H3c-technologies H3C SecBlade NetStream Cards Manual de usuario Pagina 1

Busca en linea o descarga Manual de usuario para La Seguridad H3c-technologies H3C SecBlade NetStream Cards. H3C Technologies H3C SecBlade NetStream Cards User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 349
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - H3C SecBlade NetStream Card

H3C SecBlade NetStream Card Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document version: 6PW107

Pagina 2

v Configuring a static ARP entry ·····················································································································

Pagina 3 - Preface

85 VLAN types You can implement VLANs based on the following criteria: • Port • MAC address • Protocol • IP subnet • Policy • Other criteria Th

Pagina 4 - Port numbering in examples

86 NOTE: • As the default VLAN, VLAN 1 cannot be created or removed. • You cannot manually create or remove VLANs reserved for special purposes.

Pagina 5 - Documentation feedback

87 To do… Use the command… Remarks Shut down the VLAN interface shutdown Optional By default, a VLAN interface is in the up state. The VLAN interfa

Pagina 6 - Contents

88 [SecBlade-vlan5] port gigabitethernet 0/2 # Create VLAN 10 and assign GigabitEthernet 0/3 to it. [SecBlade-vlan5] vlan 10 [SecBlade-vlan10] port g

Pagina 7

89 • A trunk port can carry multiple VLANs to receive and send traffic for them. Except traffic of the default VLAN, traffic sent through a trunk po

Pagina 8

90 NOTE: • H3C recommends that you set the same default VLAN ID for local and remote ports. • Make sure that a port is assigned to its default V

Pagina 9

91 To do… Use the command… Remarks Enter system view system-view — Enter Layer 2 Ethernet interface view interface interface-type interface-number

Pagina 10

92 Assigning a hybrid port to a VLAN A hybrid port can carry multiple VLANs. You can assign it to a VLAN in Layer 2 Ethernet interface view only. Fol

Pagina 11

93 Figure 31 Network diagram for port-based VLAN configuration Configuration procedure 1. Configuration on SecBlade A # Create VLAN 100, and assig

Pagina 12

94 VLAN Type: static Route Interface: not configured Description: VLAN 0100 Name: VLAN 0100 Broadcast MAX-ratio: 100% Tagged Ports: Gigab

Pagina 13

vi Enabling IPv4 NetStream ···························································································································

Pagina 14

95 Isolate-user-VLAN configuration This chapter includes these sections: • Overview • Configuring an isolate-user-VLAN • Displaying and maintainin

Pagina 15

96 2. Configure the secondary VLANs. 3. Assign non-trunk ports to the isolate-user-VLAN and ensure that at least one port takes the isolate-user-VL

Pagina 16 - CLI configuration

97 Isolate-user-VLAN configuration example Network requirements As shown in Figure 33, • Connect SecBlade A to downstream devices SecBlade B and Se

Pagina 17 - Command conventions

98 # Configure the secondary VLANs. [SecBladeB] vlan 3 [SecBladeB-vlan3] port gigabitethernet 0/2 [SecBladeB-vlan3] quit [SecBladeB] vlan 2 [SecBlade

Pagina 18 - CLI views

99 Route Interface: not configured Description: VLAN 0002 Name: VLAN 0002 Broadcast MAX-ratio: 100% Tagged Ports: none Untagged Ports: Gi

Pagina 19 - Using the CLI online help

100 Layer 2 forwarding configuration This chapter includes these sections: • Configuring general Layer 2 forwarding • Configuring inline Layer 2 fo

Pagina 20 - Typing commands

101 • Blackhole type: A packet received on an interface is discarded. A complete configuration contains an ID, which uniquely identifies an inline L

Pagina 21 - Configuring command aliases

102 Forward-type inline Layer 2 forwarding configuration example Network requirements Configure forward-type inline Layer 2 forwarding between Ten-Gi

Pagina 22 - Configuring CLI hotkeys

103 As shown in Figure 34, the SecBlade card collaborates with a host device to filter Layer 2 traffic arriving at the host device before forwarding

Pagina 23 - Maintenance Command Reference

104 To do… Use the command… Remarks Enter system view system-view — Create a VLAN and enter VLAN view vlan vlan-id Required Assign the access po

Pagina 24 - Using command history

vii Scheduled task configuration example ·············································································································

Pagina 25 - Controlling the CLI display

105 To do… Use the command… Remarks Create a subinterface of the ten-GigabitEthernet interface and enter subinterface view interface ten-gigabitethe

Pagina 26 - Filtering output information

106 Inter-VLAN Layer 2 forwarding configuration example Network requirements As shown in Figure 35, traffic between GigabitEthernet 3/0/1 and Gigabit

Pagina 27 - Remarks

107 2. Configure the SecBlade card. # Create VLAN 1000. <SecBlade> system-view [SecBlade] vlan 1000 [SecBlade-vlan1000] quit # Configure the

Pagina 28

108 MAC address table configuration This chapter includes these sections: • Overview • Configuring the MAC address table • Displaying and maintain

Pagina 29

109 You can manually add MAC address entries to the MAC address table of the device to bind specific user devices to the port. Because manually confi

Pagina 30

110 You can also configure blackhole MAC address entries to filter out packets with certain destination MAC addresses. Add or modify a static, dynam

Pagina 31

111 Displaying and maintaining MAC address tables To do… Use the command… Remarks Display MAC address table information display mac-address [ mac-ad

Pagina 32

112 # Display the MAC address entry for port GigabitEthernet 0/2. [SecBlade] display mac-address interface gigabitethernet 0/2 MAC ADDR VLAN

Pagina 33

113 ARP configuration This chapter includes these sections: • ARP overview • Configuring ARP • Displaying and maintaining ARP • ARP configuration

Pagina 34

114 • Sender protocol address: Protocol address of the device sending the message. • Target hardware address: Hardware address of the device the me

Pagina 35 - Login methods

viii Displaying and maintaining FTP ··················································································································

Pagina 36 - Numbering user interfaces

115 3. If the gateway maintains the ARP entry of Host B, it forwards the packet to Host B directly; if not, it broadcasts an ARP request, in which t

Pagina 37 - CLI login

116 Follow these steps to configure a static ARP entry: To do… Use the command… Remarks Enter system view system-view — Configure a static ARP ent

Pagina 38 - Login procedure

117 Enabling dynamic ARP entry check The dynamic ARP entry check function controls whether the device supports dynamic ARP entries with multicast MAC

Pagina 39

118 To do… Use the command… Remarks Display the age timer for dynamic ARP entries display arp timer aging Available in any view Clear ARP entries f

Pagina 40

119 # Add interface GigabitEthernet 0/2 to VLAN 10. [SecBlade] interface gigabitethernet 0/2 [SecBlade-GigabitEthernet0/2] port link-type trunk [SecB

Pagina 41

120 Gratuitous ARP configuration This chapter includes these sections: • Introduction to gratuitous ARP • Configuring gratuitous ARP Introduction t

