H3C WA Series Configuration manual

Type
Configuration manual
H3C WA Series WLAN Access Points
Layer 2 – LAN Switching Configuration Guide
Hangzhou H3C Technologies Co., Ltd.
http://www.h3c.com
Document Version: 6W100-20100910
Copyright © 2010, Hangzhou H3C Technologies Co., Ltd. and its licensors
All Rights Reserved
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
H3C, , Aolynk, , H
3
Care,
, TOP G, , IRF, NetPilot, Neocean, NeoVTL,
SecPro, SecPoint, SecEngine, SecPath, Comware, Secware, Storware, NQA, VVG, V
2
G, V
n
G, PSPT,
XGbus, N-Bus, TiGem, InnoVision and HUASAN are trademarks of Hangzhou H3C Technologies Co.,
Ltd.
All other trademarks that may be mentioned in this manual are the property of their respective owners.
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
The H3C WA documentation set includes 10 configuration guides, which describe the software features
for the H3C WA series WLAN access points and guide you through the software configuration
procedures. These configuration guides also provide configuration examples to help you apply the
software features to different network scenarios.
The Layer 2 – LAN Switching Configuration Guide describes Ethernet interface, loopback and null
interfaces, VLAN, MAC address table, and MSTP configurations.
This preface includes:
z Audience
z Conventions
z About the H3C WA Documentation Set
z Obtaining Documentation
z Documentation Feedback
Audience
This documentation is intended for:
z Network planners
z Field technical support and servicing engineers
z Network administrators working with the WA series
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold
text represents commands and keywords that you enter literally as shown.
italic
Italic text represents arguments that you replace with actual values.
[ ]
Square brackets enclose syntax choices (keywords or arguments) that are
optional.
{ x | y | ... }
Braces enclose a set of required syntax choices separated by vertical bars,
from which you select one.
[ x | y | ... ]
Square brackets enclose a set of optional syntax choices separated by vertical
bars, from which you select one or none.
{ x | y | ... } *
Asterisk marked braces enclose a set of required syntax choices separated by
vertical bars, from which you select at least one.
[ x | y | ... ] *
Asterisk marked square brackets enclose optional syntax choices separated by
vertical bars, from which you may select multiple choices or none.
&<1-n>
The argument or keyword and argument combination before the ampersand (&)
sign can be entered 1 to n times.
Convention Description
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Boldface
Window names, button names, field names, and menu items are in Boldface.
For example, the
New User
window appears; click
OK
.
>
Multi-level menus are separated by angle brackets. For example,
File
>
Create
>
Folder
.
Symbols
Convention Description
Means reader be extremely careful. Improper operation may cause bodily
injury.
Means reader be careful. Improper operation may cause data loss or damage to
equipment.
Means an action or information that needs special attention to ensure
successful configuration or good performance.
Means a complementary description.
Means techniques helpful for you to make configuration with ease.
About the H3C WA Documentation Set
The H3C WA documentation set includes:
Category Documents Purposes
Marketing brochures Describe product specifications and benefits.
Product
description and
specifications
Technology white papers
Provide an in-depth description of software features and
technologies.
Compliance and safety
manual
Provides regulatory information and the safety instructions
that must be followed during installation.
Quick start
Guides you through initial installation and setup procedures to
help you quickly set up and use your AP with the minimum
configuration.
Hardware
specifications
and installation
Installation guide
Guides you through hardware specifications and installation
methods to help you install your AP.
Getting started guide
Guides you through the main functions of your AP, and
describes how to install and log in to your AP, perform basic
configurations, maintain software, and troubleshoot your AP.
Configuration guides Describe software features and configuration procedures.
Software
configuration
Command references Provide a quick reference to all available commands.
Category Documents Purposes
User FAQ
Provides answers to some of the most frequently asked
questions on how to troubleshoot your AP.
Operations and
maintenance
Release notes
Provide information about the product release, including the
version history, hardware and software compatibility matrix,
version upgrade information, technical support information,
and software upgrading.
Obtaining Documentation
You can access the most up-to-date H3C product documentation on the World Wide Web at
http://www.h3c.com.
Click the links on the top navigation bar to obtain different categories of product documentation:
[Technical Support & Documents > Technical Documents] – Provides hardware installation, software
upgrading, getting started, and software feature configuration and maintenance documentation.
[Products & Solutions] – Provides information about products and technologies, as well as solutions.
[Technical Support & Documents > Software Download] – Provides the documentation released with
the software version.
