NetEngine 8000 M14, M8 and M4 V800R023C00SPC500 Configuration Guide 04 Interface and Data Link
NetEngine 8000 M14, M8 and M4 V800R023C00SPC500 Configuration Guide 04 Interface and Data Link
NetEngine 8000 M14, M8 and M4 V800R023C00SPC500 Configuration Guide 04 Interface and Data Link
Configuration Guide
Issue 01
Date 2023-09-30
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: support@huawei.com
Contents
1 Configuration............................................................................................................................1
1.1 Interface and Data Link........................................................................................................................................................ 1
1.1.1 Interface Management Configuration.......................................................................................................................... 1
1.1.1.1 Interface Management Feature Description........................................................................................................... 1
1.1.1.1.1 Overview of Interface Management...................................................................................................................... 1
1.1.1.1.2 Understanding Interface Management................................................................................................................. 2
1.1.1.1.3 Interface Management Application..................................................................................................................... 50
1.1.1.2 Interface Management Configuration.................................................................................................................... 65
1.1.1.2.1 Overview of Interface Management.................................................................................................................... 66
1.1.1.2.2 Feature Requirements for Interface Management..........................................................................................78
1.1.1.2.3 Interface Basics Configuration............................................................................................................................... 78
1.1.1.2.4 Configuring the Physical Link Detection Function.......................................................................................... 88
1.1.1.2.5 Configuring MAC Accounting................................................................................................................................. 95
1.1.1.2.6 Configuring Strict Filter for EVC Sub-Interfaces.............................................................................................. 96
1.1.1.2.7 Enabling the Signal Sending Delay Function.................................................................................................... 97
1.1.1.2.8 Configuring an Interval for Updating Interface Statistics in the Cache...................................................98
1.1.1.2.9 Configuring a Trap Threshold for Sudden Changes in the Traffic Rate on Global Interfaces..........99
1.1.1.2.10 Enabling or Disabling the Optical Module Laser........................................................................................100
1.1.1.2.11 Configuring the Optical Module Mode of an Interface............................................................................102
1.1.1.2.12 Enabling the Optical Module Alarm Threshold Standardization Function........................................103
1.1.1.2.13 Disabling the Optical Module Alarm Function............................................................................................103
1.1.1.2.14 Managing Non-Huawei-Certified Optical Modules................................................................................... 104
1.1.1.2.15 Configuring SerDes Polarity Inversion............................................................................................................ 105
1.1.1.2.16 Configuring the Control-Flap Function.......................................................................................................... 105
1.1.1.2.17 Logical Interface Configuration........................................................................................................................ 107
1.1.1.2.18 FlexE Interface Configuration............................................................................................................................ 112
1.1.1.2.19 Interface Group Configuration.......................................................................................................................... 127
1.1.1.2.20 Configuring an Interface Monitoring Group................................................................................................ 128
1.1.1.2.21 Maintaining Interfaces......................................................................................................................................... 131
1.1.1.2.22 Configuration Examples for Interface Management................................................................................. 132
1.1.2 Transmission Alarm Customization and Suppression Configuration............................................................ 139
1.1.2.1 Transmission Alarm Customization and Suppression Feature Description..............................................140
1.1.2.1.1 Overview of Transmission Alarm Customization and Suppression.........................................................140
1 Configuration
Definition
An interface is a point of interaction between devices on a network. Interfaces are
classified into physical and logical interfaces.
● Physical interfaces physically exist on boards.
● Logical interfaces are manually configured interfaces that do not exist
physically. They are used to exchange data.
Purpose
A physical interface connects a device to another device using a transmission
medium (for example, a cable). The physical interface and transmission medium
together form a transmission channel that transmits data between the devices.
Before data reaches a device, it must pass through the transmission channel. In
addition, sufficient bandwidth must be provided to reduce channel congestion.
Generally, a switching device provides multiple interfaces, many of which have the
same configuration. To simplify the configuration of interfaces, create an interface
group and add interfaces to the interface group. When you run a command in the
interface group view, the system automatically applies the command to all the
Benefits
Interface management brings the following benefits to users:
● Data can be transmitted properly over a transmission channel that a physical
interface and a transmission medium form, therefore enabling communication
between users.
● Data communication can be implemented using logical interfaces, without
additional hardware requirements.
● An interface group can be used to implement batch interface configurations,
simplifying interface configurations and reducing management costs.
Basic Concepts
Interface Types
Devices exchange data and interact with other devices on a network through
interfaces. Interfaces are classified into physical and logical interfaces.
● Physical Interfaces
Physical interfaces physically exist on boards. They are divided into the
following types:
– LAN interfaces: interfaces through which the router can exchange data
with other devices on a LAN.
– WAN interfaces: interfaces through which the router can exchange data
with remote devices on external networks.
● Logical Interfaces
Logical interfaces are manually configured interfaces that do not exist
physically. Logical interfaces can be used to exchange data.
Table 1-1 Commands, views, and prompts of physical interfaces supported by the
NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M
Interface Command View Oper Prompt
Name ation
Major link layer protocols supported by the NetEngine 8100 M, NetEngine 8000E
M, NetEngine 8000 M are listed as follows:
● Ethernet
Currently, the LAN mostly refers to the Ethernet. The Ethernet is a broadcast
network, which is flexible and simple in configuration as well as easy to
expand. For these reasons, the Ethernet is widely used.
● Trunk
Trunks can be classified into Eth-Trunks and IP-Trunks. An Eth-Trunk must be
composed of Ethernet links, and an IP-Trunk must be composed of POS links.
The trunk technology has the following advantages:
– Bandwidth increase: The bandwidth of a trunk is the total bandwidth of
all member interfaces.
– Reliability enhancement: When a link fails, other links in the same trunk
automatically take over the services on the faulty link to prevent traffic
interruption.
● PPP
The Point-to-Point Protocol (PPP) is used to encapsulate IP packets on serial
links. It supports both the asynchronous transmission of 8-bit data without
the parity check and the bit-oriented synchronous connection.
PPP consists of the Link Control Protocol (LCP) and the Network Control
Protocol (NCP). LCP is used to create, configure, and test links; NCP is used to
control different network layer protocols.
● HDLC
The High-Level Data Link Control (HDLC) is a suite of protocols that are used
to transmit data between network nodes. HDLC is widely used at the data link
layer.
In HDLC, the receiver responds with an acknowledgment when it receives
frames transmitted over the network. In addition, HDLC manages data flows
and the interval at which data packets are transmitted.
MTU
The maximum transmission unit (MTU) is the size (in bytes) of the longest packet
that can be transmitted on a physical network. The MTU is very important for
interworking between two devices on a network. If the size of a packet exceeds
the MTU supported by a transit node or a receiver, the transit node or receiver
may fragment the packet before forwarding it or may even discard it, increasing
the network transmission loads. MTU values must be correctly negotiated
between devices to ensure that packets reach the receiver.
● If fragmentation is disallowed, packet loss may occur during data
transmission at the IP layer. To ensure that long packets are not discarded
during transmission, configure forcible fragmentation for long packets.
● When an interface with a small MTU receives long packets, the packets have
to be fragmented. Consequently, when the quality of service (QoS) queue
becomes full, some packets may be discarded.
● If an interface has a large MTU, packets may be transmitted at a low speed.
Loopback
The physical interface of the router supports loopback local and loopback
remote. The following figure shows the two loopback paths.
● loopback local
The differences between local loopback and optical fiber loopback based on
optical modules are as follows: In the local loopback mode, service traffic
does not pass through the Framer's optical module driver circuit. During the
forwarding tests, only a few boards inserted with optical modules perform
optical fiber loopback to test the Framer's optical module driver circuit. Local
loopback can be configured on the interfaces to test the forwarding
performance and stability, which saves materials.
Redirection is a class behavior of a QoS policy. Redirection can change the IP
packets' next-hop IP addresses and outbound interfaces, and apply to specific
interfaces to change the IP service forwarding destination. When redirection
works with interface loopback, you can use the interface connected to the
tester to test all the interfaces on the board. If only loopback local is
configured on the interface and redirection is not configured or the
configured policy is not matched, the system does not forward packets.
Local loopback can also verify system functions. Take the mirroring function
as an example. Due to limited materials, you can run the loopback local
command on the observing interface to monitor the traffic and verify whether
the function takes effect.
● loopback remote
Remote loopback is used for fault diagnosis at the physical layer. You can
check physical link quality through the subcard statistics, interface status, or
other parameters.
As shown in the preceding figure, after the interface with loopback remote
configured receives a packet from A, B does not forward the packet based on
the destination address. Instead, B directly returns the packet through another
interface (Layer 2 or Layer 3 interface) to A.
The processing on A when A receives the returned packet from B is as follows:
– If the interface on A is a Layer 3 interface, Ping packets looped back from
B is discarded by A because the destination MAC address is different from
the MAC address of the interface on End A. However, interface statistics
exist on the subcard. You can check physical link quality by the Input and
Output fields on the interface.
– If the interface on A is a Layer 2 interface, the interface cannot
successfully transmit Ping packets. If a tester or other methods are used
for A to transmit a packet, A does not check the MAC address of the
packet looped back from B, and instead, A directly forwards the packet
based on the MAC address.
▪ If A sends the packet with the MAC address of the peer device as the
destination MAC address, the packet is repeatedly looped back
between the two devices.
Control-Flap
The status of an interface on a device may alternate between up and down for
various reasons, including physical signal interference and incorrect link layer
configurations. The changing status causes routing protocols and Multiprotocol
Label Switching (MPLS) to flap. As a result, the device may break down, causing
network interruption. Control-flap controls the frequency of interface status
alternations between up and down to minimize the impact on device and network
stability.
● control-flap
Interface flapping control controls the frequency of interface status
alternations between Up and Down to minimize the impact on device and
network stability.
Interface flapping suppression involves the following concepts:
– Penalty value and threshold
An interface is suppressed or freed from suppression based on the
penalty value.
Configuration Recommendations
Objective
suppress reuse decay-ok decay-ng
suppress
reuse
decay-ok and
decay-ng
● damp-interface
Related concepts:
– penalty value: a value calculated by a suppression algorithm based on
an interface's flappings. The suppression algorithm increases the penalty
value by a specific value each time an interface goes down and decreases
the penalty value exponentially each time the interface goes up.
– suppress: An interface is suppressed if the interface's penalty value is
greater than the suppress value.
– reuse: An interface is no longer suppressed if the interface's penalty value
is less than the reuse value.
– ceiling: calculated using the formula of reuse x 2 (MaxSuppressTime/
HalfLifeTime). ceiling is the maximum penalty value. An interface's penalty
At t1, an interface goes down, and its penalty value increases by 1000. Then,
the interface goes up, and its penalty value decreases exponentially based on
the half-life rule. At t2, the interface goes down again, and its penalty value
increases by 1000, reaching 1600, which has exceeded the suppress value
1500. At this time if the interface goes up again, its status is suppressed. As
the interface keeps flapping, its penalty value keeps increasing until it reaches
the ceiling value 10000 at tA. As time goes by, the penalty value decreases
and reaches the reuse value 750 at tB. The interface status is then no longer
suppressed.
NOTE
Loopback interfaces, Layer 2 interfaces that are converted from Layer 3 interfaces using the
portswitch command, and Null interfaces do not support MTU or control-flap
configuration.
Logical Interface
A single physical interface can be virtually split into multiple logical interfaces.
Logical interfaces can be used to exchange data.
FlexE
Definition
Flexible Ethernet (FlexE) is an interface technology that implements service
isolation and network slicing on a bearer network. Based on the standard Ethernet
technology defined in IEEE 802.3, FlexE decouples the MAC layer from the PHY
layer by adding a FlexE shim layer between them (for its implementation, see
Figure 1-5). With FlexE, the one-to-one mapping between MACs and PHYs is not
a must any more, and M MACs can be mapped to N PHYs, thereby implementing
flexible rate matching. For example, one 100GE PHY can be divided into a pool of
twenty 5 Gbit/s timeslots, and service interfaces can flexibly apply for separate
bandwidth from this pool.
Purpose
The need for higher mobile bearer bandwidth is increasing as 5G networks
continue to evolve. In addition, customers want a unified network to transmit
various services, such as home broadband, private line access, and mobile bearer
services. These factors place increasingly higher requirements on
telecommunication network interfaces.
When standard Ethernet interfaces are used as telecommunication network
interfaces, the following issues exist:
● More flexible bandwidth granularities are not supported: Diverse services and
application scenarios require Ethernet interfaces to provide more flexible
bandwidth granularities without being restricted by the rate ladder (10
Gbit/s–25 Gbit/s–40 Gbit/s–50 Gbit/s–100 Gbit/s–200 Gbit/s–400 Gbit/s)
defined by IEEE 802.3. It may take years for IEEE 802.3 to define a new
interface standard, which cannot meet the requirements of application
changes. Furthermore, formulating an interface standard for each bandwidth
requirement is impossible, and therefore other interface solutions are
required.
● The Ethernet interface capability of IP devices depends on the capability of
optical transmission devices, and their development is not synchronous: For
example, optical transmission devices do not have 25GE or 50GE interfaces.
However, when IP and optical transmission devices are interconnected, the
link rate of the optical transmission device must strictly match the Ethernet
rate of the corresponding User-to-Network Interface (UNI).
● Enhanced QoS capability for multi-service bearing is not supported: Standard
Ethernet interfaces perform scheduling based on QoS packet priorities. As a
result, long packets will block the pipe, increasing the latency of short
packets. In this case, services affect each other.
FlexE resolves these issues by:
● Supporting more flexible bandwidth granularities: FlexE supports the flexible
configuration of interface rates, which may or may not correspond to the
interface rates defined in the existing IEEE 802.3 standard. This meets the
requirement for diverse services and application scenarios.
● Decoupling from the capability of optical transmission devices: The Ethernet
interface rate of IP devices is decoupled from the link rate of optical
transmission devices, meaning that the link rate of optical transmission
devices does not need to strictly match the Ethernet rate of a UNI. In this way,
the existing optical transmission network (OTN) can be utilized to the
maximum extent to support Ethernet interfaces with new bandwidths.
● Supporting the enhanced QoS capability for multi-service bearing: FlexE
provides channelized hardware isolation on physical-layer interfaces to
implement hard slicing for SLA assurance and isolated bandwidth for services.
FlexE involves three concepts: FlexE client, FlexE shim, and FlexE group.
● FlexE client: corresponds to an externally observed user interface that
functions in the same way as traditional service interfaces on existing IP/
Ethernet networks. FlexE clients can be configured flexibly to meet specific
bandwidth requirements. They support Ethernet MAC data streams of various
rates (including 10 Gbit/s, 40 Gbit/s, N x 25 Gbit/s, and even non-standard
rates), and the Ethernet MAC data streams are transmitted to the FlexE shim
layer as 64B/66B encoded bit streams.
● FlexE shim: functions as a layer that maps or demaps the FlexE clients carried
over a FlexE group. It decouples the MAC and PHY layers and implements key
FlexE functions through calendar timeslot distribution.
● FlexE group: consists of various Ethernet PHYs defined in IEEE 802.3. By
default, the PHY bandwidth is divided based on the 5 Gbit/s timeslot
granularity.
Bonding
As shown in Figure 1-7, bonding means that multiple PHYs are bonded to support
a higher rate. For example, two 100GE PHYs can be bonded to provide a MAC rate
of 200 Gbit/s.
Channelization
As shown in Figure 1-8, channelization allows multiple low-rate MAC data
streams to share one or more PHYs. For example, channelization allows two MAC
data streams (75 Gbit/s and 25 Gbit/s) to be carried over one 100GE PHY or
allows three MAC data streams (150 Gbit/s, 125 Gbit/s, and 25 Gbit/s) to be
carried over three 100GE PHYs.
Sub-rating
As shown in Figure 1-9, sub-rating allows MAC data streams with a single low
rate to share one or more PHYs, and uses a specially defined error control block to
reduce the rate. For example, a 100GE PHY carries only 50 Gbit/s MAC data
streams.
Sub-rating is a subset of channelization in a certain sense.
Calendar Mechanism
Figure 1-11 shows the calendar mechanism of the FlexE shim. Twenty blocks
(corresponding to timeslots 0 to 19) are used as a logical unit, and 1023 "twenty
blocks" are then used as a calendar component. The calendar components are
distributed in a specified order into timeslots, each of which has a bandwidth
granularity of 5 Gbit/s for data transmission.
NOTE
In terms of bit streams, each 64B/66B block is carried over a timeslot (basic logical unit
carrying the 64B/66B block), as shown in Figure 1-11.
Figure 1-12 shows the format of an overhead frame, which consists of eight
overhead blocks. The first three overhead blocks carry the mappings between
timeslots and FlexE clients and between timeslots and FlexE groups, and the
remaining ones carry management messages, such as DCN and 1588v2 messages.
value is 00 or 11, the field is invalid; and if the value is ss, the synchronization
header is valid and may be 10 or 01.
In an overhead frame, the first overhead block is a control block, the second and
third overhead blocks are data blocks, and the fourth to eighth overhead blocks
are allocated to management or synchronization messaging channels. Table 1-7
describes the meaning of each field in an overhead frame.
