Documente Academic
Documente Profesional
Documente Cultură
HUAWEI iManager Quidview Router Network Management System User Manual V2.10
Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. If you purchase the products from the sales agent of Huawei Technologies Co., Ltd., please contact our sales agent. If you purchase the products from Huawei Technologies Co., Ltd. directly, Please feel free to contact our local office, customer care center or company headquarters.
Trademarks
TELLIN, InfoLink, Netkey, Quidway, SYNLOCK, Radium, M900/M1800, TELESIGHT, Quidview, Musa, Airbridge, Tellwin, Inmedia, VRP, DOPRA, iTELLIN, HUAWEI OptiX, C&C08 iNET, NETENGINE, OptiX, iSite, U-SYS, iMUSE, OpenEye, Lansway, SmartAX, infoX, TopEng are trademarks of Huawei Technologies Co., Ltd. All other trademarks mentioned in this manual are the property of their respective holders.
Notice
The information in this manual is subject to change without notice. Every effort has been made in the preparation of this manual to ensure accuracy of the contents, but all statements, information, and recommendations in this manual do not constitute the warranty of any kind, express or implied.
Organization
The manual introduces the use of HUAWEI iManager Quidview Router Network Management System V2.10.
! !
There are twenty-seven chapters and three appendixes in the manual Chapter 1 Overview profiles the features and applicable scope of Quidview Network Management System and Quidview Router Network Management System.
Chapter 2 User Interface focuses on the startup, user interface and main menu functions of Quidview Router Network Management System. Chapter 3 System Configuration elaborates on the configuration of Quidview Router Network Management System and the auxiliary functions. Chapter 4 Topology Management details the topology management functions of Quidview Router Network Management System integrated to the topology platform.
Chapter 5 Common Information Browsing describes in detail how to browse the common device information of Quidview Router Network Management System.
Chapter 6 Port Management describes in detail how to browse and configure port in Quidview Router Network Management System. Chapter 7 Device Management describes in detail how to browse and manage device in Quidview Router Network Management System. Chapter 8 Performance Monitoring describes in detail how to monitor the performances of different objects in Quidview Router Network Management System.
Chapter 9 RMON Management introduces the RMON management of Quidview Router Network Management System. Chapter 10 VLAN Management describes in detail how to query, create, delete and configure S8016 VLAN and VLAN Trunk in Quidview Router Network Management System.
Chapter 11 RSTP Management describes in detail how to configure the RSTP on S8016 device and ports in Quidview Router Network Management System. Chapter 12 Routing Protocol Browsing describes in detail how to browse routing protocols (RIP, OSPF and BGP) in Quidview Router Network Management System.
Chapter 13 S8016NAT Management describes in detail NAT function management for S8016 in Quidview Router Network Management System. Chapter 14 Ethernet Port Configuration describes in detail the configuration, querying and statistics making of Ethernet port in Quidview Router Network Management System.
Chapter 15 Ethernet Trunk Management describes in detail how to add, delete, configure and query Ethernet Trunk in Quidview Router Network Management System.
Chapter 16 IP Trunk Management describes in detail how to add, delete, configure and query IP Trunk in Quidview Router Network Management System. Chapter 17 POS Interface Management describes in detail how to configure and query POS interface in Quidview Router Network Management System. Chapter 18 RPR Interface Management describes in detail the configuration, querying and statistics making of RPR interface in Quidview Router Network Management System.
Chapter 19 CPOS Interface Management describes in detail the configuration, querying and statistics making of CPOS interface in Quidview Router Network Management System.
Chapter 20 ATM Interface Management describes in detail the configuration, querying and statistics making of ATM interface in Quidview Router Network Management System.
Chapter 21 Portal Configuraiton describes in detail the configuration of portal service for high-end routes in Quidview Router Network Management System. Chapter 22 Voice Management describes in detail the configuration, querying and statistics making of voice services in Quidview Router Network Management System.
Chapter 23 POS Access Management describes in detail the POS access management of Quidview Router Network Management System. Chapter 24 NDEC Management describes in detail NDEC management of Quidview Router Network Management System. Chapter 25 Terminal Server Management describes in detail terminal server management of Quidview Router Network Management System. Chapter 26 DLSW Service Management describes in detail the management of DLSW service of Quidview Router Network Management System. Chapter 27 DHCP Management describes in detail DHCP configuration for core roures and S8016 of Quidview Router Network Management System. Appendix A How to Use SNMPc 5.0 Appendix B Abbreviations
! !
Appendix C FAQ
Intended Audience
The manual is intended for the following readers:
! ! !
Network engineers Network administrators Customers who are familiar with network fundamentals
Conventions
The manual uses the following conventions:
I. General conventions
Convention Arial Arial Narrow Boldface Courier New Description Normal paragraphs are in Arial. Warnings, Cautions, Notes and Tips are in Arial Narrow. Headings are in Boldface. Terminal Display is in Courier New.
IV. Symbols
Eye-catching symbols are also used in the manual to highlight the points worthy of special attention during the operation. They are defined as follows:
Caution, Warning, Danger: Means reader be extremely careful during the operation. " Note, Comment, Tip, Knowhow, Thought: Means a complementary description.
Table of Contents
Table of Contents
Chapter 1 Overview ....................................................................................................................... 1-1 1.1 Overview of Quidview Network Management System....................................................... 1-1 1.2 Overview of Quidview RouterManager .............................................................................. 1-1 Chapter 2 User Interface ............................................................................................................... 2-1 2.1 Starting Quidview RouterManager..................................................................................... 2-1 2.1.1 Starting Quidview Independently ............................................................................ 2-1 2.1.2 Starting Quidview on SNMPc Topology Platform ................................................... 2-1 2.1.3 Starting Quidview on WhatsUp Gold ...................................................................... 2-2 2.1.4 Starting Quidview on HP OpenView ....................................................................... 2-2 2.1.5 Starting Quidview on IBM NetView NMS Platform.................................................. 2-2 2.1.6 Starting RouterManager on N2000 EMF Platform .................................................. 2-2 2.1.7 Starting RouterManager on N2000 Platform........................................................... 2-2 2.2 User Interface .................................................................................................................... 2-3 2.2.1 Menu ....................................................................................................................... 2-3 2.2.2 Toolbar .................................................................................................................... 2-4 2.2.3 Device List Window................................................................................................. 2-5 2.2.4 Function Window..................................................................................................... 2-5 2.2.5 Information Display Area......................................................................................... 2-5 2.2.6 Message Window.................................................................................................... 2-6 2.3 Open Device ...................................................................................................................... 2-6 Chapter 3 System Configuration ................................................................................................. 3-1 3.1 Parameter Setting .............................................................................................................. 3-1 3.1.1 System Options Setting........................................................................................... 3-1 3.1.2 Authentication Options Setting................................................................................ 3-2 3.2 User Management ............................................................................................................. 3-5 3.2.1 User Management................................................................................................... 3-5 3.2.2 Modify Password ..................................................................................................... 3-6 3.3 Auxiliary Functions............................................................................................................. 3-6 3.3.1 Browsing Message Window .................................................................................... 3-6 3.3.2 Creating Telnet Connection .................................................................................... 3-6 3.3.3 Ping ......................................................................................................................... 3-7 3.3.4 TraceRoute.............................................................................................................. 3-7 3.3.5 Refreshing Panel..................................................................................................... 3-7 3.3.6 Selecting Window Layout........................................................................................ 3-7 3.3.7 Viewing Logs ........................................................................................................... 3-7 3.3.8 Online Help.............................................................................................................. 3-8
Table of Contents
Chapter 4 Topology Management................................................................................................ 4-1 4.1 Overview ............................................................................................................................ 4-1 4.2 Starting NTM of SNMPc .................................................................................................... 4-1 4.3 Starting NTM of WhatsUp Gold ......................................................................................... 4-3 4.4 Starting NTM of HP OpenView NNM................................................................................. 4-5 4.5 Starting NTM of IBM NetView............................................................................................ 4-9 4.6 Starting the Network Topology Management of N2000 EMF .......................................... 4-11 4.7 Starting the Network Topology Management of N2000................................................... 4-13 Chapter 5 Common Information Browsing................................................................................. 5-1 5.1 Device Browsing ................................................................................................................ 5-1 5.2 Board Browsing.................................................................................................................. 5-4 5.2.1 Board Browsing for Core Routers ........................................................................... 5-4 5.2.2 Board Browsing for High-end Routers .................................................................... 5-6 5.3 SubCard Browsing ............................................................................................................. 5-7 5.4 Clock Source Browsing...................................................................................................... 5-8 5.5 Fan Browsing ..................................................................................................................... 5-9 5.6 Power Browsing ............................................................................................................... 5-10 Chapter 6 Port Management......................................................................................................... 6-1 6.1 Port Information ................................................................................................................. 6-1 6.2 Subport Browsing .............................................................................................................. 6-3 6.3 Port Time Slot .................................................................................................................... 6-4 6.4 Port UP/Down Configuration.............................................................................................. 6-5 6.5 Port Mirror Management.................................................................................................... 6-5 6.5.1 Monitoring Port Management.................................................................................. 6-6 6.5.2 Port Mirror Management ......................................................................................... 6-6 6.6 Port L2/L3 Configuration.................................................................................................... 6-8 6.7 Link-aggregation Management .......................................................................................... 6-9 6.7.1 Querying Link-aggregation Information................................................................... 6-9 6.7.2 Add Link-aggregation ............................................................................................ 6-10 6.7.3 Delete Link-aggregation ........................................................................................ 6-11 6.7.4 Config Link-aggregation ........................................................................................ 6-12 Chapter 7 Device Management .................................................................................................... 7-1 7.1 Active/Standby Switching .................................................................................................. 7-1 7.2 Card Reset......................................................................................................................... 7-2 7.3 Attribute Config .................................................................................................................. 7-2 7.4 L2 Forwarding Table Management.................................................................................... 7-3 7.4.1 Querying L2 Forwarding Table Information ............................................................ 7-3 7.4.2 Creating L2 Forwarding Entry ................................................................................. 7-4 7.4.3 Deleting L2 Forwarding Entry.................................................................................. 7-5 7.4.4 Configuring L2 Forwarding Entry ............................................................................ 7-5 7.4.5 Querying and Configuring L2 Forwarding Table Aging Time.................................. 7-5
