240
iManager U2000 Unified Network Management System V100R009C00 Operation Guide for IP Service Management Issue 03 Date 2014-05-15 HUAWEI TECHNOLOGIES CO., LTD.

IManager U2000 Operation Guide for IP Service Management(V100R009)

Embed Size (px)

Citation preview

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    1/886

    iManager U2000 Unified Network Management

    System

    V100R009C00

    Operation Guide for IP Service

    Management

    Issue 03

    Date 2014-05-15

    HUAWEI TECHNOLOGIES CO., LTD.

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    2/886

    Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved.

    No part of this document may be reproduced or transmitted in any form or by any means without prior written

    consent of Huawei Technologies Co., Ltd.

    Trademarks and Permissions

    and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.

    All other trademarks and trade names mentioned in this document are the property of their respective holders.

    Notice

    The purchased products, services and features are stipulated by the contract made between Huawei and the

    customer. All or part of the products, services and features described in this document may not be within the

    purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,

    and recommendations in this document are provided "AS IS" without warranties, guarantees or representations

    of any kind, either express or implied.

    The information in this document is subject to change without notice. Every effort has been made in the

    preparation of this document to ensure accuracy of the contents, but all statements, information, and

    recommendations in this document do not constitute a warranty of any kind, express or implied.

    Huawei Technologies Co., Ltd.

    Address: Huawei Industrial Base

    Bantian, Longgang

    Shenzhen 518129

    People's Republic of China

    Website: http://www.huawei.com

    Email: [email protected]

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    i

    http://www.huawei.com/
  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    3/886

    About This Document

    Related Version

    The following table lists the product version related to this document.

    Product Name Version

    iManager U2000 V100R009C00

    Intended Audience

    This document describes the process and detailed steps of IP service configuration.

    The intended audiences of this document are:

    l Installation and commissioning engineers

    l Network monitoring engineers

    l Data configuration engineers

    l NM administrators

    l System maintenance engineers

    Symbol ConventionsThe symbols that may be found in this document are defined as follows.

    Symbol Description

    Indicates an imminently hazardous situation which, if not

    avoided, will result in death or serious injury.

    Indicates a potentially hazardous situation which, if not

    avoided, could result in death or serious injury.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management About This Document

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    ii

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    4/886

    Symbol Description

    Indicates a potentially hazardous situation which, if not

    avoided, may result in minor or moderate injury.

    Indicates a potentially hazardous situation which, if not

    avoided, could result in equipment damage, data loss,

    performance deterioration, or unanticipated results.

    NOTICE is used to address practices not related to

    personal injury.

    Calls attention to important information, best practices

    and tips.

    NOTE is used to address information not related to

    personal injury, equipment damage, and environment

    deterioration.

    Command Conventions

    The command conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface The keywords of a command line are in boldface.

    Italic Command arguments are in italics.

    [ ] Items (keywords or arguments) in brackets [ ] are

    optional.

    { x | y | ... } Optional items are grouped in braces and separated by

    vertical bars. One item is selected.

    [ x | y | ... ] Optional items are grouped in brackets and separated by

    vertical bars. One item is selected or no item is selected.

    { x | y | ... }*

    Optional items are grouped in braces and separated byvertical bars. A minimum of one item or a maximum of

    all items can be selected.

    [ x | y | ... ]* Optional items are grouped in brackets and separated by

    vertical bars. Several items or no item can be selected.

    GUI Conventions

    The GUI conventions that may be found in this document are defined as follows.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management About This Document

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    iii

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    5/886

    Convention Description

    Boldface Buttons, menus, parameters, tabs, window, and dialog

    titles are in boldface. For example, click OK.

    > Multi-level menus are in boldfaceand separated by the

    ">" signs. For example, choose File> Create> Folder.

    Change History

    Updates between document issues are cumulative. Therefore, the latest document issue contains

    all updates made in previous issues.

    Changes in Issue 03 (2014-05-15) Based on Product Version V100R009C00

    Second release. Modified 8.2.1 Creating a Dynamic L3VPN Service, 8.2.2 Creating a Static

    L3VPN Service, and 5 Importing Services.

    Changes in Issue 02 (2014-01-05) Based on Product Version V100R009C00

    Second release. Added 7.4.3 Adjusting Interface Information About the MPLS Protection

    Ring, 12.2.4 Creating a PWE3 in Dynamic L3VPN Service, 15.2 Performing Cross-Service

    Check for Fault Locating, and 21 Configuration Example of the IP over WDM Service

    Based on Universal Line Boards.

    Changes in Issue 01 (2013-08-20) Based on Product Version V100R009C00

    Initial release.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management About This Document

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    iv

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    6/886

    Contents

    About This Document.....................................................................................................................ii

    1 IP Service Panorama......................................................................................................................1

    2 IP Service Management Process.................................................................................................2

    3 LearningAbout the GUI............................................................................................................27

    4 Basic Concepts..............................................................................................................................30

    4.1 Tunnel Overview..........................................................................................................................................................31

    4.1.1 Introduction to the Tunnel.........................................................................................................................................31

    4.1.2 Standards and Protocols Compliance of the Tunnel..................................................................................................32

    4.1.3 Principles...................................................................................................................................................................34

    4.1.3.1 Basic Concepts of the Tunnel.................................................................................................................................34

    4.1.3.2 Working Principles.................................................................................................................................................35

    4.1.3.3 Tunnel Protection Group........................................................................................................................................374.1.3.4 Application of the Tunnel.......................................................................................................................................39

    4.2 MPLS Protection Ring Overview.................................................................................................................................40

    4.2.1 Introduction to an MPLS Protection Ring.................................................................................................................41

    4.2.2 Reference Standards and Protocols for an MPLS Protection Ring...........................................................................41