Documentation Feedback
You can e-mail your comments about product documentation to inf[email protected].
We appreciate your comments.
i
Table of Contents
1 Applicable Models and Software Versions·····························································································1-1
2 Feature Matrix············································································································································2-1
3 Command/Parameter Matrix·····················································································································3-1
4 Ethernet Interface Configuration ·············································································································4-1
General Ethernet Interface Configuration ·······························································································4-1
Configuring Basic Settings of an Ethernet Interface ·······································································4-1
Configuring Flow Control on an Ethernet Interface ·········································································4-2
Configuring Loopback Testing on an Ethernet Interface·································································4-2
Configuring a Layer 2 Ethernet Interface ································································································4-3
Layer 2 Ethernet Interface Configuration Task List·········································································4-3
Configuring Storm Suppression ······································································································4-3
Setting the Interface Statistics Polling Interval ················································································4-4
Enabling Loopback Detection on an Ethernet Interface··································································4-4
Displaying and Maintaining an Ethernet Interface ··················································································4-5
5 Loopback and Null Interface Configuration····························································································5-1
Loopback Interface··································································································································5-1
Introduction to Loopback Interface ··································································································5-1
Configuring a Loopback Interface ···································································································5-1
Null Interface ···········································································································································5-2
Introduction to Null Interface ···········································································································5-2
Configuring Interface Null 0·············································································································5-2
Displaying and Maintaining Loopback and Null Interfaces ·····································································5-3
6 MAC Address Table Configuration··········································································································6-1
Overview ·················································································································································6-1
How a MAC Address Table Entry Is Created··················································································6-1
Types of MAC Address Table Entries ·····························································································6-2
MAC Address Table-Based Frame Forwarding ··············································································6-2
Configuring a MAC Address Table ·········································································································6-3
Configuring MAC Address Entries···································································································6-3
Disabling MAC Address Learning ···································································································6-4
Configuring the Aging Timer for Dynamic MAC Address Entries····················································6-5
Configuring the MAC Learning Limit on a Port················································································6-5
Displaying and Maintaining MAC Address Tables··················································································6-6
MAC Address Table Configuration Example ··························································································6-6
7 MSTP Configuration··································································································································7-1
Overview ·················································································································································7-1
Introduction to STP··························································································································7-1
How STP works ·······························································································································7-3
Introduction to RSTP ·······················································································································7-9
ii
Introduction to MSTP·······················································································································7-9
Protocols and Standards ···············································································································7-14
Configuration Task List ·························································································································7-14
Configuring MSTP·································································································································7-15
Configuring an MST Region ··········································································································7-15
Configuring the Root Bridge or a Secondary Root Bridge ····························································7-16
Configuring the MSTP Work Mode of the AP················································································7-17
Configuring the Priority of the AP ··································································································7-18
Configuring the Maximum Hops of an MST Region······································································7-18
Configuring the Network Diameter of a Switched Network ···························································7-19
Configuring Timers of MSTP ·········································································································7-19
Configuring the Timeout Factor·····································································································7-21
Configuring the Maximum Port Rate ·····························································································7-21
Configuring Ports as Edge Ports ···································································································7-22
Configuring the Path Costs of Ports ······························································································7-22
Configuring Port Priority ················································································································7-24
Configuring the Link Type of Ports ································································································7-25
Configuring the Mode a Port Uses to Recognize/Send MSTP Packets········································7-25
Enabling MSTP······························································································································7-26
Performing mCheck·······················································································································7-27
Configuring Digest Snooping·········································································································7-28
Configuring No Agreement Check·································································································7-30
Configuring Protection Functions ··································································································7-32
Displaying and Maintaining MSTP ········································································································7-34
MSTP Configuration Example···············································································································7-35
8 VLAN Configuration ··································································································································8-1
Introduction to VLAN·······························································································································8-1
VLAN Overview ·······························································································································8-1
VLAN Fundamentals ·······················································································································8-2
Types of VLAN ································································································································8-3
Configuring Basic VLAN Settings ···········································································································8-3
Configuring Basic Settings of a VLAN Interface ·····················································································8-4
Port-Based VLAN Configuration ·············································································································8-5
Introduction to Port-Based VLAN ····································································································8-5
Assigning an Access Port to a VLAN ······························································································8-6
Assigning a Trunk Port to a VLAN···································································································8-7
Assigning a Hybrid Port to a VLAN ·································································································8-8
MAC-Based VLAN Configuration············································································································8-8
Introduction to MAC-Based VLAN···································································································8-8
Configuring a MAC Address-Based VLAN ······················································································8-9
Displaying and Maintaining VLAN·········································································································8-10
VLAN Configuration Example ···············································································································8-10
9 Index ···························································································································································9-1
1-1
z The models listed in this document are not applicable to all regions. Please consult your local sales
office for the models applicable to your region.
z Read this chapter before using an H3C WA series WLAN access point.
