HW Config Manual

661
Quidway S9300 Terabit Routing Switch V100R006C01 Configuration Guide - Ethernet Issue 01 Date 2011-10-26 HUAWEI TECHNOLOGIES CO., LTD.

description

bnb

Transcript of HW Config Manual

Quidway S9300 Terabit Routing Switch V100R006C01

Configuration Guide - EthernetIssue Date 01 2011-10-26

HUAWEI TECHNOLOGIES CO., LTD.

Copyright Huawei Technologies Co., Ltd. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissionsand other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders.

NoticeThe purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China http://www.huawei.com [email protected]

Website: Email:

Issue 01 (2011-10-26)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

i

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

About This Document

About This DocumentIntended AudienceThis document provides the basic concepts, configuration procedures, and configuration examples in different application scenarios of the Ethernet feature supported by the S9300 device. This document describes how to configure the Ethernet feature. This document is intended for: l l l l Data configuration engineers Commissioning engineers Network monitoring engineers System maintenance engineers

Symbol ConventionsThe symbols that may be found in this document are defined as follows. Symbol Description

DANGER

Indicates a hazard with a high level of risk, which if not avoided, will result in death or serious injury. Indicates a hazard with a medium or low level of risk, which if not avoided, could result in minor or moderate injury. Indicates a potentially hazardous situation, which if not avoided, could result in equipment damage, data loss, performance degradation, or unexpected results. Indicates a tip that may help you solve a problem or save time. Provides additional information to emphasize or supplement important points of the main text.

WARNING

CAUTIONTIP

NOTE

Issue 01 (2011-10-26)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

ii

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

About This Document

Command ConventionsThe command conventions that may be found in this document are defined as follows. Convention Boldface Italic [] { x | y | ... } [ x | y | ... ] { x | y | ... }* Description The keywords of a command line are in boldface. Command arguments are in italics. Items (keywords or arguments) in brackets [ ] are optional. Optional items are grouped in braces and separated by vertical bars. One item is selected. Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected. Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected. Optional items are grouped in brackets and separated by vertical bars. Several items or no item can be selected. The parameter before the & sign can be repeated 1 to n times. A line starting with the # sign is comments.

[ x | y | ... ]* & #

Change HistoryUpdates between document issues are cumulative. Therefore, the latest document issue contains all updates made in previous issues.

Changes in Issue 01 (2011-10-26)Initial commercial release.

Issue 01 (2011-10-26)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iii

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

ContentsAbout This Document.....................................................................................................................ii 1 Ethernet Interface Configuration...............................................................................................11.1 Introduction to Ethernet Interfaces.....................................................................................................................2 1.2 Ethernet Interface Features Supported by the S9300.........................................................................................2 1.3 Configuring Basic Attributes of the Ethernet Interface......................................................................................3 1.3.1 Establishing the Configuration Task.........................................................................................................3 1.3.2 (Optional) Configuring a Description for an Interface..............................................................................3 1.3.3 (Optional) Configuring the Cable Type on an Interface............................................................................4 1.3.4 (Optional) Setting the Duplex Mode.........................................................................................................5 1.3.5 (Optional) Setting the Rate of an Interface................................................................................................5 1.3.6 (Optional) Enabling Auto-Negotiation......................................................................................................6 1.3.7 (Optional) Switching Between Optical and Electrical Interfaces..............................................................6 1.3.8 (Optional) Configuring an Interface to Work at Layer 2 or Layer 3.........................................................7 1.3.9 Checking the Configuration.......................................................................................................................7 1.4 Configuring Advanced Attributes of an Ethernet Interface................................................................................8 1.4.1 Establishing the Configuration Task.........................................................................................................8 1.4.2 (Optional) Configuring Loopback on the Ethernet Interface....................................................................9 1.4.3 (Optional) Setting the Minimum Interval for Re-enabling an Interface....................................................9 1.4.4 (Optional) Configuring the Interface Group..............................................................................................9 1.4.5 (Optional) Setting the Maximum Frame Length on the Ethernet Interface.............................................10 1.4.6 (Optional) Enabling Flow Control...........................................................................................................10 1.4.7 (Optional) Enabling Auto-Negotiation of Flow Control.........................................................................11 1.4.8 (Optional) Enabling Port Isolation..........................................................................................................11 1.4.9 (Optional) Performing a Cable Test on an Interface...............................................................................12 1.4.10 (Optional) Configuring Link Flapping Protection on an Interface........................................................13 1.4.11 (Optional) Assigning an IP Address to an Ethernet Sub-interface........................................................14 1.4.12 Checking the Configuration...................................................................................................................14 1.5 Maintaining Ethernet Interfaces.......................................................................................................................15 1.5.1 Debugging Ethernet Interfaces................................................................................................................15 1.6 Configuration Examples...................................................................................................................................15 1.6.1 Example for Configuring Port Isolation..................................................................................................15

2 Link Aggregation Configuration..............................................................................................18Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. iv