ii
Table of Contents
Chapter 8 Performance Monitoring ............................................................................................. 8-1 8.1 Operation Description ........................................................................................................ 8-1 8.2 Device Monitoring .............................................................................................................. 8-3 8.3 Port Monitoring................................................................................................................... 8-5 8.4 System Monitoring ............................................................................................................. 8-6 8.5 Card Monitoring ................................................................................................................. 8-6 Chapter 9 RMON Management..................................................................................................... 9-1 9.1 Configuration and Real-time Monitoring of Statistics Group ............................................. 9-1 9.2 Configuration and Data Browsing of History Group........................................................... 9-5 9.3 Configuration and Browsing of Alarm Group ..................................................................... 9-9 9.4 Configuration and Log Browsing of Event Group ............................................................ 9-14 9.5 Configuration and Browsing of Alarm Extended Group................................................... 9-17 9.6 Browsing of Log Information ............................................................................................ 9-22 Chapter 10 VLAN Management .................................................................................................. 10-1 10.1 VLAN Management ....................................................................................................... 10-1 10.1.1 Querying VLAN Information ................................................................................ 10-1 10.1.2 Creating Common VLAN..................................................................................... 10-2 10.1.3 Deleting VLAN..................................................................................................... 10-4 10.1.4 Configuring Common VLAN................................................................................ 10-4 10.1.5 Configuring Aggregate VLAN.............................................................................. 10-4 10.1.6 Setting Common VLAN as Aggregate VLAN ...................................................... 10-5 10.2 VLAN Interface Management ........................................................................................ 10-5 10.2.1 Querying VLAN Interface Information ................................................................. 10-5 10.2.2 Creating VLAN Interface ..................................................................................... 10-6 10.2.3 Deleting VLAN Interface...................................................................................... 10-7 10.2.4 Configuring VLAN Interface ................................................................................ 10-7 10.3 VLAN Trunk Management ............................................................................................. 10-8 10.3.1 Querying Trunk Port Information......................................................................... 10-9 10.3.2 Creating Trunk Port............................................................................................. 10-9 10.3.3 Deleting Trunk Port ........................................................................................... 10-10 10.3.4 Configuring Trunk Port ...................................................................................... 10-10 Chapter 11 RSTP Management .................................................................................................. 11-1 11.1 Device RSTP Configuration........................................................................................... 11-1 11.2 Port RSTP Management................................................................................................ 11-3 Chapter 12 Routing Protocol Management .............................................................................. 12-1 12.1 Overview ........................................................................................................................ 12-1 12.2 Browsing of RIP Information .......................................................................................... 12-3 12.2.1 Interface Config ................................................................................................... 12-4 12.2.2 Interface Statistics ............................................................................................... 12-5 12.2.3 Peer Information.................................................................................................. 12-5 12.3 OSPF Protocol Information............................................................................................ 12-6
iii
Table of Contents
12.3.1 Query of OSPF Protocol Attribute ....................................................................... 12-7 12.3.2 OSPF Protocol Area Information Browsing......................................................... 12-8 12.3.3 OSPF Protocol Connection Status Database Information ................................ 12-10 12.3.4 OSPF Protocol Interface Information Browsing ................................................ 12-11 12.3.5 OSPF Protocol Peer Information Browsing....................................................... 12-13 12.3.6 OSPF Protocol Virtual Link Information Browsing ............................................ 12-14 12.4 BGP Information .......................................................................................................... 12-16 12.4.1 Query of BGP Attribute ..................................................................................... 12-17 12.4.2 BGP Peer Information Browsing ....................................................................... 12-18 12.4.3 BGP4 Path Information Browsing ..................................................................... 12-20 12.5 Routing Protocol Enable Configuration ....................................................................... 12-21 12.6 Routing Table Browsing............................................................................................... 12-22 12.6.1 Static Routing Information................................................................................. 12-23 12.6.2 Dynamic Routing Information............................................................................ 12-24 Chapter 13 S8016 NAT Management ......................................................................................... 13-1 13.1 NAT Board Attribute and Monitor .................................................................................. 13-2 13.1.1 Querying NAT Board Attribute ............................................................................ 13-2 13.1.2 Configuring NAT Board Attribute ........................................................................ 13-3 13.1.3 NAT Board Flow Monitor..................................................................................... 13-4 13.1.4 Clearing Dynamic Entries on a NAT Board......................................................... 13-4 13.2 Address Group and ACL Management ......................................................................... 13-4 13.2.1 Querying NAT Address Group Information ......................................................... 13-5 13.2.2 Creating a NAT Address Group .......................................................................... 13-5 13.2.3 Deleting a NAT Address Group........................................................................... 13-6 13.2.4 Querying NAT ACL Information .......................................................................... 13-6 13.2.5 Creating a NAT ACL ........................................................................................... 13-7 13.2.6 Deleting a NAT ACL............................................................................................ 13-8 13.2.7 Querying NAT Bind Information .......................................................................... 13-8 13.2.8 Creating a NAT Bind ........................................................................................... 13-9 13.2.9 Deleting a NAT Bind............................................................................................ 13-9 13.3 Server Management ...................................................................................................... 13-9 13.3.1 Querying NAT Server Information..................................................................... 13-10 13.3.2 Creating a NAT Server...................................................................................... 13-11 13.3.3 Deleting a NAT Server ...................................................................................... 13-12 13.4 Aging Time Management............................................................................................. 13-12 13.5 NAT Enable Attribute Management ............................................................................. 13-12 13.5.1 Querying the NAT Enable Attribute of an Interface .......................................... 13-13 13.5.2 Changing the NAT Enable Status of an Interface ............................................. 13-13 13.5.3 Creating a NAT-enabled Destination Segment................................................. 13-13 13.5.4 Deleting a NAT-enabled Destination Segment ................................................. 13-14 13.6 Blacklist Management.................................................................................................. 13-14 13.6.1 Querying Blacklist Information .......................................................................... 13-15
iv
Table of Contents
13.6.2 Deleting Blacklist Information............................................................................ 13-15 13.6.3 Querying and Configuring Blacklist Connection Limitation Parameters ........... 13-16 13.6.4 Querying Blacklist Connection Limitation Parameters on Special IPs.............. 13-17 13.6.5 Creating Blacklist Connection Limitation Parameters on Special IPs............... 13-18 13.6.6 Deleting Blacklist Connection Limitation Parameters on Special IPs ............... 13-19 13.6.7 Configuring Blacklist Connection Limitation Parameters on Special IPs .......... 13-19 Chapter 14 Ethernet Interface Configuration ........................................................................... 14-1 14.1 Overview ........................................................................................................................ 14-1 14.2 Ethernet Interface Configuration.................................................................................... 14-4 14.2.1 Ethernet Port Status Configuration ..................................................................... 14-4 14.2.2 Interface Parameter Configuration ...................................................................... 14-5 14.2.3 Reset Counter ..................................................................................................... 14-7 14.3 Ethernet Interface Information Query ............................................................................ 14-8 14.3.1 Browse Basic Information ................................................................................... 14-8 14.3.2 Browse Received Information ............................................................................. 14-9 14.3.3 Browse Sent Information................................................................................... 14-10 14.3.4 Browse Invalid VLAN ID.................................................................................... 14-12 14.3.5 Browse E4GC Information ................................................................................ 14-13 14.4 Real-time Statistics of Ethernet Interface .................................................................... 14-14 14.4.1 Real-Time Flow Statistics.................................................................................. 14-14 14.4.2 Real-Time Collision Statistics............................................................................ 14-15 14.4.3 Real-Time Error Statistics ................................................................................. 14-16 14.5 Subinterface Management........................................................................................... 14-16 14.5.1 Subinterface Management ................................................................................ 14-17 14.5.2 Subinterface MultiCast Query ........................................................................... 14-20 14.5.3 Subinterface Flow Query................................................................................... 14-21 Chapter 15 Ethernet Trunk Management .................................................................................. 15-1 15.1 Overview ........................................................................................................................ 15-1 15.2 Adding an Eth Trunk ...................................................................................................... 15-3 15.3 Deleting an Eth Trunk .................................................................................................... 15-4 15.4 Eth Trunk Configuration................................................................................................. 15-4 15.4.1 Eth Trunk Status Configuration ........................................................................... 15-4 15.4.2 Eth Trunk Parameter Configuration .................................................................... 15-6 15.4.3 Eth Trunk Counter Reset .................................................................................... 15-7 15.4.4 Port Configuration ............................................................................................... 15-7 15.5 Eth Trunk Information Query ......................................................................................... 15-9 15.5.1 Trunk Information ................................................................................................ 15-9 15.5.2 Trunk Port Information ...................................................................................... 15-10 15.6 Eth Trunk Statistic Information Query.......................................................................... 15-11 15.7 Eth Trunk Subinterface Management.......................................................................... 15-13 15.7.1 Eth Trunk Subinterface Management ............................................................... 15-13 15.7.2 Trunk Subinterface MultiCast Query................................................................. 15-16
Table of Contents
15.7.3 Trunk Subinterface Flow Query ........................................................................ 15-17 Chapter 16 IP Trunk Management ............................................................................................. 16-1 16.1 Brief Introduction to the IP Trunk ................................................................................... 16-1 16.2 Adding an IP Trunk ........................................................................................................ 16-3 16.3 Deleting an IP Trunk Interface ....................................................................................... 16-4 16.4 Configuring the IP Trunk................................................................................................ 16-4 16.4.1 IP Trunk Status Configuration ............................................................................. 16-4 16.4.2 IP Trunk Parameter Configuration ...................................................................... 16-5 16.4.3 Add/Delete IP Trunk Member Port ...................................................................... 16-6 16.5 IP Trunk View................................................................................................................. 16-7 16.5.1 IP Trunk Member Port Information...................................................................... 16-7 16.5.2 IP Trunk Flow Statistics Query............................................................................ 16-8 Chapter 17 POS Interface Management .................................................................................... 17-1 17.1 Overview ........................................................................................................................ 17-1 17.2 POS Interface Configuration.......................................................................................... 17-3 17.3 Path Configuration ......................................................................................................... 17-5 17.4 SDH Interface Query ..................................................................................................... 17-8 17.5 SDH Path Query .......................................................................................................... 17-11 Chapter 18 RPR Interface Management .................................................................................... 18-1 18.1 Logical and Physical Interfaces of RPR ........................................................................ 18-2 18.2 Interface Management................................................................................................... 18-3 18.2.1 MAC Parameter .................................................................................................. 18-4 18.2.2 Interface Status ................................................................................................... 18-5 18.2.3 Interface Parameter ............................................................................................ 18-6 18.3 Counter Configuration.................................................................................................... 18-7 18.3.1 Source Counter Configuration............................................................................. 18-8 18.3.2 Destination Counter Configuration .................................................................... 18-11 18.3.3 Source Reject Counter Configuration ............................................................... 18-12 18.4 Topology Management ................................................................................................ 18-13 18.4.1 Static Ring Selection ......................................................................................... 18-14 18.4.2 Querying the Topology Information................................................................... 18-16 18.5 Querying the SDH Interface......................................................................................... 18-17 18.6 SDH Path Query .......................................................................................................... 18-18 18.7 Ring Monitoring............................................................................................................ 18-19 18.8 Host Monitoring............................................................................................................ 18-21 18.9 Error Monitoring ........................................................................................................... 18-23 18.10 Display Topology Ring............................................................................................... 18-24 Chapter 19 CPOS Port Management ......................................................................................... 19-1 19.1 Overview ........................................................................................................................ 19-1 19.2 CPOS Interface Configuration ....................................................................................... 19-2 19.3 Higher-Order Path Management ................................................................................... 19-4
vi
Table of Contents
19.3.1 Higher-Order Path Configuration ........................................................................ 19-5 19.3.2 Higher-Order Path Current View ......................................................................... 19-5 19.3.3 Higher-Order Path History View.......................................................................... 19-7 19.4 Lower-Order Path Management .................................................................................... 19-9 19.4.1 Adding a Lower-Order Path ................................................................................ 19-9 19.4.2 Deleting a Lower-Order Path ............................................................................ 19-10 19.4.3 Lower-Order Path Configuration ....................................................................... 19-11 19.4.4 Lower-Order Path Traffic Monitor ..................................................................... 19-14 19.4.5 Lower-Order Path Current View........................................................................ 19-16 19.4.6 Lower-Order Path History View......................................................................... 19-18 19.5 Multilink Management.................................................................................................. 19-19 19.5.1 Adding a Multilink .............................................................................................. 19-20 19.5.2 Deleting a Multilink ............................................................................................ 19-21 19.5.3 Configuring a Multilink....................................................................................... 19-21 19.5.4 Multilink Statistics .............................................................................................. 19-25 19.6 SDH Interface Query ................................................................................................... 19-25 Chapter 20 ATM Interface Management .................................................................................... 20-1 20.1 Overview ........................................................................................................................ 20-1 20.2 Interface Configuration .................................................................................................. 20-2 20.2.1 Interface Maintenance......................................................................................... 20-3 20.2.2 SDH Parameter Configuration ............................................................................ 20-5 20.3 PVC Management ......................................................................................................... 20-6 20.3.1 PVC Configuration .............................................................................................. 20-7 20.3.2 OAM Test Configuration.................................................................................... 20-12 20.4 SDH Interface Query ................................................................................................... 20-13 20.5 SDH Path Query .......................................................................................................... 20-13 Chapter 21 Portal Configuration ................................................................................................ 21-1 21.1 Portal Protocol Overview ............................................................................................... 21-1 21.2 Portal Configuration ....................................................................................................... 21-2 21.2.1 Portal Function List ............................................................................................. 21-2 21.2.2 Enabling Portal .................................................................................................... 21-2 21.2.3 Configuring Portal ID........................................................................................... 21-3 21.2.4 Address Pool Configuration ................................................................................ 21-6 21.2.5 NAS Configuration .............................................................................................. 21-7 21.2.6 iTELLIN Key Configuration.................................................................................. 21-8 21.2.7 Browsing Portal User Information ..................................................................... 21-10 21.2.8 Browsing Portal Status Information................................................................... 21-10 Chapter 22 Voice Management .................................................................................................. 22-1 22.1 Voice Common Information ........................................................................................... 22-2 22.2 Voice Port Information ................................................................................................... 22-3 22.2.1 Analog Port Configuration ................................................................................... 22-3 22.2.2 Digital Port Configuration .................................................................................. 22-10
vii
Table of Contents
