Huawei NE40 router Config Guide

  • Upload
    jopioug

  • View
    455

  • Download
    25

Embed Size (px)

Citation preview

  • 8/10/2019 Huawei NE40 router Config Guide

    1/265

    Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Quidway NetEngine80 Core Router

    V300R005

    Configuration Guide - BasicConfigurations

    Issue 04

    Date 2009-12-20

    Part Number 00407347

  • 8/10/2019 Huawei NE40 router Config Guide

    2/265

    Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. Forany assistance, please contact our local office or company headquarters.

    Huawei Technologies Co., Ltd.

    Address: Huawei Industrial Base

    Bantian, Longgang

    Shenzhen 518129

    People's Republic of China

    Website: http://www.huawei.com

    Email: [email protected]

    Copyright Huawei Technologies Co., Ltd. 2009. All rights reserved.

    No part of this document may be reproduced or transmitted in any form or by any means without priorwritten consent of Huawei Technologies Co., Ltd.

    Trademarks and Permissions

    and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.

    All other trademarks and trade names mentioned in this document are the property of their respectiveholders.

    Notice

    The information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but all statements, information, andrecommendations in this document do not constitute the warranty of any kind, express or implied.

  • 8/10/2019 Huawei NE40 router Config Guide

    3/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Contents

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    i

    Contents

    About This Document.....................................................................................................................1

    1 NE80 Core Router Overview....................................................................................................1-1

    1.1 Introduction .......................................................... ..................................................................... ..................1-2

    1.1.1 Overview...........................................................................................................................................1-21.1.2 Hardware Architecture ......................................................................................................................1-2

    1.1.3 Software Architecture........................................................................................................................1-3

    1.2 Characteristics of the NE80.........................................................................................................................1-5

    1.2.1 Support for Flattened Network Architecture ..................................................................... ................1-5

    1.2.2 Line-Speed Forwarding.....................................................................................................................1-6

    1.2.3 Multiple Interfaces ............................................................................................................................1-6

    1.2.4 Carrier-Class Availability ............................................................................ ......................................1-6

    1.2.5 Rich Services.....................................................................................................................................1-6

    1.2.6 Perfect Diff-Serv/QoS............................................................ ........................................................... 1-61.2.7 Excellent Security Mechanism..........................................................................................................1-7

    1.2.8 Practical NMS .............................................................. ..................................................................... 1-7

    1.2.9 Flexible Networking Capabilities......................................................................................................1-8

    1.3 Features List of the NE80............................................................................................................................1-8

    2 Establishment of the Configuration Environment..............................................................2-1

    2.1 Introduction .......................................................... ..................................................................... ..................2-2

    2.1.1 Login Through the Console...............................................................................................................2-2

    2.1.2 Login Through Telnet........................................................................................................................2-2

    2.1.3 Login Through AUX Port..................................................................................................................2-22.2 Logging In to the Router Through the Console Port ................................................................ ...................2-2

    2.2.1 Establishing the Configuration Task..................................................................................................2-2

    2.2.2 Establishing the Physical Connection ...............................................................................................2-3

    2.2.3 Configuring Terminals.......................................................................................................................2-3

    2.2.4 Logging In to the Router ............................................................ ....................................................... 2-3

    2.3 Logging In to Router Through Telnet..........................................................................................................2-4

    2.3.1 Establishing the Configuration Task..................................................................................................2-4

    2.3.2 Establishing the Physical Connection ...............................................................................................2-5

    2.3.3 Configuring Login User Parameters..................................................................................................2-5

  • 8/10/2019 Huawei NE40 router Config Guide

    4/265

    Contents

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    ii Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    2.3.4 Logging In from the Telnet Client.....................................................................................................2-5

    2.4 Logging In to the Router Through the AUX Port........................................................................................2-5

    2.4.1 Establishing the Configuration Task..................................................................................................2-5

    2.4.2 Establishing the Physical Connection ...............................................................................................2-6

    2.4.3 Initializing and Configuring the Modem on the Interface ................................................................. 2-6

    2.4.4 Configuring the Connection Between the Remote Terminal and the Router..................... ................2-6

    2.4.5 Logging In to the Router ............................................................ ....................................................... 2-7

    2.5 Configuration Examples..............................................................................................................................2-7

    2.5.1 Example for Logging In Through the Console Port .................................................................. ........2-7

    2.5.2 Example for Logging In Through Telnet...........................................................................................2-9

    2.5.3 Example for Logging In Through the AUX Port.............................................................................2-11

    3 CLI Overview..............................................................................................................................3-1

    3.1 Introduction .......................................................... ..................................................................... ..................3-2

    3.1.1 Command Line Interface...................................................................................................................3-2

    3.1.2 Command Levels...............................................................................................................................3-2

    3.1.3 Command Line Views ......................................................... .............................................................. 3-3

    3.2 Online Help ............................................................... .................................................................. ................3-6

    3.2.1 Full Help............................................................................................................................................3-6

    3.2.2 Partial help ........................................................................................................................................3-6

    3.2.3 Error Messages of the Command Line Interface...............................................................................3-7

    3.3 Features of Command Line Interface ............................................................................ ..............................3-7

    3.3.1 Editing...............................................................................................................................................3-7

    3.3.2 Displaying ........................................................... ....................................................................... .......3-8

    3.3.3 Regular Expressions..........................................................................................................................3-8

    3.3.4 History Commands..........................................................................................................................3-10

    3.4 Shortcut Keys ............................................................... .............................................................. ............... 3-11

    3.4.1 Classifying Shortcut Keys............................................................................ ................................... 3-11

    3.4.2 Defining Shortcut Keys...................................................................................................................3-12

    3.4.3 Use of Shortcut Keys.......................................................................................................................3-13

    3.5 Configuration Examples............................................................................................................................3-13

    3.5.1 Example for Using Shortcut Keys...................................................................................................3-13

    3.5.2 Copying Commands Using Shortcut Keys......................................................................................3-143.5.3 Example for Using Tab....................................................................................................................3-14

    4 Basic Configuration...................................................................................................................4-1

    4.1 Introduction .......................................................... ..................................................................... ..................4-2

    4.2 Configuring the Basic System Environment ................................................................. ..............................4-2

    4.2.1 Establishing the Configuration Task..................................................................................................4-2

    4.2.2 Switching the Language Mode..........................................................................................................4-3

    4.2.3 Configuring the Equipment Name.....................................................................................................4-3

    4.2.4 Configuring the System Clock ................................................................... .......................................4-3

    4.2.5 Configuring the Header Text ....................................................................... ......................................4-4

  • 8/10/2019 Huawei NE40 router Config Guide

    5/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Contents

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    iii

    4.2.6 Configuring Command Levels ................................................................. .........................................4-4

    4.3 Configuring Basic User Environment .........................................................................................................4-5

    4.3.1 Establishing the Configuration Task..................................................................................................4-5

    4.3.2 Configuring the Password for Switching User Levels ......................................................................4-6

    4.3.3 Switching User Levels ......................................................................................................................4-6

    4.3.4 Locking User Interfaces ................................................................ .................................................... 4-7

    4.4 Displaying System Status Messages............................................................................................................4-7

    4.4.1 Displaying System Configuration ......................................................................... ............................4-8

    4.4.2 Displaying System Status..................................................................................................................4-8

    4.4.3 Collecting System Diagostic Information .................................................................... .....................4-8

    5 User Management ......................................................................................................................5-1

    5.1 Introduction .......................................................... ..................................................................... ..................5-2

    5.1.1 User Interface View...........................................................................................................................5-2

    5.1.2 User Management .............................................................................................................................5-3

    5.2 Configuring Console User Interface............................................................................................................5-5

    5.2.1 Establishing the Configuration Task..................................................................................................5-5

    5.2.2 Configuring Console Interface Attributes..........................................................................................5-6

    5.2.3 Setting Console Terminal Attributes.................................................................................................. 5-7

    5.2.4 Configuring the User Interface Priority.............................................................................................5-7

    5.2.5 Configuring User Authentication ......................................................................................................5-8

    5.2.6 Checking the Configuration ............................................................................................................5-10

    5.3 Configuring AUX User Interface ..............................................................................................................5-10

    5.3.1 Establishing the Configuration Task................................................................................................5-10

    5.3.2 Configuring AUX Interface Attributes ................................................................ ............................ 5-11

    5.3.3 Configuring AUX Terminal Attributes .......................................................................... ..................5-12

    5.3.4 Configuring User Priority................................................................................................................5-13

    5.3.5 Configuring Modem Attributes .................................................................... ...................................5-13

    5.3.6 Configuring User Authentication ....................................................................................................5-14

    5.3.7 Checking the Configuration ............................................................................................................5-15

    5.4 Configuring VTY User Interface...............................................................................................................5-16

    5.4.1 Establishing the Configuration Task................................................................................................5-16

    5.4.2 Configuring Maximum VTY User Interfaces.................................................................................. 5-175.4.3 Configuring Limits for Incoming Calls and Outgoing Calls ........................................................... 5-17

    5.4.4 Configuring Timeout of VTY User Authorization........................................................................... 5-18

    5.4.5 Configuring VTY Terminal Attributes ............................................................................................ 5-18

    5.4.6 Configuring User Authentication ....................................................................................................5-19

    5.4.7 Checking the Configuration ............................................................................................................5-21

    5.5 Managing User Interfaces..........................................................................................................................5-21

    5.5.1 Establishing the Configuration Task................................................................................................5-21

    5.5.2 Sending Messages to Other User Interfaces ......................................................................... ...........5-22

    5.5.3 Clearing Online User.......................................................................................................................5-22

  • 8/10/2019 Huawei NE40 router Config Guide

    6/265

    Contents

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    iv Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    5.5.4 Checking the Configuration ............................................................................................................5-22

    5.6 Configuring User Management .......................................................... ....................................................... 5-23

    5.6.1 Establishing the Configuration Task................................................................................................5-23

    5.6.2 Configuring Authentication Mode...................................................................................................5-24

    5.6.3 Configuring Authentication Password.............................................................................................5-24

    5.6.4 Setting Username and Password for AAA Local Authentication .................................................... 5-24

    5.6.5 Configuring Non-Authentication.....................................................................................................5-25

    5.6.6 Configuring User Priority................................................................................................................5-26

    5.6.7 Checking the Configuration ............................................................................................................5-26

    5.7 Configuring Local User Management ......................................................................... ..............................5-26

    5.7.1 Establishing the Configuration Task................................................................................................5-26

    5.7.2 Creating Local User Account ......................................................................... .................................5-27

    5.7.3 Configuring the Service Type of the Local User........................................................................... ..5-27

    5.7.4 Configuring Local User Authority for FTP Directory........................................................... ..........5-28

    5.7.5 Configuring Local User Status .......................................................................... ..............................5-28

    5.7.6 Configuring Local User Priority......................................................................................................5-29

    5.7.7 Configuring Access Restriction of the Local User ................................................................ ..........5-29

    5.7.8 Checking the Configuration ............................................................................................................5-29

    5.8 Configuration Examples............................................................................................................................5-30

    5.8.1 Example for Configuring Logging In to the Router Through Password .........................................5-31

    5.8.2 Example for Logging In to the Router Through AAA.....................................................................5-32

    6 File System ..................................................................................................................................6-1

    6.1 Introduction .......................................................... ..................................................................... ..................6-2

    6.1.1 File System........................................................................................................................................6-2

    6.1.2 Storage Devices.................................................................................................................................6-2

    6.1.3 Files...................................................................................................................................................6-2

    6.1.4 Directories............................................................ ...................................................................... .......6-2

    6.2 Managing Storage Devices..........................................................................................................................6-2

    6.2.1 Establishing the Configuration Task..................................................................................................6-2

    6.2.2 Restoring Storage Devices with File System Troubles....................................... ...............................6-3

    6.2.3 Formatting Storage Devices ................................................................ ..............................................6-3

    6.3 Managing the Directory...............................................................................................................................6-46.3.1 Establishing the Configuration Task..................................................................................................6-4

    6.3.2 Viewing the Current Directory ........................................................................ ..................................6-5

    6.3.3 Switching the Directory.....................................................................................................................6-5

    6.3.4 Displaying the Directory of File........................................................................................................6-5

    6.3.5 Creating a Directory..........................................................................................................................6-6

    6.3.6 Deleting a Directory.................................................................... ...................................................... 6-6

    6.4 Managing Files ................................................................. ................................................................... ........6-6

    6.4.1 Displaying Contents of Files ................................................................... ..........................................6-7

    6.4.2 Copying Files ................................................................... ................................................................. 6-7

  • 8/10/2019 Huawei NE40 router Config Guide

    7/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Contents

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    v

    6.4.3 Moving Files .....................................................................................................................................6-8

    6.4.4 Renaming Files..................................................................................................................................6-8

    6.4.5 Deleting Files ................................................................ .................................................................... 6-9

    6.4.6 Deleting Files in the Recycle Bin......................................................................................................6-9

    6.4.7 Undeleting Files .................................................................. .............................................................. 6-9

    6.5 Running Files in Batch .......................................................... .................................................................. ..6-10

    6.6 Configuring Prompt Modes.......................................................................................................................6-10

    6.7 Example of Configuration ............................................................................ ............................................. 6-11

    7 Management of Configuration Files ......................................................................................7-1

    7.1 Introduction .......................................................... ..................................................................... ..................7-2

    7.1.1 Definitions.........................................................................................................................................7-2

    7.1.2 Configuration Files and Current Configurations ...................................................................... .........7-2

    7.2 Managing Configuration Files.....................................................................................................................7-2

    7.2.1 Establishing the Configuration Task..................................................................................................7-2

    7.2.2 Configuring System Software for a Router to Load..........................................................................7-3

    7.2.3 Configuring the Configuration File for Router to Load ....................................................................7-3

    7.2.4 Saving Configuration File ................................................................ ................................................. 7-4

    7.2.5 Clearing Configuration Files .................................................................... .........................................7-4

    7.2.6 Comparing Configuration Files.........................................................................................................7-5

    7.2.7 Checking the Configuration ..............................................................................................................7-5

    8 FTP, TFTP and XModem ..........................................................................................................8-1

    8.1 Introduction .......................................................... ..................................................................... ..................8-2

    8.1.1 FTP....................................................................................................................................................8-2

    8.1.2 TFTP .................................................................................................................................................8-2

    8.1.3 XModem ...........................................................................................................................................8-2

    8.2 Configuring the Router to be the FTP Server ........................................................................... ...................8-3

    8.2.1 Establishing the Configuration Task..................................................................................................8-3

    8.2.2 Configuring the source address of FTP server...................................................................................8-4

    8.2.3 Enabling the FTP Server ...................................................................................................................8-4

    8.2.4 Configuring the Timeout Period........................................................................................................8-4

    8.2.5 Configuring the Local Username and the Password..........................................................................8-5

    8.2.6 Configuring Service Types and Authorization Information............................................................... 8-5

    8.2.7 Checking the Configuration ..............................................................................................................8-6

    8.3 Configuring FTP ACL.................................................................................................................................8-6

    8.3.1 Establishing the Configuration Task..................................................................................................8-6

    8.3.2 Enabling the FTP Server ...................................................................................................................8-7

    8.3.3 Configuring the Basic ACL...............................................................................................................8-7

    8.3.4 Configuring the Basic FTP ACL .......................................................................... .............................8-8

    8.3.5 Checking the Configuration ..............................................................................................................8-8

    8.4 Configuring the Router to Be the FTP Client ............................................................ ..................................8-9

    8.4.1 Establishing the Configuration Task..................................................................................................8-9

  • 8/10/2019 Huawei NE40 router Config Guide

    8/265

    Contents

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    vi Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    8.4.2 Configuring the source address of FTP Client.................................................................................8-10

    8.4.3 Logging In to the FTP Server..........................................................................................................8-10

    8.4.4 Configuring Data Type and Transmission Mode for the File .......................................................... 8-10

    8.4.5 Viewing Online Help of the FTP Command ...................................................................... .............8-11

    8.4.6 Uploading or Downloading Files ........................................................ ............................................ 8-11

    8.4.7 Managing Directories......................................................................................................................8-11

    8.4.8 Managing Files................................................................................................................................8-12

    8.4.9 Changing Login Users.....................................................................................................................8-13

    8.4.10 Disconnecting from the FTP Server ........................................................................... ...................8-13

    8.4.11 Checking the Configuration...........................................................................................................8-14

    8.5 Configuring TFTP ............................................................ ......................................................................... 8-14

    8.5.1 Establishing the Configuration Task................................................................................................8-14

    8.5.2 Configuring the source address of TFTP Client.......................................................... ....................8-15

    8.5.3 Downloading Files Through TFTP..................................................................................................8-15

    8.5.4 Uploading Files Through TFTP ......................................................................................................8-15

    8.6 Limiting the Access to the TFTP Server....................................................................................................8-16

    8.6.1 Establishing the Configuration Task................................................................................................8-16

    8.6.2 Configuring the Basic ACL.............................................................................................................8-16

    8.6.3 Configuring the Basic TFTP ACL...................................................................................................8-17

    8.7 Configuring XModem ................................................................. .............................................................. 8-17

    8.7.1 Establishing the Configuration Task................................................................................................8-17

    8.7.2 Getting a File Through XModem................. ..................................................................... ..............8-18

    8.8 Configuration Examples............................................................................................................................8-188.8.1 Example for Configuring the FTP Server........................................................................................8-18

    8.8.2 Example for Configuring FTP ACL ................................................................ ................................8-21

    8.8.3 Example for Configuring the FTP Client ........................................................................................8-23

    8.8.4 Example for Configuring TFTP ......................................................................................................8-24

    8.8.5 Example for Configuring XModem ................................................................................................8-26

    9 Telnet and SSH...........................................................................................................................9-1

    9.1 Introduction .......................................................... ..................................................................... ..................9-2

    9.1.1 Overview of User Login....................................................................................................................9-2

    9.1.2 Telnet Terminal Services .................................................................... ...............................................9-29.1.3 SSH Terminal Services......................................................................................................................9-4

    9.2 Configuring Telnet Terminal Services.........................................................................................................9-7

    9.2.1 Establishing the Configuration Task..................................................................................................9-7

    9.2.2 Establishing a Telnet Connection ..................................................................... .................................9-8

    9.2.3 Establishing a Telnet Redirection Connection...................................................................................9-8

    9.2.4 Scheduled Telnet Disconnection .......................................................................................................9-9

    9.2.5 Checking the Configuration ..............................................................................................................9-9

    9.3 Configuring SSH Users ................................................................ ............................................................. 9-10

    9.3.1 Establishing the Configuration Task................................................................................................9-10

  • 8/10/2019 Huawei NE40 router Config Guide

    9/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Contents

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    vii

    9.3.2 Creating an SSH User .....................................................................................................................9-11

    9.3.3 Configuring SSH for the VTY User Interface............................................................... .................. 9-11

    9.3.4 Generating a Local RSA Key Pair...................................................................................................9-12

    9.3.5 Configuring the Authentication Mode for SSH Users.....................................................................9-12

    9.3.6 (Optional)Configuring the Basic Authentication Information for SSH Users................................. 9-14

    9.3.7 (Optional)Authorizing SSH Users Through the Command Line ....................................................9-14

    9.3.8 Configuring the Service Type of SSH Users ...................................................................... .............9-15

    9.3.9 (Optional)Configuring the Authorized Directory of SFTP Service for SSH Users.........................9-15

    9.3.10 Checking the Configuration ..........................................................................................................9-15

    9.4 Configuring the SSH Server......................................................................................................................9-16

    9.4.1 Establishing the Configuration Task................................................................................................9-16

    9.4.2 Enabling the STelnet Service...........................................................................................................9-17

    9.4.3 Enabling the SFTP Service..............................................................................................................9-17

    9.4.4 (Optional)Enabling the Earlier Version-Compatible Function ........................................................ 9-17

    9.4.5 (Optional)Configuring the Number of the Port Monitored by the SSH Server...............................9-18

    9.4.6 (Optional) Enabling the Trap Function............................................................................................9-18

    9.4.7 (Optional)Configuring the Interval for Updating the Key Pair on the SSH Server.........................9-19

    9.4.8 Checking the Configuration ............................................................................................................9-19

    9.5 Configuring the STelnet Client Function...................................................................................................9-20

    9.5.1 Establishing the Configuration Task................................................................................................9-20

    9.5.2 Enabling the First-Time Authentication on the SSH Client................................................. ............9-21

    9.5.3 (Optional) Configuring the SSH Client to Assign the RSA Public Key to the SSH Server ............9-21

    9.5.4 Enabling the STelnet Client.............................................................................................................9-229.5.5 Checking the Configuration ............................................................................................................9-22

    9.6 Configuring the SFTP Client Function......................................................................................................9-23

    9.6.1 Establishing the Configuration Task................................................................................................9-23

    9.6.2 Configuring the First-Time Authentication on the SSH Client ......................................... ..............9-24

    9.6.3 Configuring the SSH Client to Assign the RSA Public Key to the SSH Server..............................9-24

    9.6.4 Enabling the SFTP Client................................................................................................................9-25

    9.6.5 (Optional) Managing the Directory.................................................................................................9-25

    9.6.6 (Optional) Managing the File ........................................................................ ..................................9-26

    9.6.7 (Optional)Displaying the SFTP Client Command Help .................................................................. 9-27

    9.6.8 Checking the Configuration ............................................................................................................9-27

    9.7 Maintaining Telnet and SSH......................................................................................................................9-28

    9.7.1 Debugging Telnet Terminal Services........................................................................... ....................9-28

    9.7.2 Debugging SSH Terminal Services ................................................................... ..............................9-28

    9.8 Configuration Examples............................................................................................................................9-29

    9.8.1 Example for Configuring Telnet Terminal Services.................................................................. ......9-29

    9.8.2 Example for Connecting the STelnet Client to the SSH Server.......................................................9-31

    9.8.3 Example for Connecting the SFTP Client to the SSH Server.......................................................... 9-37

    9.8.4 Example for Accessing the SSH Server Through Other Port Numbers........................................... 9-42

    9.8.5 Example for Authenticating SSH Through RADIUS......................................................................9-49

  • 8/10/2019 Huawei NE40 router Config Guide

    10/265

    Contents

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    viii Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    10 Router Maintenance ..............................................................................................................10-1

    10.1 Introduction ............................................................ .................................................................... .............10-2

    10.1.1 Online Upgrade introduction.........................................................................................................10-2

    10.1.2 Device Operation Management.....................................................................................................10-2

    10.1.3 Electronic Label ............................................................................................................................10-2

    10.2 Upgrading the Board .............................................................. ................................................................. 10-2

    10.2.1 Establishing the Configuration Task..............................................................................................10-3

    10.2.2 Downloading the Board Software .............................................................. ...................................10-3

    10.2.3 Online Loading the Board Software..............................................................................................10-4

    10.2.4 Upgrading the Stratum 3 Clock Board ............................................................... ...........................10-4

    10.2.5 Resetting the Board ............................................................ ........................................................... 10-4

    10.2.6 Checking the Configuration ..........................................................................................................10-4

    10.3 Managing the Device Operation..............................................................................................................10-5

    10.3.1 Setting the Temperature Warning Threshold Upgrading the Board............................. ..................10-5

    10.3.2 Disabling or Re-enabling the DASL Port of the LPU................................................................. ..10-5

    10.3.3 Resetting the Device and Switching over the Channel..................................................................10-6

    10.3.4 Displaying the Device Information ..................................................................... ..........................10-6

    10.4 Configuring the Electronic Labelelectronic.............................................................................................10-7

    10.4.1 Establishing the Configuration Task..............................................................................................10-7

    10.4.2 Querying the Electronic Label.......................................................................................................10-7

    10.4.3 Backing Up the Electronic Label ..................................................................................................10-7

    10.5 Configuring a Cleaning Cycle for the Air Filter......................................................................................10-8

    10.5.1 Establishing the Configuration Task..............................................................................................10-810.5.2 Configuring a Checking of the Air Filter based on the Device Temperature.................................10-8

    10.5.3 Configuring a Cleaning Cycle for the Air Filter............................................................................10-9

    10.5.4 Remonitoring the Cleaning Cycle of the Air Filter ....................................................................... 10-9

    10.5.5 Checking the Configuration ..........................................................................................................10-9

    11 System Software Upgrade....................................................................................................11-1

    11.1 Introduction .............................................................................................................................................11-2

    11.1.1 System Software Upgrade........................................................... .................................................. 11-2

    11.1.2 License ..........................................................................................................................................11-2

    11.2 Uploading the System Software and License Files..................................................................................11-3

    11.2.1 Establishing the Configuration Task..............................................................................................11-3

    11.2.2 Uploading the System Software and License to the Master MPU................................................. 11-3

    11.2.3 Copying the System Software and License to the Slave MPU......................................................11-4

    11.2.4 Checking the Configuration...........................................................................................................11-4

    11.3 Specifying the System Software for the Next Startup of the Router ....... ................................................ 11-5

    11.3.1 Establishing the Configuration Task..............................................................................................11-5

    11.3.2 Specifying the System Software for the Next Startup ................................................................... 11-5

    11.3.3 (Optional) Configuring PAF Files ..................................................................... ............................ 11-6

    11.3.4 (Optional) Configuring Patch Packages ........................................................................................11-6

  • 8/10/2019 Huawei NE40 router Config Guide

    11/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Contents

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    ix

    11.3.5 Checking the Configuration...........................................................................................................11-7

    12 Patch Management.................................................................................................................12-1

    12.1 Introduction ............................................................ .................................................................... .............12-2

    12.2 Checking the Running of Patch in the System ........................................................................................12-312.2.1 Establishing the Configuration Task..............................................................................................12-3

    12.2.2 Checking the Running of Patch on the MPU ................................................................................12-4

    12.2.3 Checking the Running of Patch on the LPU..................................................................................12-5

    12.3 Loading a Patch.................................................................... ................................................................. ..12-5

    12.3.1 Establishing the Configuration Task..............................................................................................12-5

    12.3.2 Uploading a Patch to the Root Directory of the Master MPU.......................................................12-6

    12.3.3 Copying a Patch to the Root Directory of the Slave MPU............................................................ 12-6

    12.4 Installing a Patch on the MPU.................................................................................................................12-7

    12.4.1 Establishing the Configuration Task..............................................................................................12-7

    12.4.2 Uploading the MPU Patch.............................................................................................................12-7

    12.4.3 Activating the MPU Patch.............................................................................................................12-8

    12.4.4 Running the MPU Patch................................................................................................................12-8

    12.5 Stop Running the MPU Patch..................................................................................................................12-9

    12.5.1 Establishing the Configuration Task..............................................................................................12-9

    12.5.2 Deactivating the MPU Patch .................................................................. .......................................12-9

    12.6 Unloading the MPU Patch.....................................................................................................................12-10

    12.6.1 Establishing the Configuration Task............................................................................................12-10

    12.6.2 Deleting the MPU Patch..............................................................................................................12-10

    12.7 Installing a Patch on the LPU................................................................................................................12-11

    12.7.1 Establishing the Configuration Task............................................................................................12-11

    12.7.2 Uploading the LPU Patch............................................................................................................12-11

    12.7.3 Activating the LPU Patch............................................................................................................12-12

    12.7.4 Running the LPU Patch...............................................................................................................12-12

    12.8 Stop Running the LPU Patch.................................................................................................................12-13

    12.8.1 Establishing the Configuration Task............................................................................................12-13

    12.8.2 Deactivating the LPU Patch ..................................................................... ...................................12-13

    12.9 Unloading the LPU Patch......................................................................................................................12-13

    12.9.1 Establishing the Configuration Task............................................................................................12-1312.9.2 Deleting the LPU Patch...............................................................................................................12-14

    A Glossary .................................................................................................................................... A-1

    B Acronyms and Abbreviations ................................................................................................B-1

    Index ................................................................................................................................................ i-1

  • 8/10/2019 Huawei NE40 router Config Guide

    12/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Figures

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xi

    Figures

    Figure 1-1Software architecture of the NE80-8...............................................................................................1-4

    Figure 2-1Networking diagram of logging in through the console port .......................................................... 2-7

    Figure 2-2New connection ..............................................................................................................................2-8

    Figure 2-3Setting the port................................................................................................................................2-8Figure 2-4Setting the port communication parameters....................................................................................2-9

    Figure 2-5Establishing the configuration environment through Telnet ......................................................... 2-10

    Figure 2-6Running the Telnet program on the PC.........................................................................................2-11

    Figure 2-7Establishing the remote configuration environment through AUX...............................................2-11

    Figure 8-1Networking diagram with FTP server basic functions .................................................................. 8-19

    Figure 8-2Networking diagram of configuring FTP ACL .................................................................. ...........8-21

    Figure 8-3Configuring the FTP client............................................................................................................8-23

    Figure 8-4Networking diagram of configuring TFTP ............................................................................ .......8-24

    Figure 8-5Setting the Base Directory of the TFTP server .............................................................................8-25

    Figure 8-6Specifying the file to be sent.........................................................................................................8-26

    Figure 9-1Telnet client services.......................................................................................................................9-2

    Figure 9-2Telnet redirection services...............................................................................................................9-3

    Figure 9-3Usage of Telnet shortcut keys ................................................................. ........................................9-3

    Figure 9-4Establishing an SSH channel in a LAN ............................................................... ...........................9-5

    Figure 9-5Establishing an SSH channel in a WAN........................................................................................ ..9-5

    Figure 9-6Networking diagram of the Telnet terminal services mode........................................................... 9-29

    Figure 9-7Networking diagram of connecting the STelnet client to the SSH server .....................................9-31

    Figure 9-8Networking diagram of connecting the SFTP client to the SSH server ........................................9-37

    Figure 9-9Networking diagram of accessing the SSH server through other port numbers............................9-43

    Figure 9-10Networking diagram of authenticating the SSH through RADIUS ............................................9-49

    Figure 12-1Conversion between the statuses of a patch................................................................................12-2

  • 8/10/2019 Huawei NE40 router Config Guide

    13/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Tables

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xiii

    Tables

    Table 1-1Features list of the NE80 Series USR...............................................................................................1-8

    Table 3-1Command line views ........................................................................................................................3-4

    Table 3-2Common error messages of the command line.................................................................................3-7

    Table 3-3Keys for editing ................................................................................................................................3-7Table 3-4Keys for displaying...........................................................................................................................3-8

    Table 3-5Describes metacharacters..................................................................................................................3-9

    Table 3-6Access the history commands ............................................................................ .............................3-10

    Table 3-7System-defined shortcut keys ............................................................................ ............................. 3-11

    Table 5-1Example for the absolute numbering .................................................................. ..............................5-3

  • 8/10/2019 Huawei NE40 router Config Guide

    14/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Contents

    Issue 04 (2009-12-20) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    i

    Contents

    About This Document.....................................................................................................................1

    http://-/?-http://-/?-http://-/?-
  • 8/10/2019 Huawei NE40 router Config Guide

    15/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations About This Document

    Issue 04 (2009-12-20) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    1

    About This Document

    Purpose

    This part describes the organization of this document, product version, intended audience,conventions, and update history.

    Related Versions

    The following table lists the product versions related to this document.

    Product Name Version

    Quidway NetEngine80 Core Router V300R005

    Intended Audience

    This document is intended for:

    Network planning engineer

    Hardware installation engineer

    Commissioning engineer

    On-site maintenance engineer

    System maintenance engineer

    Organization

    This document consists of twelve chapters and is organized as follows.

    Chapter Content

    1 NE80 Core Router Overview This chapter describes the architecture, functionalfeatures and main functions of the NE80.

  • 8/10/2019 Huawei NE40 router Config Guide

    16/265

    About This Document

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    2 Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    Chapter Content

    2 Establishment of the Configuration

    Environment

    This chapter describes the procedures to set up the

    configuration environments through CON, Telnet,and AUX.

    3 CLI Overview This chapter describes the command line interface,

    command levels, command views and hot keys.

    4 Basic Configurtion This chapter describes how to configure the basic

    system environment on the router

    5 User Management This chapter describes the basic concepts of theuser interface and the user management

    6 File System This chapter describes the file system and its

    configuration, uploading and downloading filesthrough FTP, TFTP and XModem, and the

    management of configuration file.

    7 Management of ConfigurationFiles

    This chapter describes how to configure the filemanagement.

    8 FTP,TFTP and XModem This chapter describes how to configure the basicfunctions of the FTP server.

    9 Telnet and SSH This chapter describes how to log in to the routerthrough Telnet and configure the router.

    10 Router Maintenance This chapter describes the principle and concepts ofthe router maintenance.

    11 System Software Upgrade This chapter describes the principle and concepts of

    the system software upgrade.

    12 Patch Management This chapter describes the principle and concepts ofpatch management.

    Appendix A Glossary & BAcronyms and Abbreviations

    This chapter collates glossary and frequently usedacronyms and abbreviations in this manual.

    Index This chapter collates important keywords used in

    this manual to help the reader to access the requiredinformation quickly.

    Conventions

    Symbol Conventions

    The symbols that may be found in this document are defined as follows.

  • 8/10/2019 Huawei NE40 router Config Guide

    17/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations About This Document

    Issue 04 (2009-12-20) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    3

    Symbol Description

    Indicates a hazard with a high level of risk, which if not

    avoided, will result in death or serious injury.

    Indicates a hazard with a medium or low level of risk, which ifnot avoided, could result in minor or moderate injury.

    Indicates a potentially hazardous situation, which if not

    avoided, could result in equipment damage, data loss,performance degradation, or unexpected results.

    Indicates a tip that may help you solve a problem or save time.

    Provides additional information to emphasize or supplementimportant points of the main text.

    General Conventions

    The general conventions that may be found in this document are defined as follows.

    Convention Description

    Times New Roman Normal paragraphs are in Times New Roman.

    Boldface Names of files, directories, folders, and users are in

    boldface. For example, log in as user root.

    Italic Book titles are in italics.

    Courier New Examples of information displayed on the screen are in

    Courier New.

    Command Conventions

    The command conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface The keywords of a command line are in boldface.

    Italic Command arguments are in italics.

    [ ] Items (keywords or arguments) in square brackets [ ] areoptional.

    { x | y | ... } Optional items are grouped in braces and separated byvertical bars. One item is selected.

    [ x | y | ... ] Optional items are grouped in brackets and separated byvertical bars. One item is selected or no item is selected.

  • 8/10/2019 Huawei NE40 router Config Guide

    18/265

    About This Document

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    4 Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    Convention Description

    { x | y | ... } * Optional items are grouped in braces and separated by

    vertical bars. A minimum of one item or a maximum of allitems can be selected.

    [ x | y | ... ] * Optional items are grouped in brackets and separated by

    vertical bars. Several items or no item can be selected.

    &The parameter before the & sign can be repeated 1 to n

    times.

    # A line starting with the # sign is comments.

    GUI Conventions

    The GUI conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface Buttons, menus, parameters, tabs, windows, and dialog titles

    are in boldface. For example, click OK.

    > Multi-level menus are in boldfaceand separated by the ">"signs. For example, choose File> Create> Folder.

    Keyboard Operations

    The keyboard operations that may be found in this document are defined as follows.

    Format Description

    Key Press the key. For example, press Enterand press Tab.

    Key 1+Key 2 Press the keys concurrently. For example, pressing

    Ctrl+Alt+Ameans the three keys should be pressedconcurrently.

    Key 1,Key 2 Press the keys in turn. For example, pressing Alt, Ameans

    the two keys should be pressed in turn.

    Mouse Operations

    The mouse operations that may be found in this document are defined as follows.

    Action Description

    Click Select and release the primary mouse button without

    moving the pointer.

  • 8/10/2019 Huawei NE40 router Config Guide

    19/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations About This Document

    Issue 04 (2009-12-20) Huawei Proprietary and ConfidentialCopyright Huawei Technologies Co., Ltd.

    5

    Action Description

    Double-click Press the primary mouse button twice continuously and

    quickly without moving the pointer.

    Drag Press and hold the primary mouse button and move thepointer to a certain position.

    Update History

    Updates between document issues are cumulative. Therefore, the latest document issue

    contains all updates made in previous issues.

    Updates in Issue 04 (2009-12-20)

    Fourth commercial release.

    Updates in Issue 03 (2009-08-01)

    Third commercial release.

    Updates in Issue 02 (2008-10-20)

    Second commercial release.

    Updates in Issue 01 (2008-04-18)

    First commercial release.

  • 8/10/2019 Huawei NE40 router Config Guide

    20/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Contents

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    i

    Contents

    1 NE80 Core Router Overview....................................................................................................1-1

    1.1 Introduction...................................................................................................................................................1-2

    1.1.1 Overview..............................................................................................................................................1-2

    1.1.2 Hardware Architecture ............................................................... .......................................................... 1-2

    1.1.3 Software Architecture ........................................................ .................................................................. 1-3

    1.2 Characteristics of the NE80...........................................................................................................................1-5

    1.2.1 Support for Flattened Network Architecture........................................................................................1-5

    1.2.2 Line-Speed Forwarding........................................................................................................................1-6

    1.2.3 Multiple Interfaces................................................................. .............................................................. 1-6

    1.2.4 Carrier-Class Availability.....................................................................................................................1-6

    1.2.5 Rich Services ............................................................. ................................................................... .......1-6

    1.2.6 Perfect Diff-Serv/QoS..........................................................................................................................1-6

    1.2.7 Excellent Security Mechanism.............................................................................................................1-7

    1.2.8 Practical NMS......................................................................................................................................1-7

    1.2.9 Flexible Networking Capabilities ........................................................ ................................................ 1-8

    1.3 Features List of the NE80..............................................................................................................................1-8

    http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-
  • 8/10/2019 Huawei NE40 router Config Guide

    21/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Figures

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    iii

    Figures

    Figure 1-1Software architecture of the NE80-8 ..................................................................... ...........................1-4

    http://-/?-http://-/?-http://-/?-http://-/?-
  • 8/10/2019 Huawei NE40 router Config Guide

    22/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations Tables

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    v

    Tables

    Table 1-1Features list of the NE80 Series USR.................................................................................................1-8

    http://-/?-http://-/?-http://-/?-http://-/?-
  • 8/10/2019 Huawei NE40 router Config Guide

    23/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations 1 NE80 Core Router Overview

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-1

    1 NE80 Core Router OverviewAbout This Chapter

    The following table lists the contents of this chapter.

    Section Describes

    1.1 Introduction This section describes the hardware and softwarearchitecture of the NE80

    1.2 Characteristics of the This section describes the characteristics of the NE80

    1.3 Features List of the This section describes the features of the NE80.

  • 8/10/2019 Huawei NE40 router Config Guide

    24/265

    1 NE80 Core Router Overview

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    1-2 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    1.1 Introduction

    This section describes the basic knowledge of the NE80 Series USR, including:

    Overview

    Hardware Architecture

    Software Architecture

    1.1.1 Overview

    Nowadays the IP Metropolitan Area Network (MAN) has developed into a new stage. It is no

    longer limited to merely supplying individual broadband internet access services, but coversall-around services including enterprise interconnection, virtual leased line, IP telephone/

    videoconferencing, content service, and security service. All these raise higher requirementsto MAN devices.

    According to the development of IP MANs, Huawei launches the NE80 Series USR. The

    NE80 has the following features: large capacity, high performance, high reliability, andabundant service capability required by MANs, such as line-speed forwarding on high-speed

    interface, Ethernet switching, Multi-Protocol Label Switching Virtual Private Network(MPLS VPN), perfect Quality of Service (QoS) mechanism and carrier-class reliability, which

    provide abundant service processing capabilities and flexible networking capability.

    The NE80 incorporates the powerful IP service processing capability of routers and thelow-cost Ethernet switching capability of Layer 3 Ethernet switches, and serves as a powerful

    core router or a Layer 3 Ethernet switch. Therefore, the NE80 is an optimal choice for newMANs.

    The NE80 is the fifth-generation router, oriented to the carrier's backbone edge networks, thecore and the convergence layer of MANs, and networks of various industries and enterprises.The NE80 enriches and perfects the high-end router series of Huawei, for it provides

    cost-effective network solutions, and offers more choices.

    1.1.2 Hardware Architecture

    The boards of the NE80 are classified into Switch and Routing Unit (MPU) and Line Card

    (LC). The LCs include Line Processing Unit (LPU), Flexible Card Line Processing Unit(LPUF) and service board.

    MPU

    The MPU completes such functions as system management, route control, data exchange, and

    stratum-3 clock.

    The NE80 have two MPUs for 1 + 1 redundancy. When one MPU fails, the service will be

    automatically switched to the other MPU.

    LPU

    LPUs implement the interconnection and data forwarding with other devices. The NE80

    supports the following LPUs:

    Ethernet LPU

  • 8/10/2019 Huawei NE40 router Config Guide

    25/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations 1 NE80 Core Router Overview

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-3

    POS LPU

    cPOS LPU

    ATM LPU

    RPR LPU

    E1 LPU

    POS = Packet Over SONET/SDH

    cPOS = channelized POS

    ATM = Asynchronous Transfer Mode

    RPR = Resilient Packet Ring

    LPUF

    LPUFs are LPUs whose PIM cards can be replaced. Each LPUF can hold two PIM cards. The

    following PIM cards are supported:

    10/100M auto-sensing Ethernet electrical interface PIM card

    Gigabit Ethernet optical interface PIM PIC card

    E1/T1 interface PIM card

    E3 interface PIM card

    T3 interface PIM card

    Service Board

    The NE80 provides Network Address Translation (NAT) service board. The NAT boardfeatures large capacity and high performance, and can support the translation between private

    and public network addresses. The NAT board is used to solve the problems like the shortageof public network addresses and ensure the network security on the Internet.

    For more information about the NE80 hardware system, refer to the Quidway NetEngiNE80Core Router Installation Manual.

    1.1.3 Software Architecture

    The software system of the NE80 adopts the architecture of two physically independentfunctional units, namely route control and packet forwarding. The architecture can improve

    the stability and the processing performance of the system.

    The system software consists of the following five parts: Network Management System(NMS), Routing Process System (RPS), Forwarding Support Unit (FSU), Express Forwarding

    Unit (EFU), Driver (DRV), and the switch fabric monitoring module running on the MPUmanages the MPU and monitors its operation.

    DRV modules are distributed in the RPS, FSU and EFU for driving the hardware of the MPU

    and the LPU. Figure 1-1takes the NE80-8 for example to illustrate the NE80 softwarearchitecture.

  • 8/10/2019 Huawei NE40 router Config Guide

    26/265

    1 NE80 Core Router Overview

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    1-4 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    Figure 1-1Software architecture of the NE80-8

    RPSSwitch FabricMonitoring module

    Switch Fabric

    Monitoring module

    FSU

    EFU

    Highway

    FSU

    EFU

    Highway

    FSU

    EFU

    Highway

    Highway

    Highway

    Highwa

    y

    Highway

    Highway

    HighwayRPSSwitch FabricMonitoring module

    Switch Fabric

    Monitoring module

    FSU

    EFU

    Highway

    LPU1

    FSU

    EFU

    Highway

    LPU2

    FSU

    EFU

    LPU8

    Highway

    Highway

    Highway

    Highwa

    y

    Highway

    Highway

    Highway

    As the control and management unit of the system, the RPS runs on the active and standbyMPUs and performs the following tasks:

    Route control

    The RPS calculates and maintains the routes. In addition, it generates the Forward

    Information Base (FIB) table and delivers it to each LPU for IP forwarding.

    Label control

    The RPS distributes labels, sets up and maintains the Label Switch Paths (LSPs). In addition,it generates the FIB table and delivers it to each LPU for MPLS forwarding.

    Traffic control

    The RPS defines the traffic classification rules, configures the traffic parameters, configures

    the queue resources and flow control parameters for Diff-Serv QoS.

    Maintenance and management

    The RPS maintains the devices, manages the network and devices, monitors the whole system,

    diagnoses faults, and collects statistics for services.

    Running on the CPU of the LPU, the FSU manages the service interfaces (configuring and

    monitoring them), forwards data, controls the links, and negotiates the link parameters. Inaddition, the FSU can maintain and manage local devices for LPUs and provide some system

    monitoring and diagnosis services.

    In addition to fast forwarding of IP packets, the EFU can provide such QoS functions as

    traffic classifying, traffic measuring, traffic policing, traffic shaping, traffic scheduling, and

    congestion avoiding and controlling. It can implement Diff-Serv, firewall, and Class ofService (CoS) features according to different configuration requirements.

    The Switch Fabric monitoring module monitors the internal switching network in the NE80

    Series USR.

    Implemented on the Huawei integrated network management platform, the NMS maintains

    and controls devices uniformly.

  • 8/10/2019 Huawei NE40 router Config Guide

    27/265

    Quidway NetEngine80

    Configuration Guide - Basic Configurations 1 NE80 Core Router Overview

    Issue 04 (2009-12-20) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-5

    The NE80 applies the Versatile Routing Platform (VRP) software system. As a versatileoperating system platform for Huawei's data communications products, the VRP realizes amodular architecture with IP services as the core. In addition to abundant functions and

    features, the VRP provides some application-based capabilities such as scalability andflexibility.

    With the TCP/IP protocol stack as the core, the VRP integrates multiple crucial technologies

    for data communications such as routing, QoS, VPN, and security, thus providing excellentdata forwarding capability for the routing device.

    The VRP provides consistent network, user, and management interfaces for various hardware

    platforms and flexible solutions for users. The VRP is open to sustainable development, whichcan protect carriers' investment to its maximum extent.

    1.2 Characteristics of the NE80

    This section includes:

    Support for Flattened Network Architecture

    Line-Speed Forwarding

    Multiple Interfaces

    Carrier-Class Availability

    Rich Services

    Perfect Diff-Serv/QoS

    Excellent Security Mechanism

    Practical NMS

    Flexible Networking Capabilities

    1.2.1 Support for Flattened Network Architecture

    Modern telecom network has a hierarchical architecture, within which data services are

    typically provided after they are processed by four vertical function layers. This classicalarchitecture will still exist for a certain period. This architecture reveals its deficiency

    increasingly because IP services are becoming leading services in the network. Flattening ofthe network architecture is the trend with the development of technologies and the change of

    services.

    The devices at the core layer of the telecom network are used with high efficiency because agreat amount of user data is processed there. Whereas, the devices out of the core layer are

    used less efficiently due to sparse distribution of access users. Therefore, a flattened IPnetwork architecture should be employed if possible. Fewer network layers help carriers

    utilize network devices more efficiently and slash the maintenance and management cost. Theoperable and manageable IP network becomes the development trend of MANs and enterprise

    networks at present.

    The flattened network architecture puts forward higher requirements on the devices at theconvergence layer, that is, they need function as both access devices and core devices. The

    NE80 is such a product that implements various services due to its abundant service features,excellent hardware platform, and high reliability. For example, the NE80 can directly connect

    downlink with Gigabit Ethernet switches or dedicated access devices, and uplink withprovincial backbone or national backbone networks. In addition, the NE80 can form a ring

    network through Resilient Packet Ring (RPR) or connect to core devices through dual homing.

  • 8/10/2019 Huawei NE40 router Config Guide

    28/265

    1 NE80 Core Router Overview

    Quidway NetEngine80

    Configuration Guide - Basic Configurations

    1-6 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 04 (2009-12-20)

    In this case, the NE80 may reduce the levels of the network construction to achieve theflattened network, which improves the service quality and optimizes the network architecture.

    1.2.2 Line-Speed Forwarding

    The NE80 supports the IPv4/MPLS distributed forwarding at the line speed. Thus the NE80

    can meet the bandwidth requirements when it is used as the Point of Presence (POP), theconvergence layer, or the switching node on the backbone networks.

    1.2.3 Multiple Interfaces

    At present, the NE80 provides the Fast Ethernet (FE) interface, Gigabit Ethernet (GE)interface, E1/cE1 interface, E3 interface, T3 interface, Packet over SDH/SONET (POS)

    interface, channelized POS (cPOS) interface, Asynchronous Transfer Mode (ATM) interface,and RPR interface with high interface density. Users can select the cards flexibly as required

    to meet the requirements for different networking solutions and network expansion.

    1.2.4 Carrier-Class Availability

    The key parts of the NE80 adopt redundant hot backup design, including system control, data

    exchange, route processing system, internal management bus and power supply. All thecomponents are hot swappable. Thus, the router can meet the high reliability requirement

    when it is used as the POP, the convergence layer, or the switching node on the backbonenetworks

    1.2.5 Rich Services

    The IP multicast forwarding feature provides the foundation for carriers to carry on variousnetwork voice and video services (Web TV, E-learning, telemedicine and video conference).

    With the rich routing features, the router is adaptable to complex environments.

    The policy service mechanism enables the system to have powerful performance optimization

    capability, satisfactory attack defense capability and QoS guarantee while ensuring the linerate processing and forwarding capability.

    The application of the MPLS VPN service guarantees the delivery of services of carriers

    using networks more economically and rationally with no need to increase the bandwidth.

    The application of the NAT service supports addressing with public and private networkaddresses mixed in the MAN to save IP addresses. In this way, the shortage of

    public IP addresses can be solved.

    Through Dynamic Host Configuration Protocol (DHCP) Relay and built-in DHCP Server, IPaddres