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

2.1 Introduction to Link Aggregation.....................................................................................................................20 2.2 Link Aggregation Supported by the S9300......................................................................................................20 2.3 Configuring Link Aggregation in Manual Load Balancing Mode...................................................................21 2.3.1 Establishing the Configuration Task.......................................................................................................21 2.3.2 Configuring the Eth-Trunk to Work in Manual Load Balancing Mode..................................................22 2.3.3 Adding Member Interfaces to an Eth-Trunk...........................................................................................23 2.3.4 (Optional) Configuring the Load Balancing Mode.................................................................................24 2.3.5 (Optional) Limiting the Number of Active Interfaces.............................................................................25 2.3.6 (Optional) Configuring a Profile of Enhanced Eth-Trunks in Load Balancing Mode............................26 2.3.7 (Optional) Configuring the Load Balancing Mode for Unknown Unicast Traffic..................................27 2.3.8 Checking the Configuration.....................................................................................................................28 2.4 Configuring Link Aggregation in Static LACP Mode.....................................................................................28 2.4.1 Establishing the Configuration Task.......................................................................................................28 2.4.2 Configuring the Eth-Trunk to Work in Static LACP Mode....................................................................29 2.4.3 Adding Member Interfaces to an Eth-Trunk...........................................................................................29 2.4.4 (Optional) Configuring the Load Balancing Mode.................................................................................31 2.4.5 (Optional) Limiting the Number of Active Interfaces.............................................................................32 2.4.6 (Optional) Setting the LACP Priority of the System...............................................................................33 2.4.7 (Optional) Setting the LACP Priority of an Interface..............................................................................33 2.4.8 (Optional) Enabling LACP Preemption and Setting the Delay for LACP Preemption...........................34 2.4.9 (Optional) Setting the Timeout Interval for Receiving LACP Packets...................................................35 2.4.10 (Optional) Configuring a Profile of Enhanced Eth-Trunks in Load Balancing Mode..........................35 2.4.11 (Optional) Configuring the Load Balancing Mode for Unknown Unicast Traffic................................36 2.4.12 Checking the Configuration...................................................................................................................37 2.5 Configuring an Eth-Trunk Sub-interface..........................................................................................................37 2.5.1 Establishing the Configuration Task.......................................................................................................37 2.5.2 Creating an Eth-Trunk Sub-interface.......................................................................................................38 2.5.3 Setting the IP Address of an Eth-Trunk Sub-interface............................................................................38 2.5.4 Checking the Configuration.....................................................................................................................39 2.6 Configuring an E-Trunk...................................................................................................................................39 2.6.1 Establishing the Configuration Task.......................................................................................................39 2.6.2 Setting the LACP System ID and LACP Priority of an E-Trunk............................................................40 2.6.3 Creating an E-Trunk and Setting Its Priority...........................................................................................41 2.6.4 Configuring Local and Peer IP Addresses of an E-Trunk.......................................................................41 2.6.5 Binding an E-Trunk to a BFD Session....................................................................................................42 2.6.6 Adding an Eth-Trunk to an E-Trunk.......................................................................................................43 2.6.7 (Optional) Configuring the Working Mode of an Eth-Trunk in an E-Trunk..........................................43 2.6.8 (Optional) Setting the Password..............................................................................................................44 2.6.9 (Optional) Setting the Timeout of Hello Packets....................................................................................45 2.6.10 (Optional) Setting the Revertive Switching Delay................................................................................46 2.6.11 Checking the Configuration...................................................................................................................46 2.7 Configuring an Inter-Chassis Eth-Trunk Interface to Forward Traffic Preferentially Through a Local Member Interface (CSS).......................................................................................................................................................47 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. v

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

2.7.1 Establishing the Configuration Task.......................................................................................................47 2.7.2 Configuring an Inter-Chassis Eth-Trunk Interface to Forward Traffic Preferentially Through a Local Member Interface.............................................................................................................................................49 2.7.3 Checking the Configuration.....................................................................................................................50 2.8 Maintaining Link Aggregation.........................................................................................................................50 2.8.1 Clearing Statistics of LACP Packets.......................................................................................................50 2.8.2 Debugging the Link Aggregation Group.................................................................................................51 2.8.3 Monitoring the Operation Status of the Link Aggregation Group..........................................................51 2.9 Configuration Examples...................................................................................................................................52 2.9.1 Example for Configuring Link Aggregation in Manual Load Balancing Mode.....................................52 2.9.2 Example for Configuring Link Aggregation in Static LACP Mode.......................................................55 2.9.3 Example for Connecting an E-Trunk to a VPLS Network......................................................................58 2.9.4 Example for Configuring an Inter-Chassis Eth-Trunk Interface to Forward Traffic Preferentially Through a Local Member Interface.................................................................................................................................67

3 VLAN Configuration..................................................................................................................733.1 Introduction......................................................................................................................................................75 3.2 VLAN Features Supported by the S9300.........................................................................................................82 3.3 Dividing a LAN into VLANs...........................................................................................................................86 3.3.1 Establishing the Configuration Task.......................................................................................................86 3.3.2 Dividing a LAN into VLANs Based on Ports.........................................................................................89 3.3.3 Dividing a LAN into VLANs Based on MAC Addresses.......................................................................91 3.3.4 Dividing a LAN into VLANs Based on IP Subnets................................................................................92 3.3.5 Dividing a LAN into VLANs Based on Protocols..................................................................................94 3.3.6 Dividing a LAN into VLANs Based on Policies.....................................................................................96 3.3.7 Checking the Configuration.....................................................................................................................97 3.4 Creating a VLANIF Interface...........................................................................................................................98 3.4.1 Establishing the Configuration Task.......................................................................................................98 3.4.2 Creating a VLANIF Interface..................................................................................................................98 3.4.3 Assigning an IP Address to a VLANIF Interface....................................................................................99 3.4.4 (Optional) Setting a Delay After Which a VLANIF Interface Goes Down............................................99 3.4.5 (Optional) Setting the MTU of a VLANIF Interface.............................................................................100 3.4.6 Checking the Configuration...................................................................................................................101 3.5 Configuring Inter-VLAN Communication.....................................................................................................101 3.5.1 Establishing the Configuration Task.....................................................................................................101 3.5.2 Configuring VLANIF Interfaces for Inter-VLAN Communication......................................................103 3.5.3 Configuring Sub-interface for Inter-VLAN Communication................................................................105 3.5.4 Configuring VLAN Switch for Inter-VLAN Communication..............................................................105 3.5.5 Checking the Configuration...................................................................................................................106 3.6 Configuring VLAN Aggregation to Save IP Addresses.................................................................................107 3.6.1 Establishing the Configuration Task.....................................................................................................107 3.6.2 Creating a Sub-VLAN...........................................................................................................................108 3.6.3 Creating a Super-VLAN........................................................................................................................109 3.6.4 Assigning an IP Address to the VLANIF Interface of a Super-VLAN.................................................110 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. vi