1 Applicable Models and Software Versions
H3C WA series WLAN access points include the WA2200 series and WA2600 series. Table 1-1 shows
the applicable models and software versions.
Table 1-1 Applicable models and software versions
Series Model Software version
WA2210-AG
WA2200 series access
points (indoors)
WA2220-AG
WA2210X-G
WA2200 series
WA2200 series access
points (outdoors)
WA2220X-AG
R 1115
WA2610-AGN
WA2612-AGN
WA2600 series access
points (indoors)
WA2620-AGN
R 1106
WA2610E-AGN
WA2600 series
WA2600 series access
points (enhanced)
WA2620E-AGN
R 1109
2-1
2 Feature Matrix
z Support of the H3C WA series WLAN access points for features, commands and parameters may
vary by device model. See this document for more information.
z For information about feature support, see Table 2-1. For information about command and
parameter support, see
Table 3-1.
z The term AP in this document refers to common APs, wireless bridges, or mesh APs.
Table 2-1 Feature matrix
Document Feature WA2200 series WA2600 series
Fundamentals
Configuration Guide
HTTPS Not supported Supported
802.11n radio mode Not supported Supported
802.11n bandwidth mode Not supported Supported
WLAN Configuration
Guide
802.11n rate configuration Not supported Supported
Optical Ethernet interface
Supported on
WA2210X-G/WA2220X-
AG only
Not supported
Layer 2 – LAN
Switching
Configuration Guide
GE interface Not supported Supported
DHCP server configuration Not supported Supported
Layer 3 – IP Services
Configuration Guide
DHCPv6 configuration Not supported Supported
IGMP snooping configuration Not supported Supported
IP Multicast
Configuration Guide
MLD snooping configuration Not supported Supported
Security Configuration
Guide
SSH2.0 Not supported Supported
3-1
3 Command/Parameter Matrix
Table 3-1 Command/Parameter matrix
Document Module Command/Parameter WA2200 series WA2600 series
display ip https
Not supported Supported
ip https acl
Not supported Supported
ip https certificate
access-control-policy
Not supported Supported
Fundamentals
Command
Reference
HTTP commands
ip https enable
Not supported Supported
a-mpdu enable
Not supported Supported
a-msdu enable
Not supported Supported
channel band-width
Not supported Supported
client dot11n-only
Not supported Supported
preamble
{
long
|
short
}
Only APs that
support the
802.11b/g radio
mode support this
command.
Only APs that
support the
802.11b/g radio
mode support this
command.
radio-type
Keywords
dot11an
and
dot11gn
not
supported
Supported
WLAN service
commands
short-gi enable
Not supported Supported
dot11a
{
disabled-rate |
mandatory-rate |
supported-rate
} rate-value
Only APs that
support 802.11a
radio mode
support this
command.
Only APs that
support 802.11a
radio mode
support this
command.
dot11n mandatory
maximum-mcs
Not supported Supported
dot11n support
maximum-mcs
Not supported Supported
WLAN
Command
Reference
WLAN RRM
commands
power-constraint
power-constraint
Only APs that
support the
802.11a radio
mode support this
command.
Only APs that
support the
802.11a radio
mode support this
command.
3-2
Document Module Command/Parameter WA2200 series WA2600 series
The maximum
number of
broadcast packets
that can be
forwarded on an
Ethernet interface
per second
broadcast-suppression
{ ratio |
pps
max-pps }
pps
max-pps
ranges from 1 to
148810.
pps
max-pps
ranges from 1 to
1488100.
The maximum
number of multicast
packets allowed on
an Ethernet
interface per
second
multicast-suppression
{ ratio |
pps
max-pps }
pps
max-pps
ranges from 1 to
148810.
pps
max-pps
ranges from 1 to
1488100.
Layer 2 – LAN
Switching
Command
Reference
The maximum
number of unknown
unicast packets
allowed on an
Ethernet interface
per second
unicast-suppression
{ ratio
|
pps
max-pps }
pps
max-pps
ranges from 1 to
148810.
pps
max-pps
ranges from 1 to
1488100.
