H3C SR6600 SPE-FWM Configuration manual

Type
Configuration manual
H3C SR6600 Routers
Layer 2 – WAN
Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 20100930-C-1.08
Product Version: SR6600-CMW520-R2420
Copyright © 2007-2010, Hangzhou H3C Technologies Co., Ltd. and its licensors
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , Aolynk, , H
3
Care,
, TOP G, , IRF, NetPilot, Neocean, NeoVTL,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V
2
G, V
n
G, PSPT,
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C SR6600 documentation set includes 13 configuration guides, which describe the software
features for the H3C SR6600 Routers and guide you through the software configuration procedures.
These configuration guides also provide configuration examples to help you apply software features to
different network scenarios.
The Layer 2 – WAN Configuration Guide describes the fundamentals and configuration of ATM, PPP,
frame relay, HDLC, L2TP, and so on.
This preface includes:
z Audience
z Conventions
z About the H3C SR6600 Documentation Set
z Obtaining Documentation
z Documentation Feedback
Audience
This documentation is intended for:
z Network planners
z Field technical support and servicing engineers
z Network administrators working with the SR6600
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold
text represents commands and keywords that you enter literally as shown.
italic
Italic text represents arguments that you replace with actual values.
[ ]
Square brackets enclose syntax choices (keywords or arguments) that are
optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars,
from which you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical
bars, from which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by
vertical bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by
vertical bars, from which you may select multiple choices or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&)
sign can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Boldface
Window names, button names, field names, and menu items are in Boldface.
For example, the
New User
window appears; click
OK
.
>
Multi-level menus are separated by angle brackets. For example,
File
>
Create
>
Folder
.
Symbols
Convention Description
Means reader be extremely careful. Improper operation may cause bodily
injury.
Means reader be careful. Improper operation may cause data loss or damage to
equipment.
Means an action or information that needs special attention to ensure
successful configuration or good performance.
Means a complementary description.
Means techniques helpful for you to make configuration with ease.
Network topology icons
Convention Description
Represents a generic network device, such as a router, switch, or firewall.
Represents a routing-capable device, such as a router or Layer 3 switch.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router
that supports Layer 2 forwarding and other Layer 2 features.
About the H3C SR6600 Documentation Set
The H3C SR6600 documentation set includes:
Category Documents Purposes
Marketing brochures Describe product specifications and benefits.
Technology white papers
Provide an in-depth description of software features
and technologies.
Product description and
specifications
Card datasheets Describe card specifications, features, and standards.
Compliance and safety
manual
Provides regulatory information and the safety
instructions that must be followed during installation.
Installation guide
Provides a complete guide to hardware installation
and hardware specifications.
Hardware specifications
and installation
Card manuals Provide the hardware specifications of cards.
Category Documents Purposes
H3C N68 Cabinet
Installation and Remodel
Introduction
Guides you through installing and remodeling H3C
N68 cabinets.
Configuration guides
Describe software features and configuration
procedures.
Software configuration
Command references Provide a quick reference to all available commands.
H3C SR6608 Release
notes
Operations and
maintenance
H3C SR6602 Release
notes
Provide information about the product release,
including the version history, hardware and software
compatibility matrix, version upgrade information,
technical support information, and software upgrading.
Obtaining Documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents] – Provides hardware installation, software
upgrading, and software feature configuration and maintenance documentation.
[Products & Solutions] – Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download] – Provides the documentation released with
the software version.
Technical Support
customer_service@h3c.com
http://www.h3c.com
Documentation Feedback
You can e-mail your comments about product documentation to inf[email protected].
We appreciate your comments.
i
Table of Contents
1 ATM Configuration ....................................................................................................................................1-1
Introduction to ATM Technology .............................................................................................................1-1
ATM Overview .................................................................................................................................1-1
ATM Architecture.............................................................................................................................1-2
Overview of IPoA, IPoEoA, PPPoA and PPPoEoA Applications............................................................1-3
IPoA.................................................................................................................................................1-3
IPoEoA ............................................................................................................................................1-3
PPPoA .............................................................................................................................................1-3
PPPoEoA.........................................................................................................................................1-3
ATM Service Types.................................................................................................................................1-4
CBR .................................................................................................................................................1-4
rt_VBR .............................................................................................................................................1-4
nrt_VBR ...........................................................................................................................................1-4
UBR .................................................................................................................................................1-4
Introduction to InARP..............................................................................................................................1-4
ATM OAM ...............................................................................................................................................1-5
OAM F5 Loopback...........................................................................................................................1-5
OAM Continuity Check ....................................................................................................................1-5
ATM Configuration Task list....................................................................................................................1-5
Configuring an ATM Interface .................................................................................................................1-6
Configuring an ATM Subinterface...........................................................................................................1-6
Configuring an ATM Subinterface ...................................................................................................1-6
Checking Existence of PVCs When Determining the Protocol State of an ATM P2P
Subinterface ...................................................................................................................................
1-7
Configuring a PVC and the Maximum Number of PVCs Allowed on an Interface..................................1-7
Configuring PVC Parameters ..........................................................................................................1-7
Setting the CLP Bit for ATM Cells ...................................................................................................1-8
Assigning a Transmission Priority to an ATM PVC .........................................................................1-9
Configuring PVC Service Mapping................................................................................................1-10
Configuring the Maximum Number of PVCs Allowed on an ATM Interface..................................1-10
Configuring an ATM Class ....................................................................................................................1-11
Configuring VP Policing ........................................................................................................................1-13
Configuring Applications Carried by ATM.............................................................................................1-13
Configuring IPoA ...........................................................................................................................1-13
Configuring IPoEoA .......................................................................................................................1-14
Configuring PPPoA........................................................................................................................1-15
Configuring PPPoEoA ...................................................................................................................1-16
Displaying and Maintaining ATM ..........................................................................................................1-17
ATM Configuration Examples ...............................................................................................................1-17
IPoA Configuration Example .........................................................................................................1-18
IPoEoA Configuration Example.....................................................................................................1-19
ii
PPPoA Configuration Example .....................................................................................................1-20
PPPoEoA Server Configuration Example .....................................................................................1-22
ATM PVC Transmit Priority Configuration Example......................................................................1-23
Troubleshooting ATM............................................................................................................................1-24
Link State Error in IPoA Application ..............................................................................................1-24
Link Report Error in PPPoA Application ........................................................................................1-24
Ping Failure ...................................................................................................................................1-24
ATM Interface State Error .............................................................................................................1-25
PVC State is Down while ATM Interface State is Up ....................................................................1-25
Ping Failure after PPPoA Configuration........................................................................................1-25
Packet Loss and CRC Errors and Changes of Interface State .....................................................1-26
2 PPP and MP Configuration.....................................................................................................................2-27
Introduction to PPP and MP..................................................................................................................2-27
PPP................................................................................................................................................2-27
MP .................................................................................................................................................2-30
Configuring PPP....................................................................................................................................2-31
Configuring PPP ............................................................................................................................2-31
Configuring PAP Authentication ....................................................................................................2-32
Configuring CHAP Authentication .................................................................................................2-33
Configuring PPP Negotiation.........................................................................................................2-35
Enabling the Generating of PPP Accounting Statistics .................................................................2-38
Configuring MP .....................................................................................................................................2-39
Configuring MP Using a VT Interface............................................................................................2-39
Configuring an MP through an MP-group......................................................................................2-41
Configuring Short Sequence Number Header Format Negotiation...............................................2-41
Configuring MP Endpoint Options .................................................................................................2-42
Configuring PPP Link Efficiency Mechanisms ......................................................................................2-43
Introduction to PPP Link Efficiency Mechanisms ..........................................................................2-43
Configuring PPP Link Efficiency Mechanisms ..............................................................................2-43
Displaying and Maintaining PPP/MP/PPP Link Efficiency Mechanism ................................................2-44
PPP and MP Configuration Examples ..................................................................................................2-44
One-Way PAP Authentication Configuration Example..................................................................2-44
Two-Way PAP Authentication Configuration Example..................................................................2-46
One-Way CHAP Authentication Configuration Example...............................................................2-48
PPP IP Address Negotiation Configuration Example....................................................................2-50
MP Configuration Example............................................................................................................2-51
MP Binding Mode Configuration Examples...................................................................................2-54
Troubleshooting PPP Configuration......................................................................................................2-61
3 PPPoE Configuration ..............................................................................................................................3-63
Introduction to PPPoE...........................................................................................................................3-63
Configuring a PPPoE Server ................................................................................................................3-64
Displaying and Maintaining PPPoE ......................................................................................................3-65
PPPoE Configuration Example .............................................................................................................3-65
PPPoE Server Configuration Example..........................................................................................3-65
iii
4 L2TP Configuration .................................................................................................................................4-67
L2TP Overview......................................................................................................................................4-67
Introduction....................................................................................................................................4-67
Typical L2TP Networking Application............................................................................................4-68
Basic Concepts of L2TP ................................................................................................................4-69
L2TP Tunneling Modes and Tunnel Establishment Process ........................................................4-70
L2TP Features...............................................................................................................................4-73
Protocols and Standards ...............................................................................................................4-73
L2TP Configuration Task List................................................................................................................4-73
Configuring Basic L2TP Capability .......................................................................................................4-74
Configuring an LAC...............................................................................................................................4-75
Configuring an LAC to Initiate Tunneling Requests for Specified Users.......................................4-75
Configuring an LAC to Transfer AVP Data in Hidden Mode .........................................................4-75
Configuring AAA Authentication of VPN Users on LAC Side........................................................4-76
Configuring an LNS...............................................................................................................................4-77
Creating a Virtual Interface Template............................................................................................4-77
Configuring the Local Address and the Address Pool for Allocation.............................................4-77
Configuring an LNS to Grant Certain L2TP Tunneling Requests .................................................4-78
Configuring User Authentication on an LNS .................................................................................4-79
Configuring AAA Authentication of VPN Users on LNS Side........................................................4-80
Enabling L2TP Multi-Instance .......................................................................................................4-81
Specifying to Send ACCM.............................................................................................................4-81
Configuring L2TP Connection Parameters ...........................................................................................4-82
Configuring L2TP Tunnel Authentication.......................................................................................4-82
Setting the Hello Interval ...............................................................................................................4-82
Enabling Tunnel Flow Control .......................................................................................................4-83
Disconnecting Tunnels by Force ...................................................................................................4-83
Displaying and Maintaining L2TP .........................................................................................................4-83
L2TP Configuration Examples ..............................................................................................................4-83
NAS-Initiated VPN .........................................................................................................................4-84
Client-Initiated VPN .......................................................................................................................4-86
L2TP Multi-Domain Application .....................................................................................................4-87
Complicated Network Application..................................................................................................4-91
Troubleshooting L2TP...........................................................................................................................4-91
5 L2TP-Based EAD Configuration.............................................................................................................5-93
L2TP-Based EAD Overview..................................................................................................................5-93
L2TP-Based EAD Configuration Example ............................................................................................5-94
Network Requirements ..................................................................................................................5-94
Configuration Procedure................................................................................................................5-95
6 HDLC Configuration................................................................................................................................6-97
Introduction to HDLC.............................................................................................................................6-97
HDLC Overview.............................................................................................................................6-97
HDLC Frame Format and Frame Type .........................................................................................6-97
Enabling HDLC on an Interface ............................................................................................................6-98
Configuring an IP Address for an Interface...........................................................................................6-98
iv
Configuring the Link State Polling Interval............................................................................................6-99
HDLC Configuration Examples .............................................................................................................6-99
Basic HDLC Configuration Example .............................................................................................6-99
HDLC in Conjunction with IP Unnumbered Interface Configuration Example ............................6-100
7 HDLC Link Bundling Configuration.....................................................................................................7-103
Overview .............................................................................................................................................7-103
Basic Concepts of HDLC Link Bundling ......................................................................................7-103
How HDLC Link Bundling Works.................................................................................................7-104
Configuring an HDLC Link Bundle Interface.......................................................................................7-105
Assigning an Interface to an HDLC Link Bundle.................................................................................7-107
Displaying and Maintaining HDLC Link Bundling ...............................................................................7-108
HDLC Link Bundling Configuration Example ......................................................................................7-108
8 Frame Relay Configuration...................................................................................................................8-111
Overview .............................................................................................................................................8-111
Frame Relay Interface Types ......................................................................................................8-111
Virtual Circuit ...............................................................................................................................8-112
Data Link Connection Identifier ...................................................................................................8-112
Frame Relay Address Mapping...................................................................................................8-113
LMI Protocol ................................................................................................................................8-113
Typical Application Scenarios .....................................................................................................8-114
Frame Relay Configuration Task List..................................................................................................8-115
Configuring DTE Side Frame Relay....................................................................................................8-115
Configuring Basic DTE Side Frame Relay ..................................................................................8-115
Configuring Frame Relay Address Mappings..............................................................................8-116
Configuring a Frame Relay Local Virtual Circuit .........................................................................8-117
Configuring a Frame Relay Subinterface ....................................................................................8-117
Configuring DCE Side Frame Relay ...................................................................................................8-118
Configuring Basic DCE Side Frame Relay..................................................................................8-118
Configuring Frame Relay Address Mappings..............................................................................8-119
Configuring Frame Relay Local Virtual Circuit ............................................................................8-119
Configuring Frame Relay Subinterface .......................................................................................8-119
Configuring Frame Relay Switching ............................................................................................8-119
Enabling the Trap Function.................................................................................................................8-120
Displaying and Maintaining Frame Relay ...........................................................................................8-121
Frame Relay Configuration Examples ................................................................................................8-121
Connecting LANs through a Frame Relay Network ....................................................................8-121
Connecting LANs with a Dedicated Line .....................................................................................8-122
Troubleshooting Frame Relay.............................................................................................................8-124
9 Multilink Frame Relay Configuration...................................................................................................9-125
Overview .............................................................................................................................................9-125
Configuring Multilink Frame Relay ......................................................................................................9-126
Configuring an MFR Bundle ........................................................................................................9-126
Configuring an MFR Bundle Link ................................................................................................9-127
Displaying and Maintaining Multilink Frame Relay .............................................................................9-127
Multilink Frame Relay Configuration Examples ..................................................................................9-127
v
MFR Direct Connection Configuration Example .........................................................................9-127
MFR Switched Connection Configuration Example ....................................................................9-128
10 Modem Management Configuration ................................................................................................10-131
Overview ...........................................................................................................................................10-131
Modem Management Configuration..................................................................................................10-131
Setting the Modem Answer Mode .............................................................................................10-132
Issuing an AT Command to a Modem.......................................................................................10-132
Troubleshooting ................................................................................................................................10-132
11 Index ...................................................................................................................................................11-134
1-1
1 ATM Configuration
This chapter includes these sections:
z Introduction to ATM Technology
z Overview of IPoA, IPoEoA, PPPoA and PPPoEoA Applications
z ATM Service Types
z ATM Configuration Task list
z Configuring an ATM Interface
z Configuring an ATM Subinterface
z Configuring a PVC and the Maximum Number of PVCs Allowed on an Interface
z Configuring an ATM Class
z Configuring VP Policing
z Configuring Applications Carried by ATM
z Displaying and Maintaining ATM
z ATM Configuration Examples
z Troubleshooting ATM
Introduction to ATM Technology
ATM Overview
Asynchronous Transfer Mode (ATM) is a technology based on the packet switching mode while
incorporating the high speed of the circuit switching mode. It can accommodate various
communications services. ATM was specified as a broadband ISDN transmission and switching mode
by the International Telecommunication Union Telecommunication Standardization Sector (ITU-T) in
June 1992. Due to its flexibility and support for multimedia services, it is regarded as the core
technology to implement broadband communications.
As defined by the ITU-T, data is encapsulated in cells in ATM. Each ATM cell is 53 bytes in length, of
which 5 bytes is the cell header and the remaining 48 bytes are the payload. The major function of the
cell header is to identify virtual connection, with limited functions on flow control, congestion control and
error control.
ATM is connection-oriented and ATM connections are logical connections, or virtual connections (VCs).
Each VC is identified by a pair of virtual path identifier (VPI) and virtual channel identifier (VCI). VPI/VCI
assignment has only local significance. Thus the VPI and VCI are translated at each ATM node and are
unique only for a given physical link. When a connection is released, all the involved VPI/VCI pairs are
reclaimed for new connections.
Currently, ATM interfaces only support permanent virtual circuits (PVCs).
1-2
ATM Architecture
ATM has a three-dimensional architecture. It consists of three planes: user plane, control plane, and
management plane. Both the user plane and the control plane are divided into four layers, namely,
physical layer, ATM layer, ATM Adaptation Layer (AAL), and upper layer, each of which are further
divided into sub-layers.
z The control plane takes the charge of establishing and tearing down connections using signaling
protocols.
z The management plane consists of layer management and plane management. The former takes
charge of managing the layers in each plane and has a layered structure corresponding to other
planes. The latter is responsible for system management and communications between different
planes.
The following figure illustrates the relationships between layers and planes in ATM.
Figure 1-1 ATM architecture
The functions of the four ATM layers are as follows:
z The physical layer mainly provides transmission channels for ATM cells. At this layer, cells passed
from the ATM layer become continuous bit stream after transmission overheads are added to them.
In addition, continuous bit streams received from the physical media are restored to cells on this,
which are then passed to the ATM layer.
z The ATM layer, residing over the physical layer, implements cell-based communication with peer
layers by invoking the services provided by the physical layer. It is independent of physical media
and the implementation of the physical layer, as well as the types of the services being carried.
Data passed to this layer takes the form of 48-byte payloads, known as segmentation and
reassembly protocol data units (SAR-PDUs); and data passed from this layer to the physical layer
is 53-byte cells, with the 48-byte payload being encapsulated in a 5-byte header. Other functions of
the ATM layer include VPI/VCI transmission, cell multiplexing/demultiplexing, and generic flow
control.
z ATM Adaptation Layer (AAL) provides interfaces between high-level protocols and the ATM Layer.
It is responsible for forwarding the information between ATM layer and upper layer protocols. At
present, four types of AAL are available: AAL1, AAL2, AAL3/4, and AAL5, each of which supports
1-3
specific services provided in an ATM network. Most ATM equipment vendors adopt AAL5 for data
communication services.
z ATM upper layer protocols take charge of WAN interconnection, voice interconnection, Layer 3
interconnection, encapsulation, LAN emulation, multi-protocol over ATM, and traditional IP.
Overview of IPoA, IPoEoA, PPPoA and PPPoEoA Applications
ATM interfaces support the IPoA, IPoEoA, PPPoA and PPPoEoA applications.
IPoA
IP over ATM (IPoA) enables ATM to carry IP packets. In an IPoA implementation, ATM serves as the
data link layer protocol for the IP hosts on the same network. To enable these hosts to communicate
across an ATM network, IP packets must be encapsulated in ATM cells.
By making full use of the advantages of ATM, IPoA delivers excellent network performance and
ubiquitous mature QoS assurance.
IPoEoA
IPoE over ATM (IPoEoA) adopts a three-layer architecture, with IP encapsulation at the uppermost layer,
IP over Ethernet (IPoE) in the middle, and IPoEoA at the bottom.
IPoEoA is suitable where Ethernet packets are to be forwarded through ATM interfaces. In IPoEoA
applications, you can associate multiple PVCs with one virtual Ethernet (VE) interface and PVCs
associated with the same VE interface are interconnected at Layer 2.
PPPoA
PPP over ATM (PPPoA) enables ATM to carry PPP protocol packets. With PPPoA, PPP packets, in
which IP packets or other protocols’ packets can be encapsulated, are encapsulated in ATM cells. In this
way, ATM may be simply viewed as the carrier of PPP packets. As the communication process of
PPPoA is managed by PPP, PPPoA also features the flexibility and comprehensive applications of PPP.
To transmit PPP packets through ATM, a virtual template (VT) interface is required.
PPPoEoA
PPPoE over ATM (PPPoEoA) enables ATM to carry PPPoE (PPP over Ethernet) protocol packets. With
PPPoEoA, Ethernet packets are encapsulated in ATM cells, through which you can use a PVC to
simulate all the functions of Ethernet. To allow ATM to carry Ethernet frames, the interface management
module provides a new type of virtual Ethernet (VE) interface. This type of VE interface has Ethernet
characteristics and can be dynamically created through configuration commands. The following is the
protocol stack adopted by the VE interface:
z ATM PVC (the bottom layer)
z Ethernet (the link layer)
z Network layer and other upper layers (the same as those for common Ethernet interfaces)
1-4
ATM Service Types
ATM supports four service types: constant bit rate (CBR), unspecified bit rate (UBR), real-time variable
bit rate (rt_VBR) and non-real-time variable bit rate (nrt_VBR). They are used for the QoS purpose.
CBR
CBR provides ensured, constant bandwidth. The bandwidth assigned to the CBR service is decided by
the peak cell rate (PCR). For a station using the CBR service, ATM cells are sent at PCR continuously
with assured QoS.
Usually, CBR is suitable for jitter-sensitive real-time applications such as audio and video.
rt_VBR
The rt_VBR service is provided for applications that have strict restrictions on delay and jitter, such as
audio and video.
An rt_VBR connection is described by the PCR, sustainable cell rate (SCR) and maximum burst size
(MBS). A station using the rt_VBR service is allowed to send burst traffic at PCR with the maximum
traffic size being MBS without packet loss while the average cell rate being SCR.
nrt_VBR
The nrt_VBR service supports non-real-time applications with burst traffic. An nrt_VBR connection is
described by PCR, SCR and MBS. The nrt_VBR service is suitable for applications that are sensitive to
cell loss but not to delay.
UBR
The UBR service does not make any service quality commitment, guaranteeing neither CLR nor cell
delay. When traffic congestion occurs, cells of the UBR service are always dropped first. The UBR
service is suitable for applications that have low requirements for delay and bandwidth.
Introduction to InARP
On an ATM PVC connection, you can use the Inverse Address Resolution Protocol (InARP) to obtain
the IP address of the remote end connected to the PVC. Thus, you do not need to manually configure
the IP address of the remote end. The following figure shows how InARP works:
1-5
Figure 1-2 Inverse address resolution procedure of InARP
ATM OAM
OAM stands for Operation And Maintenance in the ITU-T I.610 recommendation (02/99) and Operation
Administration and Maintenance in LUCENT APC User Manual (03/99).
Whichever expansion is adopted, OAM provides a way of detecting faults, isolating faults, and
monitoring network performance without interrupting ongoing services. By inserting OAM cells, which
are constructed in the standard ATM cell format, in cell streams, you can obtain specific information
about the network.
OAM F5 Loopback
The OAM F5 loopback function of ATM works as follows on a PVC:
Each side of the PVC sends OAM cells to its peer periodically. On receiving an OAM cell from the
sender, the receiver returns the OAM cell to the sender. If the sender receives the cell within the
specified period, it considers the PVC as normal. If the sender fails to receive a certain number of
consecutive OAM cells sent by itself, the PVC is considered as faulty.
Two approaches are available for implementing the OAM F5 Loopback function: manual (OAMPing)
and auto (OAM Frequency). In the OAMPing approach, you need to send OAM cells manually; this
approach is usually used for diagnosis. In the OAM Frequency approach, you need to configure an ATM
interface to send OAM cells regularly at a certain interval; this approach is usually used for automatic
link status checking.
OAM Continuity Check
When enabled, the OAM Continuity Check (CC) function periodically sends OAM cells to check whether
a connection is idle or has failed.
OAM CC works as follows on a PVC:
One side of the PVC sends OAM cells to its peer, which checks the connection status based on these
OAM cells.
ATM Configuration Task list
Complete these tasks to configure ATM:
1-6
Task Remarks
Configuring an ATM Interface Required
Configuring an ATM Subinterface
Configuring an ATM
Subinterface
Checking Existence of PVCs When Determining
the Protocol State of an ATM P2P Subinterface
Optional
Configuring PVC Parameters Required
Assigning a Transmission Priority to an ATM
PVC
Optional
Configuring PVC Service Mapping Optional
Configuring a PVC and the
Maximum Number of PVCs
Allowed on an Interface
Configuring the Maximum Number of PVCs
Allowed on an ATM Interface
Optional
Configuring an ATM Class Optional
Configuring VP Policing Optional
Configuring IPoA
Configuring IPoEoA
Configuring PPPoA
Configuring Applications
Carried by ATM
Configuring PPPoEoA
Required
Use one of the
approaches.
Configuring an ATM Interface
Depending on the actual networking environment and system requirements, you may be required to
modify certain parameters of an ATM interface.
Note that except the mtu command, which can be configured on a subinterface, the ATM settings in this
section must be modified in ATM main interface view, although they apply to the ATM main interface and
subinterfaces at the same time.
For more information about ATM interface configuration, see ATM Interface Configuration in the
Interface Configuration Guide.
Configuring an ATM Subinterface
Configuring an ATM Subinterface
Follow these steps to configure an ATM subinterface:
To do… Use the command… Remarks
Enter system view
system-view
—
Create an ATM subinterface and
enter its view
interface atm
interface-number.subnumber
[
p2mp
|
p2p
]
Required
By default, the type of a
subinterface is point-to-multipoint
(p2mp).
1-7
To do… Use the command… Remarks
Set the MTU for the ATM
subinterface
mtu
mtu-number
Optional
1500 bytes by default
Shut down the ATM interface
shutdown
Optional
By default, an ATM interface is up.
The keywords p2mp and p2p are available with the interface atm interface-number.subnumber only
when you are creating an ATM subinterface. If you are entering an existing ATM subinterface, the two
keywords are not available.
Checking Existence of PVCs When Determining the Protocol State of an ATM P2P
Subinterface
Follow these steps to check existence of PVCs when determining the protocol state of an ATM P2P
subinterface:
To do… Use the command… Remarks
Enter system view
system-view
—
Create an ATM subinterface and
enter its view
interface atm
interface-number.subnumber
p2p
Required
By default, the subinterface is
configured as point-to-multipoint
(p2mp).
Check existence of PVCs when
determining the protocol state of
the ATM P2P subinterface
atm-link check
Required
By default, the protocol state of the
ATM P2P subinterface is
consistent with the state of the
physical interface.
Configuring a PVC and the Maximum Number of PVCs Allowed on
an Interface
Configuring PVC Parameters
Follow these steps to configure PVC parameters:
To do... Use the command… Remarks
Enter system view
system-view
—
Enter ATM interface view or ATM
subinterface view
interface atm
{ interface-number |
interface-number.subnumber }
—
Create a PVC and enter PVC view
pvc
{ pvc-name [ vpi/vci ] |
vpi/vci }
Required
By default, no PVC is created.
1-8
To do... Use the command… Remarks
Set the AAL5 encapsulation protocol
type for the specified PVC
encapsulation
aal5-encap
Optional
By default, aal5snap encapsulation
is adopted.
Start transmission and retransmission
detection of operations,
administration, and maintenance
(OAM) F5 Loopback cells
oam frequency
frequency [
up
up-count
down
down-count
retry-frequency
retry-frequency ]
Optional
By default, OAM F5 Loopback cell
transmission is disabled. However,
if an OAM F5 Loopback cell is
received, it should be responded.
By default, up-count is 3,
down-count is 5 and
retry-frequency is 1 second.
Set the parameters for alarm
indication signal (AIS)/ remote defect
indication (RDI) alarm cell detection
oam ais-rdi
up
up-count
down
down-count
Optional
By default, AIS/RDI alarm cell
detection is enabled, which means
the PVC goes down when the
number of AIS/RDI alarm cells
received reaches down-count and
goes up if no AIS/RDI alarm cell is
received in a period specified by
the up-count argument (in
seconds).
Set the PVC’s
service type to
constant bit rate
(CBR)
service cbr
output-pcr [
cdvt
cdvt-value ]
Set the PVC’s
service type to
unspecified bit
rate (UBR), and
set the
rate-related
parameters
service ubr
output-pcr
Set the PVC’s
service type to
variable bit
rate-non real
time (nrt_VBR),
and set the
rate-related
parameters
service vbr-nrt
output-pcr
output-scr output-mbs
Set the PVC
service type and
the rate-related
parameters
Set the PVC’s
service type to
variable bit
rate-real time
(rt_VBR), and
set the
rate-related
parameters
service vbr-rt
output-pcr
output-scr output-mbs
Optional
By default, the service type of a
PVC is UBR.
