8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
1/57
Quidway S5300 Series Ethernet Switches
V100R005C01
Feature Description - Device
Management
Issue 02
Date 2010-12-01
HUAWEI TECHNOLOGIES CO., LTD.
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
2/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
3/57
Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China
Website: http://www.huawei.com
Email: [email protected]
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
i
http://www.huawei.com/8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
4/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
5/57
About This Document
Intended Audience
This document describes the device management feature in terms of its overview, principle, and
applications.
This document together with other types of document helps intended readers get a deep
understanding of the device management feature.
This document is intended for:
l Network planning engineers
l Commissioning engineers
l Data configuration engineers
l System maintenance engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
DANGER
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injury.
WARNINGIndicates a hazard with a medium or low level of risk, whichif not avoided, could result in minor or moderate injury.
CAUTION
Indicates a potentially hazardous situation, which if not
avoided, could result in equipment damage, data loss,
performance degradation, or unexpected results.
TIP Indicates a tip that may help you solve a problem or save
time.
NOTE Provides additional information to emphasize or supplement
important points of the main text.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management About This Document
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
iii
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
6/57
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[ ] Items (keywords or arguments) in brackets [ ] are optional.
{ x | y | ... } Optional items are grouped in braces and separated by
vertical bars. One item is selected.
[ x | y | ... ] Optional items are grouped in brackets and separated by
vertical bars. One item is selected or no item is selected.
{ x | y | ... }* Optional items are grouped in braces and separated byvertical bars. A minimum of one item or a maximum of all
items can be selected.
& The parameter before the & sign can be repeated 1 to n times.
# A line starting with the # sign is comments.
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Changes in Issue 02 (2010-12-01)
Based on issue 01 (2010-08-15), the document is updated as follows:
Minor mistakes are modified.
Changes in Issue 01 (2010-08-15)
Initial commercial release.
About This Document
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
iv Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
7/57
Contents
About This Document...................................................................................................................iii
1 Mirroring......................................................................................................................................1-1
1.1 Introduction to Mirroring................................................................................................................................1-2
1.2 References.......................................................................................................................................................1-21.3 Principles.........................................................................................................................................................1-2
1.3.1 1:1 or N:1 Mirroring...............................................................................................................................1-3
1.3.2 Port Mirroring for Inbound or Outbound Packets..................................................................................1-4
1.3.3 VLAN Mirroring for Inbound Packets...................................................................................... .............1-4
1.3.4 MAC-Address-based Mirroring.............................................................................................................1-5
1.3.5 Flow-based Mirroring............................................................................................................................1-5
1.3.6 RSPAN...................................................................................................................................................1-5
1.4 Terms and Abbreviations.................................................................................................... ............................1-6
2 Information Center....................................................................................................................2-12.1 Introduction to the Information Center...........................................................................................................2-2
2.2 Reference.........................................................................................................................................................2-3
2.3 Pinciples..........................................................................................................................................................2-3
2.3.1 Information Classification.................................................................................................... ..................2-3
2.3.2 Information Hierarchy........................................................................................................ ....................2-7
2.3.3 Information Output........................................................................................ .........................................2-9
2.3.4 Information Shield................................................................................................................................2-10
2.4 Terms and Abbreviations................................................................................................ ..............................2-11
3 PoE.................................................................................................................................................3-13.1 Introduction to PoE.........................................................................................................................................3-2
3.2 References.......................................................................................................................................................3-2
3.3 Principle..........................................................................................................................................................3-3
3.4 Terms and Abbreviations................................................................................................................................3-9
4 NAP...............................................................................................................................................4-1
4.1 Introduction to NAP........................................................................................................................................4-2
4.2 References.......................................................................................................................................................4-2
4.3 Principles.........................................................................................................................................................4-2
4.4 Terms and Abbreviations................................................................................................................................4-7
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management Contents
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
v
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
8/57
5 Stacking........................................................................................................................................5-1
5.1 Stacking Overview..........................................................................................................................................5-2
5.2 References.......................................................................................................................................................5-2
5.3 Principles.........................................................................................................................................................5-2
5.4 Application......................................................................................................................................................5-8
5.5 Terms and Abbreviations................................................................................................................................5-9
Contents
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
vi Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
9/57
Figures
Figure 1-1Schematic diagram of 1:1 mirroring...................................................................................................1-3
Figure 1-2Schematic diagram of N:1 mirroring..................................................................................................1-4
Figure 1-3Schematic diagram of port mirroring.................................................................................................1-4
Figure 2-1Output format of logs.........................................................................................................................2-4
Figure 2-2Output format of traps........................................................................................................................2-5
Figure 2-3Diagram of outputting debugging information...................................................................................2-7
Figure 2-4Diagram of information filtration.....................................................................................................2-11
Figure 3-1Power supply in Alternative A mode on the 10BaseT and 100Base-TX Ethernet.............................3-4
Figure 3-2Power supply in Alternative A mode on the 1000Base-T Ethernet....................................................3-4
Figure 3-3Power supply in Alternative B mode on the 10BaseT and 100Base-TX Ethernet.............................3-5
Figure 3-4Power supply in Alternative B mode on the 1000Base-T Ethernet....................................................3-5
Figure 3-5TLV packet header.............................................................................................................................3-6
Figure 3-6TLV information field........................................................................................................................3-7
Figure 4-1Establishing a NAP connection..........................................................................................................4-3Figure 4-2Format of the NAP packet..................................................................................................................4-4
Figure 4-3NAP negotiation process....................................................................................................................4-5
Figure 5-1Setting up a stack................................................................................................................................5-3
Figure 5-2Adding a member switch to a stack....................................................................................................5-4
Figure 5-3Removing a slave switch from a stack...............................................................................................5-5
Figure 5-4Combining two stacks........................................................................................................................5-6
Figure 5-5Dividing a stack 1...............................................................................................................................5-7
Figure 5-6Dividing a stack 2...............................................................................................................................5-8
Figure 5-7Increasing ports...................................................................................................................................5-8
Figure 5-8Increasing bandwidth..........................................................................................................................5-9
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management Figures
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
vii
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
10/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
11/57
Tables
Table 2-1Feature list of the information center...................................................................................................2-2
Table 2-2Description of each field in a log.........................................................................................................2-4
Table 2-3Description of each field in a trap........................................................................................................2-6
Table 2-4Description of the severity levels of information.................................................................................2-8
Table 2-5Relationship between information channels and output directions......................................................2-9
Table 3-1References............................................................................................................................................3-3
Table 4-1Description of fields that indicate the types of NAP packets...............................................................4-4
Table 4-2Mappings between data types and user data in the variable-size TLV data area of the NAP packet
...............................................................................................................................................................................4-4
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management Tables
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
ix
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
12/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
13/57
1MirroringAbout This Chapter
1.1 Introduction to Mirroring
1.2 References
1.3 Principles
1.4 Terms and Abbreviations
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 1 Mirroring
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-1
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
14/57
1.1 Introduction to Mirroring
Definition
Mirroring is a function of copying packets to an observing interface and then monitoring the
packets.
Purpose
Mirroring is used to monitor packets that meet certain requirements.According to the
configurations of users, mirroring is classified into the following types:
l 1:1 port mirroring and N:1 port mirroring
1:1 port mirroring is used to observe packets on an interface.
N:1 port mirroring is used to observe packets on multiple interfaces.
l Port mirroring for inbound or outbound packets
It is used to observe packets received or sent by a specific interface.
l VLAN mirroring for inbound packets
It is used to observe packets received by the switch from a specific VLAN.
l MAC-address-based mirroring
It is used to observe packets with a specific MAC address from a specific VLAN. This
MAC address can be a source MAC address or a destination MAC address.
l Flow mirroring
It is used to mirror packets according to the configurations of users. For example, packetsthat match the traffic policy based on the 802.1p priority are mirrored.
l RSPAN
It is used to observe packets on an interface or a VLAN of a remote switch.
The S5300SI does not support remote mirroring based on flows, VLANs, and MAC addresses.
1.2 References
None.
1.3 Principles
In the process of mirroring, a packet is copied to an observing interface on the condition that the
packet is processed normally.
1.3.1 1:1 or N:1 Mirroring
1.3.2 Port Mirroring for Inbound or Outbound Packets
1.3.3 VLAN Mirroring for Inbound Packets
1.3.4 MAC-Address-based Mirroring
1.3.5 Flow-based Mirroring
1 Mirroring
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
1-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
15/57
1.3.6 RSPAN
1.3.1 1:1 or N:1 Mirroring
l 1:1 mirroring is used for mirroring packets passing through a specific interface to anobserving interface.
As shown in Figure 1-1, packets on mirroring interface B are copied to observing interface C.
Mirror indicates a mirroring interface; Monitor indicates an observing interface; Forward
indicates the path for forwarding packets normally; Mirroring indicates that packets are copied
to the observing interface.
Figure 1-1Schematic diagram of 1:1 mirroring
Mirror
B
A
C
Packets
Forward
Mirroring
Monitor
Mirrored packets
l N:1 mirroring is used for mirroring packets passing through several interfaces to an
observing interface.
As shown in Figure 1-2, packets received on mirroring interfaces B and D are copied to
observing interface C. Mirror indicates a mirroring interface; Monitor indicates an observing
interface; Forward indicates the path for forwarding packets normally; Mirroring indicates that
packets are copied to the observing interface.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 1 Mirroring
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-3
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
16/57
Figure 1-2Schematic diagram of N:1 mirroring
Mirror
B
A
C
Packets
Forward
Mirroring
Monitor
Mirrored packets
MirroringMirror
D
Packets
1.3.2 Port Mirroring for Inbound or Outbound Packets
Figure 1-3shows port mirroring for inbound and outbound packets.
l Port mirroring for inbound packets is used to copy packets that are received on a port to an
observing port.
l Port mirroring for outbound packets is used to copy packets that are sent out by a port to
an observing port.
Figure 1-3Schematic diagram of port mirroring
Observinginterface
Switch
Monitoring host
Interface
Flows of packets
Mirroring interface
Mirroing interface
Copied flows of packets
1.3.3 VLAN Mirroring for Inbound Packets
The S-switch does not support VLAN mirroring for outbound packets.
1 Mirroring
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
1-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
17/57
VLAN mirroring for inbound packets is used to copy inbound packets on all active interfaces
in a specified VLAN to an observing interface.
The VLAN ID is specified by a command.
1.3.4 MAC-Address-based Mirroring
MAC-address-based mirroring is used for mirroring packets with a specific MAC address to an
observing interface. MAC-address-based mirroring is configured in the VLAN view. Therefore,
when a packet arrives, check whether the VLAN where the packet is sent is consistent with the
VLAN where MAC-address-based mirroring is configured first.
MAC-address-based mirroring is used to mirror only incoming packets.
1.3.5 Flow-based Mirroring
Flow-based mirroring is used for mirroring packets to an observing interface according to thepolicy configured by a user.
Flow-based mirroring is used to mirror only incoming packets.
1.3.6 RSPAN
RSPAN is used for mirroring packets from the source switch to the remote switch.
It is implemented by adding an RSPAN VLAN tag to a mirroring packet on the outbound
interface of the source switch. The packet is then transparently transmitted by the intermediate
switches to the remote switch. After the packet arrives at the remote switch, the remote switch
removes the RSPAN VLAN tag from the packet. Packets contain the RSPAN VLAN tag whenbeing transparently transmitted on Layer 2 networks. Therefore, RSPAN VLAN tags and service
VLAN tags need to be distinguished during VLAN planning.
RSPAN is classified into the following types:
l RSPAN based on an inbound or outbound interface
RSPAN based on an inbound or outbound interface is used for mirroring packets received
or sent by a specific interface of the source switch to the remote switch.
l Inbound VLAN-based RSPAN
RSPAN based on an inbound VLAN is used for mirroring packets received by the source
switch from a specific VLAN to the remote switch.l MAC-address-based RSPAN
MAC-address-based RSPAN is used for mirroring packets with a specific MAC address
that are received on the source switch to the remote switch. Like local Switched Port
Analyzer (SPAN), RSPAN needs to first match the VLAN ID on the source switch. That
is, the MAC address belongs to a specific VLAN where the source switch is located.
l Flow-based RSPAN
Flow-based RSPAN is used for mirroring packets that match a specific policy and are
received on the source switch to the remote switch. Flow-based RSPAN is flexible, which
mirrors flows according to certain fields of flows. Flow-based RSPAN is configured on
interfaces. Flow-based RSPAN is implemented with the action of a traffic policy.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 1 Mirroring
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
1-5
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
18/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
19/57
2Information CenterAbout This Chapter
2.1 Introduction to the Information Center
2.2 Reference
2.3 Pinciples
2.4 Terms and Abbreviations
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 2 Information Center
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-1
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
20/57
2.1 Introduction to the Information Center
Definition
The information center, which is indispensable to a device, functions as the information hub of
the device. The information center manages most output information. Output information is
refinedly classified and then effectively filtered. Cooperated with the debugging program (the
debuggingcommand), RMON module and SNMP module, the information center provides
powerful supports for the network administrator to monitor the operation of devices and locate
faults.