Pagina 42

121 • Prevent the virtual IP address of a VRRP group from being used by a host The master router of a VRRP group can periodically send gratuitous AR

Pagina 43

122 Proxy ARP configuration This chapter includes these sections: • Proxy ARP overview • Enabling proxy ARP • Displaying and maintaining proxy ARP

Pagina 44

123 Figure 40 Application environment of proxy ARP Because Host A considers that Host B is on the same network, it broadcasts an ARP request for th

Pagina 45

124 Enable local proxy ARP in one of the following cases: • Hosts connecting to different isolated Layer 2 ports in the same VLAN need to communicat

Pagina 46

ix Restoring a startup configuration file ············································································································

Pagina 47 - Logging in through telnet

125 to the same network 192.168.0.0/16), but are located on different subnets. As a result, Host D cannot receive or respond to any ARP request from

Pagina 48

126 Configure port isolation on Ethernet 1/3 and Ethernet 1/1 of Switch to isolate Host A from Host B at Layer 2. Enable local proxy ARP on the SecBl

Pagina 49

127 [SecBlade] interface gigabitethernet 0/2 [SecBlade-GigabitEthernet0/2] ip address 192.168.10.100 255.255.0.0 The ping operation from Host A to Ho

Pagina 50

128 [Switch] vlan 5 [Switch-vlan5] port ethernet 1/2 [Switch-vlan5] isolate-user-vlan enable [Switch-vlan5] quit [Switch] isolate-user-vlan 5 seconda

Pagina 51

129 ACL configuration This chapter includes these sections: • ACL overview • ACL configuration task list • Displaying and maintaining ACLs • ACL

Pagina 52

130 Match order The rules in an ACL are sorted in a specific order. When a packet matches a rule, the device stops the match process and performs the

Pagina 53

131 Automatic rule numbering and renumbering The ID automatically assigned to an ACL rule takes the nearest higher multiple of the numbering step to

Pagina 54

132 To do… Use the command… Remarks Create an IPv4 basic ACL and enter its view acl number acl-number [ name acl-name ] [ match-order { auto | conf

Pagina 55

133 To do… Use the command… Remarks Create or edit a rule rule [ rule-id ] { deny | permit } protocol [ { { ack ack-value | fin fin-value | psh psh-

Pagina 56

134 To do… Use the command… Remarks Configure or edit a rule description rule rule-id comment text Optional By default, an Ethernet frame header AC

Pagina 57

x Displaying and maintaining information center ······································································································

Pagina 58 - ACSEI startup and running

135 CAUTION: • ACL acceleration is not available for ACLs that contain a non-contiguous wildcard mask. • After you modify an IPv4 ACL with ACL acc

Pagina 59

136 CAUTION: If you are using the host device to generate comprehensive log data for the ACL matching packets, also follow these guidelines: • Do n

Pagina 60

137 ACL configuration example IPv4 packet filtering and NetStream logging configuration example Network requirements Apply an IPv4 ACL to deny the tr

Pagina 61 - NMS login

138 # Configure Ten-GigabitEthernet 2/0/1 as a trunk port, and configure the port to deny all VLANs to pass through. [Device] interface ten-gigabitet

Pagina 62

139 NetStream overview This chapter includes these sections: • Basic concepts of NetStream • Key technologies of NetStream • NetStream sampling an

Pagina 63 - NMS login example

140 How NetStream works A typical NetStream system comprises three parts: NetStream data exporter (NDE), NetStream collector (NSC), and NetStream dat

Pagina 64

141 When the timer of the entry expires, the NDE exports the summarized data to the NetStream server in a specified NetStream version export format.

Pagina 65 - User login control

142 NetStream aggregation data export, which decreases the bandwidth usage compared to traditional data export. For example, the aggregation mode con

Pagina 66

143 • Random mode—Any packet might be selected out of a number of sequential packets in each sampling. Sampling basically reflects the network traff

Pagina 67

144 IPv4 NetStream configuration This chapter includes these sections: • IPv4 NetStream configuration task list • Displaying and maintaining IPv4 N

Pagina 68 - NMS users

1 CLI configuration This chapter includes these sections: • What is CLI? • Entering the CLI • Command conventions • Undo form of a command • CLI

Pagina 69

145 Complete these tasks to configure NetStream: Task Remarks Enabling IPv4 NetStream Required Configuring ACL-based NetStream filtering Optional

Pagina 70 - Interface configuration

146 To do… Use the command… Remarks Enable ACL-based NetStream filtering in the inbound or outbound direction of an interface ip netstream filter ac

Pagina 71 - General configuration

147 Follow these steps to configure NetStream sampling: To do… Use the command… Remarks Enter system view system-view — Enable sampling ip netstr

Pagina 72

148 To do… Use the command… Remarks Configure the source interface for NetStream traditional data export ip netstream export source interface inter

Pagina 73

149 To do… Use the command… Remarks Enable the IPv4 NetStream aggregation configuration enable Required Disabled by default NOTE: Configurations

Pagina 74

150 NOTE: The refresh frequency and interval can be both configured, and the template is resent when either of thecondition is reached. Configurin

Pagina 75

151 Displaying and maintaining IPv4 NetStream To do… Use the command… Remarks Display the IPv4 NetStream entry information in the cache display ip n

Pagina 76

152 IPv6 NetStream configuration This chapter includes these sections: • IPv6 NetStream configuration task list • Displaying and maintaining IPv6 N

Pagina 77

153 Configuring IPv6 NetStream data export To allow the NDE to export collected statistics to the NetStream server, configure the source interface ou

Pagina 78

154 To do… Use the command… Remarks Enable IPv6 NetStream ipv6 netstream { inbound | outbound } Required Disabled by default. This outbound keyword

Pagina 79

2 Entering the CLI H3C devices provide multiple methods for entering the CLI, such as through the console port and through telnet. For more informatio

Pagina 80 - IP addressing configuration

155 To do… Use the command… Remarks Enter system view system-view — Configure the version for IPv6 NetStream export format ipv6 netstream export

Pagina 81 - Subnetting and masking

156 To do… Use the command… Remarks Configure forced aging of the IPv6 NetStream entries Set the maximum entries that the cache can accommodate, and

Pagina 82 - Configuring IP addresses

157 NetStream configuration examples Configuration considerations Connect the host device and the SecBlade NS card through the internal ten-GigabitEt

Pagina 83 - 172.16.2.2/24

158 Configuring the host device and the SecBlade NS card NetStream must be configured on both the SecBlade NetStream card and the host device. The ex

Pagina 84

159 To do… Use the command… Remarks Exit QoS policy view and enter system view quit Required Enter service port view interface interface-type inter

Pagina 85 - IP routing overview

160 To do… Use the command… Remarks Enable NetStream on the incoming traffic of the port ip netstream inbound Required Disabled by default. Enable t

Pagina 86 - Dynamic routing protocols

161 Traffic from network 10.1.0.0/16 needs to be mirrored to the SecBlade NS card for traffic statistics collection, as shown in Figure 49. • Assign

Pagina 87 - Route recursion

162 # Configure ACL 2000. [Device] acl number 2000 [Device-acl-basic-2000] rule 0 permit source 10.1.0.0 0.0.255.255 [Device-acl-basic-2000] quit # C

Pagina 88

163 # Configure the IP address of GigabitEthernet 0/1. [SecBlade] interface gigabitethernet 0/1 [SecBlade-GigabitEthernet0/1] ip address 192.168.103.

Pagina 89 - Static routing configuration

164 [Device-vlan20] quit # Create VLAN-interface, and assign an IP address to the VLAN-interface. [Device] interface Vlan-interface 10 [Device-Vlan-i

Pagina 90 - Configuring a static route

3 You can read any command that is more complicated according to Table 1. Undo form of a command The undo form of a command restores the default, disa

Pagina 91

165 # Create a blackhole-type inline forwarding entry 1. [SecBlade] inline-interfaces 1 blackhole # Assign Ten-GigabitEthernet 0/0 to the blackhole-t

Pagina 92

166 Configuration procedure 1. Configure the Device # Create VLAN 10 and VLAN 20, and assign GigabitEthernet 3/0/1 and GigabitEthernet 3/0/2 to VLAN

Pagina 93 - What is policy-based routing

167 [SecBlade] inline-interfaces 1 blackhole # Assign Ten-GigabitEthernet 0/0 to the blackhole-type inline forwarding entry 1 for discarding the pack

Pagina 94 - Configuring PBR

168 Configuration procedure 1. Configure the Device. # Enable IPv6. <Device> system-view [Device] ipv6 # Create VLAN 10 and VLAN 20, and assig

Pagina 95

169 [Device-GigabitEthernet3/0/1] quit # Enable ACSEI server for the NS card to synchronize the clock on the Device. [Device] acsei server enable 2.

Pagina 96 - Configuring interface PBR

170 Figure 53 Network diagram for configuring IPv6 NetStream aggregation data export Configuration procedure 1. Configure the Device. # Enable I

Pagina 97

171 [Device-classifier-1] quit # Create a traffic behavior, and configure the action of mirroring traffic to port Ten-GigabitEthernet 4/0/1 for the t

Pagina 98 - VLAN configuration

172 # Configure the aggregation mode as protocol-port, and in aggregation view configure the destination address for the IPv6 NetStream protocol-port

Pagina 99 - VLAN fundamentals

173 Device management This chapter includes these sections: • Device management overview • Configuring the device name • Configuring and displayin

Pagina 100 - Protocols and standards

174 Configuring and displaying the system time Configuring the system time The system time is determined by the configured relative time, time zone,

Pagina 101 - Configuration procedure

4 Entering system view When you log in to the device, you automatically enter user view, where <Device name> is displayed. You can perform limit

Pagina 102 - Network requirements

175 Configuration System time configured Example 2 The original system time ± “zone-offset” Configure: clock timezone zone-time add 1 System time con

Pagina 103 - Port link type

176 Configuration System time configured Example “date-time” is in the daylight saving time range: If the value of “date-time” - “summer-offset” is n

Pagina 104 - Default VLAN

177 Configuration System time configured Example [1], 2, 3 and 1 or [1], 3, 2 and 1 If “date-time” is not in the daylight saving time range, the syst

Pagina 105

178 • incoming banner—Also called user interface banner, displayed when a user interface is activated by a Modem user. • login banner—Login welcome

Pagina 106

179 • Method II—Type a character after the command keywords at the first line, and then press Enter. Type the banner information, and finish your se

Pagina 107

180 To do… Use the command… Remarks Enter system view system-view — Configure the exception handling method system-failure { maintain | reboot } O

Pagina 108

181 CAUTION: • A device reboot interrupts ongoing services. Use these commands with caution. • Before rebooting a device, use the save command to

Pagina 109 - Remarks

182 Comparison item Configuring a scheduled task—approach 1 Configuring a scheduled task—approach 2 Supported views User view and system view. In the

Pagina 110 - Overview

183 To do… Use the command… Remarks Create a scheduled task and enter job view job job-name Required Specify the view in which the task is executed

Pagina 111

184 Figure 54 Network diagram for scheduled task configuration Configuration procedure # Enter system view. <SecBlade> system-view # Create

Pagina 112

Copyright © 2008-2012, Hangzhou H3C Technologies Co., Ltd. and its licensors All rights reserved No part of this manual may be reproduced or transmi

Pagina 113

5 cd Change current directory clock Specify the system clock …Omitted… 2. Type part of a command and a ? separated by

Pagina 114

185 [SecBlade-job-pc3] time 1 repeating at 8:00 week-day mon tue wed thu fri command undo shutdown # Configure the Secblade to shut down GigabitEther

Pagina 115 - Working mechanism

186 If you repeatedly insert and remove different subcards or interface cards to create or delete a large number of logical interfaces, the interface

Pagina 116

187 Identifying pluggable transceivers Because pluggable transceivers are of various types and from different vendors, you can use the following comm

Pagina 117

188 To do… Use the command… Remarks Display the terminal user information display users [ all ] Available in any view Display the information of th

Pagina 118

189 NOTE: For more information about the display users command, see the Fundamentals Command Reference.

Pagina 119 - Configure the SecBlade card

190 NTP configuration This chapter includes these sections: • NTP overview • NTP configuration task list • Displaying and maintaining NTP • NTP c

Pagina 120

191 How NTP works Figure 55 shows the basic workflow of NTP. Device A and Device B are connected over a network. They have their own independent syst

Pagina 121 - XGE2/0/1

192 This is only a rough description of the work mechanism of NTP. For more information, see RFC 1305. NTP message format NTP uses two types of messa

Pagina 122

193 • Precision: An 8-bit signed integer that indicates the precision of the local clock. • Root Delay: Roundtrip delay to the primary reference so

Pagina 123

194 Symmetric peers mode Figure 58 Symmetric peers mode In symmetric peers mode, devices that work in symmetric active mode and symmetric passive m

Pagina 124

6 Key Function Left arrow key or Ctrl+B The cursor moves one character space to the left. Right arrow key or Ctrl+F The cursor moves one character s

Pagina 125

195 Multicast mode Figure 60 Multicast mode In multicast mode, a server periodically sends clock synchronization messages to the user-configured mu

Pagina 126

196 NOTE: • A single device can have a maximum of 128 associations at the same time, including static associationsand dynamic associations. • A s

Pagina 127

197 To do… Use the command… Remarks Enter system view system-view — Specify the source interface for NTP messages ntp-service source-interface int

Pagina 128 - ARP configuration

198 Configuration prerequisites The configuration of NTP authentication involves configuration tasks to be implemented on the client and on the serve

Pagina 129 - Operation of ARP

199 Displaying and maintaining NTP To do… Use the command… Remarks Display information about NTP service status display ntp-service status Availabl

Pagina 130 - Configuring ARP

200 Actual frequency: 64.0000 Hz Clock precision: 2^7 Clock offset: 0.0000 ms Root delay: 0.00 ms Root dispersion: 0.00 ms Peer dispersion: 0.0

Pagina 131

201 Figure 62 Network diagram for configuration of NTP client/server mode with authentication Configuration procedure 1. Set the IP address for ea

Pagina 132

202 Root dispersion: 1.05 ms Peer dispersion: 7.81 ms Reference time: 14:53:27.371 UTC Sep 19 2005 (C6D94F67.5EF9DB22) As shown above, SecBlade ha

Pagina 133 - ARP configuration example

203 Automatic configuration This chapter includes these sections: • Introduction to automatic configuration • Typical automatic configuration netwo

Pagina 134

204 • DNS server—Resolves between IP addresses and host names. In some cases, the device resolves its IP address to the corresponding host name thro

Pagina 135 - Gratuitous ARP configuration

7 To do… Use the command… Remarks Enable the command alias function command-alias enable Required Disabled by default, which means you cannot confi

Pagina 136 - Configuring gratuitous ARP

205 Figure 64 Work flow of automatic configuration Using DHCP to obtain an IP address and other configuration information Address acquisition proce

Pagina 137 - Proxy ARP configuration

206 NOTE: The temporary configuration contains two parts: the configuration made on the interface through which automatic configuration is perform

Pagina 138 - Local proxy ARP

207 CAUTION: • There must be a space before the keyword ip host. • The host name of a device saved in the host name file must be the same as the

Pagina 139 - Enabling proxy ARP

208 • If all the above operations fail, the device requests the default configuration file from the TFTP server. TFTP request sending mode The devi

Pagina 140

209 FTP configuration This chapter includes these sections: • FTP overview • Configuring the FTP client • Configuring the FTP server • Displaying

Pagina 141

210 When SecBlade serves as the FTP client, you need to perform the following configuration: Table 15 Configuration when the device serves as the FTP

Pagina 142

211 Establishing an FTP connection Before you can access the FTP server, you must establish a connection from the FTP client to the FTP server. You c

Pagina 143 - 2. Configure the SecBlade

212 To do… Use the command… Remarks Display detailed information about a directory or file on the remote FTP server dir [ remotefile [ localfile ] ]

Pagina 144 - ACL configuration

213 To do… Use the command… Remarks Set the file transfer mode to binary binary Optional ASCII by default. Set the data transmission mode to passive

Pagina 145 - ACL rule numbering

214 To do… Use the command… Remarks Terminate the connection to the FTP server without exiting FTP client view disconnect Optional Equal to the clos

Pagina 146 - Configuring an ACL

8 Hotkey Function Ctrl+V Pastes the content in the clipboard. Ctrl+W Deletes all the characters in a continuous string to the left of the cursor. Ct

Pagina 147

215 Trying 10.1.1.1 Connected to 10.1.1.1 220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user User(10.1.1.1:(none)):abc 331 Give m

Pagina 148

216 To do… Use the command… Remarks Enter system view system-view — Enable the FTP server ftp server enable Required Disabled by default. Use an

Pagina 149 - Copying an IPv4 ACL

217 To do… Use the command… Remarks Configure user properties authorization-attribute { acl acl-number | callback-number callback-number | idle-cut

Pagina 150 - Packet filtering with ACLs

218 # Enable FTP server. [SecBlade] ftp server enable [SecBlade] quit # Check files on your device. Remove those redundant to ensure adequate space f

Pagina 151

219 CAUTION: The boot file used for the next startup must be saved under the root directory of the storage medium (Fora device that has been partiti

Pagina 152 - ACL configuration example

220 TFTP configuration This chapter includes these sections: • TFTP overview • Configuring the TFTP client • Displaying and maintaining the TFTP c

Pagina 153

221 Figure 69 TFTP configuration diagram Before using TFTP, the administrator needs to configure IP addresses for the TFTP client and server, and m

Pagina 154 - NetStream overview

222 When using the tftp client source or tftp command, you can specify the source interface (such as a loopback interface) or source IP address. The

Pagina 155 - Flow aging

223 TFTP client configuration example Network requirements • As shown in Figure 70, use a PC as the TFTP server and SecBlade as the TFTP client. The

Pagina 156 - NetStream data export

224 File management This chapter includes these sections: • Managing files • Performing directory operations • Performing file operations • Perfo

Pagina 157 - NetStream sampling

9 Checking command-line errors If a command contains syntax errors, the CLI reports error information. Table 4 lists some common command line errors.

Pagina 158

225 Format Description Length Example path/file-name Specifies a file in the specified folder in the current working directory. path indicates the na

Pagina 159 - IPv4 NetStream configuration

226 Creating a directory To do… Use the command… Remarks Create a directory mkdir directory Required Available in user view Removing a directory T

Pagina 160 - Enabling IPv4 NetStream

227 Renaming a file To do… Use the command… Remarks Rename a file rename fileurl-source fileurl-dest Required Available in user view Copying a fil

Pagina 161

228 Emptying the recycle bin To do… Use the command… Remarks Enter the original working directory of the file to be deleted cd { directory | .. | /

Pagina 162

229 CAUTION: • When you format a storage medium, all the files stored on it are erased and cannot be restored. If a startup configuration file exi

Pagina 163

230 The following two partitioning modes are supported on a CF card or a USB disk: • Simple: In this mode, you need to specify the number of partiti

Pagina 164

231 To do… Use the command… Remarks Set the operation prompt mode of the file system file prompt { alert | quiet } Optional The default is alert. E

Pagina 165

232 Configuration file management The device provides the configuration file management function. You can manage configuration files on the user-frie

Pagina 166 - To do… Use the command…

233 system operation. The running configuration is stored in a temporary storage medium. You must save a setting you have made so it can survive a re

Pagina 167 - IPv6 NetStream configuration

234 To do… Use the command… Remarks Enter system view system-view — Enable configuration file encryption configuration encrypt { private-key | pub

Pagina 168

10 more information about the history-command max-size command, see the Fundamentals Command Reference. Configuring the history buffer size Follow the

Pagina 169

235 Setting configuration rollback Configuration rollback Configuration rollback allows you to revert to a previous configuration state based on a sp

Pagina 170

236 prefix_serial number.cfg) to the specified path. The filename of a saved configuration file is like 20080620archive_1.cfg, or 20080620archive_2.c

Pagina 171

237 To do… Use the command… Remarks Enter system view system-view — Enable the automatic saving of the running configuration, and set the interval

Pagina 172 - Configuration considerations

238 CAUTION: Configuration rollback may fail if one of the following situations is present (if a command cannot be rolledback, the system skips it a

Pagina 173 - Configuring the host device

239 To do… Use the command… Remarks Back up the startup configuration file to be used at the next startup to the specified TFTP server backup startu

Pagina 174

240 To do… Use the command… Remarks Restore a startup configuration file to be used at the next startup restore startup-configuration from src-addr

Pagina 175 - Configuring the NSC

241 Software upgrade configuration This chapter includes these sections: • Device software overview • Software upgrade methods • Software upgrade

Pagina 176 - 1. Configure the Device

242 Software upgrade methods The Boot ROM program and system boot file can both be upgraded at the Boot ROM menu or at the command line interface (CL

Pagina 177

243 Upgrading the boot file through a system reboot Centralized device Follow the steps to upgrade the boot file: 1. Save the boot file to the root

Pagina 178

244 Common patches always include the functions of the previous temporary patches. The patch type affects only the patch loading process; the system

Pagina 179

11 To do… Use the command… Remarks Disable the multi-screen display function screen-length disable Required By default, a login user uses the setting

Pagina 180

245 Figure 73 Patches are not loaded to the memory patch area NOTE: Currently, the memory patch area supports up to 200 patches. DEACTIVE state

Pagina 181

246 Figure 75 Patches are activated RUNNING state After you confirm the running of the ACTIVE patches, the state of the patches become RUNNING and

Pagina 182

247 Configuration prerequisites Patches are released per device model. Before patching the system, you need to save the appropriate patch files to th

Pagina 183

248 Step-by-step patch installation task list Task Remarks Configuring the patch file location Optional Loading a patch file Required Activating pa

Pagina 184

249 If you find that an ACTIVE patch is of some problem, reboot the device to deactivate the patch to avoid faults resulting from patch error. Follow

Pagina 185

250 To do… Use the command… Remarks Delete the specified patches from the memory patch area patch delete patch-number Required Displaying and maint

Pagina 186

251 • Set the access parameters for the FTP client (including enabling the FTP server function, setting the FTP username to aaa and password to hell

Pagina 187

252 To check if the upgrade is successful after the device reboots, use the display version command. Hotfix configuration example Network requirement

Pagina 188 - Device management

253 System maintenance and debugging This chapter includes these sections: • Ping • Tracert • System debugging • Ping and tracert configuration e

Pagina 189 - Displaying the system time

254 Tracert Introduction By using the tracert command, you can trace the Layer 3 devices involved in delivering an IP packet from source to destinati

Pagina 190

12 Character Meaning Remarks _ If it is at the beginning or the end of a regular expression, it equals ^ or $. In other cases, it equals comma, space,

Pagina 191

255 Tracert configuration Follow these steps to configure tracert: To do… Use the command… Remarks Enter system view system-view — Display the rou

Pagina 192 - Configuring banners

256 corresponding debugging function, or use the undo debugging all command to disable all the debugging functions. Output of debugging information d

Pagina 193

257 Configuration procedure # Use the ping command to display whether the PC and the SecBlade can reach each other. <SecBlade> ping 1.1.1.1 P

Pagina 194

258 Information center configuration This chapter includes these sections: • Information center configuration • Configuring information center • D

Pagina 195 - Rebooting the device

259 Figure 82 Information center diagram (default) (log file is supported) NOTE: By default, the information center is enabled. An enabled inform

Pagina 196 - Configuring a scheduled task

260 Table 18 Severity description Severity Severity value Description Corresponding keyword in commands Emergency 0 The system is unusable. emergen

Pagina 197

261 Information channel number Default channel name Default output destination Description 8 channel8 Not specified Receives log, trap, and debugg

Pagina 198

262 Output destination Modules allowed LOG TRAP DEBUG Enabled/disabled Severity Enabled/disabled Severity Enabled/disabled Severity Log buffer defaul

Pagina 199

263 PRI (priority) The priority is calculated using the following formula: facility*8+severity, in which facility represents the logging facility nam

Pagina 200

264 Sysname (host name or host IP address) • If the system information is sent to a log host in the format of UNICOM, and the info-center loghost so

Pagina 201

13 Character Meaning Remarks character1\w Matches character1character2. character2 must be a number, letter, or underline, and \w equals [^A-Za-z0-9_]

Pagina 202

265 content This field provides the content of the system information. Configuring information center Information center configuration task list Comp

Pagina 203

266 To do… Use the command… Remarks Configure the format of the time stamp info-center timestamp { debugging | log | trap } { boot | date | none } O

Pagina 204 - NOTE:

267 To do… Use the command… Remarks Configure the output rules of the system information info-center source { module-name | default } channel { chan

Pagina 205 - NTP configuration

268 To do… Use the command… Remarks Specify the source IP address for the log information info-center loghost source interface-type interface-numbe

Pagina 206 - How NTP works

269 To do… Use the command… Remarks Configure the output rules of the system information info-center source { module-name | default } channel { chan

Pagina 207 - NTP message format

270 Outputting system information to the SNMP module NOTE: The SNMP module receives the trap information only, and discards the log and debugging

Pagina 208 - Operation modes of NTP

271 To do… Use the command… Remarks Enable information center info-center enable Optional Enabled by default. Name the channel with a specified cha

Pagina 209 - Broadcast mode

272 To do… Use the command… Remarks Enable the log file feature info-center logfile enable Optional Enabled by default Configure the frequency with

Pagina 210 - NTP configuration task list

273 To do… Use the command… Remarks Move a specified file from a storage medium to the recycle bin delete [ /unreserved ] file-url Remove a folder

Pagina 211

274 Disabling a port from generating link up/down logging information By default, all the ports of the device generate link up/down logging informati

Pagina 212

14 Configuring user privilege and command levels Introduction To avoid unauthorized access, the device defines user privilege levels and command level

Pagina 213 - Configuration prerequisites

275 To do… Use the command… Remarks Reset the log buffer reset logbuffer Available in user view Reset the trap buffer reset trapbuffer Available

Pagina 214 - NTP configuration examples

276 # Configure the information output rule: allow log information of ARP and IP modules with severity equal to or higher than informational to be ou

Pagina 215

277 Figure 84 Network diagram for outputting log information to a Linux log host Configuration procedure Before the configuration, make sure that t

Pagina 216

278 In the above configuration, local5 is the name of the logging facility used by the log host to receive logs. info is the information level. The L

Pagina 217 - SecBlade and Device

279 # Use channel console to output log information to the console (optional, console by default). [SecBlade] info-center console channel console # D

Pagina 218 - Automatic configuration

280 SNMP configuration This chapter includes these sections: • SNMP overview • SNMP configuration task list • Displaying and maintaining SNMP • S

Pagina 219

281 Figure 87 MIB tree SNMP provides the following four basic operations: • Get—The NMS retrieves SNMP object nodes in an agent MIB. • Set—The NM

Pagina 220 - Address acquisition process

282 Configuring SNMP basic parameters SNMPv3 differs from SNMPv1 and SNMPv2c in many aspects. Their configuration procedures are described in separat

Pagina 221 - File types

283 Configuring SNMPv1 or SNMPv2c basic parameters Follow these steps to configure SNMPv1 or SNMPv2c basic parameters: To do… Use the command… Remar

Pagina 222

284 Configuring SNMP logging The SNMP logging function logs the Get requests, Set requests, and Set responses that the NMS has performed on the SNMP

Pagina 223 - TFTP request sending mode

Preface An H3C SecBlade NetStream (referred to as NS hereinafter) card is inserted in an H3C S7500E, S9500E, or S12500 switch, implementing classifica

Pagina 224 - FTP configuration

15 To do… Use the command… Remarks Enter user interface view user-interface { first-num1 [ last-num1 ] | { aux | console | vty } first-num2 [ last-nu

Pagina 225 - Configuring the FTP client

285 Two types of traps are available: generic traps and vendor-specific traps. Generic traps supported on the device include: authentication, coldst

Pagina 226

286 Follow these steps to configure trap parameters: To do… Use the command… Remarks Enter system view system-view — Configure target host attribu

Pagina 227

287 To do… Use the command… Remarks Display MIB view information for an SNMP agent display snmp-agent mib-view [ exclude | include | viewname view-n

Pagina 228

288 With SNMPv1/v2c, specify the read only community, the read and write community, the timeout time, and the number of retries. The user can inquire

Pagina 229 - 10.2.1.1/16

289 [SecBlade] snmp-agent usm-user v3 managev3user managev3group authentication-mode md5 authkey privacy-mode des56 prikey # Configure the contact pe

Pagina 230 - Configuring the FTP server

290 Configuration procedure NOTE: For the configurations for the NMS and SecBlade, see “SNMPv1/SNMPv2c configuration example” and“SNMPv3 configura

Pagina 231

291 NOTE: The system information of the information center can be output to the terminal or to the log buffer. In thisexample, SNMP logs are output

Pagina 232

292 MIB style configuration This chapter includes these sections: • Overview • Setting the MIB style • Displaying and maintaining MIB style Overvi

Pagina 233 - 3. Upgrade SecBlade

293 RMON configuration This chapter includes these sections: • RMON overview • Configuring the RMON statistics function • Configuring the RMON ala

Pagina 234

294 • Using RMON probes. Management devices can obtain management information from RMON probes directly and control network resources. In this appro

Pagina 235 - TFTP configuration

16 To do… Use the command… Remarks Enter system view system-view — Enter user interface view user-interface { first-num1 [ last-num1 ] | { aux | co

Pagina 236 - Configuring the TFTP client

295 Alarm group The RMON alarm group monitors specified alarm variables, such as total number of received packets (etherStatsPkts) on an interface. A

Pagina 237

296 Configuring the RMON statistics function RMON statistics function can be implemented by either the Ethernet statistics group or the history group

Pagina 238

297 NOTE: • The entry-number must be globally unique and cannot be used on another interface; otherwise, the operation fails. • You can configure

Pagina 239 - File management

298 NOTE: • A new entry cannot be created if its parameters are identical with the corresponding parameters of anexisting entry. If the created en

Pagina 240

299 Gather performance statistics on received packets on GigabitEthernet 0/1 through RMON Ethernet statistics table, and thus the administrator can v

Pagina 241 - Performing file operations

300 Gather statistics on received packets on GigabitEthernet 0/1 every one minute through RMON history statistics table, and thus the administrator c

Pagina 242 - Deleting a file

301 fragments : 0 , jabbers : 0 collisions : 0 , utilization : 0 Sampled values of rec

Pagina 243 - Performing batch operations

302 • Connect GigabitEthernet 0/1 to the FTP server. Gather statistics on traffic of the server on GigabitEthernet 0/1 with the sampling interval be

Pagina 244

303 Variable formula : 1.3.6.1.2.1.16.1.1.1.4.1<etherStatsOctets.1> Sampling interval : 5(sec) Rising threshold : 100(linke

Pagina 245 - Setting prompt modes

304 H3C network technology acronyms # A B C D E F G H I K L M N O P Q R S T U V W X Z 3DES Triple Data Encryption Standard 6PE IPv6 Provider Edge A

Pagina 246 - Example for file operations

17 need to re-log in, but the commands that they can execute have changed. For example, if the current user privilege level is 3, the user can configu

Pagina 247 - Configuration file overview

305 AM Analog Modem AMB Active Main Board AMD Answering Machine Detection AMI Alternate Mark Inversion A-MPDU Aggregated MAC Protocol Data Unit AN

Pagina 248 - Introduction

306 BECN Backward Explicit Congestion Notification BERT Bit Error Rate Test BFD Bidirectional Forwarding Detection BGP Border Gateway Protocol BID

Pagina 249

307 CC Continuity Check CC Call Control CCC Circuit Cross Connect CCITT Consultative Committee for International Telegraph and Telephone CCM Contin

Pagina 250 - Configuration task list

308 CoS Class of Service CPE Customer Premises Equipment CPOS Channelized POS CPS Certification Practice Statement CPTone Call Progress Tone CQ Cu

Pagina 251

309 DD Database Description DDN Digital Data Network DDNS Dynamic Domain Name System DDoS Distributed Denial of Service DE Discard Eligibility DED

Pagina 252

310 DS-lite Dual Stack Lite DSP Domain Specific Part DS-TE DiffServ-aware TE DSU Data Service Unit DTE Data Terminal Equipment DTIM Delivery Traf

Pagina 253

311 EFM Ethernet First Mile EGP Exterior Gateway Protocol ENDC EVI Neighbor Discovery Client End-Of-RIB End of Routing-Information-Base ENDP EVI

Pagina 254

312 FEP Front End Processor FF Fixed-Filter FFD Fast Failure Detection FIB Forwarding Information Base FIFO First In First Out FIP FCoE Initiali

Pagina 255

313 GTK Group Temporal Key GTP GPRS Tunneling Protocol GTP-U GPRS Tunneling Protocol User GTP-V0 GPRS Tunneling Protocol V0 GTS Generic Traffic

Pagina 256 - Device software overview

314 ICPIF Calculated Planning Impairment Factor I-DEI Backbone Service Instance Drop Eligibility Indicator IDI Initial Domain Identifier IDN Inte

Pagina 257 - Software upgrade methods

18 When you switch the user privilege level, the information you need to provide varies with combinations of the user interface authentication mode an

Pagina 258 - Basic concepts in hotfix

315 IRDP ICMP Router Discovery Protocol IRF Intelligent Resilient Framework IS Intermediate System ISAKMP Internet Security Association and Key Ma

Pagina 259 - Patch status

316 LDAP Lightweight Directory Access Protocol LDP Label Distribution Protocol LDP ID LDP Identifier LER Label Edge Router LFA Loss of Frame Ali

Pagina 260 - ACTIVE state

317 LSPDU Link State Protocol Data Unit LSR Link State Request LSR Label Switching Router LSU Link State Update LT Linktrace LTM Linktrace Messag

Pagina 261 - RUNNING state

318 MGCP Media Gateway Control Protocol MIB Management Information Base MIC Message Integrity Check MIP Maintenance association Intermediate Point

Pagina 262 - One-step patch installation

319 MSOH Multiplex Section Overhead MSS Maximum Segment Size MST Multiple Spanning Tree MSTI Multiple Spanning Tree Instance MSTP Multiple Spann

Pagina 263 - Activating patches

320 NLRI Network Layer Reachability Information NM Network Management NMFAS Non-Multiframe FAS NMS Network Management Station NMS Network Manageme

Pagina 264 - Deleting patches

321 OSI Open System Interconnection OSPF Open Shortest Path First OU Organization Unit OUI Organizationally Unique Identifier P Return P device P

Pagina 265 - Network requirement

322 Authentication Protocol v2 PEM Power Entry Module PEM Privacy Enhanced Mail PEP Policy Enforcement Point PFC Priority-based Flow Control PFC

Pagina 266

323 PQ Priority Queuing PQL Priority Queue List PRBS Pseudo Random Bit Sequence PRF Pseudo-Random Function PRI Primary Rate Interface PRL Preferr

Pagina 267 - Hotfix configuration example

324 RAI Remote Alarm Indication RALM RADIUS Authenticated Login Using MAC-address RAS Registration, Admission, and Status RB Routing Bridge RBAC

Pagina 268 - Configuring ping

19 Modifying the level of a command All the commands in a view default to different levels. The administrator can change the default level of a comman

Pagina 269 - Tracert

325 RSH Remote Shell RSN Robust Security Network RSNA Robust Security Network Association RSOH Regenerator Section Overhead RSSI Received Signal

Pagina 270 - System debugging

326 SDLC Synchronous Data Link Control SDMF Single Data Message Format SDP Session Description Protocol SDSL Symmetric Digital Subscriber Line SD

Pagina 271

327 SPCS Stored Program Control Switching System SPE Superstratum PE or Service Provider-end PE SPF Shortest Path First SPI Security Parameter In

Pagina 272

328 TCN BPDU Topology Change Notification BPDU TDM Time Division Multiplexing TE Traffic Engineering TEC Thermoelectric Cooler TEDB TE DataBase TFC

Pagina 273 - Information center overview

329 UBR Unspecified Bit Rate UDLD Uni-directional Link Direction UDP User Datagram Protocol UFC Update Fabric Configuration UIM User Identity Mod

Pagina 274

330 VNC Virtual Network Computing VoD Video on Demand VoFR Voice Over Frame Relay VoIP Voice over IP VP Virtual Path VPC Virtual Path Connection

Pagina 275

331 X2T X.25 to TCP Switch XFP 10-Gigabit Small Form-factor Pluggable XML Extensible Markup Language XOT X.25 Over TCP XSD XML Schema Definition

Pagina 276

332 Index A B C D E F G H I K L M N O P R S T U W A ACL configuration example,137 ACL configuration task list,131 ACL overview,129 Alarm group co

Pagina 277 - System information format

333 Configuring the TFTP client,221 Configuring user privilege and command levels,14 Controlling the CLI display,10 D Deleting a startup configurati

Pagina 278 - PRI (priority)

334 Managing files,224 N NetStream sampling and filtering,142 NMS login example,48 NMS login overview,46 NTP configuration examples,199 NTP configur

Pagina 279

20 Login methods This chapter includes these sections: • Login methods • User interface overview Login methods You can log in to a SecBlade card in

Pagina 280

21 One user interface corresponds to one user interface view where you can configure a set of parameters, such as whether to authenticate users at lo

Pagina 281

22 CLI login This chapter includes these sections: • Overview • Logging in through the console port • Logging in through telnet • Displaying and

Pagina 282

23 Object Requirements Terminal Run the hyper terminal program. Configure the hyper terminal attributes. The port properties of the hyper terminal m

Pagina 283

24 NOTE: On Windows 2003 Server operating system, add the HyperTerminal program first, and then log in to andmanage the SecBlade card as described

Pagina 284

Convention Description [ x | y | ... ] * Asterisk marked square brackets enclose optional syntax choices separated by vertical bars, from which you se

Pagina 285

25 Figure 7 Set the properties of the serial port Step3 Turn on the SecBlade card. You are prompted to press Enter if the SecBlade card successful

Pagina 286

26 Console login authentication modes The following authentication modes are available for console port login: none, password, and scheme. • none—Re

Pagina 287 - Managing security logs files

27 To do… Use the command… Remarks Specify the none authentication mode authentication-mode none Required By default, you can log in to the SecBlad

Pagina 288

28 To do… Use the command… Remarks Configure the authentication mode as local password authentication authentication-mode password Required By defau

Pagina 289

29 To do… Use the command… Remarks Enter console user interface view user-interface console first-number [ last-number ] — Specify the scheme authen

Pagina 290 - 1.1.0.1/16 1.2.0.1/16

30 Figure 11 Configuration page Configuring common settings for console login (optional) Follow these steps to configure common settings for consol

Pagina 291

31 To do… Use the command… Remarks Configure the data bits databits { 5 | 6 | 7 | 8 } Optional By default, the data bits of the console port is 8. D

Pagina 292

32 To do… Use the command… Remarks Set the idle-timeout timer idle-timeout minutes [ seconds ] Optional The default idle-timeout is 10 minutes. The

Pagina 293

33 in to the SecBlade card through the console port, enable the telnet server function, and configure the authentication mode, user privilege level,

Pagina 294

34 Configuration procedure Follow these steps to configure none authentication for telnet login: To do… Use the command… Remarks Enter system view

Pagina 295 - SNMP configuration

About the SecBlade NetStream card documentation set The H3C SecBlade NetStream card documentation set includes: Category Documents Purposes Product de

Pagina 296 - SNMP configuration task list

35 By default, you can log in to the SecBlade card through the console port without authentication and have user privilege level 3 after login. For i

Pagina 297 - Configuring SNMPv3

36 Figure 14 Configuration page Configuring scheme authentication for telnet login Configuration prerequisites You have logged in to the SecBlade c

Pagina 298

37 To do… Use the command… Remarks Create a local user and enter local user view local-user user-name By default, no local user exists. Set the loc

Pagina 299 - Configuring SNMP traps

38 Configuring common settings for VTY user interfaces (optional) Follow these steps to configure Common settings for VTY user interfaces: To do… Us

Pagina 300 - Configuring trap parameters

39 To do… Use the command… Remarks Set the idle-timeout timer idle-timeout minutes [ seconds ] Optional The default idle-timeout is 10 minutes for a

Pagina 301

40 Figure 16 Telnet from telnet client to telnet server NOTE: Make sure that the telnet client and telnet server can reach each other. Configur

Pagina 302 - SNMP configuration examples

41 To do… Use the command… Remarks Release a specified user interface free user-interface { num1 | { aux | console | vty } num2 } Available in user