    4.2.3 Principle Description for an MPLS Protection Ring.................................................................................................42

    4.2.3.1 Basic Concepts.......................................................................................................................................................42

    4.2.3.2 MPLSProtection Ring and Tunnels.......................................................................................................................43

    4.2.4 Usage Scenarios of an MPLS Protection Ring..........................................................................................................44

    4.3 PWE3 Overview...........................................................................................................................................................44

    4.3.1 Introduction to the PWE3..........................................................................................................................................45

    4.3.2 Reference Standards and Protocols of the PWE3......................................................................................................45

    4.3.3 Principle.....................................................................................................................................................................46

    4.3.3.1 PWE3 Basic Principle............................................................................................................................................46

    4.3.3.2 VCCV.....................................................................................................................................................................50

    4.3.3.3 Static and Dynamic Hybrid Multi-Hop PW...........................................................................................................50

    4.3.3.4 PW Protection.........................................................................................................................................................51

    4.3.3.5 ATM Cell Transparent Transmission.....................................................................................................................54

    4.3.3.6 Service Demarcation Tag.......................................................................................................................................57

    4.3.4 Overview of IP over PW...........................................................................................................................................63

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management Contents

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    v

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    7/886

    4.3.5 Principle of IP over PW.............................................................................................................................................64

    4.3.5.1 Implementation Principle for IP over PW..............................................................................................................64

    4.3.5.2 Protection for IP over PW Services........................................................................................................................65

    4.3.6 PWE3 Service Application........................................................................................................................................67

    4.4 VPLS Overview............................................................................................................................................................68

    4.4.1 Introduction to VPLS.................................................................................................................................................69

    4.4.2 Reference Standards and Protocols...........................................................................................................................69

    4.4.3 VPLS Principle..........................................................................................................................................................69

    4.4.4 VPLS Application......................................................................................................................................................73

    4.5 L3VPN Overview.........................................................................................................................................................74

    4.5.1 Basic Concepts of L3VPN.........................................................................................................................................74

    4.5.2 Basic Concepts of MP-BGP......................................................................................................................................80

    4.5.3 Label Allocation of MP-BGP....................................................................................................................................86

    4.5.4 VPN Route Selection on PEs.....................................................................................................................................86

    4.5.5 Route Advertisement of a Basic L3VPN...................................................................................................................87

    4.5.6 Packet Forwarding on a Basic L3VPN......................................................................................................................90

    4.5.7 IP DSCP Overview....................................................................................................................................................91

    4.5.8 Advertisement of VPNv4 Routes..............................................................................................................................92

    4.5.9 Introduction to DHCP Relay.....................................................................................................................................92

    4.5.10 Principle of DHCP Relay........................................................................................................................................95

    4.5.11 Static L3VPN...........................................................................................................................................................99

    4.6 Composite Service Overview.....................................................................................................................................100

    4.6.1 Introduction to the Composite Service....................................................................................................................100

    4.6.2 Basic Functions of the Composite Service..............................................................................................................107

    4.6.3 Composite Service Applications.............................................................................................................................107

    5 Importing Services....................................................................................................................114

    6 Automatically Discovering IP Services.................................................................................119

    6.1 Automatically Discovering Single IP Services..........................................................................................................120

    6.2 Automatically Discovering Composite Services........................................................................................................123

    7 Deploying Tunnels and MPLS Protection Rings................................................................126

    7.1 Tunnel Service Function Panorama............................................................................................................................128

    7.2 Creating Tunnels.........................................................................................................................................................144

    7.2.1 Creatinga Single Tunnel.........................................................................................................................................145

    7.2.2 CreatingTunnels in Batches....................................................................................................................................151

    7.2.3 CreatingTunnels by Duplicating Existing Tunnels................................................................................................154

    7.3 Creating Tunnel Protection.........................................................................................................................................157

    7.3.1 Creatingan APS-Based Tunnel Protection Group..................................................................................................158

    7.3.2 Creatingan MPLS Protection Ring.........................................................................................................................161

    7.4 Adjusting an MPLS Protection Ring..........................................................................................................................165

    7.4.1 AddingNEs to an MPLS Protection Ring for Capacity Expansion........................................................................165

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management Contents

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    vi

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    8/886

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    9/886

    15 Detecting Service Faults.........................................................................................................346

    15.1 Locating Faults Using the Test and Check Function................................................................................................348

    15.2 Performing Cross-Service Check for Fault Locating...............................................................................................350

    15.3 Using a Test Suite to Locate Faults..........................................................................................................................351

    15.4 Intelligent Service Fault Diagnosis...........................................................................................................................352

    15.4.1 ServiceFault Diagnosis.........................................................................................................................................352

    15.4.1.1 PWE3 Service Fault Diagnosis...........................................................................................................................356

    15.4.1.2 VPLS Service Fault Diagnosis...........................................................................................................................358

    15.4.1.3 Composite Service Fault Diagnosis....................................................................................................................360

    15.4.2 Diagnosing Faults for PWE3 Services..................................................................................................................362

    15.4.3 Diagnosing Faults for VPLS and Composite Services..........................................................................................364

    15.5 Ethernet OAM Detection..........................................................................................................................................366

    15.6 MPLS OAM Detection.............................................................................................................................................369

    15.7 Detecting MPLS-TP OAM.......................................................................................................................................373

    15.8 Configuration Example--Fault Diagnosis (RTN+CX).............................................................................................376

    15.8.1 Back-to-Back Networking Scenario......................................................................................................................377

    15.8.2 Integrated Networking Scenario............................................................................................................................379

    16 Configuration Examples-Routing........................................................................................383

    16.1 Examples for Configuring Tunnels..........................................................................................................................384