DHCP commands
DHCP server configuration
commands
Not supported Supported
display ipv6 dhcp client
[
interface
interface-type
interface-number ]
Not supported Supported
display ipv6 dhcp client
statistics
[
interface
interface-type
interface-number
]
Not supported Supported
display ipv6 dhcp duid
Not supported Supported
Layer 3 - IP
Services
Command
Reference
DHCPv6
commands
reset ipv6 dhcp client
statistics
[
interface
interface-type
interface-number
]
Not supported Supported
4-1
z The models listed in this document are not applicable to all regions. Please consult your local sales
office for the models applicable to your region.
z Support of the H3C WA series WLAN access points (APs) for features may vary by AP model. For
more information, see Feature Matrix.
z The interface types and the number of interfaces vary by AP model.
4 Ethernet Interface Configuration
This chapter includes these sections:
z General Ethernet Interface Configuration
z Configuring a Layer 2 Ethernet Interface
z Displaying and Maintaining an Ethernet Interface
General Ethernet Interface Configuration
Layer-2 Ethernet interfaces are physical interfaces operating at the data link layer, processing Layer-2
protocols, and implementing Layer-2 fast forwarding. This document describes Layer-2 Ethernet
interface attributes and configuration on the AP.
Configuring Basic Settings of an Ethernet Interface
You can set an Ethernet interface to operate in one of the following duplex modes:
z Full-duplex mode (full). Interfaces operating in this mode can send and receive packets
simultaneously.
z Half-duplex mode (half). Interfaces operating in this mode cannot send and receive packets
simultaneously.
z Auto-negotiation mode (auto). Interfaces operating in this mode negotiate a duplex mode with their
peers.
Similarly, you can set the speed of an Ethernet interface or enable it to automatically negotiate a speed
with its peer by using the speed auto command.
Follow these steps to configure the basic settings of an Ethernet interface:
To do… Use the command… Remarks
Enter system view
system-view
Enter Ethernet interface view
interface
interface-type
interface-number
4-2
To do… Use the command… Remarks
Change the description of the
interface
description
text
Optional
By default, the description of an interface is
the interface name followed by character
string
Interface
. For example,
Ethernet1/0/1
Interface
.
Set the duplex mode
duplex
{
auto
|
full
|
half
}
Optional
auto
by default.
Optical interfaces do not support the
half
keyword.
Set the port speed
speed
{
10
|
100
|
1000
|
auto
}
Optional
auto
by default.
z Optical interfaces do not support the 10 or
100 keyword.
z Support for the 1000 keyword varies with
AP models.
Shut down the Ethernet
interface
shutdown
Optional
By default, an Ethernet interface is in the up
state.
To bring up an Ethernet interface, use the
undo shutdown
command.
Configuring Flow Control on an Ethernet Interface
You can avoid packet drops on a link by enabling flow control at both ends of the link. When traffic
congestion occurs at the receiving end, the receiving end sends a Pause frame to ask the sending end
to suspend sending packets. In this way, flow control helps avoid packet drops.
Follow these steps to enable flow control on an Ethernet interface:
To do… Use the command… Remarks
Enter system view
system-view
Enter Ethernet interface view
interface
interface-type
interface-number
Enable flow control
flow-control
Required
Disabled by default
Configuring Loopback Testing on an Ethernet Interface
If an Ethernet interface does not work normally, you can enable loopback testing on it to identify the
problem. There are two types of loopback testing:
z Internal loopback testing, which tests all on-chip functions related to the Ethernet interfaces.
z External loopback testing, which tests the hardware of Ethernet interfaces. To perform external
loopback testing on an Ethernet interface, connect a loopback plug to the Ethernet interface. The
AC sends test packets out the interface, which are expected to loop over the plug and back to the
interface. If the interface fails to receive any test packet, the hardware of the interface is faulty.
Ethernet interfaces cannot forward data packets during loopback testing.
Follow these steps to enable loopback testing on an Ethernet interface:
4-3
To do… Use the command… Remarks
Enter system view
system-view
Enter Ethernet interface view
interface
interface-type
interface-number
Enable loopback testing
loopback
{
external
|
internal
}
Optional
Disabled by default.
z On an interface that is physically down, you can perform only internal loopback testing. On an
interface administratively shut down, you can perform neither internal nor external loopback
testing.
z The speed, duplex, and shutdown commands are unavailable during loopback testing.
z During loopback testing, an Ethernet interface works in full duplex mode. When you disable
loopback testing, the duplex setting of the interface restores.
