Professional Documents
Culture Documents
Router
V800R011C00
Issue 01
Date 2019-04-15
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Contents
6 FR Configuration......................................................................................................................... 77
6.1 Overview of FR............................................................................................................................................................ 77
6.1.1 Introduction............................................................................................................................................................... 77
6.2 Configuring Basic FR Functions.................................................................................................................................. 80
6.2.1 Configuring Basic FR Functions on a DCE.............................................................................................................. 80
6.2.2 Configuring Basic FR Functions on a DTE...............................................................................................................82
6.2.3 Verifying the Basic FR Function Configuration........................................................................................................83
6.3 Configuration Examples for FR................................................................................................................................... 83
6.3.1 Example for Connecting LANs Through VCs.......................................................................................................... 83
8 PPP Configuration.....................................................................................................................107
8.1 Overview of PPP........................................................................................................................................................ 108
8.2 Configuring an Interface to Support PPP................................................................................................................... 108
8.2.1 Configuring PPP as the Link Layer Protocol of an Interface.................................................................................. 109
8.2.2 (Optional) Configuring PPP Negotiation Parameters..............................................................................................110
8.2.3 (Optional) Configuring PPP Link Status Monitoring.............................................................................................. 113
8.2.4 (Optional) Prohibiting a Local Device from Adding the Peer Host Route to the Local Routing Table of Direct
Routes............................................................................................................................................................................... 115
13 LMSP Configuration...............................................................................................................228
13.1 Introduction to LMSP............................................................................................................................................... 228
13.2 Licensing Requirements and Limitations for LMSP--M2H....................................................................................229
13.3 Licensing Requirements and Limitations for LMSP--M2K....................................................................................230
13.4 Licensing Requirements and Limitations for LMSP--M2K-B................................................................................230
13.5 Configuring Single-Chassis LMSP.......................................................................................................................... 231
13.5.1 Specifying a Working Interface and a Protection Interface for an LMSP Group..................................................232
13.5.2 Configuring a Working Mode for an LMSP Group...............................................................................................233
13.5.3 Adding Interfaces of an LMSP Group to a Trunk Interface.................................................................................. 235
13.5.4 Checking the Configurations................................................................................................................................. 236
13.6 Configuring MC-LMSP............................................................................................................................................236
13.6.1 Specifying a Working Interface and a Protection Interface for an LMSP Group..................................................237
13.6.2 Configuring a Working Mode for an LMSP Group...............................................................................................239
13.6.3 (Optional) Binding an LMSP Group to a BFD Session........................................................................................ 240
13.6.4 (Optional) Configuring MC-LMSP Negotiation and Authentication Parameters.................................................241
13.6.5 Adding Interfaces of an LMSP Group to a Trunk Interface.................................................................................. 243
13.6.6 Checking the Configurations................................................................................................................................. 244
13.7 Maintaining LMSP................................................................................................................................................... 244
13.7.1 Configuring a Command-Triggered Switching Mode for an LMSP Group..........................................................244
13.8 Configuration Examples........................................................................................................................................... 245
13.8.1 Example for Configuring TDM on the CPOS-TRUNK Configured with LMSP................................................. 245
13.8.2 Example for Configuring LMSP on a CPOS-Trunk..............................................................................................253
13.8.3 Example for Configuring Dual-System LMSP in the Scenario of Forwarding IP Packets Using PPP................ 257
Purpose
This document provides the basic concepts, configuration procedures, and configuration
examples in different application scenarios of the Wan Access feature supported by the
NE40E.
Related Version
The following table lists the product version related to this document.
U2000 V200R018C60
Intended Audience
This document is intended for:
Security Declaration
l Encryption algorithm declaration
The encryption algorithms DES/3DES/RSA (RSA-1024 or lower)/MD5 (in digital
signature scenarios and password encryption)/SHA1 (in digital signature scenarios) have
a low security, which may bring security risks. If protocols allowed, using more secure
encryption algorithms, such as AES/RSA (RSA-2048 or higher)/SHA2/HMAC-SHA2 is
recommended.
l Password configuration declaration
– Do not set both the start and end characters of a password to "%^%#". This causes
the password to be displayed directly in the configuration file.
– To further improve device security, periodically change the password.
l Personal data declaration
Your purchased products, services, or features may use users' some personal data during
service operation or fault locating. You must define user privacy policies in compliance
with local laws and take proper measures to fully protect personal data.
l Feature declaration
– The NetStream feature may be used to analyze the communication information of
terminal customers for network traffic statistics and management purposes. Before
enabling the NetStream feature, ensure that it is performed within the boundaries
permitted by applicable laws and regulations. Effective measures must be taken to
ensure that information is securely protected.
– The mirroring feature may be used to analyze the communication information of
terminal customers for a maintenance purpose. Before enabling the mirroring
function, ensure that it is performed within the boundaries permitted by applicable
laws and regulations. Effective measures must be taken to ensure that information is
securely protected.
– The packet header obtaining feature may be used to collect or store some
communication information about specific customers for transmission fault and
error detection purposes. Huawei cannot offer services to collect or store this
information unilaterally. Before enabling the function, ensure that it is performed
within the boundaries permitted by applicable laws and regulations. Effective
measures must be taken to ensure that information is securely protected.
l Reliability design declaration
Network planning and site design must comply with reliability design principles and
provide device- and solution-level protection. Device-level protection includes planning
principles of dual-network and inter-board dual-link to avoid single point or single link
of failure. Solution-level protection refers to a fast convergence mechanism, such as FRR
and VRRP.
Special Declaration
l This document serves only as a guide. The content is written based on device
information gathered under lab conditions. The content provided by this document is
intended to be taken as general guidance, and does not cover all scenarios. The content
provided by this document may be different from the information on user device
interfaces due to factors such as version upgrades and differences in device models,
board restrictions, and configuration files. The actual user device information takes
precedence over the content provided by this document. The preceding differences are
beyond the scope of this document.
l The maximum values provided in this document are obtained in specific lab
environments (for example, only a certain type of board or protocol is configured on a
tested device). The actually obtained maximum values may be different from the
maximum values provided in this document due to factors such as differences in
hardware configurations and carried services.
l Interface numbers used in this document are examples. Use the existing interface
numbers on devices for configuration.
l The pictures of hardware in this document are for reference only.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Convention Description
Change History
Changes between document issues are cumulative. The latest document issue contains all the
changes made in earlier issues.
l Changes in Issue 01 (2019-03-30)
This issue is the first official release. The software version of this issue is
V800R011C00SPC200.
Compared with asynchronous serial interfaces, synchronous serial interfaces are more
commonly used. Unless otherwise specified in this document, serial interfaces refer to
synchronous serial interfaces.
Serial interfaces support multiple types of cables and Point-to-Point Protocol (PPP) and time
division multiplexing (TDM). Serial interfaces can work on either data terminal equipment
(DTE) or data circuit-terminating equipment (DCE).
Usage Scenario
If you want a serial interface to carry upper-layer services, configure the link-layer attributes
of the serial interface and ensure that the status of the link-layer protocol for the serial
interface is Up.
Pre-configuration Tasks
Before configuring link-layer attributes, create a serial interface.
Procedure
Step 1 Run system-view
l To enter the view of a serial interface on a CE1 interface, you must specify interface-
number in the format of "chassis number/slot number/card number/port number:serial
interface number". For example, the name of serial interface 1 on CE1 0/2/0 is serial
0/2/0:1.
l To enter the view of a serial interface on a CPOS interface, you must specify interface-
number in the format of "chassis number/slot number/card number/port number/E1
channel number:serial interface number". For example, the name of serial interface 3 of
E1 channel 2 on CPOS0/2/0 is serial 0/2/0/2:3.
----End
Context
Ensure that the MTU for an interface is the same as that for its directly connected interface.
Otherwise, services may be interrupted.
The length of a quality of service (QoS) queue is limited. If the MTU is too small, a packet
may be divided into many fragments. If the number of fragments exceeds the length of a QoS
queue, the QoS queue drops fragments. To avoid this situation, increase the MTU. By default,
a serial interface uses the first in first out (FIFO) queue scheduling mechanism.
Procedure
Step 1 Run system-view
The link layer protocol is configured as PPP for the serial interface.
----End
Context
On a datacom network, the data link layer transmits distributed data frames to a specified
interface at the physical layer. Upon receipt, the interface decapsulates these frames into data
bits, encodes the bits based on the coding mode, and transmits them to a remote interface
through high and low levels on a link. Upon receipt of the levels, the remote interface decodes
them and restores them to data bits. In this way, the local device can communicate with the
remote device.
If the payload of a data frame contains consecutive 0s, the link will stay at the zero level for a
long time. After failing to detect signals for a prolonged period of time, the remoter interface
mistakenly thinks that all bits have been received or the link is faulty, leading to a
communication failure.
To resolve this problem, enable the payload scramble function on a synchronous serial
interface or trunk-serial interface. Using this function, the interface adds interference to the
payload to prevent consecutive 0s or 1s in the payload, avoiding communication failures.
Configurations of the payload scramble function on the local and remote interfaces must be
consistent.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The view of the specified serial interface or trunk-serial interface is displayed.
Step 3 Run link-protocol atm
ATM is configured as the link layer protocol.
Step 4 Run scramble
The payload scramble function is enabled.
Step 5 Run commit
----End
Prerequisites
The serial interface has been configured.
Procedure
l Run the display interface serial [ interface-number ] command to check the status of
and statistics about the specified serial interface.
----End
3.1 Overview
This section describes POS interfaces in terms of basic SONET and SDH concepts,
channelization and non-channelization, and SDH frame structure.
l For an optical signal, the transmission rate is called Level 1 Optical Carrier (OC-1).
With synchronous signals, SONET can easily multiplex multiple signals.
Based on SONET, synchronous digital hierarchy (SDH) is an international standard defined
by the ITU-T and mainly used in Europe. The corresponding standard of SDH is the proposals
from G.707 to G.709 passed in 1988 and the proposals added in 1992.
SDH is similar to SONET to a great extent. The basic transmission rate of SDH is 155.52
Mbit/s, which is called Level 1 Synchronous Transfer Module (STM-1). This rate equals the
OC-3 rate in SONET.
With synchronous multiplexing and flexible mapping, SDH can multiplex or demultiplex low-
speed tributary signals from SDH signals without using multiplexing or demultiplexing
devices. SDH reduces signal consumption and equipment investment.
Table 3-1 lists the common transmission rates of SONET and SDH. The transmission rates
for different types of signals are increasing by four times. For example, OC-3 is a four-times
multiple of OC-1, OC-9 is a four-times multiple of OC-3, and so on. For convenience, the
approximations in the parentheses are often used to express transmission rates.
Table 3-1 Relationship between common transmission rates of SONET and SDH
SONET SDH Transmission Rate
(Mbit/s)
Electrical Optical Signal Optical Signal
Signal
Introduction to POS
Packet over SDH/SONET (POS), a technique for WANs and MANs, uses high-speed
transport channels provided by SONET/SDH to directly transmit IP data packets. POS
encapsulates IP packets into PPP or HDLC packets, maps the encapsulated packets to the
payload of SONET/SDH signals by using the service adapter of the SONET/SDH channel,
puts the payload into a SONET/SDH frame after adding the channel overhead at the
transmission layer and the section overhead at the section layer, and finally sends the
SONET/SDH frame to the optical network so that frames can be transmitted over optical
9*270*N(bytes)
1 Regenerator
2 Section
3 Overhead
4 AUPTR
5 Payload
6 Multiplex
7 Section
8 Overhead
9
9*N 261*N
STM-N is a frame with the dimension of 9 rows x 270 x N columns. Here, N is the same as
that in STM-N, indicating how many STM-1 signals are multiplexed to this STM-N signal.
An STM-N frame consists of the following parts:
l Section overhead (SOH): includes regenerator section overhead (RSOH) and multiplex
section overhead (MSOH).
l Administration unit pointer (AU-PTR): is the pointer that specifies the first byte of the
payload. The receiver can correctly extract the payload according to the location of the
pointer.
l Payload
Overhead Bytes
SDH provides monitoring and management at layers. Monitoring is classified as section
monitoring or path monitoring. Section monitoring is classified as regenerator section
monitoring or multiplex section monitoring. Path monitoring is classified as higher-order path
monitoring or lower-order path monitoring. Different overhead bytes help to implement the
monitoring functions.
NOTE
This section describes only the SDH overhead bytes used in configuration.
l SOH
SOH consists of RSOH and MSOH.
The payload of an STM-N frame contains the path overhead (POH) that monitors low-
speed tributary signals.
J0, the regenerator section trace byte is contained in RSOH. This byte is used to transmit
the Section Access Point Identifiers (SAPIs) repeatedly to check the connection between
the receiver and the transmitter. The byte can be any character in a carrier's network,
whereas the J0 bytes of the receiver and transmitter must match each other at the border
of two carriers' networks. With the J0 byte, a carrier can locate and rectify faults in
advance to speed up network recovery.
l Path overhead
SOH monitors section layers, whereas POH monitors path layers. POH is classified as
lower-order path overhead or higher-order path overhead.
The higher-order path overhead monitors the paths at VC-4 and VC-3 levels.
J1, the higher-order VC-N path trace byte, is contained in the higher-order path
overhead. Similar to J0, J1 is used to transmit SAPIs repeatedly to check the connection
between the receiver and the transmitter. The J1 bytes of the receiver and transmitter
must match each other.
C2, the path signal label byte, is contained in higher-order path overhead. C2 is used to
specify the multiplexing structure and the attributes of the information payload in a VC
frame, including whether the path is loaded with services, service types, and the mapping
mode. The C2 bytes of the receiver and transmitter must match each other.
Terms
NOTE
Usage Scenario
Before using a POS interface to carry packets, configure parameters for the POS interface.
Pre-configuration Tasks
l Before configuring a POS interface, power on the Router and ensure that it is working
properly.
Configuration Procedure
By default, parameters in POS interface configuration commands use default values. Perform
one or more of the following configurations as required.
Context
PPP is a link layer protocol used to encapsulate and transmit network layer packets over P2P
links. If a bit-oriented link layer protocol is needed for synchronous transmission and no
complex services are configured, HDLC can be applied. HDLC does not require that data to
be transmitted must be character sets. Instead, it can transparently transmit bit flows of all
types, especially the control and response messages. Unlike PPP, HDLC uses authentication
protocols to ensure the correctness and connectivity of links to be established. A cyclic
redundancy check (CRC) is performed for HDLC frames and information frames are
sequentially numbered to ensure reliable transmission. An IP-Trunk can consist of only POS
links, and the link layer protocol running on IP-Trunk member interfaces must be HDLC.
Procedure
Step 1 Run system-view
----End
Context
A POS interface supports the following clock modes:
The principles for configuring clock modes for POS interfaces in actual networking are as
follows:
l Clocks modes on the POS interfaces of two directly connected Routers must be both set
to master, or on one end set to master and the other end set to slave.
l If two Routers are connected over a WDM transmission device, clocks modes on the
POS interfaces of the two interconnected devices must be both set to master.
l If two Routers are connected over an active SDH or SONET device, clock modes on the
POS interfaces of the two interconnected devices can be set to slave to trace clock
signals of the active SDH or SONET device.
l If the connection mode of two Routers is unknown, the clocks of the POS interfaces on
the two Routers must work in master mode.
Procedure
Step 1 Run system-view
----End
Context
C2, the path signal label byte, is contained in the higher-order path overhead. C2 is used to
specify the multiplexing structure and the attributes of the information payload in a VC frame.
J0, the regenerator section trace byte, is contained in the section overhead. J0 is used to check
the continuity between two ports at the section layer.
J1, the higher-order VC-N path trace byte, is used to check the continuity between two ports
at the path layer.
NOTE
C2, J0, and J1 of the receiver must be the same as those of the transmitter; otherwise, the two ends
cannot communicate.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface pos interface-number
The POS interface view is displayed.
Step 3 Configure the overhead byte for the POS interface.
Run the following command as required.
----End
Context
A POS interface supports the following types of frame formats:
l SDH
l SONET
Procedure
Step 1 Run system-view
SDH and SONET are two optical transmission standards defined by different organizations.
These two standards do not have obvious differences in contents and specifications. The
selection of SDH or SONET is determined by carriers in different geographical locations and
by different device manufacturers. The frame format configured on the POS interface must be
the same as that on transmission devices.
----End
Context
The scrambling function must be enabled on both of the directly connected interfaces.
Procedure
Step 1 Run system-view
The scrambling function of the payload is enabled for the POS interface.
----End
3.2.6 Configuring the Length of the CRC Code for a POS Interface
POS interfaces support a 16- or 32-bit CRC code.
Context
CRC uses an algorithm to verify data consistency on the POS interfaces connecting two
devices. The lengths of the CRC codes configured for POS interfaces connecting two devices
must be identical.
Procedure
Step 1 Run system-view
The length of the CRC code is configured for the POS interface.
The lengths of the CRC codes configured for POS interfaces connecting two devices must be
identical. If the lengths of the CRC codes configured for POS interfaces connecting two
devices are different, a large number of CRC error packets will be generated.
CRC uses a high-precision algorithm to verify data consistency on the POS interfaces
connecting two devices. CRC using a 32-bit CRC code is more precise than that using a 16-
bit CRC code but consumes more resources.
----End
Context
A Router reassembles or fragments the received or sent packets based on the MTU.
The IP layer limits the length of each frame in a packet to be sent each time. Any time the IP
layer receives an IP packet to be sent, it determines to which interface the packet should be
delivered and obtains the MTU of the target interface. Then, the IP layer compares the MTU
with the packet length. If the packet length is longer than the MTU, the IP layer fragments the
packet. Each fragment is not longer than the MTU.
NOTE
l If the MTU is set too small and the size of packets is quite large, packets will be divided into too
many fragments and be discarded by QoS queues.
l If the MTU is set too large, packet transmission will be slowed down.
After changing the MTU of an interface by running the mtu mtu command, restart the
interface to validate the configuration by running the shutdown and then undo shutdown
commands.
Procedure
l Configure the IPv4 MTU.
a. Run system-view
The IPv4 MTU is configured for the POS interface. The MTU is expressed in bytes.
The default MTU is 4470.
d. Run commit
After configuring the IPv6 MTU, run the ppp mru-negotiate { ipv4 | ipv6 }
command to start negotiation of the IPv6 MTU.
d. Run commit
----End
Context
If local loopback has been enabled on an interface, the physical status of the interface changes
to Up, whereas the link layer protocol of the interface remains Down.
If remote loopback has been enabled on an interface and PPP is used as the link layer
protocol, the physical status of the interface changes to Up, whereas the link layer protocol of
the interface remains Down. If HDLC is used as the link layer protocol, both the physical
status and the link layer protocol status of the interface are Up.
Local loopback and remote loopback cannot be both enabled on a POS interface.
NOTE
The loopback configurations on a POS interface are different for different LPUs. In the actual
configuration, note the following points:
l To enable local loopback on a POS interface, ensure that the clock of the POS interface works in
master mode.
l To enable remote loopback on a POS interface, ensure that the clock of the POS interface works in
slave mode.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface pos interface-number
The POS interface view is displayed.
Step 3 Run loopback { local | remote }
The loopback function is configured for the POS interface.
Step 4 Run commit
The configuration is committed.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface pos interface-number
The POS interface view is displayed.
Step 3 Run speed { 155 | 622 }
----End
Prerequisites
A POS interface has been configured.
Procedure
l Run the display interface pos [ interface-number ] [ | { begin | exclude | include }
regular-expression ] command to check the configuration and status of the POS
interface.
l Run the display interface brief [ | { begin | include | exclude } regular-expression ]
command to check brief information about the POS interface.
----End
Context
To configure APS on POS interfaces, create a POS-Trunk interface and add the POS
interfaces to the POS-Trunk interface.
Pre-configuration Tasks
Before configuring a POS-Trunk interface, power on the devices and check that the self-check
succeeds.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface pos-trunk trunk-id
A POS-Trunk interface is created.
----End
Procedure
Step 1 Run system-view
NOTE
The link layer protocol of POS interfaces added to a POS-Trunk interface must be configured as PPP.
----End
Prerequisites
Basic configurations have been completed on a POS-Trunk interface.
Procedure
l Run the display pos-trunk trunk-id command to check the configurations of a POS-
Trunk interface.
----End
Networking Requirements
As shown in Figure 3-2, POS interfaces on Device A and Device B are directly connected
with a pair of single-mode fibers for receiving and sending packets; PPP is the link layer
protocol. It is required that Device A and Device B can communicate.
Figure 3-2 Networking diagram of connecting devices directly through POS interfaces
DeviceA DeviceB
POS1/0/0 POS1/0/0
10.1.1.1/30 10.1.1.2/30
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure Device A.
# Configure POS 1/0/0, set the clock mode to slave, and set default values for other physical
parameters.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceB
[*HUAWEI] commit
[DeviceB] interface pos 1/0/0
[~DeviceB-Pos1/0/0] clock slave
[*DeviceB-Pos1/0/0] ip address 10.1.1.2 30
[*DeviceB-Pos1/0/0] quit
[*DeviceB] commit
Run the display interface pos command to check the connectivity of the POS interface on
Device A.
[~DeviceA] display interface pos 1/0/0
Pos1/0/0 current state : UP
Line protocol current state : UP
Last line protocol up time : 2010-07-13 16:47:08
Description: HUAWEI, Quidway Series, Pos1/0/0 Interface (ifindex: 22, vr: 0)
Route Port,The Maximum Transmit Unit is 1600, Hold timer is 10(sec)
Internet Address is 10.1.1.1/30
Link layer protocol is PPP
LCP opened, IPCP opened, IP6CP opened, OSICP opened, MPLSCP opened
PPP negotiated peer ip address is 10.1.1.10
Current system time: 2010-07-13 17:29:44
The Vendor PN is FTLF1322P1BTR-HW
The Vendor Name is FINISAR CORP.
Port BW: 622M, Transceiver max BW: 622M, Transceiver Mode: SingleMode
WaveLength: 1310nm, Transmission Distance: 15km
Rx Power: 7.66dBm, Tx Power: -11.78dBm
Physical layer is Packet Over SDH
Scramble enabled, clock master, CRC-32, loopback: none
Flag J0 "NetEngine "
Flag J1 "NetEngine "
Flag C2 22(0x16)
SDH alarm:
section layer: none
line layer: none
path layer: none
SDH error:
section layer: B1 284236
line layer: B2 1871 REI 4445
path layer: B3 719417 REI 12417181
Statistics last cleared:never
Last 300 seconds input rate 304 bits/sec, 0 packets/sec
Last 300 seconds output rate 320 bits/sec, 0 packets/sec
Input: 5754803980 packets, 540947996544 bytes
Input error: 0 shortpackets, 0 longpackets, 0 CRC, 0 lostpackets
Output: 5676758063 packets, 533611565328 bytes
Output error: 0 lostpackets
Output error: 0 overrunpackets, 0 underrunpackets
----End
Configuration Files
l Configuration file of Device A
#
sysname DeviceA
#
interface Pos1/0/0
undo shutdown
link-protocol ppp
ip address 10.1.1.1 255.255.255.252
#
return
Networking Requirements
On the network shown in Figure 3-3, Routers are connected to each other through POS sub-
interfaces. The type of the interface on Device A is DCE, and the type of the interface on
Device B is DTE.
DeviceA DeviceB
10.1.1.1/24 10.1.1.2/24
DLCI=100
Configuration Roadmap
The configuration roadmap is as follows:
1. Set the link layer protocol to FR.
2. Configure interface type.
3. Configure a DLCI for each VC.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of interfaces
l DLCI on each interface
Procedure
Step 1 Configure RouterDevice A.
# Set the link layer protocol to FR and interface type to DCE.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] interface Pos0/1/0
[~DeviceA-Pos0/1/0] link-protocol fr
[*DeviceA-Pos0/1/0] fr interface-type dce
[*DeviceA-Pos0/1/0] quit
Run the display fr pvc-info command on Device B to check VC configurations and statistics.
<DeviceB> display fr pvc-info interface pos0/1/0.1
PVC statistics for interface Pos0/1/0.1 (DTE, PP)
DLCI = 111, USAGE = LOCAL, Pos0/1/0.1
create time = 2013/11/05 11:19:17, status = ACTIVE
in BECN = 0, in FECN = 0
in packets = 0, in bytes = 0
out packets = 0, out bytes = 0
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
interface Pos0/1/0
link-protocol fr
undo shutdown
fr interface-type dce
#
interface Pos0/1/0.1 p2p
ip address 10.1.1.1 255.255.255.0
fr dlci 100
#
return
The E-carrier system uses European 30 -channel pulse code modulation (PCM), which is also
called E1.
Working Mode
E-carrier interfaces can work in any of the following modes:
l Channelized mode: It is a framed mode in which all timeslots can be allocated to
multiple channels.
l Unchannelized mode: It is a framed mode in which all timeslots can be bundled only
once and allocated to only one channel.
l Clear channel mode: It is also called an unframed mode. There is no frame flag in the
data stream, and all bits in the data stream are data. The data in the data stream belongs
to only one channel.
Introduction to E1 Interfaces
A physical interface that is formed by E1 and can work only in clear channel is an E1
interface. A physical interface that is formed by E1 and can work in unchannelized or
channelized mode is a CE1 interface.
l In clear channel mode, or unframed mode:
An E1 interface forms a synchronous serial interface without timeslot division and with a
transmission rate of 2.048 Mbit/s. The E1 interface has the same logical features as a
synchronous serial interface. It supports link-layer protocols, such as PPP, TDM ,
HDLCand ATM, MP bundling,and network protocols, such as IP.
l In unchannelized mode, or framed mode:
A CE1 interface is physically divided into 31 timeslots numbered from 1 to 31. The
timeslots can be bundled once into one channel. For example, if timeslots 1 and 2 are
bundled into a serial interface of 128 kbit/s, the remaining timeslots cannot be bundled.
The serial interface has the same logical features as a synchronous serial interface. It
supports link-layer protocols, such as PPP, TDM , HDLCand ATM, MP bundling,and
network protocols, such as IP.
l In channelized mode, or framed mode:
A CE1 interface is physically divided into 31 timeslots numbered from 1 to 31. The
timeslots can be randomly bundled to form logical channels, each with a transmission
rate of N x 64 kbit/s.
All the timeslots can be grouped into multiple channel-sets. Each bundled channel-set of
timeslots is used as an interface with the same logical features as a synchronous serial
interface. It supports link-layer protocols, such as PPP, TDM , HDLCand ATM, MP
bundling,and network protocols, such as IP.
l In clear channel mode, also called the unframed mode, a CE3 interface functions like an
interface with the transmission rate of 34.368 Mbit/s and without timeslot division. The
CE3 interface has the same logical features as a synchronous serial interface and
supports link-layer protocols (such as PPP and HDLC).
l In unchannelized mode, also called the framed mode, all timeslots of a CE3 interface are
bundled to form a serial interface with the transmission rate of 32.768 Mbit/s. The serial
interface supports link-layer protocols (such as PPP and HDLC).
Precautions
Before you use a E1 interface to carry upper-layer services, configure the E1 interface. Note
that:
l If a physical interface has no cable connected, run the shutdown command to disable
this interface to prevent interference with the interface.
l After you configure services on an interface, run the shutdown and then undo
shutdown commands in the current interface view to ensure that the configured services
are loaded onto the interface.
Running the shutdown command in a E1 interface view will disable the E1 interface and may
affect the normal operation of its channel-sets.
Pre-configuration Tasks
Before configuring a E1 interface, power on the device and ensure that it is working properly.
Context
An E1 interface can form serial interfaces with different transmission rates:
Procedure
l Create a serial interface that works in clear channel mode.
a. Run system-view
The system view is displayed.
b. Run controller e1 controller-number
The E1 interface view is displayed.
c. Run using e1
The E1 interface is configured to work in clear channel mode, establishing a serial
interface without timeslot division and with a transmission rate of 2.048 Mbit/s.
You can run the interface serial controller-number:0 command to enter the serial
interface view.
d. Run commit
The configuration is committed.
l Create a serial interface that works in channelized mode.
a. Run system-view
The system view is displayed.
b. Run controller e1 controller-number
The E1 interface view is displayed.
c. Run using ce1
The interface is configured to work in channelized mode.
d. Run channel-set set-number timeslot-list slot-list
A serial interface with a transmission rate of N x 64 kbit/s is created. N stands for
the number of bundled timeslots.
To change the working mode of an E1 interface:
n Delete serial interfaces and their configurations and channelization
configurations before you run the using e1 command to switch an E1 interface
from the channelized mode to the clear channel mode.
n Delete clear channel configurations and serial interface configurations before
you run the using ce1 command to switch an E1 interface from the clear
channel mode to the channelized mode.
You can run the interface serial controller-number:set-number command to enter
the serial interface view.
e. Run commit
The configuration is committed.
Context
A CE1 interface works in either of the following clock modes:
l Master clock mode: In master clock mode, a CE1 interface uses internal clock signals.
l Slave clock mode: In slave clock mode, a CE1 interface uses line clock signals.
When CE1 interfaces of two NE40Es are directly connected, you must configure one interface
to work in master clock mode and the other interface in slave clock mode. When the CE1
interface of the NE40E is connected to a transmission device, you must configure this
interface to work in slave clock mode and use the clock signals provided by the transmission
device.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run controller e1 controller-number
The CE1 interface view is displayed.
Step 3 Run clock { master | slave }
A clock mode is configured for the CE1 interface.
Step 4 Run commit
The configuration is committed.
----End
Context
You can configure the frame format for a CE1 interface only when it works in channelized
mode.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run controller e1controller-number
NOTE
When setting the frame format of a CE1 interface, ensure that the local and remote ends are configured
with the same frame format.
----End
Context
The loopback function has two types:
l Local loopback: is used to locate a system fault.
l Remote loopback: is used to locate a link fault or test the quality of a link.
NOTE
l To enable local loopback on an E1 interface, ensure that the clock of the E1 interface works in
master mode.
l To enable remote loopback on an E1 interface, ensure that the clock of the E1 interface works in
slave mode.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run controller e1 controller-number
The E1 interface view is displayed.
Step 3 Run loopback { local | remote } [ autoclear period hold-time ]
The loopback function is enabled on the E1 interface.
To enable the E1 interface to delete the loopback configuration after a specified period,
specify autoclear period hold-time in the command. This function takes effect when
loopback is enabled. After the time specified by hold-time elapses, the loopback configuration
is automatically deleted.
Step 4 Restart the E1 interface.
1. Run shutdown
After the configuration is complete, the configuration takes effect only after the interface is restarted.
----End
Procedure
Step 1 Run system-view
The thresholds for triggering and clearing an ES-TCA alarm are set.
----End
Prerequisites
A CE1 interface has been configured.
Procedure
l Run the display interface serial [ interface-number ] command to check the status and
statistics of a serial interface.
l Run the display controller e1 [ controller-number ] command to check the
configurations and status of a CE1 interface.
----End
Precautions
When configuring E3 interfaces to carry upper-layer services, note the following:
l If an E3 interface on the device is idle (no cable is connected to the interface), run the
shutdown command to shut down the E3 interface to prevent it from being interfered.
l After configuring services on an E3 interface, run the shutdown and then undo
shutdown commands in the interface view for the services to take effect.
l The shutdown and undo shutdown commands run on an E3 interface also take effect
with the serial interface created on the E3 interface. However, the shutdown and undo
shutdown commands run on a serial interface takes effect only with the serial interface.
Pre-configuration Tasks
Before configuring an E3 interface, power on the device and ensure that the self-check
succeeds.
Context
Depending on the E3 interface working modes, you can create the following two types of
synchronous serial interfaces on an E3 interface:
l If the E3 interface works in clear channel mode, an unframed synchronous serial
interface with a bandwidth of 34.368 Mbit/s is created.
l If the E3 interface works in unchannelized mode, a synchronous serial interface with a
bandwidth of 33.831 Mbit/s is created after you manually create a framed E3 channel.
By default, an E3 interface works in unchannelized mode.
This configuration process is supported only on the Admin-VS.
Procedure
l Create a synchronous serial interface on an E3 interface working in clear channel mode.
a. Run system-view
The system view is displayed.
b. Run controller e3 controller-number
The specified E3 interface view is displayed.
c. Run using e3
The E3 interface is configured to work in clear channel mode, and an unframed
synchronous serial interface with a bandwidth of 34.368 Mbit/s is created.
After the synchronous serial interface is created, you can run the interface serial
controller-number command to display the view of the synchronous serial interface.
d. Run commit
The configuration is committed.
l Create a synchronous serial interface on an E3 interface working in unchannelized mode.
a. Run system-view
The system view is displayed.
b. Run controller e3 controller-number
The specified E3 interface view is displayed.
c. Run using ce3
The E3 interface is configured to work in unchannelized mode.
d. Run e3 framed
A framed E3 channel is created, and an unframed synchronous serial interface with
a bandwidth of 33.831 Mbit/s is created.
After the synchronous serial interface is created, you can run the interface serial
controller-number command to display the view of the synchronous serial interface.
e. Run commit
The configuration is committed.
----End
Context
Loopback can be either local loopback or remote loopback.
Local loopback must be configured in master clock mode, and remote loopback must be
configured in slave clock mode.
Running the loopback command will cause interfaces or links unable to work properly.
Therefore, exercise caution when running the loopback command. After checking the
interface or link status, immediately run the undo loopback command to disable loopback.
Procedure
Step 1 Run system-view
----End
Context
An E3 interface has two clock modes:
l Master clock mode: The E3 interface uses internal clock signals.
l Slave clock mode: The E3 interface uses clock signals provided by an external device.
When two Routers are directly connected through E3 interfaces, configure one E3 interface as
the master clock and the other E3 interface as the slave clock.
By default, an E3 interface works in master clock mode.
Perform the following steps on a router.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run controller e3 controller-number
The specified E3 interface view is displayed.
Step 3 Run clock { master | slave }
The clock mode of the E3 interface is configured.
Step 4 Run commit
The configuration is committed.
----End
Procedure
Step 1 Run the display controller e3 [ controller-number ] command to check E3 interface
configurations.
----End
Context
NOTE
When faults occur on a CE1 interface, you can run the test connectivity controller e1
command for fault locating.
Prerequisites
The serial interface service has been configured.
Procedure
Step 1 Run system-view
----End
Networking Requirements
On the network shown in Figure 4-1, Device A and Device B need to communicate with each
other through E1 interfaces.
In this example, interface1 and interface2 represent E1 0/1/0 and E1 0/2/0, respectively.
interface1 interface2
DeviceA DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Create synchronous serial interfaces.
2. Configure IP addresses for the synchronous serial interfaces.
3. Restart all the interfaces to make the configuration take effect.
Data Preparation
To complete the configuration, you need the following data:
l E1 interface number of Device A
l E1 interface number of Device B
l IP address of the synchronous serial interface on Device A
l IP address of the synchronous serial interface on Device B
Procedure
Step 1 Create a synchronous serial interface on Device A.
# Configure the E1 interface on Device A as a synchronous serial interface.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] controller e1 0/1/0
[~DeviceA-E1 0/1/0] using e1
[*DeviceA-E1 0/1/0] commit
[~DeviceA-E1 0/1/0] quit
Step 3 Restart all the interfaces to make the configuration take effect.
# Restart the synchronous serial interface on Device A.
[~DeviceA] interface serial 0/1/0:0
[~DeviceA-Serial0/1/0:0] undo shutdown
[*DeviceA-Serial0/1/0:0] commit
[~DeviceA-Serial0/1/0:0] quit
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
controller E1 0/1/0
using e1
undo shutdown
#
interface Serial0/1/0:0
link-protocol ppp
ip address 10.1.1.1 255.255.255.0
undo shutdown
#
return
Networking Requirements
On the network shown in Figure 4-2, Device A and Device B need to communicate with each
other through CE1 interfaces.
In this example, interface1 and interface2 represent CE1 0/1/0 and CE1 0/2/0, respectively.
interface1 interface2
DeviceA DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Create synchronous serial interfaces.
2. Configure IP addresses for the synchronous serial interfaces.
3. Restart all the interfaces to make the configuration take effect.
Data Preparation
To complete the configuration, you need the following data:
The timeslot channels of the serial interfaces on Device A must be the same as those on Device B.
Procedure
Step 1 Create synchronous serial interfaces.
Step 3 Restart all the interfaces to make the configuration take effect.
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
controller E1 0/1/0
channel-set 1 timeslot-list 1-15
#
interface Serial0/1/0:1
link-protocol ppp
ip address 10.1.1.1 255.255.255.0
undo shutdown
#
return
CPOS interfaces are used to aggregate multiple E1 links to improve low-speed access. E3, T1,
and T3 links cannot be aggregated.
SONET defines the line rate hierarchical structure of synchronous transmission for the optical
transmission system. The basic SONET transmission rate is 51.84 Mbit/s :
l An electrical signal with the transmission rate is called Level 1 Synchronous Transport
Signal (STS-1).
l An optical signal with the transmission rate is called Level 1 Optical Carrier (OC-1).
SDH is similar to SONET to a great extent. The basic transmission rate of SDH is 155.52
Mbit/s, which is called Level 1 Synchronous Transfer Module (STM-1). This rate equals the
OC-3 rate in SONET.
SDH, which uses synchronous multiplexing and flexible mapping, can multiplex or
demultiplex low-speed tributary signals from SDH signals without using many multiplexing
or demultiplexing devices. SDH reduces signal consumption and equipment investment.
Table 5-1 lists the common SONET and SDH transmission rates. For convenience, the
approximations of these transmission rates are placed in the parentheses.
Channelization means that multiple independent channels of data are transmitted over an
optical fiber by using low-speed tributary STM-N signals. During the transmission, each
channel has its own bandwidth and start and end points and follows its own monitoring
policy.
Unchannelization means that all data is transmitted through a single channel over an optical
fiber by using all STM-N signals. During the transmission, all the data has the same ID and
start and end points and follows the same monitoring policy.
An E1 channel of a CPOS interface can work in either clear channel mode (unframed mode)
or channelized mode:
l In clear channel mode, an E1 channel without timeslot division forms a 2.048 Mbit/s
serial interface.
The naming convention for a serial interface is "serial interface-number/e1-number:0,"
where interface-number specifies the name of the CPOS interface, and e1-number
specifies the number of the E1 channel.
l In channelized mode, 31 timeslots across an E1 channel, excluding timeslot 0, can be
randomly bundled into serial interfaces.
The naming convention for a channelized serial interface is "serial interface-number/e1-
number:set-number," where interface-number specifies the name of the CPOS interface,
e1-number specifies the number of an E1 channel, and set-number specifies the number
of the interface formed by bundling the timeslots of the E1 channel.
NOTE
The NE40E supports only STM-1 Channelized POS.
Pos andCPOS
POS applies to metropolitan area networks (MANs) and wide area networks (WANs) and
supports packet data, such as IP packets.
CPOS interfaces make full use of the SDH system and have the following functions:
l Perform refined division of bandwidth.
l Reduce the number of low-speed physical ports required on a Router.
l Enhance the aggregation capability of the low-speed interfaces of a Router.
l Improve the dedicated line access capability of a Router.
9*270*N(bytes)
1
Regenerator
2
Section
3
Overhead
4
5 AU-PTR Payload
6
Multiplex
7
Section
8
Overhead
9
9*N 261*N
STM-N is a frame with the dimension of 9 rows x 270 x N columns. Here, N is the same as
that in STM-N, indicating how many STM-1 signals are multiplexed to this STM-N signal.
An STM-N frame consists of the following parts:
l Section overhead (SOH): includes regenerator section overhead (RSOH) and multiplex
section overhead (MSOH).
l Administration unit pointer (AU-PTR): is the pointer that specifies the first byte of the
payload. The receiver can correctly extract the payload based on the location of the
pointer.
l Payload
Related Concepts
l Multiplexing units: Basic SDH multiplexing units include container (C-n), virtual
container (VC-n), tributary unit (TU-n), tributary unit group (TUG-n), administrative
unit (AU-n), and administrative unit group (AUG-n). Here, n stands for the number of
the unit level.
l Container: It is used to carry service signals that are transmitted at different rates. G.709
defines specifications for five types of standard containers: C-11, C-12, C-2, C-3, and
C-4.
Multiplexing E1 to STM-1
In the SDH multiplexing process outlined in the G.709 recommendation, there is more than
one multiplexing path from a valid payload to STM-N. Figure 5-2 shows the multiplexing
process from E1 to STM-1.
×1 ×1 ×3
STM-1 AUG-1 AU-4 VC-4
×3 TUG-3
AU-3
×7
Point processing ×7
VC-3 TUG-2
Multiplexing
Aligning ×3
C-12:2.048Mb/s
Mapping C-12 VC-12 TU-12
In practice, different countries and regions may use different multiplexing paths.
The multiplexing process in Figure 5-3 shows that the 2 Mbit/s multiplexing structure is
3-7-3 when the AU-4 multiplexing path is used. The following formula shows how to
calculate the TU-12 numbers located in different positions in a VC-4:
In a VC-4, all TUG-3s are numbered the same; all TUG-2s are numbered the same; two
TU-12s with a number difference of 1 are adjacent.
NOTE
l The numbers listed in the preceding formula stand for the positions in a VC-4 frame.
l The TUG-3 number ranges from 1 to 3; the TUG-2 number ranges from 1 to 7; the TU-12 number
ranges from 1 to 3.
l The TU-12 number indicates which one of the 63 TU-12s is in the VC-4 frame based on the
sequence and also indicates the E1 channel number.
Figure 5-3 Sequence for arranging TUG-3, TUG-2, and TU-12 in a VC-4 frame
TU-12 1
1 1
TU-12 3
TU-12 1
2 2
.
. TU-12 3
.
.
.
.
TU-12 1
3 7
TUG-3 TUG-2 TU-12 2
TU-12 3
If the AU-3 multiplexing path is used, the TU-12 number calculation can be deduced in a
similar manner.
Overhead Bytes
SDH provides monitoring and management at layers. Monitoring is classified as section
monitoring or path monitoring. Section monitoring is classified as regenerator section
monitoring or multiplex section monitoring. Path monitoring is classified as higher-order path
monitoring or lower-order path monitoring. Different overhead bytes help to implement the
monitoring functions.
NOTE
This section describes only the SDH overhead bytes used in configuration.
l SOH
SOH consists of RSOH and MSOH.
The payload of an STM-N frame contains the path overhead (POH) that monitors low-
speed tributary signals.
J0, the regenerator section trace byte, is contained in RSOH. This byte is used to transmit
the service access point identifiers (SAPIs) repeatedly to check the connection between
the receiver and the transmitter. The byte can be any character in a carrier's network,
whereas the J0 bytes of the receiver and transmitter must match each other at the border
of two carriers' networks. With the J0 byte, a carrier can locate and rectify faults in
advance to speed up network recovery.
l Path overhead
SOH monitors section layers, whereas POH monitors path layers. POH is classified as
lower-order path overhead or higher-order path overhead.
The higher-order path overhead monitors the paths at VC-4 and VC-3 levels.
J1, the higher-order VC-N path trace byte, is contained in the higher-order path
overhead. Similar to J0, J1 is used to transmit SAPIs repeatedly to check the connection
between the receiver and the transmitter. The J1 bytes of the receiver and transmitter
must match each other.
C2, the path signal label byte, is contained in higher-order path overhead. C2 is used to
specify the multiplexing structure and the attributes of the information payload in a VC
frame, including whether the path is loaded with services, service types, and the mapping
mode. The C2 bytes of the receiver and transmitter must match each other.
N×2M
Transmission Internet
network
E1 DeviceA
Access
network
N×64K
In practice, there may be more than one level of transmission networks between CPOS
interfaces and low-end devices. Other transmission devices are needed to relay
communication between low-end devices and transmission networks. Logically, such an
implementation is equivalent to the networking mode in which each low-end device is
connected to Device A over an E1 leased line or N x E1 leased lines.
Usage Scenario
Before you use the serial interfaces formed by the E1 channels of a CPOS interface to
transmit packets, configure the physical attributes and E1 channels of the CPOS interface.
Pre-configuration Tasks
Before configuring a CPOS interface, power on the device and ensure that it is working
properly.
Context
If a CPOS interface works in clear channel mode, synchronous serial interfaces with higher
transmission rates can be generated, so that the CPOS interface can provide sufficient
bandwidth for service bearer.
If a CPOS interface works in channelized mode, the E1 channels of the CPOS interface can
generate synchronous serial interfaces with different transmission rates when they work in
different modes:
l In clear channel mode, an E1 channel functions as a synchronous serial interface without
timeslot division and with a transmission rate of 2.048 Mbit/s.
l In channelized mode, an E1 channel is divided into 32 timeslots numbered from 0 to 31.
Timeslots 1 to 31 can be randomly bundled to generate logical channels with
transmission rates of N x 64 kbit/s.
Procedure
l Configure a CPOS interface to work in channelized mode.
– Configure an E1 channel of the CPOS interface to work in clear channel mode so
that a trunk serial interface is generated.
i. Run system-view
The system view is displayed.
Context
A CPOS interface supports the following clock modes:
l Master clock mode: uses internal clock signals.
l Slave clock mode: uses line clock signals.
When a CPOS interface is connected to an SDH device, configure the CPOS interface to work
in slave clock mode because the precision of the clock in the SDH network is higher than the
precision of the internal clock source of the CPOS interface.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run controller cpos cpos-number
The CPOS interface view is displayed.
Step 3 Run clock { master | slave }
A clock mode is configured for the CPOS interface.
Step 4 Run commit
The configuration is committed.
----End
Context
The E1 channels of a CPOS interface can form serial interfaces with different transmission
rates when they work in different modes:
l In clear channel mode, an E1 channel functions as a serial interface without timeslot
division and with a transmission rate of 2.048 Mbit/s.
l In channelized mode, an E1 channel is divided into 32 timeslots numbered from 0 to 31.
Timeslots 1 to 31 can be randomly bundled to form logical channels with transmission
rates of N x 64 kbit/s.
Procedure
l Create a serial interface in clear channel mode.
a. Run system-view
The system view is displayed.
b. Run controller cpos cpos-number
Context
SDH provides a variety of overhead bytes, which perform the monitoring function of different
levels.
l C2, the path signal label byte, is contained in the higher-order path overhead. C2 is used
to specify the multiplexing structure and the attributes of the information payload in a
VC frame.
l J0, the regenerator section trace byte, is contained in the section overhead. J0 is used to
check the continuity between two ports at the section layer.
l J1, the higher-order VC-N path trace byte, is used to check the continuity between two
ports at the path layer.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run controller cpos cpos-number
C2, J0, and J1 of the receiver must be the same as those of the transmitter; otherwise, an alarm
is generated.
----End
Context
Different vendors' devices have different number calculation formulas for multiplexing CPOS
E1 to STM-1.
To enable a device to interwork with other vendors' devices using CPOS interfaces, you must
ensure that the E1 channel mapping mode on the device is the same as that on other vendors'
devices.
Procedure
Step 1 Run system-view
Before configuring the E1 channel mapping mode of a CPOS interface, ensure that no E1
channel is created on the CPOS interface.
l a-mode:
Configures the Alcatel mode (a-mode) as the E1 channel mapping mode of a CPOS
interface. This mode applies when the E1 channel mapping mode of the interconnected
device is the Alcatel mode. In this mode, E1 channel number = (TUG-3 number – 1) x
21 + TUG-2 number + (TU-12 number – 1) x 7.
l h-mode:
Configures the Huawei mode (h-mode) as the E1 channel mapping mode of a CPOS
interface. This mode applies when the E1 channel mapping mode of the interconnected
device is the Huawei mode. In this mode, E1 channel number = TUG-3 number +
(TUG-2 number – 1) x 3 + (TU-12 number – 1) x 21.
l l-mode:
Configures the Lucent mode (l-mode) as the E1 channel mapping mode of a CPOS
interface. This mode applies when the E1 channel mapping mode of the interconnected
device is the Lucent mode. In this mode, E1 channel number = (TUG-3 number – 1) ×
21 + (TUG-2 number – 1) x 3 + TU-12 number
NOTE
The numbers listed in the preceding formula stand for the positions in a VC-4 frame. The TUG-3
number ranges from 1 to 3; the TUG-2 number ranges from 1 to 7; the TU-12 number ranges from 1 to
3.
----End
Context
The clock modes of different E1 channels on the same CPOS interface are independent of
each other.
When CPOS interfaces on two devices are directly connected, one E1 channel must be
configured to work in master clock mode and use internal clock signals, and the other E1
channel must be configured to work in slave clock mode and use line clock signals.
Procedure
Step 1 Run system-view
----End
Procedure
Step 1 Run system-view
The frame format of the E1 channel must be the same on the local and remote devices.
----End
Procedure
Step 1 Run system-view
Step 3 Run e1 e1-number set loopback { local | remote } [ autoclear period hold-time ]
NOTE
l To enable local loopback for an E1 channel, the channel must work in master clock mode.
l To enable remote loopback for an E1 channel, the channel must work in slave clock mode.
----End
Context
The loopback function has two types:
l Local loopback: is used to locate a system fault.
l Remote loopback: is used to locate a link fault or test the quality of a link.
NOTE
l To enable local loopback on a CPOS interface, ensure that the clock of the CPOS interface works in
master mode.
Procedure
Step 1 Run system-view
To enable the CPOS interface to delete the loopback configuration after a specified period,
specify autoclear period hold-time in the command. This function takes effect when
loopback is enabled. After the time specified by hold-time elapses, the loopback configuration
is automatically deleted.
----End
Prerequisites
A CPOS interface has been configured.
Procedure
l Run the display interface serial [ interface-number ] command to check the status and
statistics of a serial interface.
l Run the display controller cpos [ cpos-number ] command to check the status and
configurations of a CPOS interface.
----End
Usage Scenario
A CPOS-Trunk interface is a logical interface that has all the functions of a CPOS interface. It
is more reliable because it has multiple CPOS interfaces bundled using the link aggregation
technology.
After a CPOS-Trunk interface is created, APS can be configured on the interface.
Pre-configuration Tasks
Before configuring a CPOS-Trunk interface, power on the device and ensure that the self-
check succeeds.
Context
APS can be configured on the trunk serial interface channelized from a CPOS-Trunk interface
only after CPOS interfaces are added to the CPOS-Trunk interface.
Procedure
Step 1 Create a CPOS-Trunk interface.
1. Run system-view
The system view is displayed.
2. Run interface cpos-trunk trunk-id
A CPOS-Trunk interface is created. If the CPOS-Trunk interface already exists, the
CPOS-Trunk interface view is displayed.
Step 2 Add a CPOS interface to the CPOS-Trunk interface.
1. Run controller cpos cpos-number
The CPOS interface view is displayed.
2. Run cpos-trunk trunk-id
The CPOS interface is added to the CPOS-Trunk interface.
NOTE
Before adding a CPOS interface to a CPOS-Trunk interface, run the aps group command on the CPOS
interface to add it to an LMSP group, and configure the interface as a working interface or a protection
interface. For more details, see LMSP Configuration.
After a CPOS interface is added to a CPOS-Trunk interface, the following situations occur:
l If you run the shutdown command on the CPOS-Trunk interface, the physical status of both the
CPOS-Trunk and CPOS interfaces becomes Administratively DOWN, and the shutdown
command configuration is automatically generated for the CPOS interface in the configuration
file.
l If you run the undo shutdown command on the CPOS-Trunk interface, the undo shutdown
command configuration is automatically generated for the CPOS interface in the configuration
file.
----End
Context
A CPOS-Trunk interface can work in either clear channel mode or channelized mode. Trunk
serial interfaces with different transmission rates can be generated in the two modes to meet
different bandwidth requirements of services.
NOTE
Procedure
l Configure a CPOS-Trunk interface to work in channelized mode.
– Configure an E1 channel of a CPOS-Trunk interface to work in clear channel mode
so that a trunk serial interface is generated.
i. Run system-view
The system view is displayed.
ii. Run interface cpos-trunk trunk-id
Procedure
l Configure an E1 channel of a CPOS-Trunk interface to work in clear channel mode so
that a trunk serial interface is generated.
a. Run system-view
The system view is displayed.
b. Run interface cpos-trunk trunk-id
The CPOS-Trunk interface view is displayed.
c. Run e1 e1-number unframed
An E1 channel of the CPOS-Trunk interface is configured to work in clear channel
mode, and a trunk serial interface is generated.
After the trunk serial interface in clear channel mode is generated, you can run the
interface trunk-serial cpos-trunk-id/e1-number:0 command to enter the trunk
serial interface view.
d. Run commit
The configuration is committed.
l Configure an E1 channel of a CPOS-Trunk interface to work in channelized mode so that
a trunk serial interface in channelized mode can be generated.
a. Run system-view
The system view is displayed.
b. Run interface cpos-trunk trunk-id
The CPOS-Trunk interface view is displayed.
c. Run e1 e1-number channel-set set-number timeslot-list
Timeslots of an E1 channel of the CPOS-Trunk interface are bundled, and a trunk
serial interface is generated.
After the trunk serial interface in channelized mode is generated, you can run the
interface trunk-serial cpos-trunk-id/e1-number:set-number command to enter the
trunk serial interface view.
d. Run commit
The configuration is committed.
----End
Context
To improve network reliability, a protection channel can be configured to take over traffic
from one or more working channels if the working channels fail.
Before deploying and protecting PPP or ATM services on CPOS interfaces, add two CPOS
interfaces to a CPOS-Trunk interface and channelize the CPOS-Trunk interface into trunk
serial interfaces. Then, add the trunk serial interfaces to a global MP-group or IMA-group
interface to carry the PPP or ATM services. If one CPOS link fails, the other CPOS link takes
over traffic.
Procedure
l Create a global MP-group interface and add a trunk serial interface to it.
a. Create a global MP-group interface.
i. Run system-view
The system view is displayed.
ii. Run interface global-mp-group global-mp-group-number
A global MP-group interface is created.
iii. Run commit
The configuration is committed.
b. Add a trunk serial interface to the global MP-group interface.
i. Run system-view
The system view is displayed.
ii. Run interface trunk-serial trunk-serial-id
The trunk serial interface view is displayed.
iii. Run link-protocol ppp
The link layer protocol is configured as PPP for the trunk serial interface.
iv. Run ppp mp-global global-mp-group global-mp-group-number
The trunk serial interface is added to the global MP-group interface.
v. Run commit
The configuration is committed.
l Create a global IMA-group interface and add a trunk serial interface to it.
a. Create a global IMA-group interface.
i. Run system-view
The system view is displayed.
ii. Run interface global-ima-group global-ima-group-number
A global IMA-group interface is created.
iii. Run commit
The configuration is committed.
b. Add a trunk serial interface to the global IMA-group interface.
i. Run system-view
The system view is displayed.
ii. Run interface trunk-serial trunk-serial-id
The trunk serial interface view is displayed.
iii. Run link-protocol atm
The link layer protocol is configured as ATM for the trunk serial interface.
iv. Run ima global-ima-group global-ima-group-number
The trunk serial interface is added to the global IMA-group interface.
NOTE
After a trunk serial interface is added to a global IMA-group interface, the interface type
previously configured for the global IMA-group interface becomes invalid. To reconfigure
an interface type for the global IMA-group interface, run the atm interface-type { uni |
nni } command in the global IMA-group interface view.
l If a device connects to a user-side device, configure the IMA-group interface as a
UNI.
l If a device connects to another network-side device, configure the IMA-group
interface as an NNI.
\
v. Run commit
The configuration is committed.
----End
Context
To improve network reliability, a protection channel can be configured to take over traffic
from one or more working channels if the working channels fail.
Before deploying and protecting PPP or ATM services on CPOS interfaces, add two CPOS
interfaces to a CPOS-Trunk interface and channelize the CPOS-Trunk interface into trunk
serial interfaces. Then, add the trunk serial interfaces to a global MP-group or IMA-group
interface to carry the PPP or ATM services. If one CPOS link fails, the other CPOS link takes
over traffic.
Procedure
l Create a global MP-group interface and add a trunk serial interface to it.
a. Create a global MP-group interface.
i. Run system-view
The system view is displayed.
ii. Run interface global-mp-group global-mp-group-number
A global MP-group interface is created.
iii. Run commit
The configuration is committed.
b. Add a trunk serial interface to the global MP-group interface.
i. Run system-view
The system view is displayed.
ii. Run interface trunk-serial trunk-serial-id
The trunk serial interface view is displayed.
iii. Run link-protocol ppp
The link layer protocol is configured as PPP for the trunk serial interface.
iv. Run ppp mp-global global-mp-group global-mp-group-number
The trunk serial interface is added to the global MP-group interface.
v. Run commit
The configuration is committed.
l Create a global IMA-group interface and add a trunk serial interface to it.
a. Create a global IMA-group interface.
i. Run system-view
The system view is displayed.
ii. Run interface global-ima-group global-ima-group-number
A global IMA-group interface is created.
iii. Run commit
The configuration is committed.
b. Add a trunk serial interface to the global IMA-group interface.
i. Run system-view
The system view is displayed.
ii. Run interface trunk-serial trunk-serial-id
The trunk serial interface view is displayed.
iii. Run link-protocol atm
The link layer protocol is configured as ATM for the trunk serial interface.
iv. Run ima global-ima-group global-ima-group-number
The trunk serial interface is added to the global IMA-group interface.
NOTE
After a trunk serial interface is added to a global IMA-group interface, the interface type
previously configured for the global IMA-group interface becomes invalid. To reconfigure
an interface type for the global IMA-group interface, run the atm interface-type { uni |
nni } command in the global IMA-group interface view.
l If a device connects to a user-side device, configure the IMA-group interface as a
UNI.
l If a device connects to another network-side device, configure the IMA-group
interface as an NNI.
\
v. Run commit
The configuration is committed.
----End
Prerequisites
A CPOS-Trunk interface has been configured.
Procedure
l Run the display cpos-trunk trunk-id command to check the configurations of a CPOS-
Trunk interface.
l Run the display interface trunk-serial [ trunk-serial-id ] command to check the status
and packet statistics of a specified or all trunk serial interfaces.
l Run the display ppp mp-global [ interface global-mp-group interface-number ]
command to check the configurations of a global MP-group interface.
l Run the display interface global-ima-group [ global-ima-group-number ]command to
check configurations and status of a global IMA-group interface.
----End
Context
NOTE
When faults occur on a CPOS E1 link, you can run the test connectivity controller cpos e1
command for fault locating.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run test connectivity controller cpos e1 controller-number { unframed | channelized
timeslot-list slot-list } duration time
The bit error rate is tested on a specified CPOS E1 link.
----End
Context
NOTE
This section describes how to clear error statistics and alarm status information on an E1
interface or on a CPOS interface's E1 channels.
Procedure
Step 1 Run the system-view command to enter the system view.
Step 2 Run the reset e1 counters controller cpos controller-number e1 e1-number command to
clear error statistics and alarm status information on a CPOS interface's E1 channels or run
the reset e1 counters controller e1 controller-number command to clear error statistics and
alarm status information on an E1 interface.
----End
Context
Monitoring the physical status of E1 links can help you locate E1 link faults, ensuring correct
link connections. You can configure the system to monitor the physical status of multiple E1
links simultaneously while not affecting existing services.
Procedure
Step 1 Run monitor e1 { interface-type interface-number | interface-name } &<1-16> [ interval
interval [ times times ] | times times [ interval interval ] ]
----End
Networking Requirements
CPOS interfaces are used to improve the convergence capability of low-speed access for
Routers. STM-1 CPOS interfaces are often used to converge multiple E1/T1 interfaces.
At present, some governmental agencies and enterprises use low-end and mid-range devices
to access the transmission network through E1/T1 leased lines. Users requiring bandwidth
between E1/T1 and T3 (44M), such as the date center, lease several E1/T1 interfaces
simultaneously. Bandwidth of these users converges on one or multiple CPOS interfaces
through the transmission network. CPOS interfaces are then connected to Device A that
identifies each low-end device through timeslots.
In application, there may be more than one level of transmission networks between CPOS
interfaces and low-end devices. Other transmission devices are needed to relay
communication between low-end devices and transmission networks.
Enterprise
Intranet
Governmental
Office E1/T1
ADM
E1/T1
ADM STM-4/16 ADM
STM-
1/STM-4
ADM Device A
n×E1/T1
Device B
DataCenter
Configuration Roadmap
The configuration roadmap is as follows:
1. Create the channel.
2. Create the channel-set.
3. Bundle the channel into the channel-set.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure Device A.
# Create a channel on the CPOS interface.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*DeviceA] controller cpos 0/1/0
[*DeviceA-Cpos0/1/0] e1 1 channel-set 1 timeslot-list 1-10
[*DeviceA-Cpos0/1/0] e1 2 channel-set 2 timeslot-list 11-15
[*DeviceA-Cpos0/1/0] e1 3 channel-set 3 timeslot-list 16-20
[*DeviceA-Cpos0/1/0] e1 4 channel-set 4 timeslot-list 21-30
[*DeviceA-Cpos0/1/0] undo shutdown
[*DeviceA-Cpos0/1/0] quit
[*DeviceA] commit
# Create a channel-set.
[~DeviceB] interface mp-group 0/2/9
[*DeviceB-Mp-group0/2/9] discriminator
[*DeviceB-Mp-group0/2/9] undo shutdown
[*DeviceB-Mp-group0/2/9] quit
[*DeviceB] commit
----End
Configuration Files
l Configuration file of Device A
#
sysname DeviceA
#
controller Cpos0/1/0
e1 1 channel-set 1 timeslot-list 1-10
e1 2 channel-set 2 timeslot-list 11-15
e1 3 channel-set 3 timeslot-list 16-20
e1 4 channel-set 4 timeslot-list 21-30
undo shutdown
#
interface Serial0/1/0/1:1
link-protocol ppp
ppp mp Mp-group 0/3/0
#
interface Serial0/1/0/2:2
link-protocol ppp
ppp mp Mp-group 0/3/0
#
interface Serial0/1/0/3:3
link-protocol ppp
ppp mp Mp-group 0/3/0
#
interface Serial0/1/0/4:4
link-protocol ppp
ppp mp Mp-group 0/3/0
#
interface Mp-group0/3/0
#
return
Networking Requirements
On the network shown in Figure 5-6, Device A and Device B need to communicate with each
other through CPOS interfaces, and MP-group interfaces need to be configured for link
bundling.
In this example, interface1 and interface2 represent CPOS 0/3/0 and CPOS 0/2/9, respectively.
interface1 interface2
DeviceA DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a working mode for CPOS interfaces and channelize them into synchronous
serial interfaces.
2. Configure MP-group interfaces and add the synchronous serial interfaces to the MP-
group interfaces.
Data Preparation
To complete the configuration, you need the following data:
l Channel number and timeslot number of each E1 channel
l IP addresses of MP-group interfaces
NOTE
The interface to be added to an MP-group interface must have the same slot number and card number as
the MP-group interface.
The timeslot channels of the serial interfaces on Device A must be the same as those on Device B.
Procedure
Step 1 Configure a working mode for CPOS interfaces and channelize them into synchronous serial
interfaces.
# Create synchronous serial interfaces on the CPOS interface of Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*DeviceA] controller cpos 0/3/0
[*DeviceA-Cpos0/3/0] e1 1 channel-set 1 timeslot-list 1-15
[*DeviceA-Cpos0/3/0] e1 2 channel-set 1 timeslot-list 16-31
[*DeviceA-Cpos0/3/0] undo shutdown
[*DeviceA-Cpos0/3/0] commit
[~DeviceA-Cpos0/3/0] quit
<HUAWEI> system-view
[~HUAWEI] sysname DeviceB
[*DeviceB] controller cpos 0/2/9
[*DeviceB-Cpos0/2/9] e1 1 channel-set 1 timeslot-list 1-15
[*DeviceB-Cpos0/2/9] e1 2 channel-set 1 timeslot-list 16-31
[*DeviceB-Cpos0/2/9] undo shutdown
[*DeviceB-Cpos0/2/9] commit
[~DeviceB-Cpos0/2/9] quit
Step 2 Configure MP-group interfaces and add the synchronous serial interfaces to the MP-group
interfaces.
# Create an MP-group interface on Device A.
[~DeviceA] interface mp-group 0/3/0
[*DeviceA-Mp-group0/3/0] ip address 10.1.1.1 255.255.255.0
[*DeviceA-Mp-group0/3/0] undo shutdown
[*DeviceA-Mp-group0/3/0] commit
[~DeviceA-Mp-group0/3/0] quit
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
controller Cpos0/3/0
e1 1 channel-set 1 timeslot-list 1-15
e1 2 channel-set 1 timeslot-list 16-31
undo shutdown
#
interface Mp-group0/3/0
#
interface Serial0/3/0/1:1
link-protocol ppp
ppp mp Mp-group0/3/0
#
interface Serial0/3/0/2:1
link-protocol ppp
ppp mp Mp-group0/3/0
#
return
Networking Requirements
On the network shown in Figure 5-7, Device A and Device B need to communicate with each
other through CPOS interface and E1 interfaces, and MP-group interfaces need to be
configured for link bundling.
In this example, interface1, interface2, and interface3 represent CPOS 0/3/0, E1 0/2/0, and E1 0/2/1,
respectively.
interface1 interface2
interface3
DeviceA DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a working mode for CPOS interfaces.
2. Configure MP-group interfaces and add the synchronous serial interfaces to the MP-
group interfaces.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of MP-group interfaces
NOTE
The interface to be added to an MP-group interface must have the same slot number and card number as
the MP-group interface.
Procedure
Step 1 Configure a working mode for CPOS interfaces and create synchronous serial interfaces.
# Create synchronous serial interfaces on the CPOS interface of Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*DeviceA] controller cpos 0/3/0
[*DeviceA-Cpos0/3/0] e1 1 unframed
[*DeviceA-Cpos0/3/0] e1 2 unframed
[*DeviceA-Cpos0/3/0] undo shutdown
[*DeviceA-Cpos0/3/0] commit
[~DeviceA-Cpos0/3/0] quit
Step 2 Configure MP-group interfaces and add the synchronous serial interfaces to the MP-group
interfaces.
# On Device A, ping the IP address of the MP-group interface on Device B. The command
output shows that the ping is successful.
[~DeviceA] ping 10.1.1.2
PING 10.1.1.2: 56 data bytes, press CTRL_C to break
Reply from 10.1.1.2: bytes=56 Sequence=1 ttl=255 time=29 ms
Reply from 10.1.1.2: bytes=56 Sequence=2 ttl=255 time=31 ms
Reply from 10.1.1.2: bytes=56 Sequence=3 ttl=255 time=29 ms
Reply from 10.1.1.2: bytes=56 Sequence=4 ttl=255 time=30 ms
Reply from 10.1.1.2: bytes=56 Sequence=5 ttl=255 time=30 ms
--- 10.1.1.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 29/29/31 ms
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
controller Cpos0/3/0
e1 1 unframed
e1 2 unframed
undo shutdown
#
interface Mp-group0/3/0
#
interface Serial0/3/0/1:0
link-protocol ppp
ppp mp Mp-group0/3/0
#
interface Serial0/3/0/2:0
link-protocol ppp
ppp mp Mp-group0/3/0
#
return
6 FR Configuration
Frame Relay (FR) is a fast packet switching technology used to forward and switch data in a
simple manner at the link layer. FR allows devices to communicate with each other through
virtual circuits (VCs).
6.1 Overview of FR
FR is a standard protocol for communication between devices at the data link layer. Multiple
upper-layer protocols can be deployed on an FR-capable network.
6.2 Configuring Basic FR Functions
FR uses VCs and works at the physical and data link layers of the OSI model. FR is
characterized by high throughput and short delay and is applicable in case of burst service
traffic.
6.3 Configuration Examples for FR
This section provides FR configuration examples.
6.1 Overview of FR
FR is a standard protocol for communication between devices at the data link layer. Multiple
upper-layer protocols can be deployed on an FR-capable network.
6.1.1 Introduction
FR allows user devices, such as routers and hosts, to exchange data on an FR-capable
network.
A conventional wide area network (WAN) uses X.25, frame relay (FR), or ATM. Any of these
link-layer protocols can transmit data from one local area network (LAN) over a WAN to
another LAN. As terminals become intelligent and the quality of physical links improves, the
functions of error control and flow control for data at the data link layer on X.25 networks are
no longer required. In addition, limited bandwidth resources on X.25 networks cannot meet
requirements for services. Due to expensive ATM-capable devices and complicated
compatibility, ATM networks are unsuitable for large-scale deployment. Although the
bandwidth provided by FR-capable networks is lower than that provided by ATM networks,
FR-capable networks boast of short delays and low costs, and thereby are preferentially used
to upgrade X.25 networks.
FR simplifies Layer 3 functions of X.25. As a statistics multiplexing protocol, FR provides
multiple VCs over a single physical link. Devices at both ends of each link are connected
using a VC at Layer 2. VCs are differentiated by data link connection identifiers (DLCIs), and
several VCs can form a Permanent Virtual Circuit (PVC). On each PVC, the Local
Management Interface (LMI) protocol uses status enquiry messages and state messages to
maintain link and PVC status.
DLCI
A DLCI identifies a VC and is valid only on the local interface and its directly connected
interface at the remote end. Therefore, the same DLCI on different physical interfaces identify
different VCs on an FR-capable network.
LMI
After a PVC is set up, both the DCE and DTE need to know the PVC status. The LMI
protocol uses status enquiry messages and state messages to maintain link and PVC status.
For example, LMI adds PVC status information, deletes information about disconnected
PVCs, monitors PVC status changes, and checks ink integrity. LMI is defined in the following
documents:
l ITU-T Q.933 Appendix A
l ANSI T1.617 Appendix D
l Non-standard compatible protocol
DTE N391 Specifies the Full status (status The DTE sends a full status
of all PVCs) polling counter. report or a link integrity
verification only report at an
interval specified by T391. The
number of full status reports
and link integrity verification
only reports to be sent is
determined using the formula:
Number of link integrity
verification only reports :
Number of full status reports =
(N391 - 1) : 1.
DCE N392 Specifies the error threshold. N392 on the DCE has similar
functions as N392 on the DTE.
However, they differ in that the
interval at which status enquiry
messages are sent is specified
by T392 on the DCE (which, in
turn, is specified by T391 on
the DTE).
N393 Specifies the monitored event N393 on the DCE has similar
counter. functions as N393 on the DTE.
However, they differ in that the
interval at which status enquiry
messages are sent is specified
by T392 on the DCE (which, in
turn, is specified by T391 on
the DTE).
T392 Specifies the polling timer at Specifies the period for which
the network side. the DCE waits for a status
enquiry message from the
DTE. The value of T392 must
be greater than that of T391.
VC
A VC is a channel or circuit established between two points on a data communications
network with packet switching. VCs can be PVCs or switched virtual circuits (SVCs).
l PVCs are manually configured.
l SVCs are automatically created and deleted through protocol negotiations.
NOTE
Context
The Internet and IP technology has gained an overwhelming competitive edge in the
application field with their simplicity and flexibility. FR supports multiplexing. Therefore,
when IP packets enter an FR-capable network, FR devices can forward the packets to the
destination. Currently, IPoFR has become a primary alternative in deploying an IP broadband
network.
Figure 6-1 shows locations where FR can be deployed. FR deployment includes the
following parts:
l FR access (on the user side)
l FR switching (on the network side)
NOTE
FR access enables IP packets from DTEs to enter an FR-capable network and to be forwarded
by DCEs.
Pre-configuration Tasks
Before configuring basic FR functions, configure physical attributes for FR interfaces.
Procedure
Step 1 Run system-view
NOTE
After the FR encapsulation type on an interface is changed, the system automatically deletes all the FR
configurations on the interface. Therefore, you need to re-configure the interface.
l If the FR interface type is DCE or NNI, a DLCI must be configured for the VC.
l If you want to change a configured DLCI, run the shutdown command to shut down the
sub-interface or delete the original DLCI.
Step 11 Run commit
The configuration is committed.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The FR interface view is displayed.
Step 3 Run link-protocol fr [ ietf | nonstandard ]
An FR encapsulation type is configured on the interface.
By default, the FR encapsulation type is IETF on the interface.
NOTE
After the FR encapsulation type on an interface is changed, the system automatically deletes all the FR
configurations on the interface. Therefore, you need to re-configure the interface.
NOTE
After the FR interface type is changed, LMI parameters are deleted automatically.
NOTE
If you want to change a configured DLCI, run the shutdown command to shut down the sub-interface or
delete the original DLCI.
----End
Prerequisites
Basic FR functions have been configured.
Procedure
l Run the display fr interface [ interface-type interface-number ] command to check FR
protocol status and interface information on a specific interface.
l Run the display fr pvc-info [ interface interface-type interface-number ] [ dlci dlci-
number ] command to check VC configurations and statistics.
l Run the display fr lmi-info [ interface interface-type interface-number ] command to
check statistics about received and sent LMI packets.
l Run the display fr statistics [ interface interface-type interface-number ] command to
check statistics about received and sent data.
----End
Networking Requirements
On the network shown in Figure 6-2, Routers are connected to each other through POS sub-
interfaces. The type of the interface on Device A is DCE, and the type of the interface on
Device B is DTE.
DeviceA DeviceB
10.1.1.1/24 10.1.1.2/24
DLCI=100
Configuration Roadmap
The configuration roadmap is as follows:
1. Set the link layer protocol to FR.
2. Configure interface type.
3. Configure a DLCI for each VC.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of interfaces
l DLCI on each interface
Procedure
Step 1 Configure RouterDevice A.
# Set the link layer protocol to FR and interface type to DCE.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] interface Pos0/1/0
[~DeviceA-Pos0/1/0] link-protocol fr
[*DeviceA-Pos0/1/0] fr interface-type dce
[*DeviceA-Pos0/1/0] quit
Run the display fr pvc-info command on Device B to check VC configurations and statistics.
<DeviceB> display fr pvc-info interface pos0/1/0.1
PVC statistics for interface Pos0/1/0.1 (DTE, PP)
DLCI = 111, USAGE = LOCAL, Pos0/1/0.1
create time = 2013/11/05 11:19:17, status = ACTIVE
in BECN = 0, in FECN = 0
in packets = 0, in bytes = 0
out packets = 0, out bytes = 0
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
interface Pos0/1/0
link-protocol fr
undo shutdown
fr interface-type dce
#
interface Pos0/1/0.1 p2p
ip address 10.1.1.1 255.255.255.0
fr dlci 100
#
return
High-Level Data Link Control (HDLC) is a bit-oriented link layer protocol used to
transparently transmit all types of bit flows. An IP-Trunk consists of Packet over SDH/
SONET (POS) links and is encapsulated with HDLC at the data link layer. The IP-Trunk
increases interface bandwidth and improves link reliability.
7.1 Overview
As a bit-oriented link layer protocol, HDLC transparently transmits bit flows of any type
without specifying data as a set of characters.
7.2 Configuring HDLC Functions
This section describes how to configure HDLC encapsulation and optional HDLC parameters.
7.3 Configuring an IP-Trunk Interface
IP-Trunk interfaces are a type of trunk interface. You can configure an IP-Trunk interface to
implement link backup and traffic load balancing.
7.4 Maintaining HDLC and IP-Trunk
This section describes how to maintain HDLC and IP-Trunk, including deleting statistics
about HDLC or IP-Trunk interfaces.
7.5 Configuration Examples for HDLC and IP-Trunk
This section provides examples for configuring HDLC and an IP-Trunk interface.
7.1 Overview
As a bit-oriented link layer protocol, HDLC transparently transmits bit flows of any type
without specifying data as a set of characters.
As a typical bit-oriented synchronous data control protocol, HDLC has the following
characteristics:
l HDLC works in full-duplex mode and can transmit data continuously without waiting
for acknowledgement. Therefore, HDLC features high data link transmission efficiency.
l HDLC uses cyclic redundancy check (CRC) for all frames and numbers them. This helps
you know which frames are dropped and which frames are repeatedly transmitted.
HDLC ensures high transmission reliability.
l HDLC separates the transmission control function from the processing function and
features high flexibility and perfect control capabilities.
l HDLC is independent of any character encoding set and transparently transmits data.
l Zero-bit insertion, which is used for transparent data transmission, is easy to implement
on hardware.
HDLC is especially used to logically transmit data that is segmented into physical blocks or
packages. These blocks or packages are called frames, each of which is identified by a start
flag and an end flag. In HDLC, all bit-oriented data link control protocols use a unified frame
format, and both data and control information are transmitted in frames. Each frame begins at
and ends with a frame delimiter, which is a unique sequence of bits of 01111110. The frame
delimiter marks the start or end of a frame or marks for synchronization. The frame delimiter
is invisible inside a frame to avoid confusion.
A trunk can aggregate many interfaces into an aggregation group to implement load balancing
on member interfaces. Therefore, link connectivity is of higher reliability. Trunk interfaces are
classified as Eth-Trunk interfaces and IP-Trunk interfaces. An IP-Trunk can only be
composed of POS links. It has the following characteristics:
l Increased bandwidth: An IP-Trunk obtains the sum of bandwidths of all member
interfaces.
l Improved reliability: When a link fails, traffic is automatically switched to other links,
which improves connection reliability.
Usage Scenario
HDLC applies when a bit-oriented link layer protocol is used for synchronous transmission.
Pre-configuration Tasks
Before configuring HDLC functions, configure the physical attributes of each synchronous
serial interface on the Router to ensure that the physical layer status of the interface is Up.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
NOTE
----End
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run either of the following commands.
l To assign an IP address to the interface, run:
ip address ip-address { mask | mask-length } [ sub ]
NOTE
Before configuring IP address unnumbered on an interface on which HDLC runs as a data link
layer protocol, ensure that the interface borrowing an IP address can learn a route to the peer;
otherwise, data cannot be transmitted to the peer.
----End
Context
The parameters for HDLC link status monitoring are as follows:
l Keepalive time
– Polling interval
The polling interval determines how often an interface sends a Keepalive message.
When HDLC is specified as the link layer protocol on the interface, the interface
sends a Keepalive message to its peer device at the set polling interval. If the
interface fails to receive the Keepalive message from the peer after a specified
number of polling intervals, the interface considers the peer device to be faulty and
sets the HDLC link to Down. In situations with unfavorable network delay or
significant congestion, you can increase the polling interval to reduce network
flapping.
– Keepalive count
If a device does not receive a Keepalive message from its peer within a specified
polling interval, the Keepalive count increases by 1. If the device still fails to
receive a Keepalive message from its peer after a specified Keepalive count is
reached, the device considers the link connecting to the peer device to be faulty and
sets the HDLC link to Down.
The Keepalive time equals the polling interval multiplied by the Keepalive count. In
situations with unfavorable network delay or significant congestion, a short Keepalive
time may cause network flapping. Conversely, a long Keepalive time would lead to slow
link detection. Therefore, make sure that the Keepalive time is appropriate and fits the
network situations.
l IP-Trunk member link monitoring
An IP-Trunk link is established between two devices, and multiple transmission devices
may be deployed on the link to transparently transmit data. If a link connecting a POS
interface of the IP-Trunk is faulty, the POS interface sets its HDLC status to Down. If the
loopback detection function is enabled on the transmission devices, loopback messages
will cause the HDLC status of the POS interface to become Up. As a result, IP-Trunk
traffic will continue to be distributed to the faulty POS interface and gets discarded,
causing service interruption. To prevent IP-Trunk traffic from being discarded, you can
enable IP-Trunk member link monitoring so that when a POS interface detects a
loopback message, the POS interface sets its HDLC status to Down.
Procedure
l Configure a polling interval.
a. Run system-view
NOTE
The polling intervals on two interconnected devices must be set to the same value (other
than 0s). If both polling intervals are set to 0s, the link detection function is disabled.
d. Run commit
Context
Optical fiber flapping on a physical interface causes HDLC link to flap between Up and
Down frequently. This results in unstable link or network layers. To prevent HDLC flapping
from causing flapping of link or network layers, configure the HDLC link dampening
function. By default, HDLC link dampening function is enabled.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run hdlc dampening level { light | middle | heavy | manual { half-life-period half-life-
period suppress-threshold suppress-threshold reuse-threshold reuse-threshold max-
suppress-time max-suppress-time } }
The HDLC link dampening level is configured.
Step 3 (Optional) Run the hdlc dampening disable command to disable the HDLC link dampening.
If you do not want to use the HDLC link dampening function, run the hdlc dampening
disable command to disable the function.
----End
Prerequisites
Basic HDLC functions have been configured.
Procedure
l Run the display interface [ interface-type [ interface-number ] ] command to check the
interface status, link layer protocol, and configuration.
l The display hdlc interface [ interface-type interface-number ] command displays
HDLC link information on an interface.
----End
Usage Scenario
To improve communication capabilities of links, you can bundle multiple POS interfaces to
form an IP-Trunk interface. An IP-Trunk interface obtains the sum of bandwidths of member
interfaces. You can add POS interfaces to an IP-Trunk interface to increase the bandwidth of
the interface.
To prevent traffic congestion, traffic to the same destination can be balanced among member
links of the IP-Trunk interface, not along a single path.
You can configure an IP-Trunk interface to improve link reliability. If an IP-Trunk member
interface goes Down, the IP-Trunk interface can use other member interfaces in the Up state
to transmit data.
Pre-configuration Tasks
Before configuring an IP-Trunk interface, power on the device and verify that it is working
properly.
Procedure
l Perform the following steps in the IP-Trunk interface view:
a. Run system-view
d. Run commit
NOTE
HDLC must run as a link layer protocol on each interface to be added to an IP-Trunk
interface.
f. Run ip-trunk trunk-id
NOTE
----End
Procedure
Step 1 Run system-view
----End
Procedure
Step 1 Run system-view
NOTE
To ensure normal forwarding, configure the same lower threshold for the IP-Trunk interfaces on both
ends of an IP-Trunk link.
This command is mutually exclusive with the least active-bandwidth bandwidth command. Check that
the least active-bandwidth bandwidth command configuration does not exist before running this
command.
----End
Procedure
Step 1 Run system-view
NOTE
This command is mutually exclusive with the least active-linknumber link-number command. Check
that the least active-linknumber link-number command configuration does not exist before running this
command.
----End
Procedure
Step 1 Run system-view
l IP-based load balancing ensures packet sequence but not bandwidth use efficiency.
l Packet-based load balancing ensures bandwidth usage efficiency but not packet
sequence.
----End
Procedure
Step 1 On the Router that uses the IP-Trunk interface, run system-view
----End
Context
Perform the following steps on the devices where IP-Trunk interfaces are created:
Procedure
Step 1 Run system-view
An IP-Trunk member interface in the Up or Down state sends trap messages through the
private MIB.
The trap message sent through the public MIB does not carry information about the IP-Trunk
interface. If you want the trap message sent by an IP-Trunk member interface to carry
information about the IP-Trunk interface, run the trunk-member trap in private-mib enable
command.
----End
Prerequisites
An IP-Trunk interface has been configured.
Procedure
l Run the display interface ip-trunk [ trunk-id ] command to check the IP-Trunk
interface information, including the status.
l Run the display trunkmembership ip-trunk trunk-id command to check information
about member interfaces.
l Run the display trunkfwdtbl ip-trunk trunk-id [ slot slot-id ] command to check
information about the forwarding table for a link aggregation group.
----End
Context
Interface statistics cannot be restored after you delete it. Therefore, exercise caution when
running the reset command.
To clear interface statistics on the NMS or displayed using the display interface command,
you can run the reset command in the user view.
NOTE
For information on how to view the interface statistics on the NMS, see the NMS manual.
Procedure
l Run the reset counters interface [ interface-type [ interface-number ] ] command to
delete interface statistics.
----End
Networking Requirements
Device A and Device B are connected using HDLC-enabled POS interfaces.
interface1 interface1
10.1.1.1/24 10.1.1.2/24
DeviceA DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure HDLC as a link layer protocol on the interface of each Router.
2. Assign an IP address to each interface.
Data Preparation
To complete the configuration, you need the following data:
l IP address of the interface on Device A
l IP address of the interface on Device B
NOTE
The IP addresses of interfaces on Device A and Device B must be on the same network segment;
otherwise, the link layer protocol cannot go Up.
Procedure
Step 1 Configure Device A.
<HUAWEI> system-view
[*HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] interface pos 0/1/0
[~DeviceA-Pos0/1/0] link-protocol hdlc
[*DeviceA-Pos0/1/0] ip address 10.1.1.1 24
[*DeviceA-Pos0/1/0] undo shutdown
[*DeviceA-Pos0/1/0] quit
[*DeviceA] commit
Run the display ip routing-table command. The command output shows that routing
information is correct.
The following example uses the command output on Device A.
[~DeviceA] display ip routing-table
Route Flags: R - relay, D - download
to fib, T - to vpn-instance, B - black hole route
------------------------------------------------------------------------------
Routing Tables: Public
Destinations : 2 Routes : 2
Destination/Mask Proto Pre Cost Flags NextHop Interface
100.1.1.0/24 Direct 0 0 D 10.1.1.1 Pos0/1/0
10.1.1.1/32 Direct 0 0 D 127.0.0.1 Pos0/1/0
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
interface Pos0/1/0
undo shutdown
link-protocol hdlc
ip address 10.1.1.1 255.255.255.0
#
return
Networking Requirements
Device A and Device B are connected using HDLC-enabled POS interfaces.
POS 0/1/0 on Device A borrows the IP address of a loopback interface on Device A, and the
mask of the IP address is 32 bits.
Loopback 1
10.1.1.1/32
interface1
interface1 10.1.1.2/24
DeviceA DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure HDLC as a link layer protocol on the interface of each Router.
2. Configure the IP address to be borrowed, that is, the IP address of the loopback interface
on Device A.
3. Configure IP address unnumbered for the POS interface on Device A.
4. On Device A, configure a static route to Device B.
5. Assign an IP address to the interface on Device B.
Data Preparation
To complete the configuration, you need the following data:
l IP address of the loopback interface on Device A
l IP address of the POS interface on Device B
NOTE
These two IP addresses must be on the same network segment; otherwise, the link layer protocol cannot
go Up.
Procedure
Step 1 Configure Device A.
<HUAWEI> system-view
[*HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] interface loopback 1
[*DeviceA-LoopBack1] ip address 10.1.1.1 32
[*DeviceA-LoopBack1] quit
[*DeviceA] interface pos 0/1/0
[*DeviceA-Pos0/1/0] link-protocol hdlc
[*DeviceA-Pos0/1/0] ip address unnumbered interface loopback 1
[*DeviceA-Pos0/1/0] undo shutdown
[*DeviceA-Pos0/1/0] quit
[*DeviceA] commit
Run the display ip routing-table command. The command output shows that routing
information is correct.
The following example uses the command output on Device A.
[~DeviceA] display ip routing-table
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
ip route-static 10.1.1.0 255.255.255.0 Pos0/1/0
#
interface Pos0/1/0
link-protocol hdlc
undo shutdown
ip address unnumbered interface LoopBack1
#
interface LoopBack1
ip address 10.1.1.1 255.255.255.255
#
return
Interfaces 1 and 2 in this example are POS 0/1/0 and POS 0/2/0, respectively.
IP-Trunk1
Interface1 10.1.1.1/24 interface1
interface2 interface2
IP-Trunk1
DeviceA 10.1.1.2/24 DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Connect Device A to Device B using POS interfaces.
2. Create an IP-Trunk interface.
3. Add the POS interfaces to the IP-Trunk interface.
Data Preparation
To complete the configuration, you need the following data:
l IP address of the IP-Trunk interface on Device A
l IP address of the IP-Trunk interface on Device B
Procedure
Step 1 Configure Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[*DeviceA] commit
The IP-Trunk interfaces on Device A and Device B can ping each other.
[~DeviceA] ping -a 10.1.1.1 10.1.1.2
PING 10.1.1.2: 56 data bytes, press CTRL_C to break
Reply from 10.1.1.2: bytes=56 Sequence=1 ttl=255 time=62 ms
Reply from 10.1.1.2: bytes=56 Sequence=2 ttl=255 time=62 ms
Reply from 10.1.1.2: bytes=56 Sequence=3 ttl=255 time=62 ms
Reply from 10.1.1.2: bytes=56 Sequence=4 ttl=255 time=62 ms
Reply from 10.1.1.2: bytes=56 Sequence=5 ttl=255 time=62 ms
--- 10.1.1.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 62/62/62 ms
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
interface Ip-Trunk1
undo shutdown
ip address 10.1.1.1 255.255.255.0
#
interface Pos0/1/0
link-protocol hdlc
undo shutdown
ip-trunk 1
#
interface Pos0/2/0
link-protocol hdlc
undo shutdown
ip-trunk 1
#
return
#
interface Pos0/1/0
link-protocol hdlc
undo shutdown
ip-trunk 1
#
interface Pos0/2/0
link-protocol hdlc
undo shutdown
ip-trunk 1
#
return
8 PPP Configuration
Functioning at the data link layer of the Open Systems Interconnection (OSI) and the link
layer of the TCP/IP protocol suite, the Point-to-Point Protocol (PPP) is a link layer protocol
that is used to transmit network layer packets over point-to-point (P2P) links. PPP is
developed based on the Serial Line Internet Protocol (SLIP). PPP is widely used because it
provides user authentication, supports synchronous and asynchronous communication, and is
easy to extend.
Point-to-point (P2P) connections are simple wide area network (WAN) connections. A P2P
link uses PPP or High-Level Data Link Control (HDLC) as its link-layer protocol.
PPP, which works at the second layer (data link layer) of the open systems interconnection
(OSI) model, is mainly used on links that support full-duplex to transmit data. PPP is widely
used because it provides user authentication, supports synchronous and asynchronous
communication, and is easy to extend.
PPP uses the Password Authentication Protocol (PAP) and Challenge Handshake
Authentication Protocol (CHAP) to secure network communication.
If carriers have high bandwidth requirements, bundle multiple PPP links into an MP link to
increase link bandwidth and improve link reliability.
Usage Scenario
PPP is a link layer protocol that transmits network layer packets over P2P links. PPP defines a
group of protocols, including LCP and NCP.
l During the LCP negotiation phase, an MRU, negotiation timeout period, and PPP LCP
link dead duration are negotiated.
l During the NCP negotiation phase, network layer packet attributes and types are
negotiated. For example, during the IPCP negotiation, the IP address of a DNS server
will be negotiated.
To monitor link status in real time, configure link status monitoring parameters so that link
faults can be identified in time. A PPP link does not require that the peer route and local route
be on the same network segment. To avoid incorrect routing information, prohibit the addition
of the peer host route to the local routing table of direct routes.
Pre-configuration Tasks
Before configuring an interface to support PPP, connect the interface and set physical
parameters to ensure that the physical status of the interface is Up.
Configuration Procedures
The following flowchart shows how to configure an interface to support PPP.
Mandatory procedure
Optional procedure
Context
PPP is a data link layer protocol used to transmit network layer packets on P2P links. It is
extensible and supports both synchronous and asynchronous communication. Before
configuring PPP parameters of an interface, configure PPP as the link layer protocol of the
interface.
Procedure
Step 1 Run system-view
----End
Context
A PPP link is established between two communicating devices after successful LCP
negotiation and NCP negotiation. After the physical link goes Up, the two devices enter the
link establishment phase, during which one device initiates LCP negotiation. After LCP
negotiation succeeds, if the two devices have a network layer protocol configured, the device
continues to initiate NCP negotiation on network layer packet attributes and types.
LCP link dead During LCP negotiation, if the local device fails
duration to receive a reply packet from the remote device
after retransmitting LCP negotiation packets for a
specified number of times, the LCP negotiation
enters the Dead state, and the devices stop
performing LCP negotiation. In this situation,
configure an LCP link dead duration. After the
duration elapses, the local device will re-initiate
LCP negotiation.
DNS server IP During IPCP negotiation, the local device can NCP
address either provide a DNS server IP address for the negotiation
remote device or accept the DNS server IP phase
address assigned by the remote device. A DNS
server is responsible for resolving domain names.
l When a device is connected to a remote
device over a PPP link, for example, a PC
dials up to the device, configure the device to
assign a DNS server IP address to the PC.
l When a device is connected to a carrier's
access server over a PPP link, configure the
device to accept the DNS server IP address
assigned by the access server.
OSICP and MPLSCP When the default OSICP and MPLSCP NCP
configurations differ on devices that are to negotiation
communicate, enables or disables negotiation to phase
ensure consistent configurations on both devices.
NOTE
In VS mode, the configuration of Negotiation timeout period is supported only on the admin VS.
Procedure
l Configure PPP MRU negotiation.
a. Run system-view
If an IPv6 MTU is configured on the interface, enable PPP IPv6 MRU negotiation
for the device. After PPP MRU negotiation is enabled, to make this configuration
take effect, you must run the shutdown, commit, undo shutdown, and commit
commands in sequence, or run the restart and commit commands.
d. Run commit
After a DNS server address is configured, to make this configuration take effect, you
must run the shutdown, commit, undo shutdown, commit, or restart, commit
commands.
The negotiation between two devices before OSICP and MPLSCP go Up on both
devices can be enabled or disabled.
When the default OSICP and MPLSCP configurations differ on devices that are to
communicate, run the ppp osicp or ppp mplscp command as follows to ensure
consistent configurations on both devices:
n If OSICP and MPLSCP are configured to go Up without negotiation on a peer
device, run the ppp osicp disable or ppp mplscp disable command on a local
device.
n If OSICP and MPLSCP are configured to go Up only after negotiation on a
peer device, run the ppp osicp enable or ppp mplscp enable command on a
local device. Alternatively, use the default configuration on the local device.
NOTE
Run the shutdown and undo shutdown command in the interface view to make the configuration
take effect.
----End
Context
The parameters for PPP link status monitoring are as follows:
l Keepalive time
– Polling interval
The polling interval determines how often an interface sends a Keepalive message.
When PPP is specified as the link layer protocol on the interface, the interface sends
a Keepalive message to its peer device at the set polling interval. If the interface
fails to receive a Keepalive message from the peer after five polling intervals, the
interface considers the peer device to be faulty and sets the PPP link to Down. In
situations with unfavorable network delay or significant congestion, you can
increase the polling interval to reduce network flapping.
– Keepalive count
If a device does not receive a Keepalive message from its peer within a specified
polling interval, the Keepalive count increases by 1. If the device still fails to
receive a Keepalive message from its peer after a specified Keepalive count is
reached, the device considers the link connecting to the peer device to be faulty and
sets the PPP link to Down.
The Keepalive time equals the polling interval multiplied by the Keepalive count. In
situations with unfavorable network delay or significant congestion, a short Keepalive
time may cause network flapping. Conversely, a long Keepalive time would lead to slow
link detection. Therefore, make sure that the Keepalive time is appropriate and fits the
network situations.
l PPP magic number check
PPP magic number check is used to trigger LCP renegotiation. On a network where two
devices are connected over intermediate transmission devices, if the two devices are
incorrectly connected, the transmission devices will adjust the connection relationship
between the two devices. However, the two devices are not aware of this adjustment
because the status of their interfaces does not alternate between Down and Up.
Consequently, LCP renegotiation between the two devices is not triggered. After the PPP
magic number check function is enabled, when the local device finds that the magic
number carried in the Echo Reply packet from the remote device is inconsistent with the
one previously learned, the local device will record an error. After error statistics on an
interface reach a specific threshold, the interface sets the PPP link to Down, triggering
LCP renegotiation.
Procedure
l Configure a polling interval.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
c. Run timer hold seconds
A polling interval is configured.
NOTE
The polling intervals on two interconnected devices must be set to the same value (other
than 0s). If both polling intervals are set to 0s, the link detection function is disabled.
d. Run commit
The configuration is committed.
l Configure a Keepalive count.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
c. Run keepalive count count-number
A Keepalive count is configured.
d. Run commit
l Currently, the magic number check function can only be enabled on a POS
interface.
l After configuring the PPP magic number check function, to make the
configuration take effect, you must run the shutdown, commit, undo
shutdown, and commit commands in sequence, or run the restart and commit
commands.
----End
Context
Devices on both ends of a PPP link may have IP addresses at different network segments.
When the two devices communicate with each other, one device automatically adds the host
route of the other end to the local routing table of direct routes. If one end has an incorrect IP
address configured, incorrect routing information will be advertised on the network. To
prevent incorrect routing information, prohibit the local device from adding the peer host
route to the local routing table of direct routes.
Procedure
Step 1 Run system-view
The device is prohibited from adding the peer host route to the local routing table of direct
routes.
----End
Context
Optical fiber flapping on a physical interface causes PPP link to alternate between Up and
Down frequently. This results in unstable link or network layers. To prevent the link or
network layer flapping from causing PPP link frequent alternating between Up and Down,
configure the PPP link dampening function. By default, PPP link dampening is enabled.
Procedure
Step 1 Run system-view
Step 2 Run ppp dampening level { light | middle | heavy | manual { half-life-period half-life-
period suppress-value suppress-value reuse-value reuse-value max-suppress-time max-
suppress-time } }
When the PPP link dampening function is enabled, run the ppp dampening level command
to configure a light, middle, or heavy dampening level based on PPP link dampening
requirements, or configure suppress-value manually.
l light: If light PPP link dampening is configured, dampening procedure will be triggered
only when the PPP link flaps frequently and rapidly.
l middle: If middle PPP link dampening is configured, intensity of PPP link dampening is
between the light and heavy.
l heavy: If heavy PPP link dampening is configured, dampening will be triggered even if
link flapping is not severe. That is, the link is vulnerable to dampening.
l manual: If PPP link dampening is configured manually, you can configure a PPP link
dampening level based on sensitivity of flapping.
----End
Prerequisites
PPP has been configured as the link layer protocol.
Procedure
l Run the display interface [ interface-type [ interface-number ] ] command to check the
status of and statistics about a specific PPP-enabled interface.
l Run the display ppp information interface interface-type interface-number command
to check PPP link information about a specific interface.
----End
Usage Scenario
CHAP authentication is performed before a link is set up. After a link is set up, CHAP
authentication can be repeatedly performed anytime using CHAP negotiation packets.
In unidirectional CHAP authentication, one of two communicating parties functions as the
authenticator, whereas the other functions as the supplicant. The authenticator sends a
Challenge packet to the supplicant. After performing one hash calculation, the supplicant
returns a calculated value to the authenticator. The authenticator compares the value
calculated by itself using the hash algorithm with the value sent by the supplicant. If the two
values match, authentication is successful. If the two values are different, the authentication
fails, and the link is torn down.
Pre-configuration Tasks
Before configuring unidirectional CHAP authentication, complete the following tasks:
l Connect interfaces and configure physical parameters of the interfaces to ensure that the
physical status of the interfaces is Up.
l Configure PPP as the link layer protocol of the interfaces.
l Add the user name and password of the supplicant to the user list of the authenticator in
the AAA view.
Configuration Procedures
In CHAP authentication, the authenticator can be configured with or without a user name. In
practice, you can configure any type of unidirectional CHAP authentication as required.
You can configure the authenticator with a user name to authenticate its peer in CHAP mode.
Procedure
l Configure the authenticator.
a. Run system-view
The system view is displayed.
b. Run aaa
The AAA view is displayed.
c. Run local-user user-name password [ cipher password | irreversible-cipher
irreversible-cipher-password ]
The user name and password of the supplicant are added to the local user list.
d. Run quit
Return to the system view.
e. Run interface interface-type interface-number
The interface view is displayed.
f. Run ppp authentication-mode chap [ pap ]
The local end is configured to authenticate the peer in CHAP mode.
You can run the ppp authentication-mode chap [ pap ] command to perform
CHAP authentication preferentially in LCP negotiation. If the peer does not support
CHAP authentication, PAP authentication is performed. If the peer supports neither
CHAP nor PAP, LCP negotiation fails. Either CHAP or PAP is involved in a PPP
negotiation.
g. Run ppp chap user user-name
A user name is specified.
h. Perform the following steps to restart the interface:
i. Run the shutdown command to shut down the interface.
ii. Run the commit command to make the configuration take effect.
iii. Run the undo shutdown command to restart the interface.
NOTE
The shutdown, commit, and undo shutdown commands must be run in sequence so that
the preceding configuration can take effect after the interface is restarted.
i. Run commit
The configuration is committed.
The shutdown, commit, and undo shutdown commands must be run in sequence so that
the preceding configuration can take effect after the interface is restarted.
h. Run commit
The configuration is committed.
----End
Procedure
l Configure the authenticator.
a. Run system-view
The system view is displayed.
b. Run aaa
The AAA view is displayed.
c. Run local-user user-name password [ cipher password | irreversible-cipher
irreversible-cipher-password ]
The user name and password of the supplicant are added to the local user list.
d. Run quit
Return to the system view.
e. Run interface interface-type interface-number
The interface view is displayed.
f. Run ppp authentication-mode chap [ pap ]
The local end is configured to authenticate the peer in CHAP mode.
You can run the ppp authentication-mode chap [ pap ] command to perform
CHAP authentication preferentially in LCP negotiation. If the peer does not support
CHAP authentication, PAP authentication is performed. If the peer supports neither
CHAP nor PAP, LCP negotiation fails. Either CHAP or PAP is involved in a PPP
negotiation.
g. Run shutdown
The interface is shut down.
h. Run commit
The configuration is committed.
i. Run undo shutdown
The interface is restarted.
NOTE
If the user name or password is changed in the interface view, run the shutdown and undo
shutdown commands in the interface view to make the configuration take effect.
During an interface restart, you need to run the commit command to submit the
configuration after running the shutdown command.
j. Run commit
The configuration is committed.
l Configure the supplicant.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
c. Run ppp chap user user-name
A user name is specified.
d. Run ppp chap password { cipher password | simple password }
The password for CHAP authentication is set.
e. Run shutdown
The interface is shut down.
f. Run commit
The configuration is committed.
g. Run undo shutdown
The interface is restarted.
NOTE
If the user name or password is changed in the interface view, run the shutdown and undo
shutdown commands in the interface view to make the configuration take effect.
During an interface restart, you need to run the commit command to submit the
configuration after running the shutdown command.
h. Run commit
The configuration is committed.
----End
Prerequisites
Unidirectional CHAP authentication has been configured.
Procedure
l Run the display interface [ interface-type [ interface-number ] ] command to check the
PPP configuration and running status on the current interface.
----End
Usage Scenario
In PAP authentication, passwords are sent over a link in simple text. The user name and
password of a supplicant can be added to the user list of the authenticator in authentication,
authorization and accounting (AAA) mode or sent to a Remote Authentication Dial-In User
Service (RADIUS) server for authentication.
In unidirectional PAP authentication, one of two communicating parties functions as the
authenticator, whereas the other functions as the supplicant. In bidirectional PAP
authentication, two communicating parties function as both the authenticator and supplicant
of each other.
This section describes how to configure unidirectional PAP authentication by adding the user
name and password of the supplicant to the user list of the authenticator.
Pre-configuration Tasks
Before configuring unidirectional PAP authentication, complete the following tasks:
l Connect interfaces correctly and configure physical parameters for the interfaces to
ensure that the physical layer status of the interfaces is Up.
Configuration Procedures
There are two types of unidirectional PAP authentication: the authenticator authenticating the
supplicant in PAP mode and the supplicant being authenticated in PAP mode. You can
configure either of the types as required.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run aaa
The AAA view is displayed.
Step 3 Run local-user user-name password [ cipher password | irreversible-cipher irreversible-
cipher-password ]
The user name and password of the supplicant are added to the local user list.
Step 4 Run quit
Return to the system view.
Step 5 Run interface interface-type interface-number
The view of the interface of the authenticator is displayed.
Step 6 Run ppp authentication-mode pap
The local end is configured to authenticate the peer in PAP mode.
Step 7 Perform the following steps to restart the interface:
1. Run the shutdown command to shut down the interface.
2. Run the commit command to make the configuration take effect.
3. Run the undo shutdown command to restart the interface.
NOTE
The shutdown, commit, and undo shutdown commands must be run in sequence so that the preceding
configuration can take effect after the interface is restarted.
----End
Procedure
Step 1 Run system-view
Step 3 Run ppp pap local-user user-name password { cipher password | simple password }
The interface is configured to send the local user name and password to the authenticator
when the local end is authenticated in PAP mode.
The shutdown, and undo shutdown commands must be run in sequence so that the preceding
configuration can take effect after the interface is restarted.
----End
Prerequisites
Unidirectional PAP authentication has been configured.
Procedure
l Run the display interface [ interface-type [ interface-number ] ] command to check the
link status and LCP running status of the current interface.
----End
8.5 Configuring MP
The Multilink Point-to-Point Protocol (MP) is a technique that bundles multiple Point-to-
Point Protocol (PPP) links together to increase link bandwidth and improve link reliability.
Usage Scenario
A single PPP link provides only limited bandwidth. To increase link bandwidth and reliability,
bundle multiple PPP links into an MP link.
In Figure 8-2, there are three PPP links between Device A and Device B. You can add these
three PPP links to an MP-Group to create an MP link. Compared with a single PPP link, an
MP link provides higher bandwidth. In an MP-Group, although one PPP link fails, other links
keep properly transmitting services.
Device A Device B
Pre-configuration Tasks
Before you configure an MP link, establish PPP links.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface mp-group number
An MP-Group interface is created, and the MP-Group interface view is displayed.
Step 3 Assign an IP address to the MP-Group interface.
Perform either of the following operations to assign an IP address to the MP-Group interface:
l To specify an IP address, run:
Run ip address ip-address { mask | mask-length }
l To configure the MP-Group interface to obtain an IP address from the remote device
using PPP negotiation, run:
Run ip address ppp-negotiate
Step 4 Run quit
Return to the system view.
Step 5 Run interface serial interface-number
The interface view is displayed.
Step 6 Run ppp mp mp-group number
The interface is added to the MP-Group interface so that the interface works in MP mode.
NOTE
The number value specified in this step must be the same as the number value specified in Step 2.
The shutdown, commit, and undo shutdown commands must be run in sequence so that the preceding
configuration can take effect after the interface is restarted.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface mp-group number
An MP-Group interface is created, and the MP-Group interface view is displayed.
Step 3 Run undo discriminator
Endpoint discriminator negotiation is disabled.
NOTE
The endpoint discriminator negotiation configurations on both ends must be the same so that the LCP
status can be Up. If the undo discriminator command is run on one end, whereas the discriminator
command on the other end, the parameters sent by the end with the undo discriminator command
configured do not contain the endpoint discriminator, but this end accepts the endpoint discriminator of
the other end. As a result, the MP link fails to be established.
The shutdown, commit, and undo shutdowncommands must be run in sequence so that the preceding
configuration can take effect after the interface is restarted.
----End
Context
The interface MRRU, which is used in Link Control Protocol (LCP) negotiation, is closely
related to the interface maximum transmission unit (MTU):
l If the MRRU of the peer MP-Group interface is greater than or equal to the MTU of the
local MP-Group interface, the local MP-Group interface keeps its own MTU unchanged
during LCP negotiation.
l If the MRRU of the peer MP-Group interface is less than the MTU of the local MP-
Group interface, the local MP-Group interface uses the MRRU of the peer MP-Group
interface as its own MTU during LCP negotiation.
Procedure
Step 1 Run system-view
The shutdown, commit, and undo shutdown commands must be run in sequence so that the preceding
configuration can take effect after the interface is restarted.
----End
Context
A sequence number in the packet header indicates the sequence of a fragmented packet. The
header of an MP packet can use either a 12-bit short sequence number or a 24-bit long
sequence number. To configure an MP-group interface to use the short sequence number
contained in packet headers to perform negotiation, run the short-sequence command. Using
short sequence number for negotiation shortens the packet length and improves
communication reliability.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface mp-group number
An MP-Group interface is created, and the MP-Group interface view is displayed.
Step 3 Run short-sequence
The MP-group interface is configured to use the short sequence number contained in packet
headers to perform negotiation.
The shutdown, commit, and undo shutdown commands must be run in sequence so that the preceding
configuration can take effect after the interface is restarted.
----End
Context
To improve bandwidth use efficiency on an MP link, configure MP fragmentation and set a
proper size for MP fragments.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 (Optional) Run mp statistics fragment-mode enable
The fragment statistical mode is configured for all MP-group interfaces and global MP-group
interfaces.
Step 3 Run interface mp-group number
NOTE
The MP fragment maximum size of 256 bytes is recommended.
The shutdown, commit, and undo shutdown commands must be run in sequence so that the preceding
configuration can take effect after the interface is restarted.
----End
Context
The flapping status of an MP link reflects the bandwidth stability of the MP link. In a
specified monitoring period, if the number of flapping times of an MP member link exceeds
the specified maximum number of flapping times, configure flapping damping for MP
member links.
NOTE
After an MP member link is dampened, the interfaces on the two ends of the member link enter the
damping state. The data link layer status of the end interfaces for the member link is DOWN (damping)
in the display interface mp-group command output.
The minimum number of PPP links allowed for an MP link determines the minimum
bandwidth of the MP link. To meet bandwidth requirements, you can configure the minimum
number of PPP links allowed for an MP link.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface mp-group number
An MP-Group interface is created, and the MP-Group interface view is displayed.
Step 3 Run ppp mp damping [ detect-time detect-time flapping-count flapping-count damping-
time damping-time ]
Flapping damping is configured for the member links of the MP link.
The shutdown, commit, and undo shutdown commands must be run in sequence so that the preceding
configuration can take effect after the interface is restarted.
----End
Prerequisites
MP has been configured.
Procedure
l Run the display interface mp-group [ number ] command to check the status of and
traffic statistics on an MP-Group interface.
l Run the display ppp mp [ interface interface-type interface-number ] command to
check information about member interfaces of an MP-Group interface and statistics
about the packets sent and received by the MP-Group interface.
l Run the display ppp error-packet interface-type interface-number command to check
statistics about error packets received by a Point-to-Point Protocol (PPP) interface.
l Run the display time-delay-detect status command to check the transmission delays of
MP-Group member links.
----End
Networking Requirements
In Figure 8-3, Device A and Device B are connected using LMP interfaces. Device A is
required to authenticate Device B in PAP mode.
interface1
10.110.0.1/24
Precautions
None
Configuration Roadmap
The configuration roadmap is as follows:
1. Add the user name and password of Device B to the local user list of Device A.
2. Configure Device A to authenticate Device B in PAP mode.
3. Configure Device B to send its user name and password to Device A.
Data Preparation
To complete the configuration, you need the following data:
l User name and password of Device B
l IP address of the Lmpif interface on Device A
l IP address of the Lmpif interface on Device B
Procedure
Step 1 Configure Device A.
# Add the user name and password of Device B to the local user list of Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] aaa
[*DeviceA-aaa] local-user rtb password cipher Hello-1234
[*DeviceA-aaa] quit
# Assign an IP address to Lmpif 0/1/0 and configure PPP as a link layer protocol of the
interface.
[~DeviceA] interface Lmpif 0/1/0
[~DeviceA-Lmpif0/1/0] ip address 10.110.0.1 255.255.255.0
[*DeviceA-Lmpif0/1/0] link-protocol ppp
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
interface Lmpif0/1/0
undo shutdown
link-protocol ppp
ip address 10.110.0.1 255.255.255.0
ppp authentication-mode pap
#
aaa
local-user rtb password cipher @%@%j]v~7%f[#S'W>j9zzM)3,*!u@%@%
#
return
Networking Requirements
In Figure 8-4, Device A is required to authenticate Device B in CHAP mode. The
authenticator, Device A, needs to be assigned a user name.
interface1
10.110.0.1/24
Precautions
None
Configuration Roadmap
The configuration roadmap is as follows:
1. Add the user name and password of Device B to the local user list of Device A.
2. Configure a user name on the interface of Device A.
3. Enable the interface on Device A to authenticate Device B in CHAP mode.
4. Add the user name and password of Device A to the local user list of Device B.
5. Configure a user name on the interface of Device B.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure Device A.
# Add the user name and password of Device B to the local user list of Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] aaa
[~DeviceA-aaa] local-user rtb password cipher Hello-12345
[*DeviceA-aaa] quit
# Assign an IP address to Lmpif 0/1/0 and configure PPP as a link layer protocol of the
interface.
[~DeviceA] interface Lmpif 0/1/0
[~DeviceA-Lmpif0/1/0] ip address 10.110.0.1 255.255.255.0
[*DeviceA-Lmpif0/1/0] link-protocol ppp
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
interface Lmpif0/1/0
undo shutdown
link-protocol ppp
ip address 10.110.0.1 255.255.255.0
ppp authentication-mode chap
ppp chap user rta
#
aaa
local-user rtb password cipher @%@%j]v~7%f[#S'W>j9zzM)3,*!u@%@%
#
return
sysname DeviceB
#
interface Lmpif0/1/0
undo shutdown
link-protocol ppp
ip address 10.110.0.2 255.255.255.0
ppp chap user rtb
ppp chap password cipher Huawei-123
#
return
Networking Requirements
In Figure 8-5, Device A and Device B are required to authenticate each other in CHAP mode.
interface1
10.110.0.1/24
Precautions
None
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
NOTE
Device A and Device B must use the same password; otherwise the authentication fails.
Procedure
Step 1 Configure Device A.
# Add the user name and password of Device B to the local user list of Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] aaa
[~DeviceA-aaa] local-user rtb password cipher Hello-456
[*DeviceA-aaa] quit
# Assign an IP address to Lmpif 0/1/0 and configure PPP as a link layer protocol of the
interface.
[~DeviceA] interface Lmpif 0/1/0
[*DeviceA-Lmpif0/1/0] ip address 10.110.0.1 255.255.255.0
[*DeviceA-Lmpif0/1/0] link-protocol ppp
# Assign an IP address to Lmpif 0/1/0 and configure PPP as a link layer protocol of the
interface.
[~DeviceB] interface Lmpif 0/1/0
[~DeviceB-Lmpif0/1/0] ip address 10.110.0.2 255.255.255.0
[*DeviceB-Lmpif0/1/0] link-protocol ppp
[*DeviceB-Lmpif0/1/0] commit
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
interface Lmpif0/1/0
undo shutdown
link-protocol ppp
ip address 10.110.0.1 255.255.255.0
ppp authentication-mode chap
ppp chap user rta
ppp chap password cipher Huawei-123
#
aaa
local-user rtb password cipher @%@%j]v~7%f[#S'W>j9zzM)3,*!u@%@%
#
return
Networking Requirements
On the network shown in Figure 8-6, Device A and Device B connect to each other through
two pairs of E1 interfaces.
A single link sometimes cannot support data transmission when services are busy. To quickly,
efficiently, and securely increase the available transmission bandwidth for data transmission,
MP groups can be used.
In this example, interface1, interface2, interface3, and interface4 represent E1 0/1/0, E1 0/1/1, E1 0/2/0,
and E1 0/2/1respectively.
interface1 interface3
interface2 interface4
DeviceA DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Create MP-group interfaces.
2. Create synchronous serial interfaces and add the interfaces to the MP-group interfaces.
3. Restart all the interfaces to make the configuration take effect.
Data Preparation
To complete the configuration, you need the following data:
The interface to be added to an MP-group interface must have the same slot number and card number as
the MP-group interface.
The timeslot channels of the serial interfaces on Device A must be the same as those on Device B.
Procedure
Step 1 Create MP-group interfaces.
Step 2 Create synchronous serial interfaces and add the interfaces to the MP-group interfaces.
# Configure E1 interfaces of Device A as synchronous serial interfaces and add them to the
MP-group interface.
[~DeviceA] controller e1 0/1/0
[~DeviceA-E1 0/1/0] channel-set 1 timeslot-list 1-15
[*DeviceA-E1 0/1/0] commit
[~DeviceA-E1 0/1/0] quit
[~DeviceA] controller e1 0/1/1
[~DeviceA-E1 0/1/1] channel-set 1 timeslot-list 16-31
[*DeviceA-E1 0/1/1] commit
[~DeviceA-E1 0/1/1] quit
[~DeviceA] interface serial 0/1/0:1
[~DeviceA-Serial0/1/0:1] link-protocol ppp
[*DeviceA-Serial0/1/0:1] ppp mp mp-group 0/1/1
[*DeviceA-Serial0/1/0:1] commit
[~DeviceA-Serial0/1/0:1] quit
[~DeviceA] interface serial 0/1/1:1
[~DeviceA-Serial0/1/1:1] link-protocol ppp
[*DeviceA-Serial0/1/1:1] ppp mp mp-group 0/1/1
[*DeviceA-Serial0/1/1:1] commit
[~DeviceA-Serial0/1/1:1] quit
# Configure E1 interfaces of Device B as synchronous serial interfaces and add them to the
MP-group interface.
[~DeviceB] controller e1 0/2/0
[~DeviceB-E1 0/2/0] channel-set 1 timeslot-list 1-15
[*DeviceB-E1 0/2/0] commit
[~DeviceB-E1 0/2/0] quit
[~DeviceB] controller e1 0/2/1
[~DeviceB-E1 0/2/1] channel-set 1 timeslot-list 16-31
[*DeviceB-E1 0/2/1] commit
[~DeviceB-E1 0/2/1] quit
[~DeviceB] interface serial 0/2/0:1
[~DeviceB-Serial0/2/0:1] link-protocol ppp
[*DeviceB-Serial0/2/0:1] ppp mp mp-group 0/2/1
[*DeviceB-Serial0/2/0:1] commit
[~DeviceB-Serial0/2/0:1] quit
[~DeviceB] interface serial 0/2/1:1
[~DeviceB-Serial0/2/1:1] link-protocol ppp
Step 3 Restart all the interfaces to make the configuration take effect.
# Restart the synchronous serial and MP-group interfaces on Device A.
[~DeviceA] interface serial 0/1/0:1
[~DeviceA-Serial0/1/0:1] undo shutdown
[*DeviceA-Serial0/1/0:1] commit
[~DeviceA-Serial0/1/0:1] quit
[~DeviceA] interface serial 0/1/1:1
[~DeviceA-Serial0/1/1:1] undo shutdown
[*DeviceA-Serial0/1/1:1] commit
[~DeviceA-Serial0/1/1:1] quit
[~DeviceA] interface mp-group 0/1/1
[~DeviceA-Mp-group0/1/1] undo shutdown
[*DeviceA-Mp-group0/1/1] commit
[~DeviceA-Mp-group0/1/1] quit
# On Device B, check information about the MP-group interface and statistics about the
packets sent and received by the MP-group interface.
[~DeviceB] display ppp mp interface mp-group 0/2/1
Mp-group is Mp-group0/2/1
===========Sublinks status begin======
Serial0/2/0:1 physical UP,protocol UP
Serial0/2/1:1 physical UP,protocol UP
===========Sublinks status end========
Bundle Multilink, 2 member, slot 2, Master link is Mp-group0/2/1
0 lost fragments, 0 reordered, 0 unassigned, 0 interleaved,
sequence 0/0 rcvd/sent
The bundled son channels are:
Serial0/2/0:1
Serial0/2/1:1
# On Device A, ping the IP address of MP-group 0/2/1 on Device B. The command output
shows that the ping is successful.
[~DeviceA] ping 10.1.1.2
PING 10.1.1.2: 56 data bytes, press CTRL_C to break
Reply from 10.1.1.2: bytes=56 Sequence=1 ttl=255 time=29 ms
Reply from 10.1.1.2: bytes=56 Sequence=2 ttl=255 time=31 ms
Reply from 10.1.1.2: bytes=56 Sequence=3 ttl=255 time=29 ms
Reply from 10.1.1.2: bytes=56 Sequence=4 ttl=255 time=30 ms
Reply from 10.1.1.2: bytes=56 Sequence=5 ttl=255 time=30 ms
--- 10.1.1.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 29/29/31 ms
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
controller E1 0/1/0
channel-set 1 timeslot-list 1-15
#
interface Serial0/1/0:1
undo shutdown
link-protocol ppp
ppp mp Mp-group0/1/1
#
controller E1 0/1/1
channel-set 1 timeslot-list 16-31
#
interface Serial0/1/1:1
undo shutdown
link-protocol ppp
ppp mp Mp-group0/1/1
#
interface Mp-group0/1/1
undo shutdown
ip address 10.1.1.1 255.255.255.0
#
return
9 TDM Configuration
This chapter describes the basic information about the TDM, and describes how to configure
the TDM service.
Based on TDM circuits on a PSN, TDM Circuits over Packet Switching Networks
(TDMoPSN) is a kind of PWE3 service emulation. TDMoPSN emulates TDM services over a
PSN such as an MPLS or Ethernet network; therefore, transparently transmitting TDM
services over a PSN. TDMoPSN is mainly implemented by means of two protocols:
Structure-Agnostic TDM over Packet (SAToP) and Structure-Aware TDM Circuit Emulation
Service over Packet Switched Network (CESoPSN).
l CESoPSN
The Structure-aware TDM Circuit Emulation Service over Packet Switched Network
(CESoPSN) function simulates PDH circuit services of low rate on E1/T1/E3 interfaces.
Different from SAToP, CESoPSN provides structured simulation and transmission of
TDM services. That is, with a framed structure, it can identify and transmit signaling in
the TDM frame.
Features of the structured transmission mode are as follows:
– When services are carried on the PSN, the TDM structure needs to be protected
explicitly.
– The transmission with a sensitive structure can be applied to the PSN with poor
network performance. In this manner, the transmission is more reliable.
l SAToP
The Structure-Agnostic TDM over Packet (SAToP) function emulates PDH circuit
services of low rate.
SAToP is used to carry E1/T1/E3 services in unframed mode (non-structured). It divides
and encapsulates serial data streams of TDM services, and then transmits encapsulated
packets in a PW. SAToP is the most simple method to handle transparent transmission of
PDH low-rate services in TDM circuit simulation schemes.
Features of non-structured transmission mode are as follows:
– The mode does not need to protect the integrity of the structure; it does not need to
explain or operate the channels.
– It is suitable for the PSN of higher transmission performance.
– It needs to neither distinguish channels nor interrupt TDM signaling.
The fast alarm processing Plan services properly. The fast alarm processing
function for TDM PWE3 function for TDM PWE3
services on a 4-port CPOS services on a 4-port CPOS
subcard cannot be subcard cannot be
configured on CPOS configured on CPOS
interface 3 (interface range interface 3 (interface range
0-3). 0-3).
The fast alarm processing Plan services properly. The fast alarm processing
function for TDM PWE3 function for TDM PWE3
services on a 4-port CPOS services on a 4-port CPOS
subcard cannot be subcard cannot be
configured on CPOS configured on CPOS
interface 3 (interface range interface 3 (interface range
0-3). 0-3).
Applicable Environment
Services of the 2G RAN network, mainly a small number of voice services, are transmitted
over TDM links. Generally, one to three E1 interfaces on a BTS are connected to a BSC.
Some mobile carriers do not own fixed network infrastructure, and therefore have to lease E1
lines of the fixed network at a high price.
With the introduction of TDMoPSN services, the services between the CEs in the same city
can be transparently transmitted over TDM links in a Metro Ethernet (ME) network. Data of
the Fractional E1 interface can be transmitted from the BTS to BSC in the mode of
structuralized TDM circuit emulation.
A PW is established between Router through VLL or PWE3 to transparently transmit TDM
frames.
Pre-configuration Tasks
Before configuring a TDMoPSN service, complete the following tasks on the routers at both
ends of the PW:
l Configure static routes or an IGP protocol on PEs and Ps on the MPLS backbone
network to ensure IP connectivity.
l Configure basic MPLS functions on PEs and Ps of the MPLS backbone network.
l Set up LDP sessions among PEs (if the PEs are indirectly connected, set up remote LDP
sessions between them).
l Establish tunnels between PEs based on the tunnel policy (if no tunnel policy is
configured, the default tunnel policy LDP is used).
l Configure synchronous serial interfaces and TDM link protocols.
Context
The local CCC connection is bidirectional, and only one connection is required.
Perform the following steps on PEs:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run mpls l2vpn
MPLS L2VPN is enabled.
Step 3 Run quit
Return to the system view.
Step 4 Run ccc ccc-connection-name interface interface-type1 interface-number1 out-interface
interface-type2 interface-number2 [ jitter-buffer depth | idle-code idle-code-value | rtp-
header | tdm-encapsulation number ]
A local CCC connection is created.
----End
Follow-up Procedure
After the configuration mentioned above on the PE, a local CCC connection is created.
Context
At the edge of a PSN, PE1 on the user side is connected downstream to CE1, and PE2 on the
network side is connected to upstream CE2. Both PEs require the following configurations,
whereas devices inside the PSN do not.
The following PW types are supported:
l SVC
l PWE3
Referring to the configuration of a PW, take the dynamic PWE3 as an example.
The procedures for configuring the preceding parameters in the two views are as follows:
Procedure
l Create a PW in the PW template view.
a. Run system-view
The system view is displayed.
b. Run mpls l2vpn
MPLS L2VPN is enabled.
c. Run pw-template pw-template-name
A PW template is created and the PW template view is displayed.
d. Run peer-address ip-address
An IP address is assigned to the peer PE of the PW.
e. Run tnl-policy policy-name
A policy is configured for the PW template to select tunnels.
f. (Optional) Run jitter-buffer depth depth
The depth of the jitter buffer is set.
g. (Optional) Run tdm-encapsulation-number number
The number of TDM frames encapsulated in a CESoPSN or SAToP packet is set.
h. (Optional) Run rtp-header
A dynamic PW is created.
l. (Optional) Run trap-threshold { ces-jtrovr-exc | ces-jtrudr-exc | ces-lospkt-exc |
ces-malpkt-exc | ces-misorderpkt-exc | ces-straypkt-exc } trigger-threshold
trigger-threshold-value resume-threshold resume-threshold-value
The alarm and clear alarm thresholds of CES service performance are set.
m. (Optional) Run pw-control-word rml-bit enable
A dynamic PW is created.
e. (Optional) Run trap-threshold { ces-jtrovr-exc | ces-jtrudr-exc | ces-lospkt-exc |
ces-malpkt-exc | ces-misorderpkt-exc | ces-straypkt-exc } trigger-threshold
trigger-threshold-value resume-threshold resume-threshold-value
The alarm and clear alarm thresholds of CES service performance are set.
f. (Optional) Run pw-control-word rml-bit enable
Context
The local CCC connection is bidirectional, and only one connection is required.
Perform the following steps on PEs:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run mpls l2vpn
MPLS L2VPN is enabled.
Step 3 Run quit
Return to the system view.
Step 4 Run controller cpos cpos-number
The CPOS interface view is displayed.
Step 5 Run using vc4
The CPOS interface is configured to work in clear channel mode, and a synchronous serial
interface is created on the CPOS interface.
Step 6 Run quit
Return to the system view.
Step 7 Run ccc ccc-connection-name interface interface-type1 interface-number1 out-interface
interface-type2 interface-number2 [ jitter-buffer depth | rtp-header ]
A local CCC connection is created.
Step 8 Run interface serial
The Serial interface view created in step 5 is displayed.
Step 9 (Optional) Run cep soh-transport enable
Enable SOH transport on a CEP interface.
Step 10 Run commit
The configuration is committed.
----End
Follow-up Procedure
After the configuration mentioned above on the PE, a local CCC connection is created.
Context
At the edge of a PSN, PE1 on the user side is connected downstream to CE1, and PE2 on the
network side is connected to upstream CE2. Both PEs require the following configurations,
whereas devices inside the PSN do not.
The following PW types are supported:
l SVC
l PWE3
Referring to the configuration of a PW, take the dynamic PWE3 as an example.
The procedures for configuring the preceding parameters in the two views are as follows:
Procedure
l Create a PW in the PW template view.
a. Run system-view
The system view is displayed.
b. Run mpls l2vpn
MPLS L2VPN is enabled.
c. Run pw-template pw-template-name
A PW template is created and the PW template view is displayed.
d. Run peer-address ip-address
An IP address is assigned to the peer PE of the PW.
e. Run tnl-policy policy-name
A policy is configured for the PW template to select tunnels.
f. (Optional) Run jitter-buffer depth depth
The depth of the jitter buffer is set.
g. (Optional) Run rtp-header
The RTP header carried in the TDM transparent transmission encapsulation is
configured.
h. Run quit
Exit from the PW template view.
i. Run controller cpos cpos-number
The CPOS interface view is displayed.
Context
Run the following commands to check the previous configuration.
Procedure
l Run the display controller e1 controller-number command to check the configuration
and status of the E1/CE1 interface.
l Run the display mpls static-l2vc [ vc-id |interface interface-type interface-number |
state { down | up } ] or display mpls static-l2vc brief command to check information
about the static PW.
l Run the display mpls l2vc [ vc-id | interface interface-type interface-number ] or
display mpls l2vc brief command to check information about the dynamic PW.
----End
Configuration Procedures
Perform one or more of the following configurations as required.
Usage Scenario
In TDM dual feed and selective receiving scenarios, to enable a local serial interface to
rapidly notify an AC-side device of PW faults, enable fast alarm detection on the serial
interface. The AC-side device can then quickly learn the fault information and switch to a
normal link for data receiving.
Pre-configuration Tasks
Before configuring fast alarm detection on a serial interface, run the link-protocol tdm
command to enable TDM for the interface.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface serial interface-number
The view of the specified serial interface is displayed.
Step 3 Run fast-alarm-detect enable
Fast alarm detection is enabled.
Step 4 Run commit
The configuration is committed.
----End
Usage Scenario
If the NE40E is connected to an SDH device to bear the GSM-R service, configure the
function to send the 0xFF bit stream to notify the SDH device of an idle E1 channel timeslot
on a subcard, so that the SDH device can learn network-side PW faults rapidly.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run slot slot-id
The slot view is displayed.
Step 3 Run idle-code-e1 ff card card-id
The specified subcard is enabled to send the 0xFF bit stream to notify an idle E1 channel
timeslot, so that the subcard can quickly and continuously send AIS bit streams to the AC-
side device if network-side PW faults occur.
Step 4 Run commit
The configuration is committed.
----End
Usage Scenario
If the NE40E is connected to an SDH service to bear the GSM-R service, configure the
NE40E to notify PW-side and AC-side faults through TU-AIS and AIS bit streams,
respectively.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run controller cpos cpos-number
The view of a specific CPOS interface is displayed.
Step 3 Run sdh-alarm uni-tuais ces-underrun enable
The CPOS interface is enabled to send TU-AIS bit streams to an AC-side device when the
CES service is interrupted on the interface.
Step 4 Run sdh-alarm nni-ais lrdi enable
The CPOS interface is enabled to send AIS bit streams to a network-side device when an
LRDI alarm is detected on the interface.
Step 5 Run commit
The configuration is committed.
----End
Networking Requirements
Generally, on a 2G RAN, one to three E1 interfaces on a BTS are connected to a BSC. Some
mobile operators do not own fixed network infrastructure, and have to rent E1 lines of fixed-
line network operators at a high price. By deploying CESoPSN service, that is, CES
transparent transmission on a 2G RAN, these mobile operators can achieve transparent
transmission of 2G services between the BTSs and BSCs in the same city over CES links in a
Metro Ethernet (ME) network, which is both simple and cost-saving.
As shown in Figure 9-1, it is required that the BTSUser and PE1 should be connected through
two E1 links. The BSCCompany and PE2 should be connected through the CPOS interface.
On the channelized serial interface of E1 links, configure the encapsulation protocol as CES.
Then, a PW is set up between PE1 and PE2 to transparently transmit TDM data.
In thie example, Interface1 and Interface2 are GE0/2/0 and GE0/2/1 respectively.
BTS
BSC
E1 0/3/1 Interface1 Interface1
E1 0/3/2 CPOS 0/3/1
2×TDM E1 Interface1 Interface2
PE1 P PE2
PWE3 TDM
CE1 Transparent Cell Transport CE2
Loopback0 192.168.2.2/32
P GE 0/2/0 10.1.1.2/24
GE 0/2/1 10.2.1.1/24
Loopback0 192.168.4.4/32
Loopback0 192.168.3.3/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Run the IGP protocol on the backbone network so that devices can communicate with
each other.
2. Configure basic MPLS functions on the backbone network, and configure MPLS
L2VPN functions on PE devices. Establish the remote MPLS LDP peer relationship
between PEs at both ends of the PW.
3. Configure parameters for the TDM interface.
4. Configure the PW template.
Data Preparation
To complete the configuration, you need the following data:
l L2VC IDs at both ends of the PW (must be the same)
l MPLS LSR IDs of the PEs and P router
l IP addresses of the remote peers of PEs
l Coding mode and frame format of the E1/CE1 interface
Procedure
Step 1 Run the IGP protocol on the backbone network so that devices can communicate with each
other. For detailed configurations, see the configuration file of this example.
Step 2 Configure basic MPLS functions on the backbone network, and configure MPLS L2VPN
functions on PE devices. Then, establish the remote MPLS LDP peer relationship between
PEs at both ends of the PW. For detailed configurations, see the configuration file of this
example.
The remote MPLS LDP peer relationship is required only for the dynamic PW.
Step 3 Configure parameters for the TDM interface.
1. Configure PE1.
# Configure the channelized mode and CRC4 frames for CE1 0/3/1 and CE1 0/3/2 on
PE1.
[~PE1] controller e1 0/3/1
[~PE1-E1 0/3/1] using ce1
[*PE1-E1 0/3/1] frame-format crc4
[*PE1-E1 0/3/1] channel-set 1 timeslot-list 1-31
[*PE1-E1 0/3/1] quit
[*PE1] controller e1 0/3/2
[*PE1-E1 0/3/2] using ce1
[*PE1-E1 0/3/2] frame-format crc4
[*PE1-E1 0/3/2] channel-set 1 timeslot-list 1-31
[*PE1-E1 0/3/2] quit
[*PE1-E1 0/3/2] commit
2. Configure PE2.
# Set parameters for the CPOS interface on PE2.
[~PE2] controller cpos 0/3/1
[~PE2-Cpos0/3/1] e1 1 channel-set 1 timeslot-list 1-31
[*PE2-Cpos0/3/1] e1 2 channel-set 2 timeslot-list 1-31
[*PE2-Cpos0/3/1] quit
[*PE2] commit
2. Configure PE2.
2. Configure PE2.
[~PE2] pw-template 3to1
[*PE2-pw-template-3to1] peer-address 192.168.2.2
[*PE2-pw-template-3to1] jitter-buffer depth 8
[*PE2-pw-template-3to1] tdm-encapsulation-number 24
[*PE2-pw-template-3to1] quit
[*PE2] interface serial0/3/1/1:1
[*PE2-Serial0/3/1/1:1] mpls l2vc pw-template 3to1 100 control-word
[*PE2-Serial0/3/1/1:1] undo shutdown
[*PE2-Serial0/3/1/1:1] quit
[*PE2] interface serial0/3/1/2:2
[*PE2-Serial0/3/1/2:2] mpls l2vc pw-template 3to1 200 control-word
[*PE2-Serial0/3/1/2:2] undo shutdown
[*PE2-Serial0/3/1/2:2] quit
[*PE2] commit
----End
Configuration Files
l Configuration file of PE1
#
sysname PE1
#
mpls lsr-id 192.168.2.2
mpls
#
mpls l2vpn
#
pw-template 1to3
peer-address 192.168.3.3
jitter-buffer depth 8
tdm-encapsulation-number 24
#
mpls ldp
#
mpls ldp remote-peer 192.168.3.3
remote-ip 192.168.3.3
#
controller e1 0/3/1
using ce1
frame-format crc4
channel-set 1 timeslot-list 1-31
undo shutdown
#
controller e1 0/3/2
using ce1
frame-format crc4
channel-set 1 timeslot-list 1-31
undo shutdown
#
interface serial0/3/1:1
link-protocol tdm
mpls l2vc pw-template 1to3 100
undo shutdown
#
interface serial0/3/2:1
link-protocol tdm
mpls l2vc pw-template 1to3 200
undo shutdown
#
interface GigabitEthernet0/2/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 192.168.2.2 255.255.255.255
#
ospf 1
area 0.0.0.0
network 192.168.2.2 0.0.0.0
network 10.1.1.0 0.0.0.255
#
return
l Configuration file of PE2
#
sysname PE2
#
mpls lsr-id 192.168.3.3
mpls
#
mpls l2vpn
#
pw-template 3to1
peer-address 192.168.2.2
jitter-buffer depth 8
tdm-encapsulation-number 24
#
mpls ldp
#
mpls ldp remote-peer 192.168.2.2
remote-ip 192.168.2.2
#
controller cpos 0/3/1
e1 1 channel-set 1 timeslot-list 1-31
e1 2 channel-set 2 timeslot-list 1-31
#
interface serial0/3/1/1:1
link-protocol tdm
mpls l2vc pw-template 3to1 100 control-word
undo shutdown
#
interface serial0/3/1/2:2
link-protocol tdm
mpls l2vc pw-template 3to1 200 control-word
undo shutdown
#
interface GigabitEthernet0/2/0
undo shutdown
ip address 10.2.2.2 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 192.168.3.3 255.255.255.255
#
ospf 1
area 0.0.0.0
network 192.168.3.3 0.0.0.0
l Configuration file of P
#
sysname P
#
mpls lsr-id 192.168.4.4
mpls
#
mpls ldp
#
interface GigabitEthernet0/2/0
undo shutdown
ip address 10.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet0/2/1
undo shutdown
ip address 10.2.2.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 192.168.4.4 255.255.255.255
#
ospf 1
area 0.0.0.0
network 192.168.4.4 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.2.2.0 0.0.0.255
#
return
Figure 9-2 Configuring an IP-SDH hybrid network to bear the CTS service
NOTE
On the example network, the device models of SPE1 and SPE1 are NE40Es.
Interface 0, interface 1, interface 2, and interface 3 stand for serial 0/2/1:0, GE 0/1/1, GE 0/1/2, and
serial 0/2/1/1:0, respectively.
Loopback 0
Interface 3
Loopback 0
SPE1 SDH SDH
device device
Interface 0
Loopback 0
UPE SDH
SPE2 device
Interface3
Dual feed and
selective receiving
PW protection SNCP protection
GE 0/1/2 10.1.2.1/24
Loopback0 1.1.1.1/32
Loopback0 2.2.2.2/32
Loopback0 3.3.3.3/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure an IP address and a routing protocol for each interface on the UPE, SPE1, and
SPE2, allowing the devices to communicate at the network layer. This example uses
OSPF as the routing protocol.
2. Configure basic MPLS functions and public tunnels to bear PWs.
3. Configure primary and secondary PWs between the UPE and SPEs.
4. Configure BFD sessions to monitor the PWs.
5. Configure fast alarm detection.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure an IP address and a routing protocol for each interface on the UPE, SPE1, and
SPE2, allowing the devices to communicate at the network layer. For configuration details,
see "Configuration Files" in this section.
The configurations of SPE1 and SPE2 are similar to the configuration of the UPE. For
configuration details, see "Configuration Files" in this section.
2. Configure TE tunnels.
# Configure SPE1.
[~SPE1] interface tunnel 0/1/1
[*SPE1-Tunnel0/1/1] ip address unnumbered interface loopback 0
# Configure SPE2.
[~SPE2] interface tunnel 0/1/2
[*SPE2-Tunnel0/1/2] ip address unnumbered interface loopback 0
[*SPE2-Tunnel0/1/2] tunnel-protocol mpls te
[*SPE2-Tunnel0/1/2] destination 1.1.1.1
[*SPE2-Tunnel0/1/2] mpls te tunnel-id 200
[*SPE2-Tunnel0/1/2] mpls te reserved-for-binding
[*SPE2-Tunnel0/1/2] quit
[~SPE2] tunnel-policy policy1
[*SPE2-tunnel-policy-policy1] tunnel binding destination 1.1.1.1 te Tunnel
0/1/2
[*SPE2-tunnel-policy-policy1] quit
[*SPE2] commit
# Configure SPE1.
[~SPE1] mpls ldp remote-peer 1.1.1.1
[*SPE1-mpls-ldp-remote-1.1.1.1] remote-ip 1.1.1.1
[*SPE1-mpls-ldp-remote-1.1.1.1] quit
[*SPE1] commit
# Configure SPE2.
[~SPE2] mpls ldp remote-peer 1.1.1.1
[*SPE2-mpls-ldp-remote-1.1.1.1] remote-ip 1.1.1.1
[*SPE2-mpls-ldp-remote-1.1.1.1] quit
[*SPE2] commit
2. Configure PWs.
# Configure the UPE.
[~UPE] mpls l2vpn
[*UPE-l2vpn] quit
[*UPE] controller e1 0/2/1
[*UPE-E1 0/2/1] channel-set 0 timeslot-list 1-31
[*UPE-E1 0/2/1] quit
[*UPE] interface serial 0/2/1:0
[*UPE-Serial0/2/1:0] link-protocol tdm
[*UPE-Serial0/2/1:0] mpls l2vc 2.2.2.2 1 tunnel-policy policy1 control-word
[*UPE-Serial0/2/1:0] mpls l2vc 3.3.3.3 2 secondary tunnel-policy policy1
control-word secondary
[*UPE-Serial0/2/1:0] mpls l2vpn stream-dual-receiving
[*UPE-Serial0/2/1:0] mpls l2vpn stream-dual-send
[*UPE-Serial0/2/1:0] quit
[*UPE] commit
# Configure SPE1.
[~SPE1] mpls l2vpn
[*SPE1-l2vpn] quit
[*SPE1] controller cpos 0/2/1
[*SPE1-Cpos0/2/1] e1 1 channel-set 0 timeslot-list 1-31
[*SPE1-Cpos0/2/1] quit
[*SPE1] interface serial 0/2/1/1:0
[*SPE1-Serial0/2/1/1:0] link-protocol tdm
[*SPE1-Serial0/2/1/1:0] mpls l2vc 1.1.1.1 1 tunnel-policy policy1 control-word
[*SPE1-Serial0/2/1/1:0] quit
[*SPE1] commit
# Configure SPE2.
[~SPE2] mpls l2vpn
[*SPE2-l2vpn] quit
[*SPE2] controller cpos 0/2/1
[*SPE2-Cpos0/2/1] e1 1 channel-set 0 timeslot-list 1-31
[*SPE2-Cpos0/2/1] quit
[*SPE2] interface serial 0/2/1/1:0
[*SPE2-Serial0/2/1/1:0] link-protocol tdm
[*SPE2-Serial0/2/1/1:0] mpls l2vc 1.1.1.1 1 tunnel-policy policy1 control-word
[*SPE2-Serial0/2/1/1:0] quit
[*SPE2] commit
# Configure SPE1.
[~SPE1] bfd
[*SPE1-bfd] quit
[*SPE1] bfd pw1 bind pw interface serial 0/2/1/1:0
[*SPE1-bfd-lsp-session-pw1] discriminator local 2
[*SPE1-bfd-lsp-session-pw1] discriminator remote 2
[*SPE1-bfd-lsp-session-pw1] quit
[*SPE1] commit
# Configure SPE2.
[~SPE2] bfd
[*SPE2-bfd] quit
[*SPE2] bfd pw2 bind pw interface serial 0/2/1/1:0
[*SPE2-bfd-lsp-session-pw2] discriminator local 2
[*SPE2-bfd-lsp-session-pw2] discriminator remote 2
[*SPE2-bfd-lsp-session-pw2] quit
[*SPE2] commit
# Configure SPE2.
[~SPE2] interface serial 0/2/1/1:0
[~SPE2-Serial0/2/1/1:0] fast-alarm-detect enable
[*SPE2-Serial0/2/1/1:0] quit
[*SPE2] commit
----End
Configuration Files
l UPE configuration file
#
sysname
UPE
#
bfd
#
mpls lsr-id 1.1.1.1
#
mpls
mpls te
#
mpls
l2vpn
#
mpls ldp
#
mpls
mpls
te
#
mpls
mpls
te
#
interface
LoopBack0
ip address 1.1.1.1
255.255.255.255
#
ospf
100
opaque-capability
enable
area
0.0.0.0
network 1.1.1.1
0.0.0.0
network 10.1.1.0
0.0.0.255
network 10.1.2.0
0.0.0.255
mpls-te
enable
#
bfd master bind pw interface serial 0/2/1:0 remote-peer 2.2.2.2 pw-ttl auto-
calculate
bfd master bind pw interface serial 0/2/1:0 secondary remote-peer 3.3.3.3 pw-
ttl auto-calculate
discriminator local 2
discriminator remote 2
#
return
l SPE1 configuration file
#
sysname
SPE1
#
bfd
mpls
l2vpn
#
mpls ldp
#
interface
LoopBack0
ip address 2.2.2.2
255.255.255.255
#
controller cpos 0/2/1
e1 1 channel-set 0 timeslot-list
1-31
#
interface serial 0/2/1/1:0
link-protocol tdm
mpls l2vc 1.1.1.1 1 tunnel-policy policy1 control-word
mpls l2vpn pw bit-error-detection
fast-alarm-detect enable
#
interface Tunnel 0/1/1
ip address unnumbered interface LoopBack0
tunnel-protocol mpls te
destination 1.1.1.1
mpls te reserved-for-binding
mpls te bit-error-detection
mpls te tunnel-id 100
#
ospf
100
opaque-capability
enable
graceful-
restart
area
0.0.0.0
network 2.2.2.2
0.0.0.0
network 10.1.1.0 0.0.0.255
mpls-te enable
#
tunnel-policy
policy1
tunnel binding destination 1.1.1.1 te Tunnel 0/1/1
#
return
l SPE2 configuration file
#
sysname
SPE2
#
bfd
mpls
l2vpn
#
mpls ldp
#
interface
LoopBack0
ip address 3.3.3.3
255.255.255.255
#
return
Figure 9-3 Configuring an IP-SDH hybrid network to bear the GSM-R service
NOTE
On the example network, the device models of SPE1 and SPE1 are NE40Es.
interface 1, interface 2, and interface 3, Interface 4, Interface 5stand for GE 0/1/1, GE 0/1/2, CPOS
0/2/1, serial 0/2/1:0 and serial 0/2/2:0 respectively.
Loopback 0
Interface 3
Loopback 0
BTS SDH
SPE1 BSC
device
Interface 4
Loopback 0 SDH
Interface 5 UPE
device
Interface3
SDH
SPE2
device
E2E protection for BTS-BSC services
GE 0/1/2 10.1.2.1/24
Loopback0 1.1.1.1/32
Loopback0 2.2.2.2/32
Loopback0 3.3.3.3/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure an IP address and a routing protocol for each interface on the UPE, SPE1, and
SPE2, allowing the devices to communicate at the network layer. This example uses
OSPF as the routing protocol.
2. Configure MPLS TE tunnels to bear PWs.
3. Configure primary and secondary PWs between the UPE and SPEs.
4. Enable each SPE to send alarm bit streams to the peer device when specific faults are
detected on the SPE.
5. Configure each SPE to send the 0xFF bit stream to notify an idle E1 channel timeslot on
a subcard, so that the subcard can quickly and continuously send AIS bit streams to the
AC-side device if network-side PW faults occur.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses for interfaces on the UPE, SPE1, and SPE2
l LSR IDs for the UPE, SPE1, and SPE2
l L2VC IDs for each PW (must be the same on the two ends of the PW)
Procedure
Step 1 Configure an IP address and a routing protocol for each interface on the UPE, SPE1, and
SPE2, allowing the devices to communicate at the network layer. For configuration details,
see "Configuration Files" in this section.
Step 2 Configure basic MPLS functions and public network tunnels.
1. Enable MPLS TE.
# Configure the UPE.
<UPE> system-view
[~UPE] mpls lsr-id 1.1.1.1
[*UPE] mpls
[*UPE-mpls] mpls te
[*UPE-mpls] quit
[*UPE] interface gigabitethernet 0/1/1
[*UPE-GigabitEthernet0/1/1] mpls
[*UPE-GigabitEthernet0/1/1] mpls te
[*UPE-GigabitEthernet0/1/1] quit
[*UPE] interface gigabitethernet 0/1/2
[*UPE-GigabitEthernet0/1/2] mpls
[*UPE-GigabitEthernet0/1/2] mpls te
[*UPE-GigabitEthernet0/1/2] quit
[*UPE] ospf 100
[*UPE-ospf-100] opaque-capability enable
[*UPE-ospf-100] area 0
[*UPE-ospf-100-area-0.0.0.0] mpls-te enable
[*UPE-ospf-100-area-0.0.0.0] quit
[*UPE-ospf-100] quit
[*UPE] commit
The configurations of SPE1 and SPE2 are similar to the configuration of the UPE. For
configuration details, see "Configuration Files" in this section.
2. Configure TE tunnels.
# Configure the UPE.
[~UPE] interface tunnel 0/1/1
[*UPE-Tunnel0/1/1] ip address unnumbered interface loopback 0
[*UPE-Tunnel0/1/1] tunnel-protocol mpls te
[*UPE-Tunnel0/1/1] mpls te signal-protocol cr-static
[*UPE-Tunnel0/1/1] destination 2.2.2.2
[*UPE-Tunnel0/1/1] mpls te tunnel-id 100
[*UPE-Tunnel0/1/1] mpls te reserved-for-binding
[*UPE-Tunnel0/1/1] mpls te bidirectional
[*UPE-Tunnel0/1/1] quit
[*UPE] interface tunnel 0/1/2
[*UPE-Tunnel0/1/2] ip address unnumbered interface loopback 0
[*UPE-Tunnel0/1/2] tunnel-protocol mpls te
[*UPE-Tunnel0/1/2] mpls te signal-protocol cr-static
[*UPE-Tunnel0/1/2] destination 3.3.3.3
[*UPE-Tunnel0/1/2] mpls te tunnel-id 200
[*UPE-Tunnel0/1/2] mpls te reserved-for-binding
[*UPE-Tunnel0/1/2] mpls te bidirectional
[*UPE-Tunnel0/1/2] quit
[~UPE] tunnel-policy policy1
[*UPE-tunnel-policy-policy1] tunnel binding destination 2.2.2.2 te Tunnel
0/1/1
[*UPE-tunnel-policy-policy1] tunnel binding destination 3.3.3.3 te Tunnel
0/1/2
[*UPE-tunnel-policy-policy1] quit
[*UPE] commit
# Configure SPE1.
[~SPE1] interface tunnel 0/1/1
# Configure SPE2.
[~SPE2] interface tunnel 0/1/2
[*SPE2-Tunnel0/1/2] ip address unnumbered interface loopback 0
[*SPE2-Tunnel0/1/2] tunnel-protocol mpls te
[*SPE2-Tunnel0/1/2] destination 1.1.1.1
[*SPE2-Tunnel0/1/2] mpls te tunnel-id 200
[*SPE2-Tunnel0/1/2] mpls te reserved-for-binding
[*SPE2-Tunnel0/1/2] mpls te signal-protocol cr-static
[*SPE2-Tunnel0/1/2] mpls te passive-tunnel
[*SPE2-Tunnel0/1/2] mpls te binding bidirectional static-cr-lsp egress Tunnel
0/1/2
[*SPE2-Tunnel0/1/2] quit
[~SPE2] tunnel-policy policy1
[*SPE2-tunnel-policy-policy1] tunnel binding destination 1.1.1.1 te Tunnel
0/1/2
[*SPE2-tunnel-policy-policy1] quit
[*SPE2] commit
# Configure SPE1.
[~SPE1] bidirectional static-cr-lsp egress Tunnel 0/1/1
[*SPE1-Tunnel0/1/1] forward in-label 40 lsrid 1.1.1.1 tunnel-id 100
[*SPE1-Tunnel0/1/1] backward outgoing-interface GigabitEthernet 0/1/1 nexthop
10.1.1.1 out-label 43
[*SPE1-Tunnel0/1/1] hard-pipe enable
[*UPE-Tunnel0/1/1] quit
[*SPE1] commit
# Configure SPE2.
[~SPE2] bidirectional static-cr-lsp egress Tunnel 0/1/2
[*SPE2-Tunnel0/1/2] forward in-label 41 lsrid 1.1.1.1 tunnel-id 200
[*SPE2-Tunnel0/1/2] backward outgoing-interface GigabitEthernet 0/1/2 nexthop
10.1.2.1 out-label 42
[*SPE2-Tunnel0/1/2] hard-pipe enable
[*SPE2-Tunnel0/1/2] quit
[*SPE2] commit
# Configure SPE1.
[~SPE1] mpls ldp remote-peer 1.1.1.1
[*SPE1-mpls-ldp-remote-1.1.1.1] remote-ip 1.1.1.1
[*SPE1-mpls-ldp-remote-1.1.1.1] quit
[*SPE1] commit
# Configure SPE2.
[~SPE2] mpls ldp remote-peer 1.1.1.1
[*SPE2-mpls-ldp-remote-1.1.1.1] remote-ip 1.1.1.1
[*SPE2-mpls-ldp-remote-1.1.1.1] quit
[*SPE2] commit
2. Configure PWs.
# Configure the UPE.
[~UPE] mpls l2vpn
[*UPE-l2vpn] quit
[~UPE] pw-template pw_ces
[*UPE-pw-template-pw_ces] quit
[*UPE] controller e1 0/2/1
[*UPE-E1 0/2/1] channel-set 0 timeslot-list 1-31
[*UPE-E1 0/2/1] quit
[*UPE] interface serial 0/2/1:0
[*UPE-Serial0/2/1:0] link-protocol tdm
[*UPE-Serial0/2/1:0] mpls static-l2vc destination 2.2.2.2 pw-template pw_ces
10 transmit-vpn-label 100 receive-vpn-label 100 tunnel-policy policy1 control-
word
[*UPE-Serial0/2/1:0] mpls l2vpn hard-pipe expand-ratio 20
[*UPE-Serial0/2/1:0] quit
[*UPE] controller e1 0/2/2
[*UPE-E1 0/2/2] channel-set 0 timeslot-list 1-31
[*UPE-E1 0/2/2] quit
[*UPE] interface serial 0/2/2:0
[*UPE-Serial0/2/2:0] link-protocol tdm
[*UPE-Serial0/2/2:0] mpls static-l2vc destination 3.3.3.3 pw-template pw_ces
10 transmit-vpn-label 100 receive-vpn-label 100 tunnel-policy policy1 control-
word
[*UPE-Serial0/2/2:0] mpls l2vpn hard-pipe expand-ratio 20
[*UPE-Serial0/2/2:0] quit
[*UPE] commit
# Configure SPE1.
[~SPE1] mpls l2vpn
[*SPE1-l2vpn] quit
[~SPE1] pw-template pw_ces
[*SPE1-pw-template-pw_ces] quit
[*SPE1] controller cpos 0/2/1
[*SPE1-Cpos0/2/1] e1 1 channel-set 0 timeslot-list 1-31
[*SPE1-Cpos0/2/1] quit
# Configure SPE2.
[~SPE2] mpls l2vpn
[*SPE2-l2vpn] quit
[~SPE2] pw-template pw_ces
[*SPE2-pw-template-pw_ces] quit
[*SPE2] controller cpos 0/2/1
[*SPE2-Cpos0/2/1] e1 1 channel-set 0 timeslot-list 1-31
[*SPE2-Cpos0/2/1] quit
[*SPE2] interface serial 0/2/1/1:0
[*SPE2-Serial0/2/1/1:0] link-protocol tdm
[*SPE2-Serial0/2/1/1:0] mpls static-l2vc destination 1.1.1.1 pw-template
pw_ces 10 transmit-vpn-label 100 receive-vpn-label 100 tunnel-policy policy1
control-word
[*SPE2-Serial0/2/1/1:0] mpls l2vpn hard-pipe expand-ratio 20
[*SPE2-Serial0/2/1/1:0] quit
[*SPE2] commit
Step 4 Enable each SPE to send alarm bit streams to the peer device when specific faults are detected
on the SPE.
# Configure SPE1.
[~SPE1] controller cpos 0/2/1
[~SPE1-Cpos0/2/1] sdh-alarm nni-ais lrdi enable
[*SPE1-Cpos0/2/1] sdh-alarm uni-tuais ces-underrun enable
[*SPE1-Cpos0/2/1]] quit
[*SPE1] commit
# Configure SPE2.
[~SPE2] controller cpos 0/2/1
[~SPE2-Cpos0/2/1] sdh-alarm nni-ais lrdi enable
[*SPE2-Cpos0/2/1] sdh-alarm uni-tuais ces-underrun enable
[*SPE2-Cpos0/2/1]] quit
[*SPE2] commit
Step 5 Configure each SPE to send the 0xFF bit stream to notify an idle E1 channel timeslot on a
subcard, so that the subcard can quickly and continuously send AIS bit streams to the AC-side
device if network-side PW faults occur.
# Configure SPE1.
[~SPE1] slot 1
[~SPE1-slot-1] idle-code e1 ff card 2
[*SPE1-slot-1] quit
[*SPE1] commit
# Configure SPE2.
[~SPE2] slot 1
[~SPE2-slot-1] idle-code e1 ff card 2
[*SPE2-slot-1] quit
[*SPE2] commit
----End
Configuration Files
l UPE configuration file
#
sysname
UPE
#
mpls
mpls te
#
mpls l2vpn
#
pw-template pw_ces
#
mpls ldp remote-peer
2.2.2.2
remote-ip 2.2.2.2
#
#
controller e1 0/2/1
channel-set 0 timeslot-list
1-31
#
interface serial 0/2/1:0
link-protocol tdm
mpls static-l2vc destination 2.2.2.2 pw-template pw_ces 10 transmit-vpn-
label 100 receive-vpn-label 100 tunnel-policy policy1 control-word
mpls l2vpn hard-pipe expand-ratio 20
#
controller e1 0/2/2
channel-set 0 timeslot-list
1-31
#
interface serial 0/2/2:0
link-protocol tdm
mpls static-l2vc destination 3.3.3.3 pw-template pw_ces 10 transmit-vpn-
label 100 receive-vpn-label 100 tunnel-policy policy1 control-word
mpls l2vpn hard-pipe expand-ratio 20
#
interface GigabitEthernet 0/1/1
undo
shutdown
ip address 10.1.1.1
255.255.255.0
mpls
mpls
te
#
mpls
mpls
te
#
interface
LoopBack0
ip address 1.1.1.1
255.255.255.255
#
ospf
100
opaque-capability
enable
area
0.0.0.0
network 1.1.1.1
0.0.0.0
network 10.1.1.0
0.0.0.255
network 10.1.2.0
0.0.0.255
mpls-te
enable
#
sysname
SPE1
mpls l2vpn
#
pw-template
pw_ces
#
interface
LoopBack0
ip address 2.2.2.2
255.255.255.255
#
controller cpos 0/2/1
e1 1 channel-set 0 timeslot-list
1-31
#
interface serial 0/2/1/1:0
link-protocol tdm
mpls static-l2vc destination 1.1.1.1 pw-template pw_ces 10 transmit-vpn-
label 100 receive-vpn-label 100 tunnel-policy policy1 control-word
mpls l2vpn hard-pipe expand-ratio 20
#
interface Tunnel 0/1/1
ip address unnumbered interface LoopBack0
tunnel-protocol mpls te
destination 1.1.1.1
mpls te reserved-for-binding
mpls te tunnel-id 100
mpls te signal-protocol cr-static
mpls te passive-tunnel
mpls te binding bidirectional static-cr-lsp egress Tunnel 0/1/1
#
ospf
100
opaque-capability
enable
graceful-
restart
area
0.0.0.0
network 2.2.2.2
0.0.0.0
network 10.1.1.0 0.0.0.255
mpls-te enable
#
tunnel-policy
policy1
tunnel binding destination 1.1.1.1 te Tunnel 0/1/1
#
controller cpos 0/2/1
sdh-alarm nni-ais lrdi enable
sdh-alarm uni-tuais ces-underrun enable
#
slot 1
idle-code e1 ff card 2
#
return
l SPE2 configuration file
#
sysname
SPE2
#
mpls l2vpn
#
bidirectional static-cr-lsp egress Tunnel 0/1/2
forward in-label 41 lsrid 1.1.1.1 tunnel-id 200
backward outgoing-interface GigabitEthernet 0/1/2 nexthop 10.1.2.1 out-label
42
hard-pipe enable
#
interface
LoopBack0
ip address 3.3.3.3 255.255.255.255
#
controller cpos 0/2/1
e1 1 channel-set 0 timeslot-list
1-31
#
interface serial 0/2/1/1:0
link-protocol tdm
mpls static-l2vc destination 1.1.1.1 pw-template pw_ces 10 transmit-vpn-
label 100 receive-vpn-label 100 tunnel-policy policy1 control-word
mpls l2vpn hard-pipe expand-ratio 20
#
interface Tunnel 0/1/2
ip address unnumbered interface LoopBack0
tunnel-protocol mpls te
destination 1.1.1.1
mpls te record-route
mpls te reserved-for-binding
mpls te tunnel-id 200
mpls te signal-protocol cr-static
mpls te passive-tunnel
mpls te binding bidirectional static-cr-lsp egress Tunnel0/1/2
#
ospf 100
opaque-capability enable
area 0.0.0.0
network 3.3.3.3 0.0.0.0
network 10.1.2.0 0.0.0.255
network 10.1.3.0 0.0.0.255
mpls-te enable
#
tunnel-policy
policy1
tunnel binding destination 1.1.1.1 te Tunnel 0/1/2
#
controller cpos 0/2/1
sdh-alarm nni-ais lrdi enable
sdh-alarm uni-tuais ces-underrun enable
#
slot 1
idle-code e1 ff card 2
#
return
Context
In VS mode, this feature is supported only by the admin VS.
10.1 Overview of WDM Interfaces
This section describes basic concepts of the optical transport network (OTN) and WDM.
10.2 Configuring WDM Interfaces
The physical layer of a WDM interface is configured in the WDM interface view, and service
parameters are configured in the GE interface view.
Overview of WDM
Wavelength-division multiplexing (WDM), a technology used in the MAN and WAN, is used
to transmit two or more optical signals of different wavelengths through the same optical
fiber. A WDM system uses a multiplexer at the transmitter to join multiple optical carrier
signals of different wavelengths (carrying different information) together on a single optical
fiber, and a demultiplexer at the receiver to split the optical carrier signals apart. Then, an
optical receiver further processes and restores the optical carrier signals to the original signals.
WDM interfaces supported by the NE40E consist of two interfaces, namely the controller
WDM interface and its corresponding GE interface. Parameters related to the optical layer
and electrical layer are configured in the controller WDM interface view, and all service
features are configured in the GE interface view. The mapping mode of service signals on
WDM interfaces is Ethernet over OTN.
Overview of OTN
Currently, the Synchronous Digital Hierarchy over Synchronous Optical Network (SDH/
SONET) and WDM networks are usually used as transport networks. SDH/SONET processes
and schedules services at the electrical layer and WDM processes and schedules services at
the optical layer. With the increasing of data services, more and more bandwidths are
required. The SDH/SONET network cannot meet the requirements on cross scheduling and
network scalability. In addition, operators require the WDM network of high maintainability,
security, and service scheduling flexibility. As a result, the OTN is developed to solve the
problems.
The OTN technology applies the operability and manageability of SDH/SONET networks to
the WDM system so that the OTN acquires the advantages of both the SDH/SONET network
and the WDM network. In addition, the OTN technology defines a complete system structure,
including the management and monitoring mechanism for each network layer and the network
survival mechanism of the optical layer and electrical layer. In this manner, operators' carrier-
class requirements are really met.
The OTN, which consists of optical network elements connected through optical fiber links,
provides the transport, multiplexing, routing, management, monitoring, and protection
(survival) capabilities to optical channels that are used to transmit client signals. The OTN
features that the transport settings of any digital client signal are independent of specified
client features, namely, client independence. Optical Transport Hierarchy (OTH) is a new
connection-oriented transport technology that is used to develop the OTN. Owing to the great
scalable capability, the OTN is applicable to the backbone mesh network. Ideally, the future
transport network is an all OTN network. Compared with SDH networks, the OTN is the
optical transport network of the next generation.
Compared with the traditional SDH and SONET networks, the OTN has the following
advantages:
l Higher FEC capability
l Tandem Connection Monitoring (TCM) of more levels
l Transparent transport of client signals
l Measurable data exchange
NOTE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
1 FAS MFAS SM GCC0 RES RES JC
TCM
2 RES ACT TCM6 TCM5 TCM4 FTFL RES JC
l •SM overhead belongs to the OTU overhead and occupies three bytes.
l •PM overhead belongs to the ODU overhead and occupies three bytes.
l •TCM overhead belongs to the ODU overhead. The TCM overhead has six levels
(TCMn, n = 1...6) with each TCMn occupying three bytes.
Figure 10-2 shows the specific allocation of the SM, PM, and TCM overheads.
SM PM and TCMn(n=1...6)
1 2 3 1 2 3
TTI BIP-8 TTI BIP-8
0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8
SAPI B I SAPI B
15 BEI/ 15
16
DAPI D A RES 16
DAPI BEI D STAT PM
BIAE
31 I E 31 I
32 32
Opetator Opetator 1 2 3 4 5 6 7 8
specific specific B
BEI/
63 63 D STAT TCMn
BIAE
I
FEC Overview
The communication reliability is of great importance to communication technologies.
Multiple channel protection measures and automatic error correction coding techniques are
used to enhance reliability.
The OTU overhead of an OTN frame contains FEC information. FEC, which corrects data by
using algorithms, can effectively improve the transport performance of the system where the
signal-to-noise ratio (SNR) and dispersion are limited. In this manner, the investment cost on
the transport system is reduced accordingly. In addition, in the system using FEC, the receiver
can receive signals of a lower SNR. The maximum single span is enlarged or the number of
spans increases. In this manner, the total transmission distance of signals is prolonged.
TTI Overview
Trail trace identifier (TTI) is a byte string in the overhead of an optical transport unit (OTU)
or an optical data unit (ODU). Like the J byte in the SDH segment overhead, the TTI
identifies the source and destination stations to which each optical fiber is connected to
prevent incorrect connection. If the received TTI differs from the expected value, a TIM
alarm is generated.
OTU overhead: contains information about the transmission function of optical channels, and
defines FAS, MFAS, GCC0, and SM (such as TTI, BIP-8, BDI, BEI/BIAE, and IAE)
overheads. Among these overheads, TTI is a 64-byte string monitoring the connectivity of the
OTU segment.
ODU overhead: contains information about the maintenance and operation function of optical
channels, and defines TCM, PM, GCC1/GCC2, APS/PCC, and FTFL overheads. Among
these overheads, TCM monitors the serial connection, and PM monitors ODU paths.
Applicable Environment
WDM interfaces must be configured when the OTN is used to transmit Ethernet packets.
Pre-configuration Tasks
Before configuring WDM interfaces, complete the following tasks:
Configuration Procedure
Configuring Optical
Parameters
Configuring Service
Parameters
Mandatory step
Optional step
Context
Optical parameters of WDM interfaces must be configured to allow the WDM interfaces at
both ends of an optical fiber to communicate at the physical layer. Service parameters can be
configured only after optical parameters are configured. Currently, optical parameters of
WDM interfaces on the NE40E are FEC and TTI.
l FEC contained in the OTU overhead of the OTN frame is used for data error correction
by using algorithms. NE40E supports two FEC modes: standard G.709 FEC and
enhanced FEC. Compared with standard G.709 FEC, enhanced FEC improves
algorithms by using the FEC code type with stronger forward error correction capability.
l TTI is a byte string in the overhead of an OTU and or an ODU. Like the J byte in the
SDH segment overhead, the TTI identifies the source and destination stations to which
each optical fiber is connected to prevent incorrect connection. If the received TTI
differs from the expected value, a TIM alarm is generated.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run set transfer-mode otn
The interface is configured to work in OTN mode.
Step 4 Run display wavelength-map
The channel corresponding to the wavelength to be configured is displayed.
NOTE
Before setting a wavelength for an optical module, you need to run the display wavelength-map
command to view the channel corresponding to the wavelength to be set, and then specify the channel in
the wavelength-channel command.
NOTE
You must set the same wavelength for two connected WDM interfaces.
NOTE
Two interconnected WDM interfaces must have the same FEC configurations.
NOTE
The DQPSK signal modulation mode is supported on interfaces in any FEC mode, but the QPSK signal
modulation mode is supported only on interfaces in FEC mode of lhaul-sd.
NOTE
The value on the sending end must be the same as the expected value set on the peer end of an optical
fiber.
To configure an alarm threshold and detection interval for FEC bit error ratio detection on an OTN, run
the otn prefec-tca command. By default, FEC bit error ratio detection is enabled. The default alarm
thresholds and detection intervals are used. If the FEC bit error ratio exceeds a specified threshold, the
device reports an FEC bit error ratio alarm to the NMS. When the FEC bit error ratio falls below a
specified threshold, the device reports an FEC bit error ratio clear alarm to the NMS.
When an optical amplifier (OA) resides between two connected OTN interfaces, run the span
command to set a span based on the network situation, so that the non-linear OSNR of a line
can be more accurately estimated to facilitate line adjustment.
NOTE
l The undo shutdown, loopback, clock, and ptp command configurations have been cleared from the
Ethernet interface that the WDM interface corresponds to.
l Interfaces that have different mapping modes cannot communicate with each other. The mapping-
path command can be run only on 10GE OTN subcards.
----End
Context
Before configuring service parameters, enter the Ethernet interface view. The configuration
procedure is the same as that for 10GE LAN interfaces. For details, see Ethernet Interface
Configuration.
Context
To obtain an OTN delay, configure OTN delay measurement. Figure 10-4 shows an OTN
delay measurement network.
Device A Device B
NOTE
Procedure
Step 1 Enable delay measurement on Device B.
1. Run system-view
The system view is displayed.
2. Run controller wdm interface-number
The WDM interface view is displayed.
3. Run delay-measurement sink pm enable
Delay measurement is enabled on Device B.
Step 2 Enable delay measurement on Device A.
NOTE
----End
Context
After configurations of WDM interfaces are complete, you can view information about
interface configurations and status.
Procedure
Step 1 Run the display this command to check the configurations and status of a WDM interface.
Step 2 Run the display this interface command to check the statistics about a WDM interface.
----End
Using an Inverse Multiplexing over ATM (IMA) group to transport ATM services improves
bandwidth usage and implements flexible bandwidth multiplexing.
Context
When users access an ATM network at a rate between T1 and T3 or between E1 and E3, it is
cost-ineffective for the carrier to use T3 or E3 lines. In this situation, using an IMA group that
aggregates multiple T1 or E1 lines to carry ATM services is more flexible and efficient.
An IMA group can be considered a logical link that aggregates several low-speed physical
links (member links) to provide higher bandwidth. The rate of the logical link is
approximately the sum of the rate of the member links in the IMA group.
Pre-configuration Tasks
Before configuring an IMA group interface, connect interfaces and set their physical
parameters to ensure that the physical status of the interfaces can go Up.
Context
Interfaces can only be added to an IMA group interface that has been created. After an IMA
group interface is created, add a serial interface to the IMA group interface.
Procedure
l Create an IMA group interface.
a. Run system-view
The system view is displayed.
b. Run interface ima-group interface-number
An IMA group interface is created.
c. Run quit
Exit from the IMA group interface view.
l Add a serial interface to the created IMA group interface.
a. Run interface serial interface-number
The serial interface view is displayed.
NOTE
The IMA group interface and the serial interface to be added to the IMA group interface
must reside on the same subcard of the same board.
b. Run link-protocol atm
ATM is configured as the link layer protocol of the serial interface.
c. Run ima ima-group interface-number
The serial interface is added to the created IMA group interface.
NOTE
After a serial interface is added to a created IMA group interface, the ATM interface type
configured for the IMA group interface before the serial interface is added becomes invalid. You
must run the atm interface-type { uni | nni } command in the IMA group interface view to
reconfigure the ATM interface type for the IMA group interface.
l If a device is connected to a user device through an IMA group interface, set the ATM
interface type of the IMA group interface to UNI.
l If a device is connected to a network device through an IMA group interface, set the ATM
interface type of the IMA group interface to NNI.
d. Run quit
Exit from the serial interface view.
----End
Context
The following table lists the IMA group parameters and their usage scenarios in inverse
multiplexing and de-multiplexing of ATM cells.
Procedure
Step 1 Run system-view
----End
Context
To prevent the impact of heavy burst ATM traffic and ensure efficient use of network
resources, you can configure a service type for a PVC to implement ATM traffic shaping.
Doing so can limit the outgoing traffic on an ATM network within a proper range. To
configure a service type for a PVC, you must create a service type in the system view and
apply the service type to the PVC.
Procedure
Step 1 Run system-view
Step 2 Run atm service service-name { cbr output-pcr cdvt-value | nrt-vbr output-pcr output-scr
output-mbs cdvt-value | rt-vbr output-pcr output-scr output-mbs cdvt-value | ubr output-pcr
[ cdvt-value ] | ubr-plus output-pcr output-mcr cdvt-value }
NOTE
After the view of the IMA group interface or sub-interface is displayed, you can perform the following
operations:
l Run the atm-link check command to enable OAM on an IMA group sub-interface. If the PVC/PVP
status of the IMA group sub-interface goes Down, the protocol status of the sub-interface also goes
Down.
l Run the pvc max-number command to set the maximum number of PVCs on an IMA group
interface. If the number of PVC on the IMA group interface reaches the upper limit, no PVC can be
created.
----End
Context
NOTE
Before performing a continuity check on ATM services, you must complete the following
tasks:
1. Check that the physical layer status and protocol layer status of the interface on which
the continuity check is to be performed are both Up. If the interface is a synchronous
serial interface, configure ATM as the link layer protocol for the interface.
2. Configure a PVC or PVP on the interface.
3. Configure the end-point attribute for the connection point of the PVC or PVP on the
device that initiates the continuity test.
Procedure
Step 1 Run system-view
An LLID is configured.
NOTE
The LLID command must be configured both on the local and remote devices.
Step 3 Run test connectivity interface interface-type interface-number { pvc vpi/vci | pvp vpi } llid
llid
----End
Procedure
Step 1 Run interface serial interface-number
The alarm generation and clearing thresholds for ATM service transport performance are
configured.
----End
Prerequisites
An IMA group has been configured to transport ATM services.
Procedure
l Run the display atm pvc-info [ interface interface-type interface-number [ pvc { pvc-
name [ vpi/vci ] | vpi/vci } ] ] command to check PVC information.
l Run the display atm service [ service-name ] command to check information about the
service type configured for a PVC.
l Run the display interface ima-group [ group-number ] command to check
configurations and status of an IMA group interface.
l Run the display connectivity-test interface interface-type interface-number { pvc
vpi/vci | pvp vpi } command to check the result of continuity check on ATM services.
l Run the display atm llid command to check whether the LLID takes effect.
----End
12 ATM Configuration
12.1.1 Introduction
A conventional wide area network (WAN) uses X.25, frame relay (FR), or ATM. Any of these
link-layer protocols can transmit data from one local area network (LAN) over a WAN to
another LAN. As terminals become intelligent and the quality of physical links improves, the
functions of error control and flow control for data at the data link layer on X.25 networks are
no longer required. In addition, limited bandwidth resources on X.25 networks cannot meet
requirements of users for services. ATM ensures high-quality service transmission, and
therefore is widely applied to links that require high bandwidth.
Currently, ATM is used at the data link layer. Based on packet switching, ATM inherits high-
speed circuit switching to provide a universal connection-oriented transfer mode suitable for
various services. This allows multiple upper-layer protocols (currently only IPoA) to be
carried on ATM networks.
ATM is connection-oriented. ATM connections are logical connections, called virtual circuits
(VCs). Each VC is identified by a virtual path identifier (VPI) and a virtual channel identifier
(VCI). A pair of VPI/VCI takes effect only on one segment of the link between ATM nodes.
Each ATM node maps the VPI/VCI values to a specific address. When an ATM connection is
released, the VPI/VCI values for the connection are also released, and can be used by a
subsequent connection.
NOTE
Currently, ATM interfaces support only permanent virtual circuits (PVCs).
ATM cell ATM cell transport is a technology Currently, ATM cell transport is
transport that transmits ATM cells over applicable only to IP RANs. For
Pseudowire Emulation Edge-to- information about usage scenarios of
Edge (PWE3) VCs. ATM cell transport, see the chapter
By interconnecting ATM network "VPWS Configuration" in the
resources over a packet switched Configuration Guide - VPN.
network (PSN), ATM cell transport
emulates conventional ATM services
when they are being transmitted
over the PSN. This allows terminal
users to be unaware of network
differences, and therefore protects
carriers' investment during network
convergence and construction.
NOTE
IPoA scenarios do not support IMA or ATM cell transport.
Usage Scenario
Before the Gigabit Ethernet technology was developed, ATM backbone switches were
deployed on backbone networks to provide sufficient bandwidth. As ATM is well-developed,
IPoA means that IP packets are encapsulated in ATM cells and transmitted on ATM networks.
As shown in Figure 12-1, ATM allows devices on the same network to communicate with
each other at the data link layer by transmitting ATM cells in which IP packets have been
encapsulated. As bearer networks for IP services, ATM networks provide good network
performance and mature QoS assurance.
DeviceB
ATM1/0/0
DeviceA
ATM
Network
ATM1/0/0
DeviceC
ATM1/0/0
Pre-configuration Tasks
ATM interfaces on the device have been physically connected.
Data Preparation
To configure ATM to carry upper-layer services, you need the following data.
No. Data
1 Number of each ATM interface or sub-interface, IP address and mask of each ATM
interface or sub-interface, PVC name, VPI/VCI values, and AAL5 encapsulation
type
Context
Table 12-2 lists the relationships between PVC encapsulation types and upper-layer protocols.
Table 12-2 Relationships between PVC encapsulation types and upper-layer protocols
Upper-Layer aal5snap aal5mux aal5nlpid aal5nlpidietf
Protocol/
Encapsulation
Type
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface atm interface-number[.subinterface ] [ p2mp | p2p ]
The view of an ATM interface or sub-interface is displayed.
NOTE
After you enter the view of an ATM interface or sub-interface, you can configure the following
parameters:
l To enable OAM on an ATM sub-interface, run the atm-link check command. If the PVC and PVP
status of the ATM sub-interface goes Down, the protocol status on the sub-interface also goes Down.
l To configure the maximum number of VCs on an ATM interface, run the pvc max-number
command. If the number of PVCs configured on the ATM interface reach the maximum limit, no
new PVC can be configured on the interface.
NOTE
Table 12-2 lists the relationships between PVC encapsulation types and upper-layer protocols.
The IPoA mapping is configured on the PVC so that AAL5 carries IP packets.
Running the map ip ip-address command configures a mapping between a PVC and a
destination IP address. Every IP packet to be transmitted on an IPoA network must be mapped
to a PVC, and therefore multiple mappings are required. To configure mappings in batches,
perform the following operations as required:
l To map all the IP packets destined for the same network segment to one PVC, run the
map ip ip-address mask command.
l If the local device is the DTE, run the map ip inarp [ minutes ] command to use InARP
for automatic mapping. In this case, you do not need to configure mappings between IP
addresses and PVCs.
NOTE
minutes must be set to a proper value based on the network topology stability. If the network
topology changes frequently, set a small minutes value. If the network topology is stable, set a
large minutes value.
If the upper-layer protocol, for example, OSPF, transmits packets in broadcast mode,
configure broadcast for the PVC. If a PVC is configured with broadcast, all broadcast
packets transmitted through the interface where the PVC resides will be copied to the PVC.
----End
Context
Perform the following steps on the Router:
Procedure
Step 1 Run system-view
NOTE
To configure the priorities of all PVCs in the interface view, you can run the service output priority
command on the interface.
NOTE
You can use this command to configure priorities of UBR and UBR-plus type PVCs. Therefore, the
system can schedule the traffic in the PVCs with different priorities.
----End
Prerequisites
ATM links have been configured to transmit different protocol packets.
Procedure
l Run the display interface atm [ interface-number | main ] command to check the
configurations and status of ATM interfaces or sub-interfaces.
l Run the display atm pvc-info [ interface interface-type interface-number [ pvc { pvc-
name [ vpi/vci ] | vpi/vci } ] ] command to check information about PVCs.
l Run the display atm pvc-infostatistics [ interface interface-type interface-number ]
command to check PVC traffic statistics.
l Run the display atm map-info [ interface interface-type interface-number [ pvc { pvc-
name | vpi/vci } * ] ] command to check information about PVC mapping.
----End
Usage Scenario
You can set these parameters according to the actual conditions of the ATM network so that
these parameters can perfectly match the physical network.
The parameters of the ATM interface include the frame format, scramble function, loopback
mode, and interval for traffic statistics collection. All these parameters have default
configurations.
However, ATM sub-interface parameters, such as the frame format, scramble function, and
loopback mode, cannot be configured. If those parameters are configured on the ATM main
interface, the sub-interface inherits the parameters automatically.
The configured interval for traffic statistics collection on the ATM main interface cannot be
inherited by the sub-interface, and it needs to be configured on the sub-interface.
These parameters must be configured on an ATM interface that needs to be encapsulated with
an upper layer protocol.
Pre-configuration Tasks
Before configuring an ATM interface, power on and start the Router normally.
Data Preparation
To configure an ATM interface, you need the following data.
No. Data
Context
Perform the following steps on the Router:
Procedure
Step 1 Run system-view
For an ATM STM-1 optical interface, the frame format is SDH; for an ATM OC-3 interface,
the frame format is SONET.
----End
Context
The Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) provides
various overhead bytes to implement hierarchical monitoring functions.
The signal label byte C2, a type of high-order path overhead byte, is used to specify the
multiplexing structure and attribute of the information payload in a VC frame.
The regenerator trace byte J0, a type of section overhead byte, is used to detect the continuity
of connection between two interfaces on the section.
The path trace byte J1, a type of high-order VC-N path trace byte, is used to detect whether
the two interfaces are in the continuous connection status.
Perform the following steps on the Router:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface atm interface-number
The ATM interface view is displayed.
Step 3 Perform either of the following configurations as required:
l Run flag j0 { 16byte-mode j0-value | peer }
The regenerator trace byte J0 is configured.
l Run flag j1 { 64byte-mode j1-value | 16byte-mode j1-value | peer }
The path trace byte J1 is configured.
l Run flag c2 c2-value
The signal label byte C2 is configured.
The C2, J0, and J1 bytes on the receiving and sending ends must be consistent. Otherwise, an
alarm is generated.
For the ATM interface, the default value of C2 is 19 (13 in hexadecimal notation). The default
value of J0 and J1 is NetEngine.
----End
Context
The MTU of the ATM interface is used for the assembly and fragmentation of IP packets.
After running the mtu command on an interface, restart the interface to validate the MTU
configuration by running the shutdown and undo shutdown commands.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface atm interface-number
The ATM interface view is displayed.
Step 3 Run mtu mtu
The MTU of the ATM interface is configured.
The default MTU is 1500 bytes.
Step 4 Run shutdown
The ATM interface is shut down.
Step 5 Run undo shutdown
The ATM interface is started.
After changing the MTU by using the mtu command on a specified interface, restart the
interface to validate the newly configured MTU value.
----End
Context
The scrambling function can effectively prevent continuous 0s or 1s in ATM cells.
Configurations of the scrambling function on the local and remote interfaces must be
consistent.
Perform the following steps on the Router:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface atm interface-number
The ATM interface view is displayed.
----End
Context
NOTE
The NE40E supports traffic statistics collection on the ATM interface and sub-interface. Before
configuring the interval at which traffic statistics are collected, configure the PVC for the interface and
the sub-interface so that the configured statistics interval can be applied to the PVC.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Perform either of the following configurations as required:
l Run interface atm interface-number
The ATM interface view is displayed.
l Run interface atm interface-number.subinterface-number
The ATM sub-interface view is displayed.
Step 3 Run set flow-stat interval interval
An interval at which traffic statistics are collected is configured.
By default, traffic statistics are collected at an interval of 300s.
The interval value must be a multiple of 10.
----End
Procedure
l Run the display interface atm [ interface-number [.subinterface-number] ] command to
check the configuration and status of the ATM interface.
l Run the display interface brief command to check brief information about the ATM
interface.
----End
Usage Scenario
You can configure the service type and parameters for a PVC during PVC traffic planning.
Pre-configuration Tasks
Before configuring the service type or optional parameters for a PVC, complete the following
tasks:
Data Preparation
To configure the service type for a PVC, you need the following data.
No. Data
Context
To configure a service type for a PVC, you must create a service type in the system view and
apply the service type to the PVC.
Procedure
Step 1 Run system-view
Step 2 Run atm service service-name { cbr output-pcr cdvt-value | nrt-vbr output-pcr output-scr
output-mbs cdvt-value | rt-vbr output-pcr output-scr output-mbs cdvt-value | ubr output-pcr
[ cdvt-value ] | ubr-plus output-pcr output-mcr cdvt-value }
The service type can be configured as CBR, NRT-VBR, UBR, UBR-plus, or RT-VBR.
----End
Context
To configure a service type for a PVP, you must create a service type in the system view and
apply the service type to the PVP.
Perform the following steps on the Router:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run atm service service-name { cbr output-pcr cdvt-value | nrt-vbr output-pcr output-scr
output-mbs cdvt-value | rt-vbr output-pcr output-scr output-mbs cdvt-value | ubr output-pcr
[ cdvt-value ] | ubr-plus output-pcr output-mcr cdvt-value }
A service type template is created, and parameters are configured.
By default, the service type of a PVP is UBR.
The service type can be configured as CBR, NRT-VBR, UBR, UBR-plus, or RT-VBR.
Step 3 Run interface atm interface-number.subinterface
The ATM sub-interface view is displayed.
Step 4 Run atm cell transfer
The ATM cell transport mode is configured.
Step 5 Run pvp vpi
A PVP is created, and the PVP view is displayed.
A PVP can be configured only on an ATM sub-interface.
Step 6 Run shutdown
The PVP is shut down.
Step 7 Run service { output | input } service-name
A service type template is configured for the PVP.
Step 8 Run undo shutdown
The PVP is started.
----End
Context
Perform the following steps on the Router:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface atm interface-number
The ATM interface view is displayed.
Step 3 Run service bandwidth-overload overload-value
The overload bandwidth is configured for an ATM interface.
You can run the service bandwidth-overload command to set the overload bandwidth of the
PVCs and PVPs of all services on the ATM interface.
By default, the overload bandwidth of the ATM interface is 0 kbit/s.
----End
Procedure
l Run the display interface atm [ interface-number [.subinterface ] ] command to check
the configuration and status of the ATM interface or sub-interface.
l Run the display atm service [ service-name ] command to check the configuration of the
service type template.
l Run the display atm { pvc | pvp } statistics interface atm interface-number [ pvc
vpi/vci | pvp vpi ] command to check PVC or PVP statistics.
NOTE
The display interface atm command displays the statistics of all the packets discarded on an
interface. The display atm pvc statistics command displays only the statistics about the packets
dropped on the PVC or PVP due to traffic congestion. Therefore, run the commands as required.
----End
Usage Scenario
OAM provides various optional methods of detecting and locating the faults on an ATM link.
Choose the configuration as required.
l To detect the link status and report faults in real time without interrupting services,
activate the CC function or configure the end-to-end loopback detection function.
– The CC function detects the link status in real time by sending CC cells periodically
and does not restrict the connection point attribute.
– The end-to-end loopback detection function detects the link status in real time by
sending loopback cells periodically and is available on only the PVP/PVC with the
connection point attribute of end-point.
Check whether the device supports CC cells or loopback cells and choose configurations
based on the OAM connection point attribute.
The CC function and the end-to-end loopback function cannot be configured on the same
PVP/PVC.
l To locate and remove the link faults, configure the cell loopback function.
l To debug and detect whether the ATM OAM mechanism works normally, insert OAM
cells manually.
l To respond to the OAM F5 loopback cells on the peer, configure the OAM F5 loopback
cell response function.
Pre-configuration Tasks
Before configuring ATM OAM, complete the following tasks:
Data Preparation
To configure ATM OAM, you need the following data.
No. Data
2 VPI/VCI value
5 Number of delayed intervals for responding after the PVP/PVC status changes
Context
Perform the following steps on the Router:
Procedure
Step 1 Run system-view
When IPoA services are configured on a PVC, the PVC attribute can be configured only as
end-point.
When the PVC attribute is end-point, the PVC can respond to the OAM F5 loopback cells.
When activating the CC function for a PVC or PVP, note the following:
----End
Context
Perform either of the following operations on the Router to implement end-to-end loopback
detection:
l Run the ping atm command in the system view.
l Run the oam-Loopback command in the ATM OAM view.
When configuring the function of end-to-end loopback detection in the ATM OAM view, note
the following:
l The attribute of the OAM connection point of the PVP/PVC must be end-point.
l The CC function and the loopback function cannot be configured on the same PVP/PVC.
l During fault recovery, the undo oam-Loopback command cannot be run.
l Before deleting OAM connections, run the undo oam-loopback command to disable the
function of OAM end-to-end loopback detection if no faults occur on the board.
Perform the following steps on the Router:
Procedure
l Implement end-to-end loopback detection in the system view.
a. Run system-view
The system view is displayed.
b. Run ping atm interface atm interface-number vpi/vci end-to-end [ times ]
End-to-end loopback detection is configured.
l Implement end-to-end loopback detection in the ATM OAM view.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number [.subinterface ]
The ATM interface view is displayed.
c. Run oam
The OAM interface view is displayed.
d. Run attribute { start-vpi [ end-vpi ] | vpi/start-vci [ vpi/end-vci ] } end-point
The OAM attributes of the connection point are configured.
e. Run oam-Loopback vpi/start-vci [ vpi/end-vci ] end-to-end
The function of OAM end-to-end loopback detection of the PVP/PVC is enabled.
status changes. When the PVP/PVC remains Down or Up for specified consecutive
intervals, the system responds to the change.
----End
Context
Perform the following steps on the Router:
Procedure
Step 1 Run system-view
When IPoA services are configured on a PVC, the PVC attribute can be configured only as
end-point.
When the PVC attribute is end-point, the PVC can respond to the OAM F5 loopback cells.
OAM provides loopback tests to facilitate fault locating. In tests, a loopback cell is inserted to
the VC/VP of a connection point and is looped back by the other connection point. The
system detects and locates link faults through the received loopback cells.
l Before configuring the segment loopback, configure the peer loopback point as the
segment point.
l Before configuring the end loopback, configure the peer loopback point as the end point.
l The loopback in one board fails.
----End
Context
Before configuring a one-click test for ATM services, you must complete the following tasks:
1. Check that the physical layer status and protocol layer status of the interface on which
the one-click test will be performed are Up. If the interface is a synchronous serial
interface, configure ATM on the interface.
2. Configure a PVC or PVP on the interface.
3. Run the llid command to configure a local LLID for both the local end and peer end.
Procedure
Step 1 Run system-view
Step 2 Run test connectivity interface interface-type interface-number { pvc vpi/vci | pvp vpi } llid
llid
----End
Result
Run the display connectivity-test interface interface-type interface-number { pvc vpi/vci |
pvp vpi } command to check the one-click test results for ATM services.
Procedure
l Run the display atm oam statistics atm interface-number { vpi | vpi/vci } command to
check statistics of ATM OAM.
l Run the display atm oam configuration atm interface-number [ vpi | vpi/vci ]
command to check configurations of ATM OAM.
----End
Context
Running the loopback command on the Router to enable loopback may cause interfaces or
links to be unable to work properly. Exercise caution when enabling loopback to check the
interface or link status. After checking the interface or link status, run the undo loopback
command to disable loopback in time.
Procedure
Step 1 Run the system-view command to enter the system view.
Step 2 Run the interface atm interface-number command to enter the view of an ATM interface to
be checked.
----End
Context
Interface statistics cannot be restored after being cleared. Exercise caution when running reset
commands.
To clear interface statistics displayed on the NMS or in the display interface command
output, run the following commands in the user view. After the statistics are cleared, the
interface starts to collect statistics again.
NOTE
See the relevant NMS manual to learn about how to view the interface traffic statistics on the NMS.
Procedure
l Run the reset counters interface [ atm [ interface-number ] ] command to clear
statistics displayed in the display interface command output.
l Run the reset counters if-mib interface [ atm [ interface-number ] ] command to clear
interface statistics displayed on the NMS.
l Run the reset atm interface [ atm interface-number ] command to clear PVC statistics
of an ATM interface.
----End
Networking Requirements
As shown in Figure 12-2, Device A, Device B, and Device C access an ATM network for
communication. All the PVCs on the ATM interfaces of Routers must be configured with
IPoA.
DeviceB
IP:10.1.1.2/24
To A:0/40
DeviceA
To C:0/42
ATM Interface: interface1
network
IP:10.1.1.1/24
To B:0/40 DeviceC
To C:0/41
Interface: interface1
IP:10.1.1.3/24
To A:0/41
To B:0/42
Interface: interface1
Configuration Roadmap
The configuration roadmap is as follows:
1. Create PVCs on the ATM interface of each Router.
2. Configure ATM PVCs to carry IP packets.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of the ATM interfaces on the Routers
l Virtual Path Identifier (VPI)/Virtual Channel Identifier (VCI) values of the PVCs
connecting Device A to Device B and Device C
l VPI/VCI values of the PVCs connecting Device B to Device A and Device C
l VPI/VCI values of the PVCs connecting Device C to Device A and Device B
Procedure
Step 1 Configure Device A.
# Enter the ATM interface view and configure an IP address for the ATM interface.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] interface atm 0/1/0
[~DeviceA-Atm0/1/0] ip address 10.1.1.1 255.255.255.0
[*DeviceB-Atm0/1/0] quit
[*DeviceB] commit
# Enter the ATM interface view and configure an IP address for the ATM interface.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceC
[*HUAWEI] commit
[~DeviceC] interface atm 0/1/0
[~DeviceC-Atm0/1/0] ip address 10.1.1.3 255.255.255.0
Perform the same steps to view the PVC status and mappings between PVCs and IP addresses
on Device B and Device C.
# Run the ping command on Device A to ping Device B. The ping operation succeeds.
[~DeviceA] ping 10.1.1.2
PING 10.1.1.2: 56 data bytes, press CTRL_C to break
Reply from 10.1.1.2: bytes=56 Sequence=1 ttl=255 time=62 ms
Reply from 10.1.1.2: bytes=56 Sequence=2 ttl=255 time=31 ms
Reply from 10.1.1.2: bytes=56 Sequence=3 ttl=255 time=31 ms
Reply from 10.1.1.2: bytes=56 Sequence=4 ttl=255 time=31 ms
Reply from 10.1.1.2: bytes=56 Sequence=5 ttl=255 time=31 ms
--- 10.1.1.2 ping statistics ---
5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 31/37/62 ms
Run the ping command on Device A to ping Device C, on Device B to ping Device A and
Device C, and on Device C to ping Device A and Device B. All the ping operations succeed.
----End
Configuration Files
l Configuration file of Device A
#
sysname DeviceA
#
interface Atm0/1/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
pvc to_b 0/40
map ip 10.1.1.2
pvc to_c 0/41
map ip 10.1.1.3
#
return
Networking Requirements
In Figure 12-3, RouterDevice A, Device B, and Device C are connected to the ATM network.
IPoA services are configured on all the PVCs on ATM interfaces of the three Routers.
To implement real-time and continuous detection without interrupting services, configure the
OAM CC function.
IP:202.38.160.2/24
To A: 0/40
ATM To C:0/42
Network Interface:ATM 1/0/0
Router A
IP:202.38.160.1/24 Router C
To B: 0/40
To C:0/41
Interface:ATM 1/0/0
IP:202.38.160.3/24
To A: 0/41
To B:0/42
Interface:ATM 1/0/0
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure IPoA services.
2. Configure the OAM attributes of the connection point.
3. Activate the CC function.
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of the ATM interfaces of the three Router
l VPIs/VCIs of Device A connecting to Device B and Device C, respectively
l VPIs/VCIs of Device B connecting to Device A and Device C, respectively
l VPIs/VCIs of Device C connecting to Device A and Device B, respectively
Procedure
Step 1 Configure IPoA.
# Configure Device A.
<HUAWEI> system-view
[HUAWEI] sysname DeviceA
[DeviceA] interface atm 1/0/0
[DeviceA-Atm1/0/0] ip address 202.38.160.1 255.255.255.0
[DeviceA-Atm1/0/0] pvc to_b 0/40
[DeviceA-atm-pvc-Atm1/0/0-0/40-to_b] map ip 202.38.160.2
[DeviceA-atm-pvc-Atm1/0/0-0/40-to_b] quit
[DeviceA-Atm1/0/0] pvc to_c 0/41
[DeviceA-atm-pvc-Atm1/0/0-0/41-to_c] map ip 202.38.160.3
[DeviceA-atm-pvc-Atm1/0/0-0/41-to_c] quit
[DeviceA-Atm1/0/0] undo shutdown
# Configure Device B.
<HUAWEI> system-view
[HUAWEI] sysname DeviceB
[DeviceB] interface atm 1/0/0
[DeviceB-Atm1/0/0] ip address 202.38.160.2 255.255.255.0
[DeviceB-Atm1/0/0] pvc to_a 0/40
[DeviceB-atm-pvc-Atm1/0/0-0/40-to_a] map ip 202.38.160.1
[DeviceB-atm-pvc-Atm1/0/0-0/40-to_a] quit
[DeviceB-Atm1/0/0] pvc to_c 0/42
[DeviceB-atm-pvc-Atm1/0/0-0/42-to_c] map ip 202.38.160.3
[DeviceB-atm-pvc-Atm1/0/0-0/42-to_c] quit
[DeviceB-Atm1/0/0] undo shutdown
# Configure Device C.
<HUAWEI> system-view
[HUAWEI] sysname DeviceC
[DeviceC] interface atm 1/0/0
[DeviceC-Atm1/0/0] ip address 202.38.160.3 255.255.255.0
[DeviceC-Atm1/0/0] pvc to_a 0/41
[DeviceC-atm-pvc-Atm1/0/0-0/41-to_a] map ip 202.38.160.1
[DeviceC-atm-pvc-Atm1/0/0-0/41-to_a] quit
[DeviceC-Atm1/0/0] pvc to_b 0/42
[DeviceC-atm-pvc-Atm1/0/0-0/42-to_b] map ip 202.38.160.2
[DeviceC-atm-pvc-Atm1/0/0-0/42-to_b] quit
[DeviceC-Atm1/0/0] undo shutdown
# Configure Device B.
[DeviceB] interface atm 1/0/0
[DeviceB-Atm1/0/0] oam
[DeviceB-Atm1/0/0-fatm-oam] attribute 0/40 end-point
[DeviceB-Atm1/0/0-fatm-oam] attribute 0/42 end-point
# Configure Device C.
[DeviceC] interface atm 1/0/0
[DeviceC-Atm1/0/0] oam
[DeviceC-Atm1/0/0-fatm-oam] attribute 0/41 0/42 end-point
# Configure Device B.
[DeviceB] interface atm 1/0/0
[DeviceB-Atm1/0/0] oam
[DeviceB-Atm1/0/0-fatm-oam] cc 0/40 end-to-end both
[DeviceB-Atm1/0/0-fatm-oam] cc 0/42 end-to-end both
# # Configure Device C.
[DeviceC] interface atm 1/0/0
[DeviceC-Atm1/0/0] oam
[DeviceC-Atm1/0/0-fatm-oam] cc 0/41 0/42 end-to-end both
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
interface Atm1/0/0
undo shutdown
ip address 202.38.160.1 255.255.255.0
pvc to_b 0/40
map ip 202.38.160.2
pvc to_c 0/41
map ip 202.38.160.3
oam
attribute 0/40 0/41 end-point
cc 0/40 0/41 end-to-end both
#
return
map ip 202.38.160.3
oam
attribute 0/40 end-point
attribute 0/42 end-point
cc 0/40 end-to-end both
cc 0/42 end-to-end both
#
return
13 LMSP Configuration
For STM-N links in the SDH system, liner multiplex section protection (LMSP) can be used
to allow services to be rapidly migrated to a new link upon a link failure, ensuring service
continuity.
NOTE
LMSP is often referred to as low speed APS protection.
Large numbers of low-speed links still exist on the user side. These links may be unstable due
to aging. These links have a small capacity and may fail to work properly due to congestion in
traffic burst scenarios. Therefore, a protection technique is required to provide reliability and
stability for these low-speed links.
LMSP is an inherent feature of an SDH network. When a mobile bearer network is deployed,
a Router must be connected to an add/drop multiplexer (ADM) or RNC, both of which
support LMSP. As the original protection function of the Router cannot properly protect the
communication channel between the Router and ADM or RNC, LMSP is introduced to
resolve this issue.
LSP APS fails when Do not configure The service switching status
penultimate hop popping is penultimate hop popping is abnormal.
configured on devices. and LSP APS at the same
time.
In the MC-PW APS Configure LSP APS on the The service switching status
scenario, when E-APS/E- ICB PW. is abnormal.
trunk works in 1:1 mode,
service switching fails after
the ICB PW fails.
When E-APS works in 1 +1 Configure LSP APS on the Service traffic is abnormal.
mode, a CSG receives two ICB PW.
copies of the same traffic
after the ICB PW fails.
LSP APS fails when Do not configure The service switching status
penultimate hop popping is penultimate hop popping is abnormal.
configured on devices. and LSP APS at the same
time.
In the MC-PW APS Configure LSP APS on the The service switching status
scenario, when E-APS/E- ICB PW. is abnormal.
trunk works in 1:1 mode,
service switching fails after
the ICB PW fails.
When E-APS works in 1 +1 Configure LSP APS on the Service traffic is abnormal.
mode, a CSG receives two ICB PW.
copies of the same traffic
after the ICB PW fails.
LSP APS fails when Do not configure The service switching status
penultimate hop popping is penultimate hop popping is abnormal.
configured on devices. and LSP APS at the same
time.
In the MC-PW APS Configure LSP APS on the The service switching status
scenario, when E-APS/E- ICB PW. is abnormal.
trunk works in 1:1 mode,
service switching fails after
the ICB PW fails.
When E-APS works in 1 +1 Configure LSP APS on the Service traffic is abnormal.
mode, a CSG receives two ICB PW.
copies of the same traffic
after the ICB PW fails.
Usage Scenario
Linear multiplex section protection (LMSP) needs to be configured when the Router is
connected to a Radio Network Controller (RNC). As shown in Figure 13-1, PE2 and BSC
(RNC) are connected using two CPOS links. You can configure CPOS 3/0/1 as a working
interface, and CPOS 3/0/2 as a protection interface.
E1
interface 1 interface 2
E1 10.1.1.1/24 10.2.1.2/24 CPOS
2 ×TDM E1
interface 1 interface 2
10.1.1.2/24 10.2.1.1/24 CPOS
PE1 P PE2 BSC
PWE3 TDM
Transparent Cell Transport
BTS
Pre-configuration Task
Before configuring LMSP, configure an interface on the Router and ensure that the data link
layer protocol run between the Router and the RNC is Up.
Context
An LMSP group includes one working interface and one protection interface, and they are the
smallest units protected by LMSP. The communication messages between the working
interface and the protection interface are transmitted within the LMSP group. Specifying a
working interface and a protection interface and adding them to an LMSP group are the
prerequisites for LMSP operation. The working interface is connected to a working link and
the protection interface is connected to a protection link. When an LMSP group works in 1:1
mode, the working interface transmits traffic, but the protection interface does not. The
protection interface takes over traffic after LMSP switching is performed. When an LMSP
group works in 1+1 mode, both the working and protection interfaces transmit traffic. The
receive end receives traffic only from the working link.
Procedure
Step 1 Specify an LMSP working interface.
1. Run system-view
NOTE
In a single-chassis LMSP scenario, the working and protection interfaces may be on different
subcards. If the working interface is abnormal during the restart of the two subcards, neither the
configurations on the working interface nor the configurations on the protection interface can be
restored.
The working and protection interfaces must be added to a single LMSP group.
----End
Context
Automatic LMSP switching modes are classified as 1:1 bidirectional or 1+1 unidirectional.
After a fault in the working link is rectified, services automatically switch from the protection
link to the working link. During the switchback, some service traffic is dropped because some
resources related to the working link or NE40E are being restored. To prevent service loss, the
WTR time can be set on the NE40E to delay a switchback. Services can automatically switch
from the protection link back to the working link in the specified WTR time after the working
link becomes available.
Perform the following steps on a protection interface in an LMSP group:
Procedure
l Configure an automatic protection switching mode for an LMSP group.
a. Run system-view
A working mode is configured for the LMSP group. One of the following modes
can be configured:
n one2one bidirection:
○ Configures LMSP to work in 1:1 mode. Only the working link transmits
traffic. The protection link only carries traffic if the working link is faulty.
○ Configures LMSP to work in bidirectional mode. If an interface fails,
both the transmit and receive ends switch their traffic to the protection
link.
n one-plus-one unidirection:
○ Configures LMSP to work in 1+1 mode. Both the working link and the
protection link transmit traffic.
○ Configures LMSP to work in unidirectional mode. If an optical fiber to an
interface fails, only the receive end switches its traffic to the protection
link.
n one-plus-one bidirection:
○ Configures LMSP to work in 1+1 mode. Both the working link and the
protection link transmit traffic.
○ Configures LMSP to work in bidirectional mode. If an interface fails,
both the transmit and receive ends switch their traffic to the protection
link.
l Set the WTR time for an LMSP group.
a. Run system-view
Or, run:
NOTE
If two different switchback delays are set on two protection interfaces in LMSP groups on
two ends of a link, the effective switchback delay depends on one of the following
situations:
l If one-plus-one unidirection is configured, the switchback delays on both protection
interfaces take effect after the working interfaces recover.
l If one2one bidirection or one-plus-one bidirection is configured, the switchback delay
on the protection interface of the device with the working interface recovering later than
the other working interface takes effect on both protection interfaces.
l In a single-chassis scenario, the switchback time must be the same on two LMSP
devices.
----End
Context
LMSP is used to protect traffic on attachment circuit (AC) links connecting Routers to Add/
Drop Multiplex (ADM) devices or Radio Network Controllers (RNCs) on a Synchronous
Digital Hierarchy (SDH) network. AC-side physical POS or channelized Packet Over SDH/
SONET (CPOS) interfaces on the Routers are added to a trunk interface to carry services.
Perform the following steps on the working and protection interfaces of an LMSP group:
Procedure
Step 1 Run system-view
An CPOS-Trunk interface is created, and the view of the CPOS-Trunk interface is displayed.
NOTE
LMSP can be configured on the CPOS and POS interfaces. The corresponding trunk interfaces are
CPOS-Trunk and POS-Trunk. In the following example, the CPOS-Trunk configuration is used.
NOTE
The working and protection interfaces of an LMSP group must be added to the trunk interface with the
same trunk ID.
----End
Procedure
Step 1 Run the display aps group group-id command to check configurations of an LMSP group.
----End
Usage Scenario
Figure 13-2 shows an MC-LMSP network. Two network-side devices back up each other,
improving link reliability. MC-LMSP needs to be configured on these two devices dual-
homed to RNCs. MC-LMSP provides higher security than single-chassis LMSP provides.
Single-chassis LMSP means interface, subcard, and board-based LMSP.
PW Device C
ry
i ma
Pr
Bypass
PW MC-LMSP
Pre-configuration Task
Before configuring MC-LMSP, complete the following tasks:
l Configure an interface on the Router and ensure that the data link layer protocol run
between the Router and the RNC is Up.
l Run an IGP protocol on the backbone network so that devices can communicate with
each other.
NOTE
In a PPP-based Layer 3 IP forwarding scenario, if devices use a dynamic routing protocol, the
dynamic routes have to be re-learned during an LMSP link switchover. In the route convergence
process, which lasts for dozens of seconds, service traffic may be dropped. To prevent this
problem, configure static routes on the LMSP interfaces of the master, device, backup device, and
the RNC. This configuration can prevent traffic loss.
Configuration Procedures
Mandatory
Procedure
Optional
Procedure
Context
An LMSP group includes one working interface and one protection interface. An LMSP
group is the smallest unit protected by LMSP. The communication messages between the
working interface and the protection interface are transmitted within the LMSP group.
Specifying a working interface and a protection interface and adding them to an LMSP group
are the prerequisites for LMSP operation. The working interface is connected to a working
link and the protection interface is connected to a protection link. When an LMSP group
works in 1:1 mode, the working interface transmits traffic, but the protection interface does
not. The protection interface takes over traffic after LMSP switching is performed. When an
LMSP group works in 1+1 mode, both the working and protection interfaces transmit traffic.
The receive end receives traffic only from the working link.
Perform the following steps on the Routers where the LMSP working and protection interface
are located separately:
Procedure
Step 1 Specify an LMSP working interface.
1. Run system-view
NOTE
The working and protection interfaces must be added to a single LMSP group.
4. Run aps protect peer-ip local-ip
The low-priority signal failure code for a switching request carried in the K byte is
specified on the protection interface.
This command is used on the working and protection interfaces of the LMSP group that
works in MC-LMSP 1+1 unidirectional mode.
MC-LMSP 1+1 needs to be associated with dual bypass PWs. In MC-LMSP 1+1
unidirectional mode, if an AC-side interface is Down, one of the bypass PWs associated with
the interface will be deleted. Then traffic will not be forwarded by the deleted bypass PW. To
address this problem, the hold-up command must be run on an MC-LMSP interface.
NOTE
After this command has been run, the alarm functions do not take effect on the LMSP group interface,
the link indicator on the LMSP group interface is always on, and the interface remains Up even when no
fiber is attached to it.
----End
Context
Automatic LMSP switching modes are classified as 1:1 bidirectional or 1+1 unidirectional.
The default automatic LMSP switching mode is 1+1 unidirectional.
After a fault in the working link is rectified, services automatically switch from the protection
link to the working link. During the switchback, some service traffic is dropped because some
resources related to the working link or NE40E are being restored. To prevent service loss, the
WTR time can be set on the NE40E to delay a switchback. Services can automatically switch
from the protection link back to the working link in the specified WTR time after the working
link becomes available.
Procedure
l Configure an automatic protection switching mode for an LMSP group.
a. Run system-view
A working mode is configured for the LMSP group. One of the following parameter
combinations can be configured:
n one2one bidirection:
○ 1:1 mode: Only the working link transmits traffic. The protection link
takes over traffic only if the working link fails.
○ Bidirectional mode: The transmit end sends traffic along and the receive
end receives traffic from the protection link if a fault occurs on the
working link.
n one-plus-one unidirection:
○ 1+1 mode: Both the working and protection links transmit traffic.
○ Unidirectional mode: Only the receive end receives traffic from the
protection link if a fault occurs on the optical fiber to an interface.
n one-plus-one bidirection:
○ 1+1 mode: Both the working and protection links transmit traffic.
○ Bidirectional mode: The transmit end sends traffic along and the receive
end receives traffic from the protection link if a fault occurs on the
working link.
d. Run commit
The configuration is committed.
l (Optional) Set the WTR time for an LMSP group.
a. Run system-view
The system view is displayed.
b. Run the following commands:
controller cpos cpos-number
NOTE
If two different switchback delays are set on two protection interfaces in LMSP groups on
two ends of a link, the effective switchback delay depends on one of the following
situations:
l If one-plus-one unidirection is configured, the switchback delays on both protection
interfaces take effect after the working interfaces recover.
l If one2one bidirection or one-plus-one bidirection is configured, the switchback delay
on the protection interface of the device with the working interface recovering later than
the other working interface takes effect on both protection interfaces.
l In an MC-LMSP scenario, the switchback time must be the same on two LMSP devices
on the RNC side and slave RSG side.
d. Run commit
The configuration is committed.
----End
Context
To monitor an MC-LMSP group, a BFD session monitors an mPW between the working and
protection interfaces on the AC side, and the MC-LMSP group is bound to another BFD
session. If faults occur, the working and protection devices can use BFD to notify each other
of the faults and implement rapid traffic switchovers between the working and protection
devices.
Perform the following steps on the working or protection interface of an LMSP group:
Procedure
Step 1 Run system-view
This configuration procedure is based on a scenario where BFD is configured to track the
status of the working interface and quickly transmit the status to the device where the
protection interface resides. The procedure for configuring BFD to track the protection
interface and quickly transmit the status to the device where the working interface resides is
similar.
NOTE
The undo aps group command deletes the LMSP group configurations and removes the binding
between the LMSP group and a BFD session if configured.
----End
Context
Two MC-LMSP-enabled Routers run the Protection Group Protocol (PGP) to exchange
control messages along an outband channel at a specified interval. PGP negotiation messages
are exchanged periodically to verify MC-LMSP connectivity. If no response arrives within a
specified period, the Router considers its peer Router faulty and does not perform MC-LMSP
switching even though a switching trigger condition is met.
In addition to the interval at which negotiation messages are sent, the MC-LMSP connection
hold time can also be set on the NE40Es. The local NE40E retains the MC-LMSP connection
during the configured hold time. If no negotiation message is received after the hold time
elapses, the local NE40E considers the MC-LMSP connection is torn down.
PGP is a Layer 3 Huawei proprietary protocol and operates over a UDP connection. PGP's
default authentication mode is none. Messages transmitted in none authentication mode can
be easily used to initiate attacks. To protect the NE40E running PGP, an authentication string
can be configured so that PGP messages are authenticated. Two MC-LMSP-enabled Routers
use the authentication string to authenticate PGP messages. Negotiation can be successfully
performed only when the two Routers use the same authentication string. Authentication
string inconsistency will lead to a negotiation failure.
Perform the following steps on the working and protection interfaces of an LMSP group:
Procedure
l Set the interval at which LMSP negotiation messages are sent and the LMSP connection
hold time.
a. Run system-view
The interval at which MC-LMSP negotiation messages are sent and the hold time of
the LMSP connection between the working and protection interfaces are set.
d. Run commit
NOTE
----End
Context
LMSP is used to protect traffic on attachment circuit (AC) links connecting Routers to Add/
Drop Multiplex (ADM) devices or Radio Network Controllers (RNCs) on a Synchronous
Digital Hierarchy (SDH) network. AC-side physical channelized Packet Over SDH/SONET
(CPOS) interfaces on the Routers are added to a trunk interface to carry services.
Perform the following steps on the working and protection interfaces of an LMSP group:
Procedure
Step 1 Run system-view
A CPOS-Trunk interface is created, and the view of the CPOS-Trunk interface is displayed.
NOTE
LMSP can be configured on the CPOS interfaces. The corresponding trunk interfaces are CPOS-Trunk.
NOTE
The working and protection interfaces of an LMSP group must be added to the trunk interface with the
same trunk ID.
----End
Procedure
Step 1 Run the display aps group group-id command to check configurations of an LMSP group.
Step 2 Run the display cpos-trunk trunk-id command to check configurations of the CPOS-Trunk
interfaces.
----End
Context
The switching modes are prioritized in descending order:
Protection lockout > Forcible switching to the working link > Forcible switching to the
protection link > Manual switching to the working link > Manual switching to the protection
link
l Protection lock: Services are being transmitted on the working link and are unable to
switch to the protection link even though the working link becomes unavailable.
l Forcible switching to the working link: After services have been switched to the
protection link, the services can be forcibly switched back to the working link. Even if an
SD or SF fault occurs on the working link, the services will not be switched to the
protection link. As a result, services are interrupted.
l Forcible switching to the protection link: If the working link fails, services are forcibly
switched to the protection link. If an SD fault occurs on the protection link, the services
may be interrupted. If an SF fault occurs on the protection link, a device sends a request
to its peer to switch the services back to the working link.
l Manual switching to the working link: If a traffic switchover has been performed in an
LMSP group and the working link has no fault, services can be manually switched to the
working link. A device will send a request to its peer to switch services to the protection
link if an SF or SD fault occurs on the working link.
l Manual switching to the protection link: If the working and protection links have no SF
or SD fault, services can be manually switched to the protection link. A device will send
a request to its peer to switch services to the working link if an SF or SD fault occurs on
the protection link.
Procedure
l Configure a command-triggered switching mode for an LMSP group.
a. Run system-view
NOTE
When using an aps switch-command command instance, ensure that the priority of the
switch command is higher than that of an existing switch command. Otherwise, the
command to be used does not take effect.
If the force or manual parameter is configured, the display this command does not display
configurations. You can run the display aps group group-id command to view
configurations.
----End
Networking Requirements
TDMoPSN service can enable mobile operators to receive transparent transmission of 2G
services between BTSs and BSCs in the same city through TDM links in a Metro Ethernet
(ME) network. This simple and cost-reducing service can be essential, because usually, it
requires one to three E1 interfaces on a BTS to connect to a BSC on a 2G RAN, and some
mobile operators do not own fixed network infrastructure and have to rent E1 lines at high
prices.
In Figure 13-4, it is required that the BTS and PE1 be connected through two E1 links. The
BSC and PE2 should be connected through the CPOS interface, which are configured with
LMSP so as to increase reliability of data. The encapsulation protocol on the channelized
serial interface of the E1 links needs to be configured as TDM. Finally, a PW needs to be set
up between PE1 and PE2 to transparently transmit TDM cells.
The configurations in this example are performed on PE-1 and PE-2. HUAWEI NE40E-M2 Series can
function as PE-1 and PE-2.
Interfaces 1 through 2 in this example are GE 0/1/0, GE 0/2/0 respectively.
E1
interface 1 interface 2
E1 10.1.1.1/24 10.2.1.2/24 CPOS
2 ×TDM E1
interface 1 interface 2
10.1.1.2/24 10.2.1.1/24 CPOS
PE1 P PE2 BSC
PWE3 TDM
Transparent Cell Transport
BTS
Loopback0 192.168.1.2/32
P GE 0/1/0 10.1.1.2/24
GE 0/2/0 10.2.1.1/24
Loopback0 192.168.1.4/32
Loopback0 192.168.1.3/32
Configuration Roadmap
The configuration roadmap is as follows:
1. Run an IGP protocol on the backbone network so that devices can communicate with
each other.
2. Configure basic MPLS functions on the backbone network, as well as MPLS L2VPN
functions on PEs. Establish a remote MPLS LDP peer relationship between PEs at both
ends of a PW.
3. Configure LMSP on PE2.
4. Configure TDM interface parameters.
5. Configure a PW template.
6. Establish MPLS L2VC connections on PE1 and PE2.
Data Preparation
To complete the configuration, you need the following data:
l L2VC ID at both ends of the PW (must be the same)
l MPLS LSR IDs of the PEs and P device
l IP addresses of the remote peers of PEs
Procedure
Step 1 Run an IGP protocol on the backbone network so that devices can communicate with each
other. For detailed configurations, see the configuration file of this example.
Step 2 Configure basic MPLS functions on the backbone network, as well as MPLS L2VPN
functions on PEs. Then, establish the remote MPLS LDP peer relationship between PEs at
both ends of the PW. For configuration details, see Configuration Files in this section.
The remote MPLS LDP peer relationship is only required for dynamic PWs.
Step 3 Configure LMSP.
Configure PE2.
[~PE2] interface cpos-trunk 1
[*PE2-cpos-trunk1] commit
[~PE2-cpos-trunk1] quit
[~PE2] controller cpos 0/3/1
[*PE2-Cpos0/3/1] aps group 1
[*PE2-Cpos0/3/1] aps working
[*PE2-Cpos0/3/1] commit
[~PE2-Cpos0/3/1] quit
[~PE2] controller cpos 0/3/2
[*PE2-Cpos0/3/2] aps group 1
[*PE2-Cpos0/3/2] aps protect
[*PE2-Cpos0/3/2] aps mode one-plus-one unidirection
[*PE2-Cpos0/3/2] commit
[~PE2-Cpos0/3/2] quit
[~PE2] controller cpos 0/3/1
[~PE2-Cpos0/3/1] cpos-trunk 1
[*PE2-Cpos0/3/1] commit
[~PE2-Cpos0/3/1] quit
[~PE2] controller cpos 0/3/2
[~PE2-Cpos0/3/2] cpos-trunk 1
[*PE2-Cpos0/3/2] commit
[~PE2-Cpos0/3/2] quit
# Run the display aps group command on PE2 to view LMSP group configurations. Run the
display cpos-trunk command on also on PE2 to view CPOS-Trunk interface configurations.
<PE2> display aps group 1
APS Group 1: Cpos 0/3/1 working channel 1(Active)
Cpos0/3/2 protection channel 0(Inactive)
Unidirection, 1+1 mode, No Revert mode
No Request on Both Working and Protection Side
------------------------------------------------------------------------
Group Work-Channel Protect-Channel Wtr W-State P-State Switch-Cmd Switch-Result
------------------------------------------------------------------------
1 Cpos 0/3/1 Cpos 0/3/2 NA ok ok NA idle
------------------------------------------------------------------------
total entry: 1
<PE2> display cpos-trunk 1
Interface Cpos-Trunk1's state information is:,
Operate status: up Number Of Up Port In Trunk: 2
--------------------------------------------------------------------------------
PortName Status Active Status
Cpos0/3/1 Up Active
Cpos0/3/2 Up Inactive
2. Configure PE2.
# Set CPOS-Trunk interface parameters on PE2.
[~PE2] interface cpos-trunk 1
[~PE2-Cpos-trunk1] e1 1 unframed
[*PE2-Cpos-trunk1] e1 2 unframed
[*PE2-Cpos-trunk1] commit
[~PE2-Cpos-trunk1] quit
2. Configure PE2.
[~PE2] interface trunk-serial1/1:0
[~PE2-Trunk-Serial1/1:0] link-protocol tdm
[*PE2-Trunk-Serial1/1:0] commit
[~PE2-Trunk-Serial1/1:0] quit
[~PE2] interface trunk-serial1/2:0
[~PE2-Trunk-Serial1/2:0] link-protocol tdm
[*PE2-Trunk-Serial1/2:0] commit
[~PE2-Trunk-Serial1/2:0] quit
2. Configure PE2.
[~PE2] pw-template 3to1
[*PE2-pw-template-3to1] peer-address 192.168.1.2
[*PE2-pw-template-3to1] jitter-buffer depth 20
[*PE2-pw-template-3to1] tdm-encapsulation-number 40
[*PE2-pw-template-3to1] commit
[~PE2-pw-template-3to1] quit
[~PE2] interface trunk-serial1/1:0
[~PE2-Trunk-Serial1/1:0] mpls l2vc pw-template 3to1 100
[*PE2-Trunk-Serial1/1:0] undo shutdown
[*PE2-Trunk-Serial1/1:0] commit
[~PE2-Trunk-Serial1/1:0] quit
[~PE2] interface trunk-serial1/2:0
[~PE2-Trunk-Serial1/2:0] mpls l2vc pw-template 3to1 200
[*PE2-Trunk-Serial1/2:0] undo shutdown
[*PE2-Trunk-Serial1/2:0] commit
[~PE2-Trunk-Serial1/2:0] quit
Run the display mpls l2vc command on PE1. The command output shows that the PW
status is Up.
<PE1> display mpls l2vc interface serial0/2/1:0
*client interface : Serial0/2/1:0 is up
session state : up
AC state : up
VC state : up
VC ID : 100
VC type : SAT E1 over Packet
destination : 192.168.1.3
local group ID : 0
remote group ID : 0
local VC label : 146432
remote VC label : 145287
TDM encapsulation number : 40
jitter-buffer : 20
idle-code : FF
rtp-header : disable
local AC OAM State : up
local PSN State : up
local forwarding state : forwarding
local status code : 0x0
remote AC OAM state : up
remote PSN state : up
remote forwarding state: forwarding
remote statuscode : 0x0
BFD for PW : unavailable
manual fault : not set
active state : active
forwarding entry : not exist
link state : up
local VC MTU : 1500
remote VC MTU : 1500
local VCCV : alert lsp-ping bfd
remote VCCV : none
local control word : disable
remote control word : disable
tunnel policy name : --
traffic behavior name : --
PW template name : --
primary or secondary : primary
VC tunnel/token info : 0 tunnels/tokens
create time : 0 days, 4 hours, 48 minutes, 51 seconds
up time : 0 days, 3 hours, 43 minutes, 49 seconds
last change time : 0 days, 0 hours, 39 minutes, 29 seconds
VC last up time : 2008/12/26 12:02:49
VC total up time : 0 days, 3 hours, 43 minutes, 49 seconds
CKey : 11
NKey : 10
Run the display aps group 1 command on PE2. The LMSP status changes to Switch. Run the
display cpos-trunk 1 command to view the CPOS-Trunk member interface status. CPOS
0/3/2 becomes Active.
[~PE2] display aps group 1
APS Group 1: Cpos 0/3/1 working channel 1(Inactive)
Cpos0/3/2 protection channel 0(Active)
Unidirection, 1+1 mode, No Revert mode
No Request on Both Working and Protection Side
------------------------------------------------------------------------
Group Work-Channel Protect-Channel Wtr W-State P-State Switch-Cmd Switch-Result
------------------------------------------------------------------------
1 Cpos 0/3/1 Cpos 0/3/2 NA sf ok NA switch
------------------------------------------------------------------------
total entry: 1
<PE2> display cpos-trunk 1
Interface Cpos-Trunk1's state information is:,
Operate status: up Number Of Up Port In Trunk: 2
--------------------------------------------------------------------------------
PortName Status Active Status
Cpos0/3/1 Down Inactive
Cpos0/3/2 Up Active
Run the display mpls l2vc command on PEs. The command output shows that the PW status
is Up and has not been affected by the fault in CPOS 0/3/1.
The following example uses the command output on PE1.
<PE1> display mpls l2vc interface serial0/2/1:0
*client interface : Serial0/2/1:0 is up
session state : up
AC state : up
VC state : up
VC ID : 100
VC type : SAT E1 over Packet
destination : 192.168.1.3
local group ID : 0
remote group ID : 0
local VC label : 146432
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
#
mpls lsr-id 192.168.1.2
mpls
#
mpls l2vpn
#
pw-template 1to3
peer-address 192.168.1.3
jitter-buffer depth 20
tdm-encapsulation-number 40
#
mpls ldp
#
mpls ldp remote-peer 192.168.1.3
remote-ip 192.168.1.3
#
controller e1 0/2/1
using e1
undo shutdown
#
controller e1 0/2/2
using e1
undo shutdown
#
interface serial0/2/1:0
link-protocol tdm
mpls l2vc pw-template 1to3 100
undo shutdown
#
interface serial0/2/2:0
link-protocol tdm
mpls l2vc pw-template 1to3 200
undo shutdown
#
interface GigabitEthernet0/1/0
undo shutdown
ip address 10.1.1.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 192.168.1.2 255.255.255.255
#
ospf 1
area 0.0.0.0
network 192.168.1.2 0.0.0.0
network 10.1.1.0 0.0.0.255
#
return
l PE2 configuration file
#
sysname PE2
#
mpls lsr-id 192.168.1.3
mpls
#
mpls l2vpn
#
pw-template 3to1
peer-address 192.168.1.2
jitter-buffer depth 20
tdm-encapsulation-number 40
#
mpls ldp
#
mpls ldp remote-peer 192.168.1.2
remote-ip 192.168.1.2
#
controller Cpos0/3/1
undo shutdown
aps group 1
aps working
#
controller Cpos0/3/2
undo shutdown
aps group 1
aps protect
aps mode one-plus-one unidirection
#
interface cpos-trunk1
e1 1 unframed
e1 2 unframed
Cpos0/3/1
Cpos0/3/2
#
interface trunk-serial1/1:0
link-protocol tdm
mpls l2vc pw-template 3to1 100
undo shutdown
#
interface trunk-serial1/2:0
link-protocol tdm
mpls l2vc pw-template 3to1 200
undo shutdown
#
interface GigabitEthernet0/2/0
undo shutdown
ip address 10.2.2.2 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 192.168.1.3 255.255.255.255
#
ospf 1
area 0.0.0.0
network 192.168.1.3 0.0.0.0
network 10.2.1.0 0.0.0.255
#
return
l P configuration file
#
sysname P
#
mpls lsr-id 192.168.1.4
mpls
#
mpls ldp
#
interface GigabitEthernet0/1/0
undo shutdown
ip address 10.1.1.2 255.255.255.0
mpls
mpls ldp
#
interface GigabitEthernet0/2/0
undo shutdown
ip address 10.2.2.1 255.255.255.0
mpls
mpls ldp
#
interface LoopBack0
ip address 192.168.1.4 255.255.255.255
#
ospf 1
area 0.0.0.0
network 192.168.1.4 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.2.1.0 0.0.0.255
#
return
Networking Requirements
As shown in Figure 13-5, mid-range-and-low-end devices are connected to the transport
network through E1 links. These E1 links are aggregated into a CPOS-Trunk interface
configured on Device A. Device A uses timeslots to identify these devices. The CPOS-Trunk
interface on Device A consists of two CPOS interfaces. Single-chassis LMSP needs to be
configured on the CPOS interfaces to improve data transfer reliability.
The configurations in this example are performed on Device-A. HUAWEI NE40E-M2 Series can
function as Device-A.
E1 ..
ADM
Device A
CPOS
E1
ADM STM-4/16 ADM CPOS-Trunk 0 Internet
OC-3/STM-1 CPOS
ADM
nx E1 ..
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure single-chassis LMSP on the two CPOS interfaces and add the CPOS
interfaces to a CPOS-Trunk interface.
2. Bundle timeslots of E1 channels in the CPOS-Trunk interface to create Trunk-Serial
interfaces and add the Trunk-Serial interfaces into a Global-MP-Group interface.
Data Preparation
To complete the configuration, you need the following data:
l LMSP parameters
l CPOS-Trunk interface parameters
l Global-MP-Group interface number
Procedure
Step 1 Configure single-chassis LMSP.
1. Configure single-chassis LMSP on Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[~HUAWEI] commit
[~DeviceA] controller cpos 0/1/0
[*DeviceA-Cpos0/1/0] undo shutdown
2. Create a CPOS-Trunk interface on Device A and add CPOS interfaces to the CPOS-
Trunk interface.
[~DeviceA] interface cpos-trunk 0
[*DeviceA-Cpos-Trunk0] commit
[~DeviceA-Cpos-Trunk0] quit
[~DeviceA] controller cpos 0/1/0
[~DeviceA-Cpos0/1/0] cpos-trunk 0
[*DeviceA-Cpos0/1/0] commit
[~DeviceA-Cpos0/1/0] quit
[~DeviceA] controller cpos 0/2/0
[~DeviceA-Cpos0/2/0] cpos-trunk 0
[*DeviceA-Cpos0/2/0] commit
[~DeviceA-Cpos0/2/0] quit
------------------------------------------------------------------------
Group Work-Channel Protect-Channel Wtr W-State P-State Switch-Cmd Switch-Result
------------------------------------------------------------------------
1 Cpos0/1/0 Cpos0/2/0 6 ok ok NA idle
------------------------------------------------------------------------
total entry: 1
# Run the display cpos-trunk command to view the CPOS-Trunk interface configuration.
The command output shows the status of CPOS-Trunk member interfaces.
[~DeviceA] display cpos-trunk 0
Interface Cpos-Trunk0's state information is:
Operate status: up Number Of Up Port In Trunk: 1
--------------------------------------------------------------------------------
PortName Status Active Status
Cpos0/1/0 Up Active
Cpos0/2/0 Up Inactive
# Run the display ppp mp-global command to view the Global-MP-Group interface
configuration. The command output shows the status of Trunk-Serial interfaces in the Global-
MP-Group interface.
[~DeviceA] display ppp mp-global
Global-Mp-Group is Global-Mp-Group0
===========Sublinks status begin======
Trunk-Serial0/1:0 physical UP,protocol UP
Trunk-Serial0/2:0 physical UP,protocol UP
===========Sublinks status end========
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
controller Cpos0/1/0
undo shutdown
aps group 1
aps working
cpos-trunk 0
#
controller Cpos0/2/0
undo shutdown
aps group 1
aps protect
aps mode one-plus-one unidirection
aps revert 6
cpos-trunk 0
#
interface Cpos-Trunk0
undo shutdown
e1 1 channel-set 1 timeslot-list 1-15
e1 2 channel-set 2 timeslot-list 17-31
#
interface Global-Mp-Group0
undo shutdown
#
interface Trunk-Serial0/1:1
undo shutdown
link-protocol ppp
ppp mp-global global-mp-group 0
#
interface Trunk-Serial0/2:2
undo shutdown
link-protocol ppp
ppp mp-global global-mp-group 0
#
return
Networking Requirements
As shown in Figure 13-6, PE1 is dual-homed to PE2 and PE3 through two PWs. MC-LMSP
is implemented on the AC side to prevent a network fault from causing data loss.
NOTE
If the LMSP-enabled interface uses a dynamic routing protocol to advertise routes on the Layer-3 IP packet
forwarding network using PPP, the dynamic routes must be learned again after an LMSP is performed. The
route convergence takes dozens of seconds, causing a service interruption. To prevent the problem, static
routes can be bound to the master device, backup device, and the LMSP-enabled interfaces of a radio network
controller (RNC) and imported by a dynamic routing protocol. When an LMSP is performed, the routes do
not have to be learned again, which accelerates the route convergence and prevents a long service
interruption.
Figure 13-6 Configuring dual-system LMSP in the scenario of forwarding IP packets using
PPP
Loopback0 Loopback0
2.2.2.2 4.4.4.4
Loopback0 P1 PE2
interface6 int
1.1.1.1 erf
ac
e5
e1 e1
interface1 int
ac ac erf
erf erf ac CE2
int int e3
interface2
PE1 MC-LMSP
inte i nt e interface2 4
rfa a ce
rfa ce erf
ce 2 2
interface1 int
e 5
ac
nt er f
i
interface1
P2 PE3
CE1
Loopback0 Loopback0
3.3.3.3 5.5.5.5
P1 interface1 GE0/2/1
interface6 GE0/2/5
P2 interface1 GE0/2/1
interface2 GE0/2/2
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
l IP addresses of interfaces
l MC-LMSP parameters
l CPOS-Trunk interface parameters
l Global-MP-Group interface number
Procedure
Step 1 Configure IP addresses.
Assign the IP address and mask to each interface according to Figure 13-6. For configuration
details, see Configuration Files in this section.
# Configure PE3.
[~PE3] controller cpos 0/2/3
[~PE3-Cpos0/2/3] undo shutdown
[*PE3-Cpos0/2/3] aps group 24
[*PE3-Cpos0/2/3] aps protect 5.5.5.5 4.4.4.4
[*PE3-Cpos0/2/3] aps mode one2one bidirection
[*PE3-Cpos0/2/3] aps revert 1
[*PE3-Cpos0/2/3] commit
[~PE3-Cpos0/2/3] quit
# Configure CE2.
[~CE2] controller cpos0/2/1
[~CE2-Cpos0/2/1] undo shutdown
[*CE2-Cpos0/2/1] aps group 24
[*CE2-Cpos0/2/1] aps working
[*CE2-Cpos0/2/1] commit
[~CE2-Cpos0/2/1] quit
[~CE2] controller cpos0/2/2
[~CE2-Cpos0/2/2] undo shutdown
[*CE2-Cpos0/2/2] aps group 24
[*CE2-Cpos0/2/2] aps protect
[*CE2-Cpos0/2/2] aps mode one2one bidirection
[*CE2-Cpos0/2/2] aps revert 1
[*CE2-Cpos0/2/2] commit
[~CE2-Cpos0/2/2] quit
2. Create a CPOS-Trunk on PE2, PE3, and CE2 and add interfaces to the CPOS-Trunk.
# Configure PE2.
[~PE2] interface Cpos-Trunk 24
[*PE2-Cpos-Trunk24] e1 24 unframed
[*PE2-Cpos-Trunk24] commit
[~PE2-Cpos-Trunk24] quit
[~PE2] controller cpos0/2/3
[~PE2-Cpos0/2/3] cpos-Trunk 24
[*PE2-Cpos0/2/3] commit
[~PE2-Cpos0/2/3] quit
# Configure PE3.
[~PE3] interface Cpos-Trunk 24
[*PE3-Cpos-Trunk24] e1 24 unframed
[*PE3-Cpos-Trunk24] commit
[~PE3-Cpos-Trunk24] quit
[~PE3] controller cpos0/2/3
[~PE3-Cpos0/2/3] cpos-Trunk 24
[*PE3-Cpos0/2/3] commit
[~PE3-Cpos0/2/3] quit
# Configure CE2.
[~CE2] interface Cpos-Trunk 24
[*CE2-Cpos-Trunk24] e1 24 unframed
[*CE2-Cpos-Trunk24] commit
[~CE2-Cpos-Trunk24] quit
[~CE2] controller cpos0/2/1
[~CE2-Cpos0/2/1] cpos-Trunk 24
[*CE2-Cpos0/2/1] commit
[~CE2-Cpos0/2/1] quit
[~CE2] controller cpos0/2/2
[~CE2-Cpos0/2/2] cpos-Trunk 24
[*CE2-Cpos0/2/2] commit
[~CE2-Cpos0/2/2] quit
# Configure PE2.
[~PE2] interface Global-Mp-Group 24
[*PE2-Global-Mp-Group24] ip address 27.1.1.3 255.255.255.0
[*PE2-Global-Mp-Group24] commit
[~PE2-Global-Mp-Group24] quit
# Configure PE3.
[~PE3] interface Global-Mp-Group 24
[*PE3-Global-Mp-Group24] ip address 27.1.1.3 255.255.255.0
[*PE3-Global-Mp-Group24] commit
[~PE3-Global-Mp-Group24] quit
# Configure CE2.
[~CE2] interface Global-Mp-Group 24
[*CE2-Global-Mp-Group24] ip address 27.1.1.1 255.255.255.0
[*CE2-Global-Mp-Group24] commit
[~CE2-Global-Mp-Group24] quit
# Configure PE2.
[~PE2] interface Trunk-Serial 24/24:0
[~PE2-Trunk-Serial24/24:0] link-protocol ppp
[*PE2-Trunk-Serial24/24:0] ppp mp-global global-mp-group 24
[*PE2-Trunk-Serial24/24:0] commit
[~PE2-Trunk-Serial24/24:0] quit
# Configure PE3.
[~PE3] interface Trunk-Serial 24/24:0
[~PE3-Trunk-Serial24/24:0] link-protocol ppp
[*PE3-Trunk-Serial24/24:0] ppp mp-global global-mp-group 24
[*PE3-Trunk-Serial24/24:0] commit
[~PE3-Trunk-Serial24/24:0] quit
# Configure CE2.
[~CE2] interface Trunk-Serial 24/24:0
[~CE2-Trunk-Serial24/24:0] link-protocol ppp
[*CE2-Trunk-Serial24/24:0] ppp mp-global global-mp-group 24
[*CE2-Trunk-Serial24/24:0] commit
[~CE2-Trunk-Serial24/24:0] quit
Step 4 Bind static routes to the LMSP-enabled interfaces of PE2, PE3, and CE2.
# Configure PE2.
[~PE2] ip route-static 193.4.1.0 255.255.255.0 Global-Mp-Group24 27.1.1.1
NOTE
# Configure PE3.
[~PE3] ip route-static 193.4.1.0 255.255.255.0 Global-Mp-Group24 27.1.1.1
NOTE
# Configure CE2.
[~CE2] ip route-static 193.4.2.0 255.255.255.0 Global-Mp-Group24 27.1.1.3
NOTE
Step 5 Configure an Interior Gateway Protocol (IGP) and import static routes on PE2, PE3, and CE2.
Intermediate System to Intermediate System (IS-IS) is used in this example.
# Configure PE1.
[~PE1] isis 1
[*PE1-isis-1] is-level level-1
[*PE1-isis-1] network-entity 1111.1111.1111.1111.00
[*PE1-isis-1] graceful-restart
[*PE1-isis-1] cost-style wide-compatible
[*PE1-isis-1] timer spf 1 1 50
[*PE1-isis-1] traffic-eng level-1-2
[*PE1-isis-1] commit
[~PE1-isis-1] quit
[~PE1] interface gigabitEthernet 0/2/1
[~PE1-GigabitEthernet0/2/1] isis enable 1
[*PE1-GigabitEthernet0/2/1] commit
[~PE1-GigabitEthernet0/2/1] quit
[~PE1] interface gigabitEthernet 0/2/2
[~PE1-GigabitEthernet0/2/2] isis enable 1
[*PE1-GigabitEthernet0/2/2] commit
[~PE1-GigabitEthernet0/2/2] quit
[~PE1] interface loopback 0
[~PE1-LoopBack0] isis enable 1
[~PE1-LoopBack0] commit
[~PE1-LoopBack0] quit
# Configure P1.
[~P1] isis 1
[*P1-isis-1] is-level level-1
[*P1-isis-1] network-entity 2222.2222.2222.2222.00
[*P1-isis-1] graceful-restart
[*P1-isis-1] cost-style wide-compatible
[*P1-isis-1] timer spf 1 1 50
[*P1-isis-1] traffic-eng level-1-2
[*P1-isis-1] commit
[~P1-isis-1] quit
[~P1] interface gigabitEthernet 0/2/1
[~P1-GigabitEthernet0/2/1] isis enable 1
[*P1-GigabitEthernet0/2/1] commit
[~P1-GigabitEthernet0/2/1] quit
[~P1] interface gigabitEthernet 0/2/5
[~P1-GigabitEthernet0/2/5] isis enable 1
[*P1-GigabitEthernet0/2/5] commit
[~P1-GigabitEthernet0/2/5] quit
[~P1] interface loopback 0
[~P1-LoopBack0] isis enable 1
[*P1-LoopBack0] commit
[~P1-LoopBack0] quit
# Configure P2.
[~P2] isis 1
# Configure PE2.
[~PE2] isis 1
[*PE2-isis-1] import-route static
[*PE2-isis-1] is-level level-1
[*PE2-isis-1] network-entity 4444.4444.4444.4444.00
[*PE2-isis-1] graceful-restart
[*PE2-isis-1] cost-style wide-compatible
[*PE2-isis-1] timer spf 1 1 50
[*PE2-isis-1] traffic-eng level-1-2
[*PE2-isis-1] commit
[~PE2-isis-1] quit
[~PE2] interface gigabitEthernet 0/2/1
[~PE2-GigabitEthernet0/2/1] isis enable 1
[*PE2-GigabitEthernet0/2/1] commit
[~PE2-GigabitEthernet0/2/1] quit
[~PE2] interface gigabitEthernet 0/2/2
[~PE2-GigabitEthernet0/2/2] isis enable 1
[*PE2-GigabitEthernet0/2/2] commit
[~PE2-GigabitEthernet0/2/2] quit
[~PE2] interface loopback 0
[~PE2-LoopBack0] isis enable 1
[*PE2-LoopBack0] commit
[~PE2-LoopBack0] quit
[~PE2] interface global-mp-group 24
[*PE2-Global-Mp-Group24] isis enable 1
[*PE2-Global-Mp-Group24] commit
[~PE2-Global-Mp-Group24] quit
# Configure PE3.
[~PE3] isis 1
[*PE3-isis-1] import-route static
[*PE3-isis-1] is-level level-1
[*PE3-isis-1] network-entity 5555.5555.5555.5555.00
[*PE3-isis-1] graceful-restart
[*PE3-isis-1] cost-style wide-compatible
[*PE3-isis-1] timer spf 1 1 50
[*PE3-isis-1] traffic-eng level-1-2
[*PE3-isis-1] commit
[~PE3-isis-1] quit
[~PE3] interface gigabitEthernet 0/2/1
[~PE3-GigabitEthernet0/2/1] isis enable 1
[*PE3-GigabitEthernet0/2/1] commit
[~PE3-GigabitEthernet0/2/1] quit
[~PE3] interface gigabitEthernet 0/2/2
[~PE3-GigabitEthernet0/2/2] isis enable 1
[*PE3-GigabitEthernet0/2/2] commit
[~PE3-GigabitEthernet0/2/2] quit
# Configure CE2.
[~CE2] isis 1
[*CE2-isis-1] import-route static
[*CE2-isis-1] is-level level-1
[*CE2-isis-1] network-entity 5555.5555.5555.5555.00
[*CE2-isis-1] graceful-restart
[*CE2-isis-1] cost-style wide-compatible
[*CE2-isis-1] timer spf 1 1 50
[*CE2-isis-1] traffic-eng level-1-2
[*CE2-isis-1] commit
[~CE2-isis-1] quit
[~CE2] interface global-mp-group 24
[*CE2-Global-Mp-Group24] isis enable 1
[*CE2-Global-Mp-Group24] commit
[~CE2-Global-Mp-Group24] quit
# Run the display current-configuration | include route command on PE2, PE3, and CE2 to
view the configured parameters.
[~PE2] display current-configuration | include route
import-route static
ip route-static 193.4.1.0 255.255.255.0 Global-Mp-Group24 27.1.1.1
[~PE3] display current-configuration | include route
import-route static
ip route-static 193.4.1.0 255.255.255.0 Global-Mp-Group24 27.1.1.1
[~CE2] display current-configuration | include route
import-route static
ip route-static 193.4.2.0 255.255.255.0 Global-Mp-Group24 27.1.1.3
----End
Configuration Files
l PE1 configuration file
#
sysname PE1
isis 1
is-level level-1
network-entity 1111.1111.1111.1111.00
graceful-restart
cost-style wide-compatible
timer spf 1 1 50
traffic-eng level-1-2
#
interface gigabitEthernet 0/2/1
isis enable 1
interface loopBack 0
ip address 1.1.1.1 32
#
return
l P1 configuration file
isis 1
is-level level-1
network-entity 2222.2222.2222.2222.00
graceful-restart
cost-style wide-compatible
timer spf 1 1 50
traffic-eng level-1-2
#
interface gigabitEthernet 0/2/1
isis enable 1
interface loopBack 0
ip address 2.2.2.2 32
#
return
l P2 configuration file
isis 1
is-level level-1
network-entity 3333.3333.3333.3333.00
graceful-restart
cost-style wide-compatible
timer spf 1 1 50
traffic-eng level-1-2
#
interface gigabitEthernet 0/2/2
isis enable 1
interface loopBack 0
ip address 3.3.3.3 32
#
return
l PE2 configuration file
isis 1
import-route static
is-level level-1
network-entity 4444.4444.4444.4444.00
graceful-restart
cost-style wide-compatible
timer spf 1 1 50
traffic-eng level-1-2
#
interface gigabitEthernet 0/2/1
isis enable 1
interface global-mp-group 24
isis enable 1
interface loopBack 0
ip address 4.4.4.4 32
#
controller Cpos0/2/3
undo shutdown
aps group 24
aps working 4.4.4.4 5.5.5.5
cpos-trunk 24
#
interface Trunk-Serial24/24:0
link-protocol ppp
ppp mp-global global-mp-group 24
#
interface Global-Mp-Group24
ip address 27.1.1.3 255.255.255.0
#
return
l PE3 configuration file
isis 1
import-route static
is-level level-1
network-entity 5555.5555.5555.5555.00
graceful-restart
cost-style wide-compatible
timer spf 1 1 50
traffic-eng level-1-2
#
interface gigabitEthernet 0/2/1
isis enable 1
interface global-mp-group 24
isis enable 1
interface loopBack 0
ip address 5.5.5.5 32
#
controller
Cpos0/2/3
undo
shutdown
aps group
24
aps protect 4.4.4.4
5.5.5.5
#
interface Cpos-
Trunk24
e1 24 unframed
#
interface Trunk-
Serial24/24:0
link-protocol
ppp
ppp mp-global global-mp-group 24
#
interface Global-Mp-
Group24
ip address 27.1.1.3 255.255.255.0
#
return
Transmission alarm customization and suppression can reduce the impact of transmission
alarms on network stability.
Definition
Carrier-class networks require high reliability for IP devices. IP devices are required to
rapidly detect faults.
When the fast detection function is enabled on an interface, alarm reporting becomes faster.
This may cause the physical status of the interface to switch between Up and Down. As a
result, the network flaps frequently. Therefore, alarms must be filtered and suppressed to
prevent frequent network flapping.
Transmission alarm suppression can efficiently filter and suppress alarm signals to prevent
interfaces from frequently flapping. In addition, transmission alarm customization can control
the impact of alarms on the interface status.
Transmission alarm customization and suppression provide the following functions:
l The Transmission alarm customization function allows you to specify alarms that can
cause the physical status of an interface to change. This function helps filter out
unwanted alarms.
l The Transmission alarm suppression function allows you to suppress network flapping
by setting a series of thresholds.
Purpose
Transmission alarm customization allows you to filter unwanted alarms, and transmission
alarm suppression enables you to set thresholds on customized alarms, allowing devices to
ignore burrs generated during transmission link protection and preventing frequent network
flapping.
On a backbone network or an MAN, IP devices are connected to transmission devices,
including synchronous digital hierarchy (SDH), Synchronous Optical Network (SONET), or
Wavelength Division Multiplexing (WDM) transmission devices. When transmission devices
become faulty, IP devices will receive alarms. Then, faulty transmission devices perform link
switchovers and the alarms disappear. After an alarm is generated, a link switchover lasts 50
ms to 200 ms. In the log information on IP devices, the transmission alarms are displayed as
burrs that last 50 ms to 200 ms. These burrs will cause the interface status of IP devices to
switch frequently. IP devices will perform route calculation frequently. As a result, routes flap
frequently, affecting the performance of IP devices.
From the perspective of the entire network, IP devices are expected to ignore such burrs. That
is, IP devices must customize and suppress the alarms that are generated during transmission
device maintenance or link switchovers. This can prevent route flapping. Transmission alarm
customization can control the impact of transmission alarms on the physical status of
interfaces. Transmission alarm suppression can efficiently filter and suppress specific alarm
signals to avoid frequent interface flapping.
Usage Scenario
In the scenario where transmission devices are connected to IP devices, if the network is
unstable, a large number of burr alarms will be generated. As a result, the physical status of
interfaces on the transmission devices will switch between Up and Down. To enable IP
devices to ignore these burrs, configure transmission alarm customization on the IP devices.
Pre-configuration Tasks
Before configuring the transmission alarm customization function, power on the Router and
ensure that it is working properly.
Configuration Procedures
For the following configuration tasks (except for the configuration verification), perform one
or more of the following configurations as required.
Context
After alarms are generated on a transmission device, transmission alarm customization can be
used to control the impact of the physical interface status. Configure the following commands
globally or on the interface connecting to the transmission equipment.
The transmission alarm filtering interval can be configured globally or on the interface. The
global configuration takes effect on interfaces supporting the function. The relationship is as
follows:
l When the alarm customization is configured globally, if the non-default alarm
customization configuration exists on an interface, the configuration on the interface
takes effect.
l When the alarm customization is not configured on the interface, the global
configuration takes effect.
NOTE
In VS mode, the global configuration of transmission alarm customization is supported only by the
admin VS.
Procedure
l Configure transmission alarm customization globally.
a. Run system-view
The system view is displayed.
b. Run transmission-alarm down { wan | pos } { auais | b1tca | b2tca | b3tca | lais |
lcd | lof | lom | lop | los | lrdi | lrei | oof | pais | pplm | prdi | prei | puneq | rdool |
rrool | sdbere | sfbere | trool } *
The alarm customization is configured on 10GE WAN interfaces and on POS
interfaces globally, which can cause interfaces to go Down.
c. Run commit
The configuration is committed.
NOTE
l Not all interfaces support the preceding alarms because alarm types vary with hardware
types. If the alarm type that the hardware does not support is configured, the
configuration fails. The system will display a message telling you which alarm types are
not supported on this interface.
l WLNK alarms can be viewed only and cannot be configured by using this command.
The WLNK alarms are always enabled and can cause the physical status of interfaces to
go Down. The display transmission-alarm command can be used to view the status and
statistics on wlnk alarms.
By default, the LAIS, LOF, and LOS alarms can change interface status. If these
alarms are disabled, service data cannot be forwarded correctly. Enabling the three
types of alarms is recommended.
d. Run commit
----End
Context
Perform the following steps on the interfaces that are connected to transmission devices:
Procedure
Step 1 Run system-view
10GE WAN ,POS ,ATM interfaces support the configuration of alarm thresholds.
Or you can run controller cpos cpos-number to enter CPOS interface view.
Step 3 Run transmission-alarm threshold { b1tca b1tca | b2tca b2tca | b3tca b3tca | sdbere sdbere
| sfbere sfbere } *
The b1tca, b2tca, b3tca, sdbere, and sfbere alarm thresholds are configured.
The alarm thresholds are in the format of 10-n. "n" is specified by an alarm parameter in the
transmission-alarm threshold command. The value of sdbere must greater than or equal to
the value of sfbere.
----End
Prerequisites
Transmission alarm customization has been configured.
The transmission alarm suppression function has been enabled using the transmission-alarm
damping command.
Procedure
l If an interface is a 10GE WAN interface, run the display transmission-alarm wan
interface-number [ auais | b1tca | b2tca | b3tca | lais | lcd | lof | lom | lop | los | lrdi | lrei
| oof | pais | prdi | prei | pplm| puneq | rdool | rrool | sdbere | sfbere | trool | wlnk ] *
command to check alarm configuration on the interface.
l If the interface is a WDM interface, run the display transmission-alarm wdm interface-
number [ odu-ais | odu-lck | odu-oci | otu-ais | otu-lom | otu-sd-ber | otu-sf-ber | pm-
bdi | pm-tim | r-lof | r-los | r-oof | sm-bdi | sm-iae | sm-tim ] * command to check alarm
configuration on the interface.
l If the interface is CE1, run the display transmission-alarm e1 interface-number [ los |
lof | pais | prai ] * command to check alarm configuration on the interface.
l the interface is a CPOS interface, run the display transmission-alarm cpos interface-
number [ auais | b1tca | b2tca | b3tca | lais | lof | lom | lop | los | lrdi | lrei | oof | pais |
pplm | prdi | prei | puneq | rrool | sdbere | sfbere ] *command to check alarm
configuration on the interface.
l If the interface is E3, run the display transmission-alarm e3 interface-number [ los | lof
| ais | rai ] * command to check alarm configuration on the interface.
l Run the display transmission-alarm threshold [ interface-type interface-number ]
command to view the thresholds of b1tca, b2tca, b3tca, sdbere, and sfbere alarms on the
interface.
----End
Usage Scenario
In the scenario where transmission devices are connected to IP devices, if the network is
unstable, transmission devices on the network will generate a large number of burr alarms. As
a result, the physical status of interfaces on the transmission devices switches between Up and
Down. After a transmission alarm filtering interval is configured, the alarms whose lifetime is
longer than the interval will be ignored.
The transmission alarm filtering interval can be configured globally or on an interface. The
global configuration takes effect on interfaces supporting the function. The relationship is as
follows:
l After the global configuration, if a non-default transmission alarm filtering interval is
configured on the interface, the interval configured on the interface takes effect.
l If no transmission alarm filtering interval is configured in the interface view, the global
configuration takes effect.
NOTE
In VS mode, the global configuration of filtering function for alarm messages and a filtering interval is
supported only by the admin VS.
Pre-configuration Tasks
Before configuring the transmission alarm filtering interval, complete the following tasks:
l Power on the Router and ensure that it is working properly.
l Configure transmission alarm customization on the Router interface
NOTE
The filtering function on an interface can take effect only when the transmission alarm customization
function is enabled on the interface.
Procedure
l Enable the global filtering function for alarm messages and set a filtering interval.
a. Run system-view
The system view is displayed.
b. Run transmission-alarm holdoff-timer holdoff-time
The global filtering function is enabled, and a filtering interval is configured.
c. Run transmission-alarm holdup-timer holdup-time
The global filtering function is disabled, and a filtering interval is cleared.
d. Run commit
The configuration is committed.
l Configure the transmission alarm filtering interval and set filtering intervals on an
interface.
a. Run system-view
The system view is displayed.
b. Perform either of the following commands.
n To enter the POS interface or 10GE WAN view, run the interface interface-
type interface-number command.
n To enter the specified CPOS interface view, run the controller cpos cpos-
number command.
n To enter the WDM interface view, run the controller wdm controller-number
command.
n To enter the CE1 interface view, run the controller e1 controller-number
command.
n To enter the E3 interface view, run the controller e3 controller-number
command.
c. Run transmission-alarm holdoff-timer holdoff-time
The alarm filtering function is enabled, and a transmission alarm filtering interval is
set.
If the lifetime (interval between alarm generation and alarm clearance) of an alarm
is less than the transmission alarm filtering interval, the alarm is filtered out as a
burr. Otherwise, the alarm is a normal alarm.
.
d. Run transmission-alarm holdup-timer holdup-time
The alarm clearance filtering function is enabled, and an alarm clearance filtering
interval is set.
e. Run commit
----End
l If the interface is a CPOS interface, run the display transmission-alarm cpos interface-
number [ auais | b1tca | b2tca | b3tca | lais | lof | lom | lop | los | lrdi | lrei | oof | pais |
pplm | prdi | prei | puneq | rrool | sdbere | sfbere ] * command to check alarm
configuration on the interface.
l If the interface is a WDM interface, run the display transmission-alarm wdm interface-
number [ odu-ais | odu-lck | odu-oci | otu-ais | otu-lom | otu-sd-ber | otu-sf-ber | pm-
bdi | pm-tim | r-lof | r-los | r-oof | sm-bdi | sm-iae | sm-tim ] * command to check alarm
configuration on the interface.
l If the interface is a CE1 interface, run the display transmission-alarm e1 interface-
number [ los | lof | pais | prai ] * command to check alarm configuration on the
interface.
l If the interface is an E3 interface, run the display transmission-alarm e3 interface-
number [ los | lof | ais | rai ] * command to check alarm configuration on the interface.
l Run the display transmission-alarm configuration [ interface-type interface-number ]
command to and suppression on the specified interface.
If the alarm filtering function has been configured, you can view that the filtering function has
been enabled.
# Check check the configuration of alarm customization and suppression on POS 0/1/0.
Usage Scenario
In the scenario where transmission devices are connected to IP routing devices, if the network
is unstable, transmission devices on the network will generate a large number of burr alarms.
As a result, the physical status of interfaces on the transmission devices will switch between
Up and Down. To suppress frequent network flapping caused by transmission alarms, or
enable IP devices to ignore burr alarms, enable transmission alarm suppression on IP devices.
Pre-configuration Tasks
Before configuring transmission alarm suppression, complete the following tasks:
l Power on the Router and ensure that it is working properly.
l Configure transmission alarm customization on the Router interface
NOTE
Transmission alarm suppression can take effect on an interface only after transmission alarm
customization is enabled on the interface.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Perform either of the following configurations as required.
1. Run interface interface-type interface-number
The POS or 10GE WAN interface view is displayed.
2. Run controller cpos cpos-number
The CPOS interface view is displayed.
3. Run controller wdm interface-number
The WDM interface view is displayed.
4. Run controller e1 controller-number
The CE1 interface view is displayed.
5. Run controller e3 controller-number
The E3 interface view is displayed.
Step 3 Run transmission-alarm damping [ ceiling ceiling | reuse reuse | suppress suppress | decay-
ok decay-ok | decay-ng decay-ng ] *
Transmission alarm suppression is enabled, and suppression parameters are set.
----End
Run the display transmission-alarm configuration command to view the transmission alarm
configuration of an interface.
Context
After information about transmission alarms has been cleared, all statistics on alarms will be
reset. Exercise caution when running the reset transmission-alarm statistics command.
Procedure
Step 1 To clear the information about transmission alarms, run the reset transmission-alarm
statistics command in the interface view.
----End
The Pseudo Random Binary Sequence (PRBS) testing function supports one-click tests on
user-side and network-side service connectivity.Only theNE08Esupports PRBS Testing
Configuration.
Enables PRBS
testing and sends a
Enables remote PRBS bit stream.
loopback on the TX 1
base station and RX Receives the looped
loops back the back PRBS bit stream,
PRBS bit stream. 2 compares it with the
RX one previously sent,
TX 3 and calculates a bit
error rate.
MPLS/IP Core
After PRBS testing is enabled on PE1, PE1 sends a PRBS bit stream to the remote loopback-
enabled CE. The PRBS bit stream is then looped back to PE1. Upon receipt of the bit stream,
PE1 checks whether the bit stream is the same as the one previously sent and calculates a bit
error rate.
Figure 15-2 shows network-side RPBS testing.
1
Sends a
PRBS bit
stream. Enables local 2
loopback.
PW
After PRBS testing is enabled on PE1, PE1 sends a PRBS bit stream to PE2 that has local
loopback enabled. The PRBS bit stream is then looped back to PE1. Upon receipt of the bit
stream, PE1 checks whether the bit stream is the same as the one previously sent and
calculates a bit error rate.
Usage Scenario
PRBS testing is used to test service connectivity between two devices. A PRBS testing-
enabled NE40E sends a PRBS bit stream to a remote device that has remote loopback enabled
to perform a user-side test or to a remote device that has local loopback enabled to perform a
network-side test. After the bit stream is looped back to NE40E, NE40E compares the bit
stream with the one it previously sent and calculates a bit error rate to determine the service
connectivity.
Pre-configuration Tasks
l Before configuring user-side PRBS, ensure that remote loopback has been enabled on
the remote device.
l Before configuring network-side PRBS, ensure that local loopback has been enabled on
the remote device.
Configuration Procedures
Context
As shown in Figure 15-3, remote loopback is enabled on a base station, and service
connectivity between PE1 and the base station is tested by enabling PE1 to send a PRBS bit
stream to the base station.
NOTE
Before performing a UNI-side PRBS test on a local device, you must configure remote loopback on the
remote interface connecting to the local device. Services on the remote interface are then interrupted. After
the test is completed, manually restore services on the remote interface.
Enables PRBS
testing and sends a
Enables remote PRBS bit stream.
loopback on the TX 1
base station and RX Receives the looped
loops back the back PRBS bit stream,
PRBS bit stream. 2 compares it with the
RX one previously sent,
TX 3 and calculates a bit
error rate.
MPLS/IP Core
NOTE
Procedure
Step 1 Configure remote loopback on the E1 interface of the CE connecting to PE1.
1. Run system-view
Bit errors are injected into a PRBS bit stream while the enhanced PRBS connectivity test
is going on.
4. (Optional) Run test connectivity abort interface { interface-name | interface-type
interface-number }
Step 3 After the PRBS test is completed, cancel the remote loopback configuration on the E1
interface of the CE.
1. Run system-view
----End
Context
As shown in Figure 15-4, PW connectivity between PE1 and PE2 can be tested by enabling
PE1 to send a PRBS bit stream to PE2, which has local loopback enabled.
NOTE
Before performing a NNI-side PRBS test on a local device, you must configure local loopback on the remote
interface connecting to the local device. Services on the remote interface are then interrupted. After the test is
completed, manually restore services on the remote interface.
1
Sends a
PRBS bit
stream. Enables local 2
loopback.
PW
NOTE
Procedure
Step 1 Configure local loopback on the E1 interface of the PE2 connecting to PE1.
1. Run system-view
The system view is displayed.
2. Run controller cpos cpos-number
The CPOS interface view is displayed.
3. Run e1 e1-number set loopback local
Local loopback is enabled for the E1 interface.
Step 2 Perform a PRBS test on PE1.
1. Run system-view
The system view is displayed.
2. Run test connectivity interface { interface-name | interface-type interface-number }
nni-direction pattern pattern-list interval { hour hour-value | minute minute-value |
second seconde-value } interval-repeat repeat-count
----End
Procedure
l Run the display connectivity-test history interface { interface-name | interface-type
interface-number } [ index index-value ] command to view the results of PRBS test
instances on a specified interface.
l Run the display connectivity-test history command to view PRBS historical test
instances.
----End
Networking Requirements
On the network shown in Figure 15-5, Device A and Device B connect to each other through
E1 interfaces. A PRBS test needs to be performed to check the connectivity between the two
devices.
In this example, interface1 and interface2 represent E1 0/1/0 and E1 0/2/0, respectively.
DeviceA DeviceB
Configuration Roadmap
The configuration roadmap is as follows:
1. Create a synchronous serial interface on Device A and Device B.
2. Configure remote loopback on the E1 interface of Device B.
3. Perform a PRBS test on Device A.
4. Check the PRBS test result on Device A.
5. After the PRBS test is completed, cancel the remote loopback configuration on the E1
interface of Device B.
Data Preparation
To complete the configuration, you need the following data:
l E1 interface number of Device A
l E1 interface number of Device B
Procedure
Step 1 Create a synchronous serial interface on Device A and Device B.
# Configure the E1 interface on Device A as a synchronous serial interface.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] controller e1 0/1/0
[~DeviceA-E1 0/1/0] channel-set 1 timeslot-list 1-31
[*DeviceA-E1 0/1/0] commit
[~DeviceA-E1 0/1/0] quit
Step 5 After the PRBS test is completed, cancel the remote loopback configuration on the E1
interface of Device B.
[~DeviceB] controller e1 0/2/0
[~DeviceB-E1 0/2/0] undo loopback
[*DeviceB-E1 0/2/0] commit
[~DeviceB-E1 0/2/0] quit
----End
Configuration Files
l Device A configuration file
#
sysname DeviceA
#
controller E1 0/1/0
channel-set 1 timeslot-list 1-31
#
interface Serial0/1/0:1
link-protocol tdm
#
test connectivity interface Serial0/1/0:1 uni-direction pattern prbs15
interval second 20 interval-repeat 5
#
return
#
return