SC 1 Indicates the
synchronization
configuration. The value
0 indicates that the
shim-to-shim
management channel
occupies the sixth to
eighth overhead blocks
of the overhead frame;
the value 1 indicates that
the shim-to-shim
management channel
occupies the seventh and
eighth overhead blocks
of the overhead frame
(the sixth overhead block
is allocated to the
synchronization
messaging channel).
CR 1 Indicates a calendar
switch request.
CA 1 Indicates a calendar
switch acknowledge.
Synchronization 64 A synchronization
Messaging Channel messaging channel is
used to transmit clock
messages, such as
1588v2 messages,
between adjacent FlexE
nodes.
NOTE
Synchronous framing involves the SH, 0x4B, 0x5, and OMF fields in the data receive
direction, and is used to identify the first overhead block of the overhead frame. If the SH,
0x4B, and 0x5 fields do not match the expected positions for five times, the FlexE overhead
multiframe is unlocked, indicating that the received 32 overhead frames are not from the
same overhead multiframe. As a result, the restored timeslot information is incorrect. In
addition, if the OMF field passes the CRC, the overhead multiframe is locked when the bit
changes from 0 to 1 or from 1 to 0. If an error occurs in a frame, the overhead multiframe
is unlocked.
NOTE
The 1 Gbit/s timeslot granularity is a sub-timeslot of a 5 Gbit/s timeslot and takes effect
only in the 5 Gbit/s timeslot. If the bandwidth exceeds 5 Gbit/s, the 5 Gbit/s timeslot
granularity is used.
After the interfaces are switched to the FlexE mode, the link connection is
automatically added to the topology of the NMS. In addition, the DCN function is
enabled by default to allow the NMS to manage the devices.
After a standard Ethernet interface is switched to the FlexE mode, the original
standard Ethernet interface disappears. A FlexE client needs to be determined
based on the defined rules to carry the bandwidth and configuration of the
original standard Ethernet interface, implementing configuration restoration. As
shown in Figure 1-18, the configuration restoration process is as follows:
1. The configurations of the standard Ethernet interfaces are saved on the NMS,
and the standard Ethernet interfaces of the upstream and downstream NEs
are switched to the FlexE mode.
2. FlexE clients are created based on the defined rules to carry the bandwidth of
the original standard Ethernet interfaces.
3. The configurations of the original standard Ethernet interfaces are restored to
the created FlexE clients.
Figure 1-18 Configuration restoration after the standard Ethernet interfaces are
switched to the FlexE mode
The time synchronization modes at the two ends of a FlexE link must be the same (either
the OH or Client mode).
1. Each FlexE client is presented to the FlexE shim as a 64B/66B encoded bit
stream.
2. A FlexE client is rate-adapted in idle insertion/deletion mode to match the
clock of the FlexE group. The rate of the adapted signal is slightly less than
the nominal rate of the FlexE client to allow room for the alignment markers
on the PHYs of the FlexE group and insertion of the FlexE overhead.
3. The 66B blocks from each FlexE client are sequentially distributed and
inserted into the calendar.
4. Error control blocks are generated for insertion into unused or unavailable
timeslots to ensure that the data in these timeslots is not considered valid.
5. The control function manages which timeslots each FlexE client is inserted
into and inserts the FlexE overhead on each PHY in the transmit direction.
6. Calendar distribution is responsible for allocating the 66B blocks of different
FlexE clients in the calendar to a sub-calendar according to the TDM timeslot
1. The lower layers of the PCS of the PHYs are used according to the standard
Ethernet defined by IEEE 802.3. The PCS lanes complete operations such as
deskewing and alignment marker removal, and send traffic to the FlexE shim.
2. The calendar logically interleaves the sub-timeslots of each FlexE instance, re-
orders them, and extracts the FlexE overhead.
3. If any PHY in the FlexE group fails or overhead frame/multiframe locking is
not implemented for any FlexE instance, all FlexE clients in the FlexE group
generate local faults (LFs).
4. The control function manages the timeslots extracted by each FlexE client
from each FlexE instance in the receive direction.
5. The extracted timeslots are sent to each FlexE client based on the 66B blocks.
6. The rate of a FlexE client is adjusted in idle insertion/deletion mode when
necessary, and the stream of 66B blocks is extracted to the FlexE client at the
adaptation rate. Similarly, because the alignment marker on a PHY of the
FlexE group and the FlexE overhead occupy space, the rate of the FlexE client
after the adaptation is slightly lower than the nominal rate of the FlexE client.
Interface Group
Generally, a device provides multiple interfaces, many of which have the same
configuration. To simplify the configuration of interfaces, create an interface group
and add interfaces to the interface group. When you run a command in the
interface group view, the system automatically applies the command to all the
interfaces in the interface group. In this manner, interfaces in a group are
configured in batches.
Interface groups are classified into permanent and temporary interface groups.
Multiple interfaces can be added to a permanent or temporary interface group to
enable batch command configurations for the interfaces. The differences between
permanent and temporary interface groups are described as follows:
● After a user exits the view of a temporary interface group, the system
automatically deletes the temporary interface group. A permanent interface
group, however, can be deleted only by using a command.
● Information about a permanent interface group can be viewed, whereas
information about a temporary interface group cannot.
● After a permanent interface group is configured, a configuration file is
generated. However, no configuration file is generated after a temporary
interface group is configured.
In the example network shown in Figure 1-24, ten binding interfaces are located
on the network side, and two track interfaces are located on the user side. You can
set a Down weight for each binding interface and a Down weight threshold for
each track interface. For example, the Down weight of each binding interface is
set to 10, and the Down weight thresholds of track interfaces A and B are set to
20 and 80, respectively. When the number of Down binding interfaces in the
interface monitoring group increases to 2, the system automatically instructs track
interface A to go Down. When the number of Down binding interfaces in the
interface monitoring group increases to 8, the system automatically instructs track
interface B to go Down. When the number of Down binding interfaces in the
interface monitoring group falls below 8, track interface B automatically goes Up.
When the number of Down binding interfaces in the interface monitoring group
falls below 2, track interface A automatically goes Up.
Sub-interface
In the network shown in Figure 1-25, multiple sub-interfaces are configured on
the physical interface of Device. Like a physical interface, each sub-interface can
Eth-Trunk
In the network shown in Figure 1-26, an Eth-Trunk that bundles two full-duplex
1000 Mbit/s interfaces is established between Device A and Device B. The
maximum bandwidth of the trunk link is 2000 Mbit/s.
Backup is enabled within the Eth-Trunk. If a link fails, traffic is switched to the
other link to ensure link reliability.
The application and networking diagram of IP-Trunk are similar to those of Eth-
Trunk.
Application of FlexE
The FlexE standards define three modes for interconnection with optical
transmission devices: unaware, termination, and aware. Currently, the unaware
mode is recommended.
Unaware Mode
Optical transmission devices carry mappings according to the bit transparent
transmission mechanism, as shown in Figure 1-30. The unaware mode applies to
scenarios where the Ethernet rate is the same as the wavelength rate of colored
optical modules. It provides FlexE support without requiring hardware upgrades,
fully utilizing legacy optical transmission devices. In addition, it can use FlexE
bonding to provide E2E ultra-high bandwidth channels across OTNs.
Termination Mode
FlexE is terminated on the ingress interfaces of optical transmission devices. The
OTN detects FlexE UNIs, restores the FlexE client data flows, and further maps the
data flows to the optical transmission devices for transmission, as shown in Figure
1-31. This mode is the same as the mode in which standard Ethernet interfaces
are carried over the OTN, and can implement traffic grooming for different FlexE
clients on the OTN.
Aware Mode
The aware mode mainly uses the FlexE sub-rating function and is applicable to
scenarios where the single-wavelength rate of colored optical modules is lower
than the rate of an Ethernet interface. As shown in Figure 1-32, 150 Gbit/s data
flows need to be transmitted between routers and optical transmission devices. In
this case, two 100GE PHYs can be bonded to form a FlexE group. The PHYs in the
FlexE group are configured based on 75% valid timeslots, and the remaining 25%
timeslots are filled with special error control blocks to indicate that they are
invalid.
When FlexE UNIs map data flows to the OTN in aware mode, the OTN directly
discards invalid timeslots, extracts the data to be carried based on the bandwidth
of the original data flows, and then maps these data flows to the optical
transmission devices with matching rates. The configurations of the optical
transmission devices must be the same as those of the FlexE UNIs, so that the
optical transmission devices can detect the FlexE UNIs for data transmission.
Loopback Interface
Improving Reliability
● IP address unnumbered
When an interface will only use an IP address for a short period, it can borrow
an IP address from another interface to save IP address resources. Usually, the
interface is configured to borrow a loopback interface address to remain
stable.
● Router ID
Some dynamic routing protocols require that routers have IDs. A router ID
uniquely identifies a router in an autonomous system (AS).
If OSPF and BGP are configured with router IDs, the system needs to select
the maximum IP address as the router ID from the local interface IP
addresses. If the IP address of a physical interface is selected, when the
physical interface goes Down, the system does not reselect a router ID until
the selected IP address is deleted.
Because a loopback interface is stable and usually up, the IP address of the
loopback interface is recommended as the router ID of the router.
● BGP
To prevent BGP sessions from being affected by physical interface faults, you
can configure a loopback interface as the source interface that sends BGP
packets.
When a loopback interface is used as the source interface of BGP packets,
note the following:
– The loopback interface address of the BGP peer must be reachable.
– In the case of an EBGP connection, EBGP is allowed to establish neighbor
relationships through indirectly connected interfaces.
● MPLS LDP
In MPLS LDP, a loopback interface address is often used as the transmission
address to ensure network stability. This IP address could be a public network
address.
Classifying information
● SNMP
To ensure the security of servers, a loopback interface address is used as the
source IP address rather than the outbound interface address of SNMP trap
messages. In this manner, packets are filtered to protect the SNMP
management system. The system allows only the packets from the loopback
interface address to access the SNMP port. This facilitates reading and writing
trap messages.
● NTP
The Network Time Protocol (NTP) synchronizes the time of all devices. NTP
specifies a loopback interface address as the source address of the NTP
packets sent from the local router.
To ensure the security of NTP, NTP specifies a loopback interface address
rather than the outbound interface address as the source address. In this
situation, the system allows only the packets from the loopback interface
address to access the NTP port. In this manner, packets are filtered to protect
the NTP system.
● Information recording
During the display of network traffic records, a loopback interface address can
be specified as the source IP address of the network traffic to be output.
In this manner, packets are filtered to facilitate network traffic collection. This
is because only the packets from the loopback interface address can access
the specified port.
● Security
Identifying the source IP address of logs on the user log server helps to locate
the source of the logs rapidly. It is recommended that you configure a
loopback address as the source IP address of log messages.
● HWTACACS
After Huawei Terminal Access Controller Access Control System (HWTACACS)
is configured, the packets sent from the local router use the loopback address
as the source address. In this manner, packets are filtered to protect the
HWTACACS server.
This is because only the packets sent from the loopback interface address can
access the HWTACACS server. This facilitates reading and writing logs. There
Null0 Interface
The Null0 interface does not forward packets. All packets sent to this interface are
discarded. The Null0 interface is applied in two situations:
● Loop prevention
The Null0 interface is typically used to prevent routing loops. For example,
during route aggregation, a route to the Null0 interface is always created.
In the example network shown in Figure 1-34, DeviceA provides access
services for multiple remote nodes.
DeviceA is the gateway of the local network that uses the Class B network
segment address 172.16.0.0/16. DeviceA connects to three subnets through
DeviceB, DeviceC, and DeviceD, respectively.
Figure 1-34 Example for using the Null0 interface to prevent routing loops
▪ If the action is permit, the router searches the forwarding table and
then determines whether to forward or discard the packet.
Tunnel Interface
A tunnel interface is a virtual logical interface. To apply certain types of tunnels,
you must create a tunnel interface first.
The destination address specified on the local tunnel interface is the IP address of
the peer interface that receives packets. This address must be the same as the
source address specified on the peer tunnel interface. In addition, routes to the
peer interface that receives packets must be reachable. The same source or
destination address cannot be configured for two or more tunnel interfaces that
use the same encapsulation protocol.
Different encapsulation modes can be configured for tunnel interfaces depending
on the utilities of the interfaces. The following table lists the types of tunnels for
which tunnel interfaces can be created.
To resolve this problem, you can configure an interface monitoring group and add
multiple network-side interfaces on the PEs to the interface monitoring group.
When a link failure occurs on the network side and the interface monitoring group
detects that the status of a certain proportion of network-side interfaces changes,
the system instructs the user-side interfaces associated with the interface
monitoring group to change their status accordingly and allows traffic to be
switched between the master and backup links. Therefore, the interface
monitoring group can be used to prevent traffic overloads or interruptions.
Interface Types
Devices exchange data and interact with other devices on a network through
interfaces. Interfaces are classified into physical and logical interfaces.
● Physical Interfaces
Physical interfaces physically exist on boards. They are divided into the
following types:
– LAN interfaces: interfaces through which the router can exchange data
with other devices on a LAN.
– WAN interfaces: interfaces through which the router can exchange data
with remote devices on external networks.
● Logical Interfaces
Logical interfaces are manually configured interfaces that do not exist
physically. Logical interfaces can be used to exchange data.
NOTICE
The management network port of the main control board does not forward
services.
Table 1-9 Commands, views, and prompts of physical interfaces supported by the
NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M
Interface Command View Oper Prompt
Name ation
Major link layer protocols supported by the NetEngine 8100 M, NetEngine 8000E
M, NetEngine 8000 M are listed as follows:
● Ethernet
Currently, the LAN mostly refers to the Ethernet. The Ethernet is a broadcast
network, which is flexible and simple in configuration as well as easy to
expand. For these reasons, the Ethernet is widely used.
● Trunk
Trunks can be classified into Eth-Trunks and IP-Trunks. An Eth-Trunk must be
composed of Ethernet links, and an IP-Trunk must be composed of POS links.
The trunk technology has the following advantages:
– Bandwidth increase: The bandwidth of a trunk is the total bandwidth of
all member interfaces.
– Reliability enhancement: When a link fails, other links in the same trunk
automatically take over the services on the faulty link to prevent traffic
interruption.
● PPP
The Point-to-Point Protocol (PPP) is used to encapsulate IP packets on serial
links. It supports both the asynchronous transmission of 8-bit data without
the parity check and the bit-oriented synchronous connection.
PPP consists of the Link Control Protocol (LCP) and the Network Control
Protocol (NCP). LCP is used to create, configure, and test links; NCP is used to
control different network layer protocols.
● HDLC
The High-Level Data Link Control (HDLC) is a suite of protocols that are used
to transmit data between network nodes. HDLC is widely used at the data link
layer.
In HDLC, the receiver responds with an acknowledgment when it receives
frames transmitted over the network. In addition, HDLC manages data flows
and the interval at which data packets are transmitted.
Usage Scenario
To ensure better communication between devices on the network, physical and
logical interfaces must be used together. In addition, you need to set parameters
for each interface as required, such as the description, MTU, alarm thresholds for
the inbound and outbound bandwidth usage of each interface, interval for
collecting traffic statistics, trap reporting to the NMS when the protocol status of
an interface changes, and control-flap.
Pre-configuration Tasks
Before performing interface basics configurations, verify that the device has been
powered on and started properly.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
In this command, interface-type specifies the type of the interface, and interface-
number specifies the number of the interface.
Step 3 (Optional) Run commit
The configuration is committed.
If the interface of the specified type and number exists in the preceding step, you
do not need to run the commit command.
----End
Context
Table 1-12 describes the configurable parameters of an interface.
Interface MTU After the MTU is configured for an interface, the device
fragments a packet transmitted on the interface if the
size of the packet exceeds the MTU.
NOTE
Loopback and NULL interfaces do not support the MTU.
Interface bandwidth You can calculate the bandwidth usage by setting the
that can be obtained interface bandwidth that can be obtained by the NMS
by the NMS through through the MIB.
the MIB
Whether the device You can enable the device to send a trap message to the
sends a trap NMS when the interface status changes. After this
message to the NMS function is enabled, the NMS monitors the interface
when the interface status in real time.
status changes However, if an interface alternates between up and
down, the device will frequently send trap messages to
the NMS, which increases the processing load on the
NMS. In this situation, you can disable the device from
sending trap messages to the NMS to avoid adverse
impact on the NMS.
Interval at which After setting the interval at which traffic statistics are
traffic statistics are collected for an interface, you can view the traffic
collected volumes and rates of the interface in different time
ranges.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
In this command, interface-type specifies the type of the interface, and interface-
number specifies the number of the interface.
Step 3 Perform one or more operations in Table 1-13 to set the desired interface
parameters.
Set an MTU for an Run the mtu mtu or ipv6 mtu mtu command to set an
interface. MTU for an interface.
Run the mtu mtu spread or ipv6 mtu mtu spread
command to set an MTU for an interface and apply the
MTU to all the sub-interfaces on the interface.
NOTE
● After changing the MTU on a POS interface using the mtu
or mtu spread command, run the shutdown and undo
shutdown commands in the interface view for the change to
take effect. Alternatively, you can run the restart command
in the interface view to restart the interface for the change
to take effect.
● If IPv4 attributes are configured on an interface, run the mtu
or mtu spread command to set an MTU for the IPv4 packets
to be sent by the interface.
● If IPv6 attributes are configured on an interface, run the ipv6
mtu or ipv6 mtu spread command to set an MTU for the
IPv6 packets to be sent by the interface.