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

3.6.5 (Optional) Enabling Proxy ARP on the VLANIF Interface of a Super-VLAN....................................110 3.6.6 Checking the Configuration...................................................................................................................111 3.7 Configuring a MUX VLAN to Separate Layer 2 Traffic...............................................................................111 3.7.1 Establishing the Configuration Task.....................................................................................................112 3.7.2 Configuring a Principal VLAN for a MUX VLAN..............................................................................113 3.7.3 Configuring a Group VLAN for a Subordinate VLAN.........................................................................114 3.7.4 Configuring a Separate VLAN for a Subordinate VLAN.....................................................................114 3.7.5 Enabling the MUX VLAN Function on a Port......................................................................................115 3.7.6 Checking the Configuration...................................................................................................................116 3.8 Configuring a Voice VLAN to Transmit Voice Data.....................................................................................116 3.8.1 Establishing the Configuration Task.....................................................................................................116 3.8.2 Enabling the Voice VLAN Function.....................................................................................................118 3.8.3 Configuring an OUI for a Voice VLAN................................................................................................118 3.8.4 (Optional) Setting an Aging Timer for a Voice VLAN.........................................................................119 3.8.5 (Optional) Configuring an 802.1p Priority and a DSCP Value for the Voice VLAN...........................120 3.8.6 (Optional) Configuring the Mode in Which Ports Are Added to a Voice VLAN.................................120 3.8.7 (Optional) Configuring the Working Mode for a Voice VLAN............................................................122 3.8.8 (Optional) Configuring a Port to Communicate with a Voice Device of Another Vendor...................123 3.8.9 Checking the Configuration...................................................................................................................123 3.9 Configuring an mVLAN to Implement Integrated Management...................................................................124 3.9.1 Establishing the Configuration Task.....................................................................................................124 3.9.2 Configuring an mVLAN........................................................................................................................124 3.9.3 Configuring a VLANIF Interface for an mVLAN................................................................................125 3.9.4 Checking the Configuration...................................................................................................................125 3.10 Configuring VLAN Transparent Transport..................................................................................................126 3.10.1 Establishing the Configuration Task...................................................................................................126 3.10.2 Enabling VLAN Transparent Transport..............................................................................................127 3.10.3 Checking the Configuration.................................................................................................................128 3.11 Maintaining VLAN.......................................................................................................................................128 3.11.1 Clearing the Statistics of VLAN Packets............................................................................................128 3.12 Configuration Examples...............................................................................................................................129 3.12.1 Example for Configuring Interface-based VLANs..............................................................................129 3.12.2 Example for Configuring MAC Address-based VLAN Assignment..................................................131 3.12.3 Example for Configuring IP Subnet-based VLAN Assignment.........................................................133 3.12.4 Example for Configuring Protocol-based VLAN Assignment............................................................137 3.12.5 Example for Implementing Communication Between VLANs by Using VLANIF Interfaces...........140 3.12.6 Example for Implementing Communication Across a Layer 3 Network Through VLANIF Interfaces ........................................................................................................................................................................142 3.12.7 Example for Implementing Communication Between VLANs Through Sub-interfaces....................146 3.12.8 Example for Implementing Communication Across a Layer 3 Network Through Sub-interfaces ........................................................................................................................................................................148 3.12.9 Example for Implementing Communication Between VLANs Through VLAN Switching..............151 3.12.10 Example for Configuring VLAN Aggregation..................................................................................153 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. vii

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

3.12.11 Example for Configuring the MUX VLAN......................................................................................156 3.12.12 Example for Configuring a Voice VLAN in Auto Mode..................................................................158 3.12.13 Example for Configuring a Voice VLAN in Manual Mode..............................................................161 3.12.14 Example for Configuring VLAN Transparent Transmission............................................................164

4 VLAN Mapping Configuration..............................................................................................1694.1 Introduction to VLAN Mapping.....................................................................................................................170 4.2 VLAN Mapping Features Supported by the S9300........................................................................................170 4.3 Configuring VLAN Mapping of Single VLAN Tag......................................................................................170 4.3.1 Establishing the Configuration Task.....................................................................................................170 4.3.2 Replacing a Single Tag..........................................................................................................................171 4.3.3 Checking the Configuration...................................................................................................................172 4.4 Configuring VLAN Mapping of Double VLAN Tags...................................................................................172 4.4.1 Establishing the Configuration Task.....................................................................................................172 4.4.2 Replacing Double Tags.........................................................................................................................173 4.4.3 Replacing the Outer VLAN Tag............................................................................................................173 4.4.4 Checking the Configuration...................................................................................................................174 4.5 Configuring Flow-based VLAN Mapping.....................................................................................................174 4.5.1 Establishing the Configuration Task.....................................................................................................174 4.5.2 Replacing a Single Tag..........................................................................................................................175 4.5.3 Replacing Double Tags.........................................................................................................................177 4.5.4 Replacing the Outer VLAN Tag............................................................................................................180 4.5.5 Checking the Configuration...................................................................................................................182 4.6 Configuring VLAN Mapping Based On the VLAN Priority.........................................................................183 4.6.1 Establishing the Configuration Task.....................................................................................................183 4.6.2 Configuring VLAN Mapping Based on the VLAN Priority on the Incoming Interface.......................183 4.6.3 (Optional) Configuring VLAN Priority Mapping on the Outbound Interface......................................184 4.6.4 Checking the Configuration...................................................................................................................185 4.7 Configuration Examples.................................................................................................................................185 4.7.1 Example for Configuring Mapping of Single VLAN Tag....................................................................185 4.7.2 Example for Configuring N:1 VLAN Mapping....................................................................................189 4.7.3 Example for Configuring Mapping of Double VLAN Tags (2 to 2).....................................................191 4.7.4 Example for Configuring Flow-based VLAN Mapping........................................................................194

5 QinQ Configuration..................................................................................................................1995.1 Concept of QinQ.............................................................................................................................................201 5.2 QinQ Features Supported by the S9300.........................................................................................................201 5.3 Configuring QinQ on an Interface..................................................................................................................201 5.3.1 Establishing the Configuration Task.....................................................................................................201 5.3.2 Setting the Link Type of an Interface....................................................................................................202 5.3.3 Specifying the Outer VLAN ID.............................................................................................................203 5.3.4 Checking the Configuration...................................................................................................................203 5.4 Configuring Selective QinQ...........................................................................................................................203 5.4.1 Establishing the Configuration Task.....................................................................................................203 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. viii