Pagina 303 - SNMPv3 configuration example

42 Logging in to the SecBlade NS card from the host device Logging in to the SecBlade NS card from the host device Before logging in to the SecBlade

Pagina 304 - 1.1.1.1/24

43 To do… Use the command… Remarks Reset the system of the SecBlade NS card • When the host device works in standalone mode: oap reboot slot slot-

Pagina 305

44 4. After the ACSEI server receives a valid registration request, it negotiates parameters with the ACSEI client and establishes connection with t

Pagina 306

i Contents CLI configuration ·························································································································

Pagina 307 - MIB style configuration

45 To do… Use the command… Remarks Display ACSEI client information on the ACSEI server display acsei client info [ client-id ] Available in any vie

Pagina 308 - RMON configuration

46 NMS login This chapter includes these sections: • NMS login overview • Configuring NMS login • NMS login example NMS login overview A Network M

Pagina 309 - RMON groups

47 To do… Use the command… Remarks Enter system view system-view — Enable SNMP agent snmp-agent Optional Disabled by default. You can also enable

Pagina 310 - Private alarm group

48 NOTE: The SecBlade card supports three SNMP versions: SNMPv1, SNMPv2c and SNMPv3. For more information about SNMP, see the System Management an

Pagina 311

49 Type the username and password, and then click Login. The iMC homepage appears, as shown in Figure 19. Figure 19 iMC homepage Log in to the iMC

Pagina 312

50 User login control This chapter includes these sections: • User login control overview • Configuring login control over telnet users • Configur

Pagina 313

51 To do… Use the command… Remarks Exit the basic ACL view quit — Enter user interface view user-interface [ type ] first-number [ last-number ] —

Pagina 314 - XGE4/0/1

52 To do… Use the command… Remarks Enter system view system-view — Create an Ethernet frame header ACL and enter its view acl number acl-number [ m

Pagina 315

53 # Reference ACL 2000 in user interface view to allow telnet users from Host A and Host B to access the SecBlade card. [SecBlade] user-interface vt

Pagina 316

54 To do… Use the command… Remarks Associate the user with the ACL snmp-agent usm-user { v1 | v2c } user-name group-name [ acl acl-number ] snmp-age

Pagina 317

ii Introduction ······································································································································

Pagina 318

55 Interface configuration This chapter includes these sections: • Ethernet interface overview • General configuration • Configuring a Layer 2 Eth

Pagina 319

56 • Null interface: A software-only virtual interface. A null interface is always up and can neither forward data packets nor be configured with an

Pagina 320

57 Configuring basic settings of an Ethernet interface or subinterface Configuring an Ethernet interface You can set an Ethernet interface to operate

Pagina 321

58 NOTE: • To use an Ethernet subinterface to transmit and receive packets, you must associate it with a VLAN. • For the local and remote Etherne

Pagina 322

59 Configuring loopback testing on an Ethernet interface If an Ethernet interface does not work normally, you can enable loopback testing on it to id

Pagina 323

60 Configuring a Layer 2 Ethernet interface or subinterface Layer 2 Ethernet interface or subinterface configuration task list Complete these tasks t

Pagina 324

61 Setting the MDI mode of an Ethernet interface NOTE: Optical interfaces do not support the MDI mode setting. You can use both crossover and str

Pagina 325

62 Task Remarks Setting the MTU for an Ethernet interface or subinterface Optional Applicable to Layer 3 Ethernet interfaces and subinterfaces Config

Pagina 326

63 Displaying and maintaining an Ethernet interface or subinterface To do… Use the command… Remarks Display Ethernet interface or subinterface infor

Pagina 327

64 Configuring the null interface Follow these steps to enter null interface view: To do… Use the command… Remarks Enter system view system-view —

Pagina 328

iii Configuring the null interface ···················································································································

Pagina 329

65 IP addressing configuration This chapter includes these sections: • IP addressing overview • Configuring IP addresses • Displaying and maintain

Pagina 330

66 Class Address range Remarks C 192.0.0.0 to 223.255.255.255 –– D 224.0.0.0 to 239.255.255.255 Multicast addresses. E 240.0.0.0 to 255.255.255.255 R

Pagina 331

67 • With subnetting: Using the first 9 bits of the host-id for subnetting provides 512 (29) subnets. However, only 7 bits remain available for the

Pagina 332

68 Figure 24 Network diagram for IP address configuration Configuration procedure # Assign a primary IP address and a secondary IP address to Gigab

Pagina 333

69 <SecBlade> ping 172.16.2.2 PING 172.16.2.2: 56 data bytes, press CTRL_C to break Reply from 172.16.2.2: bytes=56 Sequence=1 ttl=255 t

Pagina 334

70 IP routing basics configuration This chapter includes these sections: • IP routing overview • Displaying and maintaining a routing table NOTE

Pagina 335

71 Routing table information You can view the brief information of a routing table by using the display ip routing-table command. For example: <S

Pagina 336

72 Criterion Categories Destination address type • Unicast routing protocols—RIP, OSPF, BGP, and IS-IS • Multicast routing protocols—PIM-SM and PIM

Pagina 337

73 Displaying and maintaining a routing table To do… Use the command… Remarks Display brief information about the active routes in the routing table

Pagina 338

74 Static routing configuration This chapter includes these sections: • Introduction • Configuring a static route • Displaying and maintaining st

Pagina 339

iv Introduction to port-based VLAN ···················································································································

Pagina 340

75 In fact, each route lookup operation has to find the next hop to resolve the destination link layer address. When specifying the output interface

Pagina 341

76 Displaying and maintaining static routes To do… Use the command… Remarks Display information of static routes display ip routing-table protocol s

Pagina 342

77 1.1.3.0/24 Static 60 0 1.1.4.2 GE0/1 127.0.0.0/8 Direct 0 0 127.0.0.1 InLoop0 127.0.0.1/

Pagina 343

78 Policy-based routing configuration This chapter includes these sections: • Introduction to policy-based routing • Configuring PBR • Displaying

Pagina 344

79 apply clause The following types of apply clauses are available: apply ip-precedence, apply output-interface, apply ip-address next-hop, apply def

Pagina 345

80 To do… Use the command… Remarks Enter system view system-view –– Create a policy or policy node and enter PBR policy node view policy-based-rou

Pagina 346

81 NOTE: • If an ACL match criterion is defined, packets are matched against the ACL rules, whereas the permit ordeny action of the specified ACL

Pagina 347

82 To do… Use the command… Remarks Enter interface view interface interface-type interface-number — Configure interface PBR ip policy-based-route p

Pagina 348

83 VLAN configuration This chapter includes these sections: • Introduction to VLAN • Configuring basic VLAN settings • Configuring basic settings

Pagina 349

84 3. Flexible virtual workgroup creation. As users from the same workgroup can be assigned to the same VLAN regardless of their physical locations,

Comentarios a estos manuales

Sin comentarios