Configure whether Run the enable snmp trap updown command to enable
the device sends a the device to send a trap message to the NMS when the
trap message to the interface status changes.
NMS when the NOTE
interface status If an interface alternates between up and down, the device will
changes. frequently send trap messages to the NMS, which increases the
processing load on the NMS. In this situation, you can run the
undo enable snmp trap updown command to disable the
device from sending trap messages to the NMS to avoid adverse
impact on the NMS.
Operation Description
Set the interval at Run the set flow-stat interval interval command to set
which traffic the interval at which traffic statistics are collected.
statistics are NOTE
collected. ● To set a global interval at which traffic statistics are
collected, run the set flow-stat interval interval command
in the system view, and you do not need to run the interface
interface-type interface-number command. You can
configure a global traffic statistic collection interval, which
takes effect on all interfaces, including the interfaces on
which no traffic statistic collection interval has been set.
● The new interval takes effect after the original interval
expires. If the interface is logical, traffic statistics about the
interface are updated when the new interval takes effect for
the second time. If the interface is physical, traffic statistics
about the interface are updated immediately after the new
interval takes effect.
Enable the control- Run the control-flap [ suppress reuse ceiling decay-ok
flap function. decay-ng ] command to enable the control-flap function
on an interface.
The value of suppress is 1000 times the interface
suppression threshold. It ranges from 1 to 20000. The
default value is 2000. The value of suppress must be
greater than the value of reuse and less than the value
of ceiling.
The value of reuse is 1000 times the interface reuse
threshold. It ranges from 1 to 20000. The default value is
750. The value of reuse must be less than the value of
suppress.
The value of ceiling is 1000 times the maximum
interface suppression penalty value. It ranges from 1001
to 20000. The default value is 6000. The value of ceiling
must be greater than the value of suppress.
decay-ok specifies the half life for the penalty value
when an interface is up. It ranges from 1 to 900, in
seconds. The default value is 54.
decay-ng specifies the half life for the penalty value
when an interface is down. It ranges from 1 to 900, in
seconds. The default value is 54.
----End
Enabling an Interface
Physical interfaces on a device are initialized and started when the device is
powered on.
Context
NOTE
Procedure
● By default, interfaces are started.
● If an interface is shut down, perform the following steps to start the interface:
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
c. Run undo shutdown
The interface is started.
d. Run commit
The configuration is committed.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run enable snmp trap physical-updown
The device is enabled to send a trap message to the NMS when the interface
physical status changes.
----End
Context
Do as follows on the router that needs to be configured with IPv4 and IPv6 traffic
statistics collection.
Procedure
Step 1 Run system-view
IPv4 and IPv6 traffic statistics collection is enabled on the main interface.
IPv4 and IPv6 traffic statistics collection is enabled on the main interface.
If dual-stack statistics collection is enabled on a main interface, you can run this
command to improve the forwarding performance of the main interface.
----End
(Optional) Configuring Power Locking and Gain Locking for an Optical Amplifier
Module
You can configure power locking and gain locking for an optical amplifier module
to amplify the optical power.
Context
Perform the following steps on the router where power locking and gain locking
need to be configured for an optical amplifier module.
Procedure
Step 1 Run system-view
----End
Setting Thresholds for Generating and Clearing Packet Loss Rate Alarms on an MP-
group or Global MP-group Interface
To allow the device to generate and clear packet loss rate alarms on an MP-group
or global MP-group interface, set packet loss alarm thresholds.
Context
When an interface discards packets frequently, the link is in the poor condition,
affecting service transmission. If you want to monitor the link quality, set
thresholds for generating and clearing packet loss rate alarms on the MP-group
interface or global MP-group interface.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
MP-group and global MP-group interfaces are supported.
Step 3 Run trap-threshold mp-lospkt-exc trigger-threshold coefficient-value power-
value [ resume-threshold resume-coefficient-value resume-power-value ]
The thresholds for generating and clearing packet loss rate alarms are set.
Step 4 Run commit
The configuration is committed.
----End
Context
NOTE
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run license
The license view is displayed.
Step 3 Run active port-basic slot slot-id card card-id port port-list
The interface-specific basic hardware license is activated.
To deactivate an interface-specific basic hardware license, run the undo active
port-basic slot slot-id card card-id [ port port-list ] command in the license view.
After the preceding command configuration is committed, the corresponding
license resource is released.
NOTE
When configuring the bandwidth mode for interfaces 0 to 19, configure interface splitting
on interfaces 0 to 3, and activate the license on interfaces 0 to 3, 4, 5, 12, and 13.
----End
Context
To switch the bandwidth mode of an interface, configure the working mode of the
interface's optical module. This not only makes networking more flexible, but also
reduces purchase costs. If this configuration is performed for an optical module
whose working mode cannot be switched, an error message is displayed,
indicating that the configuration cannot be delivered.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run optical-module interface { interface-name | interface-type interface-
number } client-mode { zr-dwdm | zr-single | zr-plus }
The working mode of the optical module on an interface is configured.
Step 3 Run commit
The configuration is committed.
----End
Context
To switch an interface bandwidth mode, configure an interface splitting mode,
which increases the networking flexibility and saves interface costs.
NOTE
Procedure
Step 1 Run system-view
The system view is displayed.
----End
Procedure
● Run the display interface [ interface-type interface-number ] command to
check the status of the interface and statistics on the interface.
● Run the display control-flap interface interface-type interface-number
command to check the configuration and running status of the control-flap
function on interfaces.
● Run the display counters [ bit ] [ inbound | outbound ] [ interface
interface-type [ interface-number ] ] [ slot slot-id ] command to check the
interface traffic statistics.
● Run the display counters [ bit ] rate [ inbound | outbound ] [ interface
interface-type [ interface-number | slot slot-id ] | slot slot-id ] command to
check the interface traffic rates.
● Run the display port split or display port split slot command to check the
splitting status of the interface.
● Run the display interface neighbor [ interface-type interface-number | slot
slot-id [ card card-number ] ] command to check information about the
neighboring devices and interfaces of a physical interface on the device.
● Run the display interface description [ interface-type [ interface-number ] |
slot slot-id [ card card-number ] ][ full-name ] command to check the
interface description.
----End
Usage Scenario
When plenty of alarms are generated on links, system performance deteriorates
because the system has to process the huge number of alarms. You can set
thresholds for different types of alarms, so that alarms are generated only when
the alarm thresholds are reached. In addition, measures can be taken when
necessary to remove faults and guarantee the transmission of normal traffic.
Pre-configuration Tasks
Before configuring physical link detection, complete the following tasks:
● Powering on the router, ensuring that the router works properly and
completes self-check successfully.
● Configure physical attributes for interfaces on the router.
Configuring the Alarm Function for CRC Errors, SDH Errors, Input Errors, Output
Errors, or Optical Module Power Exceptions
This section describes how to configure the alarm function for CRC errors, SDH
errors, input errors, output errors, or optical module power exceptions.
Context
If the alarm function for CRC errors, SDH errors, input errors, output errors, or
optical module power exceptions is enabled on an interface, the system generates
an alarm when the number of errors or exceptions exceeds or falls below the
threshold set on the interface. If a large number of alarms are generated on links,
the system will be busy processing them, which causes performance deterioration.
To prevent this problem, properly configure the type of interface alarm, alarm
thresholds, and detection interval.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run snmp-agent trap enable port { crcexc-error | input-error | output-error |
sdh-error-rising | optical-module-abnormal }
The alarm function is enabled on interfaces.
The configuration takes effect on all physical interfaces supporting the alarm
function.
You can set a type of alarm as required.
● crcexc-error: Enables the alarm function for CRC errors.
● sdh-error-rising: Enables the alarm function for SDH errors.
● optical-module-abnormal: Enables the alarm function for optical module
power exceptions.
In VS mode, this command is supported only by the admin VS.
Step 3 Run interface interface-type interface-number
The interface view is displayed.
Step 4 Configure alarm thresholds and a detection interval.
● Configure alarm thresholds for inbound and outbound bandwidth usage:
– Run trap-threshold { input-rate | output-rate } bandwidth-in-use
[ resume-rate resume-threshold ]
The inbound and outbound bandwidth usage threshold is set.
You can configure a global traffic statistic collection interval, which takes effect
on all interfaces, including the interfaces on which no traffic statistic collection
interval has been set. To configure a global traffic statistic collection interval, run
the set flow-stat interval interval command in the system view. The traffic
statistic collection interval of an interface takes preference over a global traffic
statistic collection interval.
● Configure CRC alarm thresholds and a detection interval (for Ethernet
interfaces and POS interfaces using either of the following methods):
– Run trap-threshold crc-error threshold interval-second interval
An alarm threshold and a detection interval are set for CRC errors.
– Run trap-threshold crc-error high-threshold high-threshold low-
threshold low-threshold interval-second interval [ shutdown ]
The upper and lower alarm thresholds for CRC errors as well as the
detection interval are set.
NOTE
You can run the trap-threshold slot slot-id card card-id crc-error high-
threshold high-threshold low-threshold low-threshold interval-second interval
command in the system view to configure global values for all interfaces on the
specified subcard.
● Configure CRC alarm thresholds and a detection interval (for Serial interfaces
and Trunk-Serial interfaces using either of the following methods):
– Run trap-threshold crc-error threshold interval-second interval
[ shutdown ]
An alarm threshold and a detection interval are set for CRC errors.
– Run trap-threshold crc-error high-threshold high-threshold low-
threshold low-threshold interval-second interval [ shutdown ]
The upper and lower alarm thresholds for CRC errors as well as the
detection interval are set.
● Configure SDH alarm thresholds and a detection interval (for 10GE WAN
interfaces and POS interfaces using either of the following methods):
– Run trap-threshold sdh-error threshold interval-second interval
An alarm threshold and a detection interval are set for SDH errors.
– Run trap-threshold sdh-error high-threshold high-threshold low-
threshold low-threshold interval-second interval
The upper and lower alarm thresholds for SDH errors as well as the
detection interval are set.
NOTE
You can run the trap-threshold slot slot-id card card-id sdh-error high-
threshold high-threshold low-threshold low-threshold interval-second interval
command in the system view to configure global values for all interfaces on the
specified subcard.
● Configure SDH alarm thresholds and a detection interval (for POS interfaces
using either of the following methods):
– Run trap-threshold sdh-error threshold interval-second interval
An alarm threshold and a detection interval are set for SDH errors.
– Run trap-threshold sdh-error high-threshold high-threshold low-
threshold low-threshold interval-second interval
The upper and lower alarm thresholds for SDH errors as well as the
detection interval are set.
● Configure symbol alarm thresholds and a detection interval (for Ethernet
interfaces only).
– Run trap-threshold symbol-error high-threshold high-threshold low-
threshold low-threshold interval-second interval
The upper and lower alarm thresholds for symbol errors as well as the
detection interval are set.
NOTE
You can run the trap-threshold slot slot-id card card-id symbol-error high-
threshold high-threshold low-threshold low-threshold interval-second interval
command in the system view to configure global values for all interfaces on the
specified subcard.
● Configure input/output alarm thresholds and a detection interval (for
Ethernet interfaces and POS interfaces).
– Run trap-threshold { input-error | output-error } high-threshold high-
threshold low-threshold low-threshold interval-second interval
The upper and lower alarm thresholds for interface input or output errors
are set.
NOTE
You can run the trap-threshold slot slot-id card card-id { input-error | output-
error } high-threshold high-threshold low-threshold low-threshold interval-
second interval command in the system view to configure global values for all
interfaces on the specified subcard.
● Configure an alarm threshold and a clear alarm threshold for the CRC error
packet ratio:
– Run trap-threshold crc-error packet-error-ratio alarm-threshold
alarm-coefficient-value alarm-power-value [ resume-threshold resume-
coefficient-value resume-power-value ] [ trigger-lsp | trigger-section ]
An alarm threshold and a clear alarm threshold are configured for the
CRC error packet ratio.
● Configure parameters for the algorithm to calculate the CRC packet error
ratio:
NOTE
● You can run the port-alarm down slot slot-id card card-id { crc-error | sdh-error |
symbol-error | input-error | output-error } command in the system view to apply the
configurations to all interfaces on the subcard.
● After the association function is enabled, you can run the port-alarm clear { crc-error |
sdh-error | symbol-error | input-error | output-error } command to clear the alarms
on the interface.
----End
Context
A device generates an alarm and sends it to an NMS only when the number of
pause-frame error packets sent or received by the device reaches the upper
threshold for three consecutive detection intervals. The device sends a clear alarm
to the NMS only when the number of pause-frame error packets sent or received
by the device falls below the lower threshold for three consecutive detection
intervals.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The view of an interface is displayed.
The upper threshold, lower threshold, and detection interval for the pause-frame
error alarm are set.
----End
Configuring the Alarm Function in Case the Number of SDH B1 or SDH B2 Error
Packets That an Interface Receives Exceeds an Alarm Threshold
You can configure the alarm function in case the number of SDH B1 or SDH B2
error packets exceeds an alarm threshold. If such an alarm is generated, the link is
in a poor condition.
Context
If an interface receives a large number of SDH B1 or SDH B2 error packets, the
link is in a poor condition, affecting service transmission. In this situation, you can
configure the alarm function, alarm threshold, and detection interval on an
interface. The system then detects the number of SDH B1 or SDH B2 error packets
that the interface receives at the configured interval. If the number of SDH B1 or
SDH B2 error packets exceeds the configured alarm threshold, the system
generates an alarm and sends it to the NMS, prompting the administrator to
perform maintenance on the interface and troubleshoot the fault. When the
number of SDH B1 or SDH B2 error packets falls below the alarm threshold, the
system generates a clear alarm and sends it to the NMS, notifying the
administrator that the alarm has been cleared.
Procedure
Step 1 Run system-view
A threshold and detection interval for the SDH B1 or SDH B2 error alarm on an
interface are set.
----End
Configuring the Alarm Function in Case the Number of Bytes of Error Packets That
an Interface Receives Exceeds an Alarm Threshold
You can configure the alarm function in case the number of bytes of error packets
exceeds a threshold. If such an alarm is generated, the link is in a poor condition.
Context
If an interface receives a large number of bytes of error packets, the link is in a
poor condition, affecting service transmission. In this situation, you can configure
the alarm function, alarm threshold, and detection interval on an interface. The
system then detects the number of bytes of error packets that the interface
receives at the configured interval. If the number of bytes of error packets exceeds
the configured alarm threshold, the system generates an alarm and sends it to the
NMS, prompting the administrator to perform maintenance on the interface and
troubleshoot the fault. When the number of bytes of error packets falls below the
alarm threshold, the system generates a clear alarm and sends it to the NMS,
notifying the administrator that the alarm has been cleared.
Procedure
Step 1 Run system-view
The alarm function is configured in case the number of bytes of error packets
exceeds an alarm threshold.
An alarm threshold is configured for the number of bytes of error packets that the
interface receives, and an interval is configured for the system to detect the
number of bytes of error packets.
----End
Context
The physical link detection function has been configured.
Procedure
● Run the display trap-info command in the interface view or run the display
trap-info { interface-type interface-number | interface-name | slot slot-id
card card-id } command in the system view to check alarm configurations on
the specified interface, including the alarm function status, alarm thresholds,
detection interval, alarm blocking status, current alarm state, and the number
of current alarms.
● Run the display port-error-info interface { interface-type interface-number |
interface-name } command in the interface view to check the trap
information about error codes/error packets of an interface.
----End
Usage Scenario
● If the IXP is under DDoS attacks, the MAC accounting function helps the ISP
to check the traffic of peer routers with specified MAC addresses. If traffic of a
specified MAC address is huge, the attack traffic may be from this device with
the specified MAC address.
Procedure
Step 1 Run system-view
----End
If you need to re-check MAC accounting statistics after a period, run the reset
mac accounting command to delete the existing statistics and then run the
display mac accounting command. This ensures statistics accuracy.
Usage Scenario
On a BD scenario, the router has two sub-interfaces configured in a main
interface, one with the Dot1q encapsulation type and the other with the default
encapsulation type. Once the sub-interface encapsulated Dot1q receives traffic,
the sub-interface with the default encapsulation type also sends out the traffic.
This may cause the illusion of return current. Besides, the router has two
interfaces configured on a BD scenario. The first interface has a sub-interface that
is configured with the Dot1q encapsulation type. The second interface has two
sub-interfaces that are configured with the Dot1q and default encapsulation types
respectively. Once traffic passes through the sub-interface on the first interface,
the second interface also sends two copied traffic from each of its sub-interfaces.
This causes traffic to be replicated, wasting resources and reducing the board's
forwarding efficiency. To allow traffic to be sent through specific interfaces, enable
strict filter.
Pre-configuration Tasks
Before configuring strict filter on an interface, configure physical attributes for
interfaces on the router.
Procedure
● Enable strict filter globally.
a. Run system-view
NOTE
The strict filter configuration on an EVC sub-interface takes precedence over that
configured in the system view. The strict filter configuration on an EVC sub-
interface takes effect, regardless of whether strict filter is configured globally.
----End
Usage Scenario
After a device is restarted or a board is replaced, if an interface sends signals
immediately after initialization before the link completes a switchover or
configuration restoration, data loss may occur. To prevent data loss, configure the
signal sending delay function.
NOTE
● Only physical interfaces can be configured with signal sending delays. Logical interfaces
do not support this function.
● Configuring a signal sending delay does not affect an interface that has sent signals to
the peer, and the configuration takes effect after the interface is initialized.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number or controller interface-type
interface-number
The corresponding interface view is displayed.
Step 3 Run port-tx-enabling-delay port-tx-delay-time
The signal sending delay function is enabled, and the signal sending delay is
configured.
----End
Usage Scenario
An NMS can obtain interface statistics in get-next or get mode. In get-next mode,
a device receives a request for interface statistics from the NMS, obtains the
interface statistics from the cache, and then reports the statistics to the NMS. By
default, the interval for updating statistics in the cache is 50 seconds.
When obtaining statistics on packets received or sent on an interface through the
ifTable and ifXTable objects in the MIB table, you can reduce the interval for
updating interface statistics in the cache to ensure that the cache holds the latest
statistics.
Procedure
Step 1 Run system-view
The system view is displayed.
----End
1.1.1.2.9 Configuring a Trap Threshold for Sudden Changes in the Traffic Rate on
Global Interfaces
You can configure a trap threshold for sudden changes in the traffic rate to adjust
the frequency of triggering traps.
Usage Scenario
To detect sudden changes in the traffic rate, you can configure a trap threshold for
them on interfaces. After the configuration is complete, the device reports a trap if
the percentage of change in the traffic rate exceeds the trap threshold. To prevent
the device from frequently reporting traps, do not set the trap threshold too low.
The formula for calculating the percentage of change in the traffic rate on
interfaces is as follows:
Percentage of change in the traffic rate = Difference between the interface rates in
the current and previous traffic statistics collection intervals/Interface rate in the
previous traffic statistics collection interval
To configure a traffic statistics collection interval on an interface, run the set
flow-stat interval command. The default interval is 300 seconds.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run set flow-change-ratio { input-threshold | output-threshold } upper-limit
threshold
A trap threshold is configured for sudden changes in the traffic rate on interfaces.
After this command is run, if you enable the trap function for sudden changes in
the traffic rate (configured using the snmp-agent trap enable feature-name
port trap-name hwinputratechangeoverthresholdnotice or snmp-agent trap
enable feature-name port trap-name
hwoutputratechangeoverthresholdnotice command) and the percentage of
change in the traffic rate exceeds the configured trap threshold, the following
traps are generated:
● PORT_1.3.6.1.4.1.2011.5.25.157.2.219
hwInputRateChangeOverThresholdNotice
● PORT_1.3.6.1.4.1.2011.5.25.157.2.220
hwOutputRateChangeOverThresholdNotice
Step 3 Run commit
The configuration is committed.
----End
Usage Scenario
Before locating or troubleshooting a link failure, maintenance engineers should
ensure that the optical module laser is disabled so that it cannot cause injury. The
optical module can be configured to disable the laser automatically if it detects a
link failure. The laser can also be disabled manually. If the optical module is
configured to disable the laser automatically, the laser is not immediately re-
enabled when the link failure is cleared. However, maintenance engineers can
enable the optical module laser manually to check whether services have
recovered.
Pre-configuration Tasks
Before enabling or disabling the optical module laser, complete the following
tasks:
● Power on the router.
● Ensure that the optical module has been installed and that the interface is Up.
Context
Before locating or troubleshooting a link failure, maintenance engineers should
ensure that the optical module laser is disabled so that it cannot cause injury. The
optical module can be configured to disable the laser automatically if it detects a
link failure. The laser can also be disabled manually.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number or controller interface-type
interface-number
The corresponding interface view is displayed.
Step 3 Perform either of the following operations:
NOTICE
----End
Context
If the optical module is configured to disable the laser automatically, the laser is
not immediately re-enabled when the link failure is cleared. However,
maintenance engineers can enable the optical module laser manually to check
whether services have recovered.
Procedure
Step 1 Run system-view
The optical module laser is enabled, and the duration for which the optical
module laser will be temporarily enabled is configured.
The duration takes effect only after the laser autoshutdown enable command is
run.
----End
Prerequisites
The optical module laser has been enabled or disabled as required.
Context
The following operations affect the status of the optical module laser:
● Run the laser turn-on command to enable the optical module laser.
● Run the laser turn-off command to disable the optical module laser.
● Run the laser autoshutdown enable command to configure the optical
module to disable the laser automatically if it detects a link failure.
● Run the shutdown command to deactivate the interface.
Procedure
● Run the display laser status command in any view to check the laser status
of the optical module.
----End
Context
To switch the optical module mode of an interface, perform this configuration.
NOTE
Only the NetEngine 8100 M14/M8 series, NetEngine 8000E M14/M8 series, and NetEngine
8000 M14/M8/M4 series support this function.
Procedure
Step 1 Run system-view
----End
Context
The system automatically obtains the vendor-defined power threshold of an
optical module and compares it with the actual power. If the actual power exceeds
the vendor-defined threshold, an alarm will be generated. However, the vendor-
defined power threshold of an optical module may not meet user requirements. If
the alarm standardization function is enabled, a unified power threshold is used,
and the threshold is calculated based on the optical module transmission distance
and bandwidth.
NOTE
The device has two types of optical module power alarms: warning and alarm. A warning is
reported when the difference between the actual power and vendor-defined threshold is
not great. It can also be considered as a precaution. Some optical modules can continue
working properly when the actual optical power is at the warning level. You can disable
warning detection as required.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run optical-module alarm-threshold standardization enable
The alarm threshold standardization function is enabled for the optical module.
Step 3 Run commit
The configuration is committed.
----End
Context
The system automatically obtains the vendor-defined power threshold of an
optical module and compares it with the actual power. If the actual power exceeds
the vendor-defined threshold, an alarm will be generated. Generally, the actual
power is greater than the vendor-defined threshold, which means frequent alarm
NOTE
The device has two types of optical module power alarms: warning and alarm. A warning is
reported when the difference between the actual power and vendor-defined threshold is
not great. It can also be considered as a precaution. Some optical modules can continue
working properly when the actual optical power is at the warning level. You can disable the
alarm function for these optical modules to prevent these optical modules from frequently
reporting warnings by executing the following command.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run port-alarm disable optical-module { rx-power-high-warning | rx-power-
low-warning | tx-power-high-warning | tx-power-low-warning | voltage-high-
warning | voltage-low-warning } *
The alarm function is disabled for the optical module.
Step 4 Run commit
The configuration is committed.
----End
Context
When an interface is inserted with a non-Huawei-certified optical module, the
system automatically reports an alarm. If you want to suppress the alarm, you can
disable the function of reporting the alarm for the non-Huawei-certified optical
module. If you do not want to use the interface with the optical module inserted,
you can enable the function of setting the interface to Down.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run transceiver non-certified-alarm disable
The function of reporting an alarm for a non-Huawei-certified optical module is
disabled.
----End
Context
If a 100GE 80 km optical module of a Huawei device cannot connect to that of a
non-Huawei device, configure SerDes polarity inversion. This configuration will
trigger SerDes polarity inversion on an interface, causing service interruptions.
Therefore, exercise caution when configuring SerDes polarity inversion.
Procedure
Step 1 Run system-view
----End
Usage Scenario
The flapping of routing protocols, MPLS, and other protocols caused by the
frequent change of the interface status may influence the stability of the whole
network. To resolve this problem, you can configure the control-flap function.
Pre-configuration Tasks
Before configuring the control-flap function, configure the physical attributes for
the router interfaces.
Procedure
● Configure the control-flap function.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
NOTE
The null interface and loopback interface do not support the control-flap
function.
c. Run control-flap [ suppress reuse ceiling decay-ok decay-ng ]
The control-flap function is enabled on the interface.
The value of suppress is 1000 times the suppress threshold of the
interface. It ranges from 1 to 20000. The default value is 2000. The value
of suppress must be greater than the value of reuse and smaller than the
value of ceiling.
The value of reuse is 1000 times the reuse threshold of the interface. It
ranges from 1 to 20000. The default value is 750. The value of reuse must
be smaller than the value of suppress.
The value of ceiling is 1000 times the suppress penalty value of the
interface. It ranges from 1001 to 20000. The default value is 6000. The
value of ceiling must be greater than the value of suppress.
The value of decay-ok is the time taken to decay the penalty value to
half when the interface is Up. It ranges from 1 to 900 seconds. The
default value is 54 seconds.
The value of decay-ng is the time taken to decay the penalty value to
half when the interface is Down. It ranges from 1 to 900 seconds. The
default value is 54 seconds.
d. Run commit
The configuration is committed.
● Configure status flapping suppression on a physical interface.
a. Run system-view
The system view is displayed.
b. (Optional) Run interface interface-type interface-number
The view of an interface is displayed.
c. Run damp-interface enable
Status flapping suppression is enabled on the interface.
Usage Scenario
For usage scenarios of logical interfaces, see "Logical Interface" in NetEngine 8100
M, NetEngine 8000E M, NetEngine 8000 M-Feature Description-Interface
Management.
Pre-configuration Tasks
Before configuring logical interfaces, connect interfaces and set their physical
parameters to ensure that these interfaces are physically up.
Procedure
Step 1 Run system-view
----End
Context
To prevent services from affecting each other, a mechanism to isolate different
types of services is needed. Different service flows are forwarded through different
VLAN channelized sub-interfaces with dot1q encapsulation, and each channelized
sub-interface implements independent HQoS scheduling to isolate services of
different types.
Procedure
Step 1 Run system-view
NOTE
Step 6 Run active port-slicing slot slotid card cardid port port-list
The license for channelized sub-interfaces is activated.
Step 7 Run quit
Return to the system view.
Step 8 Run interface interface-type interface-number.subinterface-number
The view of a physical sub-interface is displayed.
Step 9 Run mode channel enable
Channelization is enabled for the sub-interface.
Step 10 (Optional) Run mode channel bandwidth bwvalue
The bandwidth is configured for the channelized sub-interface.
Step 11 Run commit
The configuration is committed.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
----End
Procedure
Step 1 Run system-view
The NULL interface is always in the Up state but does not forward any data
packets. In addition, IP addresses cannot be configured on the NULL interface, and
data link layer protocol cannot be encapsulated on the NULL interface.
----End
Follow-up Procedure
The NULL interface is used to prevent routing loops and filtering traffic. If the ip
route-static 192.168.0.0 255.255.0.0 NULL 0 command is run, the device will
discard all packets destined for the network segments 192.168.0.1 to
192.168.255.255.
Prerequisites
The Global-VE interface, FlexE interface license, FlexE interface, loopback interface,
and NULL interface have been configured.
Procedure
● Run the display interface global-ve [ ve-number ] command to check the
status of the Global-VE interface.
● Run the display license resource usage port-slicing { all | slot slot-id }
[ active | deactive ] command to check authorization information about the
port slicing license on boards.
● Run the display interface loopback [ loopback-number ] command to check
the status of the Loopback interface.
● Run the display interface null [ 0 ] command to check the status of the Null
interface.
● Run the display flexe group information slot slot-id card card-id command
to check information about groups, FlexE physical interfaces added to the
groups, and timeslot allocation in the groups on a FlexE subcard.
----End
Usage Scenario
The need for higher mobile bearer bandwidth is increasing as 5G networks
continue to evolve. In addition, customers want a unified network to transmit
various services, such as home broadband, leased line access, and mobile bearer
services. These factors place increasingly higher requirements on
telecommunication network interfaces. FlexE isolates services by isolating the
bandwidth resources of interfaces. FlexE interfaces are isolated from each other so
that traffic is isolated at the physical layer and network slicing is performed for
services on the same physical network.
FlexE applies to the access, aggregation, and core layers. As 5G services transition
through the initial, development, and maturity phases, the service volume
increases gradually. FlexE allows the bearer network to be smoothly upgraded.
Pre-configuration Tasks
Before configuring FlexE interfaces, complete the following tasks:
Pre-configuration Tasks
Before activating the FlexE interface license on a board, complete the following
tasks:
1. Run the license active file-name command to activate a specified license file
on the main control board.
2. Run the system-view command to enter the system view.
3. Run the license command to enter the license view.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run license
The license view is displayed.
Step 3 Run active port-slicing slot slotid card cardid port port-list
The FlexE interface license is activated on a specified board.
Step 4 Run commit
The configuration is committed.
----End
Context
After a standard Ethernet interface is switched to the FlexE mode, the system
automatically creates a FlexE physical interface and deletes the services
configured on the original interface. If the Ethernet interface is an Eth-Trunk
interface's member interface, it is also deleted from the Eth-Trunk interface.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run flexe enable port port-position
The working mode of the Ethernet interface is switched from standard Ethernet to
FlexE.
Step 3 Run commit
The configuration is committed.
----End
Context
Different FlexE physical interfaces can be configured with the same PHY number.
However, the FlexE physical interfaces with the same PHY number cannot be
added to the same FlexE group, and a FlexE physical interface can be added to
only one FlexE group.
Procedure
Step 1 Run system-view
The view of a specified FlexE physical interface (for example, FlexE-50G 0/9/1) is
displayed.
NOTE
NOTE
----End
Procedure
Step 1 Run system-view
A FlexE group is created and its view is displayed, or the view of a specified
existing FlexE group is displayed.
Padding is enabled.
NOTE
If the timeslot mode has been configured on the FlexE card where the PHYs bound to a
FlexE group reside, ensure that the FlexE clients in the group are not bound to any sub-
timeslots before disabling timeslot negotiation.
● If the peer device does not support timeslot negotiation, you need to disable it in the
FlexE group view of the local device.
● The same timeslot negotiation mode must be configured for the FlexE groups on both
ends. Otherwise, the FlexE interfaces may fail to go up or fail to forward traffic after a
reliability operation (such as an active/standby switchover, subcard reset, or interface
shutdown/startup) is performed.
● After timeslot negotiation is disabled for the FlexE groups on both ends, the same
timeslot number must be configured for the corresponding FlexE clients. Otherwise, the
FlexE interfaces may fail to go up or fail to forward traffic.
----End
Procedure
Step 1 Run system-view
A FlexE group is created and its view is displayed, or the view of a specified
existing FlexE group is displayed.
----End
Context
To configure a bandwidth lower than 5 Gbit/s for a FlexE client, set the sub-
timeslot granularity of the FlexE client to 1 Gbit/s first.
Procedure
Step 1 Run system-view
Step 2 Run set flexe sub-time-slot granula slot slotid card cardid { 1g | 5g }
----End
Context
● Timeslot mode: A timeslot number to be allocated to a FlexE client is
statically specified when the client is configured.
● Bandwidth mode: Only the needed bandwidth is specified when a FlexE client
is configured, and the device automatically allocates the corresponding
timeslot.
NOTE
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run slot slot-id
The slot view is displayed.
Step 3 Run flexe config-mode card cardid { bandwidth | timeslot }
The bandwidth or timeslot mode is configured for a specified FlexE card.
NOTE
This command does not apply to the NetEngine 8000 M8, NetEngine 8000 M8K, or
NetEngine 8000E M8.
----End
Context
To ensure that the FlexE clients on both ends can communicate with each other,
you need to configure the same ID and bandwidth for them.
Table 1-16 Numbers of physical ports that can be added to the same group and
port-id value ranges for different subcard models
Model Numbers of Physical Ports port-id Value Range
that Can Be Added to the
Same Group
CR8D00E4XFC1 0 1000-3000
1 1000-3000
2 1000-3000
3 1000-3000
CR8D00E1NBC4 0 1000-3000
(NetEngine 8000
M8M14,
NetEngine 8100
M8M14)
DPE1E4NBIYFS 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
DPE1E4NBIYFS 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8D00E4XFC4 0 1000-3000
1 1000-3000
2 1000-3000
3 1000-3000
CR8PM4BASDC2 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8PM4BASDC3 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8PM4BASAC2 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8PM4BASAC3 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8PM4BASDC6 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8PM4BASDC7 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8PM4BASAC6 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8PM4BASAC7 0, 2 1000-3000
(NetEngine 8000
M4) 1, 3 1000-3000
CR8DE1N8XFM0 0 1000-3000
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run flexe client-instance clientindex [ flexe-group groupIndex flexe-type full-
function [ port-id portid ] ]
A FlexE client is created and its view is displayed.
Step 3 Run flexe-clientid clientid
An ID is configured for the FlexE client.
Step 4 Configure bandwidth for the FlexE client.
● If the bandwidth mode is configured for the FlexE card, run the flexe-
bandwidth { 1 | 2 | 3 | 4 | bandwidth-value } command to configure
bandwidth for the FlexE client.
● If the timeslot mode is configured for the FlexE card, run the binding
interface interface-type interface-number time-slot timeslot-list [ sub-time-
slot subtime-slot ] command to bind one or more sub-timeslots to the FlexE
client. The bound sub-timeslots constitute the bandwidth of the FlexE client.
Step 5 (Optional) Run minimal available bandwidth percent
The minimum available bandwidth percentage is configured for the FlexE client.
Step 6 Run commit
----End
Usage Scenario
As shown in Figure 1-39, DeviceA and DeviceB on the live network work in
standard Ethernet mode and do not support DCN auto-negotiation on FlexE
physical interfaces. The new NE DeviceC works in FlexE mode and supports DCN
auto-negotiation on FlexE physical interfaces.