The working principle of the information center is as follows:
Generally speaking, the information center distributes three types of information with eight
severity levels to ten information channels and then outputs information in different directions.Details are as follows:
1. Receives logs, traps, and debugging information of different severity levels that are output
by each module.
NOTE
The logs, traps, and debugging information of each module are saved in the corresponding log, trap,
and debugging queues in the information center. Each queue can hold 30 k messages.
2. Distributes information of different types and with different severity levels to different
information channels according to user settings.
3. Outputs information in different directions based on the association between the
information channel and the output direction.
The following table lists main features of the information center.
Table 2-1Feature list of the information center
Feature Description
Information
type
Information is classified into log, trap, and debugging information.
Information
severity
Eight severity levels are defined for information. The more important the
information is, the smaller the severity value is.
Information
output
The information center can output information to the console, VTY/TTY
terminal, log host, SNMP agent, log buffer and trap buffer.
Information
shield
You can shield the output information of a severity level or a module through
commands.
Purpose
The information center outputs information in a unified format to different directions, thusimproving readability, maintainability, and flexibility of logs.
2 Information Center
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
2-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
21/57
1. Controls where information is output. Currently, information can be output to the console,
VTY/TTY terminal, log host, SNMP agent, log buffer and trap buffer.
2. Filters information. Currently, information can be filtered based on the source, severity
level, type, and output direction.
3. Provides a system-level information output platform.
4. Displays the system-level debugging information.
2.2 Reference
The following table lists the reference of this feature:
Document Description
RFC 3164 The BSD syslog
2.3 Pinciples
2.3.1 Information Classification
2.3.2 Information Hierarchy
2.3.3 Information Output
2.3.4 Information Shield
2.3.1 Information Classification
To meet different requirements of clarified information in different directions, the information
center classifies information into three types: logs, traps, and debugging information.
Logs are used to record user operations and diagnosis information. Diagnosis logs are used by
R&D personnel for fault location; users can view user logs only.
Traps are used to record faults. After receiving traps, the information center sends them to the
SNMP agent. Then, the SNMP agent sends the traps to the NMS.
Debugging information is used to trace the running status of a device.
Log Information
l Log overview
Defined by the ITU-T, logs refer to records about events and abnormal activities of the
managed object. It is generally accepted that the log module is capable of tracing activities
of users, managing security affairs of the system, providing basis for diagnosis and
maintenance. Therefore, log recording is an important method for operation maintenance
and fault location.
l Implementation of logs on S5300 devices
By default, the information center is enabled and it can output logs to the console, log bufferand SNMP agent.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 2 Information Center
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-3
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
22/57
After a log host is configured, logs can be sent to it. Currently, up to eight log hosts can be
configured for a S5300 device. In this manner, logs can be sent to different log hosts
simultaneously for backup.
By default, the device can send logs to the console and log buffer. The number of logs
stored in the log buffer or the log buffer can be configured from 1 to 1024. The defaultvalue is 512. If the number of logs in the log buffer reaches the upper limit, new logs will
replace the existing logs in a time order until all the new logs are stored. That is, the log
put into the log buffer earliest is replaced first.
l Output format of logs
Syslog is a sub-function of the information center. Syslog uses UDP as the transmission
protocol and outputs logs to log hosts through port 514.
Figure 2-1shows the log format.
Figure 2-1Output format of logs
TIMESTAMP HOSTNAME %%ddAAA/B/CCC(l): -Slot=k-XXX; YYYY
Table 2-2describes each field in a log.
Table 2-2Description of each field in a log
Field Meaning Description
Leading character Before logs are output to log hosts, leading
characters are added to logs. Logs saved in the local
device do not contain leading characters.
TIMESTAMP Time to send logs Five timestamp formats are available:
l boot: indicates relative time.
l date: indicates system time. By default,
debugging information, logs and traps adopt
this timestamp format.
l short-date: indicates system time. The short-
date format does not contain year information.
l format-date: indicates another format of system
time.
l none: indicates that no timestamp is contained
in logs.
The timestamp and the host name are separated by
a blank space.
HOSTNAME System name of the
local device
By default, the system name is Quidway.
The host name and the module name are separated
by a blank space.
%% Huawei identifier Indicates that the log is output by a Huawei
product.
dd Version number Identifies the version of the log format.
2 Information Center
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
2-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
23/57
Field Meaning Description
AAA Module name Indicates the name of the module that outputs
information to the information center.
B Log level Indicates the severity level of logs.
CCC Description Further describes the information type.
(L) Information type l l: log information
l T: trap information
l d: debugging information
-Slot=k-XXX Location information Slot: indicates the number of the slot that sends
location information. Location information begins
and ends with a blank space. Some modules
generate logs without location information.
YYYY Descriptor Indicates detailed log information output from
each module to the information center. Every time
a log is output, the module fills this field with
detailed information.
Trap Information
l Trap overview
Traps are notifications generated when the system detects faults. Information about the
faults are carried in traps. Different from logs, traps are time sensitive and need to be notified
to administrators in time. Therefore, the information center processes traps sent to the NMS
in a different method.
Traps are sent from a device to an NMS device. With SNMP agent enabled on a device,
the trap function enabled on the related module, and the NMS host to which traps are sent
configured, when an event happens (for example, the network interface becomes Down),
the deivce generates a trap and sends it to the specified destination address. If the device
and the NMS are routable, the NMS can receive the trap.
In addition, the device has a trap buffer for storing traps. If the information source is
configured for the buffer on the information center, the buffer can store traps generated by
the local device regardless whether the destination NMS host is configured.
l Concepts about traps
Event: indicates anything that takes place on the managed object. For example, the
managed object is added, deleted, or modified.
Fault: indicates that the system does not work normally. A fault may cause the system
to be disabled in operation or redundancy.
Trap: indicates the notification generated when the system detects a fault.
l Output format of traps
Figure 2-2Output format of traps
Severity Brief:DescriptionTimeStamp HostName ModuleName
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 2 Information Center
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-5
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
24/57
Table 2-3describes each field in a trap.
Table 2-3Description of each field in a trap
Field Meaning Description
TimStamp Time to send traps Five timestamp formats are available:
l boot: indicates relative time. By default,
debugging information adopts this timestamp
format.
l date: indicates the timestamp in the format of
system time. By default, logs and traps adopt
this timestamp format.
l short-date: indicates system time. The short-
date format does not contain year information.
l format-date: indicates another format of system
time.
l none: indicates that no timestamp is contained
in traps.
The timestamp and the host name are separated by
a blank space.
HostName System name of the
local device
By default, the system name is Quidway.
The host name and the module name are separated
by a blank space.
ModuleName Module name Indicates the name of the module that generates
traps.
Serverity Severity Indicates the severity level of traps.
l Critical
l Major
l Minor
l Warning
l indeterminate
Brief Description Indicates brief description of traps.
Description Description Indicates detailed description of traps.
Debugging Information
Debugging information is the output of the tracing information about the running status of a
device. Devices can generate debugging information only after the debugging of the module to
be debugged is enabled in the user view. Debugging information shows the contents of packets
sent or received by the debugged module. Note that enabling debugging only generatesdebugging information. Displaying debugging information requires more configurations.
2 Information Center
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
2-6 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
25/57
Different from logs and traps, no buffer is available for debugging information. Debugging
information can be output to the console or be sent to log hosts through certain configurations.
You can connect the PC to the console port of a device (the console mode) or to a network
interface of a device through Telnet (the terminal mode). When debugging the device through
the console or the terminal, you can control the contents of the output debugging information.
Abundant debugging commands are provided for debugging protocols and functions that a
device supports. You can enable the debugging of a protocol or a function to diagnose and locate
the fault.
The output of debugging information depends on the following situations:
l Whether debugging information about a protocol is output
l Whether terminal display is enabled, that is, whether to display the debugging information
on the screen
Figure 2-3shows the relationship between the preceding two situations. After the debugging of
protocol 1 and 3 is enabled, corresponding debugging information is output. As screen displayis also enabled, the debugging information is displayed. No debugging information about
protocol 2 is output because the debugging of protocol 2 is not enabled.
Figure 2-3Diagram of outputting debugging information
1 2 3
1 3 1 3
1 3
Debug
information
Protocol debug
switchON OFF
ON
ON
OFF
Termina display
switch
2.3.2 Information Hierarchy
Overview
In the case of much information, users can hardly differentiate between information about normal
operation and information about faults. Therefore, information hierarchy is designed to help
users roughly determine whether to take action immediately or shield the information that doesnot require an action.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 2 Information Center
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-7
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
26/57
Severity Levels of Information
Information is categorized into eight severity levels. The severer the information is, the lower
the severity level threshold is. Details are shown in Table 2-4.
Table 2-4Description of the severity levels of information
Value SeverityLevel
Description
0 Emergency A fatal fault occurs in the device, which causes the system to fail
to run normally unless the device is restarted. For example, the
device is restarted because of the abnormal operation of a
program or because of a detected fault about memory usage.
1 Alert A grave fault occurs in the device, which requires actions to be
taken immediately. For example, memory usage of the system
reaches the upper limit.
2 Critical A grave fault occurs in the device, which requires actions to be
taken to analyze or process it. For example, the memory usage
is lower than the lower limit; the temperature is lower than the
lower limit; Bidirectional Forwarding Detection (BFD) detects
that the device is unreachable; error messages generated by the
device itself are detected.
3 Error A fault about improper operation or abnormal process occurs in
the device, which does not affect subsequent services but
requires attention and cause analysis. For example, users enter
incorrect instructions or passwords; error protocol packets
received by other devices are detected.
4 Warning An abnormality that may result in a fault occurs in the device,
which requires full attention. For example, the routing process
is disabled; packet loss is detected through BFD; error protocol
packets are detected.
5 Notice A key operation is performed to keep the device running
normally. For example, the shutdowncommand is run on an
interface; a neighbor is discovered; the state of the protocol state
machine normally changes.
6 informational A normal operation is performed. For example, the displaycommand is run.
7 Debugging A normal operation is performed, which requires no attention.
The severity level of output information is configurable. If information is filtered according to
the configured severity level, only information with a severity level lower than or equal to the
configured severity level threshold is output. That is, only information with the configured
severity level and more serious information are output.
For example, if the severity level threshold is set to 6, only the information whose severity levelranges from 0 to 6 is output.
2 Information Center
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
2-8 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
27/57
2.3.3 Information Output
The information center needs to output information to the terminal, console, log buffer and
SNMP agent. To output information in different directions, ten information channels are defined
for the information center and the channels work independently from each other.
Information Output Channel
The ten channels are equal and same. Before using information channels, you need to specify
information sources for channels. The defaults information sources for the fist six channels
(console, monitor, log host, trap buffer, log buffer, and SNMP agent).
Besides the default channels, you can customize information sources for the rest four channels
(Channel 6, Channel 7, Channel 8, and Channel 9) by configuring their channel name or by
running the configuration commands.
Information Output Direction
The information center supports ten channels, among which Channel 0 to Channel 5 have their
default channel names. By default, the six information channels are respectively related to six
output directions, as shown in Table 2-5.
Table 2-5Relationship between information channels and output directions
ChannelNumb
er
DefaultChannelName
OutputDirection
Description
0 console Console Outputs information to the local console that can
receive logs, traps, and debugging information.
1 monitor Monitor Outputs information to the virtual type terminal
(VTY) that can receive logs, traps, and debugging
information. This is helpful for remote maintenance.
2 loghost Log host Outputs information to the log host that can receive
logs, traps, and debugging information. The
information is saved to the log host in the file format
for the convenience of reference.
3 trapbuffer Trap
buffer
Outputs information to the trap buffer that can receive
traps. An area is specified inside a device as the trap
buffer to record traps.
4 logbuffer Log buffer Outputs information to the log buffer that can receive
logs. An area is specified inside a device as the log
buffer to record logs.
5 snmpagent SNMP
agent
Outputs information to the SNMP agent that can
receive traps.
6 unspecified Unspecifie
d
Reserved.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 2 Information Center
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-9
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
28/57
ChannelNumber
DefaultChannelName
OutputDirection
Description
7 unspecified Unspecifie
d
Reserved.
8 unspecified Unspecifie
d
Reserved.
9 unspecified Unspecifie
d
Reserved.
Owning to associating each information channel with an output direction, information can be
output to a specific direction through the associated channel.
You can change channel names or relationships between channels and output directions as
required.
Information Output
Terminals that are connected to the device dynamically change. The information center needs
to know the change in time so that it determines whether to output information to terminals and
in which format information is output. Once an EXEC user enters or quits or its attribute changes,
the change is notified to the information center through the EXEC module so that information
can be correctly output.
2.3.4 Information Shield
To control information output flexibly, the information center provides the information shield
function. Through commands, the information center can determine whether a specific type of
information is output, information with which severity level is output, and information from
which module is output.
Information Shield Table
The information center filters information by using a shield table.
With the shield table, information that is output to multiple directions is filtered and then output
according to information types, severity levels, and sources. Multiple information shield table
can be set up in the information center. Each information shield table can correspond to one or
several output directions. Shielded information can be unshielded through modification as
required.
The contents of an information shield table are as follows:
l Number of the module that generates the information
l Whether logs can be output
l Logs at which severity levels can be output
l Whether traps can be output
2 Information Center
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
2-10 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
29/57
l Traps with which severity levels can be output
l Whether debugging information can be output
l Debugging information with which severity levels can be output
As shown in Figure 2-4, by default, logs, traps, and debugging information are output throughdefault channels. You can specify a channel through which information is output. For example,
you can configure logs to be output to the log buffer through Channel 6. In this manner, logs are
output through the configured Channel 6 rather than the default Channel 4.
Figure 2-4Diagram of information filtration
Infomation type Infomation channel
Console
Remote
terminal
Loghost
Trap buffer
Log buffer
SNMP agent
Logs
Traps
Debugs
Output direction
Direction of logs
Direction of alarms
Direction of debugging
information
Console
SNMP agent
Monitor
Loghost
Logbuffer
Trapbuffer
0
1
2
3
4
5
channel6
channel7
channel8
channel9
6
7
8
9
2.4 Terms and Abbreviations
TermsTerm Description
Log Log information
Event Anything that takes place on the managed object. For example, the
managed object is added, deleted, or modified.
Trap Trap information
Debug Debugging information
SNMP Simple Network Management Protocol
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 2 Information Center
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
2-11
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
30/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
31/57
3PoEAbout This Chapter
3.1 Introduction to PoE
3.2 References
3.3 Principle
3.4 Terms and Abbreviations
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 3 PoE
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3-1
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
32/57
3.1 Introduction to PoE
Power over Ethernet (PoE) provides power through the Ethernet. It is also called Power overLAN (PoL) or active Ethernet.
PoE involves the following devices:
l PSE: Power-sourcing Equipment
l PD: Powered Device
Purpose
With wide application of IP phones, network video monitoring, and wireless Ethernet networks,
the power supply requirements on the Ethernet become urgent. In most situations, access point
devices need DC powersupply, but access point devices are often installed on the ceiling thathas a long distance from the ground. The nearby proper power socket is difficult to find. Even
if the proper power socket is available, the network administrator finds it hard to install the
converter of the AC and DC power required by access point devices. On large-scale LANs, the
administrators need to manage multiple access point devices that require uniform power supply
and management. In this case, power supply management is difficult. The PoE function
addresses this problem.
The PoE technology is used on the wired Ethernet and is most widely used on LANs. This
technology transmits power coupled with data to terminals through cables or transmits power
without data through idle lines.
This technology provides power on the 10Base-T, 100Base-TX, or 1000Base-T Ethernet at a
distance of up to 100 m. PoE can be used to effectively provide centralized power for terminalssuch as IP phones, Access Points (APs), chargers of portable devices, POS machines, cameras,
and data collection devices. Terminals are powered when they access the network. Therefore,
the indoor cabling of power supply is not required.
Benefits
The costs on the cabling of power supply are saved. The power supply for IP cameras, video
servers, and code converters, can be installed flexibly. In addition, the Uninterruptible Power
Supply (UPS) ensures uninterrupted power supply for the devices.
3.2 References
Table 3-1lists the references related to the PoE function.
3 PoE
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
3-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
33/57
Table 3-1References
Document Description Remarks
IEEE 802.3af PoE industry standards. The
output power of the PSE is limitedto 15.4 W, the power consumption
of the PD is limited to 12.95 W,
and the transmission length of
Category 5 cable is 100 m. The
resistance is 20 ohms.
-
IEEE 802.3at Extension of IEEE802.3af. The
output power of the PSE is limited
to 30 W, the power consumption
of the PD is limited to 25.5 W, and
the transmission length is still 100
M. The resistance is 12.5 ohms.You are advised to use super-
category 5 cables.
-
3.3 Principle
Introduction to PoE Power Supply
According to IEEE 802.3af, PoE involves PSEs and PDs. The PSEs provide power for otherdevices and are classified into MidSpan (the PoE module is installed out of the switch) and
Endpoint (the PoE module is integrated to the switch) PSEs. The S5300 is the Endpoint switch.
IEEE 802.3af and IEEE 802.3at allow the Endpoint PSE to use four copper line pairs connected
to pins 1 and 2 and pins 3 and 6 or pins 4 and 5 and pins 7 and 8 for power supply. The Endpoint
PSE is compatible with 10Base-T, 100Base-TX, and 1000Base-T interfaces. The Endpoint PSE
is more widely used than the Midspan PSE.
The Endpoint PSE provides power in either of the following modes according to the line:
l Alternative A: The Endpoint PSE use line pairs connected to pins 1 and 2 and pins 3 and
6 for power supply.
10Base-T and 100Base-TX interfaces use copper line pairs connected to pins 1 and 2 andpins 3 and 6 to transmit data, and 1000Base-T interfaces use four line pairs to transmit data.
The PSE provides power for the PD through copper line pairs connected to pins 1 and 2
and pins 3 and 6. DC power and data frequency are independent. Pin 1 and pin 2 form the
positive (negative) pole; pin 3 and pin 6 form the negative (positive) pole.
Figure 3-1shows the power supply in Alternative A mode on the 10BaseT and 100Base-
TX Ethernet.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 3 PoE
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3-3
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
34/57
Figure 3-1Power supply in Alternative A mode on the 10BaseT and 100Base-TX
Ethernet
Data pair
Data pair
Data pair
Data pair
PD
1
24
5
7
8
3
6
1
24
5
7
8
3
6
PSE
Figure 3-2shows the power supply in Alternative A mode on the 1000Base-T Ethernet.
Figure 3-2Power supply in Alternative A mode on the 1000Base-T Ethernet
Data pair
Data pair
Data pair
Data pair
Data pair
Data pair
PD
1
2
4
5
7
8
3
6
1
2
4
5
7
8
3
6
PSE
Data pair
Data pair
l Alternative B: The Endpoint PSE uses copper line pairs connected to pins 4 and 5 and pins
7 and 8 for power supply.
The PSE provides power for the PD through copper line pairs connected to pins 4 and 5
and pins 7 and 8. DC power and data frequency are independent. Pin 4 and pin 5 form the
positive pole; pin 7 and pin 8 form the negative pole.
Figure 3-3shows the power supply in Alternative B mode on the 10BaseT and 100Base-
TX Ethernet.
3 PoE
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
3-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
35/57
Figure 3-3Power supply in Alternative B mode on the 10BaseT and 100Base-TX
Ethernet
Data
pair
Data
pair
Data
pair
Data
pair
PD
1
24
5
7
8
3
6
1
24
5
7
8
3
6
PSE
Figure 3-4shows the power supply in Alternative B mode on the 1000Base-T Ethernet.
Figure 3-4Power supply in Alternative B mode on the 1000Base-T Ethernet
Data pair
Data pair
Data pair
Data pair
Data pair
Data pair
PD
1
2
4
5
7
83
6
1
2
4
5
7
83
6
PSE
Data pair
Data pair
The S5300 adopts the Endpoint PSE in Alternative A mode.
Working Process of PoE Power Supply
When you deploy a PSE on a network, the working process of PoE on the Ethernet is as follows:
1. Detection: The PSE provides a low voltage on an interface until it detects the PDs that
support IEEE 802.3af or IEEE 802.3at on the cable and are connected to the terminal of
the cable.
2. PD classification: When detecting the PDs, the PSE classifies the PDs and evaluates the
power consumption of the PDs.
3. Starting power-on: In a period shorter than 15 s, the PSE provides low voltage for thePDs, and then the voltage is increased to 48 V DC power supply.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 3 PoE
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3-5
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
36/57
4. Power-on: The PSE provides 48 V DC power supply for the PDs and the power
consumption of the PDs is smaller than 30 W.
5. Power-off: If a PD is disconnected from the network, the PSE stops powering on the PD
within 300 ms to 400 ms. Then the PSE detects whether the terminal of the cable is
connected to the PDs.
When you connect any network device to a PSE, the PSE detects whether the device is the PD
supporting PoE. If the PD does not support PoE, the PSE does not provide the current for the
PD. The damage to the deviceis thus prevented. The PSE provides a low voltage of the limited
current for the cable to detect the remote end provides the proper resistance. The PSE provides
48 V voltage only when it detects the resistance, whereas the current is still limited. In this case,
the terminal device can retain in correct state.
In addition, the PSE can classify the PDs so that the PSE can provide power supply efficiently.
When the PSE starting providing power supply, it detects the input current of the PD
continuously. The PSE cuts off the power supply and starts detection again when the current of
the PD is reduced to the minimum value in any of the following situations:l The PD is removed.
l The power consumption of the PD is overloaded or short-circuited.
l The power consumption of the PD exceeds the power supply load.
Intelligent PoE Management
The switch functions as the PSE. When the total power is insufficient, ensure that the core PD
can obtain power from the PSE. On the S5300, each interface supporting PoE provides three
power supply priorities for PDs, that is, critical, high, and low. When the power consumption
of PDs is greater than the total power of the PSE, the S5300 first provides power supply for the
PD with the highest priority of the interface. If different interfaces have the same priority, the
S5300 provides power supply for PDs in descending order of port numbers. The PD with the
smallest port number of the interface first obtains power supply.
Discovery and Advertisement of MDI Power Support Capabilities Through LLDP
IEEE 802.1ab defines the optional TLV: Power via MDI TLV. This TLV allows discovery and
advertisement of Media Dependent Interface (MDI) power support capabilities.
The Power via MDI TLV is composed of 2-byte packet header and 12-byte TLV information
field:
l Figure 3-5shows the format of the TLV packet header.
Figure 3-5TLV packet header
0
TLV information
string length=12
TLV
type=127
6 15
l Figure 3-6shows the format of the TLV information field.
3 PoE
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
3-6 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
37/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
38/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
39/57
allocated by a PSE to a PD equals the decimal value of this field multiplied by 0.1. For
example, the value 255 indicates that the allocated power is 25.5 W.
3.4 Terms and AbbreviationsAbbreviation Full Spelling
PoE Power over Ethernet
PSE Power-sourcing Equipment
PD Powered Device
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 3 PoE
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
3-9
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
40/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
41/57
4NAPAbout This Chapter
4.1 Introduction to NAP
4.2 References
4.3 Principles
4.4 Terms and Abbreviations
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 4 NAP
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4-1
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
42/57
4.1 Introduction to NAP
Definition
Neighbor Access Protocol (NAP) is a Huawei proprietary protocol designed for implementing
remote configuration and deployment of devices with empty configurations. With NAP,
engineers are able to establish temporary neighbor relationship between devices having empty
configurations and a device in the current network that is physically linked to the devices to be
deployed. In this manner, engineers can perform a remote login from the device in the current
network to any of the devices having an empty configuration, and implement remote
configuration and deployment of the device.
Purpose
As is often the case, when a device is delivered, it is only installed with the necessary software
and lacks specific configurations. This means that, rather than performing a remote login to the
devices to be deployed, engineers have to be on the site to configure the devices and ensure
connectivity of the network. This results in inconvenience in network deployment and extra
operational and delivery costs.
A partial solution, called the Huawei Group Management Protocol (HGMP), is already available
to address this issue. However, HGMP is applicable only to Layer 2 networks, and is applied in
Ethernet environments.
Now, with NAP, a Layer 3 protocol, engineers are able to establish temporary neighbor
relationship between new devices having empty configurations and a device in the current
network that is physically linked to the new devices to be deployed. In this manner, engineerscan perform a remote login from the device in the current network to any of the new devices
having empty configuration, and implement remote configuration and deployment. Extensive
deployment of this protocol is sure to cut costs significantly in terms of network maintenance
and delivery.
Benefits
The NAP protocol greatly reduces the costs of equipment operation, maintenance, and delivery.
4.2 ReferencesNone
4.3 Principles
NAP is a Layer 3 protocol, and is used to perform remote login to a device with an empty
configuration and to configure the device. The NAP connection can be established after the
device to be configured and the master device are physically connected.
As shown in Figure 4-1, Switch A and Switch B are devices in the current network, and
Switch C is a device with an empty configuration. Switch B and Switch C are connected via asingle hop, and both support NAP.
4 NAP
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
4-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
43/57
Figure 4-1Establishing a NAP connection
Network
SwitchAPC SwitchB SwitchC
1
2
3
Master device Slave device
Master interface
Slave interface
1
2
3
NAP negotiation
Remote login
IP address allocation
The phases for establishing a NAP connection are as follows.
1. NAP negotiation
2. IP address allocation
3. Remote login
In the first two phases, that is, NAP negotiation and IP address allocation, a device in the current
network and the device with an empty configuration are respectively the master device and the
slave device, whereas the two physical interfaces connecting the two devices are called the
master interface (on the master device) and the slave interface (on the slave device). In the thirdphase, that is, remote login, the master device and the slave device are respectively the Client
and the Server for performing the NAP login.
Format of the NAP Packet
NAP packets are UDP-encapsulated, and adopt the UDP port numbered 53535. The destination
IP address of the NAP packet is the reserved multicast IP address 224.0.0.128, whereas the
source IP address is the configured IP address of the sending interface. If the sending interface
has no IP address, 0.0.0.0 is used as the source IP address of the NAP packet. The TTL of the
NAP packet is 1. Figure 4-2shows the format of the NAP packet.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 4 NAP
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4-3
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
44/57
Figure 4-2Format of the NAP packet
Version
0 4321
Protocol Type Reserved
Length Checksum
.
.
.
TLV1 (n byte)
TLV2 (n byte)
TLVn (n byte)
TLV Number
The following describes the main fields of the NAP packet.
l Version: Version number of NAP. The value is 01.
l Type: Types of NAP packets. Table 4-1lists five types of NAP packets.
Table 4-1Description of fields that indicate the types of NAP packets
Value Type
01 Detection packet
02 Response packet
03 Establish packets (confirming the establishment of neighbor
relationship)
04 Hello packet
05 Close packet
l TLVn: Variable-size TLV data area. This field consists of three parts: data type, data length,
and user data.
Table 4-2lists the TLV data types and their corresponding types of user data.
Table 4-2Mappings between data types and user data in the variable-size TLV data area of the
NAP packet
Type Number Value
01 Primary IP address of the local interface
4 NAP
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
4-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
45/57
Type Number Value
02 Secondary IP address of the local interface
03 Primary IP address of the remote interface
04 Secondary IP address of the remote interface
05 Subnet mask of the IP address
06 Hello interval
07 Name of the local interface
08 Type of the local device
09 ID of the local device
NAP Negotiation
By default, any NAP-supporting device is a slave device, and the interface on the device is the
slave interface, responsible for listening rather than initiating packets. After the NAP master
device and slave device are started, listening is started on the slave interface by default. After
NAP is started on the master interface on the master device, the master device sends a protocol
packet to discover neighbors, and enters the NAP negotiation phase. The NAP negotiation
process is shown in Figure 4-3.
Figure 4-3NAP negotiation process
Master device Slave device
Protocalpacket
Analyzing
ACK
ACK
1. The NAP slave device is started, and listening is started on the slave interface by default.
Then, the slave device waits for a negotiation packet from the master device.
2. The master device sends a negotiation packet from the master interface to discover
neighbors.
3. The slave device receives the NAP negotiation packet and starts to analyze it.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 4 NAP
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4-5
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
46/57
4. The master device and the slave device enter the NAP negotiation phase.
5. The slave device receives the neighbor-discovery packet on its slave interface, and sends
a response packet. Then, the master device sends an acknowledge packet to the slave device,
and the NAP neighbor relationship is established.
IP Address Allocation
The master interface and the slave interface need to be configured with two IP addresses out of
two considerations. First, to facilitate the configuration of service IP addresses for the master
and slave interfaces; second, to configure service IP addresses without interrupting the current
NAP login.
In the current system, no secondary IP address can be configured unless there is a primary IP
address. In addition, the primary IP address is necessary for NAP to go up. Therefore, the master
and slave interfaces need to be configured with primary IP addresses first. However, when the
master device uses the primary IP address to telnet to the slave device, the primary IP address
cannot be changed during the telnet operation. This means that the primary IP address cannotbe changed to meet the actual networking requirements.
Therefore, in NAP, two IP addresses - a primary IP address and a secondary IP address - are
allocated to both the master interface and the slave interface on the master device and the slave
device. Primary IP addresses are used for NAP to go Up, whereas in the actual communication
and NAP-based remote login, secondary IP addresses are used to maintain the NAP connection.
By default, NAP automatically allocates IP addresses to the interfaces from the IP address pool
10.167.253.0/24. To avoid conflicting IP addresses, you can manually allocate IP addresses to
the interfaces. In this case, you can specify the NAP IP address pool only. IP addresses in the
NAP IP address pool are automatically calculated according to the NAP address allocation
algorithm. You can also choose to specify four IP addresses that are on the same network segment
instead of specifying the NAP IP address pool.
Remote Login
l After the IP address allocation, a remote login is performed from the master device to the
slave device through Telnet. Then, the interactive interface is displayed for initializing the
configurations on the slave device.
l If the slave device has an empty configuration, you can log in to the slave device from the
master device without a user name and a password.
l If, however, the slave device is configured with user name(s) and password(s), you must
enter the correct user name and password to perform a NAP-based remote login to the slave
device.NOTE
The slave device with an empty configuration checks the Telnet source address of the Telnet login. If the
Telnet source address is the NAP address of the master device that is telnetting to the slave device, the
slave device allows the master device to directly log in without being authenticated. This is because by
default, the user level of the remote login based on the NAP address of the remote device that initiates the
login is the same as in the login through the console interface on the device that is telneted to, which enjoys
the highest user level. If the Telnet source address is not the NAP address of the master device, the remote
login fails. In this way, the system security of the device with an empty configuration is ensured.
When the NAP-based connection is logged off, the temporary master and secondary IP addresses
allocated for the master and slave devices are automatically released. After all the slave devices
having empty configurations are deployed, the slave interface attribute can be globally disabledon the slave devices to decline any NAP negotiation. In addition, existing neighbor relationships
4 NAP
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
4-6 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
47/57
and allocated IP addresses are automatically cancelled and released. After the slave interface
attribute is globally disabled on a slave device, interfaces on the slave device can only function
as master interfaces to initiate connections with other devices having empty configurations. In
this way, the network security is ensured by preventing the slave device from responding to
negotiation requests from other master interfaces.
4.4 Terms and Abbreviations
Abbreviations
Abbreviation Full Spelling
HGMP Huawei Group Management Protocol
NAP Neighbor Access Protocol
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 4 NAP
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
4-7
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
48/57
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
49/57
5StackingAbout This Chapter
5.1 Stacking Overview
5.2 References
5.3 Principles
5.4 Application
5.5 Terms and Abbreviations
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 5 Stacking
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5-1
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
50/57
5.1 Stacking Overview
Definition
Stacking is a technology that enables multiple devices supporting the stacking feature to function
as a logical device.
Purpose
The stacking technology is generally used on enterprise networks, campus networks, and
residential networks to expand device capacities and improve device reliability.
The stacking technology can increase device ports and reduce single-point faults by using the
active/standby mechanism.
Benefits
The stacking technology brings the following benefits to operators:
l Protecting investments during network capacity expansion
l Simplifying configuration and management during capacity expansion: multiple physical
switches form a logical switch
l Improving system reliability by using the redundancy backup mechanism
l Supporting link aggregation between member switches
lProviding more ports and higher bandwidth
5.2 References
None
5.3 Principles
Stacking is enabled on a switch by default. After switches are installed with stack cards and
started, a stack is set up.
Roles of Member Switches
Each switch in a stack is a member switch. Member switches are classified into the following
roles:
l Master switch
A stack has only one master switch. The master switch manages the entire stack system by
assigning stack IDs to member switches, collecting information about the stack topology,
and notifying all the member switches of the topology. A stack ID is similar to a slot ID in
a chassis, and the master switch is similar to the main control board of a chassis-shaped
switch.
l Standby switch
5 Stacking
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
5-2 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
51/57
A stack has only one standby switch. The standby switch is the backup of the master switch
and is similar to the slave main control board of a chassis-shaped switch. When the master
switch fails, the standby switch takes over all services from the master switch.
l Slave switch
Slave switches implement Layer 2 forwarding based on MAC addresses and Layer 3distributed forwarding based on unicast and multicast routing. A slave switch sends a
topology change notification message to the master switch when detecting that a neighbor
is lost. In a stack, all member switches except the master switch are slave switches. The
standby switch is also a slave switch.
Setting Up a Stack
Before a stack is set up, each switch is an independent entity with its own IP address and needs
to be managed separately. In addition, link aggregation between switches is not supported.
As shown in Figure 5-1, three switches are connected through stack cables to form a ring network
(or a chain network). After the master switch is selected, it selects the standby switch. If themaster switch fails, the standby switch becomes the master switch and manages the entire stack
system. Other switches function as slave switches. All member switches implement Layer 2
forwarding based on MAC addresses and Layer 3 distributed forwarding based on unicast and
multicast routing.
Figure 5-1Setting up a stack
Stack Setup
SwitchA
Master
Stack
SwitchA
SwitchCSwitchB SwitchB
Standby
SwitchC
Slave
After the master switch, standby switch, and slave switches are selected, the master switch
collects the topology report packets sent from all the slave switches, and then generates
forwarding entries accordingly and delivers the entries to all the member switches in the stack.
The process of selecting the master switch is:
l The switches compare their operating status. A switch may be in running or starting state.
The switches in running state are preferred. When switches are in the same state, the switch
running for the longest time is selected as the master switch.
l If the running time of the switches is the same, they compare the priorities. The switch with
the highest priority is selected as the master switch.
l If all the preceding factors are the same, the switches compare their MAC addresses. The
switch with the smallest MAC address is selected as the master switch.
NOTE
If the master switch and slave switches run different software versions, the slave switches synchronize thesoftware version with the master switch after the stack is set up.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 5 Stacking
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5-3
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
52/57
Adding a Member Switch to a Stack
Figure 5-2illustrates how a new switch is added to a stable stack system.
A switch can be added to a stack system after being powered off or with power-on. In Figure
5-2, the new member switch is powered off before being added to the stack. In Figure 5-4, themember switches are added to a stack with power-on.
Figure 5-2Adding a member switch to a stack
SwitchA
Master
SwitchB
Standby
SwitchC
Slave
SwitchD
Master
Standalone
Stack
Add a member
SwitchB
Standby
SwitchA
Master
SwitchC
Slave
SwitchD
Slave
Stack
The new switch is powered off and connected to the member switches of the stack by using stack
cables. Then the switch is restarted. The new switch is selected as a slave switch after it starts,
and roles of other member switches in the stack remain unchanged. After the election is complete,
the master switch updates the topology information and synchronizes the topology information
to other switches. Then the master switch assigns a stack ID to the new member switch. The
new member switch updates the stack ID, registers to the master switch, synchronizes the
configuration, and then enters the stable running state.
Removing a Member Switch from a Stack
Figure 5-3shows how a slave switch quits a stack. After a member switch is removed, the stack
is affected in the following ways:
l When the master switch is removed, the neighbor switches notify other member switches
of the topology change and update the neighbor information. The standby switch becomes
the master switch. It recalculates the stack topology information, synchronizes the
information to other members, and specifies a new standby switch. Then the stack runs
stably.
l When the standby switch is removed, the master switch specifies a new standby switch,
and then recalculates the stack topology information and synchronizes the information toother member switches.
5 Stacking
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
5-4 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
53/57
l When a slave switch is removed, the master switch recalculates the stack topology
information and synchronizes the information to other member switches.
Figure 5-3Removing a slave switch from a stack
Remove a member
SwitchB
Standby
SwitchA
Master
SwitchC
Slave
SwitchD
Slave
Stack
SwitchAMaster
SwitchB
Standby
SwitchC
Slave
SwitchD
Master
Stand
alone
Stack
Combining Two Stacks
As shown in Figure 5-4, two stable stacks are combined into one stack. The superior switch
between the master switches of the two stacks is selected as the master switch. The original stack
containing the new master switch remain the original device roles and configurations, and
services in this stack are not affected. Switches in the other stack restart and join the new stack
as slave switches. Then the master switch assigns new stack IDs to the restarted switches and
synchronizes configurations to the switches. Services on these switches are interrupted in this
period.
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management 5 Stacking
Issue 02 (2010-12-01) Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
5-5
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
54/57
Figure 5-4Combining two stacks
SwitchA
Master
SwitchB
Standby
SwitchC
Slave
Stack 1
SwitchA
Master
SwitchB
Standby
SwitchD
Master
SwitchE
Slave
SwitchD
Slave
SwitchC
Slave
Stack 1
Stack 2
SwitchE
Slave
Merge Stacks
NOTE
The new stack can contain a maximum of nine member switches. In addition, the member switches mustadopt the same hardware model.
Dividing a Stack
A stable stack can be divided into two stacks with power-on. Member switches act differently
after the stack is divided:
l The original master and standby switches are in the same stack after the original stack is
divided.
As shown in Figure 5-5, the master switch recalculates the stack topology and deletes the
removed switches from the topology. The removed slave switches restart after detecting
that the stack packets time out, and then select a new master switch.
5 Stacking
Quidway S5300 Series Ethernet Switches
Feature Description - Device Management
5-6 Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
Issue 02 (2010-12-01)
8/10/2019 Quidway S5300 - Device Management(V100R005C01_02).pdf
55/57
Figure 5-5Dividing a stack 1
Partition Stack
SwitchA
Master
SwitchB
Standby
SwitchE
Slave
SwitchD
Slave
SwitchC
Slave
Stack 1
SwitchA
Master
SwitchB
Standby
SwitchC
Slave
Stack 1
SwitchD
Master
Stack 2
S