Configuring a Layer 2 Ethernet Interface
Layer 2 Ethernet Interface Configuration Task List
Complete these tasks to configure a Layer 2 Ethernet interface:
Task Remarks
Configuring Storm Suppression
Optional
Applicable to Layer 2 Ethernet interfaces
Setting the Interface Statistics Polling Interval
Optional
Applicable to Layer 2 Ethernet interfaces
Enabling Loopback Detection on an Ethernet Interface
Optional
Applicable to Layer 2 Ethernet interfaces
Configuring Storm Suppression
You can use the storm suppression function to limit the size of a particular type of traffic (currently
broadcast, multicast and unknown unicast traffic) on Ethernet interfaces in Ethernet interface view.
When the broadcast, multicast, or unknown unicast traffic on the interface exceeds the threshold, the
system discards packets until the traffic drops below the threshold.
Follow these steps to set storm suppression thresholds on an Ethernet interface:
To do… Use the command… Remarks
Enter system view
system-view
Enter Ethernet interface view
interface
interface-type
interface-number
Settings made in Ethernet interface
view take effect on the current
interface only.
4-4
To do… Use the command… Remarks
Set the broadcast storm
suppression threshold
broadcast-suppression
{ ratio |
pps
max-pps }
Optional
By default, broadcast traffic is not
suppressed.
Set the multicast storm
suppression threshold
multicast-suppression
{ ratio |
pps
max-pps }
Optional
By default, multicast traffic is not
suppressed.
Set the unknown unicast storm
suppression threshold
unicast-suppression
{ ratio |
pps
max-pps }
Optional
By default, unknown unicast traffic
is not suppressed.
Setting the Interface Statistics Polling Interval
Follow these steps to set the interface statistics polling interval:
To do… Use the command… Remarks
Enter system view
system-view
Set the interface statistics polling
interval
flow-interval
interval
Optional
The default interface statistics
polling interval is 300 seconds
In system view, you configure a statistics polling interval for all interfaces.
Enabling Loopback Detection on an Ethernet Interface
If an interface receives a packet that it sent out, a loop has occurred. Loops may cause broadcast
storms, which degrade network performance. You can enable loopback detection to detect loops on an
interface and, if the interface supports the loopback-detection action command, configure the
protective action to take on the interface when a loop is detected, for example, to shut down the
interface. Depending on whether a protective action is configured, the AP takes the actions in
Table 4-1
to alleviate the impact of the loop condition.
Table 4-1 Actions taken upon detection of a loop condition
Actions
Port type
No protective action configured A protective action configured
Access port
z Place the interface in controlled
mode. The interface discards all
incoming packets, but still forwards
outgoing traffic.
z Generate traps.
z Delete all MAC address entries of
the interface.
z Perform the configured protective
action.
z Generate traps and log messages.
z Delete all MAC address entries of the
interface.
4-5
Actions
Port type
No protective action configured A protective action configured
Hybrid or trunk port
z Generate traps.
z If loopback detection control is
enabled, set the interface in
controlled mode. The interface
discards all incoming packets, but
still forwards outgoing packets.
z Delete all MAC address entries of
the interface.
z Create traps and log messages.
z If loopback detection control is enabled,
take the configured protective action on
the interface.
z Delete all MAC address entries of the
interface.
Follow these steps to configure loopback detection:
To do… Use the command… Remarks
Enter system view
system-view
Enable global loopback detection
loopback-detection enable
Required
Disabled by default
Set the loopback detection interval
loopback-detection interval-time
time
Optional
30 seconds by default
Enter Ethernet interface view
interface
interface-type
interface-number
Enable loopback detection control
on a trunk or hybrid port
loopback-detection control
enable
Optional
Disabled by default
z To use loopback detection on an Ethernet interface, you must enable the function both globally and
on the interface.
z To disable loopback detection on all interfaces, run the undo loopback-detection enable
command in system view.
z To enable a hybrid or trunk port to take the administratively specified protective action, you must
perform the loopback-detection control enable command on the port.
