Upload
thunder-linkcom
View
325
Download
13
Embed Size (px)
Citation preview
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
1/886
iManager U2000 Unified Network Management
System
V100R009C00
Operation Guide for IP Service
Management
Issue 03
Date 2014-05-15
HUAWEI TECHNOLOGIES CO., LTD.
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
2/886
Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: [email protected]
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
http://www.huawei.com/8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
3/886
About This Document
Related Version
The following table lists the product version related to this document.
Product Name Version
iManager U2000 V100R009C00
Intended Audience
This document describes the process and detailed steps of IP service configuration.
The intended audiences of this document are:
l Installation and commissioning engineers
l Network monitoring engineers
l Data configuration engineers
l NM administrators
l System maintenance engineers
Symbol ConventionsThe symbols that may be found in this document are defined as follows.
Symbol Description
Indicates an imminently hazardous situation which, if not
avoided, will result in death or serious injury.
Indicates a potentially hazardous situation which, if not
avoided, could result in death or serious injury.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ii
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
4/886
Symbol Description
Indicates a potentially hazardous situation which, if not
avoided, may result in minor or moderate injury.
Indicates a potentially hazardous situation which, if not
avoided, could result in equipment damage, data loss,
performance deterioration, or unanticipated results.
NOTICE is used to address practices not related to
personal injury.
Calls attention to important information, best practices
and tips.
NOTE is used to address information not related to
personal injury, equipment damage, and environment
deterioration.
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in brackets [ ] are
optional.
{ x | y | ... } Optional items are grouped in braces and separated by
vertical bars. One item is selected.
[ x | y | ... ] Optional items are grouped in brackets and separated by
vertical bars. One item is selected or no item is selected.
{ x | y | ... }*
Optional items are grouped in braces and separated byvertical bars. A minimum of one item or a maximum of
all items can be selected.
[ x | y | ... ]* Optional items are grouped in brackets and separated by
vertical bars. Several items or no item can be selected.
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iii
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
5/886
Convention Description
Boldface Buttons, menus, parameters, tabs, window, and dialog
titles are in boldface. For example, click OK.
> Multi-level menus are in boldfaceand separated by the
">" signs. For example, choose File> Create> Folder.
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Changes in Issue 03 (2014-05-15) Based on Product Version V100R009C00
Second release. Modified 8.2.1 Creating a Dynamic L3VPN Service, 8.2.2 Creating a Static
L3VPN Service, and 5 Importing Services.
Changes in Issue 02 (2014-01-05) Based on Product Version V100R009C00
Second release. Added 7.4.3 Adjusting Interface Information About the MPLS Protection
Ring, 12.2.4 Creating a PWE3 in Dynamic L3VPN Service, 15.2 Performing Cross-Service
Check for Fault Locating, and 21 Configuration Example of the IP over WDM Service
Based on Universal Line Boards.
Changes in Issue 01 (2013-08-20) Based on Product Version V100R009C00
Initial release.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management About This Document
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iv
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
6/886
Contents
About This Document.....................................................................................................................ii
1 IP Service Panorama......................................................................................................................1
2 IP Service Management Process.................................................................................................2
3 LearningAbout the GUI............................................................................................................27
4 Basic Concepts..............................................................................................................................30
4.1 Tunnel Overview..........................................................................................................................................................31
4.1.1 Introduction to the Tunnel.........................................................................................................................................31
4.1.2 Standards and Protocols Compliance of the Tunnel..................................................................................................32
4.1.3 Principles...................................................................................................................................................................34
4.1.3.1 Basic Concepts of the Tunnel.................................................................................................................................34
4.1.3.2 Working Principles.................................................................................................................................................35
4.1.3.3 Tunnel Protection Group........................................................................................................................................374.1.3.4 Application of the Tunnel.......................................................................................................................................39
4.2 MPLS Protection Ring Overview.................................................................................................................................40
4.2.1 Introduction to an MPLS Protection Ring.................................................................................................................41
4.2.2 Reference Standards and Protocols for an MPLS Protection Ring...........................................................................41
4.2.3 Principle Description for an MPLS Protection Ring.................................................................................................42
4.2.3.1 Basic Concepts.......................................................................................................................................................42
4.2.3.2 MPLSProtection Ring and Tunnels.......................................................................................................................43
4.2.4 Usage Scenarios of an MPLS Protection Ring..........................................................................................................44
4.3 PWE3 Overview...........................................................................................................................................................44
4.3.1 Introduction to the PWE3..........................................................................................................................................45
4.3.2 Reference Standards and Protocols of the PWE3......................................................................................................45
4.3.3 Principle.....................................................................................................................................................................46
4.3.3.1 PWE3 Basic Principle............................................................................................................................................46
4.3.3.2 VCCV.....................................................................................................................................................................50
4.3.3.3 Static and Dynamic Hybrid Multi-Hop PW...........................................................................................................50
4.3.3.4 PW Protection.........................................................................................................................................................51
4.3.3.5 ATM Cell Transparent Transmission.....................................................................................................................54
4.3.3.6 Service Demarcation Tag.......................................................................................................................................57
4.3.4 Overview of IP over PW...........................................................................................................................................63
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
v
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
7/886
4.3.5 Principle of IP over PW.............................................................................................................................................64
4.3.5.1 Implementation Principle for IP over PW..............................................................................................................64
4.3.5.2 Protection for IP over PW Services........................................................................................................................65
4.3.6 PWE3 Service Application........................................................................................................................................67
4.4 VPLS Overview............................................................................................................................................................68
4.4.1 Introduction to VPLS.................................................................................................................................................69
4.4.2 Reference Standards and Protocols...........................................................................................................................69
4.4.3 VPLS Principle..........................................................................................................................................................69
4.4.4 VPLS Application......................................................................................................................................................73
4.5 L3VPN Overview.........................................................................................................................................................74
4.5.1 Basic Concepts of L3VPN.........................................................................................................................................74
4.5.2 Basic Concepts of MP-BGP......................................................................................................................................80
4.5.3 Label Allocation of MP-BGP....................................................................................................................................86
4.5.4 VPN Route Selection on PEs.....................................................................................................................................86
4.5.5 Route Advertisement of a Basic L3VPN...................................................................................................................87
4.5.6 Packet Forwarding on a Basic L3VPN......................................................................................................................90
4.5.7 IP DSCP Overview....................................................................................................................................................91
4.5.8 Advertisement of VPNv4 Routes..............................................................................................................................92
4.5.9 Introduction to DHCP Relay.....................................................................................................................................92
4.5.10 Principle of DHCP Relay........................................................................................................................................95
4.5.11 Static L3VPN...........................................................................................................................................................99
4.6 Composite Service Overview.....................................................................................................................................100
4.6.1 Introduction to the Composite Service....................................................................................................................100
4.6.2 Basic Functions of the Composite Service..............................................................................................................107
4.6.3 Composite Service Applications.............................................................................................................................107
5 Importing Services....................................................................................................................114
6 Automatically Discovering IP Services.................................................................................119
6.1 Automatically Discovering Single IP Services..........................................................................................................120
6.2 Automatically Discovering Composite Services........................................................................................................123
7 Deploying Tunnels and MPLS Protection Rings................................................................126
7.1 Tunnel Service Function Panorama............................................................................................................................128
7.2 Creating Tunnels.........................................................................................................................................................144
7.2.1 Creatinga Single Tunnel.........................................................................................................................................145
7.2.2 CreatingTunnels in Batches....................................................................................................................................151
7.2.3 CreatingTunnels by Duplicating Existing Tunnels................................................................................................154
7.3 Creating Tunnel Protection.........................................................................................................................................157
7.3.1 Creatingan APS-Based Tunnel Protection Group..................................................................................................158
7.3.2 Creatingan MPLS Protection Ring.........................................................................................................................161
7.4 Adjusting an MPLS Protection Ring..........................................................................................................................165
7.4.1 AddingNEs to an MPLS Protection Ring for Capacity Expansion........................................................................165
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vi
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
8/886
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
9/886
15 Detecting Service Faults.........................................................................................................346
15.1 Locating Faults Using the Test and Check Function................................................................................................348
15.2 Performing Cross-Service Check for Fault Locating...............................................................................................350
15.3 Using a Test Suite to Locate Faults..........................................................................................................................351
15.4 Intelligent Service Fault Diagnosis...........................................................................................................................352
15.4.1 ServiceFault Diagnosis.........................................................................................................................................352
15.4.1.1 PWE3 Service Fault Diagnosis...........................................................................................................................356
15.4.1.2 VPLS Service Fault Diagnosis...........................................................................................................................358
15.4.1.3 Composite Service Fault Diagnosis....................................................................................................................360
15.4.2 Diagnosing Faults for PWE3 Services..................................................................................................................362
15.4.3 Diagnosing Faults for VPLS and Composite Services..........................................................................................364
15.5 Ethernet OAM Detection..........................................................................................................................................366
15.6 MPLS OAM Detection.............................................................................................................................................369
15.7 Detecting MPLS-TP OAM.......................................................................................................................................373
15.8 Configuration Example--Fault Diagnosis (RTN+CX).............................................................................................376
15.8.1 Back-to-Back Networking Scenario......................................................................................................................377
15.8.2 Integrated Networking Scenario............................................................................................................................379
16 Configuration Examples-Routing........................................................................................383
16.1 Examples for Configuring Tunnels..........................................................................................................................384
16.1.1 Example for Configuring the Static CR Tunnel....................................................................................................384
16.1.1.1 Networking Configuration..................................................................................................................................384
16.1.1.2 Service Planning.................................................................................................................................................38416.1.1.3 Configuration Process.........................................................................................................................................386
16.1.2 Example for Configuring the RSVP TE Tunnel....................................................................................................393
16.1.2.1 Configuration Guidelines...................................................................................................................................394
16.1.2.2 Service Planning.................................................................................................................................................395
16.1.2.3 Configuring Global MPLS and MPLS TE Tunnels...........................................................................................398
16.1.2.4 Configuring MPLS TE Tunnels.........................................................................................................................400
16.2 Examples for Configuring a PWE3 Service.............................................................................................................404
16.2.1 Examples for Configuring the ATM Service........................................................................................................405
16.2.1.1 Networking Configuration Diagram...................................................................................................................405
16.2.1.2 Service Planning.................................................................................................................................................406
16.2.1.3 Configuration Process.........................................................................................................................................407
16.2.2 Example for Configuring the CES Emulation Service..........................................................................................411
16.2.2.1 Networking Configuration Diagram...................................................................................................................411
16.2.2.2 Service Planning.................................................................................................................................................412
16.2.2.3 Configuration Process.........................................................................................................................................414
16.2.3 Example for Configuring the ETH Service...........................................................................................................416
16.2.3.1 Networking Configuration Diagram...................................................................................................................416
16.2.3.2 Service Planning.................................................................................................................................................417
16.2.3.3 Configuration Process.........................................................................................................................................419
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
viii
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
10/886
16.2.4 Example for Configuring the ATM IWF Service..................................................................................................421
16.2.4.1 Networking Configuration Diagram...................................................................................................................421
16.2.4.2 Service Planning.................................................................................................................................................422
16.2.4.3 Configuration Process.........................................................................................................................................424
16.2.5 Example for Configuring the Heterogeneous Service...........................................................................................427
16.2.5.1 Networking Configuration Diagram...................................................................................................................427
16.2.5.2 Service Planning.................................................................................................................................................428
16.2.5.3 Configuration Process.........................................................................................................................................429
16.3 Examplefor Configuring a VPLS Service...............................................................................................................432
16.3.1 Example for Configuring the Full-Mesh Networking...........................................................................................432
16.3.1.1 Configuration Networking..................................................................................................................................432
16.3.1.2 Service Planning.................................................................................................................................................433
16.3.1.3 Configuration Process.........................................................................................................................................435
16.3.2 Example for Configuring H-VPLS Networking....................................................................................................438
16.3.2.1 Configuration Networking Diagram...................................................................................................................438
16.3.2.2 Service Planning.................................................................................................................................................439
16.3.2.3 Configuration Process.........................................................................................................................................440
16.3.3 Example for Configuring Daisy Chain Networking..............................................................................................443
16.3.3.1 Configuration Networking..................................................................................................................................443
16.3.3.2 Service Planning.................................................................................................................................................444
16.3.3.3 Configuration Process.........................................................................................................................................447
16.4 Examples for Configuring L3VPN Services............................................................................................................450
16.4.1 Example for Configuring a Full-Mesh VPN Service............................................................................................450
16.4.1.1 Network Configuration.......................................................................................................................................450
16.4.1.2 Service Planning.................................................................................................................................................452
16.4.1.3 Configuration Process.........................................................................................................................................453
16.4.2 Example for Configuring a Hub-Spoke VPN Service...........................................................................................458
16.4.2.1 Network Configuration.......................................................................................................................................458
16.4.2.2 Service Planning.................................................................................................................................................459
16.4.2.3 Configuration Process.........................................................................................................................................461
16.5 Examplefor Configuring Composite Services.........................................................................................................465
16.5.1 Example for Configuring the PWE3+VPLS Composite Service..........................................................................465
16.5.1.1 Configuration Networking Diagram...................................................................................................................465
16.5.1.2 Service Planning.................................................................................................................................................466
16.5.1.3 Configuration Process.........................................................................................................................................470
16.5.2 Example for Configuring the PWE3+L3VPN Composite Service.......................................................................476
16.5.2.1 Configuration Networking Diagram...................................................................................................................476
16.5.2.2 Service Planning.................................................................................................................................................477
16.5.2.3 Configuration Process.........................................................................................................................................480
16.5.3 Example for Configuring the VPLS+L3VPN Composite Service........................................................................485
16.5.3.1 Configuration Networking Diagram...................................................................................................................485
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ix
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
11/886
16.5.3.2 Service Planning.................................................................................................................................................486
16.5.3.3 Configuration Process.........................................................................................................................................490
16.5.4 Example for Configuring the Inter-AS PWE3-OptionA Composite Service........................................................496
16.5.4.1 Configuration Networking Diagram...................................................................................................................496
16.5.4.2 Service Planning.................................................................................................................................................497
16.5.4.3 Configuration Process.........................................................................................................................................499
16.5.5 Example for Configuring the Inter-AS VPLS-OptionA Composite Service........................................................502
16.5.5.1 Configuration Networking Diagram...................................................................................................................502
16.5.5.2 Service Planning.................................................................................................................................................502
16.5.5.3 Configuration Process.........................................................................................................................................505
16.5.6 Example for Configuring the Inter-AS L3VPN-OptionA Composite Service......................................................508
16.5.6.1 Configuration Networking Diagram...................................................................................................................508
16.5.6.2 Service Planning.................................................................................................................................................509
16.5.6.3 Configuration Process.........................................................................................................................................511
17 Configuration Examples-PTN...............................................................................................515
17.1 Examples for Configuring Tunnels..........................................................................................................................516
17.1.1 Example for Configuring a Static CR Tunnel.......................................................................................................516
17.1.1.1 Networking Diagram..........................................................................................................................................516
17.1.1.2 Service Planning.................................................................................................................................................517
17.1.1.3 Configuration Process.........................................................................................................................................519
17.1.2 Example for Configuring an RSVP TE Tunnel.....................................................................................................527
17.1.2.1 Networking Diagram..........................................................................................................................................52717.1.2.2 Service Planning.................................................................................................................................................528
17.1.2.3 Configuration Process.........................................................................................................................................531
17.1.3 Example for Configuring IP and LDP Tunnels.....................................................................................................539
17.1.3.1 Networking Diagram..........................................................................................................................................540
17.1.3.2 Service Planning.................................................................................................................................................540
17.1.3.3 Configuration Process.........................................................................................................................................542
17.2 Examples for Configuring a PWE3 Service.............................................................................................................549
17.2.1 Example for Configuring an End-to-End IP over PW Service..............................................................................549
17.2.1.1 Example Description........................................................................................................... ...............................549
17.2.1.2 Configuration Process.........................................................................................................................................552
17.2.2 Example for Configuring a CES Service...............................................................................................................563
17.2.2.1 Example Description........................................................................................................... ...............................563
17.2.2.2 Service Planning.................................................................................................................................................565
17.2.2.3 Configuration Process.........................................................................................................................................570
17.2.3 Example for Configuring an ATM Service...........................................................................................................587
17.2.3.1 Example Description........................................................................................................... ...............................587
17.2.3.2 Service Planning.................................................................................................................................................588
17.2.3.3 Configuration Process.........................................................................................................................................591
17.2.4 Example for Configuring an ETH Service............................................................................................................615
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
x
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
12/886
17.2.4.1 Example Description..........................................................................................................................................615
17.2.4.2 Service Planning.................................................................................................................................................616
17.2.4.3 Configuration Process.........................................................................................................................................618
17.3 Example for Configuring a VPLS Service...............................................................................................................634
17.3.1 Example for Configuring the Full-Mesh Networking...........................................................................................634
17.3.1.1 Networking Diagram..........................................................................................................................................634
17.3.1.2 Service Planning.................................................................................................................................................634
17.3.1.3 Configuration Process.........................................................................................................................................635
17.3.2 Example for Configuring the Hub-Spoke Networking..........................................................................................654
17.3.2.1 Networking Diagram..........................................................................................................................................654
17.3.2.2 Service Planning.................................................................................................................................................655
17.3.2.3 Configuration Process.........................................................................................................................................659
17.4 Examples for Configuring L3VPN Services............................................................................................................669
17.4.1 Example for Configuring a Full-Mesh VPN Service............................................................................................669
17.4.1.1 Network Configuration.......................................................................................................................................669
17.4.1.2 Service Planning.................................................................................................................................................671
17.4.1.3 Configuration Process.........................................................................................................................................674
17.4.2 Example for Configuring a Hub-Spoke VPN Service...........................................................................................698
17.4.2.1 Network Configuration.......................................................................................................................................698
17.4.2.2 Service Planning.................................................................................................................................................700
17.4.2.3 Configuration Process.........................................................................................................................................701
17.5 Examplefor Configuring Composite Services.........................................................................................................719
17.5.1 Example for Configuring the PWE3+VPLS Composite Service..........................................................................719
17.5.1.1 Configuration Networking Diagram...................................................................................................................719
17.5.1.2 Service Planning.................................................................................................................................................719
17.5.1.3 Configuration Process.........................................................................................................................................722
17.5.2 Example for Configuring a PWE3+PWE3 Composite Service.............................................................................726
17.5.2.1 Configuration Networking Diagram...................................................................................................................726
17.5.2.2 Service Planning.................................................................................................................................................726
17.5.2.3 Configuration Process.........................................................................................................................................727
17.6 Examplefor Configuring Dual-Homing Protection with 1:1 MC-PW APS and MC-LAG....................................729
17.6.1 Configuration Networking Diagram......................................................................................................................730
17.6.2 Service Planning....................................................................................................................................................730
17.6.3 Configuration Process............................................................................................................................................733
17.7 Configuration Case of VRRP...................................................................................................................................737
17.7.1 Configuration Networking Diagram......................................................................................................................737
17.7.2 Configuration Process............................................................................................................................................738
17.7.3 ServicePlanning....................................................................................................................................................741
18 Configuration Examples-RTN.............................................................................................. 743
18.1 Examples for Configuring Tunnels..........................................................................................................................744
18.1.1 Example for Configuring a Static CR Tunnel.......................................................................................................744
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xi
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
13/886
18.1.1.1 Networking Diagram..........................................................................................................................................744
18.1.1.2 Service Planning.................................................................................................................................................744
18.1.1.3 Configuration Process.........................................................................................................................................746
18.1.2 Example for Configuring an RSVP TE Tunnel.....................................................................................................754
18.1.2.1 Networking Diagram..........................................................................................................................................754
18.1.2.2 Service Planning.................................................................................................................................................755
18.1.2.3 Configuration Process.........................................................................................................................................757
18.2 Examples for Configuring a PWE3 Service.............................................................................................................768
18.2.1 Example for Configuring a CES Service...............................................................................................................769
18.2.1.1 Networking Diagram..........................................................................................................................................769
18.2.1.2 Service Planning.................................................................................................................................................769
18.2.1.3 Configuration Process.........................................................................................................................................773
18.2.2 Example for Configuring an ATM Service...........................................................................................................788
18.2.2.1 Networking Diagram..........................................................................................................................................788
18.2.2.2 Service Planning.................................................................................................................................................789
18.2.2.3 Configuration Process.........................................................................................................................................792
18.2.3 Example for Configuring an ETH Service............................................................................................................807
18.2.3.1 Networking Diagram..........................................................................................................................................807
18.2.3.2 Service Planning.................................................................................................................................................807
18.2.3.3 Configuration Process.........................................................................................................................................808
19 Configuration Examples-Hybrid MSTP.............................................................................818
19.1 Examples for Configuring Tunnels..........................................................................................................................81919.1.1 Networking Diagram.............................................................................................................................................819
19.1.2 ServicePlanning....................................................................................................................................................819
19.1.3 Configuration Process............................................................................................................................................822
19.2 Examples for Configuring a PWE3 Service.............................................................................................................830
19.2.1 Networking Diagram.............................................................................................................................................830
19.2.2 ServicePlanning....................................................................................................................................................831
19.2.3 Configuration Process............................................................................................................................................833
19.3 Examplefor Configuring a VPLS Service...............................................................................................................840
19.3.1 Networking Diagram.............................................................................................................................................84019.3.2 ServicePlanning....................................................................................................................................................841
19.3.3 Configuration Process............................................................................................................................................845
20 Configuration Examples-Hybrid MSTP+PTN..................................................................850
20.1 Examplefor Configuring the SDH+PWE3 Composite Service...............................................................................851
20.1.1 Networking Configuration.....................................................................................................................................851
20.1.2 ServicePlanning....................................................................................................................................................852
20.1.3 Configuration Process............................................................................................................................................855
21 Configuration Example of the IP over WDM Service Based on Universal Line Boards..........................................................................................................................................................861
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xii
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
14/886
21.1 Networking Diagram................................................................................................................................................862
21.2 Service Planning.......................................................................................................................................................862
21.3 Configuration Process...............................................................................................................................................864
22 FAQ............................................................................................................................................869
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management Contents
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
xiii
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
15/886
1IP Service PanoramaThe IP services supported by the U2000 are the tunnel, L3VPN, VPLS, PWE3, aggregation, and
composite services.
NOTE
l NEs supporting different IP services are different. "" indicates that the device supports this service
on the U2000. "-" indicates that the device does not support this service on the U2000.
l A function panorama can be accessed by clicking the associated cell in the following function matrix.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 1 IP Service Panorama
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
16/886
2IP Service Management ProcessThe U2000 supports E2E IP service creation and maintenance. The process of managing IP
services is described using flowcharts, and the window and document navigation paths for the
operation tasks are given to help you understand IP service management.
Routers and Switches
Figure 2-1shows the process of managing IP services on routers and switches.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
17/886
Figure 2-1Process of managing IP services on routers and switches
Tunnel Deployment
Automatically
discover tunnels
Preparation VPN DeploymentService Monitoring
and Maintenance
Create a tunnel
Create NEs
Configure MPLS
Create an L3VPN
service
Configure routes
Create a Layer 2 link
Configure interfaces Configure APS
protection
Configure tunnel
OAM
Configure BFD
Automatically discovercomposite services
Create a VPLS
service
Create a PWE3
service
Create a composite
service
Configure BFD
Configure Ethernet
OAM
Configure TP OAM
Configure VRRP
View the service
topology
View performance
data
View service alarms
Diagnose services
Configure MPLS-TP
OAM
Automatically discover
VPN services
PTN
Figure 2-2shows the process of managing IP services on PTN NEs.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
18/886
Figure 2-2Process of managing IP services on PTN NEs
Tunnel Deployment
Automatically
discover tunnels
Preparation VPN DeploymentService Monitoring
and Maintenance
Create a tunnel
Create NEs
Configure thecontrol plane
Create a PWE3
service
Automatically discover
VPN services
Configure LSR IDs
for the NEs
Configure network-side
interfaces
Configure the MPLS
protection ring
Configure APS
protection
Configure tunnelOAM Automatically discovercomposite services
Create an L3VPN
service
Create a VPLS
service
Create a composite
service
Configure Ethernet
OAM
Configure MPLS-TP
OAM
Configure VRRP
View the service
topology
View performance
data
View service alarms
Diagnose services
Configure MPLS-TP
OAM
Create a Layer 2 link
Configure BFD
RTN
Figure 2-3shows the process of managing IP services on RTN NEs.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
19/886
Figure 2-3Process of managing IP services on RTN NEs
Tunnel Deployment
Automatically
discover tunnels
Preparation VPN DeploymentService Monitoring
and Maintenance
Create a tunnel
Create NEs
Configure network-side
interfaces
Create a VPLS
service
Automatically discover
VPN services
Create a Layer 2 link
Configure LSR IDs
for the NEsConfigure APS
protection
Configure tunnel
OAMAutomatically discover
composite services
Create a compositeservice
Configure Ethernet
OAM
Configure MPLS-TP
OAM
View the service
topology
View performance
data
View service alarms
Diagnose services
Configure MPLS-TPOAM
Create a PWE3
service
Configure BFD
Configure BFD
Configure VRRP
Hybrid MSTP
Figure 2-4shows the process of managing IP services on hybrid MSTP NEs.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
20/886
Figure 2-4Process of managing IP services on hybrid MSTP NEs
Tunnel Deployment
Automatically
discover tunnels
Preparation VPN DeploymentService Monitoring
and Maintenance
Create a tunnel
Create NEs
Create an aggregation
service
Automatically discover
VPN services
Configure LSR IDs
for the NEs
Configure network-side
interfaces
Configure APS
protection
Configure tunnel
OAM
Automatically discovercomposite services
Create a VPLS
service
Create a PWE3
service
Create a composite
service
Configure Ethernet
OAM
Configure MPLS-TP
OAM
View the service
topology
View performance
data
View service alarms
Diagnose services
Configure MPLS-TPOAM
Create a Layer 2 link
OTN
Figure 2-5shows the process of managing IP services on OTN NEs.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
6
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
21/886
Figure 2-5Process of managing IP services on OTN NEs
Tunnel Deployment
Automatically
discover tunnels
Preparation VPN DeploymentService Monitoring
and Maintenance
Create a tunnel
Create NEs
Create a PWE3
service
Automatically discover
VPN services
Configure LSR IDs
for the NEs
Configure network-side
interfacesConfigure APS
protection
Configure tunnel
OAMAutomatically discover
composite services
Create a VPLS
service
Create a composite
service
Configure Ethernet
OAM
Configure MPLS-TP
OAM
View the service
topology
View performance
data
View service alarms
Configure MPLS-TPOAM
Create an ODU2 path
Task Description
Table 2-1lists all the operation tasks involved in the IP service management flowcharts, as well
as the window and document navigation paths for these tasks.
Table 2-1Task description of managing IP services
Scenario
Task Description Navigation Path ReferenceChapter
Preparati
on
Create NEs. Add the NEs to be
operated on theU2000.
Choose File>
Discovery> NE(traditional style)
from the main menu
or select Topo View
in Application
Centerand choose
File> Discovery>
NE(application
style) from the main
menu.
Topology
Management >Creating NEs >
Creating NEs in
Batches in U2000
Operation Guide
for Common
Features
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
7
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
22/886
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
23/886
Scenario
Task Description Navigation Path ReferenceChapter
Configure
interfaces.
Configure the IP
addresses andsubnet masks of
interfaces.
The tunnel enabling
status must be
configured for
PTN, MSTP, and
RTN NEs.
l Routers, and
switches: ChooseConfiguration>
Router/Switch/
Security
Configuration>
Plug-and-Play
Management
(traditional style)
from the main
menu or select
Fix-Network NE
Configurationin
Application
Centerand
choose
Configuration>
Router/Switch/
Security
Configuration>
Plug-and-Play
Management
(application
style) from the
main menu.l PTN, and RTN:
In the NE
Explorer, select
the NE and
choose
Configuration>
Interface
Management
from the Function
Tree.
l Hybrid MSTP: Inthe NE Explorer,
select an NE and
choose
Configuration>
Packet
Configuration>
Interface
Management
from the Function
Tree.
l Network
Deployment inU2000
Operation
Guide for
Router and
Switch Network
Management.
l Configuring
Interfaces in
U2000
Operation
Guide for PTN
NE
Management.
l Configuring
Interfaces for
Packet Radio in
U2000
Operation
Guide for RTN
NE
Management.
lConfiguringInterfaces in
U2000
Operation
Guide for
Packet MSTP
NE
Management.
l Configuring
Board
Parameters >
ConfiguringEthernet
Boards in
Operation
Guide for LH
WDM & Metro
WDM NE
Management.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
9
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
24/886
Scenario
Task Description Navigation Path ReferenceChapter
l OTN: In the NE
Explorer, selectthe appropriate
Ethernet board
and then select
Configuration>
Ethernet
Interface
Management>
Ethernet
Interfacefrom
the Function
Tree.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
10
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
25/886
Scenario
Task Description Navigation Path ReferenceChapter
Configure
MPLS.
Configure LSR IDs
for the created NEs.The MPLS
capabilities and
remote peers must
be configured for
routers and
switches and their
interfaces. Peers are
configured between
NEs in non-direct
connection
scenarios.
l Routers, and
switches: ChooseConfiguration>
Router/Switch/
Security
Configuration>
Plug-and-Play
Management
(traditional style)
from the main
menu or select
Fix-Network NE
Configurationin
Application
Centerand
choose
Configuration>
Router/Switch/
Security
Configuration>
Plug-and-Play
Management
(application
style) from the
main menu.l PTN, RTN,
Hybrid MSTP,
and OTN NEs: In
the NE Explorer,
select the NE and
choose
Configuration>
Packet
Configuration>
MPLS
Management>Basic
Configuration
from the Function
Tree.
l Network
Deployment inU2000
Operation
Guide for
Router and
Switch Network
Management.
l Configuring
Interfaces >
Configure the
network-side
Layer 3
interface in
U2000
Operation
Guide for PTN
NE
Management.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
11
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
26/886
Scenario
Task Description Navigation Path ReferenceChapter
Configure
routes.
Configure global
and interfaceroutes.
Global and
interface routes
must be configured
for RSVP TE
tunnels on routers
and switches.
PTN NEs:
l RSVP TE
Tunnel:
Configure IGP-ISIS and MPLS-
RSVP.
l LDP Tunnel:
Configure IGP-
ISIS and MPLS-
LDP.
l Routers, and
switches: ChooseConfiguration>
Router/Switch/
Security
Configuration>
Plug-and-Play
Management
(traditional style)
from the main
menu or select
Fix-Network NE
Configurationin
Application
Centerand
choose
Configuration>
Router/Switch/
Security
Configuration>
Plug-and-Play
Management
(application
style) from the
main menu.l PTN: In the NE
Explorer, select
an NE and choose
Configuration >
Control Plane
Configuration
from the Function
Tree.
l Network
Deployment inU2000
Operation
Guide for
Router and
Switch Network
Management.
l Configuring the
Control Plane in
U2000
Operation
Guide for PTN
NE
Management.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
12
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
27/886
Scenario
Task Description Navigation Path ReferenceChapter
Tunnel
Deployment
Automatic
allydiscover IP
services.
After a network is
built or a service isconfigured on an
NE using the NE
Explorer, perform
automatic IP
service discovery to
add the related
information to the
IP service
management
window and
manage the
configured service
in end-to-end
mode.
The following IP
services support
this operation:
tunnel, L3VPN,
VPLS, PWE3, and
aggregation
services.
Choose Service>
Search for Service(traditional style)
from the main menu
or select Bearer
Network Service
Configurationin
Application Center
and choose Service>
Search for Service
(application style)
from the main menu.
Automatically
Discovering IPServices >
Automatically
Discovering Single
IP Services.
Create atunnel.
Tunnels can ensurethe security of
information
transmission and
bear multiple types
of VPN services
such as VPLS,
PWE3, and L3VPN
services.
Choose Service>Tunnel> Create
Tunnel(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
Tunnel> Create
Tunnel(application
style) from the main
menu.
Deploying aTunnel > Creating
a Tunnel.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
13
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
28/886
Scenario
Task Description Navigation Path ReferenceChapter
Creating
TunnelProtection
Based on
MPLS
Rings.
An MPLS
protection ring islocated at the server
layer but a tunnel is
located at the
service layer.
Compared with
traditional linear
protection
solutions, this
technology can
prevent multi-link
failures. If an
intersecting node is
configured, this
technology can also
prevent node
failures. In
addition, this
technology can be
used together with
linear protection
solutions to
improve protection
reliability.
Choose Service> IP
Protection Subnet>Create MPLS
Protection Ring
(traditional style)
from the main menu
or select Bearer
Network Service
Configurationin
Application Center
and choose
Protection Subnet>
IP Protection
Subnet> Create
MPLS Protection
Ring(application
style) from the main
menu.
Deploying a
Tunnel > CreatingTunnel Protection
> Creating an
MPLS Protection
Ring.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
14
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
29/886
Scenario
Task Description Navigation Path ReferenceChapter
Creating
TunnelProtection
Based on
APS.
This topic describes
how to create atunnel protection
group. If a tunnel
protection group is
created, the
services carried
over the active
tunnel are switched
over to the
protection tunnel
when the working
tunnel is faulty.
Choose Service>
Tunnel> Search forProtection Group
(traditional style)
from the main menu
or select Bearer
Network Service
Configurationin
Application Center
and choose Service>
Tunnel> Search for
Protection Group
(application style)
from the main menu.
or Choose Service>
Tunnel> Create
Protection Group
(traditional style)
from the main menu
or select Bearer
Network Service
Configurationin
Application Center
and choose Service>
Tunnel> CreateProtection Group
(application style)
from the main menu.
Deploying a
Tunnel > CreatingTunnel Protection
> Creating a
Tunnel Protection
Group.
Configure
BFD.
A tunnel supports
BFD for TE and
BFD for LSP. The
U2000 supports
millisecond fault
detection on
tunnels.
Choose Service>
Tunnel> Manage
Tunnel(traditional
style) from the main
menu or select
Bearer Network
Service
ConfigurationinApplication Center
and choose Service>
Tunnel> Manage
Tunnel(application
style) from the main
menu. Right-click
the desired tunnel
and choose
Configure BFD
from the shortcut
menu.
Deploying
Network
Reliability >
Configuring BFD.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
15
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
30/886
Scenario
Task Description Navigation Path ReferenceChapter
VPN
servicedeploym
ent
Create an
L3VPNservice.
In comparison with
L2VPN, on anL3VPN, packets
are forwarded at the
network layer.
Choose Service>
L3VPN Service>Create L3VPN
Service(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
L3VPN Service>
Create L3VPN
Service(application
style) from the main
menu.
Deploying L3VPN
Services > Creatingan L3VPN Service.
Create a
VPLS
service.
VPLS is a Layer 2
VPN technology
over the MPLS or
Ethernet network. It
is mainly used to
join multiple
Ethernet LAN
segments through
the PSN and make
them operate as a
LAN.
Choose Service>
VPLS Service>
Create VPLS
Service(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
VPLS Service>
Create VPLS
Service(application
style) from the main
menu.
Deploying VPLS
Services > Creating
a VPLS Service.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
16
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
31/886
Scenario
Task Description Navigation Path ReferenceChapter
Create a
PWE3service.
PWE3 is a point-to-
point Layer 2 VPNtechnology which is
used to simulate the
basic behaviors and
characteristics of
services, such as
ATM, FR,
Ethernet, TDM
circuit, SONET,
and SDH on a PSN.
Choose Service>
PWE3 Service>Create PWE3
Service(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
PWE3 Service>
Create PWE3
Service(application
style) from the main
menu.
Deploying PWE3
Services > CreatingPWE3 Service.
Create an
aggregatio
n service.
By using the
U2000, you can
create an E-AGGR
service in the same
user interface. The
equipment supports
multipoint-to-point
service
aggregation, as well
as service
aggregation from
the NNI carried by
multiple PWs to
one UNI.
Choose Service> E-
AGGR Service>
Create E-AGGR
Service(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
E-AGGR Service>
Create E-AGGR
Service(application
style) from the main
menu.
Deploying E-
AGGR Services >
Create E-AGGR
Service.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
17
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
32/886
Scenario
Task Description Navigation Path ReferenceChapter
Automatic
allydiscover
composite
services.
The U2000 can
automaticallydiscover services
that meet specific
requirements,
combine these
services into
composite services,
and display the
composite services
on the Composite
Service
Management tab
page. You can
perform this
operation when a
network is being
built or after IP
services have been
configured.
Choose Service>
Composite Service> Search for
Composite Service
(traditional style)
from the main menu
or select Bearer
Network Service
Configurationin
Application Center
and choose Service>
Composite Service
> Search for
Composite Service
(application style)
from the main menu.
Automatically
Discovering IPServices >
Automatically
Discovering
Composite
Services.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
18
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
33/886
Scenario
Task Description Navigation Path ReferenceChapter
Create a
compositeservice.
A composite
service is acollection of
multiple services,
for example, VPLS
+L3VPN.
In a composite
service, the
function of
different services,
such as PWE3,
VPLS, L3VPN,
Unterminated EPL,
E-Line, SDH,
Terminated EPL,
and E-AGGR
services, can be
flexible aggregated
to address the issues
in single-service
scenarios. In
addition, composite
services support
service
visualization andE2E management,
helping carriers
better adapt to
solutions, such as
IPRAN and IP Core
solutions.
Choose Service>
Composite Service> Create Composite
Service(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
Composite Service
> Create Composite
Service(application
style) from the main
menu.
Deploying
CompositeServices > Creating
a Composite
Service.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
19
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
34/886
Scenario
Task Description Navigation Path ReferenceChapter
Configure
BFD.
Bidirectional
ForwardingDetection for BFD
is a universal
mechanism used to
detect
communication
faults between
forwarding
engines. To be
specific, BFD
detects the
connectivity of a
data protocol on the
same path between
two systems. The
path can be a
physical link, a
logical link, or a
tunnel. BFD can be
regarded as a
service provided by
the system. The
upper-layer
applicationsprovide BFD
parameters such as
detection address
and detection time.
BFD creates,
deletes, or modifies
BFD sessions based
on these
information and
informs the upper-
layer applications
of the session
status. The upper-
layer applications
then determine
whether to take
actions as the BFD
session status
changes.
Choose Service>
L3VPN Service>Manage L3VPN
Service(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
L3VPN Service>
Manage L3VPN
Service(application
style) from the main
menu. Right-click
the desired L3VPN
service and choose
Configure BFD
from the shortcut
menu.
The method for
configuring BFD for
other IP services is
the same as that forthe L3VPN service.
Deploying
NetworkReliability >
Configuring BFD.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
20
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
35/886
Scenario
Task Description Navigation Path ReferenceChapter
Configure
EthernetOAM.
Ethernet OAM
improves Ethernetmanagement and
maintenance
capabilities and
guarantees network
stability. This
feature mainly
applies to the
Ethernet to
implement link-
level Ethernet
OAM between CE
to PE, and enhance
network reliability.
Choose Service>
Service EthernetOAM(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
Service Ethernet
OAM(application
style) from the main
menu.
Deploying
NetworkReliability >
Configuring
Ethernet OAM.
Configure
TP OAM.
The TP OAM
function supports
continuity check for
tunnel and PWE3
services, achieving
rapid service fault
location and
isolation.
Choose Service>
PWE3 Service>
Manage PWE3
Service(traditional
style) from the main
menu or select
Bearer Network
Service
Configurationin
Application Center
and choose Service>
PWE3 Service>
Manage PWE3
Service(application
style) from the main
menu. Right-click
the desired PWE3
service and choose
PW OAMfrom the
shortcut menu.
The method for
configuring TP
OAM for a tunnel is
the same as that for
the PWE3 service.
Deploying
Network
Reliability >
Configuring
MPLS-TP OAM.
iManager U2000 Unified Network Management System
Operation Guide for IP Service Management 2 IP Service Management Process
Issue 03 (2014-05-15) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
21
8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)
36/886
Scenario
Task Description Navigation Path ReferenceChapter
Configure
VRRP.
Virtual Router
RedundancyProtocol for VRRP
is a fault-tolerant
protocol. By
combining a group
of routers on a LAN
into a virtual router,
VRRP can switch
the services to other
routers through
certain mechanisms
when the next hop
router fails. This
ensures continuity
and reliability in
communication.
Compared with
other methods,
VRRP is