22.3 Voice Entity Information............................................................................................... 22-15 22.3.1 POTS Voice Entity Configuration ...................................................................... 22-16 22.3.2 VOIP Voice Entity Configuration ....................................................................... 22-20 22.4 Voice AAA Information................................................................................................. 22-23 22.4.1 AAA Attribute Configuration .............................................................................. 22-23 22.4.2 Local User Configuration................................................................................... 22-24 22.4.3 Access Number Configuration .......................................................................... 22-25 22.5 GK Client Information .................................................................................................. 22-27 22.6 Voice Call Information.................................................................................................. 22-29 22.7 H.323 Call Statistics..................................................................................................... 22-34 Chapter 23 POS Access Management....................................................................................... 23-1 23.1 POS Access Common Information ................................................................................ 23-1 23.2 POS Access Port Management ..................................................................................... 23-3 23.2.1 Browse POS Access Port ................................................................................... 23-3 23.2.2 Add POS Access Port ......................................................................................... 23-4 23.2.3 Delete POS Access Port ..................................................................................... 23-5 23.2.4 Config POS Access Port ..................................................................................... 23-5 23.2.5 Monitoring Statistical Information of POS Access Port ....................................... 23-6 23.3 POS App Port Management .......................................................................................... 23-7 23.4 POS Application Management....................................................................................... 23-8 23.4.1 Browse POS Applications ................................................................................... 23-8 23.4.2 Add POS Application......................................................................................... 23-10 23.4.3 Delete POS Application..................................................................................... 23-11 23.4.4 Config POS Application..................................................................................... 23-11 23.4.5 Monitoring Statistical Information of POS Application ...................................... 23-11 23.5 POS Map Management ............................................................................................... 23-12 23.5.1 Browsing POS Map........................................................................................... 23-13 23.5.2 Add POS Map ................................................................................................... 23-14 23.5.3 Delete POS Map ............................................................................................... 23-15 23.5.4 Config POS Map ............................................................................................... 23-15 23.6 FCM Port Management ............................................................................................... 23-15 Chapter 24 NDEC Management.................................................................................................. 24-1 24.1 NDEC Management....................................................................................................... 24-1 24.2 NDEC Information.......................................................................................................... 24-2 24.2.1 Clearing Statistics ............................................................................................... 24-3 24.2.2 Resetting NDEC .................................................................................................. 24-3 24.2.3 Synchronizing Clock............................................................................................ 24-4 24.2.4 NDEC Logging .................................................................................................... 24-4 24.3 Router SA Information ................................................................................................... 24-4 24.4 NDEC IKE SA Information ............................................................................................. 24-5 24.5 Router IKE Policy Information........................................................................................ 24-6 24.6 Router Security Policy Information ................................................................................ 24-7
viii
Table of Contents
24.7 Transform Mode Security Information ........................................................................... 24-8 Chapter 25 Terminal Server Management ................................................................................ 25-1 25.1 Terminal Access Server Management .......................................................................... 25-1 25.2 Terminal Access Application Management ................................................................... 25-2 25.3 Physical Terminal and Virtual Terminal Management ................................................... 25-5 25.4 Physical Terminal Information ....................................................................................... 25-8 25.5 Management Path Information .................................................................................... 25-11 Chapter 26 DLSW Service Management ................................................................................... 26-1 26.1 DLSW Configuration ...................................................................................................... 26-1 26.2 Local Peer...................................................................................................................... 26-2 26.3 Remote Peer.................................................................................................................. 26-3 26.4 Bridge Group.................................................................................................................. 26-5 26.5 SDLC Interface .............................................................................................................. 26-8 26.5.1 SDLC Interface Configuration ............................................................................. 26-9 26.5.2 SDLC Prot Remote Peer Configuration ............................................................ 26-10 26.6 LLC2 Parameter Configuration .................................................................................... 26-12 26.7 DLSW View.................................................................................................................. 26-14 Chapter 27 DHCP Management.................................................................................................. 27-1 27.1 DHCP Server Group Management ................................................................................ 27-1 27.1.1 Browsing DHCP Server Group Information ........................................................ 27-1 27.1.2 Configuring DHCP Server Group ........................................................................ 27-2 27.2 DHCP Relay Management ............................................................................................ 27-3 27.2.1 Querying VLAN and DHCP Server Group Association....................................... 27-3 27.2.2 Creating VLAN and DHCP Server Group Association........................................ 27-4 27.2.3 Deleting VLAN and DHCP Server Group Association ........................................ 27-5 27.2.4 Configuring VLAN and DHCP Server Group Association................................... 27-5 27.3 VLAN Address Pool Management ................................................................................. 27-6 27.3.1 Querying VLAN Address Pool Information.......................................................... 27-6 27.3.2 Changing VLAN Address Allocation Mode ......................................................... 27-7 27.3.3 Configuring VLAN Address Pool ......................................................................... 27-7 27.3.4 Querying Statistics Information ........................................................................... 27-8 27.3.5 Appending Disabled IP Segment ........................................................................ 27-9 27.3.6 Canceling Disabled IP Segment ......................................................................... 27-9 27.4 Global Address Pool Management .............................................................................. 27-10 27.4.1 Querying Global Address Pool Information....................................................... 27-10 27.4.2 Creating Global Address Pool........................................................................... 27-11 27.4.3 Deleting Global Address Pool ........................................................................... 27-13 27.4.4 Configuring Global Address Pool ...................................................................... 27-13 27.4.5 Querying Statistics Information ......................................................................... 27-13 27.4.6 Appending Disabled IP Segment ...................................................................... 27-14 27.4.7 Canceling Disabled IP Segment ....................................................................... 27-15 27.5 DHCP Traffic Monitoring.............................................................................................. 27-16
ix
Table of Contents
Appendix A How to Use SNMPc 5.0 ............................................................................................A-1 A.1 Installing SNMPc 5.0 ......................................................................................................... A-1 A.2 Starting SNMPc ................................................................................................................. A-2 A.3 Editing SNMPc 5.0 Topology Map Manually..................................................................... A-5 Appendix B Abbreviations ...........................................................................................................B-1 Appendix C FAQ ............................................................................................................................C-1
Chapter 1 Overview
Chapter 1 Overview
1.1 Overview of Quidview Network Management System
Quidview is a network management product, which is independently developed by Huawei Technologies Co., Ltd. (hereinafter referred to as Huawei), and is intended for integrated management and maintenance of such data communication products as routers and Ethernet switches. Quidview is used at the management layer of network solutions and implements management for multi-device network element and network. In combination with Huawei data communication products, Quidview provides overall network solutions, not only supporting maintenance and network management of data communication devices but also providing support and interface for Operating Support System (OSS) of telecom network. The system uses the universal standard network management protocol SNMP and supports SNMP V1, V2c and V3. Quidview network management system (NMS) can help users to reach the following goals:
! ! ! ! ! !
Improving reliability of networks Ensuring QoS of network operation Outlining and allocating network resources reasonably Forecasting and detecting network faults Centralized management of widely distributed network nodes Statistics and analysis of device performance
1-1
Chapter 1 Overview
As a compact NM tool making sufficient use of the management information base of the device, it fulfils such fundamental network management functions as browsing configuration information of the device and monitoring running status of the device etc. Moreover, it can also be integrated with some universal NM platforms such as SNMPc, HP OpenView NNM, WhatsUp Gold, IBM Tivoli NetView, N2000 V1 and N2000 EMF, implementing all-round network management from device level to network level. Quidview RouterManager endeavors to meet requirements of more abundant functions while helping users reduce product cost. Quidview RouterManager has the following features:
I. Powerful functions
Huawei Quidview RouterManager provides visual operations on the whole device. That is, it provides users with complete device views, in which, users can directly select objects such as the overall device, object panels and interfaces etc and select corresponding functions to fulfill corresponding function operations including browsing the configuration information and monitoring the system status etc. Huawei Quidview RouterManager provides corresponding service functions according to different devices, including RMON management, VLAN management, RSTP management, routing protocol information browse, Ethernet interface management, Ethernet Trunk management, IP Trunk management, POS interface management, RPR interface management, CPOS Port Management, ATM Interface Management, Portal Management, VOIP service management, POS access management, NDEC Management, Terminal Server Management, DLSW Service Management and DHCP Management.
1-2
Chapter 1 Overview
1-3
[Start/Program/Quidview/RouterManager/RouterManager] under Widows environment and a user login window will pop up. After the user correctly enters user name and password, Quidview RouterManager will be started.
" Note: Quidview RouterManager can be installed and run under both Windows and UNIX series OSs to implement exactly same functions. This manual details the use and operation of Quidview RouterManager by taking Windows system as an example. For the installation of Quidview RouterManager, refer to the related installation manual.
2-1
2-2
Caution: The user name and password of the default login account of Quidview RouterManager is "admin" and "quidview" respectively.
The interface comprises menu bar, toolbar, device list window, function window and display area. The following details these parts respectively.
2.2.1 Menu
The main interface of the Quidview RouterManager includes such main menu items as System, Device, View, Tools, Window and Help. Each menu item consists of different
2-3
sub-menu items. The functions implemented by these menu items are described in Table 2-1. Table 2-1 Description of menu items
Menu item User Management Modify Password Authentication Options System System Options View Logs Exit Device Open Device Close Device Refresh View Search Show Device List Show Function Window Show Message Window Telnet Ping Traceroute Select Layout Legend Help Help Topics About Quidview Description Manages the uses of the Quidview RouterManager Modifies the login password of RouterManager users. Sets SNMP and Telnet parameters Accesses the "System Options" window where to set the running parameters such as the refresh interval. Accesses the "Log View" window, displaying the Operation Logs of all users and system Run Log information. Exit the Quidview RouterManager Opens the "Open Device" window where you may create a connection with the device by entering its IP address and community name. Disconnects the device. Refreshes the device panel and corresponding display information immediately to show current state of the device. Searches for a device in the device tree according to the label or IP address. Opens or closes the device list window. Opens or closes the function window. Opens or closes the message window. Invokes the Telnet application of the operating system. Invokes the Ping application of the operating system. Invokes the TraceRoute application of the operating system. Selects window layout mode. Describes device icons, interface colors in the device panel, device status and board status in detail. Displays the online help of the Quidview RouterManager. Displays the version and copyright information of the Quidview RouterManager.
Tools Window
The system also supports three kinds of short-cut menus, device short-cut menu popping up when right clicking on a device, board short-cut menu popping up when right clicking on a board and port short-cut menu popping up when right clicking on a port. The short-cut menu provides quick start of the functions contained in the function tree, facilitating user's operation.
2.2.2 Toolbar
The toolbar offers the short-cut buttons for some commonly used functions of Quidview RouterManager.
2-4
With the device tree menu, you may open, close or delete a device in the device list, and browse device attributes. Meanwhile, the device tree supports sorting function by device label or IP address. For the meaning of various icons on the device tree, select [Help/Legend].
2-5
Enter the IP address of the managed device in "IP Address" edit box. Enter a device identifier in "Label" edit box to facilitate the identification of the device (optional). If this item is not specified, it will be defaulted to the device name. Select the protocol parameter in "SNMP" edit box. For SNMP V1 and SNMP V2, the read-only or read-write community names could be specified. For SNMP V3, Auth Type, Auth Password, Encryption Type and Encryption Password could be set. After above settings, click <OK> button to open the device panel view in the information display area. Quidview RouterManager provides front and rear panel views for high-end routers such as NE05, NE08 and NE16. For NE80, S8016 and all mid-range and low-end routers, only the rear panel views are displayed. Network administrators can learn about the current operation status of various interfaces via the colors shown on the panel.
2-6
Corresponding relations between interface colors and status in device panel view are listed in Table 2-2: Table 2-2 Corresponding relations between interface colors and status
Interface color Green Interface operation status Administra tion Status UP Operation Status UP Meaning of status The interface operates normally, i.e., available for receiving and transmitting packets. Administration status and operation status of the interface are different, when the interface cannot receive or transmit packets. In this case, the network administrator should check the configuration of the interface (it may have not been configured with an IP address or could not respond to Ping correctly). For multiplexed interface, it means the administration and operation status of some time slots are UP (green status) or DOWN (blue status), and the administration and operation status of the others are UP (red status) and DOWN respectively. The interface cannot receive or transmit packets (it may be shut down manually).
Red
UP
DOWN
Yellow
Blue Gray
DOWN
DOWN
2-7
Various parameters in this window are described in Table 3-1: Table 3-1 Parameters in system options window
Name Description Value range
Refreshing interval of such interfaces as Device Browse, Port Browse, etc. Polling interval may affect network performance to Browse It is a value in the range of 60 certain extent. By reducing polling frequency (e.g. changing the Refresh to 65535s. By default, it is polling interval from 10s to 100s), SNMP packet traffic on the network Interval 300s. and SNMP requests to be processed by the managed device will be decreased. RealMonitor It is a value in the range of 2 Predefined refreshing interval of Port Monitoring and Device Refresh to 65535s. By default, it is Monitoring interface. Interval 60s.
3-1
" Note: When current user logs off Quidview, the settings of above parameters will be stored on the disk automatically.
SNMP V1 and SNMP V2 adopt community name authentication mode, and the SNMP packets whose community names are not consistent with those configured on the device will be discarded. Read-only community name is only used to view the information of the device, whereas read-write community name can be used to perform configuration on the device. As shown in Figure 3-2, during setting SNMP V1 and SNMP V2 parameters, you are required to set "ReadCommunity", "ReadWriteCommunity", "Timeout" and "Number of
3-2
Retries". "Timeout" is the maximum duration the network management station will wait for the response from the managed device during their communication. This value should be set to at least twice of the mean delay value of the communication from the network management station to the managed device. If the network management station and the managed device are connected via low speed network, the timeout should be set to a relatively larger value. If the network management station and the managed device are located on the same LAN, this value could be relatively smaller. "Number of Retries" is the maximum times the network management station will resend the SNMP requests when the communication between it and the managed device failed. When the network is busy, SNMP packets may be discarded so that the network management station cannot receive response from the device. To solve this problem, Quidview resends SNMP request after the timeout of the response from the device. This process is repeated continuously until the SNMP response packet from the device is received or certain retry times are reached.
II. SNMP V3
As shown in Figure 3-3, SNMP V3 adopts user name and password authentication mode. According to different security levels, corresponding "Auth Password" and "Encryption Password" should be set. Various parameters of SNMP V3 are described in Table 3-2:
3-3
Device configuration is not available unless the Telnet parameters are correctly configured.
3-4
Caution: Select [System/Authentication Options], and you can set the Telnet parameters to the default values, that is, the values used for opening a device. To modify the Telnet parameters of a specific device, you must select [Device Property] from the short-cut menu of the device node in the device list for configuration.
Buttons are provided in this window to add new users or delete existent users. During adding a new user, there are two options available for "User Type" filed, Manager and Common User. Common users only have browsing rights, whereas administrators have all rights in terms of browsing and configuration.
3-5
" Note: Only administrators are authorized to perform user management function while common users do not have this function. In the meantime, the admin user is the default administrator of the system, so it cannot be deleted.
3-6
" Note: In Windows 2000 system, as Telnet is enabled through Internet browser (different from previous versions), the dialog box of Internet connecting wizard will pop up upon the enabling of Telnet if no Internet connection has been created. The Telnet function of Quidview is not available until the Internet connection is correctly configured.
3.3.3 Ping
Click the shortcut button of <Ping> or select [Tools/Ping] to access the "Input IP Address" window, displaying the IP address of currently opened device. Click <OK> button in the window, and the system will invoke the system interface of the Ping command. The result the Ping operation is displayed in the "Message Window".
3.3.4 TraceRoute
Click the shortcut button of <TraceRoute> or select [Tools/Traceroute] to access the "Input IP Address" window, displaying the IP address of currently opened device. Click <OK> button in the window, and the system will invoke the system interface of the TraceRoute command. The result the TraceRoute operation is displayed in the "Message Window".
3-7
3-8
Automatic discovery of network topology Topological display of IP network layer Automatic lineup and proportional zooming of topology view Partial zooming of the selected view Different icons and colors to identify different devices and their status Manual adding/deleting of sub-net, device node and link Regular polling to update the status of sub-net, device node and link Browsing the properties of the network object Ping and Telnet the device Browsing the MIB information of the device
The topology management functions and operations of Quidview integrated with diversified NM platforms under Windows will be elaborated below. The functions and operations of Quidview under UNIX are similar. Users can refer to this section for specific information.
4-1
update of original MIB when you access SNMPc5.0 for the first time). Click <Yes>, and an interface shown in Figure 4-1 will appear:
After MIBs are compiled, <Add>, <Remove> and <Done> will be activated. The user can use <Add> to add a file into MIB, or use <Remove> to delete a file from MIB. Or directly click <Done> to access the main interface if no other operation is needed. The SNMPc main interface is shown in Figure 4-2:
Figure 4-2 "SNMPc" main interface after topology discovery 2) In the SNMPc main interface, select [Config/Discovery Agent....] to make the window shown in Figure 4-3 pop up:
4-2
In General page, select the two check boxes: Enable Discovery and Enable Status Poll. In Seeds page, enter the IP address of the device (multiple addresses can be entered). In Community page, enter the community name of the device, and click <OK>. You can double click the device with HW icon on its topology map to start Quidview and display the device panel view.
3)
For more information about SNMPc, please refer to Appendix A of the manual, online help files of SNMPc5.0, or related parts in SNMPc5.0 user manual.
4-3
Figure 4-4 "WhatsUp Gold" main interface after topology discovery 2) Select [File/New] on the started interface to make the window shown in Figure 4-5 pop up.
Figure 4-5 New Map 3) In the "New Map" interface, select "Create a blank map" option and click <OK> button to open a blank interface. Select [Tool/Import/Scan IP...] in the interface to access the "Import Scan" window, as shown in Figure 4-6:
4-4
Figure 4-6 Import Scan 4) On the Import Scan interface, enter the IP address range of the devices to be discovered, select the Map Results, All IP and SNMP check boxes and click <Start>. Then Whatsup Gold will auto-search all IP devices within this range. After the searching is completed, click <Exit> to return to the WhatsUp Gold main interface, and the discovered devices will be arranged in the topology map. If there are many devices on the network, remove All IP in the option column on the left part of Import Scan interface, and WhatsUp Gold will display only the topology map of devices supporting SNMP. On the topology map of discovered devices, if the icon of HW device is not selected, the menu item of Quidview on the right-button popup menu will be in the deactivated state and grays out. If the icon of corresponding device is selected, the menu item of Quidview on the right-button popup menu will be activated and be displayed in bright color. Now, Quidview can be started by selecting Quidview. For more information about WhatsUp Gold, please refer to the online help of WhatsUp Gold or relevant parts in the user manual of WhatsUp Gold.
4-5
Figure 4-7 HP OpenView main interface after topology discovery 2) If the IP address and type of device are known, or HP OpenView fails to discover the devices automatically, you can add the device manually: after successful installation of HP OpenView NNM, select the [Edit/Add Object...] to make the Add Object Palette window pop up, as shown in Figure 4-8:
The symbol of HuaWei Router or HuaWei Switch will appear in the Symbol Classes column. After HuaWei Router is selected, the icon for the HuaWei series routers will appear in the Symbol Subclasses for Class HuaWei Router column. Drag
4-6
the icon of corresponding router to the main interface, and the system will immediately pop up the window shown in Figure 4-9:
In this interface, enter the host name (the host name is the IP address), select the highlighted item in the Object Attributes list box on the lower part of the window, and click <Set Object Attributes>. A window as shown in Figure 4-10 will pop up:
4-7
Set Attributes displays the attributes of IP address entered by the user. Click <OK> at the bottom of the window, and the new device is added to the network topology map. 3) The type of device on the topology map can be modified according to real conditions. On the network topology map of HP OpenView interface, select the device icon, then right-click the device icon and a shortcut menu will appear. Select Change Symbol Type... on the popup menu and the interface to access the interface Change Symbol Type shown in Figure 4-11 will pop up. The device type can be modified on the interface.
4-8
The Change Symbol Type interface is similar to that for adding device. There is HuaWei Router or HuaWei Switch symbol in the Symbol Classes column of the interface. Click on the symbol of HuaWei Router or HuaWei Switch and the symbol of Quidway series routers will appear in the Symbol Subclasses column. According to the type of device, select the corresponding icon to change the device type. 4) On the topology map of discovered devices, if the icon of HuaWei (HW) device is not selected, the menu item [RouterManager...] or the RouterManager... item that appears on the right-button popup menu will be in the deactivated state and grays out. If the icon of corresponding device is selected, the menu item of [RouterManager...] or the RouterManager... item that appears on the right-button popup menu will be activated and be displayed in bright color. You can start Quidview by clicking the HW icon and selecting [RouterManager...] from the menu, or by selecting RouterManager... in the right-click popup menu. If the icon of HW device is not selected, RouterManager... will not be displayed in the popup menu. For more information about HP OpenView, please refer to the online help of HP OpenView or relevant parts in the user manual of HP OpenView.
4-9
Figure 4-12 "IBM NetView" window after discovery topology 2) If the IP address and type of device are known, or IBM NetView fails to discover the devices automatically, you can add the device manually: after successful installation of the network platform IBM NetView, select [Object/New...] to make the Object Wizard interface pop up, as shown in Figure 4-13. The symbols of HuaWei Router, HuaWei Switch and HuaWei A8010 will appear in the Type column. After HuaWei Router is selected, the icon for the HW series routers will appear in the Drag into the submap to place manually column. Select the corresponding icon according to the actual device type and click the <Next> button. Then the system will automatically pop up the window as shown in Figure 4-13.
Figure 4-14 N2000 EMF interface with topology discoverd 2) If you have known the IP address or type of a device, or N2000 EMF does not discover devices automatically, you can follow these steps to add the device manually: After the N2000 EMF platform is successfully installed, select [Edit/Add Object...] to open the "Add Object" dialog box, as shown in Figure 4-15:
4-11
Select a router device from the left "Object Type" list, and enter the related information in the right pane, as shown in Figure 4-16:
4-12
Click <Add> in the interface to add the device to the topology view. Double click on the device icon in the toplogy view, and you will start Quidview RouterManager and browse the device panel.
4-13
Figure 4-17 N2000 interface with topology discovered 2) If you have known the IP address or type of a device, or N2000 does not discover devices automatically, you can follow these steps to add the device manually: After the N2000 platform is successfully installed, select [Topology/Add Device...] to open the "Add Device" dialog box, as shown in Figure 4-18:
Here type the IP address of the device and click <Add> to add the device to the topology view.
4-14
Double click on the device icon in the toplogy view, and you will start Quidview RouterManager and browse the device panel.
4-15
The following tables are available: System Table, Address Translation Table, Interfaces Table, IP Address Table, IP Route Table, TCP Connection Table.
5-1
I. System Table
The system table, available for every device, describes the basic and indispensable information about them. The system tab contains some parameters described in the following table. Table 5-1 Description on the parameters of the System tab
Name System Description System OID UP Time Location Device Name Contact Description ASCII text describing the device name and versions of software and hardware. A group of unique ID of manufacturer and device used online. Continuous operation time of the system after being started. Describes the geographical location of the device. Mnemonic symbol of the device defined at the device side. Contact information about the responsible company of person.
5-2
User Manual HUAWEI iManager Quidview Router Network Management System Name ifAdminStatus ifOperStatus ifLastChange ifInOctets ifInUcastPkts ifInNUcastPkts ifInDiscards ifInErrors ifInUnknowProtos ifOutOctets ifOutUcastPkts ifOutNUcastPkts ifOutDiscards ifOutErrors ifOutQLen ifSpecific
Description The interface administration status specifies the expected operation status of the interface and can be configured. UP means an interface can transmit and receive data packets, while DOWN means it cannot transmit or receive any data packets. The interface operation status indicates the actual operation status of an interface and cannot be configured. UP means an interface can transmit and receive data packets, while DOWN means it cannot transmit or receive any data packets. Records when the interface changed into the current status. All octets received by the interface. Number of unicast packets received via the interface. Number of broadcast and multicast packets received via the interface. Number of discarded incoming packets due to packet errors or lack of buffer space. Number of packets with error received via the interface. Such packets will be discarded. Number of packets with illegal unknown protocols received via the interface. Such packets will be discarded. All octets transmitted from the interface. Number of unicast packets transmitted from the interface. Number of broadcast and multicast packets transmitted from the interface. Number of discarded outgoing packets due to packet errors or lack of buffer space. Number of packets with error transmitted from the interface. Such packets will be discarded. Length of the outgoing packet queue of an interface Specify the media to offer the interface.
V. IP Route Table
The IP Route Table offers the current routing information about all the interfaces of a device. A device forwards packets mainly based on this table. IP Route Table has some parameters described in the following table. Table 5-5 Description on the parameters of IP Route Table
Name Destination Address Port NetMask Description IP address of a destination host or network segment Uniquely specifies a port of a device Mask of the destination host or network segment
5-3
User Manual HUAWEI iManager Quidview Router Network Management System Name Metric Next Hop Route Protocol Route Type Route Age Description
Maximum hops on a route IP address of the next hop on the route. Specifies the route protocol (as 1=other; 8=RIP; 13=OSPF; or 14=BGP). Specifies the route type (as 1=other; 2=invalid; 3=direct; or 4=indirect). How many seconds the route has been refreshed or decided as correct.
5-4
The information tables vary according to different boards. Table 5-7, Table 5-8, Table 5-9 and Table 5-10 list the parameters contained in each kind of board: Table 5-7 Parameters of the main board
Name Status Running Status Alarm LED Description Shows the status of the main board as Master or Standby. Shows the running status of the main board as normal or abnormal. A normally running main board can receive the heart beat of the standby board. Shows the status of the alarm light on a main board as LightOn or LightOff.
5-5
User Manual HUAWEI iManager Quidview Router Network Management System Name FSU Version EFU Version Registration Info Up Date Up Time Network Port Status Syn Status Number of Subslots
Description FSU Version of a card. EFU Version of a card. Registration information of a card. Shows the date on which the card was started last time. Shows the time when the card was started last time. Shows the network port status of a card as normal or abnormal. The synchronous status of LPU and NET board. The synchronous status of NAT board and NM. Number or subslots of a card.
" Note: S8016 and middle-range and low-end routers do not support the card browsing.
5-6
This window lists the information of all the boards contained in the device. The parameters are described in Table 5-11: Table 5-11 Parameters of high-end routers
Name Module Index Card Number Type Description Serial No. Number of Cards Hardware Ver Software Ver Last Card Change Admin Status Oper Status Description Index of the board Slot number of the board Type of the board Description of the board Serial number of the board Number of subcards of the board Hardware version of the board Software version of the board Last time when the board changes Administration status of the board Operation status of the board
" Note: S8016 and the mid-range and low-end routers do not support board browsing function.
5-7
Table 5-12 Description on the parameters of high-end router and S8016 subcard browsing table
Name Card Number SubCard Number SubCard Type Number of Ports Hard Version Logic Version Card number of the subcard. Subcard number Subcard type Number of port on a subcard. Hardware Version of a subcard Logic Version of a subcard Description
Table 5-13 Description on the parameters of NE16 and NE08 device subcard browsing
Name Card Number SubCard Number Type Description Serial NO Number of Ports Hardware Ver Software Ver Admin Status Operation Status Description Card number of the subcard. Subcard number Subcard type Subcard description. Unique hardware serial No. of a subcard. For example, 0 means the card is not in use. Number of ports on a subcard Hardware Version of a subcard Software Version of a subcard Administration status of a subcard Operation status of a subcard
Table 5-14 Description on the parameters of middle-range and low-end router subcard browsing
Name Slot Number Type Number of Ports Version Slot number of a subcard Subcard type Number of ports on a subcard. Subcard version. Description
5-8
User Manual HUAWEI iManager Quidview Router Network Management System Name Time-slot ForceSSM Description
Set the timeslots to extract ssm level for 2Mbps bits clock source. sa4: Set the timeslot of the clock reference source sa as sa4; sa5: Set the timeslot of the clock reference source sa as sa5; sa6: Set the timeslot of the clock reference source sa as sa6; sa7: Set the timeslot of the clock reference source sa as sa7; and sa8: Set the timeslot of the clock reference source sa as sa8. Shows if the clock board extracts SSM level from the input signals by force. 1: Not extract; 2: Extract.
Table 5-17 Description on the parameters of NE40 Series Routers fan browsing table
Name Fan index Online status Running status Description Hardware serial number of a fan Shows if the fan is online or offline. Shows the running status of a fan as normal or abnormal.
Caution: 3680E-RPS, 2631E-RPS, 2610-RPS, and 2611-RPS only allow fan status monitoring.
5-9
Table 5-19 Description on the parameter of core router and S8016 power browsing table
Name Index Power Type Status Description Slot Number Description Specifies the hardware serial number of the power. Power type, which can be Power and Dpower (Distributed power). Working status of the power, which can be normal or abnormal. Description on the power. Inside slot number of the power, which can be PowerModule1, PowerModule2, PowerModule3, PowerModule4, PowerModule5 or Dpower (Distributed power).
Table 5-20 Description on the parameter of NE40 Series Router power browsing table
Name Power index Online status Running status Description Specifies the hardware serial number of the power. Shows if the power is in position with online or offline. Running status of the power, which can be normal or abnormal.
Caution: 3680E-RPS, 2631E-RPS, 2610-RPS, and 2611-RPS only allow the power status.
5-10
There are two tabs in the port information interface, and the description of various parameters in interface information is shown in Table 6-1:
6-1
When switching to the IP address information tab, the interface is shown in Figure 6-2:
I. Adding an IP address
Click <Add> in Figure 6-2 to open the "Add Port IP Address" dialog box, as shown in Figure 6-3:
6-2
Here select "Chief Address" or "Sub Address", type an IP address and the mask, and click <OK> to add an IP address. Usually, a port needs only one IP address. When a router port needs connecting with several subnets, it can also be configured with several IP addresses with one as the chief IP address and the others as sub IP addresses.
" Note: Port IP address configuration is not available unless the Telnet parameters of the device is configured properly in authentication options.
6-3
description of various parameters in subport information browsing is shown in Table 6-2: Table 6-2 Subport Browsing parameters description
Name Interface Index Interface Description Administration Status Operation Status Description Index number of current subport Characteristic description of current subport Current administration status of port: 1=UP; 2=DOWN Current operation status of port: 1=UP; 2=DOWN
When working in E1 mode, E1/cE1 port equals to an interface whose data bandwidth is 2.048M and that has no time slot division. Its logical feature is same as synchronous serial port. E1/cE1 port supports such link layer protocol as PPP and frame relay, and supports such network protocols as IP.
When working in cE1 mode, E1/cE1 port is divided into 32 time slots physically and the time slots are numbered 0 to 31 correspondingly. 31 time slots of them can be divided into some groups at will (time slot 0 is used to transmit frame synchronization signal and cannot be bundled). Each group of time slots are bundled as one serial port (channel-group) whose logical feature is same as the synchronous serial port. It supports such link layer protocols as PPP, HDLC, FR, LAPB and X.25, and supports such network protocols as IP.
Double click [Port Management/Channel Group] on function tree and the interface time slot information will be displayed in right information display area. The description of various parameters in interface time slot browsing is shown in Table 6-3: Table 6-3 Parameters description of interface time slot table
Name Interface Description Channel Group No. Binding Timeslot Number Administration Status Operation Status Description Each group time slots are bundled as a serial port (channel-group). Here, the interface description refers to the description of channel-group. Channel group number, ranging from 0 to 30. Total amount of time slots bundled on channel group successfully. Current administration status of port: 1=UP; 2=DOWN Current operation status of port: 1=UP; 2=DOWN
6-4
Physical port based mirror: copies the traffic of a specified port fully to a monitoring port. VLAN based mirror: copies the traffic of a specified VLAN fully to a monitoring port. Virtual port based mirror: copies the traffic of a specified VLAN on a specified port fully to a monitoring port.
! !
S8016 supports physical port based mirror. In the function window, double click on [Port Management/Port Mirror Management] node on the function tree to open the "Port Mirror Management" window, as shown in Figure 6-4:
This window includes two tabbed pages, Monitoring Port and Port Mirror. Their functions are detailed as follows:
6-5
Select the description of the port to be created and specify whether to permit data flow on the port, then click <OK> to create a monitoring port.
6-6
6-7
6-8
Select the interfaces to be configured from the window (multiple selection available here) and click <Change Type> button to switch the layer attribute of the interface. By doing so, layer 2 interface changes to layer 3 interface and vice versa.
6-9
Descriptions of the parameters in the window are listed in Table 6-6: Table 6-6 Parameters description of Link-aggregation Management
Name Link-aggregation List Slave Port List Description Text description of the main port of the aggregation Text description of the slave ports of the aggregation
Information of all the link-aggregations can be querried here. The main ports of the link-aggregations are shown in the left window. Click one of them and all the slave ports involved in the link-aggregation will be displayed in the Slave Port List window to the right.
6-10
Select the main port of the aggregation in the Master Port list. Then select one or more slave ports to be added into the aggregation in the Available Slave Ports list and click >> button to add them into the Selected Slave Ports list. Click <OK> to finish creating the link-aggregation.
" Notes: 1) Observing port and ports already involved in other link-aggregations are not available for new aggregations. So they will not appear in the Master Port list. Whats more, auto-negotiating port cannot be used in aggregations; 2) After selecting the master port, contents in the Available Port List will change respectively. All the slave ports involved in an link-aggregation cannot exceed the number of 7.
6-11
Click >> or << button to add or remove slave ports to the link-aggregation in the window. Click <OK> to finish the configuration.
6-12
This window will display the switching date and time of main control board. According to the demand, the user can select <Switch MPU>, <Switch CLK>, and <Switch NET> on this window to perform the switchover of main control board, clock board and network board. If click <Refresh> on the window, the system will re-read latest data from the device and display the data on the window through refreshing.
7-1
Click <Config> on this window, the user can re-upgrade the data to the device to complete card reset function. If to reset many cards at one time, the user can select many cards on "Panel Monitoring" window after opening "Card Reset" window. The list on "Card Reset" window will display many entries and the user can select multiple entries according to demand, and then click <Config> to complete the reset function of many boards. Click <Refresh> to re-read data from the device. Click <Clear> and <Clear All> to delete the selected entries or all entries in board reset list and the user does not need to perform reset operation for those cards.
7-2
IP address to corresponding hardware address. When two devices need to communicate with each other, both devices must know the MAC address of one another. Each device should maintain the translation table from IP address to MAC address, which is called ARP mapping table. ARP mapping table saves a series of current used mapping of IP address and MAC address of other devices communicating with local device. When one ARP mapping entry has not been used for long time, the host will delete it from ARP mapping table to save memory space and search time of ARP mapping table. Quidview NMS can query the aging time of current ARP table of core router and S8016 device and can configure the aging time. Select [Device Management/Attribute Config] on function tree, "Attribute Config" window pops up, as shown inFigure 7-3:
The aging time of ARP table can be queried and configured on this window.
7-3
Descriptions of the parameters in the window are listed in Table 7-1: Table 7-1 Parameters description of L2 Forwarding Table Management
Name MAC Address VLAN ID Forwarding Port Packet Filter Type Description Source MAC address in the data packet VLAN ID Name of the forwarding port, option differs as selected VLAN ID changes Type of packets to be filtered. For S8016, three types are available: static, permanent and blackhole; for Core routers, only two types available: staticand blackhole
Click <Refresh> in L2 Forwarding Table Management window and system will read the L2 forwarding table data to refresh the displayed information.
7-4
Input MAC address in the window and select VLAN ID. All the ports involved in the specified VLAN and all TRUNK ports will be automatically displayed in the Forwarding Port list. Please select necessary ports for forwarding. Select packet filter type and click <OK> to create a new L2 forwarding entry.
7-5
Click <Aging Time> button in L2 Forwarding Table Management window and L2 Forwarding Table Aging Time Management window will be displayed as show in Figure 7-6:
If Yes is selected in the Aging option, aging time can be modified between the range of 10~1000000s. And if No is selected, Aging Time column will be disabled and no modification is available.
