+ All Categories
Home > Documents > 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

Date post: 06-Apr-2018
Category:
Upload: ly-hai
View: 223 times
Download: 0 times
Share this document with a friend

of 691

Transcript
  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    1/689

    Quidway NetEngine80E/40E Core Router

    V300R003

    Configuration Guide - LAN Access and MAN

    Access

    Issue 03

    Date 2008-09-22

    Part Number 00399146

    Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    2/689

    Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any

    assistance, please contact our local office or company headquarters.

    Huawei Technologies Co., Ltd.

    Address: Huawei Industrial Base

    Bantian, Longgang

    Shenzhen 518129

    People's Republic of China

    Website: http://www.huawei.com

    Email: [email protected]

    Copyright Huawei Technologies Co., Ltd. 2008. All rights reserved.

    No part of this document may be reproduced or transmitted in any form or by any means without prior written

    consent of Huawei Technologies Co., Ltd.

    Trademarks and Permissions

    and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.

    All other trademarks and trade names mentioned in this document are the property of their respective holders.

    Notice

    The information in this document is subject to change without notice. Every effort has been made in the

    preparation of this document to ensure accuracy of the contents, but the statements, information, and

    recommendations in this document do not constitute a warranty of any kind, express or implied.

    Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    mailto:[email protected]://www.huawei.com/
  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    3/689

    Contents

    About This Document.....................................................................................................................1

    1 MAC Address Table Configuration.......................................................................................1-1

    1.1 Introduction.....................................................................................................................................................1-2

    1.1.1 MAC Address Table Overview..............................................................................................................1-21.1.2 MAC Features Supported by the NE80E/40E........................................................................................1-2

    1.2 Configuring the MAC Address Table Based on the VLAN and Layer 2 Interface........................................1-2

    1.2.1 Establishing the Configuration Task......................................................................................................1-3

    1.2.2 Configuring MAC Address Entries........................................................................................................1-3

    1.2.3 Configuring MAC Address Entries Based on the Layer 2 VE Interface...............................................1-4

    1.2.4 Checking the Configuration...................................................................................................................1-5

    1.3 Configuring the MAC Address Table Based on the VSI and Layer 3 Interface.............................................1-6

    1.3.1 Establishing the Configuration Task......................................................................................................1-6

    1.3.2 Configuring MAC Address Entries........................................................................................................1-7

    1.3.3 Configuring MAC Address Entries Based on the VLANIF Interface...................................................1-8

    1.3.4 Configuring MAC Address Entries Based on the Layer 3 VE Interface...............................................1-9

    1.3.5 Checking the Configuration...................................................................................................................1-9

    1.4 Setting the Aging Time of a MAC Address Table........................................................................................1-10

    1.4.1 Establishing the Configuration Task....................................................................................................1-10

    1.4.2 Setting the Aging Time of a MAC Address Table...............................................................................1-11

    1.4.3 Checking the Configuration.................................................................................................................1-11

    1.5 Configuration Examples................................................................................................................................1-12

    1.5.1 Example for Configuring the MAC Address Table Based on the Interface and VLAN......................1-12

    1.5.2 Example for Configuring the MAC Address Table Based on the dot1q Termination Sub-interface andVSI................................................................................................................................................................1-14

    1.5.3 Example for Configuring the MAC Address Table Based on the QinQ Termination Sub-interface and

    VSI................................................................................................................................................................1-16

    1.5.4 Example for Configuring the MAC Address Table Based on the VLANIF Interface and VSI...........1-18

    1.5.5 Example for Configuring the MAC Address Table Based on the VLAN and Layer 2 VE Interface..1-20

    1.5.6 Example for Configuring the MAC Address Table Based on the VSI and Layer 3 VE Interface.......1-22

    1.6 Troubleshooting............................................................................................................................................1-24

    2 Ethernet Interface Configuration............................................................................................2-1

    2.1 Introduction.....................................................................................................................................................2-2

    2.1.1 Introduction to Ethernet Interfaces.........................................................................................................2-2

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access Contents

    Issue 03 (2008-09-22) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    i

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    4/689

    2.1.2 Features of Ethernet Interfaces Supported by the NE80E/40E..............................................................2-2

    2.2 Configuring Ethernet Interfaces of the LPU...................................................................................................2-5

    2.2.1 Establishing the Configuration Task......................................................................................................2-6

    2.2.2 Assigning an IP Address to an Ethernet Interface..................................................................................2-6

    2.2.3 Configuring the MTU of an Ethernet Interface......................................................................................2-7

    2.2.4 Configuring the Working Mode of an Ethernet Interface......................................................................2-8

    2.2.5 Configuring the Speed of an Ethernet Electrical Interface.....................................................................2-9

    2.2.6 Configuring the GE/FE Optical/Electrical Interface............................................................................2-10

    2.2.7 Creating Ethernet Sub-Interfaces.........................................................................................................2-10

    2.2.8 Configuring Overhead Bytes of the 10GE WAN Interface.................................................................2-11

    2.2.9 Configuring Flow Control on the GE Interface...................................................................................2-11

    2.2.10 Switching the Working Mode of an Ethernet Interface.....................................................................2-12

    2.2.11 Checking the Configuration...............................................................................................................2-13

    2.3 Configuring Ethernet Interfaces of the SRU.................................................................................................2-14

    2.3.1 Establishing the Configuration Task....................................................................................................2-14

    2.3.2 Assigning an IP Address to an Ethernet Interface................................................................................2-14

    2.3.3 Configuring the Working Mode of an Ethernet Electrical Interface....................................................2-15

    2.3.4 Configuring the Speed of an Ethernet Electrical Interface...................................................................2-16

    2.3.5 Configuring the Promiscuity Mode......................................................................................................2-16

    2.4 Configuring Ethernet Interface Layer 2 Parameters......................................................................................2-17

    2.4.1 Establishing the Configuration Task....................................................................................................2-17

    2.4.2 Configuring Link Layer Type of an Ethernet Interface.......................................................................2-17

    2.4.3 Configuring the 802.1p Priority of an Ethernet Interface....................................................................2-182.5 Configuring SmartLink Flush Function........................................................................................................2-19

    2.5.1 Establishing Application Environment of Configuration Task............................................................2-19

    2.5.2 Enabling a Port to Process SmartLink Flush Packets..........................................................................2-20

    2.6 Maintaining Ethernet Interfaces....................................................................................................................2-20

    2.6.1 Debugging Ethernet Interfaces.............................................................................................................2-20

    2.7 Configuration Examples................................................................................................................................2-21

    2.7.1 Example for Configuring a Layer 3 Ethernet Interface........................................................................2-21

    2.7.2 Example for Configuring a Layer 2 Ethernet Interface to Join a VLAN.............................................2-23

    2.7.3 Example for Configuring VLANs to Communicate Through Ethernet Sub-interfaces.......................2-24

    2.7.4 Example for Configuring Equipment to Handle Smartlink Flush Packets..........................................2-24

    2.8 Troubleshooting............................................................................................................................................2-27

    2.8.1 Pinging the Ethernet Interface Fails.....................................................................................................2-27

    2.8.2 Ethernet Interfaces Cannot Receive and Send Packets Normally........................................................2-28

    2.8.3 Ethernet Interfaces Discard Packets Severely......................................................................................2-28

    3 LACP Configuration..................................................................................................................3-1

    3.1 Introduction.....................................................................................................................................................3-2

    3.1.1 Introduction to the Eth-Trunk Interface and LACP...............................................................................3-2

    3.1.2 Eth-Trunk Interface and LACP Features Supported by the NE80E/40E...............................................3-3

    3.2 Creating an Eth-Trunk Interface......................................................................................................................3-6

    Contents

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access

    ii Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    5/689

    3.2.1 Establishing the Configuration Task......................................................................................................3-6

    3.2.2 Creating an Eth-Trunk............................................................................................................................3-7

    3.2.3 Adding an Ethernet Interface into an Eth-Trunk....................................................................................3-7

    3.2.4 Checking the Configuration...................................................................................................................3-8

    3.3 Configuring Layer 2 Attributes for an Eth-Trunk Interface............................................................................3-9

    3.3.1 Establishing the Configuration Task......................................................................................................3-9

    3.3.2 Configuring Working Mode of an Eth-Trunk Interface.......................................................................3-10

    3.3.3 (Optional) Configuring the Lower Threshold of Up Links..................................................................3-10

    3.3.4 (Optional) Configuring the Upper Threshold of Up Links..................................................................3-11

    3.3.5 (Optional) Configuring an Eth-Trunk Interface to Carry out Load Balancing....................................3-12

    3.3.6 (Optional) Configuring the Method of Sending Traps on Eth-Trunk Member Interfaces...................3-12

    3.3.7 Checking the Configuration.................................................................................................................3-13

    3.4 Configuring Layer 3 Attributes for an Eth-Trunk Interface..........................................................................3-14

    3.4.1 Establishing the Configuration Task....................................................................................................3-143.4.2 Configuring an IP address for an Eth-Trunk Interface.........................................................................3-15

    3.4.3 (Optional) Configuring a MAC Address for the Eth-Trunk Interface.................................................3-15

    3.4.4 (Optional) Configuring the Lower Threshold of Up Links..................................................................3-16

    3.4.5 (Optional) Configuring Load-balancing Mode for the Eth-Trunk Interface........................................3-16

    3.4.6 (Optional) Configuring Weights for Member Links............................................................................3-17

    3.4.7 (Optional) Configuring the Method of Sending Traps on Eth-Trunk Member Interfaces...................3-17

    3.4.8 Checking the Configuration.................................................................................................................3-18

    3.5 Configuring an Eth-Trunk Sub-interface......................................................................................................3-19

    3.5.1 Establishing the Configuration Task....................................................................................................3-20

    3.5.2 Creating an Eth-Trunk Sub-interface...................................................................................................3-20

    3.5.3 Configuring an IP address for an Eth-Trunk Sub-interface.................................................................3-21

    3.5.4 (Optical) Configuring the MTU for an Eth-Trunk Sub-interface.........................................................3-22

    3.5.5 Configuring the Encapsulation Type for an Eth-Trunk Sub-interface.................................................3-22

    3.5.6OptionalConfiguring the Rate for Sending Gratuitous ARP Packets on an Eth-Trunk Sub-interface

    .......................................................................................................................................................................3-23

    3.5.7 Checking the Configuration.................................................................................................................3-24

    3.6 Configuring Link Aggregation in Manual Load Balancing Mode................................................................3-24

    3.6.1 Establishing the Configuration Task....................................................................................................3-25

    3.6.2 Configuring the Operation Mode of the Eth-Trunk as the Manual Load Balancing Mode.................3-253.6.3 Adding Member Interfaces to the Eth-Trunk.......................................................................................3-26

    3.6.4 (Optional) Configuring the Manual Load Balancing Mode.................................................................3-27

    3.6.5 Checking the Configuration.................................................................................................................3-27

    3.7 Configuring Link Aggregation in 1:1 Active/Standby Mode.......................................................................3-28

    3.7.1 Establishing the Configuration Task....................................................................................................3-28

    3.7.2 Configuring the Operation Mode of the Eth-Trunk as 1:1 Active/Standby Mode...............................3-29

    3.7.3 Adding Member Interfaces to the Eth-Trunk and Setting the Primary Interface.................................3-30

    3.7.4 Enabling an LAG to Send Flush Packets.............................................................................................3-31

    3.7.5 Creating a Control VLAN....................................................................................................................3-32

    3.7.6 Enabling an Interface to Receive Packets from the Control VLAN....................................................3-32

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access Contents

    Issue 03 (2008-09-22) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    iii

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    6/689

    3.7.7 Enabling an Interface to Receive Flush Packets..................................................................................3-33

    3.7.8 Checking the Configuration.................................................................................................................3-33

    3.8 Configuring Link Aggregation in Static LACP Mode..................................................................................3-34

    3.8.1 Establishing the Configuration Task....................................................................................................3-34

    3.8.2 Configuring the Operation Mode of the Eth-Trunk as the Static LACP Mode...................................3-35

    3.8.3 Adding Member Interfaces to the Eth-Trunk.......................................................................................3-36

    3.8.4 (Optional) Setting the LACP Priority of the System............................................................................3-36

    3.8.5 (Optional) Setting the Upper Threshold for the Number of Active Interfaces....................................3-37

    3.8.6 (Optional) Setting the Lower Threshold for the Number of Active Interfaces....................................3-37

    3.8.7 (Optional) Setting the LACP Priority of the Interface.........................................................................3-38

    3.8.8 (Optional) Enabling LACP Preemption and Setting the Delay for LACP Preemption.......................3-39

    3.8.9 (Optional) Setting the Timeout Period for Receiving LACP Protocol Packets...................................3-39

    3.8.10 (Optional) Configuring the Load Balancing Mode............................................................................3-40

    3.8.11 (Optional) Configuring the SNMP Alarm..........................................................................................3-41

    3.8.12 Checking the Configuration...............................................................................................................3-41

    3.9 Maintaining Eth-Trunk Interface...................................................................................................................3-42

    3.9.1 Clearing the Statistics of Eth-Trunk Interface......................................................................................3-42

    3.9.2 Debugging............................................................................................................................................3-43

    3.10 Configuration Examples..............................................................................................................................3-44

    3.10.1 Example for Configuring a Layer 2 Eth-Trunk Interface to Allow VLANs to Pass Through...........3-44

    3.10.2 Example for Configuring a Layer 3 Eth-Trunk Interface...................................................................3-46

    3.10.3 Example for Configuring VLANs to Communicate Through Eth-Trunk Sub-interfaces..................3-49

    3.10.4 Example for Configuring Link Aggregation in Manual Load Balancing Mode................................3-533.10.5 Example for Configuring Link Aggregation in 1:1 Active/Standby Mode........................................3-55

    3.10.6 Example for Configuring Link Aggregation in Static LACP Mode..................................................3-60

    4 VLAN Configuration.................................................................................................................4-1

    4.1 Introduction.....................................................................................................................................................4-3

    4.1.1 VLAN Overview....................................................................................................................................4-3

    4.1.2 VLAN Features Supported by the NE80E/40E......................................................................................4-4

    4.2 Configuring a VLAN Based on Layer 2 Interface..........................................................................................4-9

    4.2.1 Establishing the Configuration Task......................................................................................................4-9

    4.2.2 Creating a VLAN.................................................................................................................................4-104.2.3 Configuring the Attributes of the Switched Ethernet Interface............................................................4-10

    4.2.4 Adding the Switched Ethernet Interface into the VLAN.....................................................................4-11

    4.2.5 (Optional) Disabling MAC Address Learning on a VLAN.................................................................4-12

    4.2.6 (Optional) Disabling an Interface from Broadcasting Packets to Other Interfaces in a VLAN...........4-13

    4.2.7 Checking the Configuration.................................................................................................................4-13

    4.3 Configuring VLANIF Interfaces to Support Communication Between VLANs..........................................4-14

    4.3.1 Establishing the Configuration Task....................................................................................................4-14

    4.3.2 Configuring an IP address for a VLANIF Interface.............................................................................4-14

    4.3.3 Checking the Configuration.................................................................................................................4-15

    4.4 Configuring Sub-interfaces to Support Communication Between VLANs..................................................4-15

    Contents

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access

    iv Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    7/689

    4.4.1 Establishing the Configuration Task....................................................................................................4-16

    4.4.2 Configuring the VLAN Associated with Sub-interfaces......................................................................4-16

    4.4.3 Configuring an IP Address for the Sub-interface.................................................................................4-17

    4.4.4 Checking the Configuration.................................................................................................................4-18

    4.5 Configuring VLAN Trunk............................................................................................................................4-18

    4.5.1 Establishing the Configuration Task....................................................................................................4-18

    4.5.2 Specifying the VLANs Supported by a Trunk Interface......................................................................4-20

    4.5.3 Specifying the VLANs Supported by a Hybrid Interface....................................................................4-20

    4.5.4 Checking the Configuration.................................................................................................................4-21

    4.6 Configuring VLAN Aggregation..................................................................................................................4-22

    4.6.1 Establishing the Configuration Task....................................................................................................4-22

    4.6.2 Configuring Sub-VLANs.....................................................................................................................4-23

    4.6.3 Creating a Super-VLAN.......................................................................................................................4-23

    4.6.4 Configuring an IP Address for the VLANIF Interface.........................................................................4-24

    4.6.5 (Optional) Configuring the Proxy ARP for the Super-VLAN.............................................................4-25

    4.6.6 Checking the Configuration.................................................................................................................4-25

    4.7 Configuring VLAN Mapping........................................................................................................................4-26

    4.7.1 Establishing the Configuration Task....................................................................................................4-26

    4.7.2 Configuring Port Type.........................................................................................................................4-27

    4.7.3 Configuring the Allowed VLAN on the Port.......................................................................................4-28

    4.7.4 Configuring Replacement of Outer VLAN Tag...................................................................................4-28

    4.7.5 Checking the Configuration.................................................................................................................4-29

    4.8 Configuring VLAN Damping.......................................................................................................................4-294.8.1 Establishing the Configuration Task....................................................................................................4-29

    4.8.2 Configuring VLAN Damping..............................................................................................................4-30

    4.8.3 Checking the Configuration.................................................................................................................4-30

    4.9 Configuring Interface Isolation in a VLAN..................................................................................................4-31

    4.9.1 Establishing the Configuration Task....................................................................................................4-31

    4.9.2 Configuring Interface Isolation in a VLAN.........................................................................................4-32

    4.9.3 Enabling ARP Proxy in a VLAN.........................................................................................................4-33

    4.10 Configuring the Isolation Based on Interface Groups in a VLAN..............................................................4-33

    4.10.1 Establishing the Configuration Task..................................................................................................4-33

    4.10.2 Adding an Interface to the Group to Be Isolated................................................................................4-34

    4.10.3 Checking the Configuration...............................................................................................................4-34

    4.11 Maintaining VLAN.....................................................................................................................................4-35

    4.11.1 Clearing the Statistics of VLAN Packets...........................................................................................4-35

    4.12 Configuration Examples..............................................................................................................................4-36

    4.12.1 Example for Configuring a VLAN Based on Layer 2 Interface........................................................4-36

    4.12.2 Example for Configuring VLANs to Communicate Through VLANIF Interfaces...........................4-37

    4.12.3 Example for Configuring VLANs to Communicate Through Sub-interfaces...................................4-40

    4.12.4 Example for Configuring VLAN and Non-VLAN to Communicate Through Sub-interfaces..........4-42

    4.12.5 Example for Configuring VLAN Trunks...........................................................................................4-44

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access Contents

    Issue 03 (2008-09-22) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    v

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    8/689

    4.12.6 Example for Configuring VLAN Aggregation..................................................................................4-48

    4.12.7 Example for Configuring VLAN Mapping........................................................................................4-51

    4.12.8 Example for Configuring VLAN Damping.......................................................................................4-55

    4.12.9 Example for Configuring Interface Isolation in a VLAN..................................................................4-56

    4.12.10 Example for Configuring the Isolation Based on Interface Groups in a VLAN..............................4-58

    5 QinQ Configuration..................................................................................................................5-1

    5.1 QinQ Overview...............................................................................................................................................5-3

    5.1.1 Introduction to QinQ..............................................................................................................................5-3

    5.1.2 QinQ Features Supported by the NE80E/40E........................................................................................5-4

    5.2 Configuring the QinQ Tunnel Function........................................................................................................5-19

    5.2.1 Establishing the Configuration Task....................................................................................................5-19

    5.2.2 Creating the Outer VLAN Tag for a Layer 2 Interface........................................................................5-19

    5.2.3 Configuring QinQ for a Layer 2 Interface............................................................................................5-20

    5.2.4 (Optional) Configuring the Protocol Type for the Outer Tag..............................................................5-20

    5.2.5 Checking the Configuration.................................................................................................................5-21

    5.3 Configuring Selective QinQ on a Layer 2 Interface......................................................................................5-22

    5.3.1 Establishing the Configuration Task....................................................................................................5-22

    5.3.2 Creating the Outer VLAN Tag for a QinQ Interface...........................................................................5-22

    5.3.3 Configuring Selective QinQ on a Layer 2 Interface.............................................................................5-23

    5.3.4 (Optional) Configuring the Protocol Type for the Outer Tag..............................................................5-23

    5.3.5 Checking the Configuration.................................................................................................................5-24

    5.4 Configuring the Sub-interface for VLAN Tag Termination to Support Proxy ARP....................................5-25

    5.4.1 Establishing the Configuration Task....................................................................................................5-25

    5.4.2 Configuring the Interface Mode as the User-Termination Mode.........................................................5-26

    5.4.3 Configuring the Sub-interface for dot1q VLAN Tag Termination to Support Proxy ARP.................5-26

    5.4.4 Configuring the Sub-interface for QinQ VLAN Tag Termination to Support Proxy ARP.................5-27

    5.4.5 Checking the Configuration.................................................................................................................5-28

    5.5 Configuring the Sub-interface for VLAN Tag Termination to Support VRRP............................................5-29

    5.5.1 Establishing the Configuration Task....................................................................................................5-29

    5.5.2 Configuring the Interface Mode as the User Termination Mode.........................................................5-30

    5.5.3 Configuring the Sub-interface for dot1q VLAN Tag Termination to Support VRRP.........................5-30

    5.5.4 Configuring the Sub-interface for QinQ VLAN Tag Termination to Support VRRP.........................5-315.5.5 Configuring VRRP...............................................................................................................................5-32

    5.5.6 Checking the Configuration.................................................................................................................5-32

    5.6 Configuring the Sub-interface for VLAN Tag Termination to Access an L3VPN.......................................5-33

    5.6.1 Establishing the Configuration Task....................................................................................................5-33

    5.6.2 Configuring the Interface Mode as the User Termination Mode.........................................................5-34

    5.6.3 Configuring the Sub-interface for dot1q VLAN Tag Termination to Access an L3VPN...................5-35

    5.6.4 Configuring the Sub-interface for QinQ VLAN Tag Termination to Access an L3VPN....................5-35

    5.6.5 Configuring L3VPN.............................................................................................................................5-36

    5.6.6 Checking the Configuration.................................................................................................................5-36

    5.7 Configuring the Sub-interface for VLAN Tag Termination to Access an L2VPN.......................................5-38

    Contents

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access

    vi Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    9/689

    5.7.1 Establishing the Configuration Task....................................................................................................5-38

    5.7.2 Configuring the Interface Mode as the User Termination Mode.........................................................5-39

    5.7.3 Configuring the Sub-interface for QinQ VLAN Tag Termination to Access an L2VPN....................5-39

    5.7.4 Configuring L2VPN.............................................................................................................................5-40

    5.7.5 Checking the Configuration.................................................................................................................5-41

    5.8 Configuring the Sub-interface for VLAN Tag Termination to Access a VPLS...........................................5-44

    5.8.1 Establishing the Configuration Task....................................................................................................5-44

    5.8.2 Configuring the Interface Mode as the User Termination Mode.........................................................5-45

    5.8.3 Configuring the Sub-interface for dot1q VLAN Tag Termination to Access a VPLS........................5-45

    5.8.4 Configuring the Sub-interface for QinQ VLAN Tag Termination to Access a VPLS........................5-46

    5.8.5 Configuring VPLS................................................................................................................................5-47

    5.8.6 Checking the Configuration.................................................................................................................5-47

    5.9 Configuring the Sub-interface for VLAN Stacking to Access an L2VPN....................................................5-48

    5.9.1 Establishing the Configuration Task....................................................................................................5-49

    5.9.2 Configuring the Interface Mode as the User Termination Mode.........................................................5-49

    5.9.3 Configuring the Ethernet Sub-interface for VLAN Stacking...............................................................5-50

    5.9.4 Configuring L2VPN.............................................................................................................................5-50

    5.9.5 Checking the Configuration.................................................................................................................5-51

    5.10 Configuring the Sub-interface for VLAN Stacking to Access a VPLS......................................................5-54

    5.10.1 Establishing the Configuration Task..................................................................................................5-54

    5.10.2 Configuring the Interface Mode as the User Termination Mode.......................................................5-55

    5.10.3 Configuring the Ethernet Sub-interface for VLAN Stacking.............................................................5-55

    5.10.4 Configuring VPLS..............................................................................................................................5-565.10.5 Checking the Configuration...............................................................................................................5-56

    5.11 Configuring the Sub-interface for QinQ VLAN Tag Termination to Support URPF.................................5-57

    5.11.1 Establishing the Configuration Task..................................................................................................5-57

    5.11.2 Configuring the Ethernet Interface of the PE.....................................................................................5-58

    5.11.3 Configuring the Ethernet Sub-interface of the PE..............................................................................5-58

    5.11.4 Configuring URPF on the Sub-interface for QinQ VLAN Tag Termination....................................5-59

    5.11.5 Checking the Configuration...............................................................................................................5-59

    5.12 Maintaining QinQ.......................................................................................................................................5-60

    5.12.1 Clearing QinQ Statistics.....................................................................................................................5-60

    5.12.2 Monitoring the Operating Status of the Termination Sub-interface...................................................5-60

    5.12.3 Debugging QinQ................................................................................................................................5-61

    5.13 Configuration Examples..............................................................................................................................5-61

    5.13.1 Example for Configuring the QinQ Tunnel.......................................................................................5-62

    5.13.2 Example for Configuring Selective QinQ on a Layer 2 Interface......................................................5-65

    5.13.3 Example for Configuring Compatibility of the EType Field in the Outer Tag of QinQ Packets......5-68

    5.13.4 Example for Configuring the Sub-interface for dot1q VLAN Tag Termination to Support Proxy ARP

    .......................................................................................................................................................................5-70

    5.13.5 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support Proxy ARP

    .......................................................................................................................................................................5-72

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access Contents

    Issue 03 (2008-09-22) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    vii

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    10/689

    5.13.6 Example for Configuring the Sub-interface for dot1q VLAN Tag Termination to Support VRRP

    .......................................................................................................................................................................5-76

    5.13.7 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support VRRP

    .......................................................................................................................................................................5-84

    5.13.8 Example for Configuring the Sub-interface for dotlq VLAN Tag Termination and QinQ VLAN TagTermination to Access an L3VPN................................................................................................................5-95

    5.13.9 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Access a VLL

    .....................................................................................................................................................................5-107

    5.13.10 Example for Configuring the Sub-interface for dot1q VLAN Tag Termination and QinQ VLAN Tag

    Termination to Access a VPLS...................................................................................................................5-115

    5.13.11 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Access a VPLS

    .....................................................................................................................................................................5-125

    5.13.12 Example for Configuring a QinQ Termination Sub-interface to Support the Local Connection

    .....................................................................................................................................................................5-138

    5.13.13 Example for Configuring the Sub-interface for dot1q VLAN Tag Termination to Support the DHCP

    Relay............................................................................................................................................................5-143

    5.13.14 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support the DHCP

    Relay............................................................................................................................................................5-148

    5.13.15 Example for Configuring Dynamic QinQ......................................................................................5-153

    5.13.16 Example for Configuring the Sub-interface for VLAN Stacking to Access an L2VPN................5-160

    5.13.17 Example for Configuring the Sub-interface for QinQ VLAN Stacking to Access a VPLS...... ....5-170

    5.13.18 Example for Configuring the Sub-interface for QinQ VLAN Tag Termination to Support URPF

    .....................................................................................................................................................................5-182

    6 PBB-TE Configuration...............................................................................................................6-1

    6.1 Introduction.....................................................................................................................................................6-2

    6.1.1 Overview of PBB-TE.............................................................................................................................6-2

    6.1.2 PBB-TE Supported by the NE80E/40E.................................................................................................6-3

    6.2 Configuring a PBB-TE Tunnel.......................................................................................................................6-5

    6.2.1 Establishing the Configuration Task......................................................................................................6-5

    6.2.2 Creating a Virtual MAC Address...........................................................................................................6-6

    6.2.3 Creating the Backbone VLAN for a PBB-TE Tunnel............................................................................6-7

    6.2.4 Creating a PBB-TE Tunnel....................................................................................................................6-8

    6.2.5 (Optional) Configuring Split Horizon of the PBB-TE Tunnel...............................................................6-9

    6.2.6 (Optional) Configuring the Priority of the PBB-TE Tunnel..................................................................6-9

    6.2.7 Adding the Interface to the Backbone VLAN of the PBB-TE Tunnel on the Transit Node................6-10

    6.2.8 Configuring the Static MAC Address Forwarding Function on the Transit Node..............................6-11

    6.2.9 Disabling STP on the Interface of the Transit Node............................................................................6-12

    6.2.10 Discarding Unknown Unicast and Multicast Packets and Broadcast Packets on the Transit Node

    .......................................................................................................................................................................6-12

    6.2.11 Disabling the VLAN-Based MAC Address Learning Function on the Transit Node........................6-13

    6.2.12 Checking the Configuration...............................................................................................................6-14

    6.3 Configuring a PBB-TE Protection Group and Protection Switchover..........................................................6-15

    6.3.1 Establishing the Configuration Task....................................................................................................6-16

    6.3.2 Configuring a PBB-TE Protection Group............................................................................................6-17

    6.3.3 Configuring Protection Mode of the Protection Group........................................................................6-17

    Contents

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access

    viii Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    11/689

    6.3.4 (Optional) Configuring Revertive Mode for Protection Switchover....................................................6-18

    6.3.5 (Optional) Configuring Hold-off Time for Protection Switchover......................................................6-19

    6.3.6 Enabling Ethernet CFM.......................................................................................................................6-19

    6.3.7 Enabling the APS Protocol...................................................................................................................6-20

    6.3.8 Checking the Configuration.................................................................................................................6-20

    6.4 Configuring a P2P SI.....................................................................................................................................6-21

    6.4.1 Establishing the Configuration Task....................................................................................................6-21

    6.4.2 Creating a P2P SI.................................................................................................................................6-22

    6.4.3 Mapping User Services to the SI..........................................................................................................6-23

    6.4.4 Binding the SI to a PBB-TE Tunnel.....................................................................................................6-24

    6.4.5 (Optional) Configuring the Priority of the SI.......................................................................................6-24

    6.4.6 (Optional) Configuring How the SI Processes Layer 2 Protocol Packets............................................6-25

    6.4.7 (Optional) Enabling Service Data to Carry the CRC Flag...................................................................6-25

    6.4.8 Activating the SI...................................................................................................................................6-26

    6.4.9 (Optional) Enabling the Traffic Statistics Function for the SI.............................................................6-27

    6.4.10 Checking the Configuration...............................................................................................................6-27

    6.5 Configuring an MP2MP SI...........................................................................................................................6-28

    6.5.1 Establishing the Configuration Task....................................................................................................6-28

    6.5.2 Configuring an MP2MP SI..................................................................................................................6-29

    6.5.3 Mapping User Services to the SI..........................................................................................................6-30

    6.5.4 Binding the SI to a PBB-TE Tunnel.....................................................................................................6-31

    6.5.5 (Optional) Configuring the Learning of MAC Addresses and the Rule..............................................6-31

    6.5.6 (Optional) Discarding Unknown Unicast and Multicast Packets and Broadcast Packets....................6-326.5.7 (Optional) Configuring Instance-Based Static MAC Address Forwarding Entries.............................6-33

    6.5.8 Activating the SI...................................................................................................................................6-34

    6.5.9 (Optional) Configuring How the SI Processes Layer 2 Protocol Packets............................................6-34

    6.5.10 Checking the Configuration...............................................................................................................6-35

    6.6 Associating Ethernet CFM and the PBB-TE SI............................................................................................6-36

    6.6.1 Establishing the Configuration Task....................................................................................................6-36

    6.6.2 Enabling Ethernet CFM of the PBB-TE Tunnel..................................................................................6-37

    6.6.3 Binding Ethernet CFM to a PBB-TE SI...............................................................................................6-37

    6.6.4 Checking the Configuration.................................................................................................................6-38

    6.7 Associating EFM OAM with the PBB-TE SI...............................................................................................6-38

    6.7.1 Establishing the Configuration Task....................................................................................................6-38

    6.7.2 Enabling Ethernet CFM of the PBB-TE Tunnel..................................................................................6-39

    6.7.3 Associating EFM OAM with a PBB-TE SI.........................................................................................6-40

    6.7.4 Checking the Configuration.................................................................................................................6-41

    6.8 Configuration Examples................................................................................................................................6-41

    6.8.1 Example for Configuring P2P PBB-TE Tunnels (No Protection Group)............................................6-41

    6.8.2 Example for Configuring P2P PBB-TE Tunnels (in a Protection Group)...........................................6-49

    6.8.3 Example for Configuring MP2MP PBB-TE Tunnels in Protection Groups........................................6-59

    6.8.4 Example for Associating Ethernet CFM with PBB-TE.......................................................................6-73

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access Contents

    Issue 03 (2008-09-22) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    ix

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    12/689

    6.8.5 Example for Associating EFM OAM with PBB-TE............................................................................6-78

    7 MSTP Configuration.................................................................................................................7-1

    7.1 Introduction.....................................................................................................................................................7-2

    7.1.1 MSTP Overview.....................................................................................................................................7-27.1.2 MSTP Features Supported by the NE80E/40E......................................................................................7-4

    7.2 Adding a Switch to a Specified MST Region.................................................................................................7-9

    7.2.1 Establishing the Configuration Task......................................................................................................7-9

    7.2.2 Configuring the MSTP Mode...............................................................................................................7-10

    7.2.3 Configuring an MST Region................................................................................................................7-10

    7.2.4 Activating MST Region Configuration................................................................................................7-12

    7.2.5 (Optional) Configuring the Switch as Primary or Secondary Root Switch.........................................7-12

    7.2.6 (Optional) Configuring Priority of the Switch in an MSTI..................................................................7-13

    7.2.7 Enabling MSTP....................................................................................................................................7-14

    7.2.8 Checking the Configuration.................................................................................................................7-14

    7.3 Configuring MSTP Parameters.....................................................................................................................7-15

    7.3.1 Establishing the Configuration Task....................................................................................................7-15

    7.3.2 Configuring MSTP Network Parameters of the Switch.......................................................................7-16

    7.3.3 Configuring MSTP Parameters on an Interface...................................................................................7-17

    7.3.4 Transferring the Port to MSTP Mode..................................................................................................7-19

    7.3.5 Configuring the Protocol Format of MSTP Packets............................................................................7-20

    7.3.6 Checking the Configuration.................................................................................................................7-21

    7.4 Configuring MSTP Protection of the Switch................................................................................................7-22

    7.4.1 Establishing the Configuration Task....................................................................................................7-227.4.2 Configuring BPDU Protection on the Switch......................................................................................7-23

    7.4.3 Configuring Root Protection on the Port..............................................................................................7-23

    7.4.4 Configuring Loop Protection on the Switch........................................................................................7-24

    7.4.5 Checking the Configuration.................................................................................................................7-25

    7.5 Maintaining MSTP........................................................................................................................................7-26

    7.5.1 Clearing MSTP Statistics.....................................................................................................................7-26

    7.5.2 Debugging MSTP.................................................................................................................................7-26

    7.6 Configuration Examples................................................................................................................................7-27

    7.6.1 Example for Configuring Basic MSTP Functions...............................................................................7-27

    8 BPDU Tunnel Configuration...................................................................................................8-1

    8.1 Overview.........................................................................................................................................................8-2

    8.1.1 Introduction to BPDU............................................................................................................................8-2

    8.1.2 BPDU Tunnel Features Supported by the NE80E/40E..........................................................................8-3

    8.2 Configuring Interface-based BPDU Tunnels..................................................................................................8-8

    8.2.1 Establishing the Configuration Task......................................................................................................8-8

    8.2.2 Enabling STP function on the PEs and the CEs.....................................................................................8-9

    8.2.3 Adding the Interfaces of the PE Connected with the CE to a Specified VLAN....................................8-9

    8.2.4 Configuring Interface-based BPDU Tunnel.........................................................................................8-10

    8.2.5 Configuring PE Interfaces Connecting PSNs to Permit Packets with Specified Tags.........................8-11

    Contents

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access

    x Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    13/689

    8.2.6 Checking the Configuration.................................................................................................................8-12

    8.3 Configuring VLAN-based BPDU Tunnels...................................................................................................8-13

    8.3.1 Establishing the Configuration Task....................................................................................................8-13

    8.3.2 Enabling the STP Function on CEs and PEs........................................................................................8-14

    8.3.3 Configuring BPDUs from CEs to PEs to Carry Specified Tags..........................................................8-14

    8.3.4 Configuring VLAN-based BPDU Tunnel............................................................................................8-15

    8.3.5 Configuring PE Interfaces Connecting PSN to Permit Packets with Specified Tags..........................8-16

    8.3.6 Checking the Configuration.................................................................................................................8-17

    8.4 Configuring QinQ-based BPDU Tunnels.....................................................................................................8-18

    8.4.1 Establishing the Configuration Task....................................................................................................8-19

    8.4.2 Enabling the STP Function on CEs and PEs........................................................................................8-19

    8.4.3 Configuring the BPDUs from CEs to PEs to Carry the Specified Tags..............................................8-20

    8.4.4 Configuring QinQ-based BPDU Tunnel..............................................................................................8-20

    8.4.5 Configuring PE Interfaces Connecting PSNs to Permit the Packets with Specified Tags...................8-22

    8.4.6 Checking the Configuration.................................................................................................................8-23

    8.5 Configuration Examples................................................................................................................................8-24

    8.5.1 Example for Configuring Interface-based BPDU Tunnel (Devices of Different Roles).....................8-25

    8.5.2 Example for Configuring Interface-based BPDU Tunnel (Devices of the Same Role).......................8-31

    8.5.3 Example for Configuring VLAN-based Tunnel of BPDUs.................................................................8-38

    8.5.4 Example for Configuring Tunnel of BPDUs Based on QinQ..............................................................8-44

    9 RRPP Configuration..................................................................................................................9-1

    9.1 Introduction.....................................................................................................................................................9-2

    9.1.1 Overview of RRPP.................................................................................................................................9-2

    9.1.2 RRPP Features Supported by the NE80E/40E.......................................................................................9-2

    9.2 Configuring RRPP Functions..........................................................................................................................9-6

    9.2.1 Establishing the Configuration Task......................................................................................................9-7

    9.2.2 Creating the RRPP Domain....................................................................................................................9-7

    9.2.3 Creating the Control VLAN...................................................................................................................9-8

    9.2.4 (Optional) Setting the Values of RRPP Domain Timers........................................................................9-8

    9.2.5 Configuring the Ports.............................................................................................................................9-9

    9.2.6 Creating the RRPP Ring.......................................................................................................................9-10

    9.2.7 Enabling the RRPP Ring......................................................................................................................9-119.2.8 Enabling RRPP.....................................................................................................................................9-11

    9.2.9 Checking the Configuration.................................................................................................................9-12

    9.3 Configuring the Monitoring Interface...........................................................................................................9-13

    9.3.1 Establishing the Configuration Task....................................................................................................9-13

    9.3.2 Configuring the Monitoring Interface..................................................................................................9-14

    9.3.3 Checking the Configuration.................................................................................................................9-15

    9.4 Configuring RRPP Snooping........................................................................................................................9-16

    9.4.1 Establishing the Configuration Task....................................................................................................9-16

    9.4.2 Enabling RRPP Snooping....................................................................................................................9-16

    9.4.3 (Optional) Configuring the VSI Associated with the RRPP Snooping................................................9-17

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access Contents

    Issue 03 (2008-09-22) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xi

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    14/689

    9.4.4 Checking the Configuration.................................................................................................................9-18

    9.5 Maintaining RRPP.........................................................................................................................................9-19

    9.5.1 Clearing RRPP Running Information..................................................................................................9-19

    9.5.2 Debugging RRPP.................................................................................................................................9-19

    9.6 Configuration Examples................................................................................................................................9-20

    9.6.1 Example for Configuring a Single RRPP Ring....................................................................................9-20

    9.6.2 Example for Configuring a Crossed RRPP Ring.................................................................................9-24

    9.6.3 Example for Configuring a Tangent RRPP Ring.................................................................................9-32

    9.6.4 Example for Configuring a Crossed RRPP Ring to Connect Dual NPE.............................................9-39

    9.6.5 Example for Configuring the RRPP Snooping....................................................................................9-54

    10 RPR Configuration.................................................................................................................10-1

    10.1 Introduction.................................................................................................................................................10-2

    10.1.1 Overview of RPR...............................................................................................................................10-2

    10.1.2 RPR Features Supported by the NE80E/40E.....................................................................................10-3

    10.2 Configuring Basic RPR Functions..............................................................................................................10-5

    10.2.1 Establishing the Configuration Task..................................................................................................10-6

    10.2.2 (Optional) Configuring a MAC address for an RPR Logical Interface.............................................10-6

    10.2.3 Configuring an IP Address for an RPR Logical Interface..................................................................10-7

    10.2.4 Binding a Physical Interface to an RPR Logical Interface.................................................................10-8

    10.2.5 Configuring the ARP Mapping Table................................................................................................10-8

    10.2.6 (Optional) Configuring the Station Name..........................................................................................10-9

    10.2.7 Enabling RPR Stations.......................................................................................................................10-9

    10.2.8 Checking the Configuration.............................................................................................................10-10

    10.3 Configuring RPR Timers..........................................................................................................................10-12

    10.3.1 Establishing the Configuration Task................................................................................................10-12

    10.3.2 Configuring the Sending Timer for TP and TC Frames...................................................................10-13

    10.3.3 Configuring the Sending Timer for ATD Frames............................................................................10-13

    10.3.4 Configuring the Timeout Interval for the Keepalive Timer.............................................................10-14

    10.3.5 Configuring the Delay Interval for Reporting a Span Fault.............................................................10-14

    10.3.6 Checking the Configuration.............................................................................................................10-15

    10.4 Configuring the RPR Protection Mode.....................................................................................................10-15

    10.4.1 Establishing the Configuration Task................................................................................................10-1610.4.2 Configuring the Switching Mode.....................................................................................................10-16

    10.4.3 Configuring the Forced Switching...................................................................................................10-16

    10.4.4 Configuring the Recovery Mode......................................................................................................10-17

    10.4.5 Configuring the Interval for the Station to Recover.........................................................................10-17

    10.4.6 Checking the Configuration.............................................................................................................10-18

    10.5 Configuring the Attributes of RPR Data Frames......................................................................................10-19

    10.5.1 Establishing the Configuration Task................................................................................................10-19

    10.5.2 Configuring Permitted Frame Size for the Station...........................................................................10-20

    10.5.3 Configuring Flow Statistics Based on Source MAC and Destination MAC...................................10-20

    10.5.4 Configuring the Mapping Between EF Class flow and RPR Service Type.....................................10-21

    Contents

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access

    xii Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 03 (2008-09-22)

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    15/689

    10.5.5 Configuring the Static Selection Ring..............................................................................................10-21

    10.5.6 Configuring the RPR Encapsulation Format for IS-IS Packets.......................................................10-22

    10.5.7 Checking the Configuration.............................................................................................................10-23

    10.6 Configuring the RPR Fairness Algorithm.................................................................................................10-23

    10.6.1 Establishing the Configuration Task................................................................................................10-23

    10.6.2 Configuring Allocable Bandwidth on the Station............................................................................10-24

    10.6.3 Configuring Reserved Bandwidth of the Station.............................................................................10-24

    10.6.4 Configuring the Link Weight on the Station....................................................................................10-25

    10.6.5 Checking the Configuration.............................................................................................................10-25

    10.7 Maintaining RPR.......................................................................................................................................10-26

    10.7.1 Clearing the Running Information...................................................................................................10-26

    10.7.2 Debugging RPR................................................................................................................................10-26

    10.8 Configuration Examples............................................................................................................................10-27

    10.8.1 Example for Configuring Basic RPR Functions..............................................................................10-27

    10.8.2 Example for Configuring Tangent RPR Rings................................................................................10-31

    10.8.3 Example for Configuring Intersected RPR Rings............................................................................10-35

    10.9 Troubleshooting........................................................................................................................................10-42

    10.9.1 RPR Logical Interface Is Down.......................................................................................................10-42

    10.9.2 Packet Transmission Faults..............................................................................................................10-43

    A Glossary.....................................................................................................................................A-1

    B Acronyms and Abbreviations.................................................................................................B-1

    Index.................................................................................................................................................i-1

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access Contents

    Issue 03 (2008-09-22) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xiii

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    16/689

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    17/689

    Figures

    Figure 1-1 Networking diagram of configuring the MAC address table based on the interface and VLAN....1-12

    Figure 1-2 Networking diagram of configuring the MAC address table based on the dot1q termination sub-interface

    and VSI................................................................................................................................................................1-15

    Figure 1-3 Networking diagram of configuring the MAC address table based on the VLANIF interface and VSI

    .............................................................................................................................................................................1-18Figure 1-4 Networking diagram of configuring the MAC address table based on the VLAN and Layer 2 VE

    interface...............................................................................................................................................................1-21

    Figure 1-5 Networking diagram of configuring the MAC address table based on the VSI and Layer 3 VE interface

    .............................................................................................................................................................................1-23

    Figure 2-1 Typical application of a Layer 2 Ethernet sub-interface (VRRP + TE tunnel)................ ..................2-3

    Figure 2-2 Schematic diagram of the Smart Link in the normal state..................................................................2-4

    Figure 2-3 Schematic diagram in which the active Smart link fails.....................................................................2-5

    Figure 2-4 Networking diagram of Ethernet interface configuration.................................................................2-22

    Figure 2-5 Networking diagram of configuring equipment to process Smart Link packets..............................2-24

    Figure 3-1 Determining the active links by the Actor in static LACP mode.......................................................3-3Figure 3-2 Typical application of the Layer 2 Eth-Trunk interface (Eth-Trunk ring network)..................... ......3-5

    Figure 3-3 Networking diagram of link aggregation in manual load balancing mode......................................3-25

    Figure 3-4 Networking diagram of link aggregation in 1:1 active/standby mode.............................................3-29

    Figure 3-5 Networking diagram of link aggregation in static LACP mode.......................................................3-34

    Figure 3-6 Configuring a Layer 2 Eth-Trunk interface to allow VLAN frames to pass through.......................3-44

    Figure 3-7 Networking diagram of configuring a Layer 3 Eth-Trunk interface................................................3-47

    Figure 3-8 Networking diagram of configuring VLANs to communicate through Eth-Trunk sub-interfaces

    .............................................................................................................................................................................3-49

    Figure 3-9 Networking diagram of link aggregation in manual load balancing mode......................................3-53

    Figure 3-10 Networking diagram of configuring link aggregation in 1:1 active/standby mode........................3-55

    Figure 3-11 Networking diagram of link aggregation in static LACP mode.....................................................3-60

    Figure 4-1 Networking diagram of the traditional LAN......................................................................................4-3

    Figure 4-2 Schematic diagram of the VLAN networking....................................................................................4-4

    Figure 4-3 Communication between VLANs through routers.............................................................................4-6

    Figure 4-4 Communication between VLANs through VLANIF interfaces.........................................................4-7

    Figure 4-5 Networking diagram of configuring trunk interfaces to connect the VLANs between devices.......4-19

    Figure 4-6 Networking diagram of configuring hybrid interfaces to connect the VLANs between devices.....4-19

    Figure 4-7 Application scenario of VLAN aggregation.......................... ...........................................................4-22

    Figure 4-8 Networking diagram of configuring VLAN mapping......................................................................4-27

    Figure 4-9 Configuring a VLAN based on Layer 2 interface............................................................................4-36

    Quidway NetEngine80E/40E Core Router

    Configuration Guide - LAN Access and MAN Access Figures

    Issue 03 (2008-09-22) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xv

  • 8/2/2019 00399146-Configuration Guide - LAN and MAN Access(V300R003_03)

    18/689

    Figure 4-10 Configuring VLANs based on ports...............................................................................................4-38

    Figure 4-11 Configuring VLANs to communicate through a router..................................................................4-40

    Figure 4-12 Configuring VLANs to communicate with non-VLAN through a router......................................4-43

    Figure 4-13 Configuring VLAN trunks..............................................................................................................4-45

    Figure 4-14 Configuring VLAN aggregation.....................................................................................................4-49

    Figure 4-15 Networking diagram of configuring VLAN mapping....................................................................4-51

    Figure 4-16 Networking diagram of configuring VLAN damping....................................................................4-55

    Figure 4-17 Networking diagram of configuring interface isolation in a VLAN.............................................. 4-57

    Figure 4-18 Networking diagram of configuring the isolation based on interface groups in a VLAN............. 4-59

    Figure 5-1 Intercommunication between Layer 2 LANs on the basis of the traditional IEEE 802.1Q protocol

    ...............................................................................................................................................................................5-3

    Figure 5-2 802.1 encapsulation............................................................................................................................5-4

    Figure 5-3 Compatibility of the EType field in the TPID field of the outer tag in the QinQ packet...................5-5

    Figure 5-4 Supporting proxy ARP.......................................................................................................................5-5Figure 5-5 Typical networking diagram of IP address assignation on the sub-interface for QinQ VLAN tag

    termination as a DHCP server...............................................................................................................................5-6

    Figure 5-6 Typical networking diagram of the DHCP relay function on the sub-interface for QinQ VLAN tag

    termination............................................................................................................................................................5-7

    Figure 5-7 Typical networking diagram of VRRP on the sub-interface for QinQ VLAN tag termination..... ....5-8

    Figure 5-8 Typical networking diagram of the access to an L3VPN through the sub-interface for QinQ VLAN tag

    termination.......................................................................................................................................................... 5-10

    Figure 5-9 Typical networking diagram of dynamic QinQ................................................................................5-11

    Figure 5-10 Typical networking diagram of the access to a PWE3/VLL network through the sub-interfac


Recommended