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

5.4.2 Setting the Link Type of an Interface....................................................................................................204 5.4.3 Adding an Outer VLAN Tag.................................................................................................................204 5.4.4 Configuring Selective QinQ..................................................................................................................205 5.4.5 Checking the Configuration...................................................................................................................206 5.5 Configuring Flow-based Selective QinQ.......................................................................................................206 5.5.1 Establishing the Configuration Task.....................................................................................................206 5.5.2 Setting the Link Type of an Interface....................................................................................................207 5.5.3 Setting the Packet Matching Rule.........................................................................................................207 5.5.4 Adding an Outer VLAN Tag.................................................................................................................207 5.5.5 Configuring a Traffic Policy..................................................................................................................208 5.5.6 Applying the Traffic Policy...................................................................................................................208 5.5.7 Checking the Configuration...................................................................................................................209 5.6 Configuring VLAN Stacking Based On the VLAN Priority..........................................................................209 5.6.1 Establishing the Configuration Task.....................................................................................................209 5.6.2 Configuring VLAN Stacking Based on the VLAN Priority on the Incoming Interface.......................210 5.6.3 (Optional) Configuring VLAN Priority Mapping on the Outbound Interface......................................210 5.6.4 Checking the Configuration...................................................................................................................211 5.7 Setting the Protocol Type in the Outer VLAN Tag........................................................................................211 5.7.1 Establishing the Configuration Task.....................................................................................................211 5.7.2 Configuring the Type of an Interface....................................................................................................212 5.7.3 Setting the Protocol Type in the Outer VLAN Tag...............................................................................212 5.7.4 Checking the Configuration...................................................................................................................213 5.8 Adding Double VLAN Tags to Untagged Packets.........................................................................................213 5.8.1 Establishing the Configuration Task.....................................................................................................213 5.8.2 Setting the Interface Type......................................................................................................................214 5.8.3 Adding an Interface to the Outer VLAN...............................................................................................214 5.8.4 Adding Double VLAN Tags to Untagged Packets................................................................................215 5.8.5 Checking the Configuration...................................................................................................................216 5.9 Connecting Sub-interfaces to a VLL Network...............................................................................................216 5.9.1 Establishing the Configuration Task.....................................................................................................216 5.9.2 Configuring a Dot1q Sub-interface.......................................................................................................217 5.9.3 Configuring a QinQ Sub-interface........................................................................................................217 5.9.4 Configuring VLAN Mapping of a Single Tag on a Sub-interface........................................................218 5.9.5 Configuring VLAN Mapping of Double Tags on a Sub-interface........................................................218 5.9.6 Configuring VLAN Stacking on a Sub-interface..................................................................................218 5.9.7 Creating a VLL Connection..................................................................................................................219 5.9.8 Checking the Configuration...................................................................................................................219 5.10 Connecting Sub-interfaces to a VPLS Network...........................................................................................219 5.10.1 Establishing the Configuration Task...................................................................................................220 5.10.2 Configuring a Dot1q Sub-interface.....................................................................................................220 5.10.3 Configuring a QinQ Sub-interface......................................................................................................221 5.10.4 Configuring VLAN Mapping of a Single Tag on a Sub-interface......................................................221 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. ix

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

5.10.5 Configuring VLAN Mapping of Double Tags on a Sub-interface......................................................222 5.10.6 Configuring VLAN Stacking on a Sub-interface................................................................................222 5.10.7 Configuring VPLS...............................................................................................................................222 5.10.8 Checking the Configuration.................................................................................................................223 5.11 Configuring a Sub-interface to Access an L3VPN.......................................................................................223 5.11.1 Establishing the Configuration Task...................................................................................................223 5.11.2 Configuring a Dot1q Sub-interface.....................................................................................................224 5.11.3 Configuring a QinQ Sub-interface......................................................................................................225 5.11.4 Configuring L3VPN............................................................................................................................226 5.11.5 Checking the Configuration.................................................................................................................226 5.12 Configuration Examples...............................................................................................................................226 5.12.1 Example for Configuring QinQ on Interfaces.....................................................................................226 5.12.2 Example for Configuring Selective QinQ...........................................................................................229 5.12.3 Example for Configuring Selective QinQ with VLAN Mapping........................................................232 5.12.4 Example for Configuring Selective QinQ with a Traffic Policy.........................................................235 5.12.5 Example for Configuring Flow-based Selective QinQ........................................................................238 5.12.6 Example for Configuring the Dot1q Sub-interfaces to Access VLL...................................................243 5.12.7 Example for Connecting QinQ Sub-interfaces to a VLL Network.....................................................249 5.12.8 Example for Connecting a Sub-interface Enabled with the Single-Tag VLAN Mapping to a VLL Network ........................................................................................................................................................................256 5.12.9 Example for Connecting a Sub-interface Enabled with Double-Tag VLAN Mapping to a VLL Network ........................................................................................................................................................................262 5.12.10 Example for Connecting a Sub-interface Enabled with VLAN Stacking to a VLL Network...........270 5.12.11 Example for Connecting Dot1q Sub-interfaces to a VPLS Network................................................277 5.12.12 Example for Connecting QinQ Sub-interfaces to a VPLS Network.................................................284 5.12.13 Example for Connecting a Sub-interface Enabled with Single-Tag VLAN Mapping to a VPLS Network ........................................................................................................................................................................291 5.12.14 Example for Connecting a Sub-interface Enabled with Double-Tag VLAN Mapping to a VPLS Network..........................................................................................................................................................297 5.12.15 Example for Connecting a Sub-interface Enabled with VLAN Stacking to a VPLS Network.........305 5.12.16 Example for Configuring the Dot1q Sub-interface to Access an L3VPN.........................................312 5.12.17 Example for Configuring the QinQ Sub-interface to Access an L3VPN..........................................325

6 GVRP Configuration................................................................................................................3406.1 GVRP Overview.............................................................................................................................................341 6.2 GVRP Features Supported by the S9300.......................................................................................................344 6.3 Configuring GVRP.........................................................................................................................................345 6.3.1 Establishing the Configuration Task.....................................................................................................345 6.3.2 Enabling GVRP.....................................................................................................................................345 6.3.3 (Optional) Setting the Registration Mode of a GVRP Interface............................................................346 6.3.4 (Optional) Setting the GARP Timers....................................................................................................347 6.3.5 Checking the Configuration...................................................................................................................348 6.4 Maintaining GVRP.........................................................................................................................................348 6.4.1 Clearing GARP Statistics......................................................................................................................348 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. x

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

6.5 Configuration Examples.................................................................................................................................349 6.5.1 Example for Configuring GVRP...........................................................................................................349

7 MAC Address Table Configuration.......................................................................................3537.1 MAC Address Table Overview......................................................................................................................355 7.2 MAC Address Features Supported by the S9300...........................................................................................356 7.3 Configuring a Static MAC Address Entry......................................................................................................358 7.4 Configuring a Blackhole MAC Address Entry...............................................................................................359 7.5 Setting the Aging Time of Dynamic MAC Address Entries..........................................................................360 7.6 Disabling MAC Address Learning.................................................................................................................361 7.6.1 Establishing the Configuration Task.....................................................................................................361 7.6.2 Disabling MAC Address Learning on an Interface...............................................................................362 7.6.3 Disabling MAC Address Learning in a VLAN.....................................................................................363 7.6.4 Checking the Configuration...................................................................................................................363 7.7 Limiting the Number of Learned MAC Addresses........................................................................................363 7.7.1 Establishing the Configuration Task.....................................................................................................364 7.7.2 Limiting the Number of MAC Addresses Learned on an Interface......................................................365 7.7.3 Limiting the Number of MAC Addresses Learned in a VLAN............................................................366 7.7.4 Limiting the Number of MAC Addresses Learned in a VSI.................................................................367 7.7.5 Limiting the Number of MAC Addresses Learned in a Slot.................................................................368 7.7.6 Checking the Configuration...................................................................................................................368 7.8 Configuring Port Security...............................................................................................................................369 7.8.1 Establishing the Configuration Task.....................................................................................................369 7.8.2 Configuring the Secure Dynamic MAC Function on an Interface........................................................370 7.8.3 Configuring the Sticky MAC Function on an Interface........................................................................371 7.8.4 Checking the Configuration...................................................................................................................372 7.9 Configuring MAC Address Anti-Flapping.....................................................................................................372 7.9.1 Establishing the Configuration Task.....................................................................................................372 7.9.2 Setting the MAC Address Learning Priority of an Interface.................................................................373 7.9.3 Prohibiting MAC Address Flapping Between Interfaces with the Same Priority.................................374 7.9.4 Checking the Configuration...................................................................................................................374 7.10 Configuring MAC Address Flapping Detection...........................................................................................375 7.10.1 Establishing the Configuration Task...................................................................................................375 7.10.2 Configuring MAC Address Flapping Detection..................................................................................376 7.10.3 (Optional) Unblocking a Blocked Interface or MAC Address............................................................376 7.10.4 Checking the Configuration.................................................................................................................377 7.11 Configuring the S9300 to Discard Packets with an All-0 MAC Address....................................................377 7.12 Enabling MAC Address Triggered ARP Entry Update................................................................................378 7.13 Enabling Port Bridge....................................................................................................................................379 7.14 Configuration Examples...............................................................................................................................380 7.14.1 Example for Configuring the MAC Address Table.............................................................................380 7.14.2 Example for Configuring the Limitation on MAC Address Learning Based on VLANs...................383 7.14.3 Example for Configuring the Limitation on MAC Address Learning Based on VSIs........................385 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xi

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

7.14.4 Example for Configuring Interface Security.......................................................................................386 7.14.5 Example for Configuring MAC Address Anti-Flapping.....................................................................388

8 STP/RSTP Configuration.........................................................................................................3918.1 STP/RSTP Overview......................................................................................................................................392 8.1.1 STP/RSTP Overview.............................................................................................................................392 8.1.2 STP/RSTP Features Supported by the S9300........................................................................................397 8.2 Configuring Basic STP/RSTP Functions.......................................................................................................399 8.2.1 Establishing the Configuration Task.....................................................................................................399 8.2.2 Configuring the STP/RSTP Mode.........................................................................................................401 8.2.3 (Optional) Configuring Switching Device Priorities.............................................................................401 8.2.4 (Optional) Setting the Path Cost for a Port............................................................................................402 8.2.5 (Optional) Configuring Port Priorities...................................................................................................403 8.2.6 Enabling STP/RSTP..............................................................................................................................404 8.2.7 Checking the Configuration...................................................................................................................404 8.3 Configuring STP/RSTP Parameters on an Interface......................................................................................405 8.3.1 Establishing the Configuration Task.....................................................................................................407 8.3.2 Setting System Parameters....................................................................................................................408 8.3.3 Setting Port Parameters.........................................................................................................................409 8.3.4 Checking the Configuration...................................................................................................................411 8.4 Configuring RSTP Protection Functions........................................................................................................411 8.4.1 Establishing the Configuration Task.....................................................................................................411 8.4.2 Configuring BPDU Protection on a Switching Device.........................................................................413 8.4.3 Configuring TC Protection on a Switching Device...............................................................................414 8.4.4 Configuring Root Protection on a Port..................................................................................................414 8.4.5 Configuring Loop Protection on a Port.................................................................................................415 8.4.6 Checking the Configuration...................................................................................................................416 8.5 Configuring STP/RSTP Interoperability Between Huawei Devices and Non-Huawei Devices....................416 8.5.1 Establishing the Configuration Task.....................................................................................................416 8.5.2 Configuring the Proposal/Agreement Mechanism................................................................................417 8.5.3 Checking the Configuration...................................................................................................................418 8.6 Maintaining STP/RSTP..................................................................................................................................418 8.6.1 Clearing STP/RSTP Statistics...............................................................................................................419 8.7 Configuration Examples.................................................................................................................................419 8.7.1 Example for Configuring Basic STP Functions....................................................................................419 8.7.2 Example for Configuring Basic RSTP Functions..................................................................................423

9 MSTP Configuration.................................................................................................................4299.1 MSTP Overview.............................................................................................................................................431 9.1.1 MSTP Introduction................................................................................................................................431 9.1.2 MSTP Features Supported by the S9300...............................................................................................439 9.2 Configuring Basic MSTP Functions...............................................................................................................443 9.2.1 Establishing the Configuration Task.....................................................................................................443 9.2.2 Configuring the MSTP Mode................................................................................................................445 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xii