Displaying and Maintaining an Ethernet Interface
To do… Use the command… Remarks
Display the current state of an
interface and the related
information
display
interface
[ interface-type
[ interface-number |
interface-number.subnumber ] ]
Available in any view
Display the summary information
of an interface
display brief interface
[ interface-type
[ interface-number |
interface-number.subnumber ] ] [
|
{
begin
|
exclude
|
include
} regular-expression ]
Available in any view
Clear the statistics of an interface
reset counters interface
[ interface-type
[ interface-number |
interface-number.subnumber ] ]
Available in user view
4-6
To do… Use the command… Remarks
Display the information about the
loopback function
display loopback-detection
Available in any view
5-1
5 Loopback and Null Interface Configuration
This chapter includes these sections:
z Loopback Interface
z Null Interface
z Displaying and Maintaining Loopback and Null Interfaces
Loopback Interface
Introduction to Loopback Interface
A loopback interface is a software-only virtual interface. The physical layer state and link layer protocols
of a loopback interface are always up unless the loopback interface is manually shut down. A loopback
interface can be configured with an IP address. For the purpose of saving IP address resources, the IP
address is automatically configured with a 32-bit mask. Routing protocols can be enabled on a loopback
interface, and a loopback interface is capable of sending and receiving routing protocol packets.
Loopback interfaces are widely used. For example, you can configure a loopback interface address as
the source address of all the IP packets that the AP generates. Because loopback interface addresses
are stable unicast addresses, they are usually used as device identifications. Therefore, when you
configure a rule on an authentication or security server to permit or deny packets generated by an AP,
you can streamline the rule by configuring it to permit or deny packets carrying the loopback interface
address identifying the AP. Note that, when a loopback interface is used for source address binding
(that is, assigning an IP address to this loopback interface), make sure that the route from the loopback
interface to the peer is reachable; all data packets sent to the loopback interface are considered as
packets sent to the AP itself, so the AP does not forward these packets.
Because a loopback interface is always up, it can be used for some other special purposes. For
example, if no router ID is configured for a dynamic routing protocol, the highest loopback interface IP
address is selected as the router ID. For another example, to avoid BGP sessions being interrupted by
physical port failure, you can use a loopback interface as the source interface of BGP packets. However,
you must ensure that the IP address of the loopback interface on the BGP peer is reachable. If EBGP
connection is involved, you need to allow the establishment of EBGP connections to
non-directly-connected peers.
Configuring a Loopback Interface
Follow these steps to configure a loopback interface:
To do… Use the command… Remarks
Enter system view
system-view
Create a loopback interface and
enter loopback interface view
interface loopback
interface-number
5-2
To do… Use the command… Remarks
Set a description for the
loopback interface
description
text
Optional
By default, the description of an interface is the
interface name followed by the “Interface” string.
Shut down the loopback
interface
shutdown
Optional
A loopback interface is up on being created.
z The subnet mask of the IP address assigned to a loopback interface can only be 32 bits in length.
z You can configure settings such as IP addresses and IP routes on loopback interfaces. For more
information, see the Layer 3 – IP Services Configuration Guide and Layer 3 – IP Routing
Configuration Guide.
Null Interface
Introduction to Null Interface
A null interface is a completely software-based logical interface. A null interface is always up. However,
you can neither use it to forward data packets nor configure an IP address or link layer protocol on it.
With a null interface specified as the next hop of a static route to a specific network segment, any
packets routed to the network segment are dropped. The null interface provides you a simpler way to
filter packets than ACL. In other words, you can filter uninteresting traffic by transmitting it to a null
interface instead of applying an ACL.
For example, by executing the ip route-static 92.101.0.0 255.255.0.0 null 0 command (which
configures a static route leading to null interface 0), you can have all the packets destined to the network
segment 92.101.0.0/16 discarded.
Currently, the AP supports only one null interface, Null 0. You can neither remove this null interface nor
create a new one.
Configuring Interface Null 0
Follow these steps to enter null interface view:
To do… Use the command… Remarks
Enter system view
system-view
Enter null interface view
interface null 0
Required
The Null 0 interface is the default null interface on your
AP. It cannot be manually created or removed.
Set a description for the
null interface
description
text
Optional
By default, the description of an interface is the
interface name followed by the “Interface” string.
5-3
Displaying and Maintaining Loopback and Null Interfaces
To do… Use the command… Remarks
Display information about loopback
interfaces
display interface loopback
[ interface-number ]
Available in any view
Display information about the null
interface
display interface null
[
0
]
Available in any view
Clear the statistics on a loopback
interface or the null interface
reset counters interface
[ interface-type [ interface-number |
interface-number.subnumber ] ]
Available in user view
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76

H3C WA Series Configuration manual

Type
Configuration manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI