+ All Categories
Home > Documents > Operation Manual-IPM Volume

Operation Manual-IPM Volume

Date post: 07-Aug-2018
Category:
Upload: nicoloh2002
View: 218 times
Download: 0 times
Share this document with a friend

of 152

Transcript
  • 8/20/2019 Operation Manual-IPM Volume

    1/415

    Part I Basic Configuration

    Chapter 1 Connecting to the UA5000 1-1..........................................................

    1.1 Connecting to the UA5000 Through the Local Serial Port 1-1................

    1.1.1 Connecting the Serial Port Cable 1-1.............................................1.1.2 Running the HyperTerminal 1-2......................................................

    1.1.3 Configuring a Serial Port 1-2..........................................................

    1.1.4 Setting the Terminal Type 1-3........................................................

    1.1.5 Setting the Line Delay and the Character Delay 1-4......................

    1.1.6 Logging on to the UA5000 1-5........................................................

    1.2 Connecting to the UA5000 Through the Remote Serial Port 1-6............

    1.2.1 Setting the Called Modem 1-7........................................................

    1.2.2 Setting the Calling Modem 1-8.......................................................

    1.2.3 Setting up the Configuration Environment 1-8................................

    1.2.4 Running the HyperTerminal 1-9......................................................

    1.2.5 Logging on to the UA5000 1-10........................................................

    1.3 Connecting to the UA5000 Through the Telnet Terminal 1-10.................

    1.3.1 Setting up the Configuration Environment 1-10................................

    1.3.2 Running Telnet Application 1-12.......................................................

    1.3.3 Logging on to the UA5000 1-12........................................................

    Chapter 2 Getting Started with CLI 2-1..............................................................

    2.1 Operation Features of the CLI 2-1..........................................................

    2.1.1 Intelligent Matching 2-1...................................................................

    2.1.2 Command Editing 2-1.....................................................................

    2.1.3 Prompt Characters 2-2...................................................................

    2.1.4 Command Mode 2-3.......................................................................

    2.2 Basic Settings of the CLI 2-5...................................................................

    2.2.1 Setting the Online Help Mode 2-5...................................................

    2.2.2 Setting the Interactive Input Mode 2-6............................................

    2.2.3 Setting the Screen Display Mode 2-7.............................................

    2.2.4 Setting the Command Echo Display 2-7.........................................2.2.5 Clearing Terminal Screen 2-8.........................................................

    2.2.6 Setting the System Time 2-8..........................................................

    2.2.7 Setting the Terminal Type 2-8........................................................

    2.2.8 Setting Terminal Timeout Exit 2-9..................................................

    2.2.9 Locking a Terminal 2-9...................................................................

    2.2.10 Querying the History Command 2-10.............................................

    2.2.11 Network Testing Tools 2-10............................................................

    Chapter 3 Managing a User Account 3-1...........................................................

    3.1 Introduction to the User Account 3-1.......................................................3.2 Managing a User Account 3-2.................................................................

  • 8/20/2019 Operation Manual-IPM Volume

    2/415

    3.2.1 Adding a System User 3-2..............................................................

    3.2.2 Querying User Information 3-3.......................................................

    3.2.3 Modifying the Attributes of a User 3-4............................................

    3.2.4 Deleting a System User 3-5............................................................

    Chapter 4 Controlling the System Output Information 4-1..................................

    4.1 Overview of Terminals and the System Output Information 4-1.............

    4.1.1 Terminals 4-1..................................................................................

    4.1.2 Information Classification 4-1.........................................................

    4.1.3 Infoswitch and Infolevel 4-2............................................................

    4.1.4 Command List 4-2..........................................................................

    4.2 Controlling the Output to a CLI Terminal 4-3..........................................

    4.2.1 Querying the infoswitch of a CLI Terminal 4-3................................

    4.2.2 Setting the infoswitch for a CLI Terminal 4-3..................................

    4.2.3 Querying the infolevel of a CLI terminal 4-4...................................

    4.2.4 Setting the infolevel for a CLI Terminal 4-4....................................

    4.3 Controlling the Output to an NMS Terminal 4-4......................................

    4.3.1 Querying the infoswitch of an NMS Terminal 4-4...........................

    4.3.2 Setting the infoswitch for an NMS Terminal 4-4.............................

    4.3.3 Querying the infolevel of an NMS Terminal 4-5..............................

    4.3.4 Setting the infolevel for an NMS Terminal 4-5................................

    4.4 Controlling the Output to a Log Host Terminal 4-5..................................

    4.4.1 Querying the infoswitch of a Log Host Terminal 4-6.......................4.4.3 Querying the infolevel of a Log Host Terminal 4-6.........................

    4.4.3 Querying the infolevel of a Log Host Terminal 4-6.........................

    4.4.4 Setting the infolevel for a Log Host Terminal 4-6............................

    Chapter 5 NMS Configuration 5-1......................................................................

    5.1 Configuring the Outband NMS 5-1..........................................................

    5.1.1 Assigning an IP Address to the Outband NMS Interface 5-1..........

    5.1.2 Adding a Route 5-2.........................................................................

    5.1.3 Configuring SNMP 5-2....................................................................

    5.2 Configuring the Inband NMS 5-4.............................................................5.2.1 Configuring an Inband NMS Interface 5-5......................................

    5.2.2 Adding a Route 5-6.........................................................................

    5.2.3 Configuring SNMP 5-6....................................................................

    5.3 Configuring the Integrated NMS 5-6.......................................................

    5.3.1 Networking of the Integrated NMS 5-6...........................................

    5.3.2 Configuration Procedure 5-7...........................................................

    5.4 Configuration Example 5-7......................................................................

    5.4.1 Outband NMS 5-7...........................................................................

    5.4.2 Inband NMS 5-9..............................................................................

    5.4.3 Integrated NMS 5-10........................................................................

  • 8/20/2019 Operation Manual-IPM Volume

    3/415

    Chapter 6 Card Configuration 6-1......................................................................

    6.1 Overview of Cards 6-1............................................................................

    6.1.1 Card Location 6-1...........................................................................

    6.1.2 Card Type 6-1.................................................................................

    6.2 Command List 6-2...................................................................................

    6.3 Configuring a Card 6-2............................................................................

    6.3.1 Adding a Card 6-2...........................................................................

    6.3.2 Confirming a Card 6-2....................................................................

    6.3.3 Querying the Card Information 6-3.................................................

    6.3.4 Querying the Card Version 6-3.......................................................

    6.3.5 Querying the Card CPU Occupancy 6-3.........................................

    6.3.6 Disabling/Enabling a Card 6-3........................................................

    6.3.7 Resetting a Card 6-4.......................................................................

    6.3.8 Deleting a Card 6-4.........................................................................

    Chapter 7 Port Configuration 7-1........................................................................

    7.1 Overview of Port Types 7-1.....................................................................

    7.2 Configuring the Port Description 7-1.......................................................

    7.2.1 Command List 7-1..........................................................................

    7.2.2 Describing a Port 7-1......................................................................

    7.2.3 Querying the Port Description 7-2..................................................

    7.3 Configuring an Ethernet Port on the IPM Card 7-2.................................

    7.3.1 Command List 7-3..........................................................................7.3.2 Entering the IPM Config Mode 7-4.................................................

    7.3.3 Enabling/Disabling an Ethernet Port 7-4.........................................

    7.3.4 Configuring the Attributes of a Port 7-4..........................................

    7.3.5 Configuring the Default VLAN of a Port 7-5....................................

    7.3.6 Configuring the Traffic Suppression 7-6.........................................

    7.3.7 Aggregating Ethernet Ports 7-9......................................................

    7.3.8 Configuring Ethernet Port Mirroring 7-10..........................................

    7.3.9 Querying Port Information 7-11........................................................

    7.4 Configuring an ADSL Port 7-11.................................................................7.4.1 Querying the ADSL Port State 7-12..................................................

    7.4.2 Setting an ADSL Line Profile 7-13....................................................

    7.4.3 Setting an ADSL Alarm profile 7-22..................................................

    7.4.4 Activating/Deactivating an ADSL Port 7-28......................................

    7.4.5 Resetting an ADSL Chipset 7-28......................................................

    7.4.6 Setting the Loopback of an ADSL Port 7-29.....................................

    7.4.7 Querying an ADSL Port 7-29............................................................

    7.5 Configuring an SHDSL Port 7-30..............................................................

    7.5.1 Command List 7-31..........................................................................

    7.5.2 Querying the SHDSL Port State 7-32...............................................

  • 8/20/2019 Operation Manual-IPM Volume

    4/415

    7.5.3 Setting an SHDSL Line Profile 7-32.................................................

    7.5.4 Activating/Deactivating an SHDSL Port 7-37....................................

    7.5.5 Setting an SHDSL Alarm Profile 7-38...............................................

    7.5.6 Modifying the Alarm Profile Reference for an SHDSL Port 7-40......

    7.5.7 Setting the Power Backoff of an SHDSL Port 7-40...........................

    7.5.8 Resetting an SHDSL Chipset 7-41...................................................

    7.5.9 Setting the Loopback Test of an SHDSL Port 7-41..........................

    7.5.10 Binding an SHDSL Port 7-41..........................................................

    7.5.11 Querying an SHDSL Port 7-42.......................................................

    7.6 Configuring a VDSL Port 7-43...................................................................

    7.6.1 Querying the VDSL Port State 7-44..................................................

    7.6.2 Setting a VDSL Line Profile 7-44......................................................

    7.6.3 Deleting a VDSL line profile 7-48......................................................

    7.6.4 Activating/Deactivating a VDSL Port 7-48........................................

    7.6.5 Setting a VDSL Alarm Profile 7-49...................................................

    7.6.6 Binding the VDSL Alarm Profile 7-52................................................

    7.6.7 Setting the VDSL Port Mode 7-52....................................................

    7.6.8 Setting the Default VLAN of a VDSL Port 7-53.................................

    7.6.9 Setting the VDSL Port Mirroring 7-53...............................................

    7.6.10 Managing a VTU-R 7-54.................................................................

    7.6.11 Resetting a VDSL Port and Chipset 7-54.......................................

    7.6.12 Querying a VDSL Port 7-55............................................................7.6.13 Setting the Loopback 7-56..............................................................

    Chapter 8 VLAN Configuration 8-1.....................................................................

    8.1 Overview of VLAN Types 8-1..................................................................

    8.2 Command List 8-2...................................................................................

    8.3 Configuring a VLAN 8-2..........................................................................

    8.3.1 Adding a VLAN 8-2.........................................................................

    8.3.2 Querying the Setting of a VLAN 8-3...............................................

    8.3.3 Configuring VLAN Attributes 8-4.....................................................

    8.3.4 Deleting a VLAN 8-5.......................................................................8.3.5 Adding a Port to a VLAN 8-5..........................................................

    8.3.6 Querying the VLAN Settings of a Port 8-5......................................

    8.3.7 Deleting a Port from a VLAN 8-6....................................................

    8.3.8 Configuring a Layer 3 Virtual Interface for a VLAN 8-6..................

    8.3.9 Configuring a Super VLAN 8-6.......................................................

    Chapter 9 Virtual Service Port Configuration 9-1...............................................

    9.1 Overview of the Virtual Service Port Configuration 9-1...........................

    9.2 Command List 9-1...................................................................................

    9.3 Configuring a Traffic Table Entry 9-2......................................................

    9.3.1 Querying a Traffic Table Entry 9-2..................................................

  • 8/20/2019 Operation Manual-IPM Volume

    5/415

  • 8/20/2019 Operation Manual-IPM Volume

    6/415

    11.6.3 Solution 11-17...................................................................................

    11.7 Configuration Example 11-17....................................................................

    Chapter 12 RSTP Configuration 12-1...................................................................

    12.1 Overview of RSTP 12-1..........................................................................

    12.2 Command List 12-1.................................................................................

    12.3 Configuring RSTP 12-3...........................................................................

    12.3.1 Viewing the RSTP Configurations 12-3..........................................

    12.3.2 Enabling/Disabling the RSTP 12-4.................................................

    12.3.3 Setting/Converting the Operating Mode of RSTP 12-4...................

    12.3.4 Setting the Network Diameter 12-5.................................................

    12.3.5 Setting the Parameters of a Bridge 12-5........................................

    12.3.6 Setting the Parameters of a Port 12-7............................................

    Chapter 13 Routing Protocol Configuration 13-1..................................................

    13.1 Overview of Routing Protocol Configuration 13-1...................................

    13.2 Static Route Configuration 13-2..............................................................

    13.2.1 About Static Route 13-2..................................................................

    13.2.2 Command List 13-2........................................................................

    13.2.3 Configuring a Static Route 13-2......................................................

    13.2.4 Configuration Example 13-4...........................................................

    13.3 RIP Configuration 13-5............................................................................

    13.3.1 About RIP 13-5...............................................................................

    13.3.2 Command List 13-5........................................................................13.3.3 Configuring RIP 13-7......................................................................

    13.3.4 Configuration Example 13-12...........................................................

    13.4 OSPF Configuration 13-14........................................................................

    13.4.1 About OSPF 13-14...........................................................................

    13.4.2 Command List 13-14........................................................................

    13.4.3 Configuring OSPF 13-16..................................................................

    13.4.4 Configuration Example 13-25...........................................................

    Chapter 14 PITP Configuration 14-1....................................................................

    14.1 Overview of PITP 14-1............................................................................14.2 Command List 14-1.................................................................................

    14.3 Configuring PITP 14-2.............................................................................

    14.3.1 Setting an Ethernet Encapsulation Type in V Mode 14-2...............

    14.3.2 Querying the Ethernet Encapsulation Type in V mode 14-2...........

    14.3.3 Enabling/Disabling the PITP function 14-3.....................................

    14.3.4 Querying the PITP Configurations 14-3..........................................

    Chapter 15 TCP Connection Attribute Configuration 15-1...................................

    15.1 Overview of the TCP Connection Configuration 15-1.............................

    15.2 Command List 15-1.................................................................................

    15.3 Configuring TCP Connection Attributes 15-2..........................................

  • 8/20/2019 Operation Manual-IPM Volume

    7/415

    15.3.1 Configuring a Time Limit for Creating a TCP Connection 15-2......

    15.3.2 Configuring a Time Limit for Closing the Rx Channel of aTCP Connection 15-2................................................................................

    15.3.3 Configuring the size of the TCP Rx/Tx Buffer 15-3.........................

    15.3.4 Querying the Information on TCP Connections 15-3......................Chapter 16 DHCP Relay Configuration 16-1........................................................

    16.1 Overview 16-1.........................................................................................

    16.2 Enabling the Switching Between Layer 2 and Layer 3 DHCPRelay 16-2.......................................................................................................