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

9.2.3 Configuring and Activating an MST Region........................................................................................446 9.2.4 (Optional) Setting a Priority for a Switching Device in an MSTI.........................................................447 9.2.5 (Optional) Setting a Path Cost of a Port in an MSTI.............................................................................448 9.2.6 (Optional) Setting a Port Priority in an MSTI.......................................................................................449 9.2.7 Enabling MSTP.....................................................................................................................................450 9.2.8 Checking the Configuration...................................................................................................................450 9.3 Configuring MSTP Multi-process..................................................................................................................451 9.3.1 Establishing the Configuration Task.....................................................................................................451 9.3.2 Creating an MSTP Process....................................................................................................................452 9.3.3 Adding an Interface to an MSTP Process - Access Links.....................................................................453 9.3.4 Adding an Interface to an MSTP Process - Share Link.........................................................................453 9.3.5 Configuring Priorities and Root Protection in MSTP Multi-process....................................................454 9.3.6 Configuring TC Notification in MSTP Multi-process..........................................................................454 9.3.7 Checking the Configuration...................................................................................................................455 9.4 Configuring MSTP Parameters on an Interface.............................................................................................455 9.4.1 Establishing the Configuration Task.....................................................................................................455 9.4.2 Configuring System Parameters............................................................................................................456 9.4.3 Configuring Port Parameters.................................................................................................................458 9.4.4 Checking the Configuration...................................................................................................................459 9.5 Configuring MSTP Protection Functions.......................................................................................................460 9.5.1 Establishing the Configuration Task.....................................................................................................460 9.5.2 Configuring BPDU Protection on a Switching Device.........................................................................462 9.5.3 Configuring TC Protection on a Switching Device...............................................................................462 9.5.4 Configuring Root Protection on an Interface........................................................................................463 9.5.5 Configuring Loop Protection on an Interface........................................................................................464 9.5.6 Configuring Share-Link Protection on a Switching Device..................................................................465 9.5.7 Checking the Configuration...................................................................................................................466 9.6 Configuring MSTP Interoperability Between Huawei Devices and Non-Huawei Devices...........................466 9.6.1 Establishing the Configuration Task.....................................................................................................466 9.6.2 Configuring a Proposal/Agreement Mechanism...................................................................................467 9.6.3 Configuring the MSTP Protocol Packet Format on an Interface...........................................................468 9.6.4 Enabling the Digest Snooping Function................................................................................................469 9.6.5 Checking the Configuration...................................................................................................................470 9.7 Maintaining MSTP.........................................................................................................................................470 9.7.1 Clearing MSTP Statistics.......................................................................................................................470 9.8 Configuration Examples.................................................................................................................................470 9.8.1 Example for Configuring Basic MSTP Functions.................................................................................470 9.8.2 Example for Connecting CEs to the VPLS in Dual-Homing Mode Through MSTP............................477 9.8.3 Example for Configuring MSTP Multi-Process for Layer 2 Single-Access Rings and Layer 2 Multi-Access Rings...............................................................................................................................................................489

10 SEP Configuration...................................................................................................................49710.1 SEP Overview...............................................................................................................................................499 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xiii

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

10.1.1 SEP Overview......................................................................................................................................499 10.1.2 SEP Features Supported by the S9300................................................................................................512 10.2 Configuring Basic SEP Functions................................................................................................................518 10.2.1 Establishing the Configuration Task...................................................................................................518 10.2.2 Configuring an SEP Segment..............................................................................................................519 10.2.3 Configuring a Control VLAN..............................................................................................................519 10.2.4 Creating a Protected Instance..............................................................................................................520 10.2.5 Adding a Layer 2 Interface to a SEP Segment and Configuring a Role for the Interface...................521 10.2.6 Checking the Configuration.................................................................................................................523 10.3 Specifying an Interface to Block..................................................................................................................523 10.3.1 Establishing the Configuration Task...................................................................................................523 10.3.2 Setting an Interface Blocking Mode....................................................................................................524 10.3.3 Configuring the Preemption Mode......................................................................................................526 10.3.4 Checking the Configuration.................................................................................................................527 10.4 Configuring SEP Multi-Instance..................................................................................................................528 10.4.1 Establishing the Configuration Task...................................................................................................528 10.4.2 Configuring and Activating Mappings Between Protected Instances and VLANs.............................530 10.4.3 Checking the Configuration.................................................................................................................530 10.5 Configuring the Topology Change Notification Function...........................................................................531 10.5.1 Establishing the Configuration Task...................................................................................................531 10.5.2 Reporting Topology Changes of a Lower-Layer Network - SEP Topology Change Notification ........................................................................................................................................................................533 10.5.3 Reporting Topology Changes of a Lower-Layer Network - Enabling the Edge Devices in a SEP Segment to Process SmartLink Flush Packets...............................................................................................................534 10.5.4 Reporting Topology Changes of an Upper-Layer Network - Configuring Association Between SEP and CFM................................................................................................................................................................535 10.5.5 Checking the Configuration.................................................................................................................536 10.6 Maintaining SEP...........................................................................................................................................536 10.6.1 Clearing SEP Statistics........................................................................................................................536 10.6.2 Debugging SEP....................................................................................................................................536 10.7 Configuration Examples...............................................................................................................................537 10.7.1 Example for Configuring SEP on a Closed Ring Network.................................................................537 10.7.2 Example for Configuring SEP on a Multi-ring Network....................................................................543 10.7.3 Example for Configuring a Hybrid SEP+MSTP Ring Network.........................................................554 10.7.4 Example for Configuring a Hybrid SEP+RRPP Ring Network..........................................................561 10.7.5 Example for Configuring SEP Multi-Instance....................................................................................573

11 Layer 2 Protocol Transparent Transmission Configuration............................................58111.1 Overview of Layer 2 Protocol Transparent Transmission............................................................................583 11.2 Layer 2 Protocol Transparent Transmission Features Supported by the S9300...........................................584 11.3 Configuring Interface-based Layer 2 Protocol Transparent Transmission...................................................590 11.3.1 Establishing the Configuration Task...................................................................................................590 11.3.2 (Optional) Defining Characteristic Information About a Layer 2 Protocol........................................590 11.3.3 Configuring the Transparent Transmission Mode of Layer 2 Protocol Packets.................................591 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xiv

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

11.3.4 Enabling Layer 2 Protocol Transparent Transmission on an Interface...............................................592 11.3.5 Checking Configuration......................................................................................................................593 11.4 Configuring VLAN-based Layer 2 Protocol Transparent Transmission......................................................593 11.4.1 Establishing the Configuration Task...................................................................................................594 11.4.2 (Optional) Defining Characteristic Information About a Layer 2 Protocol........................................594 11.4.3 Configuring the Transparent Transmission Mode of Layer 2 Protocol Packets.................................595 11.4.4 Enabling VLAN-based Layer 2 Protocol Transparent Transmission on an Interface.........................596 11.4.5 Checking the Configuration.................................................................................................................597 11.5 Configuring QinQ-based Layer 2 Protocol Transparent Transmission........................................................597 11.5.1 Establishing the Configuration Task...................................................................................................597 11.5.2 (Optional) Defining Characteristic Information About a Layer 2 Protocol........................................598 11.5.3 Configuring the Transparent Transmission Mode of Layer 2 Protocol Packets.................................599 11.5.4 Enabling QinQ-based Layer 2 Transparent Transmission on an Interface..........................................600 11.5.5 Checking the Configuration.................................................................................................................600 11.6 Maintaining Layer 2 Protocol Transparent Transmission............................................................................601 11.6.1 Debugging Layer 2 Protocol Transparent Transmission.....................................................................601 11.7 Configuration Examples...............................................................................................................................601 11.7.1 Example for Configuring Interface-based Layer 2 Protocol Transparent Transmission.....................601 11.7.2 Example for Configuring VLAN-based Layer 2 Protocol Transparent Transmission........................608 11.7.3 Example for Configuring QinQ-based Layer 2 Protocol Transparent Transmission..........................615

12 HVRP Configuration..............................................................................................................62312.1 HVRP Overview...........................................................................................................................................624 12.2 HVRP Features Supported by the S9300.....................................................................................................625 12.3 Enabling HVRP............................................................................................................................................628 12.3.1 Establishing the Configuration Task...................................................................................................628 12.3.2 Enabling HVRP Globally....................................................................................................................630 12.3.3 Enabling HVRP on an Interface..........................................................................................................630 12.3.4 (Optional) Setting the VLAN Registration Timer...............................................................................631 12.3.5 (Optional) Setting the Aging Time of Registered VLANs..................................................................631 12.3.6 (Optional) Configuring Permanent VLANs........................................................................................632 12.3.7 (Optional) Configuring the S9300 to Age All the VLANs.................................................................632 12.3.8 Checking the Configuration.................................................................................................................633 12.4 Maintaining HVRP.......................................................................................................................................633 12.4.1 Debugging HVRP................................................................................................................................633 12.5 Configuration Examples...............................................................................................................................634 12.5.1 Example for Configuring HVRP.........................................................................................................634

13 Loop Detection Configuration..............................................................................................63713.1 Introduction to Loop Detection....................................................................................................................638 13.2 Configuring Loop Detection.........................................................................................................................638 13.2.1 Establishing the Configuration Task...................................................................................................638 13.2.2 Enabling Loop Detection Globally......................................................................................................639 13.2.3 Enabling Loop Detection in a VLAN..................................................................................................639 Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xv

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

Contents

13.2.4 Enabling Loop Detection Control on an Interface...............................................................................640 13.2.5 (Optional) Disabling Loop Detection on an Interface.........................................................................641 13.2.6 (Optional) Setting the Loop Detection Interval on an Interface..........................................................641 13.2.7 (Optional) Setting the Recovery Time of a Blocked Interface............................................................641 13.2.8 Checking the Configuration.................................................................................................................642 13.3 Configuration Examples...............................................................................................................................643 13.3.1 Example for Configuring Loop Detection...........................................................................................643

Issue 01 (2011-10-26)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

xvi

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

1 Ethernet Interface Configuration

1

Ethernet Interface Configuration

About This ChapterThis chapter describes the basic knowledge, methods, and examples for configuring the Ethernet interface. 1.1 Introduction to Ethernet Interfaces This section describes the Ethernet interfaces. 1.2 Ethernet Interface Features Supported by the S9300 This section describes the Ethernet interface features supported by the S9300. 1.3 Configuring Basic Attributes of the Ethernet Interface This section describes how to configure the description, cable type, duplex mode, rate, and autonegotiation an Ethernet interface, and switch between the optical and electrical interfaces and between Layer 2 and Layer 3 interfaces. 1.4 Configuring Advanced Attributes of an Ethernet Interface This section describes how to configure the loopback on the Ethernet Interface, minimum interval for re-enabling an interface, port group, maximum frame size, flow control, flow control auto-negotiation, cable test, sub-interface IP address, and port isolation. 1.5 Maintaining Ethernet Interfaces This section describes how to maintain Ethernet interfaces. 1.6 Configuration Examples This section provides several configuration examples of Ethernet interfaces.

Issue 01 (2011-10-26)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

1 Ethernet Interface Configuration

1.1 Introduction to Ethernet InterfacesThis section describes the Ethernet interfaces. The Ethernet is flexible, simple, and easy to implement; therefore, it becomes an important local area network (LAN) networking technology. Table 1-1 shows the attributes of Ethernet electrical interfaces and Ethernet optical interfaces. Table 1-1 Attributes of Ethernet interfaces Interface Type Rate (Mbit/ s) Auto-negotiation Full Duplex Yes Yes Yes No Yes No Half Duplex Yes Yes No No No No Non-negotiation Full Duplex Yes Yes Yes Yes Yes Yes Half Duplex Yes Yes No No No No

Ethernet electrical interface

10 100 1000

Ethernet optical interface

100 1000 10000

If the local interface works in auto-negotiation mode, the peer interface must also work in autonegotiation mode; otherwise, packet loss may occur.

1.2 Ethernet Interface Features Supported by the S9300This section describes the Ethernet interface features supported by the S9300.

Port GroupThe port group function enables you to configure multiple interfaces at the same time. You can run commands in the port group view to configure all the interfaces in the group.

Auto-NegotiationThe auto-negotiation function allows interfaces on both ends of a link to select the same operating parameters by exchanging capability information. Each interface sends its capability information to the remote end and checks capabilities of the remote end. After both interfaces receive the capability information from each other, they adopt the highest capability they support to communicate with each other. The interfaces negotiate the duplex mode, speed, and flow control parameters. After a successful negotiation, the interfaces use the same duplex mode, speed, and flow control parameters.Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

1 Ethernet Interface Configuration

Port IsolationThe port isolation function isolates Layer 2 and Layer 3 communication between ports in the same VLAN. This function restricts packet transmission between ports flexibly, providing a secure and flexible network solution.