    16.1.1 Example for Configuring the Static CR Tunnel....................................................................................................384

    16.1.1.1 Networking Configuration..................................................................................................................................384

    16.1.1.2 Service Planning.................................................................................................................................................38416.1.1.3 Configuration Process.........................................................................................................................................386

    16.1.2 Example for Configuring the RSVP TE Tunnel....................................................................................................393

    16.1.2.1 Configuration Guidelines...................................................................................................................................394

    16.1.2.2 Service Planning.................................................................................................................................................395

    16.1.2.3 Configuring Global MPLS and MPLS TE Tunnels...........................................................................................398

    16.1.2.4 Configuring MPLS TE Tunnels.........................................................................................................................400

    16.2 Examples for Configuring a PWE3 Service.............................................................................................................404

    16.2.1 Examples for Configuring the ATM Service........................................................................................................405

    16.2.1.1 Networking Configuration Diagram...................................................................................................................405

    16.2.1.2 Service Planning.................................................................................................................................................406

    16.2.1.3 Configuration Process.........................................................................................................................................407

    16.2.2 Example for Configuring the CES Emulation Service..........................................................................................411

    16.2.2.1 Networking Configuration Diagram...................................................................................................................411

    16.2.2.2 Service Planning.................................................................................................................................................412

    16.2.2.3 Configuration Process.........................................................................................................................................414

    16.2.3 Example for Configuring the ETH Service...........................................................................................................416

    16.2.3.1 Networking Configuration Diagram...................................................................................................................416

    16.2.3.2 Service Planning.................................................................................................................................................417

    16.2.3.3 Configuration Process.........................................................................................................................................419

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management Contents

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    viii

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    10/886

    16.2.4 Example for Configuring the ATM IWF Service..................................................................................................421

    16.2.4.1 Networking Configuration Diagram...................................................................................................................421

    16.2.4.2 Service Planning.................................................................................................................................................422

    16.2.4.3 Configuration Process.........................................................................................................................................424

    16.2.5 Example for Configuring the Heterogeneous Service...........................................................................................427

    16.2.5.1 Networking Configuration Diagram...................................................................................................................427

    16.2.5.2 Service Planning.................................................................................................................................................428

    16.2.5.3 Configuration Process.........................................................................................................................................429

    16.3 Examplefor Configuring a VPLS Service...............................................................................................................432

    16.3.1 Example for Configuring the Full-Mesh Networking...........................................................................................432

    16.3.1.1 Configuration Networking..................................................................................................................................432

    16.3.1.2 Service Planning.................................................................................................................................................433

    16.3.1.3 Configuration Process.........................................................................................................................................435

    16.3.2 Example for Configuring H-VPLS Networking....................................................................................................438

    16.3.2.1 Configuration Networking Diagram...................................................................................................................438

    16.3.2.2 Service Planning.................................................................................................................................................439

    16.3.2.3 Configuration Process.........................................................................................................................................440

    16.3.3 Example for Configuring Daisy Chain Networking..............................................................................................443

    16.3.3.1 Configuration Networking..................................................................................................................................443

    16.3.3.2 Service Planning.................................................................................................................................................444

    16.3.3.3 Configuration Process.........................................................................................................................................447

    16.4 Examples for Configuring L3VPN Services............................................................................................................450

    16.4.1 Example for Configuring a Full-Mesh VPN Service............................................................................................450

    16.4.1.1 Network Configuration.......................................................................................................................................450

    16.4.1.2 Service Planning.................................................................................................................................................452

    16.4.1.3 Configuration Process.........................................................................................................................................453

    16.4.2 Example for Configuring a Hub-Spoke VPN Service...........................................................................................458

    16.4.2.1 Network Configuration.......................................................................................................................................458

    16.4.2.2 Service Planning.................................................................................................................................................459

    16.4.2.3 Configuration Process.........................................................................................................................................461

    16.5 Examplefor Configuring Composite Services.........................................................................................................465

    16.5.1 Example for Configuring the PWE3+VPLS Composite Service..........................................................................465

    16.5.1.1 Configuration Networking Diagram...................................................................................................................465

    16.5.1.2 Service Planning.................................................................................................................................................466

    16.5.1.3 Configuration Process.........................................................................................................................................470

    16.5.2 Example for Configuring the PWE3+L3VPN Composite Service.......................................................................476

    16.5.2.1 Configuration Networking Diagram...................................................................................................................476

    16.5.2.2 Service Planning.................................................................................................................................................477

    16.5.2.3 Configuration Process.........................................................................................................................................480

    16.5.3 Example for Configuring the VPLS+L3VPN Composite Service........................................................................485

    16.5.3.1 Configuration Networking Diagram...................................................................................................................485

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management Contents

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    ix

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    11/886

    16.5.3.2 Service Planning.................................................................................................................................................486

    16.5.3.3 Configuration Process.........................................................................................................................................490

    16.5.4 Example for Configuring the Inter-AS PWE3-OptionA Composite Service........................................................496

    16.5.4.1 Configuration Networking Diagram...................................................................................................................496

    16.5.4.2 Service Planning.................................................................................................................................................497

    16.5.4.3 Configuration Process.........................................................................................................................................499

    16.5.5 Example for Configuring the Inter-AS VPLS-OptionA Composite Service........................................................502

    16.5.5.1 Configuration Networking Diagram...................................................................................................................502

    16.5.5.2 Service Planning.................................................................................................................................................502

    16.5.5.3 Configuration Process.........................................................................................................................................505

    16.5.6 Example for Configuring the Inter-AS L3VPN-OptionA Composite Service......................................................508

    16.5.6.1 Configuration Networking Diagram...................................................................................................................508

    16.5.6.2 Service Planning.................................................................................................................................................509

    16.5.6.3 Configuration Process.........................................................................................................................................511