The CDVT is 500μs by default.
You can use these four commands
to set the service type and the
parameters concerning
transmission rate. Note that a
newly configured service type
overwrites the existing one.
Setting the CLP Bit for ATM Cells
By setting the Cell Loss Priority (CLP) bit in ATM cells, you can redefine the drop probability of ATM cells
when the network becomes congested.
Follow these steps to set the CLP bit for ATM cells:
1-9
To do… Use the command… Remarks
Enter system view
system-view
—
Create a class and enter class view
traffic classifier
tcl-name
[
operator
{
and
|
or
} ]
—
Configure the match criteria
if-match
[
not
]
match-criteria
—
Quit to system view
quit
—
Create a traffic behavior and enter
traffic behavior view
traffic behavior
behavior-name
—
Set the cell loss priority (CLP) bit
for ATM cells
remark atm-clp
atm-clp-value
Optional
The CLP bit of ATM cells is 0 or 1.
When congestion occurs, ATM
cells with CLP bit 1 are dropped
preferentially.
Quit to system view
quit
—
Create a policy and enter policy
view
qos policy
policy-name
—
Associate the class with the traffic
behavior in the policy
classifier
tcl-name
behavior
behavior-name
—
Quit to system view
quit
—
Enter ATM interface or
subinterface view
interface atm
{ interface-number |
interface-number.subnumber }
—
Create a PVC and enter PVC view
pvc
{ pvc-name [ vpi/vci ] | vpi/vci }
Required
By default, no PVC is created.
Apply the QoS policy on the PVC
qos apply policy
policy-name
{
inbound
|
outbound
}
Required
For more information about classes, traffic behaviors, and policies, see QoS in the ACL and QoS
Configuration Guide.
Assigning a Transmission Priority to an ATM PVC
You can assign transmission priorities to ATM PVCs associated with the UBR, rt_VBR, or nrt_VBR
service. At the time of bandwidth allocation, the PVC with higher priority has priority over other PVCs.
Follow these steps to assign a transmission priority to an ATM PVC:
To do… Use the command… Remarks
Enter system view
system-view
—
Enter ATM subinterface view
interface atm
{ interface-number |
interface-number.subnumber }
—
Create a PVC and enter PVC view
pvc
{ pvc-name [ vpi/vci ] | vpi/vci } —
1-10
To do… Use the command… Remarks
Assign a transmission priority to
the ATM PVC
transmit-priority
value
Optional
By default, the priority value is 0 for
the UBR service, 5 for the nrt_VBR
service and 8 for the rt_VBR.
Currently, you can assign transmission priorities to ATM PVCs only on a MIM-ATM card.
Configuring PVC Service Mapping
PVC service mapping allows different PVCs from the same PVC-Group to carry IP packets of different
priorities.
Follow these steps to configure PVC service mapping:
To do... Use the command... Remarks
Enter system view
system-view
—
Enter ATM subinterface view
interface atm
{ interface-number |
interface-number.subnumber }
—
Create PVC, and enter its view
pvc
{ pvc-name [ vpi/vci ] | vpi/vci }—
Quit to ATM interface view
quit
—
Create a PVC group and enter
PVC group view
pvc-group
{ pvc-name [ vpi/vci ] |
vpi/vci }
Required
Make sure that the PVC specified
by the pvc-name or vpi/vci
argument already exists.
Add a PVC to the PVC-Group
pvc
{ pvc-name [ vpi/vci ] | vpi/vci } Optional
Set the priority of the IP packets
carried on PVC
ip-precedence
{ pvc-name
[ vpi/vci ] | vpi/vci } { min [ max ] |
default
}
Optional
z A primary PVC refers to the one based on which a PVC-group is created on an ATM interface.
z A secondary PVC refers to a PVC created in a PVC-group.
Configuring the Maximum Number of PVCs Allowed on an ATM Interface
Follow these steps to configure the maximum number of PVCs allowed on an ATM interface:
To do… Use the command… Remarks
Enter system view
system-view
—
Enter ATM interface view
interface atm
interface-number —
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145

H3C SR6600 SPE-FWM Configuration manual

Type
Configuration manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI