------------------------------
Total: 1
Item Description
Format
display references operator-domain-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the command to view reference information about an operator
domain profile.
Example
# Display reference information about the operator domain profile operator-
domain-profile1.
<HUAWEI> display references operator-domain-profile name operator-domain-profile1
-------------------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------------------
hotspot2-profile hotspot
-------------------------------------------------------------------------------
Total: 1
Item Description
Format
display references operator-name-profile name profile-name
Parameters
Parameter Description Value
name profile-name Displays reference information The operator name
about a specified operator name profile must exist.
profile.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run the display references operator-name-profile command to view
reference information about an operator name profile.
Example
# Display reference information about the operator name profile operator-name-
profile1.
<HUAWEI> display references operator-name-profile name operator-name-profile1
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
hotspot2-profile hotspot
-------------------------------------------------------------------
Total:1
Format
display references roaming-consortium-profile name profile-name
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When configuring Hotspot2.0 services, you can run this command to view
reference information about a roaming consortium profile.
Example
# Display reference information about the roaming consortium profile roaming-
consortium-profile1.
<HUAWEI> display references roaming-consortium-profile name roaming-consortium-profile1
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
hotspot2-profile hotspot
-------------------------------------------------------------------
Total:1
Format
display references venue-name-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a venue name The venue name
name profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When configuring Hotspot2.0 services, you can run this command to view
reference information about a venue name profile.
Example
# Display reference information about the venue name profile venue-name-
profile1.
<HUAWEI> display references venue-name-profile name venue-name-profile1
-------------------------------------------------------------------
Reference type Reference name
-------------------------------------------------------------------
hotspot2-profile hotspot
-------------------------------------------------------------------
Total:1
Format
display roaming-consortium-profile { name profile-name | all }
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When configuring Hotspot2.0 services, you can run this command to view the
configuration of a roaming consortium profile.
Example
# Display the configuration of all roaming consortium profiles on a device.
<HUAWEI> display roaming-consortium-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
roaming-consortium-profile1 1
--------------------------------------------------------------------------------
Total: 1
Item Description
Format
display venue-name-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a venue name The venue name
name profile. profile must exist.
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
Usage Scenario
When configuring Hotspot2.0 services, you can run this command to view the
configuration of venue name profiles.
Example
# Display the configuration of all venue name profiles on a device.
<HUAWEI> display venue-name-profile all
--------------------------------------------------------------------------------
Profile name Reference
--------------------------------------------------------------------------------
venue-name-profile1 1
--------------------------------------------------------------------------------
Total: 1
Item Description
Item Description
17.24 domain-name
Function
The domain-name command configures a domain name for a hotspot operator.
Format
domain-name domain-name
Parameters
Parameter Description Value
Views
Operator domain profile view
Default Level
2: Configuration level
Usage Guidelines
After a domain name is configured for a hotspot operator, terminals can query the
domain name through ANQP to select desired networks.
Example
# Configure domain name attwireless.com for a hotspot operator.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] operator-domain-profile name operator-domain-profile1
[HUAWEI-wlan-op-domain-prof-operator-domain-profile1] domain-name attwireless.com
17.25 hessid
Function
The hessid command configures a Homogenous Extended Service Set Identifier
(HESSID) for a Hotspot2.0 network.
Format
hessid mac-address
undo hessid
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When multiple Hotspot2.0 networks are available, user terminals need to identify
service providers of the connected networks. An SSID is not as unique as an
HESSID, which can uniquely identify APs of the same service provider. Among the
APs, the BSSID of one AP is used as the HESSID. The HESSID is an optional
parameter in a Hotspot2.0 profile. Beacon and Probe Response frames sent from
Hotspot2.0-capable APs carry network parameter information, which helps user
terminals to determine whether network parameters need to be renewed.
Precautions
If the HESSID is configured repeatedly, only the latest HESSID takes effect.
Example
# Set the HESSID to 00e0-fc12-3456 in Hotspot2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] hessid 00e0-fc12-3456
17.26 hotspot2-profile
Function
The hotspot2-profile command creates a Hotspot2.0 profile or displays the view
of an existing Hotspot2.0 profile.
Format
hotspot2-profile name profile-name
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Configure the network type, roaming consortium list, and NAI realm list in the
Hotspot2.0 profile and bind the Hotspot2.0 profile to a VAP profile to make the
configuration take effect.
Precautions
Example
# Create Hotspot2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot]
Format
hotspot2-profile profile-name
undo hotspot2-profile
Parameters
Parameter Description Value
Views
VAP profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
When a VAP profile has been bound to a radio, services will be interrupted when a
Hotspot2.0 profile is bound to or unbound from the VAP profile, or parameters in
the bound Hotspot2.0 profile are modified. Exercise caution when performing this
operation.
Example
# Bind Hotspot2.0 profile hotspot to VAP profile vap-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] vap-profile name vap-profile1
[HUAWEI-wlan-vap-prof-vap-profile1] hotspot2-profile hotspot
17.28 ipv4-address-avail
Function
The ipv4-address-avail command configures available types of IPv4 addresses on
a Hotspot2.0 network.
Format
ipv4-address-avail { not-available | available | port-restricted [ single-nat |
double-nat ] | private { single-nat | double-nat } | unknown }
undo ipv4-address-avail
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When user terminals connect to a Hotspot2.0 network, Hotspot2.0 can transfer
available IPv4 address types as ANQP parameters to the user terminals through
APs. In this way, the user terminals can know the IP address types they can obtain
after connecting to the network.
Example
# Set IPv4 addresses to available in hotspot2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] ipv4-address-avail available
17.29 nai-realm-profile
Function
The nai-realm-profile command creates a NAI realm profile or displays the view
of an existing NAI realm profile.
The undo nai-realm-profile command deletes a NAI realm profile.
By default, no NAI realm profile is available in the system.
Format
nai-realm-profile name profile-name
undo nai-realm-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Specifies the name of a NAI realm The value is a string
name profile. of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A NAI realm profile is used to configure the network access identifier (NAI) realm
name, authentication mode, and authentication parameters for networks
accessible to users.
Precautions
Example
# Create NAI realm profile nai-realm-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] nai-realm-profile name nai-realm-profile1
[HUAWEI-wlan-nai-realm-prof-nai-realm-profile1]
Format
nai-realm-profile profile-name
undo nai-realm-profile
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure Hotspot2.0 services on a non-cellular network. When
connecting to the non-cellular network, user terminals can obtain service provider
information of the network, including the NAI realm name and authentication
mode. This facilitates terminal access. You can run the nai-realm-profile
command to create a NAI realm profile and the nai-realm command in the NAI
realm profile view to configure NAI realms, and then bind the NAI realm profile to
a Hotspot2.0 profile to make the configuration take effect.
Example
# Bind NAI realm profile nai-realm-profile1 to Hotspot2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] nai-realm-profile nai-realm-profile1
17.31 nai-realm
Function
The nai-realm command configures a network access identifier (NAI) realm.
The undo nai-realm command deletes a NAI realm.
By default, no NAI realm is configured.
Format
nai-realm realm-name realm-name [ eap-method-type eap-method-type [ eap-
authen-id eap-authen-id eap-authen-para eap-authen-para ] ]
undo nai-realm realm-name realm-name [ eap-method-type eap-method-type
[ eap-authen-id eap-authen-id ] ]
Parameters
Parameter Description Value
Views
NAI realm profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
After you configure a NAI realm, terminals can access the configured operator
network.
A maximum of 32 NAI realms can be configured using the nai-realm command.
Precautions
● If you configure the same name for NAI realms, the NAI realm with fuzzy
command configuration will overwrite the NAI realm with exact command
configuration.
For example, the nai-realm realm-name attwireless.com command
configuration will overwrite the nai-realm realm-name attwireless.com
eap-method-type eap-aka command configuration, and the nai-realm
realm-name attwireless.com eap-method-type eap-aka command
configuration will overwrite the nai-realm realm-name attwireless.com
eap-method-type eap-aka eap-authen-id 1 eap-authen-para 1 command
configuration.
● NAI realms are deleted according to the longest matching rule.
For example, the NAI realm configured using the nai-realm realm-name
attwireless.com command cannot be deleted using the undo nai-realm
realm-name attwireless.com eap-method-type eap-aka command.
Example
# Configure NAI realm attwireless.com.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] nai-realm-profile name nai-realm-profile1
[HUAWEI-wlan-nai-realm-prof-nai-realm-profile1] nai-realm realm-name attwireless.com
17.32 network-authen-type
Function
The network-authen-type command sets a network authentication type for a
Hotspot2.0 profile.
Format
network-authen-type { acceptance [ redirect-url url ] | dns-redirection | http-
https-redirection redirect-url url | online-enroll }
undo network-authen-type
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Beacon and Probe Response frames sent from Hotspot2.0-capable APs carry
network parameter information, which helps user terminals to discover and select
proper networks. If the network operator requests user terminals to execute
specified actions, for example, opening a web page for Portal authentication, the
Additional Steps Required for Access (ASRA) field must be set to 1, indicating that
user terminals must implement extra authentication when connecting to a
network. You can run the network-authen-type command to specify a network
authentication type.
Example
# Set the network authentication type to online enrollment in Hotspot2.0 profile
hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] network-authen-type online-enroll
17.33 network-type
Function
The network-type command sets a network type and Internet access status in a
Hotspot2.0 profile.
The undo network-type command restores the default network type and Internet
access status.
By default, the network type is set to wildcard, and Internet access is not
supported.
Format
network-type { emergency-service | personal-device | private | private-guest |
public-chargeable | public-free | test | wildcard } [ internet-access ]
undo network-type
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When multiple Hotspot2.0 networks are available, user terminals need to obtain
information of each network to select the network to access. The network type
and Internet access status are mandatory in a Hotspot2.0 profile. Beacon and
Probe Response frames sent from Hotspot2.0-capable APs carry network
parameter information, which helps user terminals to discover and select proper
networks.
Precautions
If the command is executed repeatedly, only the latest configuration takes effect.
Example
# Set the network type to free public network and configure the network to
provide Internet access in Hotspot2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] network-type public-free internet-access
17.34 operating-class-indication
Function
The operating-class-indication command configures an operating class
indication.
Format
operating-class-indication operating-class-value
Parameters
Parameter Description Value
Views
Operating class profile view
Default Level
2: Configuration level
Usage Guidelines
After an operating class indication is configured, users can obtain the indication
through ANQP for network selection.
Example
# Set the operating class indication to 95.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] operating-class-profile name operating-class-profile1
[HUAWEI-wlan-op-class-prof-operating-class-profile1] operating-class-indication 95
17.35 operating-class-profile
Function
The operating-class-profile command creates an operating class profile or
displays the view of an existing operating class profile.
Format
operating-class-profile name profile-name
Parameters
Parameter Description Value
name profile- Indicates the name of the operating class The value is a string
name profile. of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
The operating class profile is used to configure the operating class indication of AP
in on the hotspot2.0 network. When a STA accesses the network, it can obtain
channel information used to access a Wi-Fi frequency from AP so that the STA can
set up a connection.
Precautions
Example
# Create an operating class profile named operating-class-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] operating-class-profile name operating-class-profile1
[HUAWEI-wlan-op-class-prof-operating-class-profile1]
Format
operating-class-profile profile-name
undo operating-class-profile
Parameters
Parameter Description Value
profile-name Indicates the name of the operating class The value must be
profile. the name of an
existing operating
class profile.
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA accesses a Hotspot2.0 network, it can obtain channel information
used to access a Wi-Fi frequency from the AP so that the STA can set up a
connection. Before binding an operating class profile to a Hotspot2.0 profile, you
need to run the operating-class-profile command to create an operating class
profile and run the operating-class-indication command in the profile view to
configure an operating class indication.
Example
# Bind the operating class profile operating-class-profile1 to the hotspot profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] operating-class-profile operating-class-profile1
17.37 operator-domain-profile
Function
The operator-domain-profile command creates a network domain name profile
or displays the view of an existing network domain name profile.
The undo operator-domain-profile command deletes a network domain name
profile.
By default, no network domain name profile is available in the system.
Format
operator-domain-profile name profile-name
undo operator-domain-profile { name profile-name | all }
Parameters
Parameter Description Value
name profile- Indicates the network domain name The value is a string
name profile. of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
A network domain name profile is used to configure the operator domain profile.
STAs can obtain the domain name information through ANQP, which is used as a
basis for network selection.
Precautions
The device supports a maximum of 32 operator domain profiles.
Example
# Create a network domain name profile named operator-domain-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] operator-domain-profile name operator-domain-profile1
[HUAWEI-wlan-op-domain-prof-operator-domain-profile1]
Format
operator-domain-profile profile-name
undo operator-domain-profile
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA accesses the Hotspot2.0 network, it can obtain the network operator
domain name information from the AP so that the STA can select a network.
Before binding an operator domain profile to a Hotspot2.0 profile, run the
operator-domain-profile command to create an operator domain profile and run
the domain-name command in the profile view to configure the operator name.
Example
# Bind the operator domain profile operator-domain-profile1 to the hotspot
profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] operator-domain-profile operator-domain-profile1
17.39 operator-friendly-name
Function
The operator-friendly-name command configures the operator friendly name.
The undo operator-friendly-name command deletes the operator friendly name.
By default, no operator friendly name is configured in an operator name profile
view.
Format
operator-friendly-name language-code language-code name name
undo operator-friendly-name language-code language-code name name
Parameters
Parameter Description Value
name name Indicates the operator friendly name. The value is a string
of 1 to 64 case-
sensitive characters.
● English venue
name: The value
is a string of
visible characters
without question
marks (?) and
spaces. It cannot
begin or end
with double
quotation marks
(" ").
● Non-English
venue name: It
cannot contain
half-width
question marks
(?).
To enter a non-
English venue name,
ensure that the
remote login
terminal supports
the UTF-8 encoding
format; otherwise,
the name cannot be
displayed.
Views
Operator name profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA accesses the Hotspot2.0 network, it can obtain the operator name
from the AP. This command configures the language environment names so that
users can select a proper language.
If you need to enter a non-English name, you must use a tool to convert it into
hexadecimal UTF-8 code.
Precautions
Example
# Set the operator friendly name to operator-name-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] operator-name-profile name operator-name-profile1
[HUAWEI-wlan-op-name-prof-operator-name-profile1] operator-friendly-name language-code eng
name att
17.40 operator-name-profile
Function
The operator-name-profile command creates an operator name profile or
displays the view of an existing operator name profile.
Format
operator-name-profile name profile-name
Parameters
Parameter Description Value
name profile- Indicates the name of the operator name The value is a string
name profile. of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can specify different friendly names for different languages so that users can
select networks.
Follow-up Procedure
Run the operator-name-profile (Hotspot2.0 profile view) command to apply
the created operator name profile to a Hotspot2.0 profile.
Precautions
The device supports a maximum of 32 operator name profiles.
Example
# Create an operator name profile named operator-name-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] operator-name-profile name operator-name-profile1
[HUAWEI-wlan-op-name-prof-operator-name-profile1]
Format
operator-name-profile profile-name
undo operator-name-profile
Parameters
Parameter Description Value
profile-name Indicates the name of the operator name The value must be
profile. the name of an
existing operator
name profile.
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When a STA accesses the Hotspot2.0 network, it can obtain the operator name
from the AP. Before binding an operator name profile to a Hotspot2.0 profile, run
the operator-name-profile command to create an operator name profile and run
the operating-class-indication command in the profile view to configure the
operator name.
Example
# Bind the operator name profile operator-name-profile1 to the hotspot profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] operator-name-profile operator-name-profile1
Format
p2p-cross-connect disable
Parameters
None.
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Hotspot2.0 provides security measures for STAs. It prevents direct access between
STAs to reduce the STA attack possibility. The P2P protocol allows direct
communication between STAs; therefore, a Hotspot2.0-supported AP can add P2P
management information into Beacon. In the management information, STAs are
not allowed to set up P2P connections with each other.
Precautions
The p2p-cross-connect disable command is not recommended. An AP does not
support the P2P protocol or process P2P packets; therefore, it is unnecessary to
remove P2P management information from packets.
Example
# Configure P2P management information in the hotspot profile.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] p2p-cross-connect disable
17.43 plmn-id
Function
The plmn-id command configures the Public Land Mobile Network (PLMN)
identifier.
The undo plmn-id command deletes the PLMN identifier.
By default, no PLMN identifier is configured in the cellular network profile.
Format
plmn-id plmn-id
undo plmn-id plmn-id
Parameters
Parameter Description Value
Views
Cellular network profile view
Default Level
2: Configuration level
Usage Guidelines
After the plmn-id command is executed, the AP notifies STAs of the operator
information on the Hotspot2.0 network. The STAs can obtain the PLMN identifier
to determine whether to select the cellular network according to the Hotspot2.0
network.
If you run the plmn-id multiple times, multiple PLMN identifiers are configured. A
maximum of 32 PLMN identifiers can be configured.
Example
# Set the PLMN identifier to 10001.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] cellular-network-profile name cellular-network-profile1
[HUAWEI-wlan-cellular-network-prof-cellular-network-profile1] plmn-id 10001
17.44 roaming-consortium-oi
Function
The roaming-consortium-oi command configures the roaming consortium
identifier of the Hotspot2.0 network.
Format
roaming-consortium-oi oi-value [ in-beacon ]
Parameters
Parameter Description Value
Views
Roaming consortium profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
If STAs may roam between the Hotspot2.0 network and a network of another
operator, you can configure the OI of the operator that provides the roaming
service so that STAs can select networks.
Precautions
If you run this command multiple times, multiple OIs are configured. A maximum
of 32 OIs can be configured in a roaming consortium profile. To configure OIs in
the roaming consortium profile, the first OI must carry the in-beacon parameter.
A maximum of three OIs can be configured to carry the in-beacon parameter.
Example
# Add an OI 00-11-22 to the profile roaming-consortium-profile1 and add the
OI to the Beacon and probe-response frames sent by the AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] roaming-consortium-profile name roaming-consortium-profile1
[HUAWEI-wlan-ro-co-prof-roaming-consortium-profile1] roaming-consortium-oi 00-11-22 in-beacon
17.45 roaming-consortium-profile
Function
The roaming-consortium-profile command creates a roaming consortium profile
or displays the view of an existing roaming consortium profile.
Format
roaming-consortium-profile name profile-name
Parameters
Parameter Description Value
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Follow-up Procedure
Precautions
Example
# Create the roaming consortium profile roaming-consortium-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] roaming-consortium-profile name roaming-consortium-profile1
[HUAWEI-wlan-ro-co-prof-roaming-consortium-profile1]
Format
roaming-consortium-profile profile-name
undo roaming-consortium-profile
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure Hotspot2.0 services for networks. When user terminals connect
to the networks, they can obtain OIs of the operators used for STA roaming, which
helps them select desired networks. You can run the roaming-consortium-profile
command to create a roaming consortium profile and the roaming-consortium-oi
command in the roaming consortium profile view to configure operator OIs, and
then bind the roaming consortium profile to a Hotspot2.0 profile to make the
configuration take effect.
Example
# Bind roaming consortium profile roaming-consortium-profile1 to the Hotspot
2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] roaming-consortium-profile roaming-consortium-profile1
17.47 venue-name-profile
Function
The venue-name-profile command creates a venue name profile or displays the
view of an existing venue name profile.
Format
venue-name-profile name profile-name
Parameters
Parameter Description Value
name profile- Specifies the name of a venue name The value is a string
name profile. of 1 to 35 case-
insensitive
characters. It does
not contain
question marks (?)
or spaces, and
cannot start or end
with double
quotation marks ("
").
Views
WLAN view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When configuring Hotspot2.0 services, configure network parameters according to
operator requirements. When connecting to networks, user terminals can obtain
the network parameters to select desired networks. The venue name describes
physical locations of a network and is an optional parameter.
Follow-up Procedure
Run the venue-name command in the venue name profile view to configure the
venue name. After creating a venue name profile, bind it to a Hotspot2.0 profile.
Precautions
The device supports a maximum of 32 venue name profiles.
Example
# Create the venue name profile venue-name-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] venue-name-profile name venue-name-profile1
[HUAWEI-wlan-ve-na-prof-venue-name-profile1]
Format
venue-name-profile profile-name
undo venue-name-profile
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can configure Hotspot2.0 services for networks. When connecting to the
networks, user terminals can obtain location information of the networks from
APs, which helps them to select desired networks. You can run the venue-name-
profile command to create a venue name profile and the venue-name command
in the venue name profile view to configure venue names, and then bind the
venue name profile to a Hotspot2.0 profile to make the configuration take effect.
Example
# Bind venue name profile venue-name-profile1 to Hotspot2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] venue-name-profile venue-name-profile1
17.49 venue-name
Function
The venue-name command configures a venue name for a Hotspot 2.0 network.
The undo venue-name command deletes the configured venue name.
By default, no venue name is configured.
Format
venue-name language-code language-code name venue-name
undo venue-name language-code language-code name venue-name
Parameters
Parameter Description Value
Views
Venue name profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
You can use the command to configure venue names for Hotspot 2.0 networks to
identify physical locations of the networks, which helps user terminals select
desired networks. You can set the venue names in multiple languages for user
groups of different languages.
Precautions
Example
# Set the language to English and configure the venue name CenterStation in
venue name profile venue-name-profile1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] venue-name-profile name venue-name-profile1
[HUAWEI-wlan-ve-na-prof-venue-name-profile1] venue-name language-code eng name CenterStation
17.50 venue-type
Function
The venue-type command configures the venue type of a Hotspot2.0 network.
Format
venue-type group-code venue-group type-code type-code-value
undo venue-type
Parameters
Parameter Description Value
Views
Hotspot2.0 profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When multiple Hotspot2.0 networks are available, user terminals need to obtain
information of each network to select the network to access. The venue type
information is optional in a Hotspot2.0 profile. Beacon and Probe Response frames
sent from Hotspot2.0-capable APs carry network parameter information, which
helps user terminals to discover and select proper networks.
group-code and type-code determine the venue type and identify the network
location. As predefined in the 802.11u protocol:
● If group-code is set to 2 (Business) and type-code to 3, the venue type
indicates Fire Station.
● If group-code is set to 3 (Educational) and type-code to 3, the venue type
indicates University or College.
Precautions
If the command is executed repeatedly, only the latest configuration takes effect.
Example
# Set the venue type to University or College in Hotspot2.0 profile hotspot.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] hotspot2-profile name hotspot
[HUAWEI-wlan-hotspot2-prof-hotspot] venue-type group-code 3 type-code 3
IoT cards are supported only by the following models in cloud mode:
● AP2050DN, AP2050DN-E, AP2050DN-S, AP2051DN, AP2051DN-E, AP2051DN-
S, AP4030TN, AP4050DN-E, AP4051DN, AP4051DN-S, AP4051TN, AP4151DN,
AP5050DN-S, AP6050DN, AP6052DN, AP6150DN, AP7050DE, AP7050DN-E,
AP7052DE, AP7052DN, WA375DD-CE, AP7060DN, AirEngine 5760-10,
AP7152DN, AP6750-10T, R250D-E, R251D-E
Format
iot-card reboot ap card { card-id | usb }
Parameters
Parameter Description Value
ap Specifies an AP. -
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
The iot-card reboot command resets an IoT card of an AP.
Example
# Reset an IoT card on the USB interface of the AP.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] iot-card reboot ap card usb
Format
iot-card reset-factory-configuration ap card card-id
Parameters
ap Specifies an AP. -
card card-id Specifies the ID of an IoT card. The IoT card ID must exist.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
If an IoT card cannot communicate with the AP due to an error in IoT card
parameter settings, you can run this command to restore factory defaults of the
IoT card.
Example
# Restore factory defaults of an IoT card.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] iot-card reset-factory-configuration ap card 1
Format
iot-card reset-network-configuration ap card card-id
Parameters
Parameter Description Value
ap Specifies an AP. -
card card-id Specifies the ID of an IoT card. The IoT card ID must exist.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
An IoT card involves network parameters for communicating with a host computer
(such as the card IP address, server IP address, and DNS address) and air interface
parameters in a wireless environment. In most cases, when the wireless
environment becomes stable, air interface parameters remain unchanged. When
the wired environment changes, you can only run the iot-card reset-network-
configuration command to reset network parameters of the IoT card. During this
process, the air interface parameters remain unchanged.
Example
# Reset network parameters of an IoT card.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] iot-card reset-network-configuration ap card 1
Format
iot-card switch-firmware ap card card-id
Parameters
Parameter Description Value
ap Specifies an AP. -
card card-id Specifies the ID of an IoT card. The IoT card ID must exist.
Views
WLAN view
Default Level
3: Management level
Usage Guidelines
Usage Scenario
Upon a fault on the current partition of an IoT card, you can run this command to
switch to the other partition.
Example
# Switch the active and standby partitions of an IoT card.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] iot-card switch-firmware ap card 1
Function
The broadcast-suppression auto-detect command configures the rate limit for
broadcast packets during intelligent flow control.
Format
broadcast-suppression auto-detect packets packets
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When there are a large number of broadcast, multicast, and unknown unicast
packets, the CPU becomes busy processing these packets and the buffer of the
packet receiving queue decreases. When the buffer falls below the threshold, the
device automatically limits the rates of these within the specified range. You can
run this command to specify a rate limit during intelligent flow control as
required.
Precautions
Rate limiting takes effect only for incoming upstream and downstream traffic.
Example
# Set the rate limit for broadcast packets during intelligent flow control to 300
pps.
<HUAWEI> system-view
[HUAWEI] broadcast-suppression auto-detect packets 300
Format
display wlan igmp-snooping vap-cac ap-id ap-id
Parameters
Parameter Description Value
Views
All views
Default Level
1: Monitoring level
Usage Guidelines
You can run this command to check the multicast CAC configuration and statistics
on a VAP, including the bandwidth and user statistics.
Example
# Display the multicast CAC configuration and statistics on VAPs of the AP with ID
0.
<HUAWEI> display wlan igmp-snooping vap-cac ap-id 0
Info: This operation may take a few seconds, please wait.done.
Rf : Radio ID WID : WLAN ID
CurBw : Current bandwidth(kbps) MaxBw : Max bandwidth(kbps)
CurUser : Current user number MaxUser : Max user number
BwUtilization : Bandwidth utilization UserUtilization : User utilization
--------------------------------------------------------------------------------
Rf WID CurBw/MaxBw BwUtilization CurUser/MaxUser UserUtilization
--------------------------------------------------------------------------------
0 1 0/11 0% 0/6 0%
--------------------------------------------------------------------------------
Total: 1
Rf Radio ID.
Format
igmp-snooping max-bandwidth max-bandwidth
undo igmp-snooping max-bandwidth
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
After configuring the maximum multicast bandwidth for a VAP, run the igmp-
snooping group-bandwidth (system view) command to configure the
bandwidth of global multicast groups.
Example
# Set the maximum multicast bandwidth to 500 kbps in traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] igmp-snooping max-bandwidth 500
Format
igmp-snooping max-user max-user
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
The maximum number of multicast group memberships on a VAP is configured in
a traffic profile to limit access of multicast users on the VAP to which this traffic
profile is bound. When the number of multicast group memberships on a VAP
reaches the maximum value, new users are prevented from joining multicast
groups.
Example
# Set the maximum number of multicast group memberships to 10 on the VAP to
which traffic profile p1 is bound.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] igmp-snooping max-user 10
Function
The igmp-snooping enable command enables IGMP snooping in a traffic profile.
Format
igmp-snooping enable
Parameters
None
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
IGMP snooping is a basic Layer 2 multicast function that forwards and controls
multicast traffic at the data link layer. IGMP snooping runs on a Layer 2 device
and analyzes IGMP messages exchanged between a Layer 3 device and hosts to
set up and maintain a Layer 2 multicast forwarding table. The Layer 2 device
forwards multicast packets based on the Layer 2 multicast forwarding table.
After you disable IGMP snooping in a traffic profile using the undo igmp-
snooping enable command, all IGMP snooping configurations in the traffic profile
are deleted. When you run the igmp-snooping enable command to enable IGMP
snooping again, all IGMP snooping configurations are restored to the default
settings on the device.
Prerequisites
The traffic profile has been created using the traffic-profile (WLAN view)
command.
Example
# Enable IGMP snooping in traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] igmp-snooping enable
Function
The multicast-suppression auto-detect command configures the rate limit for
multicast packets during intelligent flow control.
Format
multicast-suppression auto-detect packets packets
Parameters
Parameter Description Value
Views
System view
Default Level
2: Configuration level
Usage Guidelines
Precautions
Rate limiting takes effect only for incoming upstream and downstream traffic.
Example
# Set the rate limit for multicast packets during intelligent flow control to 300 pps.
<HUAWEI> system-view
[HUAWEI] multicast-suppression auto-detect packets 300
19.7 service-guarantee
Function
The service-guarantee command configures the service guarantee mode.
Format
service-guarantee { performance-first | reliability-first }
undo service-guarantee
Parameters
Parameter Description Value
Views
SSID profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
Precautions
Changing the service guarantee mode will interrupt services of associated STAs.
Example
# Set the service guarantee mode to reliability-first.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] ssid-profile name ssid1
[HUAWEI-wlan-ssid-prof-ssid1] service-guarantee reliability-first
The undo traffic-optimize arp-proxy enable command disables ARP proxy on the
device.
Format
traffic-optimize arp-proxy enable
Parameters
None
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
When an ARP Request packet is sent from a user or the network to another user,
the AP enabled with ARP proxy can reply to this packet. Compared with the
function of converting ARP multicast packets to ARP unicast packets, ARP proxy
can reduce the number of times a sleeping terminal is awakened to save power.
Precautions
Example
# Enable ARP proxy on the device in the traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] traffic-optimize arp-proxy enable
The undo traffic-optimize bcmc deny all command cancels the configuration of
forbidding an air interface to forward downstream broadcast or multicast packets.
Format
traffic-optimize bcmc deny all
Parameters
None
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario
On an IP network, the ARP, ND, and DHCP protocols are the basic network
protocols and serve as the basis for packet forwarding on the entire network.
Broadcast or multicast packets of protocols other than the ARP, ND, and DHCP
protocols are optional on the IP network. When no services rely on transmission of
these broadcast or multicast packets on the network, you can run the command
to forbid an air interface to forward these broadcast or multicast packets to
improve the air interface performance.
Precautions
Example
# Forbid an air interface to forward downstream broadcast or multicast packets in
the traffic profile p1.
<HUAWEI> system-view
[HUAWEI] wlan
[HUAWEI-wlan-view] traffic-profile name p1
[HUAWEI-wlan-traffic-prof-p1] traffic-optimize bcmc deny all
Format
traffic-optimize bcmc unicast-send { arp | dhcp } *
Parameters
Parameter Description Value
Views
Traffic profile view
Default Level
2: Configuration level
Usage Guidelines
Usage Scenario