After DeviceC is added, the underlying working mode of the FlexE physical
interfaces automatically switches from FlexE to standard Ethernet within about
10s because DCN auto-negotiation is enabled on them by default. The NMS can
then manage DeviceC.
If you want to change the services on the live network to the FlexE mode, perform
the following steps:
Procedure
Step 1 Run the flexe enable port port-position command on DeviceA to switch the
working mode of the Ethernet interface from standard Ethernet to FlexE. Because
the underlying working mode of the FlexE physical interface on DeviceC has been
switched to standard Ethernet, the DCN channel between DeviceA and DeviceC is
interrupted, and DeviceC is disconnected from the NMS.
Step 2 Change the status of the FlexE physical interface on DeviceA manually, triggering
the underlying working mode of DeviceC's FlexE physical interface connected to
the FlexE physical interface on DeviceA to quickly switch back to the FlexE mode.
You can perform the following operations:
● Run the laser turn-off command on DeviceA to disable the optical module
laser, and then run the laser turn-on command to enable the optical module
laser.
● Run the shutdown command on DeviceA to disable the interface, and then
run the undo shutdown command to enable the interface.
After the preceding operations are complete, the FlexE physical interface
connecting DeviceC to DeviceA is switched back to the FlexE mode. The two
devices are now successfully connected using FlexE, and the NMS can continue to
manage DeviceC.
NOTE
In the preceding scenarios, the operations on DeviceB are the same as those on DeviceA.
----End
Usage Scenario
● Adding a FlexE NE to a live network running FlexE services
As shown in Figure 1-40, DeviceA and DeviceB work in FlexE mode on the live
network, and the new NE DeviceC also works in FlexE mode.
In the following scenarios, the operations on DeviceB are the same as those on
DeviceA.
Procedure
● If DeviceA supports DCN auto-negotiation on FlexE physical interfaces, but
DeviceC does not:
After DeviceC is added, the underlying working mode of the FlexE physical
interface on DeviceA automatically switches from FlexE to standard Ethernet
within about 10s because DCN auto-negotiation is enabled on the FlexE
physical interface by default. The NMS can then manage DeviceC.
– If you run the following commands on DeviceA within 20 minutes of
being added, the configuration takes effect immediately to ensure DCN
continuity.
i. Run the system-view command to enter the system view.
ii. Run the interface interface-type interface-number command to
enter the view of a specified FlexE physical interface (for example,
FlexE-50G 0/9/1).
iii. Run the force-physical-mode ethernet command to forcibly switch
the underlying working mode of the FlexE physical interface to
standard Ethernet.
NOTE
After the preceding operations are complete, the FlexE physical interface
connecting DeviceA to DeviceC is switched back to the FlexE mode. The two
devices are now successfully connected using FlexE, and the NMS can
continue to manage DeviceC.
● If both DeviceA and DeviceC support DCN auto-negotiation on FlexE physical
interfaces:
After DeviceC is added, the underlying working mode of the FlexE physical
interface on DeviceA automatically switches from FlexE to standard Ethernet
within about 10s because DCN auto-negotiation is enabled on the FlexE
physical interface by default. The NMS can then manage DeviceC.
If you want to continue to run FlexE services on the live network, perform the
following operations:
Context
● OH mode: Clock messages are transmitted using FlexE overhead timeslots.
The configuration related to clock synchronization is the same as that on a
standard Ethernet interface.
● Client mode: Clock messages are transmitted using FlexE clients. In this mode,
the FlexE interface that carries clock services must be bound to a FlexE
physical interface that has clock services deployed.
Pre-configuration Tasks
1588v2 has been configured, no matter which mode is used to transmit 1588v2
messages. For details, see HUAWEI NetEngine 8100 M14/M8, NetEngine 8000
M14K/M14/M8K/M8/M4 & NetEngine 8000E M14/M8 series Router Configuration
Guide > System Management.
After 1588v2 is configured on a FlexE physical interface, 1588v2 messages are
transmitted in OH mode by default. To change the transmission mode of 1588v2
messages to Client, perform the following steps.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The view of a specified FlexE physical interface (for example, FlexE-50G 0/1/0) is
displayed.
Step 3 Run clock binding flexe interface iftype ifnum
A specified FlexE interface carrying clock services is bound to the FlexE physical
interface.
Step 4 Run commit
----End
Prerequisites
A FlexE interface has been configured.
Procedure
● Run the display flexe group information slot slot-id card card-id command
to check the group information of a FlexE card.
● Run any of the following commands to check information about FlexE service
interfaces, FlexE physical interfaces, and physical interfaces bound to a FlexE
group:
– display flexe client information [ interface { interface-type interface-
number | interface-name } ]
– display flexe client information [ index clientindex ]
– display flexe physical-interface information [ interface { interface-type
interface-number | interface-name } } ]
● Run the display interface ethernet brief command to check brief
information about FlexE interfaces.
● Run the display interface flexe interface-number command to check the
running status and statistics of a FlexE interface.
● Run the display lldp neighbor brief command to check brief information
about LLDP neighbors of FlexE interfaces.
----End
Context
Interface groups are classified into permanent and temporary interface groups.
Multiple interfaces can be added to the same permanent or temporary interface
group to enable batch command configurations for the interfaces. The differences
between permanent and temporary interface groups are described as follows:
● After a user exits the view of a temporary interface group, the system
automatically deletes the temporary interface group. A permanent interface
group, however, can be deleted only by using the undo port-group command.
● Information about a permanent interface group can be viewed using the
display port-group command, whereas information about a temporary
interface group cannot.
Procedure
● Configure a permanent interface group.
a. Run system-view
NOTE
----End
Usage Scenario
When a network-side interface goes Down in a dual-device backup scenario, user-
side devices cannot detect the Down event and therefore do not switch traffic to
the backup link. As a result, traffic overloads or interruptions occur. To prevent
these problems, you can configure an interface monitoring group to monitor the
network-side interface status and instruct the user-side interface to change its
status accordingly. An interface monitoring group allows traffic to be switched
between the master and backup links and prevents traffic overloads or
interruptions.
On the network shown in Figure 1-42, PE2 backs up PE1. NPE1 through NPEM on
the user side is dual-homed to the two PEs to load-balance traffic, and the two
PEs are connected to DeviceA through DeviceN on the network side. When only
the link between PE1 and DeviceN is available and all the links between PE1 and
all the other routers fail, the NPEs do not detect the failure and continue sending
packets to DeviceN through PE1. As a result, the link between PE1 and DeviceN
becomes overloaded.
To resolve this problem, you can configure an interface monitoring group and add
multiple network-side interfaces on the PEs to the interface monitoring group.
When a link failure occurs on the network side and the interface monitoring group
detects that the status of a certain proportion of network-side interfaces changes,
the system instructs the user-side interfaces associated with the interface
monitoring group to change their status accordingly and allows traffic to be
switched between the master and backup links. Therefore, the interface
monitoring group can be used to prevent traffic overloads or interruptions.
Pre-configuration Tasks
Before configuring an interface monitoring group, configure physical attributes for
interfaces on the router.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run monitor-group monitor-group-name
An interface monitoring group is created, and the interface monitoring group view
is displayed.
Step 3 Run binding interface interface-type interface-number [ down-weight down-
weight-value ]
An interface is added to the interface monitoring group.
The interface added to an interface monitoring group is called a binding interface.
A binding interface is located on the network side and a track interface on the
user side. An interface monitoring group monitors the binding interface status and
allows the track interfaces to change their status accordingly.
You can repeat this step to add multiple binding interfaces to an interface
monitoring group.
Step 4 Run quit
Exit from the interface monitoring group view.
Step 5 Run interface interface-type interface-number
The view of the specified interface on the user side is displayed.
Step 6 Run track monitor-group monitor-group-name [ trigger-down-weight trigger-
down-weight-value ]
The interface is associated with an interface monitoring group.
The user-side interface associated with an interface monitoring group is called a
track interface.
You can repeat steps 5 and 6 to associate multiple track interfaces to an interface
monitoring group.
If the down weight sum of all the binding interfaces in the monitoring group is
greater than or equal to the value specified using trigger-down-weight-value on
the track interface, the track interface goes down, and service traffic is switched to
the backup link. Otherwise, the track interface goes up, and service traffic is
switched back to the primary link.
Step 7 Run quit
Exit from the interface view.
Step 8 Run monitor-group monitor-group-name
The view of the created interface monitoring group is displayed.
Step 9 (Optional) Run trigger-up-delay trigger-up-delay-value
The delay after which a track interface goes Up is set.
Step 10 Run monitor enable
The monitoring function is enabled.
Step 11 Run commit
The configuration is committed.
----End
Context
NOTICE
Statistics cannot be restored after being cleared. Exercise caution when running
the following commands.
Procedure
● To clear the traffic statistics on an interface, run the reset counters interface
command in the user view.
● To clear the historical peak rate of an interface and obtain the peak rate in
subsequent periods, run the reset counters peak-rate interface command in
the user view.
----End
Procedure
● Run the monitor interface-statistics interface-type interface-number &<1-5>
[ interval interval-value | times { times-value | infinity } ] * command in any
view to check traffic statistics on a specified interface.
● Run the monitor interface-statistics batch [ interface-type [ interface-
number-begin [ to interface-number-end ] ] ] [ interval interval-value | times
{ times-value | infinity } ] * [ main ] command in any view to check traffic
statistics on interfaces in a batch.
● Run the monitor interface-information interface interface-type interface-
number [ interval interval-value | times { times-value | infinity } ] *
command in any view to check detailed information, including the running
status and traffic statistics, on a specified interface.
● Run the monitor counters bit [ rate ] interface interface-type interface-
number [ interval interval-value | times { times-value | infinity } ] *
command in any view to monitor traffic statistics on an interface. The traffic
statistics include the number of unicast, multicast, and broadcast packets sent
or received by the interface and the packet transmission rate.
----End
Networking Requirements
To ensure smooth communication between devices on a network, you need to
configure both physical and logical interfaces properly and set the following
parameters:
● Interface description
● MTU
● Trap threshold for the outbound and inbound bandwidth usage on a specified
interface
● Interval at which traffic statistics are collected
● Whether the device sends a trap message to the network management
system (NMS) when the interface status changes
● Whether the control-flap function is enabled
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a description for an interface.
2. Set an MTU for the interface to ensure successful packet transmission over
the interface.
3. Set the interval at which traffic statistics (including the traffic volumes and
rates) are collected globally.
4. Create a sub-interface and set an MTU for the sub-interface so that packets
can reach the receiver.
Data Preparation
To complete the configuration, you need the following data:
● Interface name
● Interface description
● Interface MTU
● Interval at which traffic statistics are collected globally
● Sub-interface MTU
Procedure
Step 1 Configure a description for an interface.
<HUAWEI> system-view
[~HUAWEI] interface gigabitethernet 0/2/0
[~HUAWEI-GigabitEthernet0/2/0] description for IFM
[*HUAWEI-GigabitEthernet0/2/0] commit
Step 3 Set the interval at which traffic statistics are collected globally.
[~HUAWEI] set flow-stat interval 100
[*HUAWEI] commit
----End
Configuration Files
#
set flow-stat interval 100
#
interface Gigabitethernet0/2/0
description for IFM
mtu 1000
#
interface Gigabitethernet0/2/0.1
mtu 800
#
return
Networking Requirements
On the network shown in Figure 1-43, FlexE clients need to be created on DeviceA
and DeviceB for communication. Different bandwidths are configured for the FlexE
clients to meet requirements for diversified services and applications. The
bandwidths of FlexE Client1, FlexE Client2, FlexE Client3, and FlexE Client4 need to
be set to 4 Gbit/s, 5 Gbit/s, 15 Gbit/s, and 20 Gbit/s, respectively.
Precautions
When you configure FlexE interfaces, note the following:
● To ensure normal communication between interconnected devices, you need
to configure the same PHY number for the FlexE physical interfaces on both
of them.
● To ensure normal communication between interconnected devices, you need
to configure the same group number for the FlexE groups to which the FlexE
physical interfaces on both devices are added.
● To ensure that the FlexE clients on both ends can communicate with each
other, you need to configure the same ID and bandwidth for them.
Configuration Roadmap
The configuration roadmap is as follows:
1. Activate the FlexE interface license on a board.
2. Configure a standard Ethernet interface to work in FlexE mode.
3. Configure a PHY number for a FlexE physical interface.
4. Create a FlexE group and bind the FlexE physical interface to it.
Data Preparation
To complete the configuration, you need the following data:
● PHY number of a FlexE physical interface: 5
● Index of a FlexE group: 1
● Number of a FlexE group: 2345
● Sub-timeslot granularity of a FlexE card: 1 Gbit/s
● IDs of four FlexE interfaces: port numbers of interface 1, interface 2, interface
3, and interface 4
● IDs of four FlexE clients: 1, 2, 3, and 4 (corresponding to 4 Gbit/s, 5 Gbit/s, 15
Gbit/s, and 20 Gbit/s bandwidths, respectively)
Procedure
Step 1 Activate the FlexE interface license on a board.
<DeviceA> license active XXXXX.dat
<DeviceA> system-view
[~DeviceA] license
[~DeviceA-license] active port-slicing slot 9 card 9 port 1
[*DeviceA-license] commit
[~DeviceA-license] quit
Step 4 Create a FlexE group and bind the FlexE physical interface to it.
[~DeviceA] flexe group 1
[*DeviceA-flexe-group-1] binding interface FlexE-50G0/9/1
Step 7 Create a FlexE client and configure an ID and bandwidth for it.
[~DeviceA] flexe client-instance 1 flexe-group 1 flexe-type full-function port-id 129
[*DeviceA-flexe-client-1] flexe-clientid 1
Warning: The traffic on this interface may be interrupted if the operation is performed. Continue? [Y/N]:y
[*DeviceA-flexe-client-1] flexe-bandwidth 4
[*DeviceA-flexe-client-1] commit
[~DeviceA-flexe-client-1] quit
[~DeviceA] flexe client-instance 2 flexe-group 1 flexe-type full-function port-id 130
[*DeviceA-flexe-client-2] flexe-clientid 2
Warning: The traffic on this interface may be interrupted if the operation is performed. Continue? [Y/N]:y
[*DeviceA-flexe-client-2] flexe-bandwidth 5
[*DeviceA-flexe-client-2] commit
[~DeviceA-flexe-client-2] quit
[~DeviceA] flexe client-instance 3 flexe-group 1 flexe-type full-function port-id 131
[*DeviceA-flexe-client-3] flexe-clientid 3
Warning: The traffic on this interface may be interrupted if the operation is performed. Continue? [Y/N]:y
[*DeviceA-flexe-client-3] flexe-bandwidth 15
[*DeviceA-flexe-client-3] commit
[~DeviceA-flexe-client-3] quit
[~DeviceA] flexe client-instance 4 flexe-group 1 flexe-type full-function port-id 132
[*DeviceA-flexe-client-4] flexe-clientid 4
Warning: The traffic on this interface may be interrupted if the operation is performed. Continue? [Y/N]:y
[*DeviceA-flexe-client-4] flexe-bandwidth 20
[*DeviceA-flexe-client-4] commit
[~DeviceA-flexe-client-4] quit
Step 8 Configure an IP address for each interface. For configuration details, see
Configuration Files in this section.
Step 9 Repeat the preceding steps on DeviceB. For configuration details, see
Configuration Files in this section.
After completing the preceding configuration, run the display flexe group
information command on DeviceA and DeviceB to check group information of
FlexE cards. The command output on DeviceA is used as an example.
[~DeviceA] display flexe group information slot 9 card 9
FlexE Card Info:
=============================================================
FlexE Config Mode : Bandwidth
=============================================================
Real RX Phy No :5
Remote Phy No :5
=============================================================
------------------------------------------------------
port-no : FlexE-50G0/9/1
ts-num : 20
sub-ts-num :5
-------------------------------------------------------
time-slot-id ts-port-map
-------------------------------------------------------
0: [129][129][129][129][130]
1: [130][130][130][130][131]
2: [131][131][131][131][131]
3: [131][131][131][131][131]
4: [131][131][131][131][132]
5: [132][132][132][132][132]
6: [132][132][132][132][132]
7: [132][132][132][132][132]
8: [132][132][132][132][-]
9: [-][-][-][-][-]
10: [-][-][-][-][-]
11: [-][-][-][-][-]
12: [-][-][-][-][-]
13: [-][-][-][-][-]
14: [-][-][-][-][-]
15: [-][-][-][-][-]
16: [-][-][-][-][-]
17: [-][-][-][-][-]
18: [-][-][-][-][-]
19: [-][-][-][-][-]
=============================================================
Run the display interface ethernet brief command on DeviceA and DeviceB to
check brief information about FlexE interfaces. The command output on DeviceA
is used as an example.
[~DeviceA] display interface ethernet brief
PHY: Physical
*down: administratively down
^down: standby
(l): loopback
(b): BFD down
(d): Dampening Suppressed
(p): port alarm down
InUti/OutUti: input utility/output utility
Interface PHY Auto-Neg Duplex Bandwidth InUti OutUti Trunk
FlexE0/9/129 up - full 4G 0.01% 0.01% --
FlexE0/9/130 up - full 5G 0.01% 0.01% --
FlexE0/9/131 up - full 15G 0.01% 0.01% --
FlexE0/9/132 up - full 20G 0.01% 0.01% --
FlexE-50G0/9/1 up - full 50G -- -- --
Run the display lldp neighbor brief command on DeviceA and DeviceB to check
brief information about LLDP neighbors of FlexE interfaces. The command output
on DeviceA is used as an example.
[~DeviceA] display lldp neighbor brief
Local Intf Neighbor Dev Neighbor Intf Exptime (sec)
--------------------------------------------------------------------------------------
FlexE0/9/129 DeviceB FlexE0/9/129 114
FlexE0/9/130 DeviceB FlexE0/9/130 114
FlexE0/9/131 DeviceB FlexE0/9/131 114
FlexE0/9/132 DeviceB FlexE0/9/132 114
FlexE-50G0/9/1 DeviceB FlexE-50G0/9/1 95
----End
Configuration Files
● DeviceA configuration file
#
sysname DeviceA
#
set flexe sub-time-slot granula slot 9 card 9 1g
flexe enable port 0/9/1
#
flexe group 1
flexe-groupnum 2345
Definition
Currently, carrier-class networks require high reliability for IP devices. As such,
devices on the networks are required to rapidly detect faults. After fast detection is
enabled on an interface, the alarm reporting speed is accelerated. As a result, the
physical status of the interface frequently alternates between up and down,
causing frequent network flapping. Therefore, alarms must be filtered and
suppressed to prevent frequent network flapping.
Transmission alarm suppression can efficiently filter and suppress alarm signals to
prevent interfaces from frequently flapping. In addition, transmission alarm
customization can control the impact of alarms on the interface status.
● Transmission alarm customization allows you to specify alarms that can cause
the physical status of an interface to change. This function helps filter out
unwanted alarms.
● Transmission alarm suppression allows you to suppress frequent network
flapping by setting thresholds and using a series of algorithms.
Purpose
Transmission alarm customization allows you to filter unwanted alarms, and
transmission alarm suppression enables you to set thresholds on customized
alarms, allowing devices to ignore burrs generated during transmission link
protection and preventing frequent network flapping.
From the perspective of the entire network, IP devices are expected to ignore such
burrs. That is, IP devices must customize and suppress the alarms that are
generated during transmission device maintenance or link switchovers. This can
prevent route flapping. Transmission alarm customization can control the impact
of transmission alarms on the physical status of interfaces. Transmission alarm
suppression can efficiently filter and suppress specific alarm signals to avoid
frequent interface flapping.
Basic Concepts
Network Flapping
Network flapping occurs when the physical status of interfaces on a network
frequently alternates between Up and Down.
Alarm Burrs
An alarm burr is a process in which alarm generation and alarm clearance signals
are received in a short period (The period varies with specific usage scenarios,
devices, or service types).
Alarm Flapping
Alarm flapping is a process in which an alarm is repeatedly generated and cleared
in a short period (The period varies with specific usage scenarios, devices, or
service types).
For example, if an LOS alarm is generated and cleared 10 times in 1s, alarm
flapping occurs.
If the interval between an alarm signal generation and clearance is smaller than
the filtering timer value, this alarm signal is considered a burr.
● If the alarm signal is a burr, it is ignored. The physical status of the interface
remains unchanged.
● If the alarm signal is not a burr:
– The physical status of the interface changes to Down if the signal is an
alarm generation signal.
– The physical status of the interface changes to Up if the signal is an
alarm clearance signal that is not suppressed.
Figure 1-44 shows the correlation between a transmission device sending alarm
generation signals and how figure of merit increases and decreases.
1. At t1 and t2, figure of merit is smaller than suppress. Therefore, alarm
signals generated at t1 and t2 affect the physical status of the interface, and
the physical status of the interface changes to Down.
2. At t3, figure of merit exceeds suppress, and the alarm is suppressed. The
physical status of the interface is not affected, even if new alarm signals
arrive.
3. At t4, figure of merit reaches ceiling. If new alarm signals arrive, figure of
merit is recalculated but does not exceed ceiling.
4. At t5, figure of merit falls below reuse, and the alarm is free from
suppression.
Terms
None
Definition
Currently, carrier-class networks require high reliability for IP devices. As such,
devices on the networks are required to rapidly detect faults. After fast detection is
enabled on an interface, the alarm reporting speed is accelerated. As a result, the
physical status of the interface frequently alternates between up and down,
causing frequent network flapping. Therefore, alarms must be filtered and
suppressed to prevent frequent network flapping.
Transmission alarm suppression can efficiently filter and suppress alarm signals to
prevent interfaces from frequently flapping. In addition, transmission alarm
customization can control the impact of alarms on the interface status.
● Transmission alarm customization allows you to specify alarms that can cause
the physical status of an interface to change. This function helps filter out
unwanted alarms.
● Transmission alarm suppression allows you to suppress frequent network
flapping by setting thresholds and using a series of algorithms.
Purpose
Transmission alarm customization allows you to filter unwanted alarms, and
transmission alarm suppression enables you to set thresholds on customized
alarms, allowing devices to ignore burrs generated during transmission link
protection and preventing frequent network flapping.
From the perspective of the entire network, IP devices are expected to ignore such
burrs. That is, IP devices must customize and suppress the alarms that are
Usage Scenario
In the scenario where transmission devices are connected to IP devices, if the
network is unstable, a large number of burr alarms will be generated. As a result,
the physical status of interfaces on the transmission devices will switch between
Up and Down. To enable IP devices to ignore these burrs, configure transmission
alarm customization on the IP devices.
Pre-configuration Tasks
Before configuring the transmission alarm customization function, power on the
router and ensure that it is working properly.
Configuring the Types of Alarms that Affect the Physical Status of Interfaces
In the scenario where a router is connected to a transmission device, if the
network is unstable, a large number of burr alarms may be generated. As a result,
the physical status of interfaces will frequently change between up and down. To
specify the alarms that can trigger the physical status of an interface to go down,
you can configure transmission alarm customization.
Context
Transmission alarm customization can be used to control the impact of
transmission alarms on the physical interface status. Perform the following steps
globally or on the interface connected to a transmission device:
NOTE
In VS mode, global transmission alarm customization is supported only by the admin VS.
Procedure
● Configure transmission alarm customization globally.
a. Run system-view
The system view is displayed.
b. Run transmission-alarm down { wan | pos } { auais | b1tca | b2tca |
b3tca | lais | lcd | lof | lom | lop | los | lrdi | lrei | oof | pais | pplm | prdi |
prei | puneq | rdool | rrool | sdbere | sfbere | trool } *
The types of transmission alarms whose generation causes 10GE WAN
and POS interfaces to go down physically are customized globally.
c. Run commit
The configuration is committed.
● Configure transmission alarm customization on an interface.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number or controller interface-
type interface-number
The corresponding interface view is displayed.
c. Run the following commands as required:
command.
NOTE
● Not all interfaces support the preceding alarms because the alarm types
supported may vary with subcards. If you attempt to customize an alarm type
that is not supported by an interface for the interface, the customization fails,
and a message is displayed, telling you which alarm types are not supported
by this interface.
● WLNK alarms can be viewed only and cannot be customized. The WLNK
alarms are always enabled, and their generation causes interfaces to go down
physically. To view the status and statistics on WLNK alarms, run the display
transmission-alarm command.
NOTICE
By default, the LAIS, LOF, and LOS alarms can change interface status. If
these alarms are disabled, forwarding of service data may be adversely
affected. Therefore, you are advised to keep these alarms enabled.
d. Run commit
The configuration is committed.
----End
(Optional) Configuring b1tca, b2tca, b3tca, sdbere, and sfbere Alarm Thresholds
The b1tca, b2tca, b3tca, sdbere, and sfbere alarm thresholds can be configured. An
alarm is reported only when the threshold is reached.
Context
Perform the following steps on the interface that is connected to the transmission
device:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number or controller interface-type
interface-number
The corresponding interface view is displayed.
Step 3 Run transmission-alarm threshold { b1tca b1tca | b2tca b2tca | b3tca b3tca |
sdbere sdbere | sfbere sfbere } *
The thresholds for reporting the b1tca, b2tca, b3tca, sdbere, and sfbere alarms are
configured.
The alarm thresholds are in the format of 10-n, where n is specified in the
corresponding alarm parameter in the transmission-alarm threshold command.
The value of sdbere must not be less than that of sfbere.
----End
Prerequisites
Transmission alarm customization has been configured. The transmission alarm
suppression function has been enabled using the transmission-alarm damping
command.
Procedure
● To check the alarm configuration on a POS or 10GE WAN interface, run the
display transmission-alarm { pos | wan } interface-number [ auais | b1tca |
b2tca | b3tca | lais | lcd | lof | lom | lop | los | lrdi | lrei | oof | pais | prdi |
prei | pplm | puneq | rdool | rrool | sdbere | sfbere | trool | wlnk ] *
command.
● To check the alarm configuration on a WDM interface, run the display
transmission-alarm wdm interface-number [ odu-ais | odu-lck | odu-oci |
otu-ais | otu-lom | otu-sd-ber | otu-sf-ber | pm-bdi | pm-tim | r-lof | r-los |
r-oof | sm-bdi | sm-iae | sm-tim | prefec-tca | odu-sd-ber ] * command.
● To check the alarm configuration on an E1 interface, run the display
transmission-alarm e1 interface-number [ los | lof | pais | prai ] * command.
● To check the alarm configuration on a CPOS interface, run the display
transmission-alarm cpos interface-number [ auais | b1tca | b2tca | b3tca |
lais | lof | lom | lop | los | lrdi | lrei | oof | pais | pplm | prdi | prei | puneq |
rrool | sdbere | sfbere ] command.
----End
Usage Scenario
In the scenario where a router is connected to a transmission device, if the
network is unstable, a large number of burr alarms may be generated. As a result,
the physical status of interfaces will frequently change between up and down. If a
transmission alarm filtering interval is configured, the alarms whose lifetime is
shorter than the interval will be ignored.
In VS mode, global transmission alarm filtering intervals are supported only by the admin
VS.
Pre-configuration Tasks
Before configuring transmission alarm filtering intervals, complete the following
tasks:
● Power on the router and ensure that the router passes the self-check.
● Configure transmission alarm customization on the router's interface
connected to the transmission device by referring to 1.1.2.2.3 Configuring
Transmission Alarm Customization.
NOTE
The alarm filtering function on an interface takes effect only after transmission alarm
customization is configured on the interface.
Procedure
● Enable the global alarm filtering function and set global generation and
clearance alarm filtering intervals.
a. Run system-view
The system view is displayed.
b. Run transmission-alarm holdup-timer holdup-time
Clearance alarm filtering is enabled globally, and an interval for filtering
clearance alarms is configured globally.
c. Run commit
The configuration is committed.
● Configure the alarm filtering function on an interface and set generation and
clearance alarm filtering intervals for the interface.
a. Run system-view
The system view is displayed.
b. Run the following commands as required:
▪ To enter the POS or 10GE WAN interface view, run the interface
interface-type interface-number command.
▪ To enter the CPOS interface view, run the controller cpos cpos-
number command.
▪ To enter the WDM interface view, run the controller wdm controller-
number command.
----End
Usage Scenario
In the scenario where a router is connected to a transmission device, if the
network is unstable, a large number of burr alarms may be generated. As a result,
the physical status of interfaces will frequently change between up and down. To
prevent these alarms from frequently flapping or configure the device to ignore
these burr alarms, you need to enable transmission alarm suppression.
Pre-configuration Tasks
Before configuring transmission alarm suppression, complete the following tasks:
● Power on the router and ensure that the router passes the self-check.
● Configure transmission alarm customization on the router's interface
connected to the transmission device by referring to 1.1.2.2.3 Configuring
Transmission Alarm Customization.
NOTE
Transmission alarm suppression takes effect on an interface only after transmission alarm
customization is configured on the interface.
Procedure
Step 1 Run system-view
----End
Procedure
● To query the current bit error rates of an interface, run the display
transmission-alarm bit-error-rate command in any view.
----End
Context
NOTICE
After information about transmission alarms has been cleared, all statistics on
alarms will be reset. Exercise caution when running the reset transmission-alarm
statistics command.
Procedure
● To clear the information about transmission alarms on an interface, run the
reset transmission-alarm statistics command in the interface view.
----End
Currently, devices are used as masters and APs in a port extension system.
Definition
On an IP core network, to meet more and more service deployment requirements
on the access and network sides, PE devices need to provide high-density Ethernet
interfaces. To enable a device to provide high-density Ethernet interfaces without
increasing investments, Huawei implements port extension.
On the network shown in Figure 1-45, port extension enables a device with higher
performance to be configured as a master and a large number of low-end devices
that support Ethernet interfaces to be configured as APs. The APs' Ethernet
interfaces are then mapped to the master's port extension interfaces, so that the
master provides high-density Ethernet interfaces. Services only need to be
configured on the master's port extension interfaces.
● AP: an access node in a port extension system. An AP can be considered as a
master's board and is automatically discovered and managed by a master. An
AP receives configuration and forwarding entries delivered by a master and
provides external communication interfaces.
● Master: a control node in a port extension system. A master establishes a
tunnel, delivers services, controls traffic, and manages connected APs.
NOTE
Ensure that the software versions running on the master and APs are the same. If the
software versions are inconsistent, services may be unavailable after the APs go online.
Related Concepts
The following table describes basic concepts involved in port extension.
Concept Description
Benefits
Port extension offers the following benefits:
● Reduced network construction costs
A master uses fewer slots to provide high-density Ethernet interfaces. Port
extension ensures that the existing devices that support Ethernet interfaces
are fully used (as APs) and prevents a large number of devices that support
Ethernet interfaces from being purchased, significantly reducing network
construction costs.
● Reduced network O&M costs
The control and management planes are centralized on a master, and services
are configured and queried on a master or network management system
(NMS). Therefore, customers do not need to configure or manage services on
APs, which significantly reduces network O&M costs.
Feature Description
Feature Description
Alarm and log A master and AP record their own alarm information
management in a port and independently send the alarm information to a
extension system network management system (NMS).
A syslog server can be specified on a master. A master
and AP record their own log information and
independently send the log information to the
specified syslog server.
Control Plane
The control plane of a port extension system is responsible for control channel and
internal forwarding channel.
Control Channel
In a port extension system, a control channel is established between an AP and
master. As shown in Figure 1-47, through the control channel:
Forwarding Plane
On the forwarding plane of a port extension system, an AP uses the internal
forwarding channel to send packets received from an external communication
interface to a master. The AP also receives packets from the master through the
internal forwarding channel and sends them through an external communication
interface. The AP is only responsible for data forwarding, and services are
processed on the master's port extension interface.
On the network shown in Figure 1-49, after the control plane is configured, the
master's port 1-1 becomes an internal communication interface, the AP2000's port
1 becomes an internal communication interface, and the AP2000's ports 2 to 4
become external communication interfaces. The master creates three port
extension interfaces port 2000-2, port 2000-3, and port 2000-4 for the AP2000's
three external communication interfaces. The master allocates three NVTAGs to
the AP2000's three external communication interfaces. The master and AP deliver
NVTAGs through forwarding entries. The master's forwarding entries record the
relationships among internal communication interfaces, port extension interfaces,
and NVTAGs. The AP's forwarding entries record the relationships among internal
communication interfaces, external communication interfaces, and NVTAGs.
AP PnP
In AP plug-and-play (PnP) mode, a master automatically detects and manages
APs when APs go online, go offline, migrate, or restart or when the master
restarts. The port extension system supports AP PnP, which simplifies network
O&M and management. AP PnP involves the following processes:
Figure 1-50 PnP process after an AP goes online for the first time
NOTE
Before deploying AP PnP, configure basic functions (port extension capability and master
role) on a master and enable DCN on the master's internal communication interface.
Step Description
3 Master uses the DCN function to detect the AP and identifies the initial
PnP status. Master reports the detected AP's information (such as the
ESN) to the NMS.
4 The NMS sends the basic configurations required for AP PnP (see Step 1)
to Master.
5 Master checks whether the AP's ESN has been locally configured. If the
AP's ESN has been locally configured, Master starts the PnP process.
Otherwise, Master stops the PnP process.
NOTE
To enable a master to manage an AP, configure the AP's ESN on the master.
6 Master uses the initial user name and password to establish STelnet
connections to the AP and issue a PnP start command to the AP.
7 The AP starts the PnP process and timer to wait for PnP process
completion.
10 The AP uses OSPF to advertise the PnP stop status in the port extension
system.
11 Master detects the AP's PnP stop status and reports it to the NMS. The
PnP process ends, and the AP goes online successfully.
NOTE
The preceding AP PnP process involves an NMS. If your scenario does not involve an NMS,
you must perform basic configurations required for AP PnP on a master in advance. This
operation also applies to the following PnP processes.
Step Description
1 After the AP restarts, it reads the locally stored PnP status and uses
OSPF to advertise its own PnP status in the port extension system.
2 The master uses the DCN function to detect the AP and identify the AP's
PnP status.
● If the AP's PnP status is initial, the process described in An AP Goes
Online for the First Time starts.
● If the AP's PnP status is complete, the PnP process does not start.
NOTE
If the AP restarts for configuration recovery, its PnP status is complete. If the AP
restarts for configuration clearing and loads the pre-configuration file, its PnP
status is initial.
Step Description
3 The master notifies the NMS that the AP has completed the PnP process.
Step Description
Step Description
2 The master uses the DCN function to detect the AP and identify the AP's
PnP status.
● If the AP's PnP status is initial, the process described in An AP Goes
Online for the First Time starts.
● If the AP's PnP status is complete, the PnP process does not start.
NOTE
In normal situations, the AP's PnP status is complete. If the AP restarts for
configuration clearing and loads the pre-configuration file, its PnP status is initial.
An AP Goes Offline
Figure 1-53 shows the AP going-offline process.
1 When the AP's routing information is deleted from the routing tables of
the master, the master detects that the AP has gone offline and
performs no action.
2 The master reports to the NMS information about the AP that goes
offline.
An AP Migrates
Figure 1-54 shows the PnP process after the AP migrates. The AP migrates from
Master 1 to Master 2.
Step Description
2 A user uses a master or the NMS to log in to the AP, delete basic
configurations, load the pre-configuration file, and delete the AP's PnP
status.
3 The AP starts a PnP process with Master 2. For details, see An AP Goes
Online for the First Time.
Network Management
● NETCONF channel
– NETCONF channel between master and the AP: The master establishes
NETCONF channel to the AP. A master uses a NETCONF channel to
deliver configurations, query commands (such as a command for
querying the status of the AP's external communication interface), and
maintenance commands (such as software package upgrade and AP
restart commands) to the AP.
– NETCONF channel between the NMS and master: The NMS uses this
channel to deliver configuration or query tasks to the master. After the
NETCONF channel between the NMS and master is connected to the
NETCONF channel between the master and AP, the NMS can also deliver
configuration or query tasks to the AP.
● SNMP channel
The master and the AP establish SNMP channels to the NMS and use the
SNMP channels to report alarms to the NMS.
SNMP channels use inband management. In inband management, the NMS
uses the forwarding paths provided by managed devices to manage network
devices. Services on a bearer network are usually carried over L3VPN to
achieve reliable transmission of network management information.
The principles are described as follows: A master communicates with the NMS
through an interface board's service interface. AP-to-NMS packets enter the
master's interface board and then are forwarded through the interface board.
The NMS provides the following functions in the port extension system:
● Participates in AP PnP. For details, see AP PnP.
● Provides configuration, maintenance, and information query for the master
and APs.
● Receives alarm information from the master and APs, helping network
administrators for troubleshooting.
When using STelnet on a master to log in to an AP, you can perform only query operations
(such as querying the status of the AP's external communication interface) and
maintenance operations (such as upgrading a software package and restarting the AP). You
can configure AP services directly on a master only.
Service Overview
If a customer has limited budget for constructing an IP core network and has
many low-end devices that support Ethernet interfaces, the customer can
purchase only few high-end devices or use software to upgrade the original high-
and low-end devices to masters and APs, respectively. In this way, the customer
can establish a port extension system to provide high-density Ethernet interfaces.
Networking Description
On an IP core network, typical application of a port extension system is used as a
PE node. The typical network is shown in Figure 1-56.
Feature Deployment
1. Specify a master and AP for a port extension system.
2. Bind the internal communication interfaces on the AP and master.
3. Bind the master's internal communication interface to the AP's external
communication interface.
Terms
Term Definition
AP access point
Usage Scenario
NOTE
NOTE
After a port extension system is deployed, the scope of service features supported by the
master's port extension interfaces is the same as that supported by local common Ethernet
interfaces.
Deployment Guidance
To completely deploy a port extension system and maintain and manage the
system on demand, perform the following configurations on a master:
Background
A port extension system consists of masters and APs. To simplify service
deployment and facilitate O&M and management, the control plane of the port
extension system is on a master. You can establish a port extension system on a
master. APs support plug-and-play (PnP). A master uses ESNs to automatically
identify APs and manage them, and delivers basic configurations to APs through
NETCONF channels. You do not need to perform configurations on APs.
Pre-configuration Tasks
Before establishing a port extension system, complete the following tasks:
● Retain the default configurations of the AP and load the pre-configuration
file.
● Obtain AP ESNs.
● Run the ssh client first-time enable command to enable SSH client first-time
authentication on a master.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run virtual-access port-extend
Port extension is enabled, and the port extension view is displayed.
Step 3 Run role master
The node is configured as a master. After this step is performed:
● All local physical interfaces become four-dimensional interfaces. For example,
dimension 1 in GigabitEthernet 1/0/1/1 indicates that the interface is a local
interface.
● The node automatically enables global BFD capabilities and establishes an IS-
IS process inside the port extension system based on local feature
configurations. The following table describes IS-IS process establishment rules.
The username and password must be set to the default username and password of an AP.
----End
Context
In a port extension system, a master can manage multiple APs at the same time.
You can repeat the following steps on a master to configure basic functions for
multiple APs.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ap-id ap-id
An AP is configured on the master, and the AP view is displayed.
Step 3 Run esn esn-number
An ESN is configured for the AP.
The port extension system supports plug-and-play (PnP) for an AP. After an AP
starts, it automatically enables the data communication network (DCN) function
and uses OSPF to advertise its ESN and initial PnP status. After a master discovers
the AP and identifies the initial PnP status, the master checks whether the AP's
ESN has been locally configured. If the AP's ESN has been locally configured, the
master starts the PnP process. A master uses an ESN to uniquely identify an AP,
and therefore different APs' ESNs cannot be the same.
Step 4 (Optional) Run sysname host-name
A host name is specified for the AP.
Step 5 Run commit
The configuration is committed.
Step 6 Run admin ip-address
A management IP address is configured for the AP.
The management IP address of the AP is used to establish internal control and
management channels to the master. This configuration is delivered by the master
----End
Context
To establish a port extension system, you must establish channels (such as
STelnet, SFTP, and NETCONF channels) between a master and AP. To ensure
system security, you must configure an authentication scheme for AP login. The
current authentication scheme supports the following authentication modes:
● Local authentication: If no HWTACACS server is deployed on the current
network, you can use the local authentication mode. Local authentication
features fast processing and low operation costs, but the amount of
information that can be stored is limited by a device's hardware capacity.
● HWTACACS authentication: HWTACACS authentication can be used to prevent
unauthorized users from attacking a port extension system. Compared with
local authentication, HWTACACS authentication features more reliable
transmission and encryption.
Perform the following steps on a master.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ap-id ap-id
The AP view is displayed.
Step 3 Run login-user user-name login-password password
A username and password required for the master to log in to the AP are
configured.
Step 4 Run commit
The configuration is committed.
Step 5 Run login-user user-name sftp-directory sftp-directory
A user name and SFTP directory required for the master to log in to the AP are
configured.
NOTE
If HWTACACS authentication is used, you must ensure that the user name and
password configured using the login-user command in Step 3 are the same as those
on the HWTACACS server. Otherwise, the AP cannot work normally.
● If local authentication is configured, perform the following operations:
a. Run the ap-user command to enter the virtual access AP-user view.
b. Run the local-user user-name password cipher password command to
create a local user name on the AP and configure a login password.
NOTE
If local authentication is used, you must ensure that the user name and password
configured using the login-user command in Step 3 are the same as those configured
using the local-user command. Otherwise, the AP cannot work normally.
----End
Context
In a port extension system, data traffic is transmitted through the internal
forwarding channel between internal communication interfaces on an AP and
master. To set up the channel, you must configure the directly connected physical
interfaces between the master and AP as physical internal communication
interfaces. To increase the bandwidth or improve reliability, you can also configure
the Eth-Trunk interfaces between the master and AP as internal trunk interfaces.
NOTE
Physical internal communication interfaces and internal trunk interfaces do not support
service configuration or sub-interface creation.
To view a physical internal communication interface on the AP connected to a physical
internal communication interface on a master, run the link detect interface interface-type
interface-number command in the user view to enable the master to send LAD packets.
Then, run the display link neighbor interface interface-type interface-number command
to view the neighbor information about the internal communication interfaces between the
master and AP.
Procedure
● Configure a physical internal communication interface.
a. Run system-view
After this step is performed, an IS-IS process inside the port extension
system is automatically enabled on the interface and the isis circuit-type
p2p command is automatically run to simulate the interface as a P2P
interface.
NOTE
● If you manually run the isis enable process-id command and then run the
virtual-access enable command on the interface, the port extension IS-IS
process is not automatically enabled and the isis circuit-type p2p command
is not automatically run on the interface. In this situation, you need to ensure
that port extension has been enabled for the IS-IS process specified by
process-id and manually run the isis circuit-type p2p command on the
interface. This brings heavy configuration workloads. In this case, the
automatic configuration solution is recommended. Do not run the isis enable
process-id command before running the virtual-access enable command.
● After an AP automatically goes online, port extension is automatically
enabled on the AP's all Ethernet interfaces. In addition, the AP automatically
saves the virtual-access enable configuration on corresponding interfaces.
d. Run dcn
DCN is enabled on the internal communication interface.
e. Run commit
The configuration is committed.
f. Run quit
Return to the system view.
g. Run ap-id ap-id
The AP view is displayed.
h. Run inner-connect ap-interface-type ap-interface-number binding
master-interface-type master-interface-number
The internal communication interfaces on the AP and master are bound.
Where:
▪ The binding configured in this step must match the actual physical
connection.
i. Run commit
The configuration is committed.
● Configure an internal trunk interface.
a. Configure an Eth-Trunk interface to work in manual load balancing
mode.
Configuration details are as follows:
NOTE
If you manually run the isis enable process-id command and then run the
virtual-access enable command on the Eth-Trunk interface, the port extension
IS-IS process is not automatically enabled and the isis circuit-type p2p
command is not automatically run on the Eth-Trunk interface. In this situation,
you need to ensure that port extension has been enabled for the IS-IS process
specified by process-id and manually run the isis circuit-type p2p command on
the Eth-Trunk interface. This brings heavy configuration workloads. Therefore, do
not manually run the isis enable process-id command before running the
virtual-access enable command.
d. Run commit
Where:
▪ The binding configured in this step must match the actual physical
connection.
----End
Context
In a port extension system, an AP can be considered as a card for extending
master interfaces. An AP receives configurations and forwarding entries from a
master and provides an external communication interface. To improve interface
density on a master, bind an AP's external communication interface to the
master's internal communication interface and create a port extension interface.
To configure Eth-Trunk for an AP's external communication interface, add the port
extension interface for the external communication interface to a common Eth-
Trunk interface as a port extension trunk interface on a master.
Procedure
Step 1 Run system-view
Where:
NOTE
After an AP goes online, port extension is automatically enabled on the AP's all Ethernet
interfaces. That is, the interfaces are internal communication interfaces by default. After
this step is performed on the master, port extension is automatically disabled on the AP's
external communication interface, because an interface cannot function as both an internal
communication interface and an external communication interface.
Step 6 (Optional) Configure a port extension trunk interface. Perform any of the
following tasks based on service requirements:
● Configure an Eth-Trunk interface to work in manual load balancing
mode.
● Configure an Eth-Trunk interface to work in static LACP mode.
● Configure an Eth-Trunk interface to work in manual 1:1 master/backup
mode.
When you perform any task, you must add the created port extension interface to
the Eth-Trunk interface.
NOTE
Currently, port extension interfaces and local common interfaces cannot be added to the
same Eth-Trunk interface.
----End
(Optional) Configuring Route Import Between the Port Extension System and
External Network
To enable an NMS to directly manage masters and APs, configure route import
between the port extension system and external network.
Context
A port extension system uses the DCN function to implement AP PnP, but a DCN is
characterized by route isolation. Therefore, if an NMS is used to manage a master
and AP, you must configure route import between the port extension system and
external network on a master.
Procedure
Step 1 Run system-view
The routes to the management IP addresses of the master and AP are imported
into a specified routing protocol. After this step is performed, routes in the port
extension system are imported into the DCN's external network. Before this step is
performed, configure routing protocols into which routes are to be imported on
the master.
NOTE
If a route to a management IP address is imported into IS-IS or OSPF, ensure that the
process specified by process-id does not import other routes. Otherwise, the configuration
fails.
A specified protocol's routes are imported into DCN. After this step is performed,
the route between the master and NMS is imported into DCN in the port
extension system. Before this step is performed, configure routing protocols whose
routes are to be imported into DCN and routing policies on the master.
----End
Prerequisites
A port extension system has been established.
Procedure
● Run the display virtual-access ap [ ap-id ] command to check basic AP
information.
● Run the display virtual-access ap statistics command to check AP statistics.
● Run the display virtual-access ap-interface [ ap-id ap-id ] command to
check AP interface information.
● Run the display interface { interface-name | interface-type interface-
number } remote command to check information about a specified port
extension interface on the master corresponding to the external
communication interface.
● Run the display remote interface interface-type interface-number command
to check information about a specified port extension interface on the master.
----End
Background
In the port extension solution, the control and management planes are centralized
on a master. You can upgrade and manage an AP on a master, including:
After you complete configurations, the master uses the NETCONF channel to
deliver the configurations to the AP and the AP automatically performs the
configurations.
NOTE
● During a software upgrade of the port extension system, upgrade APs and then masters.
The process for upgrading a master is the same as that for upgrading a common device.
● Ensure that the software versions running on the master and APs are the same. If the
software versions are inconsistent, services may be unavailable after the APs go online.
● You can also log in to an AP to upgrade and manage it.
Pre-configuration Tasks
Before upgrading and managing an AP on a master, complete the following tasks:
Procedure
Step 1 Upload a software package for an upgrade to an AP. The following table describes
upload methods.
Softw AP Command
are Range
Packa
ge
Sourc
e
NOTE
● After upgrade download-package is run, a user must enter an SFTP user name and
password as prompted for SFTP authentication between an AP and master or between
an AP and specified server.
● If the software package source is a specified server, configure the port extension system
and server to import each other's network segment route to implement connectivity
between the APs and server.
● To free up the system storage space, run the upgrade delete-package type command
on the master to delete unnecessary AP software packages.
Step 2 Run the display patch-information ap-id ap-id command to check whether any
running patch exists on the AP.
Step 3 (Optional) Run the patch delete all { all-ap | ap-id { startapid [ to endapid ] }
&<1-10> } command to delete the running patches on the AP.
Before using a software package to upgrade an AP, ensure that no patches are
running on the AP. If any patch is running on the AP, system software cannot be
upgraded. Perform this step if any patch is running on the AP. Otherwise, skip this
step.
● all-ap: configures system software for the next startup of all APs managed by
the master.
----End
Follow-up Procedure
Restart the AP for the software package to take effect immediately.
Installing a Patch
You can install a patch for an AP to optimize the AP's system functions or add
small requirements.
Procedure
Step 1 Upload a patch file to an AP. The following table describes upload methods.
Patch AP Command
File Range
Sourc
e
NOTE
● After upgrade download-package is run, a user must enter an SFTP user name and
password as prompted for SFTP authentication between an AP and master or between
an AP and specified server.
● If the software package source is a specified server, configure the port extension system
and server to import each other's network segment route to implement connectivity
between the APs and server.
● To free up the system storage space, run the upgrade delete-package type command
on the master to delete unnecessary AP patch packages.
Parameter Description
----End
Follow-up Procedure
● When the patch is installed without interrupting services:
– To delete the installed patch that results in an exception, run the patch
delete all { all-ap | ap-id { startapid [ to endapid ] } &<1-10> }
command.
● When the patch is installed for the next startup:
– To clear the patch configuration for the next startup, run the reset patch-
configure next-startup { all-ap | ap-id { startapid [ to endapid ] }
&<1-10>} command.
– Restart the AP for the patch to take effect immediately.
Restarting an AP
After configuring a software package for an AP's upgrade or a patch for an AP's
next startup, restart the AP to immediately validate the software package or patch
and check whether the configuration is successful.
Procedure
Step 1 Run system-view
The AP is restarted.
----End
Context
In a port extension scenario, to use an NMS to manage APs, you need to configure
SNMP in the port extension view of a master. After the configuration, when the IP
route between the NMS and an AP is reachable:
● The AP uses a trap message to report a fault alarm to the NMS.
● The AP records active alarms, and the NMS can use the MIB to query or
synchronize the active alarms on the AP.
NOTE
● In a port extension system, all services are configured on a master. Therefore, the
master is responsible for service alarm reporting. If an AP fails, it independently reports
a fault alarm.
● A master communicates with an NMS over SNMP. The configuration procedure is the
same as that in a common scenario.
Pre-configuration Tasks
Before configuring APs to communicate with an NMS over SNMP:
● Establish a port extension system.
When establishing a port extension system, you can configure route import
between the port extension system and external network so that the
routes between the NMS and APs are reachable.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run virtual-access port-extend
The port extension view is displayed.
Step 3 Run snmp-agent
The SNMP agent service is started.
A read/write community name and MIB view are configured for APs.
A community is a set of an NMS and SNMP agents and is identified using a
community name. The community name acts like a password to regulate
access to a managed device. An NMS can access a managed device only if the
community name carried in an SNMP request sent by the NMS is the same as
the community name configured on the managed device. Perform this step to
configure an SNMP community name for APs so that the NMS communicates
with the APs. You can also run the snmp-agent community command to set
a MIB view that is accessible using a community name.
● For SNMPv3:
a. Run snmp-agent group v3 group-name { authentication | privacy |
noauthentication } [ read-view read-view | write-view write-view |
notify-view notify-view ]
An SNMP user group is configured.
If an NMS and a device reside in an insecure network environment, for
example, they are prone to network attacks, you are advised to set
authentication or privacy to enable data authentication and encryption.
The available authentication and encryption modes are as follows:
The md5, sha, sha2-224, DES56, and 3DES168 algorithms in the snmp-agent
usm-user command are weak security algorithms. You are advised to use other
security algorithms. To prevent security risks, run the crypto weak-algorithm
disable command to disable the weak security algorithm function.
----End
Context
When an AP is running, the system records the AP's running status in real time
and generates related information. After the information management function is
enabled, configure the APs managed by the master to send information to a
syslog server for storage and query on a master. A network administrator can use
the information to monitor the running status of the APs and diagnose network
faults.
Perform the following steps on a master.
Pre-configuration Tasks
Before configuring APs to send information to a syslog server:
● Establish a port extension system.
When establishing a port extension system, you can configure route import
between the port extension system and external network so that the
routes between the NMS and APs are reachable.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run virtual-access port-extend
The port extension view is displayed.
Step 3 Run info-center loghost source interface-type interface-number
The source interface through which APs send information to a specified syslog
server is configured.
The syslog server can obtain the source interface address of received information
and determine which AP sends the information based on the source interface
address. This helps the syslog server properly retrieve the received information.
Step 4 Run info-center loghostipv4-address [ { local-time | utc } | facilitylocal-number |
port port-number | levellog-level | transport { udp | tcp } ] *
All the APs managed by the master are configured to send information to the
specified syslog server. Repeat this step to configure APs to send information to
multiple syslog servers, implementing information backup between the syslog
servers.
Step 5 (Optional) Run info-center source { module-name | default } channel { channel-
number | channel-name } [ log { state { off | on } | levelseverity } * | trap { state
{ off | on } | levelseverity } * | debug { state { off | on } | levelseverity } * ] *
A rule is configured for each AP to output information to an information channel.
Step 6 Run commit
The configuration is committed.
----End
Usage Scenario
On a master, you can configure a time format for AP information to meet the time
requirements in different places. After the configuration is complete, new
information on APs is generated using the configured time format.
NOTE
Procedure
Step 1 Run system-view
Step 3 Run one or more of the following commands to configure time formats for desired
information:
● Run the info-center timestamp log { boot | { date | short-date | format-
date | rfc-3339 } [ precision-time { tenth-second | millisecond | second } ] }
[ without-timezone ] command to configure the time format of log
information.
● Run the info-center timestamp trap { boot | { date | short-date | format-
date | rfc-3339 } [ precision-time { tenth-second | millisecond | second } ] }
[ without-timezone ] command to configure the time format of trap
information.
● Run the info-center timestamp debugging { boot | { date | short-date |
format-date | rfc-3339 } [ precision-time { tenth-second | second |
millisecond } ] } [ without-timezone ] command to configure the time
format of debugging information.
mm Month Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct,
Nov, or Dec.
----End
Context
APs log their operation information in real time. You can configure an AP
information output mode and log in to the desired AP to know its operation
information.
Perform the following steps on a master.
Procedure
● Output information to the display area.
a. Run system-view
The system view is displayed.
b. Run virtual-access port-extend
The port extension view is displayed.
c. (Optional) Run info-center logbuffer size buffersize
The maximum number of AP logs to be displayed is configured.
d. Run info-center source { module-name | default } channel { channel-
number | channel-name } log { state { off | on } | level severity } *
A rule is configured for each AP to output log information to an
information channel.
e. Run commit
The configuration is committed.
● Output information to a file.
a. Run system-view
The system view is displayed.
b. Run virtual-access port-extend
The port extension view is displayed.
Context
By default, traffic statistics collection is enabled on external communication
interfaces of an AP to monitor the running status of interfaces and services. To
adjust the interval for collecting traffic statistics on external communication
interfaces of an AP, perform either of the following operations on the master:
● Configure a global interval for collecting traffic statistics on an AP:
Run the set flow-stat interval command in the AP view. The configuration is
delivered to the corresponding AP and takes effect on the AP's external
communication interfaces mapped to the port extension interfaces with no
traffic statistics collection interval configured.
● Configure an interval for collecting traffic statistics on one or more specified
external communication interfaces of an AP:
Run the set flow-stat interval command in the view of a port extension
interface or port extension trunk interface. The configuration is delivered to
Procedure
● Configure a global interval for collecting traffic statistics on an AP.
a. Run system-view
The system view is displayed.
b. Run ap-id ap-id
The AP view is displayed.
c. Run set flow-stat interval interval
A global interval for collecting traffic statistics on the AP is set.
d. Run commit
The configuration is committed.
● Configure an interval for collecting traffic statistics on one or more specified
external communication interfaces of an AP.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The port extension interface view or port extension trunk interface view is
displayed.
c. Run set flow-stat interval interval
An interval for collecting traffic statistics on one or more specified
external communication interfaces of the AP is set.
d. Run commit
The configuration is committed.
----End
Context
Monitoring bandwidth usage helps you keep track of the load on an AP. If
bandwidth usage exceeds a specified threshold, bandwidth resources are
insufficient on an AP. In this case, you need to expand the capacity of the AP or
migrate services to another AP. The default alarm threshold for bandwidth usage
on an external communication interface of an AP is 90%. If the bandwidth usage
exceeds 90%, an alarm is generated, indicating that bandwidth resources are
almost exhausted. As a result, packet loss may occur before the capacity is
expanded or services are migrated. To resolve the preceding problem, adjust the
Procedure
Step 1 Run system-view
----End
Context
NOTICE
Statistics cannot be restored after being cleared. Therefore, exercise caution when
clearing statistics.
Procedure
● Run the reset counters [ if-mib ] interface { interface-name | interface-type
interface-number } remote command in the user view to clear remote
statistics or remote MIB statistics about a specified port extension interface or
port extension trunk interface.
----End
Networking Requirements
NOTE
Figure 1-59 shows the typical networking of a port extension system, which is
used to provide devices with high-density Ethernet interfaces on the IP core
network. Port extension enables a device with higher performance to be
configured as a master and a large number of low-end devices that support
Ethernet interfaces to be configured as APs. The APs' Ethernet interfaces are then
mapped to the master's port extension interfaces, so that the master provides
high-density Ethernet interfaces. Services only need to be configured on the
master's port extension interfaces.
Interfaces 1 through 3 in this example are GE 0/1/1, GE 0/1/2, and GE 0/1/3, respectively.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
● Management IP address of the master: 1.1.1.1; management IP address of
AP1: 2.2.2.2; management IP address of AP2: 3.3.3.3
● IS-IS authentication key ID: 1; authentication password: YsHsjx_202206
● Default username and password for the master to establish an STelnet
connection with an AP: root; password: Changeme_123
● Internal communication interfaces between the master and AP1: GE 0/1/1;
internal communication interfaces between the master and AP2: GE 0/1/2
and GE 0/1/1
● AP1 ID: 2000; AP1 ESN: 391092333866236; AP1's external communication
interfaces: GE 0/1/2 and GE 0/1/3
● AP2 ID: 2001; AP2 ESN: 391092333000298; AP2's external communication
interfaces: GE 0/1/2 and GE 0/1/3
● Authentication mode between the master and AP1 and between the master
and AP2: local authentication; username required for the master to log in to
AP1 and AP2: sys-admin; password: YsHsjx_202207; SFTP directory: cfcard:/;
name of a user created for AP1 and AP2 on the master: sys-admin; password:
YsHsjx_202207
Procedure
Step 1 Retain the default configurations for APs.
When an AP goes online for the first time, the master delivers a root user
configuration to the AP to establish a connection with the AP.
● Before an AP goes online, if the AP is logged in to in STelnet mode for the
first time, or the AP is logged in to through the console port and then the
console port password is modified, the AP cannot go online. In this case, you
need to manually clear the configuration and load the pre-configuration file.
The following uses AP1 as an example.
<AP1> reset saved-configuration
Warning: The action will delete the saved configuration on the device.
The configuration will be erased to reconfigure.Continue? [Y/N]:y
Warning: Now clearing the configuration on the device.
Info: Succeeded in clearing the configuration on the device.
<AP1> startup default-configuration default-custom_XXX_V***R***C**SPC***.defcfg
Warning: The action will override and update the default configuration file on the device. Continue?
[Y/N]:y
...
Info: Succeeded in setting the configuration for booting system.
NOTE
[~Master-ap2001] quit
AP Esn : 391092333000298
AP ID : 2001 Admin IP : 3.3.3.3
Master : 1.1.1.1
State : Online
Online Time : 2017-09-30 01:31:26
-----------------------------------------------------------------------------------------------
Run the display virtual-access bindinfo command on the master to view the
bindings between internal communication interfaces and port extension interfaces
on the master.
[~Master] display virtual-access bindinfo
--------------------------------------------------------------------------------------
AP-ID Inner-interface Out-interface
--------------------------------------------------------------------------------------
2000 GigabitEthernet1/0/1/1 GigabitEthernet2000/0/1/2
2000 GigabitEthernet1/0/1/1 GigabitEthernet2000/0/1/3
2001 GigabitEthernet1/0/1/2 GigabitEthernet2001/0/1/2
2001 GigabitEthernet1/0/1/2 GigabitEthernet2001/0/1/3
----End
Configuration Files
● AP1 configuration file
#
sysname AP1
#
virtual-access
role ap
admin 2.2.2.2
master admin-ip primary 1.1.1.1
isis authentication-mode hmac-sha256 key-id 1 cipher %^%#OqaV.B&wk-eu\lD0(u:5ZWFN)r'k:2uIW.-/
9:NU%^%#
#
undo user-security-policy enable
#
ip dcn vpn-instance __dcn_vpn__
ipv4-family
#
bfd
#
aaa
local-user sys-admin password irreversible-cipher $1c$VW58EBdUe"$uXfj.2l)I#za`:6tJ,w$U|
([5}MsD#|):rU(cV/+$
local-user sys-admin service-type ssh
local-user sys-admin state block fail-times 3 interval 5
local-user sys-admin user-group manage-ug
#
authentication-scheme default0
#
authentication-scheme default1
#
authentication-scheme default
authentication-mode local
#
authorization-scheme default
#
accounting-scheme default0
#
accounting-scheme default1
#
domain default0
#
domain default1
#
domain default_admin
authorization-scheme default
#
isis 65534
description auto-generated for virtual-access
is-level level-2
cost-style wide
virtual-access enable
network-entity 00.38ba.33bc.a402.00
binding interface GigabitEthernet0/1/1 down-weight 10
#
interface GigabitEthernet0/1/1
undo shutdown
isis enable 65534
isis circuit-type p2p
dcn
virtual-access enable
#
interface GigabitEthernet0/1/2
undo shutdown
#
interface GigabitEthernet0/1/3
undo shutdown
#
interface LoopBack2147483646
~Dk8$F&p73~P/x.%^%#
#
undo user-security-policy enable
#
ip dcn vpn-instance __dcn_vpn__
ipv4-family
#
bfd
#
aaa
local-user sys-admin password irreversible-cipher $1c$2"iN;T!PrW$4H+g1J;+D>"[]=$i,Z/4(5"MWJ-Ld
%)']CO`l>Z9$
local-user sys-admin service-type ssh
local-user sys-admin state block fail-times 3 interval 5
local-user sys-admin user-group manage-ug
#
authentication-scheme default0
#
authentication-scheme default1
#
authentication-scheme default
authentication-mode local
#
authorization-scheme default
#
accounting-scheme default0
#
accounting-scheme default1
#
domain default0
#
domain default1
#
domain default_admin
authorization-scheme default
#
isis 65534
description auto-generated for virtual-access
is-level level-2
cost-style wide
virtual-access enable
network-entity 00.38ba.33bc.a402.00
binding interface GigabitEthernet0/1/1 down-weight 10
#
interface GigabitEthernet0/1/1
undo shutdown
isis enable 65534
isis circuit-type p2p
dcn
virtual-access enable
#
interface GigabitEthernet0/1/2
undo shutdown
#
interface GigabitEthernet0/1/3
undo shutdown
#
interface LoopBack2147483646
description virtual-access loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 3.3.3.3 255.255.255.255
#
interface LoopBack2147483647
description DCN loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 172.16.1.2 255.255.0.0
#
ospf 65534 vpn-instance __dcn_vpn__
description DCN ospf create by default
opaque-capability enable
hostname
vpn-instance-capability simple
area 0.0.0.0
network 0.0.0.0 255.255.255.255
#
!The DCN function implements the capability of plug-and-play for this device.
!A NE IP address based on the unique NE ID is automatically generated in VPN
!of DCN. It is recommended that the NE IP address be changed to the planned
!one by running the ne-ip X.X.X.X <mask> command after the device being online.
dcn
#
stelnet ipv4 server enable
sftp ipv4 server enable
snetconf ipv4 server enable
stelnet ipv6 server enable
sftp ipv6 server enable
snetconf ipv6 server enable
ssh user sys-admin
ssh user sys-admin authentication-type password
ssh user sys-admin service-type all
ssh user sys-admin sftp-directory cfcard:/
ssh authorization-type default aaa
#
ssh server cipher aes256_gcm aes128_gcm aes256_ctr aes192_ctr aes128_ctr
ssh server hmac sha2_512 sha2_256
ssh server key-exchange dh_group_exchange_sha256
#
ssh server publickey rsa_sha2_256 rsa_sha2_512
#
ssh server dh-exchange min-len 3072
#
ssh client first-time enable
sftp client-source -a 3.3.3.3 -vpn-instance __dcn_vpn__
#
user-interface con 0
#
user-interface vty 0 4
authentication-mode aaa
protocol inbound ssh
#
netconf
idle-timeout 0 0
#
local-aaa-server
#
return
● Master configuration file
#
sysname Master
#
virtual-access port-extend
role master
admin 1.1.1.1
ap default login-user root login-password %^%#gOTF'nZ=j7+odk7U&I%>xVl0+h.l8AuNHt2_Y*n~%^
%#
isis authentication-mode hmac-sha256 key-id 1 cipher %^%#RmQD<'UJ)/Nl3L6*
+L8=*&(P"e4H[B~JbRW!W>3A%^%#
#
rsa peer-public-key 2.2.2.2
public-key-code begin
3082010A
02820101
009FD60F 4245F341 C86A4717 BB17C282 CE090BB7 12E1A73F FFBF0D44 D51EF073
49A6CA0D 90077E7C BE173037 2851FDB5 A3390BB9 96EAE330 3F999B47 0A765780
C21BEA42 9A132975 D3A1D64B DEF6E5C2 4CD6A7F3 909F7574 9B84B0A8 BF744446
67B00D1D 440DD081 8ABDA172 F995C80C C2953A13 F8D6EECA E835A442 C650A464
BA4B96A2 15D21EBE DD71D5FC 06F559D9 7DC11AD7 3D538CFC FDD408C8 03AA4B3B
D93E4764 BBDE5FB8 9A2ACBCF 3E7188EE 81995DC4 5A2C8F63 8994F7DA 0094E410
isis 65534
description auto-generated for virtual-access
is-level level-2
cost-style wide
virtual-access enable
network-entity 00.38ba.1a42.1f01.00
binding interface GigabitEthernet1/0/1/1 down-weight 10
binding interface GigabitEthernet1/0/1/2 down-weight 10
#
interface GigabitEthernet1/0/1/1
undo shutdown
isis enable 65534
isis circuit-type p2p
dcn
virtual-access enable
#
interface GigabitEthernet1/0/1/2
undo shutdown
isis enable 65534
isis circuit-type p2p
dcn
virtual-access enable
#
interface LoopBack2147483646
description virtual-access loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 1.1.1.1 255.255.255.255
#
interface LoopBack2147483647
description DCN loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 10.1.1.1 255.255.0.0
#
ap-id 2000
sysname ap2000
esn 391092333866236
admin 2.2.2.2
login-user sys-admin login-password %^%#(p@y@~'n3/4m<"=;YyWDZIyvCQuK5D1JbuYk^ODQ%^%#
login-user sys-admin sftp-directory cfcard:/
authentication-mode local
#
ap-user
local-user sys-admin password cipher %^%#otll=pnt1#I_[1TE|k'F9-RT!@>rGAa%<&J@q9H&%^%#
inner-connect GigabitEthernet0/1/1 binding GigabitEthernet1/0/1/1
remote-interface GigabitEthernet0/1/2 binding GigabitEthernet1/0/1/1
remote-interface GigabitEthernet0/1/3 binding GigabitEthernet1/0/1/1
#
ap-id 2001
sysname ap2001
esn 391092333000298
admin 3.3.3.3
login-user sys-admin login-password %^%#/md1*$flA+)0\t.0B"43,q{>+2*)f-k&PWLDzjcL%^%#
login-user sys-admin sftp-directory cfcard:/
authentication-mode local
#
ap-user
local-user sys-admin password cipher %^%#(1F!FQJ[FP&+-H@%pe)G5h9r:g$)DF&19m@N\T(9%^%#
inner-connect GigabitEthernet0/1/1 binding GigabitEthernet1/0/1/2
remote-interface GigabitEthernet0/1/2 binding GigabitEthernet1/0/1/2
remote-interface GigabitEthernet0/1/3 binding GigabitEthernet1/0/1/2
#
interface NULL0
#
ospf 65534 vpn-instance __dcn_vpn__
description DCN ospf create by default
opaque-capability enable
hostname
vpn-instance-capability simple
area 0.0.0.0