    16.2.1 Switching to a DHCP Relay Mode 16-2..........................................

    16.2.2 Querying the Settings of the DHCP Relay Mode 16-2....................

    16.3 Configuring the DHCP Relay 16-3..........................................................

    16.3.1 Overview 16-3.................................................................................

    16.3.2 Creating a DHCP Server 16-4........................................................16.3.3 Setting the DHCP Server Selection Mode 16-5..............................

    16.3.4 Configuring the Standard DHCP Relay Mode 16-5........................

    16.3.5 Configuring the DHCP Option60 Mode 16-6..................................

    16.3.6 Configuring the MAC Address Segment Mode 16-7.......................

    16.4 Configuring the DHCP Option82 16-9.....................................................

    16.4.1 Overview 16-9.................................................................................

    16.4.2 Enabling/Disabling the DHCP Option82 16-10.................................

    16.4.3 Setting the Max. Length of DHCP Packets 16-10.............................

    16.4.4 Querying the Settings of the DHCP Option82 16-10........................

    16.5 Querying the Global Statistics of the DHCP Relay 16-11.........................

    16.6 Configuration Examples 16-12..................................................................

    16.6.1 Configuring the Standard Mode 16-12..............................................

    16.6.2 Configuring the Option60 Mode 16-13..............................................

    Chapter 17 NTP Configuration 17-1.....................................................................

    17.1 Overview of the NTP Protocol 17-1.........................................................

    17.1.1 Definition 17-1.................................................................................

    17.1.2 Working Modes 17-1.......................................................................

    17.2 Configuring the NTP Protocol 17-2.........................................................

    17.2.1 Overview 17-2.................................................................................

    17.2.2 Configuring the NTP Master Clock 17-3.........................................

    17.2.3 Configuring the NTP Working Mode 17-4.......................................

    17.2.4 Configuring the NTP Authentication 17-7.......................................

    17.2.5 Configuring the NTP Access Control 17-8......................................

    17.2.6 Configuring an Interface for Sending and Receiving NTPMessages 17-9..........................................................................................

    17.2.7 Disabling an Interface Receiving NTP Messages 17-9..................

    17.2.8 Setting the Maximum Number of NTP Sessions 17-10....................

  • 8/20/2019 Operation Manual-IPM Volume

    8/415

    17.3 Configuration Example 17-10....................................................................

    17.3.1 Configuring the NTP Working in Broadcast Mode 17-10..................

    17.3.2 Configuring the NTP Working in Multicast Mode 17-12....................

    17.3.3 Configuring the NTP Working in Client/Server Mode 17-13.............

    17.3.4 Configuring the NTP Working in Symmetric Mode 17-14.................

    17.3.5 Configuring NTP Broadcast Mode with Authentication 17-16...........

    17.3.6 Configuring the NTP Working in Client/Server Mode withAuthentication 17-17....................................................................................

    Part II Service Application

    Chapter 18 ADSL Service Application 18-1..........................................................

    18.1 Overview of the ADSL Service 18-1........................................................

    18.2 Configuration Procedure 18-2.................................................................

    18.3 Configuration Example 18-3....................................................................18.3.1 Networking Description 18-3...........................................................

    18.3.2 Configuration Procedure 18-4.........................................................

    Chapter 19 SHDSL Service Application 19-1.......................................................

    19.1 Overview of the SHDSL Service 19-1.....................................................

    19.2 Configuration Procedure 19-1.................................................................

    19.3 Configuration Example 19-3....................................................................

    19.3.1 Networking Description 19-3...........................................................

    19.3.2 Configuration Procedure 19-4.........................................................

    Chapter 20 VDSL Service Application 20-1..........................................................

    20.1 Overview of the VDSL Service 20-1........................................................

    20.2 Configuration Procedure 20-2.................................................................

    20.3 Configuration Example 20-2....................................................................

    20.3.1 Networking Description 20-2...........................................................

    20.3.2 Configuration Procedure 20-3.........................................................

    Chapter 21 VLAN Service Application 21-1..........................................................

    21.1 Super VLAN Application 21-1.................................................................

    21.1.1 Introduction to the Super VLAN 21-1..............................................

    21.1.2 Configuration Procedure 21-2.........................................................

    21.1.3 Configuration Example 21-2...........................................................

    21.2 QinQ VLAN Application 21-4...................................................................

    21.2.1 Introduction to the QinQ VLAN 21-4...............................................

    21.2.2 Configuration Procedure 21-4.........................................................

    21.2.3 Configuration Example 21-5...........................................................

    21.3 VLAN Stacking Application 21-6.............................................................

    21.3.1 Introduction to the VLAN Stacking 21-6..........................................

    21.3.2 Configuration Process 21-7............................................................21.3.3 Configuration Example 21-7...........................................................

  • 8/20/2019 Operation Manual-IPM Volume

    9/415

    Chapter 22 Multicast Service Application 22-1.....................................................

    22.1 Overview of the Multicast Service 22-1...................................................

    22.1.1 Networking 22-1..............................................................................

    22.1.2 IGMP Protocol Handling Procedure 22-2.......................................

    22.1.3 Command List 22-2........................................................................

    22.2 Multicast Service Configuration 22-5......................................................

    22.2.1 Configuring the IGMP Proxy 22-5...................................................

    22.2.2 Configuring the Multicast Program Bank 22-11................................

    22.2.3 Configuring an IGMP Authorization Profile 22-13.............................

    22.2.4 Configuring the Preview Attributes 22-15.........................................

    22.2.5 Configuring an IGMP Host 22-16......................................................

    22.2.6 Managing the IGMP Host Logs 22-19..............................................

    22.2.7 Querying IGMP Packet Statistics 22-20...........................................

    22.3 IGMP Multicast Service Application 22-20................................................

    22.3.1 Service Configuration 22-20.............................................................

    22.3.2 Configuration Example 22-21...........................................................

    Chapter 23 IPoA/PPPoA Service Application 23-1...............................................

    23.1 Overview of the IPoA/PPPoA Service 23-1.............................................

    23.2 IPoA/PPPoA Configuration Procedure 23-2............................................

    23.3 IPoA/PPPoA Configuration Example 23-2..............................................

    23.3.1 Networking 23-2..............................................................................

    23.3.2 Configuration Procedure 23-3.........................................................Chapter 24 LAN Access Application 24-1............................................................

    24.1 Overview of the LAN Access 24-1..........................................................

    24.2 Configuration Procedure 24-2.................................................................

    24.2.1 Configuring the Port Mode of the IPM Card 24-2...........................

    24.2.2 Configuring the VLAN 24-2.............................................................

    24.3 Configuration Example 24-3....................................................................

    24.3.1 Networking Description 24-3...........................................................

    24.3.2 Configuration Procedure 24-3.........................................................

    Chapter 25 Voice Service Application 25-1..........................................................25.1 Overview of the Voice Service 25-1........................................................

    25.2 Networking and Data Planning 25-1.......................................................

    25.3 Configuration Procedure 25-3.................................................................

    25.3.1 Configuring the PVM card on the CLI 25-3.....................................

    25.3.2 Configuring the IPM card on the CLI 25-5......................................

    Part III Maintenance Guide

    Chapter 26 System Maintenance 26-1.................................................................

    26.1 Overview of the System Maintenance 26-1............................................26.1.1 System Files and Storage Media 26-1............................................

  • 8/20/2019 Operation Manual-IPM Volume

    10/415

    26.1.2 Upgrade Procedures 26-2..............................................................

    26.2 Managing the Data 26-3..........................................................................

    26.2.1 Saving the Data 26-4......................................................................

    26.2.2 Backing Up the Data 26-5...............................................................

    26.2.3 Erasing the Data 26-6.....................................................................

    26.3 Loading the Software 26-6......................................................................

    26.3.1 Loading the BIOS 26-6...................................................................

    26.3.2 Loading the System Program 26-8.................................................

    26.3.3 Loading the System Database File 26-11.........................................

    26.3.4 Loading the Language Resource File 26-11.....................................

    26.3.5 Loading the ADSL Chipset Program 26-12......................................

    26.3.6 Loading the ADSL Line Card Program 26-13...................................

    26.3.7 Loading the Other Line Card Program 26-13...................................

    26.4 Setting the System Program Rollback 26-14............................................

    26.4.1 Enabling/Disabling the System Program Rollback 26-14.................

    26.4.2 Setting the Rollback Time Limit 26-14..............................................

    26.5 Active/Standby Switchover 26-14.............................................................

    26.6 Managing the Log 26-15...........................................................................

    26.6.1 Setting the Log Host 26-15...............................................................

    26.6.2 Querying the Log 26-15....................................................................

    26.7 Managing the Patch 26-15........................................................................

    26.7.1 Patches of the UA5000 System Program 26-16...............................26.7.2 Patch Operation Procedure 26-17....................................................

    26.7.3 Patch Loading Example 26-17..........................................................

    Chapter 27 Alarm Management 27-1...................................................................

    27.1 Overview of the Alarm Management 27-1...............................................

    27.1.1 Alarm Attributes 27-1......................................................................

    27.1.2 Alarm Management Functions 27-2................................................

    27.2 Configuring Alarms 27-2.........................................................................

    27.2.1 Querying an Alarm Record 27-2.....................................................

    27.2.2 Querying the Alarm Configuration 27-3..........................................27.2.3 Setting the Alarm Level 27-3..........................................................

    27.2.4 Setting Alarm Output to CLI Terminal 27-4.....................................

    27.2.5 Setting the Alarm Statistics 27-5.....................................................

    27.2.6 Setting the Alarm Threshold 27-6...................................................

    27.2.7 Querying the Alarm Statistics 27-6.................................................

    27.2.8 Clearing the Alarm Statistics 27-7..................................................

    27.2.9 Querying the Basic Alarm Information 27-7....................................

    Chapter 28 Environment Monitoring Management 28-1.......................................

    28.1 Overview of the EMU 28-1......................................................................

    28.1.1 EMU Composition 28-1...................................................................

  • 8/20/2019 Operation Manual-IPM Volume

    11/415

  • 8/20/2019 Operation Manual-IPM Volume

    12/415

  • 8/20/2019 Operation Manual-IPM Volume

    13/415

    Huawei Technologies Proprietary

    HUAWEI

    1. Basic Configuration

    2. Service Application

    3. Maintenance Guide

    4. Appendix

    UA5000 Universal Access Unit

    Operation Manual – IPM Volume

    V100R009

  • 8/20/2019 Operation Manual-IPM Volume

    14/415

    Huawei Technologies Proprietary

    UA5000 Universal Access Unit

    Operation Manual – IPM Volume

    Volume IPM Volume 

    Manual Version T2-051677-20060317-C-1.96

    Product Version V100R009

    BOM 31161477

    Huawei Technologies Co., Ltd. provides customers with comprehensive technical support

    and service. Please feel free to contact our local office or company headquarters.

    Huawei Technologies Co., Ltd. 

     Address: Administration Building, Huawei Technologies Co., Ltd.,

    Bantian, Longgang District, Shenzhen, P. R. China

    Postal Code: 518129

    Website: http://www.huawei.com

    Email: [email protected]

  • 8/20/2019 Operation Manual-IPM Volume

    15/415

    Huawei Technologies Proprietary

    Copyright © 2006 Huawei Technologies Co., Ltd.

    All Rights Reserved

    No part of this manual may be reproduced or transmitted in any form or by any

    means without prior written consent of Huawei Technologies Co., Ltd.

    Trademarks

    , HUAWEI, C&C08, EAST8000, HONET, , ViewPoint, INtess, ETS, DMC,

    TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium, M900/M1800,

    TELESIGHT, Quidview, Musa, Airbridge, Tellwin, Inmedia, VRP, DOPRA,

    iTELLIN, HUAWEI OptiX, C&C08 iNET, NETENGINE, OptiX, iSite, U-SYS, iMUSE,

    OpenEye, Lansway, SmartAX, infoX, and TopEng are trademarks of Huawei

    Technologies Co., Ltd.

     All other trademarks and trade names mentioned in this manual are the property of

    their respective holders.

    Notice

    The information in this manual is subject to change without notice. Every effort has

    been made in the preparation of this manual to ensure accuracy of the contents,

    but all statements, information, and recommendations in this manual do not

    constitute the warranty of any kind, express or implied.

  • 8/20/2019 Operation Manual-IPM Volume

    16/415

  • 8/20/2019 Operation Manual-IPM Volume

    17/415

    Huawei Technologies Proprietary

      Part II Service Application This part introduces some major applications of the

    UA5000. It uses examples to illustrate the whole process of the service

    configuration.

      Part III Maintenance Guide This part describes the maintenance practices of

    the UA5000. It is a guide to the maintenance operation activities.

      Part IV Appendix The appendix lists the abbreviations and acronyms used in

    this manual.

    Intended Audience

    The manual is intended for the following readers:

      UA5000 Administrators

      UA5000 Maintenance Technicians

    Conventions

    The manual uses the following conventions:

    I. General conventions

    Convention Description

     Arial Normal paragraphs are in Arial.

    Boldface Headings are in Boldface.

    Courier New  Terminal Display is in Courier New.

     Arial + Boldface +Underline + Italic  

    Block labels are in Arial + Boldface + Underline + Italic ,such as Example .

    II. Command conventions

    Convention Description

    Boldface The keywords of a command line are in Boldface.

    italic   Command arguments are in italic .

    [ ]Items (keywords or arguments) in square brackets [ ] areoptional.

    { x | y | ... } 

     Alternative items are grouped in braces and separated byvertical bars. One is selected.

    [ x | y | ... ] Optional alternative items are grouped in square bracketsand separated by vertical bars. One or none is selected. 

  • 8/20/2019 Operation Manual-IPM Volume

    18/415

    Huawei Technologies Proprietary

    Convention Description

    { x | y | ... } *  Alternative items are grouped in braces and separated byvertical bars. A minimum of one or a maximum of all can beselected. 

    [ x | y | ... ] * Optional alternative items are grouped in square bracketsand separated by vertical bars. Many or none can beselected. 

    # A line starting with the # sign is comments.

    III. GUI conventions

    Convention Description

    Boldface Button names and menu items are in Boldface. Forexample, click OK.

    >Multi-level menus are in bold and separated by forwardbrackets. For example, select File > Create > Folder  fromthe main menu.

    IV. Symbols

    Eye-catching symbols are also used in the manual to highlight the points worthy of

    special attention during the operation. They are defined as follows:

    Caution: Means reader be extremely careful during the operation.

      Note: Means a complementary description.

  • 8/20/2019 Operation Manual-IPM Volume

    19/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Manual Guide

     

    Huawei Technologies Proprietary

    i

    Manual Guide

    Overview

     As a Multi-Service Access Node (MSAN), the UA5000 provides various user interfaces

    such as POTS, ISDN, DDN and xDSL (ADSL/VDSL/SHDSL).

    The UA5000 also provides different upstream ports to access different networks.

      STM-1/STM4 ATM optical port and IMA E1 port to access the ATM network

      FE/GE port to access the IP network

      V5 and E1 ports to access the PSTN and DDN networks

    Control Cards and Operation Manuals

    The services of the UA5000 are controlled by its control cards. The service

    configuration differs with control cards. For specific configuration, refer to relevant

    operation manual.

    Table 1 lists the control cards and the related operation manuals.

    Table 1 Control cards and related operation manuals

    Control Card Type Control Card Operation Manual

     ATM serviceprocessing card–APM

    UA5000 Universal Access UnitOperation Manual – APM VolumeBroadband control

    card IP service processingcard–IPM

    UA5000 Universal Access UnitOperation Manual – IPM Volume

    Packet-based voiceprocessing card–PVM

    UA5000 Universal Access UnitOperation Manual – PVM VolumeNarrowband control

    card V5 interface

    processing unit–PVU

    UA5000 Universal Access Unit

    Operation Manual – PVU Volume

    Frames

    The UA5000 frame includes the rear-access model and the front-access model. The

    front-access frame has three types: HABD (master frame), HABE (slave frame) and

    HABF (extended frame). The rear-access frame has two types: HABA (master frame)

    and HABB (slave frame).

  • 8/20/2019 Operation Manual-IPM Volume

    20/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Manual Guide

     

    Huawei Technologies Proprietary

    ii

    The card slots of different frames are different. This chapter takes the HABD frame as

    an example to introduce the card installation and configuration.

    The HABD frame is the master frame of the front-access UA5000, with the height of

    10 U. The frame employs the multi-bus high-speed backplane, and is the core of the

    UA5000 system. The frame converges the services from the subtended frames.

    The HABD frame can support two PWX cards working in the load sharing and

    mutual-aid mode. The HABD frame support two narrowband main control cards and

    two broadband control cards that both work in the hot backup mode.

    The HABD frame has 12 line card slots. The narrowband and broadband line cards can

    be intermixed. The AIUB and TSSB card can be installed only in the slots shown in

    Figure 1.

    Figure 1 illustrates the HABD frame structure.

    Control & Interconnect

    Cabling Area

    01 0200

    FAN

    P

    WX

    x

    SL

    x

    PM

    B

    / A

    PS

    B

    P

    Vx

    P

    WX

     AI

    U

    B/xS

    L

    Cabling Area

    x

    PM

    B

    / A

    PS

    B

     AI

    U

    B/xS

    L

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    TS

    S

    B/xS

    L

    P

    Vx

    03 04 05 06 07 08 09 10 11 12 13 14 15 16 17

    Subscriber LineCabling Area

     

     AIUB: ATM interface cardPVx: Narrowband main control card (PVU or PVM)PWX: Secondary power supply cardTSSB: Test cardxSL: Line card (ASL/DSL/ADMB/VDLB/…)xPMB: Broadband main control card (APMB or IPMB)

    Figure 1 HABD frame structure

    Note:

    For details about the frames, refer to the UA5000 Universal Access Unit Technical

    Manual .

  • 8/20/2019 Operation Manual-IPM Volume

    21/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Manual Guide

     

    Huawei Technologies Proprietary

    iii

    Cards

    The following part shows the position of the cards in different frames.

    Cards in UA5000 front-access frames

    Figure 2 shows the card layout of the master frame.

    Control and interconnect

    cable connecting area

    01 0200

    Fan

    P

    WX

    x

    SL

    x

    P

    MB

    P

    V

    x

    /

    RS

    U

    x

    P

    WX

     A

    I

    U

    B

    /x

    S

    L

    Cable routing area

    x

    P

    MB

     A

    I

    U

    B

    /x

    S

    L

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    x

    SL

    T

    S

    S

    B

    /x

    S

    L

    P

    V

    x

    /

    RS

    U

    x

    03 04 05 06 07 08 09 10 11 12 13 14 15 16 17

    Subscriber line

    connecting area 

    PWX: Secondary power supply card xPMB: Broadband control card (APMB/IPMB)PVx: Narrowband control card (PVU8/PVU4/PVM)RSUx: Remote subscriber unit(RSU8/RSU4)

    xSL: Service card(ASL/DSL/ADMB/VDLB/…)

     AIUB: ATM interface card TSSB: Test card

    Figure 2 Master frame (HABD) layout

    Figure 3 shows the card layout of the slave frame.

    01 0200

    Fan

    P

    W

    X

    x

    S

    L

     A

    PS

    B

    P

    W

    X

    x

    S

    L

     A

    PS

    B

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    03 04 05 06 07 08 09 10 11 12 13 14 15 16 17

    x

    S

    L

    x

    S

    L

    Control & interconnect

    cable conneting area

    Subscriber line

    connecting area

    Cable routing area

     

    PWX: Secondary power supply card APSB: Broadband control card for the slave framexSL: Service card (ASL/DSL/ADMB/VDLB/…)

    Figure 3 Slave frame (HABE) layout

  • 8/20/2019 Operation Manual-IPM Volume

    22/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Manual Guide

     

    Huawei Technologies Proprietary

    iv

    Figure 4 shows the card layout of the extended frame.

    01 0200

    FAN

    xSL

    xSL

    xSL

    xSL

    xSL

    xSL

    xSL

    xSL

    03 04 05 06 07 08 09 10 11 12 13 14 15 16 17

    xSL

    xSL

    xSL

    xSL

    xSL

    xSL

    xSL

    xSL

    xSL

    xSL

    Cable routing area

    Interconnect cableconnecting area

    Subscriber line

    connecting area

     xSL: Service card (ASL/DSL/ADMB/VDLB/…)

    Figure 4 Extended frame (HABF) layout

  • 8/20/2019 Operation Manual-IPM Volume

    23/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Manual Guide

     

    Huawei Technologies Proprietary

    v

    UA5000 rear-access frames

    Figure 5 shows the card layout of the master frame.

    01 0200

    Fan

    P

    W

    X

    x

    S

    L

    x

    P

    M

    B

    P

    V

    x

    /

    R

    S

    U

    x

    P

    W

    X

     A

    I

    U

    B

    /

    x

    S

    L

    Cable routing area

    x

    P

    M

    B

     A

    I

    U

    B

    /

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    T

    S

    S

    B

    /

    x

    S

    L

    P

    V

    x

    /

    R

    S

    U

    x

    03 04 05 06 07 08 09 10 11 12 13 14 15 16 17

    Fan

    x

    S

    L

    Cable routing area

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    19 20 21 22 23 24 25 26 27 28 29 30 31 32 3318 34 35

     

    PWX: Secondary power supply card xPMB: Broadband control card (APMB/IPMB)PVx: Narrowband control card (PVU8/PVU4/PVM)RSUx: Remote subscriber unit (RSU8/RSU4) xSL: Service card (ASL/DSL/ADMB/VDLB/…) AIUB: ATM interface card TSSB: Test card

    Figure 5 Master frame (HABA) layout

  • 8/20/2019 Operation Manual-IPM Volume

    24/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Manual Guide

     

    Huawei Technologies Proprietary

    vi

    Figure 6 shows the card layout of the slave frame.

    01 0200

    Fan

    P

    W

    X

    x

    S

    L

     A

    P

    S

    B

    P

    W

    X

    x

    S

    L

    Cable routing area

     A

    P

    S

    B

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    03 04 05 06 07 08 09 10 11 12 13 14 15 16 17

    Fan

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    x

    S

    L

    19 20 21 22 23 24 25 26 27 28 29 30 31 32 3318 34 35

    x

    S

    L

    x

    S

    L

    Cable routing area 

    PWX: Secondary power supply card

     APSB: Broadband control card for the slave framexSL: Service card (ASL/DSL/ADMB/VDLB/…)

    Figure 6 Slave frame (HABB) layout

  • 8/20/2019 Operation Manual-IPM Volume

    25/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Table of Contents

     

    Huawei Technologies Proprietary

    i

    Table of Contents

    Part I Basic Configuration

    Chapter 1 Connecting to the UA5000.......................................................................................... 1-1 

    1.1 Connecting to the UA5000 Through the Local Serial Port ................................................ 1-1 

    1.1.1 Connecting the Serial Port Cable............................................................................ 1-1 

    1.1.2 Running the HyperTerminal .................................................................................... 1-2 

    1.1.3 Configuring a Serial Port......................................................................................... 1-2 

    1.1.4 Setting the Terminal Type ....................................................................................... 1-3 

    1.1.5 Setting the Line Delay and the Character Delay..................................................... 1-4 

    1.1.6 Logging on to the UA5000 ...................................................................................... 1-5 

    1.2 Connecting to the UA5000 Through the Remote Serial Port ............................................ 1-6 

    1.2.1 Setting the Called Modem....................................................................................... 1-7 

    1.2.2 Setting the Calling Modem...................................................................................... 1-8 

    1.2.3 Setting up the Configuration Environment .............................................................. 1-8 

    1.2.4 Running the HyperTerminal .................................................................................... 1-9 

    1.2.5 Logging on to the UA5000 .................................................................................... 1-10 

    1.3 Connecting to the UA5000 Through the Telnet Terminal................................................ 1-10 

    1.3.1 Setting up the Configuration Environment ............................................................ 1-10 

    1.3.2 Running Telnet Application ...................................................................................1-12 

    1.3.3 Logging on to the UA5000 .................................................................................... 1-12 

    Chapter 2 Getting Started with CLI.............................................................................................. 2-1 

    2.1 Operation Features of the CLI ...........................................................................................2-1 

    2.1.1 Intelligent Matching ................................................................................................. 2-1 

    2.1.2 Command Editing.................................................................................................... 2-1 

    2.1.3 Prompt Characters.................................................................................................. 2-2 

    2.1.4 Command Mode...................................................................................................... 2-3 

    2.2 Basic Settings of the CLI ................................................................................................... 2-5 

    2.2.1 Setting the Online Help Mode ................................................................................. 2-5 

    2.2.2 Setting the Interactive Input Mode .......................................................................... 2-6 

    2.2.3 Setting the Screen Display Mode............................................................................2-7 

    2.2.4 Setting the Command Echo Display ....................................................................... 2-7 

    2.2.5 Clearing Terminal Screen ....................................................................................... 2-8 

    2.2.6 Setting the System Time......................................................................................... 2-8 

    2.2.7 Setting the Terminal Type ....................................................................................... 2-8 

    2.2.8 Setting Terminal Timeout Exit................................................................................. 2-9 

    2.2.9 Locking a Terminal.................................................................................................. 2-9 

    2.2.10 Querying the History Command.......................................................................... 2-10 

    2.2.11 Network Testing Tools ........................................................................................ 2-10 

  • 8/20/2019 Operation Manual-IPM Volume

    26/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Table of Contents

     

    Huawei Technologies Proprietary

    ii

    Chapter 3 Managing a User Account........................................................................................... 3-1 

    3.1 Introduction to the User Account ....................................................................................... 3-1 

    3.2 Managing a User Account ................................................................................................. 3-2 

    3.2.1 Adding a System User ............................................................................................ 3-2 

    3.2.2 Querying User Information...................................................................................... 3-3 

    3.2.3 Modifying the Attributes of a User........................................................................... 3-4 

    3.2.4 Deleting a System User .......................................................................................... 3-5 

    Chapter 4 Controlling the System Output Information.............................................................. 4-1 

    4.1 Overview of Terminals and the System Output Information.............................................. 4-1 

    4.1.1 Terminals................................................................................................................. 4-1 

    4.1.2 Information Classification........................................................................................ 4-1 

    4.1.3 Infoswitch and Infolevel ........................................................................................... 4-2 

    4.1.4 Command List ......................................................................................................... 4-2 

    4.2 Controlling the Output to a CLI Terminal ........................................................................... 4-3 

    4.2.1 Querying the infoswitch of a CLI Terminal.............................................................. 4-3 

    4.2.2 Setting the infoswitch for a CLI Terminal ................................................................ 4-3 

    4.2.3 Querying the infolevel of a CLI terminal.................................................................. 4-4 

    4.2.4 Setting the infolevel  for a CLI Terminal................................................................... 4-4 

    4.3 Controlling the Output to an NMS Terminal....................................................................... 4-4 

    4.3.1 Querying the infoswitch of an NMS Terminal.......................................................... 4-4 

    4.3.2 Setting the infoswitch for an NMS Terminal............................................................ 4-4 

    4.3.3 Querying the infolevel of an NMS Terminal ............................................................ 4-5 

    4.3.4 Setting the infolevel for an NMS Terminal .............................................................. 4-5 

    4.4 Controlling the Output to a Log Host Terminal .................................................................. 4-5 

    4.4.1 Querying the infoswitch of a Log Host Terminal ..................................................... 4-6 

    4.4.2 Setting the infoswitch for a Log Host Terminal ....................................................... 4-6 

    4.4.3 Querying the infolevel  of a Log Host Terminal........................................................ 4-6 

    4.4.4 Setting the infolevel  for a Log Host Terminal.......................................................... 4-6 

    Chapter 5 NMS Configuration ...................................................................................................... 5-1 

    5.1 Configuring the Outband NMS........................................................................................... 5-1 

    5.1.1 Assigning an IP Address to the Outband NMS Interface........................................ 5-1 

    5.1.2 Adding a Route........................................................................................................ 5-2 

    5.1.3 Configuring SNMP .................................................................................................. 5-2 

    5.2 Configuring the Inband NMS ............................................................................................. 5-4 

    5.2.1 Configuring an Inband NMS Interface..................................................................... 5-5 

    5.2.2 Adding a Route........................................................................................................ 5-6 

    5.2.3 Configuring SNMP .................................................................................................. 5-6 

    5.3 Configuring the Integrated NMS ........................................................................................5-6 

    5.3.1 Networking of the Integrated NMS.......................................................................... 5-6 

    5.3.2 Configuration Procedure ......................................................................................... 5-7 

    5.4 Configuration Example ...................................................................................................... 5-7 

    5.4.1 Outband NMS.......................................................................................................... 5-7 

  • 8/20/2019 Operation Manual-IPM Volume

    27/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Table of Contents

     

    Huawei Technologies Proprietary

    iii

    5.4.2 Inband NMS ............................................................................................................ 5-9 

    5.4.3 Integrated NMS ..................................................................................................... 5-10 

    Chapter 6 Card Configuration...................................................................................................... 6-1 

    6.1 Overview of Cards ............................................................................................................. 6-1 

    6.1.1 Card Location.......................................................................................................... 6-1 

    6.1.2 Card Type................................................................................................................ 6-1 

    6.2 Command List.................................................................................................................... 6-2 

    6.3 Configuring a Card............................................................................................................. 6-2 

    6.3.1 Adding a Card ......................................................................................................... 6-2 

    6.3.2 Confirming a Card................................................................................................... 6-2 

    6.3.3 Querying the Card Information................................................................................ 6-3 

    6.3.4 Querying the Card Version...................................................................................... 6-3 

    6.3.5 Querying the Card CPU Occupancy....................................................................... 6-3 

    6.3.6 Disabling/Enabling a Card....................................................................................... 6-3 

    6.3.7 Resetting a Card ..................................................................................................... 6-4 

    6.3.8 Deleting a Card ....................................................................................................... 6-4 

    Chapter 7 Port Configuration....................................................................................................... 7-1 

    7.1 Overview of Port Types ..................................................................................................... 7-1 

    7.2 Configuring the Port Description........................................................................................ 7-1 

    7.2.1 Command List ......................................................................................................... 7-1 

    7.2.2 Describing a Port..................................................................................................... 7-1 

    7.2.3 Querying the Port Description ................................................................................. 7-2 

    7.3 Configuring an Ethernet Port on the IPM Card.................................................................. 7-2 

    7.3.1 Command List ......................................................................................................... 7-3 

    7.3.2 Entering the IPM Config Mode................................................................................ 7-4 

    7.3.3 Enabling/Disabling an Ethernet Port ....................................................................... 7-4 

    7.3.4 Configuring the Attributes of a Port......................................................................... 7-4 

    7.3.5 Configuring the Default VLAN of a Port .................................................................. 7-5 

    7.3.6 Configuring the Traffic Suppression........................................................................ 7-6 

    7.3.7 Aggregating Ethernet Ports..................................................................................... 7-9 

    7.3.8 Configuring Ethernet Port Mirroring ...................................................................... 7-10 

    7.3.9 Querying Port Information..................................................................................... 7-11 

    7.4 Configuring an ADSL Port ............................................................................................... 7-11 

    7.4.1 Querying the ADSL Port State .............................................................................. 7-12 

    7.4.2 Setting an ADSL Line Profile................................................................................. 7-13 

    7.4.3 Setting an ADSL Alarm profile .............................................................................. 7-22 

    7.4.4 Activating/Deactivating an ADSL Port................................................................... 7-28 

    7.4.5 Resetting an ADSL Chipset .................................................................................. 7-28 

    7.4.6 Setting the Loopback of an ADSL Port ................................................................. 7-29 

    7.4.7 Querying an ADSL Port......................................................................................... 7-29 

    7.5 Configuring an SHDSL Port............................................................................................. 7-30 

    7.5.1 Command List ....................................................................................................... 7-31 

  • 8/20/2019 Operation Manual-IPM Volume

    28/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Table of Contents

     

    Huawei Technologies Proprietary

    iv

    7.5.2 Querying the SHDSL Port State............................................................................ 7-32 

    7.5.3 Setting an SHDSL Line Profile.............................................................................. 7-32 

    7.5.4 Activating/Deactivating an SHDSL Port ................................................................ 7-37 

    7.5.5 Setting an SHDSL Alarm Profile ........................................................................... 7-38 

    7.5.6 Modifying the Alarm Profile Reference for an SHDSL Port .................................. 7-40 

    7.5.7 Setting the Power Backoff of an SHDSL Port ....................................................... 7-40 

    7.5.8 Resetting an SHDSL Chipset................................................................................ 7-41 

    7.5.9 Setting the Loopback Test of an SHDSL Port....................................................... 7-41 

    7.5.10 Binding an SHDSL Port....................................................................................... 7-41 

    7.5.11 Querying an SHDSL Port.................................................................................... 7-42 

    7.6 Configuring a VDSL Port .................................................................................................7-43 

    7.6.1 Querying the VDSL Port State .............................................................................. 7-44 

    7.6.2 Setting a VDSL Line Profile................................................................................... 7-44 

    7.6.3 Deleting a VDSL line profile .................................................................................. 7-48 

    7.6.4 Activating/Deactivating a VDSL Port..................................................................... 7-48 

    7.6.5 Setting a VDSL Alarm Profile ................................................................................ 7-49 

    7.6.6 Binding the VDSL Alarm Profile ............................................................................ 7-52 

    7.6.7 Setting the VDSL Port Mode................................................................................. 7-52 

    7.6.8 Setting the Default VLAN of a VDSL Port ............................................................. 7-53 

    7.6.9 Setting the VDSL Port Mirroring............................................................................ 7-53 

    7.6.10 Managing a VTU-R ............................................................................................. 7-54 

    7.6.11 Resetting a VDSL Port and Chipset.................................................................... 7-54 

    7.6.12 Querying a VDSL Port......................................................................................... 7-55 

    7.6.13 Setting the Loopback .......................................................................................... 7-56 

    Chapter 8 VLAN Configuration .................................................................................................... 8-1 

    8.1 Overview of VLAN Types................................................................................................... 8-1 

    8.2 Command List.................................................................................................................... 8-2 

    8.3 Configuring a VLAN........................................................................................................... 8-2 

    8.3.1 Adding a VLAN........................................................................................................ 8-2 

    8.3.2 Querying the Setting of a VLAN.............................................................................. 8-3 

    8.3.3 Configuring VLAN Attributes ................................................................................... 8-4 

    8.3.4 Deleting a VLAN...................................................................................................... 8-5 

    8.3.5 Adding a Port to a VLAN ......................................................................................... 8-5 

    8.3.6 Querying the VLAN Settings of a Port .................................................................... 8-5 

    8.3.7 Deleting a Port from a VLAN................................................................................... 8-6 

    8.3.8 Configuring a Layer 3 Virtual Interface for a VLAN................................................. 8-6 

    8.3.9 Configuring a Super VLAN...................................................................................... 8-6 

    Chapter 9 Virtual Service Port Configuration............................................................................. 9-1 

    9.1 Overview of the Virtual Service Port Configuration ........................................................... 9-1 

    9.2 Command List.................................................................................................................... 9-1 

    9.3 Configuring a Traffic Table Entry....................................................................................... 9-2 

    9.3.1 Querying a Traffic Table Entry ................................................................................ 9-2 

  • 8/20/2019 Operation Manual-IPM Volume

    29/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Table of Contents

     

    Huawei Technologies Proprietary

    v

    9.3.2 Adding/Deleting a Traffic Table Entry ..................................................................... 9-3 

    9.4 Configuring a Virtual Service Port...................................................................................... 9-4 

    9.4.1 Adding a Virtual Service Port .................................................................................. 9-4 

    9.4.2 Querying a Virtual Service Port............................................................................... 9-5 

    9.4.3 Deleting a Virtual Service Port ................................................................................ 9-5 

    Chapter 10 MAC Address Configuration................................................................................... 10-1 

    10.1 MAC Address Table Configuration................................................................................ 10-1 

    10.1.1 Introduction to the MAC Address Table .............................................................. 10-1 

    10.1.2 Command List ..................................................................................................... 10-1 

    10.1.3 Configuring a MAC Address Table...................................................................... 10-2 

    10.2 MAC Address Pool Configuration.................................................................................. 10-4 

    10.2.1 Introduction to MAC Address Pools.................................................................... 10-4 

    10.2.2 Command List ..................................................................................................... 10-4 

    10.2.3 Configuring a MAC Address Pool ....................................................................... 10-5 

    Chapter 11 ACL Configuration................................................................................................... 11-1 

    11.1 Overview of the ACL...................................................................................................... 11-1 

    11.1.1 ACL Function....................................................................................................... 11-1 

    11.1.2 ACL Types........................................................................................................... 11-1 

    11.2 Configuring an ACL ....................................................................................................... 11-2 

    11.2.1 Overview ............................................................................................................. 11-2 

    11.2.2 Command List ..................................................................................................... 11-2 

    11.2.3 Creating an ACL.................................................................................................. 11-3 

    11.2.4 Creating the Description for an ACL ................................................................... 11-4 

    11.2.5 Setting the Step of an ACL.................................................................................. 11-4 

    11.2.6 Setting a Time Segment...................................................................................... 11-4 

    11.2.7 Creating a Rule for a Basic ACL ......................................................................... 11-5 

    11.2.8 Creating a Rule for an Advanced ACL................................................................ 11-6 

    11.2.9 Creating a Rule for a Layer 2 ACL...................................................................... 11-8 

    11.2.10 Creating a Rule for a User-Defined ACL........................................................... 11-9 

    11.3 Activating/Deactivating the ACL of a Port.................................................................... 11-11 

    11.4 Querying the ACL Information .....................................................................................11-12 

    11.5 Providing the QoS Through an ACL............................................................................11-13 

    11.5.1 Command List ................................................................................................... 11-13 

    11.5.2 Enabling/Disabling Traffic Limit on Packets...................................................... 11-13 

    11.5.3 Adding/Removing Priority Tags to Packets....................................................... 11-14 

    11.5.4 Redirecting Packets ..........................................................................................11-14 

    11.5.5 Measuring Packet Traffic ..................................................................................11-15 

    11.5.6 Clearing Traffic Statistics of Packets ................................................................ 11-15 

    11.6 Precautions for Configuring an ACL............................................................................11-15 

    11.6.1 Resources Conflicts ..........................................................................................11-15 

    11.6.2 Priority and Configuration Order ....................................................................... 11-16 

    11.6.3 Solution ............................................................................................................. 11-17 

  • 8/20/2019 Operation Manual-IPM Volume

    30/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Table of Contents

     

    Huawei Technologies Proprietary

    vi

    11.7 Configuration Example ................................................................................................ 11-17 

    Chapter 12 RSTP Configuration................................................................................................. 12-1 

    12.1 Overview of RSTP ......................................................................................................... 12-1 

    12.2 Command List................................................................................................................ 12-1 

    12.3 Configuring RSTP.......................................................................................................... 12-3 

    12.3.1 Viewing the RSTP Configurations....................................................................... 12-3 

    12.3.2 Enabling/Disabling the RSTP.............................................................................. 12-4 

    12.3.3 Setting/Converting the Operating Mode of RSTP............................................... 12-4 

    12.3.4 Setting the Network Diameter ............................................................................. 12-5 

    12.3.5 Setting the Parameters of a Bridge..................................................................... 12-5 

    12.3.6 Setting the Parameters of a Port......................................................................... 12-7 

    Chapter 13 Routing Protocol Configuration............................................................................. 13-1 

    13.1 Overview of Routing Protocol Configuration.................................................................. 13-1 

    13.2 Static Route Configuration............................................................................................. 13-2 

    13.2.1 About Static Route .............................................................................................. 13-2 

    13.2.2 Command List ..................................................................................................... 13-2 

    13.2.3 Configuring a Static Route.................................................................................. 13-2 

    13.2.4 Configuration Example........................................................................................ 13-4 

    13.3 RIP Configuration........................................................................................................... 13-5 

    13.3.1 About RIP............................................................................................................ 13-5 

    13.3.2 Command List ..................................................................................................... 13-5 

    13.3.3 Configuring RIP................................................................................................... 13-7 

    13.3.4 Configuration Example......................................................................................13-12 

    13.4 OSPF Configuration..................................................................................................... 13-14 

    13.4.1 About OSPF ...................................................................................................... 13-14 

    13.4.2 Command List ................................................................................................... 13-14 

    13.4.3 Configuring OSPF............................................................................................. 13-16 

    13.4.4 Configuration Example......................................................................................13-25 

    Chapter 14 PITP Configuration .................................................................................................. 14-1 

    14.1 Overview of PITP........................................................................................................... 14-1 

    14.2 Command List................................................................................................................ 14-1 

    14.3 Configuring PITP............................................................................................................ 14-2 

    14.3.1 Setting an Ethernet Encapsulation Type in V Mode ........................................... 14-2 

    14.3.2 Querying the Ethernet Encapsulation Type in V mode....................................... 14-2 

    14.3.3 Enabling/Disabling the PITP function.................................................................. 14-3 

    14.3.4 Querying the PITP Configurations ...................................................................... 14-3 

    Chapter 15 TCP Connection Attribute Configuration.............................................................. 15-1 

    15.1 Overview of the TCP Connection Configuration............................................................ 15-1 

    15.2 Command List................................................................................................................ 15-1 

    15.3 Configuring TCP Connection Attributes......................................................................... 15-2 

    15.3.1 Configuring a Time Limit for Creating a TCP Connection................................... 15-2 

  • 8/20/2019 Operation Manual-IPM Volume

    31/415

    Operation Manual – IPM VolumeUA5000 Universal Access Unit Table of Contents

     

    Huawei Technologies Proprietary

    vii

    15.3.2 Configuring a Time Limit for Closing the Rx Channel of a TCP Connection ...... 15-2 

    15.3.3 Configuring the size of the TCP Rx/Tx Buffer ..................................................... 15-3 

    15.3.4 Querying the Information on TCP Connections .................................................. 15-3 

    Chapter 16 DHCP Relay Configuration ..................................................................................... 16-1 

    16.1 Overview........................................................................................................................ 16-1 

    16.2 Enabling the Switching Between Layer 2 and Layer 3 DHCP Relay............................. 16-2 

    16.2.1 Switching to a DHCP Relay Mode ...................................................................... 16-2 

    16.2.2 Querying the Settings of the DHCP Relay Mode................................................ 16-2 

    16.3 Configuring the DHCP Relay......................................................................................... 16-3 

    16.3.1 Overview ............................................................................................................. 16-3 

    16.3.2 Creating a DHCP Server..................................................................................... 16-4 

    16.3.3 Setting the DHCP Server Selection Mode .......................................................... 16-5 

    16.3.4 Configuring the Standard DHCP Relay Mode..................................................... 16-5 

    16.3.5 Configuring the DHCP Option60 Mode............................................................... 16-6 

    16.3.6 Configuring the MAC Address Segment Mode................................................... 16-7 

    16.4 Configuring the DHCP Option82.................................................................................... 16-9 

    16.4.1 Overview ............................................................................................................. 16-9 

    16.4.2 Enabling/Disabling the DHCP Option82 ........................................................... 16-10 

    16.4.3 Setting the Max. Length of DHCP Packets ....................................................... 16-10 

    16.4.4 Querying the Settings of the DHCP Option82................................................... 16-10 

    16.5 Querying the Global Statistics of the DHCP Relay...................................................... 16-11 

    16.6 Configuration Examples............................................................................................... 16-12 

    16.6.1 Configuring the Standard Mode ........................................................................ 16-12 

    16.6.2 Configuring the Option60 Mode........................................................................16-13 

    Chapter 17 NTP Configuration................................................................................................... 17-1 

    17.1 Overview of the NTP Protocol .............................................


Recommended