1.3 Configuring Basic Attributes of the Ethernet InterfaceThis section describes how to configure the description, cable type, duplex mode, rate, and autonegotiation an Ethernet interface, and switch between the optical and electrical interfaces and between Layer 2 and Layer 3 interfaces.

1.3.1 Establishing the Configuration TaskApplicable EnvironmentThe configuration task is applicable to the following situations: l l You can configure the description of interfaces to facilitate the identification, maintenance, and configuration of the interfaces. By default, an FE electrical interface automatically identifies the network cable type. If the interface cannot identify the cable type properly, set the cable type for the interface manually. By default, an FE electrical interface negotiates the duplex mode and rate with the equipment that is directly connected to the interface. If the connected equipment does not have the auto-negotiation capability, set the duplex mode and rate for the FE interface manually so that the interface can work with the connected equipment.

l

Pre-configuration TasksNone

Data PreparationTo configure the basic functions of Ethernet interfaces, you need the following data. No. 1 2 3 4 5 Data Number of an Ethernet interface (Optional) Description of an interface (Optional) Cable type of an ethernet electrical interface (Optional) Duplex mode of an ethernet electrical interface (Optional) Rate of an ethernet interface

1.3.2 (Optional) Configuring a Description for an InterfaceIssue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

1 Ethernet Interface Configuration

ContextPerform the following steps on the S9300.

ProcedureStep 1 Run:system-view

The system view is displayed. Step 2 Run:interface interface-type interface-number

The interface view is displayed. Step 3 Run:description description

A description is configured for the interface. By default, the description of an interface is "HUAWEI, Quidway Series, X interface". X specifies the interface type and number. ----End

1.3.3 (Optional) Configuring the Cable Type on an InterfaceContextPerform the following steps on the S9300.

ProcedureStep 1 Run:system-view

The system view is displayed. Step 2 Run:interface interface-type interface-number

The Ethernet electrical interface view is displayed. Step 3 Run:mdi { across | auto | normal }

The cable type is configured for the Ethernet electrical interface. By default, an Ethernet electrical interface automatically identifies the cable type. An electrical interface can use a crossover cable or a straight through cable. If across is specified, the interface can use a crossover cable; if normal is specified, the interface can use a straight through cable; if auto is specified, the interface can use both types of network cables. ----EndIssue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 4

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

1 Ethernet Interface Configuration

1.3.4 (Optional) Setting the Duplex ModeContextDo as follows on the S9300 where you need to set the duplex mode of interfaces.

ProcedureStep 1 Run:system-view

The system view is displayed. Step 2 Run:interface interface-type interface-number

The Ethernet electrical interface view is displayed. Step 3 Run:undo negotiation auto

The auto-negotiation mode is disabled on the Ethernet electrical interface. Step 4 Run:duplex { full | half }

The duplex mode is set for the Ethernet electrical interface. By default, the duplex mode of an Ethernet electrical interface is full-duplex when autonegotiation is disabled on the interface. ----End

1.3.5 (Optional) Setting the Rate of an InterfaceContextDo as follows on the S9300 where you need to set the rate of interfaces.

ProcedureStep 1 Run:system-view

The system view is displayed. Step 2 Run:interface interface-type interface-number

The interface view is displayed. Step 3 Run:undo negotiation auto

The auto-negotiation mode is disabled on the interface.Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 5

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

1 Ethernet Interface Configuration

Step 4 Run:speed { 10 | 100 | 1000 }

The rate is set for the interface. By default, an Ethernet interface works at its maximum rate when auto-negotiation is disabled on the interface. ----End

1.3.6 (Optional) Enabling Auto-NegotiationContextDo as follows on the S9300 where you want to enable auto-negotiation and on the switch connected to this S9300.

ProcedureStep 1 Run:system-view

The system view is displayed. Step 2 Run:interface interface-type interface-number

The interface view is displayed. Step 3 Run:negotiation auto

Auto-negotiation is enabled on the interface. By default, an interface works in auto-negotiation mode. The local interface and peer interface must work in the same mode, that is, both in autonegotiation mode or not.NOTE

100M and 10G optical interfaces do not support auto negotiation.

----End

1.3.7 (Optional) Switching Between Optical and Electrical InterfacesContextDo as follows on the S9300 where you need to switch between optical and electrical interfaces.

ProcedureStep 1 Run:Issue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 6

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernetsystem-view

1 Ethernet Interface Configuration

The system view is displayed. Step 2 Run:interface gigabitethernet interface-number

The GigabitEthernet interface view is displayed. Step 3 Run:combo-port { auto | copper | fiber }

The interface is changed to an optical interface or an electrical interface. By default, a combo port selects the working mode automatically. A G24C LPU has 8 electrical interface and 24 optical interfaces, among which the first 8 optical interfaces are duplexed with electrical interfaces. You can use the combo-port command to use these interfaces as electrical interfaces or optical interfaces. ----End

1.3.8 (Optional) Configuring an Interface to Work at Layer 2 or Layer 3ProcedureStep 1 Run:system-view

The system view is displayed. Step 2 Run:interface interface-type interface-number

The interface view is displayed. Step 3 Run:portswitch

The interface is configured to work at Layer 2. Step 4 Run:undo portswitch

The interface is configured to work at Layer 3. By default, an Ethernet interface works at Layer 2. When an Ethernet interface switches from Layer 3 to Layer 2, the Layer 3 functions and flag are disabled. The MAC address of the system is used. ----End

1.3.9 Checking the ConfigurationIssue 01 (2011-10-26) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 7

Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet

1 Ethernet Interface Configuration

ProcedureStep 1 Run the display interface [ interface-type [ interface-number [.subnumber ] ] ] command to display the description, duplex mode, and rate of an Ethernet interface. ----End

1.4 Configuring Advanced Attributes of an Ethernet InterfaceThis section describes how to configure the loopback on the Ethernet Interface, minimum interval for re-enabling an interface, port group, maximum frame size, flow control, flow control auto-negotiation, cable test, sub-interface IP address, and port isolation.

1.4.1 Establishing the Configuration TaskApplicable EnvironmentThe configuration task is applicable to the following situations: l l The S9300 provides the interface group function, which enables you to configure multiple interfaces at the same time. If the traffic volume received on an interface of the S9300 may exceed the processing capability of the interface and the directly connected interface supports traffic control, enable the traffic control fu