    17 Configuration Examples-PTN...............................................................................................515

    17.1 Examples for Configuring Tunnels..........................................................................................................................516

    17.1.1 Example for Configuring a Static CR Tunnel.......................................................................................................516

    17.1.1.1 Networking Diagram..........................................................................................................................................516

    17.1.1.2 Service Planning.................................................................................................................................................517

    17.1.1.3 Configuration Process.........................................................................................................................................519

    17.1.2 Example for Configuring an RSVP TE Tunnel.....................................................................................................527

    17.1.2.1 Networking Diagram..........................................................................................................................................52717.1.2.2 Service Planning.................................................................................................................................................528

    17.1.2.3 Configuration Process.........................................................................................................................................531

    17.1.3 Example for Configuring IP and LDP Tunnels.....................................................................................................539

    17.1.3.1 Networking Diagram..........................................................................................................................................540

    17.1.3.2 Service Planning.................................................................................................................................................540

    17.1.3.3 Configuration Process.........................................................................................................................................542

    17.2 Examples for Configuring a PWE3 Service.............................................................................................................549

    17.2.1 Example for Configuring an End-to-End IP over PW Service..............................................................................549

    17.2.1.1 Example Description........................................................................................................... ...............................549

    17.2.1.2 Configuration Process.........................................................................................................................................552

    17.2.2 Example for Configuring a CES Service...............................................................................................................563

    17.2.2.1 Example Description........................................................................................................... ...............................563

    17.2.2.2 Service Planning.................................................................................................................................................565

    17.2.2.3 Configuration Process.........................................................................................................................................570

    17.2.3 Example for Configuring an ATM Service...........................................................................................................587

    17.2.3.1 Example Description........................................................................................................... ...............................587

    17.2.3.2 Service Planning.................................................................................................................................................588

    17.2.3.3 Configuration Process.........................................................................................................................................591

    17.2.4 Example for Configuring an ETH Service............................................................................................................615

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management Contents

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    x

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    12/886

    17.2.4.1 Example Description..........................................................................................................................................615

    17.2.4.2 Service Planning.................................................................................................................................................616

    17.2.4.3 Configuration Process.........................................................................................................................................618

    17.3 Example for Configuring a VPLS Service...............................................................................................................634

    17.3.1 Example for Configuring the Full-Mesh Networking...........................................................................................634

    17.3.1.1 Networking Diagram..........................................................................................................................................634

    17.3.1.2 Service Planning.................................................................................................................................................634

    17.3.1.3 Configuration Process.........................................................................................................................................635

    17.3.2 Example for Configuring the Hub-Spoke Networking..........................................................................................654

    17.3.2.1 Networking Diagram..........................................................................................................................................654

    17.3.2.2 Service Planning.................................................................................................................................................655

    17.3.2.3 Configuration Process.........................................................................................................................................659

    17.4 Examples for Configuring L3VPN Services............................................................................................................669

    17.4.1 Example for Configuring a Full-Mesh VPN Service............................................................................................669

    17.4.1.1 Network Configuration.......................................................................................................................................669

    17.4.1.2 Service Planning.................................................................................................................................................671

    17.4.1.3 Configuration Process.........................................................................................................................................674

    17.4.2 Example for Configuring a Hub-Spoke VPN Service...........................................................................................698

    17.4.2.1 Network Configuration.......................................................................................................................................698

    17.4.2.2 Service Planning.................................................................................................................................................700

    17.4.2.3 Configuration Process.........................................................................................................................................701

    17.5 Examplefor Configuring Composite Services.........................................................................................................719

    17.5.1 Example for Configuring the PWE3+VPLS Composite Service..........................................................................719

    17.5.1.1 Configuration Networking Diagram...................................................................................................................719

    17.5.1.2 Service Planning.................................................................................................................................................719

    17.5.1.3 Configuration Process.........................................................................................................................................722

    17.5.2 Example for Configuring a PWE3+PWE3 Composite Service.............................................................................726

    17.5.2.1 Configuration Networking Diagram...................................................................................................................726

    17.5.2.2 Service Planning.................................................................................................................................................726

    17.5.2.3 Configuration Process.........................................................................................................................................727

    17.6 Examplefor Configuring Dual-Homing Protection with 1:1 MC-PW APS and MC-LAG....................................729

    17.6.1 Configuration Networking Diagram......................................................................................................................730

    17.6.2 Service Planning....................................................................................................................................................730

    17.6.3 Configuration Process............................................................................................................................................733

    17.7 Configuration Case of VRRP...................................................................................................................................737

    17.7.1 Configuration Networking Diagram......................................................................................................................737

    17.7.2 Configuration Process............................................................................................................................................738

    17.7.3 ServicePlanning....................................................................................................................................................741

    18 Configuration Examples-RTN.............................................................................................. 743

    18.1 Examples for Configuring Tunnels..........................................................................................................................744

    18.1.1 Example for Configuring a Static CR Tunnel.......................................................................................................744

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management Contents

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xi

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    13/886

    18.1.1.1 Networking Diagram..........................................................................................................................................744

    18.1.1.2 Service Planning.................................................................................................................................................744

    18.1.1.3 Configuration Process.........................................................................................................................................746

    18.1.2 Example for Configuring an RSVP TE Tunnel.....................................................................................................754

    18.1.2.1 Networking Diagram..........................................................................................................................................754

    18.1.2.2 Service Planning.................................................................................................................................................755

    18.1.2.3 Configuration Process.........................................................................................................................................757

    18.2 Examples for Configuring a PWE3 Service.............................................................................................................768

    18.2.1 Example for Configuring a CES Service...............................................................................................................769

    18.2.1.1 Networking Diagram..........................................................................................................................................769

