922
SmartAX MA5600/MA5603 Multi-service Access Module V300R003 Configuration Guide Issue 04 Date 2007-11-30 Part Number 31500234 Huawei Technologies Proprietary

100322679 Manual Dslam Huawei

Embed Size (px)

Citation preview

  • SmartAX MA5600/MA5603 Multi-service Access ModuleV300R003

    Configuration Guide

    Issue 04Date 2007-11-30Part Number 31500234

    Huawei Technologies Proprietary

  • Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For anyassistance, please contact our local office or company headquarters. Huawei Technologies Co., Ltd.Address: Huawei Industrial Base

    Bantian, LonggangShenzhen 518129People's Republic of China

    Website: http://www.huawei.comEmail: [email protected] Copyright 2007 Huawei Technologies Co., Ltd. All rights reserved.No part of this document may be reproduced or transmitted in any form or by any means without prior writtenconsent of Huawei Technologies Co., Ltd. Trademarks and Permissions

    and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.All other trademarks and trade names mentioned in this document are the property of their respective holders. NoticeThe information in this document is subject to change without notice. Every effort has been made in thepreparation of this document to ensure accuracy of the contents, but the statements, information, andrecommendations in this document do not constitute a warranty of any kind, express or implied.

    Huawei Technologies Proprietary

  • Contents

    About This Document.....................................................................................................................11 Managing the License................................................................................................................1-1

    1.1 Overview of the License.................................................................................................................................1-21.2 License Principles...........................................................................................................................................1-21.3 Configuration Example of the License Application........................................................................................1-31.4 Configuring the License Server.......................................................................................................................1-61.5 Configuring the ESN.......................................................................................................................................1-7

    2 Configuring the Maintenance Terminal ...............................................................................2-12.1 Overview.........................................................................................................................................................2-22.2 Configuring the Terminal Through the Local Serial Port...............................................................................2-32.3 Configuring the Terminal Through the Remote Serial Port............................................................................2-72.4 Configuring the Terminal Through the Outband Management Channel .....................................................2-122.5 Configuring the Terminal Through the Inband Management Channel.........................................................2-152.6 Configuring the Terminal Through SSH.......................................................................................................2-19

    3 Getting Started With CLI..........................................................................................................3-13.1 Overview.........................................................................................................................................................3-23.2 CLI Characteristics..........................................................................................................................................3-2

    3.2.1 Command Modes...................................................................................................................................3-33.2.2 Intelligent Matching...............................................................................................................................3-53.2.3 Edit Characteristics................................................................................................................................3-63.2.4 Interaction Characteristics......................................................................................................................3-73.2.5 Parameter Prompt...................................................................................................................................3-73.2.6 Display Characteristics...........................................................................................................................3-83.2.7 Saving and Showing History Commands...............................................................................................3-93.2.8 CLI Error Prompts................................................................................................................................3-10

    3.3 Basic Operations Through CLI.....................................................................................................................3-103.3.1 Obtaining Online Help Information.....................................................................................................3-113.3.2 Enabling Interactive Command Execution...........................................................................................3-133.3.3 Enabling CLI Trap Reporting..............................................................................................................3-133.3.4 Switching Terminal Language.............................................................................................................3-143.3.5 Setting System Time............................................................................................................................3-153.3.6 Setting System Name...........................................................................................................................3-16

    SmartAX MA5600/MA5603 Multi-service Access ModuleConfiguration Guide Contents

    Issue 04 (2007-11-30) Huawei Technologies Proprietary i

  • 3.3.7 Setting Terminal Type..........................................................................................................................3-163.3.8 Setting Timeout Exit Time...................................................................................................................3-173.3.9 Locking the Terminal...........................................................................................................................3-183.3.10 Clearing Terminal Screen...................................................................................................................3-183.3.11 Showing Version................................................................................................................................3-193.3.12 Showing CPU Usage..........................................................................................................................3-193.3.13 Showing the Memory Usage..............................................................................................................3-203.3.14 Testing Network State........................................................................................................................3-20

    4 Configuring the Network Management................................................................................4-14.1 Overview.........................................................................................................................................................4-24.2 Basic Concepts................................................................................................................................................4-24.3 Configuration Example of an Outband NMS..................................................................................................4-34.4 Configuration Example of an Inband NMS....................................................................................................4-54.5 SNMP Agent Configuration............................................................................................................................4-8

    4.5.1 Setting the SNMP Version.....................................................................................................................4-94.5.2 Adding a Community Name and Setting Its Read/Write Authorities..................................................4-104.5.3 Enabling Trap Sending.........................................................................................................................4-114.5.4 Setting the IP address of a Destination Host of Traps..........................................................................4-114.5.5 Setting the Source Interface for Sending Traps....................................................................................4-124.5.6 Setting the System Contact Information..............................................................................................4-134.5.7 Setting the System Location Information.............................................................................................4-134.5.8 Configuring an SNMP V3 User...........................................................................................................4-144.5.9 Configuring an SNMP V3 Group.........................................................................................................4-154.5.10 Configuring an SNMP MIB View.....................................................................................................4-164.5.11 Configuring the Local SNMP Engine ID...........................................................................................4-174.5.12 Enabling the Handshake Function between the MA5600 and the N2000.........................................4-184.5.13 Setting the Handshake Interval..........................................................................................................4-19

    4.6 Configuring the IP Address of the Outband NMS Interface.........................................................................4-204.7 Configuring an NMS Route..........................................................................................................................4-214.8 Configuring the IP Address of the Inband NMS Interface............................................................................4-22

    5 Configuring the Log Host.........................................................................................................5-15.1 Overview.........................................................................................................................................................5-25.2 Configuration Example of a Log Host............................................................................................................5-25.3 Configuring a Log Host...................................................................................................................................5-35.4 Deleting a Log Host........................................................................................................................................5-45.5 Deactivating a Log Host..................................................................................................................................5-55.6 Querying Logs.................................................................................................................................................5-6

    6 Managing Users..........................................................................................................................6-16.1 Overview.........................................................................................................................................................6-26.2 Adding a User Profile......................................................................................................................................6-26.3 Adding a User..................................................................................................................................................6-5

    ContentsSmartAX MA5600/MA5603 Multi-service Access Module

    Configuration Guide

    ii Huawei Technologies Proprietary Issue 04 (2007-11-30)

  • 6.4 Modifying the User Attributes........................................................................................................................6-76.4.1 Modifying the Profile Bound with a User..............................................................................................6-76.4.2 Modifying a User Level.........................................................................................................................6-86.4.3 Changing a User Password.....................................................................................................................6-96.4.4 Modifying the Permitted Reenter Number...........................................................................................6-106.4.5 Modifying the Appended Information.................................................................................................6-11

    6.5 Disconnecting an Online User.......................................................................................................................6-126.6 Deleting a User..............................................................................................................................................6-13

    7 Managing the Device.................................................................................................................7-17.1 Overview.........................................................................................................................................................7-27.2 Setting the Description of a Shelf...................................................................................................................7-37.3 Resetting the Control Boards..........................................................................................................................7-37.4 Adding a Service Board Offline......................................................................................................................7-47.5 Confirming a Service Board............................................................................................................................7-67.6 Deleting a Service Board.................................................................................................................................7-67.7 Resetting a Service Board...............................................................................................................................7-77.8 Prohibiting a Service Board............................................................................................................................7-77.9 Managing a Subboard......................................................................................................................................7-8

    8 Configuring the Remote User Authentication.....................................................................8-18.1 Overview.........................................................................................................................................................8-28.2 Related Concepts.............................................................................................................................................8-2

    8.2.1 Introduction to AAA..............................................................................................................................8-28.2.2 Introduction to RADIUS........................................................................................................................8-38.2.3 Introduction to SSH................................................................................................................................8-3

    8.3 Configuration Example of Remote User Authentication................................................................................8-48.4 Configuring RADIUS.....................................................................................................................................8-7

    8.4.1 Overview................................................................................................................................................8-78.4.2 Specifying the RADIUS Server Template.............................................................................................8-88.4.3 Setting the IP Address and Port Number of a RADIUS Server.............................................................8-98.4.4 Setting the Shared Key of the RADIUS Server...................................................................................8-108.4.5 Setting the Response Timeout Interval of a RADIUS Server..............................................................8-118.4.6 Setting the Maximum Retransmit Count of RADIUS Request Packets..............................................8-128.4.7 Setting the RADIUS Server Type........................................................................................................8-138.4.8 Configuring an NAS Port and Its ID Format.......................................................................................8-148.4.9 Setting the Format of User Name Sent to a RADIUS Server..............................................................8-14

    8.5 Configuring AAA..........................................................................................................................................8-168.5.1 Configuring an Authentication Scheme...............................................................................................8-168.5.2 Creating a Domain...............................................................................................................................8-178.5.3 Specifying the RADIUS Server Template...........................................................................................8-188.5.4 Specifying the Authentication Scheme................................................................................................8-19

    8.6 Configuring SSH...........................................................................................................................................8-218.6.1 Creating the Local RSA Key Pair........................................................................................................8-21

    SmartAX MA5600/MA5603 Multi-service Access ModuleConfiguration Guide Contents

    Issue 04 (2007-11-30) Huawei Technologies Proprietary iii

  • 8.6.2 Configuring the SSH User Public Key.................................................................................................8-228.6.3 Configuring an SSH User.....................................................................................................................8-24

    9 Configuring the VLAN ............................................................................................................9-19.1 Overview.........................................................................................................................................................9-39.2 Configuration Example of a Standard VLAN.................................................................................................9-59.3 Configuration Example of a Smart VLAN..................................................................................................... 9-59.4 Configuration Example of a MUX VLAN......................................................................................................9-79.5 Configuration Example of the Super VLAN...................................................................................................9-99.6 Creating a VLAN..........................................................................................................................................9-139.7 Configuring the VLAN Attribute..................................................................................................................9-159.8 Setting the Inner and Outer Ethernet Protocols Type of a Stacking VLAN.................................................9-169.9 Setting the Inner VLAN Priority of the Service Port in a Stacking VLAN..................................................9-179.10 Adding an Upstream Port to a VLAN.........................................................................................................9-179.11 Adding a Service Port to a VLAN..............................................................................................................9-189.12 Adding Service Ports in Batches.................................................................................................................9-209.13 Setting the Description of a Service Port....................................................................................................9-22

    10 Configuring the DHCP Relay..............................................................................................10-110.1 Overview.....................................................................................................................................................10-310.2 Configuration Example of DHCP Standard Mode......................................................................................10-410.3 Configuration Example of DHCP Option60 Mode.....................................................................................10-610.4 Configuration Example of DHCP MAC Address Segment Mode..............................................................10-910.5 Creating a DHCP Server Group................................................................................................................10-1210.6 Setting Working Mode of a DHCP Server................................................................................................10-1310.7 Setting DHCP Relay Mode.......................................................................................................................10-1410.8 Binding a DHCP Server Group with a VLAN Interface...........................................................................10-1510.9 Creating an Option60 Domain..................................................................................................................10-1610.10 Binding a DHCP Server Group with a DHCP Option60 Domain..........................................................10-1710.11 Configuring the Gateway of a DHCP Option60 Domain.......................................................................10-1710.12 Creating a DHCP MAC Address Segment.............................................................................................10-1810.13 Setting the Range of a DHCP MAC Address Segment..........................................................................10-1910.14 Binding a DHCP Server Group with a DHCP MAC Address Segment.................................................10-2010.15 Configuring the Gateway of a DHCP MAC Address Segment..............................................................10-21

    11 Configuring the ARP & ARP Proxy....................................................................................11-111.1 Overview.....................................................................................................................................................11-211.2 Configuration Example of the ARP Proxy..................................................................................................11-211.3 Adding a Static ARP Entry.........................................................................................................................11-511.4 Enabling the ARP Proxy.............................................................................................................................11-6

    12 Configuring the Routing Protocol......................................................................................12-112.1 Routing Protocol Configuration..................................................................................................................12-312.2 Configuration Example of the Static Route................................................................................................12-312.3 Configuration Example of RIP....................................................................................................................12-6

    ContentsSmartAX MA5600/MA5603 Multi-service Access Module

    Configuration Guide

    iv Huawei Technologies Proprietary Issue 04 (2007-11-30)

  • 12.4 Configuration Example of OSPF................................................................................................................12-912.5 Configuration Example of a Route Policy................................................................................................12-1312.6 Adding a Static Route...............................................................................................................................12-1612.7 Configuring RIP........................................................................................................................................12-17

    12.7.1 Enabling RIP Process.......................................................................................................................12-1812.7.2 Setting the RIP Version....................................................................................................................12-1912.7.3 Configuring Zero Field Check for RIP-I Packets.............................................................................12-2012.7.4 Setting the Cost of the Default Route...............................................................................................12-2112.7.5 Enabling Route Summarization.......................................................................................................12-2212.7.6 Specifying Default Routing Metric..................................................................................................12-2312.7.7 Importing Routes of Other Protocols...............................................................................................12-2412.7.8 Disabling Receiving Host Routes....................................................................................................12-2512.7.9 Configuring the RIP Preference.......................................................................................................12-2612.7.10 Configuring the Route Filtering Policy..........................................................................................12-2712.7.11 Verifying the Source IP Address of a RIP Route Update..............................................................12-2812.7.12 Resetting RIP..................................................................................................................................12-2912.7.13 Clearing RIP Process Statistics......................................................................................................12-3012.7.14 Disabling RIP Packet Transmission on an Interface......................................................................12-3012.7.15 Configuring the IP Address of a Peer Router.................................................................................12-3112.7.16 Configuring a Summary Route IP Address....................................................................................12-3212.7.17 Enabling an Interface to Receive/Transmit RIP Packets................................................................12-3212.7.18 Enabling the Split Horizon Function..............................................................................................12-3312.7.19 Enabling the Poison Reverse Function...........................................................................................12-3412.7.20 Configuring the RIP-2 Authentication Mode.................................................................................12-3512.7.21 Configuring the Additional Metric of a Route...............................................................................12-3512.7.22 Configuring the RIP Timer............................................................................................................12-3612.7.23 Enabling the Transparent Transmission function of the RIP Packet Based on the VLAN............12-37

    12.8 Configuring OSPF.....................................................................................................................................12-3812.8.1 Enabling OSPF Process....................................................................................................................12-3912.8.2 Configuring DR Priority...................................................................................................................12-4012.8.3 Setting an OSPF Router ID..............................................................................................................12-4012.8.4 Entering OSPF Area Config Mode..................................................................................................12-4112.8.5 Configuring Subnets for an Area.....................................................................................................12-4212.8.6 Configuring the OSPF Stub Area.....................................................................................................12-4312.8.7 Configuring an NBMA Adjacent Router.........................................................................................12-4312.8.8 Setting OSPF Preference..................................................................................................................12-4412.8.9 Disabling OSPF Packet Transmission on an Interface.....................................................................12-4512.8.10 Configuring the Maximum OSPF Route Count.............................................................................12-4612.8.11 Enabling OSPF Logging Function.................................................................................................12-4712.8.12 Setting the VLAN-Based Transparent Transmission for OSPF Packets.......................................12-47

    12.9 Configuring OSPF on a VLAN Interface..................................................................................................12-4812.9.1 Configuring the Network Type on an OSPF Interface.....................................................................12-48

    SmartAX MA5600/MA5603 Multi-service Access ModuleConfiguration Guide Contents

    Issue 04 (2007-11-30) Huawei Technologies Proprietary v

  • 12.9.2 Configuring OSPF Cost...................................................................................................................12-4912.9.3 Configuring OSPF Packet Authentication.......................................................................................12-5012.9.4 Configuring the MTU of the DD Packet..........................................................................................12-50

    12.10 Configuring OSPF Timer........................................................................................................................12-5112.10.1 Setting the Interval for Sending the Hello Packets........................................................................12-5212.10.2 Setting the Dead Time Between Adjacent Routers........................................................................12-5212.10.3 Setting the Hello Packet Poll Interval............................................................................................12-5312.10.4 Setting the LSA Transmit Delay....................................................................................................12-5412.10.5 Setting the LSA Retransmit Interval between Adjacent Routers...................................................12-5512.10.6 Setting the SPF Calculation Interval for OSPF..............................................................................12-55

    12.11 Configuring Route Summarization.........................................................................................................12-5612.11.1 Configuring Route Summarization Between Areas.......................................................................12-5612.11.2 Configuring the Summarization of Routes Imported by OSPF.....................................................12-57

    12.12 Configuring OSPF Route Import............................................................................................................12-5812.12.1 Importing Routes from Other Protocols into OSPF.......................................................................12-5812.12.2 Setting the Default Parameters of OSPF Imported Routes............................................................12-59

    12.13 Configuring a Route Policy.....................................................................................................................12-6012.13.1 Defining a Route Policy.................................................................................................................12-6012.13.2 Defining the if-match Clause of a Route Policy............................................................................12-6212.13.3 Defining the apply Clause of a Route Policy.................................................................................12-63

    13 Configuring MSTP.................................................................................................................13-113.1 Overview.....................................................................................................................................................13-313.2 Enabling the MSTP Function......................................................................................................................13-313.3 Setting the Working Mode of MSTP..........................................................................................................13-513.4 Setting the MST Region Parameters...........................................................................................................13-6

    13.4.1 Setting the MD5-Key for the MD5 Encryption Algorithm Configured on the MST Region............13-713.4.2 Configuring the MST Region Name..................................................................................................13-813.4.3 Mapping the Specified VLAN to the Specified MSTP Instance........................................................13-913.4.4 Mapping All VLANs to the MSTP Instances by Modular Arithmetic............................................13-1013.4.5 Setting the MSTP Revision Level....................................................................................................13-1113.4.6 Restoring the Default Settings for All Parameters of the MST Region...........................................13-13

    13.5 Activating the Configuration of the MST Region.....................................................................................13-1313.6 Specifying the Device as a Root Bridge or a Backup Root Bridge...........................................................13-1413.7 Setting the Priority of the Device in the Specified Spanning Tree Instance.............................................13-1513.8 Setting the Maximum Hop of the MST Region........................................................................................13-1713.9 Setting the Diameter of the Switching Fabric...........................................................................................13-1813.10 Setting the Calculation Standard for the Path Cost.................................................................................13-1913.11 Setting the Time Parameters of the Specified Network Bridge..............................................................13-20

    13.11.1 Setting the Forward Delay of the Specified Network Bridge........................................................13-2113.11.2 Setting the Hello Time of the Specified Network Bridge..............................................................13-2213.11.3 Setting the Max Age of the Specified Network Bridge..................................................................13-2313.11.4 Setting the Timeout Time Factor of the Specified Network Bridge..............................................13-25

    ContentsSmartAX MA5600/MA5603 Multi-service Access Module

    Configuration Guide

    vi Huawei Technologies Proprietary Issue 04 (2007-11-30)

  • 13.12 Setting the Parameters of the Specified Port...........................................................................................13-2613.12.1 Setting the Maximum Transmission Rate of the Specified Port....................................................13-2613.12.2 Setting the Specified Port as an Edge Port.....................................................................................13-2713.12.3 Setting the Path Cost of the Port in the Specified Spanning Tree Instance....................................13-2813.12.4 Setting the Priority of the Specified Port.......................................................................................13-3013.12.5 Setting the Point-to-Point Link Connection of the Specified Port.................................................13-31

    13.13 Setting the mCheck Variable...................................................................................................................13-3213.14 Configuring the Device Protection Function..........................................................................................13-33

    13.14.1 Enabling the BPDU Protection Function of the Device.................................................................13-3313.14.2 Enabling the Loop Protection Function of the Device...................................................................13-3413.14.3 Enabling the Root Protection Function of the Device....................................................................13-35

    13.15 Clear the MSTP Protocol Statistics.........................................................................................................13-3614 Configuring NTP....................................................................................................................14-1

    14.1 Overview.....................................................................................................................................................14-314.2 Configuration Example of NTP Broadcast Mode.......................................................................................14-314.3 Configuration Example of NTP Multicast Mode........................................................................................14-614.4 Configuration Example of NTP Server/Client Mode..................................................................................14-914.5 Configuration Example of NTP Peer Mode..............................................................................................14-1314.6 Configuring the NTP ID Authentication...................................................................................................14-1614.7 Configuring the NTP Master Clock..........................................................................................................14-1814.8 Configuring NTP Broadcast Mode...........................................................................................................14-19

    14.8.1 Configuring NTP Broadcast Server Mode.......................................................................................14-1914.8.2 Configuring NTP Broadcast Client Mode........................................................................................14-20

    14.9 Configuring the NTP Multicast Mode......................................................................................................14-2114.10 Configuring NTP Server/Client Mode....................................................................................................14-2314.11 Configuring NTP Peer Mode..................................................................................................................14-2414.12 Configuring the Authority of Access to a Local Device's NTP Service.................................................14-2514.13 Configuring an Interface for Transmitting/Receiving NTP Packets.......................................................14-26

    15 Configuring MAC Address..................................................................................................15-115.1 Overview.....................................................................................................................................................15-215.2 Adding a Static MAC Address....................................................................................................................15-215.3 Setting the Maximum MAC Address Number Learned by a Service Port.................................................15-315.4 Configuring the Aging Time of a Dynamic MAC Address........................................................................15-415.5 Binding the MAC Address..........................................................................................................................15-515.6 Configuring MAC Address Filtering..........................................................................................................15-515.7 Configuring the MAC Address Pool...........................................................................................................15-6

    16 Configuring TCP/IP Connection.........................................................................................16-116.1 Overview.....................................................................................................................................................16-216.2 Basic Concepts............................................................................................................................................16-216.3 Configuring the Synwait Timer...................................................................................................................16-216.4 Configuring the Finwait Timer...................................................................................................................16-3

    SmartAX MA5600/MA5603 Multi-service Access ModuleConfiguration Guide Contents

    Issue 04 (2007-11-30) Huawei Technologies Proprietary vii

  • 16.5 Configuring the Socket Buffer....................................................................................................................16-316.6 Enabling the TCP Debugging.....................................................................................................................16-416.7 Enabling the IP Packets Debugging............................................................................................................16-5

    17 Configuring ACL....................................................................................................................17-117.1 Overview.....................................................................................................................................................17-317.2 Related Concepts.........................................................................................................................................17-617.3 Configuring the Basic ACL.......................................................................................................................17-1017.4 Configuring the Advanced ACL...............................................................................................................17-1117.5 Configuring the Layer 2 ACL...................................................................................................................17-1317.6 Configuration Example of the Customized ACL......................................................................................17-1517.7 Creating an ACL.......................................................................................................................................17-1617.8 Configuring a Time Range........................................................................................................................17-1817.9 Setting the Step..........................................................................................................................................17-1917.10 Creating a Basic ACL Rule.....................................................................................................................17-2017.11 Creating an Advanced ACL Rule............................................................................................................17-2117.12 Creating a Layer 2 ACL Rule.................................................................................................................17-2217.13 Creating a Customized ACL Rule...........................................................................................................17-2317.14 Activating an ACL..................................................................................................................................17-25

    18 Configuring the QoS.............................................................................................................18-118.1 Overview.....................................................................................................................................................18-218.2 Configuring the Traffic Entry.....................................................................................................................18-218.3 Configuring the Queue Scheduling.............................................................................................................18-5

    18.3.1 Configuring the Queue Scheduling....................................................................................................18-618.4 Managing the Traffic Based on the ACL Rule............................................................................................18-7

    18.4.1 Restricting the Traffic That Matches the ACL Rule..........................................................................18-818.4.2 Adding a Priority Tag to the Traffic That Matches the ACL Rule....................................................18-918.4.3 Measuring the Traffic That Matches the ACL Rule.........................................................................18-1018.4.4 Mirroring the Traffic That Matches the ACL Rule..........................................................................18-1118.4.5 Redirecting the Traffic That Matches the ACL Rule.......................................................................18-12

    18.5 Setting the Rate Limit for an Upstream Port.............................................................................................18-1319 Configuring User Security....................................................................................................19-1

    19.1 Overview.....................................................................................................................................................19-319.2 Enabling the PITP.......................................................................................................................................19-319.3 Setting the RAIO Working Mode...............................................................................................................19-419.4 Setting the Ethernet Encapsulation Type....................................................................................................19-519.5 Enabling the DHCP Option82 Function......................................................................................................19-619.6 Setting the Maximum Length of DHCP Packets........................................................................................19-719.7 Binding the IP Address...............................................................................................................................19-819.8 Binding the MAC Address..........................................................................................................................19-919.9 Enabling Anti MAC Spoofing...................................................................................................................19-1019.10 Enabling Anti IP Spoofing......................................................................................................................19-11

    ContentsSmartAX MA5600/MA5603 Multi-service Access Module

    Configuration Guide

    viii Huawei Technologies Proprietary Issue 04 (2007-11-30)

  • 20 Configuring System Security...............................................................................................20-120.1 Overview.....................................................................................................................................................20-320.2 Enabling Anti DoS Attack...........................................................................................................................20-320.3 Enabling Anti IP Attack..............................................................................................................................20-420.4 Enabling Anti ICMP Attack........................................................................................................................20-520.5 Enabling Source Route Filtering.................................................................................................................20-520.6 Configuring MAC Address Filtering..........................................................................................................20-620.7 Setting the Time to Detect Exceptional Disconnection of the PPPoE/DHCP Users..................................20-720.8 Configuring the Black List..........................................................................................................................20-820.9 Configuring the Firewall Function..............................................................................................................20-920.10 Configuring an Accessible Address Segment.........................................................................................20-1120.11 Configuring the Inaccessible Address Segment......................................................................................20-12

    21 Configuring the ADSL2+ Service.......................................................................................21-121.1 Overview.....................................................................................................................................................21-321.2 Configuration Example of the ADSL2+ PPPoE/IPoE Service...................................................................21-421.3 Configuration Example of the ADSL2+ IPoA Service...............................................................................21-821.4 Configuration Example of the ADSL2+ PPPoA Service..........................................................................21-1321.5 Adding an ADSL2+ Line Profile..............................................................................................................21-1821.6 Adding an Extended ADSL2+ Line Profile..............................................................................................21-2521.7 Adding an ADSL2+ Alarm Profile...........................................................................................................21-2821.8 Activating an ADSL2+ Port......................................................................................................................21-3321.9 Configuring the Port Rate Measurement Thresholds for an ADSL2+ Port..............................................21-3521.10 Configuring IPoA/IPoE Protocol Conversion.........................................................................................21-36

    21.10.1 Enabling IPoA Protocol Conversion..............................................................................................21-3621.10.2 Setting the Aging time of IPoA Forwarding Entry........................................................................21-3721.10.3 Setting the Default Gateway of the IPoA User..............................................................................21-3821.10.4 Configuring the Encapsulation Type of the IPoA User.................................................................21-38

    21.11 Configuring PPPoA/PPPoE Protocol Conversion...................................................................................21-4021.11.1 Enabling PPPoA Protocol Conversion...........................................................................................21-4021.11.2 Configuring the Encapsulation Type of the PPPoA User..............................................................21-4121.11.3 Enabling PPPoA/PPPoE MRU Negotiation...................................................................................21-42

    21.12 Querying an ADSL2+ Port......................................................................................................................21-4321.13 Enabling the Auto PVC Configuration of an ADSL Modem.................................................................21-44

    22 Configuring the SHDSL Service.........................................................................................22-122.1 Overview.....................................................................................................................................................22-322.2 Configuration Example of the SHDSL IPoE/PPPoE Service.....................................................................22-422.3 Configuration Example of the SHDSL IPoA Service.................................................................................22-922.4 Configuration Example of the SHDSL PPPoA Service............................................................................22-1522.5 Adding an SHDSL Line Profile................................................................................................................22-2122.6 Adding an SHDSL Alarm Profile.............................................................................................................22-2422.7 Binding an SHDSL Alarm Profile............................................................................................................22-2722.8 Configuring the SHDSL Multi-Pair Binding............................................................................................22-28

    SmartAX MA5600/MA5603 Multi-service Access ModuleConfiguration Guide Contents

    Issue 04 (2007-11-30) Huawei Technologies Proprietary ix

  • 22.9 Configuring the SHDSL EFM Multi-port Binding...................................................................................22-2922.10 Activating an SHDSL Port......................................................................................................................22-3022.11 Querying an SHDSL Port........................................................................................................................22-3122.12 Configuring the Clock Mode...................................................................................................................22-32

    23 Configuring the VDSL2 Service..........................................................................................23-123.1 Overview.....................................................................................................................................................23-323.2 Configuration Example of the VDSL2 PPPoE/IPoE Service.....................................................................23-323.3 Configuration Example of the VDSL2 IPoA Service...............................................................................23-1023.4 Configuration Example of the VDSL2 PPPoA Service............................................................................23-1723.5 Adding a VDSL2 Line Profile..................................................................................................................23-2423.6 Adding a VDSL2 Channel Profile............................................................................................................23-3123.7 Adding a VDSL2 Line Template..............................................................................................................23-3523.8 Adding a VDSL2 Line Alarm Profile.......................................................................................................23-3723.9 Adding a VDSL2 Channel Alarm Profile.................................................................................................23-4023.10 Adding a VDSL2 Alarm Template.........................................................................................................23-4323.11 Binding an VDSL2 Alarm Template......................................................................................................23-4523.12 Activating a VDSL2 Port........................................................................................................................23-4623.13 Querying a VDSL2 port..........................................................................................................................23-47

    24 Configuring Protection for Upstream Link.......................................................................24-124.1 Overview.....................................................................................................................................................24-224.2 Configuration Example of the Upstream Link Protection...........................................................................24-324.3 Configuring a Protection Group..................................................................................................................24-524.4 Configuring the Protection Group Weight..................................................................................................24-6

    25 Configuring Device Subtending.........................................................................................25-125.1 Overview.....................................................................................................................................................25-325.2 Configuration Example of the Ethernet Access Service.............................................................................25-325.3 Configuration Example of the Subtended Network Through the SCU Board............................................25-525.4 Configuration Example of Subtending Device Through the ETHA Board................................................25-725.5 Configuring the Working Mode of the ETH Board....................................................................................25-925.6 Configuring the Physical Attributes of an Ethernet Port...........................................................................25-10

    25.6.1 Setting the Auto-negotiation Mode of an Ethernet Port...................................................................25-1025.6.2 Setting the Duplex Mode of an Ethernet Port..................................................................................25-1125.6.3 Setting the Rate of an Ethernet Port.................................................................................................25-1225.6.4 Setting the Network Cable Type of an Ethernet Port.......................................................................25-13

    25.7 Enabling the Flow Control on an Ethernet Port........................................................................................25-1325.8 Enabling the Traffic Suppression..............................................................................................................25-1425.9 Enabling the Ethernet Port Aggregation...................................................................................................25-1625.10 Mirroring an Ethernet Port......................................................................................................................25-1725.11 Adding an Ethernet Port to a VLAN.......................................................................................................25-1825.12 Configuring the Outer QinQ VLAN of the Ethernet Port.......................................................................25-1925.13 Setting the Native VLAN for an Ethernet Port.......................................................................................25-20

    ContentsSmartAX MA5600/MA5603 Multi-service Access Module

    Configuration Guide

    x Huawei Technologies Proprietary Issue 04 (2007-11-30)

  • 26 Configuring ATM-DSLAM Access....................................................................................26-126.1 Overview.....................................................................................................................................................26-226.2 Configuration Example of the ATM-DSLAM Access...............................................................................26-326.3 Setting the OPTIC Port Mode.....................................................................................................................26-626.4 Setting the OPTIC Port Type......................................................................................................................26-726.5 Adding an IMA Group................................................................................................................................26-826.6 Setting the IMA Group Mode...................................................................................................................26-1026.7 Adding an IMA Link.................................................................................................................................26-1226.8 Setting the Line Type for an E3 Port.........................................................................................................26-1326.9 Setting the E3 Port Type...........................................................................................................................26-1426.10 Setting the Tx Clock of an E3 Port.........................................................................................................26-1526.11 Clearing the Statistics of an E3 Port........................................................................................................26-16

    27 Configuring MPLS Access....................................................................................................27-127.1 Overview.....................................................................................................................................................27-227.2 Configuration Example of MPLS - Based on Binding the PVC with the PW Profile................................27-227.3 Configuration Example of MPLS- Based on Binding the VLAN with the PW Profile..............................27-627.4 Basic Configuration of MPLS...................................................................................................................27-10

    27.4.1 Configuring the LSR ID...................................................................................................................27-1027.4.2 Enabling MPLS................................................................................................................................27-11

    27.5 Static LSP Configuration..........................................................................................................................27-1227.5.1 Overview..........................................................................................................................................27-1227.5.2 Configuring the Ingress LSR of the Static LSP...............................................................................27-1327.5.3 Configuring the Egress LSR of the Static LSP................................................................................27-1427.5.4 Configuring the LSP CAR...............................................................................................................27-14

    27.6 MPLS LDP Configuration........................................................................................................................27-1527.6.1 Overview..........................................................................................................................................27-1627.6.2 Enabling the MPLS LDP..................................................................................................................27-1627.6.3 Configuring Parameters of the LDP Basic Discovery.....................................................................27-1727.6.4 Configuring Parameters of the LDP Extended Discovery...............................................................27-1927.6.5 Configuring Parameters of the LDP Basic Session..........................................................................27-2027.6.6 Configuring Parameters of the LDP Extended Session...................................................................27-2127.6.7 Configuring the LDP LSP Triggering Policy...................................................................................27-2227.6.8 Configuring the LDP Label Retention Mode...................................................................................27-2327.6.9 Configuring the LDP Loopback Detection......................................................................................27-2427.6.10 Configuring the LDP MD5 Authentication....................................................................................27-2527.6.11 Enable the LDP MTU Signaling Function.....................................................................................27-27

    27.7 PW Configuration.....................................................................................................................................27-2827.7.1 Enable the MPLS L2VPN................................................................................................................27-2827.7.2 Configuring a PW Template............................................................................................................27-2927.7.3 Binding a PVC with a PW Template...............................................................................................27-3027.7.4 Binding a VLAN with a PW Template............................................................................................27-31

    28 Configuring MPLS RSVP-TE..............................................................................................28-1

    SmartAX MA5600/MA5603 Multi-service Access ModuleConfiguration Guide Contents

    Issue 04 (2007-11-30) Huawei Technologies Proprietary xi

  • 28.1 Overview.....................................................................................................................................................28-228.2 Configuration Example for Establishing an MPLS TE Tunnel by Using RSVP-TE..................................28-228.3 Configuring Basic MPLS TE Capability....................................................................................................28-5

    28.3.1 Enabling MPLS TE Feature...............................................................................................................28-628.3.2 Creating an MPLS TE Tunnel............................................................................................................28-7

    28.4 Configuring an MPLS TE Tunnel by Using Dynamic Signaling...............................................................28-828.4.1 Configuring Bandwidth of Links.......................................................................................................28-928.4.2 Enabling OSPF TE...........................................................................................................................28-1028.4.3 Configuring the MPLS TE Explicit Path.........................................................................................28-1128.4.4 Configuring Constraints of an MPLS TE Tunnel............................................................................28-1228.4.5 Configuring CSPF............................................................................................................................28-1328.4.6 Establishing an MPLS TE Tunnel by Using RSVP-TE...................................................................28-15

    28.5 Configuring Advanced RSVP-TE Features..............................................................................................28-1628.5.1 Configuring RSVP Hello Extension................................................................................................28-1628.5.2 Configuring RSVP Resource Reservation Style..............................................................................28-1828.5.3 Configuring RSVP Timers...............................................................................................................28-1928.5.4 Enabling RSVP Message Transmission Reliability.........................................................................28-2128.5.5 Enabling RSVP-TE Srefresh Function.............................................................................................28-2228.5.6 Enabling RSVP-TE Reservation Confirmation Mechanism............................................................28-2328.5.7 Enabling RSVP Authentication........................................................................................................28-24

    28.6 Tuning the Establishment of CR-LSP.......................................................................................................28-2528.6.1 Configuring Tie-Breaking of CSPF.................................................................................................28-2628.6.2 Configuring Route Pinning of CSPF................................................................................................28-2728.6.3 Configuring Administrative Group and Affinity Property...............................................................28-2828.6.4 Configuring Reoptimization for CR-LSP........................................................................................28-30

    28.7 Tuning the Establishment of an MPLS TE Tunnel...................................................................................28-3128.7.1 Configuring Loop Detection............................................................................................................28-3228.7.2 Configuring the Route Record and the Label Record......................................................................28-3328.7.3 Configuring Parameters of Tunnel Reestablishment.......................................................................28-3428.7.4 Configuring Tunnel Priority.............................................................................................................28-35

    29 Configuring the VLAN Stacking Wholesale Service......................................................29-129.1 Overview.....................................................................................................................................................29-229.2 Configuration Example of the Wholesale Service......................................................................................29-2

    30 Configuring the QinQ VLAN Leased Line Service.........................................................30-130.1 Overview.....................................................................................................................................................30-230.2 Configuration Example of the QinQ VLAN Leased Line Service.............................................................30-230.3 Enabling Transparent Transmission of BPDUs..........................................................................................30-5

    31 Configuring the Multicast Service......................................................................................31-131.1 Overview.....................................................................................................................................................31-331.2 Configuration Example of IGMP Proxy Multicast Service........................................................................31-331.3 Configuration Example of IGMP Snooping................................................................................................31-6

    ContentsSmartAX MA5600/MA5603 Multi-service Access Module

    Configuration Guide

    xii Huawei Technologies Proprietary Issue 04 (2007-11-30)

  • 31.4 Configuration Example of Multicast Service in Subtending Mode..........................................................31-1031.5 Configuring Multicast Service in MSTP Networking...............................................................................31-1531.6 Setting the IGMP Mode............................................................................................................................31-2331.7 Configuring an IGMP Upstream Port.......................................................................................................31-2431.8 Specifying a Subtending Port....................................................................................................................31-2531.9 Configuring a Program for a Static Subtending Port................................................................................31-2631.10 Configuring IGMP Global Parameters....................................................................................................31-27

    31.10.1 Enabling the IGMP Proxy Authorization.......................................................................................31-2831.10.2 Setting the Robustness Variable.....................................................................................................31-3031.10.3 Setting the General Query Interval.................................................................................................31-3131.10.4 Setting the Maximum Response Time to the General Query.........................................................31-3231.10.5 Setting the Number of Specific Queries.........................................................................................31-3331.10.6 Setting the Specific Query Interval................................................................................................31-3531.10.7 Setting the Maximum Response Time to the Specific Query........................................................31-3631.10.8 Setting the Unsolicited Report Interval..........................................................................................31-3731.10.9 Setting the TTL for a V2 Router....................................................................................................31-3831.10.10 Setting the Preview Recognition Time.........................................................................................31-3931.10.11 Enabling the User Action Report Function..................................................................................31-4131.10.12 Enabling the Proxy of the IGMP Report Packet..........................................................................31-4231.10.13 Enabling the Proxy of the IGMP Leave Packet...........................................................................31-4331.10.14 Set the Permitted Encapsulation Mode of IGMP Packets............................................................31-4431.10.15 Enabling IGMP Echo Function....................................................................................................31-45

    31.11 Adding a Program...................................................................................................................................31-4631.12 Managing Multicast Bandwidth..............................................................................................................31-48

    31.12.1 Enabling the Bandwidth Management Function............................................................................31-4831.12.2 Setting Upstream Port Bandwidth..................................................................................................31-5031.12.3 Setting User Bandwidth.................................................................................................................31-50

    31.13 Configuring an Authority Profile............................................................................................................31-5131.13.1 Setting the Authority Mode............................................................................................................31-5231.13.2 Modifying an Authority Profile......................................................................................................31-5331.13.3 Renaming an Authority Profile......................................................................................................31-54

    31.14 Configuring Multicast Users...................................................................................................................31-5531.14.1 Adding a BTV User........................................................................................................................31-5531.14.2 Modifying the Attributes of a User................................................................................................31-5631.14.3 Blocking a BTV User.....................................................................................................................31-5731.14.4 Binding a User with an Authority Profile......................................................................................31-5831.14.5 Granting Program Authorities to a User........................................................................................31-5931.14.6 Enabling the Function of Monitoring the BTV User.....................................................................31-60

    31.15 Configuring the Preview Function..........................................................................................................31-6131.15.1 Enabling the Preview Function......................................................................................................31-6131.15.2 Setting the Preview Parameters......................................................................................................31-6231.15.3 Setting the Preview Auto Reset Time............................................................................................31-63

    SmartAX MA5600/MA5603 Multi-service Access ModuleConfiguration Guide Contents

    Issue 04 (2007-11-30) Huawei Technologies Proprietary xiii

  • 31.15.4 Clearing the Preview Records Manually........................................................................................31-6531.16 Configuring the Logging Function..........................................................................................................31-66

    31.16.1 Enabling the Logging Function......................................................................................................31-6631.16.2 Setting the Logging Interval...........................................................................................................31-6731.16.3 Configuring Log Reporting............................................................................................................31-6931.16.4 Collecting Log Statistics................................................................................................................31-70

    32 Configuring the Triple Play Service...................................................................................32-132.1 Overview.....................................................................................................................................................32-232.2 Configuration Example of Triple Play - Multiple PVCs for Multiple Services..........................................32-332.3 Configuration Example of Triple Play - Based on the User-Side VLAN...................................................32-932.4 Configuration Example of Triple Play - Based on 802.1p........................................................................32-1432.5 Configuration Example of the Triple Play Service - Based on the Service Encapsulation Type.............32-20

    33 Configuring the Ethernet OAM..........................................................................................33-133.1 Overview.....................................................................................................................................................33-333.2 Configuration Example of Ethernet OAM..................................................................................................33-333.3 Creating an MD...........................................................................................................................................33-633.4 Creating an MA...........................................................................................................................................33-733.5 Creating an MEP.........................................................................................................................................33-833.6 Creating an RMEP...................................................................................................................................... 33-933.7 Enabling the CFM Globally......................................................................................................................33-1033.8 Enabling the CFM Alarm Globally...........................................................................................................33-1133.9 Enabling the Administration Function of an MEP....................................................................................33-1233.10 Enabling the CC Transmission of an MEP.............................................................................................33-1333.11 Enabling the Global Detection Function of an RMEP............................................................................33-1433.12 Enabling RMEP Detection Function.......................................................................................................33-1533.13 Configuring Priorities for Transmitting CCMs/LTMs ...........................................................................33-1633.14 Configuring the Interval for an MA to Transmit a CC...........................................................................33-1733.15 Configuring the Base Address of Multicast Destination MAC Addresses of CCMs/LTMs..................33-1833.16 Configuring Loop Detection Function....................................................................................................33-1933.17 Configuring Linktrace Function..............................................................................................................33-20

    34 Configuring the MPLS OAM...............................................................................................34-134.1 Overview.....................................................................................................................................................34-234.2 Configuration Example of Detection of MPLS OAM for Static LSP Connectivity...................................34-234.3 Configuration Example of MPLS OAM Protection Switchover................................................................ 34-634.4 Configuring the MPLS OAM Function of the Ingress..............................................................................34-1134.5 Configuring the MPLS OAM Function of the Egress...............................................................................34-1234.6 Configuring the Tunnel Protection Group................................................................................................34-1334.7 Switching Over Protection Group Manually.............................................................................................34-1434.8 Enabling the Protection Group to Output the Debugging Information.....................................................34-15

    35 Configuring the Environment Monitoring.......................................................................35-135.1 Overview.....................................................................................................................................................35-2

    ContentsSmartAX MA5600/MA5603 Multi-service Access Module

    Configuration Guide

    xiv Huawei Technologies Proprietary Issue 04 (2007-11-30)

  • 35.2 Configuration Example of an EMU............................................................................................................35-435.2.1 Data Plan............................................................................................................................................35-435.2.2 Configuration Flowchart....................................................................................................................35-535.2.3 Procedure for Configuring an H303ESC...........................................................................................35-535.2.4 Verification for Configuring an H303ESC........................................................................................35-635.2.5 Procedure for Configuring a DIS EMU.............................................................................................35-735.2.6 Procedure for Configuring POWER4845 EMU.................................................................................35-8

    35.3 Adding an EMU..........................................................................................................................................35-835.4 Configuring the H303ESC/H304ESC EMU.............................................................................................35-1035.5 Configuring an H561ESC EMU...............................................................................................................35-1235.6 Configuring a POWER4845 EMU............................................................................................................35-1335.7 Configuring the FAN Alarm Report ........................................................................................................35-1635.8 Setting the FAN Speed Adjustment Mode................................................................................................35-1735.9 Configuring the FAN Speed......................................................................................................................35-18

    36 MSTP Networking Example................................................................................................36-136.1 Networking..................................................................................................................................................36-236.2 Data Plan.....................................................................................................................................................36-336.3 Configuring MA5600-1...............................................................................................................................36-636.4 Configuring MA5600-2.............................................................................................................................36-1236.5 Configuring MA5600-3.............................................................................................................................36-1936.6 Configuring MA5600-4.............................................................................................................................36-2436.7 Configuring MA5600-5.............................................................................................................................36-2936.8 Verification................................................................................................................................................36-32

    37 Subtending Networking Example......................................................................................37-137.1 Networking..................................................................................................................................................37-237.2 Data Plan.....................................................................................................................................................37-337.3 Configuring MA5