    18.2.1.2 Service Planning.................................................................................................................................................769

    18.2.1.3 Configuration Process.........................................................................................................................................773

    18.2.2 Example for Configuring an ATM Service...........................................................................................................788

    18.2.2.1 Networking Diagram..........................................................................................................................................788

    18.2.2.2 Service Planning.................................................................................................................................................789

    18.2.2.3 Configuration Process.........................................................................................................................................792

    18.2.3 Example for Configuring an ETH Service............................................................................................................807

    18.2.3.1 Networking Diagram..........................................................................................................................................807

    18.2.3.2 Service Planning.................................................................................................................................................807

    18.2.3.3 Configuration Process.........................................................................................................................................808

    19 Configuration Examples-Hybrid MSTP.............................................................................818

    19.1 Examples for Configuring Tunnels..........................................................................................................................81919.1.1 Networking Diagram.............................................................................................................................................819

    19.1.2 ServicePlanning....................................................................................................................................................819

    19.1.3 Configuration Process............................................................................................................................................822

    19.2 Examples for Configuring a PWE3 Service.............................................................................................................830

    19.2.1 Networking Diagram.............................................................................................................................................830

    19.2.2 ServicePlanning....................................................................................................................................................831

    19.2.3 Configuration Process............................................................................................................................................833

    19.3 Examplefor Configuring a VPLS Service...............................................................................................................840

    19.3.1 Networking Diagram.............................................................................................................................................84019.3.2 ServicePlanning....................................................................................................................................................841

    19.3.3 Configuration Process............................................................................................................................................845

    20 Configuration Examples-Hybrid MSTP+PTN..................................................................850

    20.1 Examplefor Configuring the SDH+PWE3 Composite Service...............................................................................851

    20.1.1 Networking Configuration.....................................................................................................................................851

    20.1.2 ServicePlanning....................................................................................................................................................852

    20.1.3 Configuration Process............................................................................................................................................855

    21 Configuration Example of the IP over WDM Service Based on Universal Line Boards..........................................................................................................................................................861

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management Contents

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xii

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    14/886

    21.1 Networking Diagram................................................................................................................................................862

    21.2 Service Planning.......................................................................................................................................................862

    21.3 Configuration Process...............................................................................................................................................864

    22 FAQ............................................................................................................................................869

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management Contents

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    xiii

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    15/886

    1IP Service PanoramaThe IP services supported by the U2000 are the tunnel, L3VPN, VPLS, PWE3, aggregation, and

    composite services.

    NOTE

    l NEs supporting different IP services are different. "" indicates that the device supports this service

    on the U2000. "-" indicates that the device does not support this service on the U2000.

    l A function panorama can be accessed by clicking the associated cell in the following function matrix.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 1 IP Service Panorama

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    16/886

    2IP Service Management ProcessThe U2000 supports E2E IP service creation and maintenance. The process of managing IP

    services is described using flowcharts, and the window and document navigation paths for the

    operation tasks are given to help you understand IP service management.

    Routers and Switches

    Figure 2-1shows the process of managing IP services on routers and switches.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    2

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    17/886

    Figure 2-1Process of managing IP services on routers and switches

    Tunnel Deployment

    Automatically

    discover tunnels

    Preparation VPN DeploymentService Monitoring

    and Maintenance

    Create a tunnel

    Create NEs

    Configure MPLS

    Create an L3VPN

    service

    Configure routes

    Create a Layer 2 link

    Configure interfaces Configure APS

    protection

    Configure tunnel

    OAM

    Configure BFD

    Automatically discovercomposite services

    Create a VPLS

    service

    Create a PWE3

    service

    Create a composite

    service

    Configure BFD

    Configure Ethernet

    OAM

    Configure TP OAM

    Configure VRRP

    View the service

    topology

    View performance

    data

    View service alarms

    Diagnose services

    Configure MPLS-TP

    OAM

    Automatically discover

    VPN services

    PTN

    Figure 2-2shows the process of managing IP services on PTN NEs.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    3

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    18/886

    Figure 2-2Process of managing IP services on PTN NEs

    Tunnel Deployment

    Automatically

    discover tunnels

    Preparation VPN DeploymentService Monitoring

    and Maintenance

    Create a tunnel

    Create NEs

    Configure thecontrol plane

    Create a PWE3

    service

    Automatically discover

    VPN services

    Configure LSR IDs

    for the NEs

    Configure network-side

    interfaces

    Configure the MPLS

    protection ring

    Configure APS

    protection

    Configure tunnelOAM Automatically discovercomposite services

    Create an L3VPN

    service

    Create a VPLS

    service

    Create a composite

    service

    Configure Ethernet

    OAM

    Configure MPLS-TP

    OAM

    Configure VRRP

    View the service

    topology

    View performance

    data

    View service alarms

    Diagnose services

    Configure MPLS-TP

    OAM

    Create a Layer 2 link

    Configure BFD

    RTN

    Figure 2-3shows the process of managing IP services on RTN NEs.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    4

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    19/886

    Figure 2-3Process of managing IP services on RTN NEs

    Tunnel Deployment

    Automatically

    discover tunnels

    Preparation VPN DeploymentService Monitoring

    and Maintenance

    Create a tunnel

    Create NEs

    Configure network-side

    interfaces

    Create a VPLS

    service

    Automatically discover

    VPN services

    Create a Layer 2 link

    Configure LSR IDs

    for the NEsConfigure APS

    protection

    Configure tunnel

    OAMAutomatically discover

    composite services

    Create a compositeservice

    Configure Ethernet

    OAM

    Configure MPLS-TP

    OAM

    View the service

    topology

    View performance

    data

    View service alarms

    Diagnose services

    Configure MPLS-TPOAM

    Create a PWE3

    service

    Configure BFD

    Configure BFD

    Configure VRRP

    Hybrid MSTP

    Figure 2-4shows the process of managing IP services on hybrid MSTP NEs.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    5

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    20/886

    Figure 2-4Process of managing IP services on hybrid MSTP NEs

    Tunnel Deployment

    Automatically

    discover tunnels

    Preparation VPN DeploymentService Monitoring

    and Maintenance

    Create a tunnel

    Create NEs

    Create an aggregation

    service

    Automatically discover

    VPN services

    Configure LSR IDs

    for the NEs

    Configure network-side

    interfaces

    Configure APS

    protection

    Configure tunnel

    OAM

    Automatically discovercomposite services

    Create a VPLS

    service

    Create a PWE3

    service

    Create a composite

    service

    Configure Ethernet

    OAM

    Configure MPLS-TP

    OAM

    View the service

    topology

    View performance

    data

    View service alarms

    Diagnose services

    Configure MPLS-TPOAM

    Create a Layer 2 link

    OTN

    Figure 2-5shows the process of managing IP services on OTN NEs.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    6

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    21/886

    Figure 2-5Process of managing IP services on OTN NEs

    Tunnel Deployment

    Automatically

    discover tunnels

    Preparation VPN DeploymentService Monitoring

    and Maintenance

    Create a tunnel

    Create NEs

    Create a PWE3

    service

    Automatically discover

    VPN services

    Configure LSR IDs

    for the NEs

    Configure network-side

    interfacesConfigure APS

    protection

    Configure tunnel

    OAMAutomatically discover

    composite services

    Create a VPLS

    service

    Create a composite

    service

    Configure Ethernet

    OAM

    Configure MPLS-TP

    OAM

    View the service

    topology

    View performance

    data

    View service alarms

    Configure MPLS-TPOAM

    Create an ODU2 path

    Task Description

    Table 2-1lists all the operation tasks involved in the IP service management flowcharts, as well

    as the window and document navigation paths for these tasks.

    Table 2-1Task description of managing IP services

    Scenario

    Task Description Navigation Path ReferenceChapter

    Preparati

    on

    Create NEs. Add the NEs to be

    operated on theU2000.

    Choose File>

    Discovery> NE(traditional style)

    from the main menu

    or select Topo View

    in Application

    Centerand choose

    File> Discovery>

    NE(application

    style) from the main

    menu.

    Topology

    Management >Creating NEs >

    Creating NEs in

    Batches in U2000

    Operation Guide

    for Common

    Features

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    7

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    22/886

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    23/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Configure

    interfaces.

    Configure the IP

    addresses andsubnet masks of

    interfaces.

    The tunnel enabling

    status must be

    configured for

    PTN, MSTP, and

    RTN NEs.

    l Routers, and

    switches: ChooseConfiguration>

    Router/Switch/

    Security

    Configuration>

    Plug-and-Play

    Management

    (traditional style)

    from the main

    menu or select

    Fix-Network NE

    Configurationin

    Application

    Centerand

    choose

    Configuration>

    Router/Switch/

    Security

    Configuration>

    Plug-and-Play

    Management

    (application

    style) from the

    main menu.l PTN, and RTN:

    In the NE

    Explorer, select

    the NE and

    choose

    Configuration>

    Interface

    Management

    from the Function

    Tree.

    l Hybrid MSTP: Inthe NE Explorer,

    select an NE and

    choose

    Configuration>

    Packet

    Configuration>

    Interface

    Management

    from the Function

    Tree.

    l Network

    Deployment inU2000

    Operation

    Guide for

    Router and

    Switch Network

    Management.

    l Configuring

    Interfaces in

    U2000

    Operation

    Guide for PTN

    NE

    Management.

    l Configuring

    Interfaces for

    Packet Radio in

    U2000

    Operation

    Guide for RTN

    NE

    Management.

    lConfiguringInterfaces in

    U2000

    Operation

    Guide for

    Packet MSTP

    NE

    Management.

    l Configuring

    Board

    Parameters >

    ConfiguringEthernet

    Boards in

    Operation

    Guide for LH

    WDM & Metro

    WDM NE

    Management.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    9

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    24/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    l OTN: In the NE

    Explorer, selectthe appropriate

    Ethernet board

    and then select

    Configuration>

    Ethernet

    Interface

    Management>

    Ethernet

    Interfacefrom

    the Function

    Tree.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    10

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    25/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Configure

    MPLS.

    Configure LSR IDs

    for the created NEs.The MPLS

    capabilities and

    remote peers must

    be configured for

    routers and

    switches and their

    interfaces. Peers are

    configured between

    NEs in non-direct

    connection

    scenarios.

    l Routers, and

    switches: ChooseConfiguration>

    Router/Switch/

    Security

    Configuration>

    Plug-and-Play

    Management

    (traditional style)

    from the main

    menu or select

    Fix-Network NE

    Configurationin

    Application

    Centerand

    choose

    Configuration>

    Router/Switch/

    Security

    Configuration>

    Plug-and-Play

    Management

    (application

    style) from the

    main menu.l PTN, RTN,

    Hybrid MSTP,

    and OTN NEs: In

    the NE Explorer,

    select the NE and

    choose

    Configuration>

    Packet

    Configuration>

    MPLS

    Management>Basic

    Configuration

    from the Function

    Tree.

    l Network

    Deployment inU2000

    Operation

    Guide for

    Router and

    Switch Network

    Management.

    l Configuring

    Interfaces >

    Configure the

    network-side

    Layer 3

    interface in

    U2000

    Operation

    Guide for PTN

    NE

    Management.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    11

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    26/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Configure

    routes.

    Configure global

    and interfaceroutes.

    Global and

    interface routes

    must be configured

    for RSVP TE

    tunnels on routers

    and switches.

    PTN NEs:

    l RSVP TE

    Tunnel:

    Configure IGP-ISIS and MPLS-

    RSVP.

    l LDP Tunnel:

    Configure IGP-

    ISIS and MPLS-

    LDP.

    l Routers, and

    switches: ChooseConfiguration>

    Router/Switch/

    Security

    Configuration>

    Plug-and-Play

    Management

    (traditional style)

    from the main

    menu or select

    Fix-Network NE

    Configurationin

    Application

    Centerand

    choose

    Configuration>

    Router/Switch/

    Security

    Configuration>

    Plug-and-Play

    Management

    (application

    style) from the

    main menu.l PTN: In the NE

    Explorer, select

    an NE and choose

    Configuration >

    Control Plane

    Configuration

    from the Function

    Tree.

    l Network

    Deployment inU2000

    Operation

    Guide for

    Router and

    Switch Network

    Management.

    l Configuring the

    Control Plane in

    U2000

    Operation

    Guide for PTN

    NE

    Management.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    12

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    27/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Tunnel

    Deployment

    Automatic

    allydiscover IP

    services.

    After a network is

    built or a service isconfigured on an

    NE using the NE

    Explorer, perform

    automatic IP

    service discovery to

    add the related

    information to the

    IP service

    management

    window and

    manage the

    configured service

    in end-to-end

    mode.

    The following IP

    services support

    this operation:

    tunnel, L3VPN,

    VPLS, PWE3, and

    aggregation

    services.

    Choose Service>

    Search for Service(traditional style)

    from the main menu

    or select Bearer

    Network Service

    Configurationin

    Application Center

    and choose Service>

    Search for Service

    (application style)

    from the main menu.

    Automatically

    Discovering IPServices >

    Automatically

    Discovering Single

    IP Services.

    Create atunnel.

    Tunnels can ensurethe security of

    information

    transmission and

    bear multiple types

    of VPN services

    such as VPLS,

    PWE3, and L3VPN

    services.

    Choose Service>Tunnel> Create

    Tunnel(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    Tunnel> Create

    Tunnel(application

    style) from the main

    menu.

    Deploying aTunnel > Creating

    a Tunnel.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    13

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    28/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Creating

    TunnelProtection

    Based on

    MPLS

    Rings.

    An MPLS

    protection ring islocated at the server

    layer but a tunnel is

    located at the

    service layer.

    Compared with

    traditional linear

    protection

    solutions, this

    technology can

    prevent multi-link

    failures. If an

    intersecting node is

    configured, this

    technology can also

    prevent node

    failures. In

    addition, this

    technology can be

    used together with

    linear protection

    solutions to

    improve protection

    reliability.

    Choose Service> IP

    Protection Subnet>Create MPLS

    Protection Ring

    (traditional style)

    from the main menu

    or select Bearer

    Network Service

    Configurationin

    Application Center

    and choose

    Protection Subnet>

    IP Protection

    Subnet> Create

    MPLS Protection

    Ring(application

    style) from the main

    menu.

    Deploying a

    Tunnel > CreatingTunnel Protection

    > Creating an

    MPLS Protection

    Ring.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    14

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    29/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Creating

    TunnelProtection

    Based on

    APS.

    This topic describes

    how to create atunnel protection

    group. If a tunnel

    protection group is

    created, the

    services carried

    over the active

    tunnel are switched

    over to the

    protection tunnel

    when the working

    tunnel is faulty.

    Choose Service>

    Tunnel> Search forProtection Group

    (traditional style)

    from the main menu

    or select Bearer

    Network Service

    Configurationin

    Application Center

    and choose Service>

    Tunnel> Search for

    Protection Group

    (application style)

    from the main menu.

    or Choose Service>

    Tunnel> Create

    Protection Group

    (traditional style)

    from the main menu

    or select Bearer

    Network Service

    Configurationin

    Application Center

    and choose Service>

    Tunnel> CreateProtection Group

    (application style)

    from the main menu.

    Deploying a

    Tunnel > CreatingTunnel Protection

    > Creating a

    Tunnel Protection

    Group.

    Configure

    BFD.

    A tunnel supports

    BFD for TE and

    BFD for LSP. The

    U2000 supports

    millisecond fault

    detection on

    tunnels.

    Choose Service>

    Tunnel> Manage

    Tunnel(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    ConfigurationinApplication Center

    and choose Service>

    Tunnel> Manage

    Tunnel(application

    style) from the main

    menu. Right-click

    the desired tunnel

    and choose

    Configure BFD

    from the shortcut

    menu.

    Deploying

    Network

    Reliability >

    Configuring BFD.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    15

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    30/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    VPN

    servicedeploym

    ent

    Create an

    L3VPNservice.

    In comparison with

    L2VPN, on anL3VPN, packets

    are forwarded at the

    network layer.

    Choose Service>

    L3VPN Service>Create L3VPN

    Service(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    L3VPN Service>

    Create L3VPN

    Service(application

    style) from the main

    menu.

    Deploying L3VPN

    Services > Creatingan L3VPN Service.

    Create a

    VPLS

    service.

    VPLS is a Layer 2

    VPN technology

    over the MPLS or

    Ethernet network. It

    is mainly used to

    join multiple

    Ethernet LAN

    segments through

    the PSN and make

    them operate as a

    LAN.

    Choose Service>

    VPLS Service>

    Create VPLS

    Service(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    VPLS Service>

    Create VPLS

    Service(application

    style) from the main

    menu.

    Deploying VPLS

    Services > Creating

    a VPLS Service.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    16

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    31/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Create a

    PWE3service.

    PWE3 is a point-to-

    point Layer 2 VPNtechnology which is

    used to simulate the

    basic behaviors and

    characteristics of

    services, such as

    ATM, FR,

    Ethernet, TDM

    circuit, SONET,

    and SDH on a PSN.

    Choose Service>

    PWE3 Service>Create PWE3

    Service(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    PWE3 Service>

    Create PWE3

    Service(application

    style) from the main

    menu.

    Deploying PWE3

    Services > CreatingPWE3 Service.

    Create an

    aggregatio

    n service.

    By using the

    U2000, you can

    create an E-AGGR

    service in the same

    user interface. The

    equipment supports

    multipoint-to-point

    service

    aggregation, as well

    as service

    aggregation from

    the NNI carried by

    multiple PWs to

    one UNI.

    Choose Service> E-

    AGGR Service>

    Create E-AGGR

    Service(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    E-AGGR Service>

    Create E-AGGR

    Service(application

    style) from the main

    menu.

    Deploying E-

    AGGR Services >

    Create E-AGGR

    Service.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    17

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    32/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Automatic

    allydiscover

    composite

    services.

    The U2000 can

    automaticallydiscover services

    that meet specific

    requirements,

    combine these

    services into

    composite services,

    and display the

    composite services

    on the Composite

    Service

    Management tab

    page. You can

    perform this

    operation when a

    network is being

    built or after IP

    services have been

    configured.

    Choose Service>

    Composite Service> Search for

    Composite Service

    (traditional style)

    from the main menu

    or select Bearer

    Network Service

    Configurationin

    Application Center

    and choose Service>

    Composite Service

    > Search for

    Composite Service

    (application style)

    from the main menu.

    Automatically

    Discovering IPServices >

    Automatically

    Discovering

    Composite

    Services.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    18

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    33/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Create a

    compositeservice.

    A composite

    service is acollection of

    multiple services,

    for example, VPLS

    +L3VPN.

    In a composite

    service, the

    function of

    different services,

    such as PWE3,

    VPLS, L3VPN,

    Unterminated EPL,

    E-Line, SDH,

    Terminated EPL,

    and E-AGGR

    services, can be

    flexible aggregated

    to address the issues

    in single-service

    scenarios. In

    addition, composite

    services support

    service

    visualization andE2E management,

    helping carriers

    better adapt to

    solutions, such as

    IPRAN and IP Core

    solutions.

    Choose Service>

    Composite Service> Create Composite

    Service(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    Composite Service

    > Create Composite

    Service(application

    style) from the main

    menu.

    Deploying

    CompositeServices > Creating

    a Composite

    Service.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    19

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    34/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Configure

    BFD.

    Bidirectional

    ForwardingDetection for BFD

    is a universal

    mechanism used to

    detect

    communication

    faults between

    forwarding

    engines. To be

    specific, BFD

    detects the

    connectivity of a

    data protocol on the

    same path between

    two systems. The

    path can be a

    physical link, a

    logical link, or a

    tunnel. BFD can be

    regarded as a

    service provided by

    the system. The

    upper-layer

    applicationsprovide BFD

    parameters such as

    detection address

    and detection time.

    BFD creates,

    deletes, or modifies

    BFD sessions based

    on these

    information and

    informs the upper-

    layer applications

    of the session

    status. The upper-

    layer applications

    then determine

    whether to take

    actions as the BFD

    session status

    changes.

    Choose Service>

    L3VPN Service>Manage L3VPN

    Service(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    L3VPN Service>

    Manage L3VPN

    Service(application

    style) from the main

    menu. Right-click

    the desired L3VPN

    service and choose

    Configure BFD

    from the shortcut

    menu.

    The method for

    configuring BFD for

    other IP services is

    the same as that forthe L3VPN service.

    Deploying

    NetworkReliability >

    Configuring BFD.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    20

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    35/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Configure

    EthernetOAM.

    Ethernet OAM

    improves Ethernetmanagement and

    maintenance

    capabilities and

    guarantees network

    stability. This

    feature mainly

    applies to the

    Ethernet to

    implement link-

    level Ethernet

    OAM between CE

    to PE, and enhance

    network reliability.

    Choose Service>

    Service EthernetOAM(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    Service Ethernet

    OAM(application

    style) from the main

    menu.

    Deploying

    NetworkReliability >

    Configuring

    Ethernet OAM.

    Configure

    TP OAM.

    The TP OAM

    function supports

    continuity check for

    tunnel and PWE3

    services, achieving

    rapid service fault

    location and

    isolation.

    Choose Service>

    PWE3 Service>

    Manage PWE3

    Service(traditional

    style) from the main

    menu or select

    Bearer Network

    Service

    Configurationin

    Application Center

    and choose Service>

    PWE3 Service>

    Manage PWE3

    Service(application

    style) from the main

    menu. Right-click

    the desired PWE3

    service and choose

    PW OAMfrom the

    shortcut menu.

    The method for

    configuring TP

    OAM for a tunnel is

    the same as that for

    the PWE3 service.

    Deploying

    Network

    Reliability >

    Configuring

    MPLS-TP OAM.

    iManager U2000 Unified Network Management System

    Operation Guide for IP Service Management 2 IP Service Management Process

    Issue 03 (2014-05-15) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    21

  • 8/11/2019 IManager U2000 Operation Guide for IP Service Management(V100R009)

    36/886

    Scenario

    Task Description Navigation Path ReferenceChapter

    Configure

    VRRP.

    Virtual Router

    RedundancyProtocol for VRRP

    is a fault-tolerant

    protocol. By

    combining a group

    of routers on a LAN

    into a virtual router,

    VRRP can switch

    the services to other

    routers through

    certain mechanisms

    when the next hop

    router fails. This

    ensures continuity

    and reliability in

    communication.

    Compared with

    other methods,

    VRRP is