7-6
8-1
On the left of the window are functional buttons that are, from the top down, <Select Items>, <Bar>, <Plot>, <Exporting Data>, <Importing Data> and <Properties>. <Select Items> helps you to select the performance items to be monitored; <Bar> displays the monitoring results of the selected items in a bar graph; <Plot> displays the monitoring results in a fold-line graph (default display mode); <Exporting Data> and <Importing Data> export/import the monitoring results to/from a file to facilitate monitoring result access; <Properties> is used to select polling interval and set the maximum number of samples to be displayed. The polling interval should be set not too small to ensure normal functioning of the system. 2) Display area of monitoring results
It lies on the right of the window, showing the monitoring results in the format of a bar graph or a fold-line graph.
I. Usage example
1) Select the proper polling interval and maximum number samples to be displayed.
In the "Device Monitoring" window, click <Properties> button to open the "Properties" window. Here specify the proper values for "Interval(s)" and "Max Samples" items, and click <OK> to close the window. By default, the polling interval is 60s and the maximum number of samples is 500. 2) Select new items
In the "Device Monitoring" window, click <Select Items> to open the "Select Monitor Item" window, as shown in Figure 8-2:
8-2
The device monitoring items are divided into such groups as IP Group, TCP Group, UDP Group, ICMP Group, SNMP Group, SNMP (Operation) Group and SNMP (Error) Group. You are required to select a group first, and then the monitoring items from the list. You may select several items by holding down the <Shift> (<Ctrl>) button while clicking several items. The monitoring results of these items will be displayed in the result display area in different colors. After selection, click <OK> to start polling monitoring immediately.
Caution: After new monitoring items are selected, the information displayed in the result area will be cleared and new polling monitoring will be started.
3)
You may select to browse the monitoring results in a bar graph or a fold-line graph on demand, where different items are displayed in different colors. The system reads the values of the items from the device at certain interval and refreshes the graph accordingly. After the number of the displayed records reaches the value of "Max Samples", the whole graph will move leftward horizontally, having the new record replace the earliest record one by one. Finally, you may export or import data on demand to facilitate data access.
8-3
Input IP packets Buffer overflow input IP packets Forwarded IP packets Input IP packets with error Addresses IP packets with error IP Group Addresses Buffer overflowed Output IP packets Output IP packets without route Recombined IP packets succeeded Input TCP Segments TCP Group Output TCP Segments Input UDP Messages Output UDP Messages UDP Group Sent failed UDP Messages Received failed UDP Messages Input ICMP Messages Output ICMP Messages ICMP Group Input error ICMP Messages Output error ICMP Messages Received SNMP SNMP Group Messages Sent SNMP Messages All Get/GetNext Requests All Set Requests GetRequest SNMP Messages (OPeration) GetNextRequest Group Messages SetRequest Messages Sent SNMP_Trap Messages Error of invalid version Error of invalid community Illegal SNMP operations
The number of invalid version errors occurred during the polling interval. The number of invalid community name errors occurred during the polling interval. The number of illegal SNMP operations conducted during the polling interval. The number of packet ASN1decoding errors occurred during the polling Error of ASN1 Decode interval. SNMP (Error) Too-long Messages The number of packet too-long errors occurred during the polling interval. Group Errors of Messages The number of invalid packet name errors occurred during the polling name interval. Errors of invalid The number of invalid packet value errors occurred during the polling Messages interval. Errors of Operation The number of read-only object operation errors occurred during the read-only object polling interval. Common errors The number of other common errors occurred during the polling interval.
8-4
Highspeed interface input utilization rate(%) Highspeed interface Output utilization rate (%) Lowspeed interface input utilization rate(%) Lowspeed interface Output utilization rate (%) Interface Utilization Input error packets rate(%) Statistic Output error packets rate (%) Input discard packets rate(%) Output discard packets rate (%) Input unknown protocol rate(%) Input packets Out packets Input discard packets Output discard packets Input error packets Output error packets Lowspeed/Hi Input unknown protocol packets ghspeed Interface Input Unicast packets Flow Statistic Out Unicast packets Input Multicast packets Out Multicast packets Input Broadcast packets Out Broadcast packets Input Octets Output Octets
In the port monitoring window, you can also select one or more ports for monitoring on your demand.
8-5
NV-RAM available System rate(%) Load VOS Memory The percentage of the free memory pool space available rate (%) Buffer allocation The number of memory allocation failures. failures Buffer create failures The number of memory application failures due to lack of memory. due to no free Current system temperature, including such status as 0 (normal), 1 (over-cold) System System temperature and 2 (overheat). Status Fan status Current status of system fan, including 0 (normal), 1 (stop) and 2 (no fan)
8-6
User Manual HUAWEI iManager Quidview Router Network Management System Group Monitoring index Available Buffer Used Buffer Number of discarded memory blocks Number of error memory blocks due to border unalignment Number of re-released error memory blocks Number of collected memory blocks Free buffer Buffer in use
The number of discarded memory blocks The number of error memory blocks encountered due to border unalignment The number of error memory blocks encountered due to repeated release The number of collected memory blocks
8-7
Configuration of real-time monitoring of statistics group Configuration and data browsing of history group Configuration and browsing of alarm group Configuration and browsing of event group Browsing of log information corresponding to event group
" Note: To enable the RMON function, you must run the rmon promiscuous command from the command line.
9-1
In the function window, double click on [Performance Monitoring/RMON] node to access the "RMON" window on the right information display area, as shown in Figure 9-1:
Meaning of various fields in statistics group is described in Table 9-1: Table 9-1 Statistics Group
Field name Index Port Packet discarding events Received bytes Received Packets Owner Status Description Index of the configuration item of the statistics group Port name The number of packet discarding events on the interface The number of bytes received on the interface The number of packets received on the interface Owner of the configuration item of the statistics group Status of the interface, including Activate and Inactivate.
In this window, you may implement such functions as adding a statistics item, deleting statistics item, real-time monitoring, etc. Various functions are detailed below.
9-2
In this dialog box, enter the information of Ethernet port and owner, where "Port" refers to the source port of the data and "Owner" refers to the creator of the configuration item of the statistics group (by default, it is monitor, and you may also specify another name).
9-3
On the left of the window are the functional buttons that are, from the top down: <Select Items>, <Realtime Grid>, <Realtime Chart>, <Bar>, <Plot>, <Exporting Data>, <Importing Data> and <Properties>. 2) Display area of monitoring results
It lies on the middle of the window, displaying the results of monitoring in the format of Chart & Grid, Bar or Plot.
!
Select items button to open the "Select current monitoring item" window, as
9-4
This window consists of such two tabs as Same Port and Same Variable, which monitors the values of several statistical variables of the same interface and monitor the same statistical variable of different interfaces respectively.
!
The system provides several information display modes such as Chart & Grid, Bar and Plot, etc. You may click the corresponding buttons to display the statistical information in different modes.
!
You may select the functional buttons <Exporting Data> and <Importing Data> in the "Real-time Monitoring" window to export the monitoring results to a file or import the corresponding monitoring results from a file.
!
Properties
This function is used to adjust the system polling interval and the maximum number of values that can be displayed in result figure.
9-5
such two tables as history control table (detailed information about interfaces and the sampling functions) and Ethernet history table (data records, which is specific to Ethernet media).
In RMON management window, click the "History Group" tab to open the data browsing and configuration interface of history group, as shown in Figure 9-5. The list on the left displays all history items defined for the device and the meaning of various fields is described in Table 9-2. Various functional buttons on the right provide configuration and browsing functions for history items.
Click <Add> button, and the "Add History Item" window pops up, as shown in Figure 9-6:
9-6
Information to be inputted in this window is described in Table 9-3: Table 9-3 Information to be inputted in adding a history configuration item
Content Port Sampling Interval Hits Requested Owner Description The source data port of the collection task must be specified. Here a drop-down list box is provided for you to select the Ethernet interface for data collection. Data collection interval on the specified device interface in the units of second. It is a value in the range of 10 to 3600 and the default value is 1800. The maximum number of samples that can be reserved for the collection task by the device. It is a value in the range of 1 to 50 and the default value is 50. A device reserves the last N (the maximum sampling amount allowed) samples, which is decided by the storage capacity of the device and should set properly (not too large) to save system resources. Creator of the collection task and the default value is monitor. You may also input another name.
Caution: When adding a history item, the newly entered port and sampling interval cannot be same with those of an existent item simultaneously. Otherwise, the operation will fail and a prompt window will pop up, showing "The combination of Port and sampling interval cannot be repeated".
2)
In Figure 9-5, select one or more history items and click <Delete> button. Then click <OK> button in the popup "Prompt" window to delete the selected history items.
9-7
The use of the first button in this window is described below and the other functions are same with those of statistics group, which are not covered here in more detail. In Figure 9-7, click Figure 9-8: button to open the "Select history items" window, as shown in
9-8
This window consists of such parts as "Data Item" and "Control Item". "Data Item" list contains the data items that can be browsed by users and "Control Item" list contains history items for users to select from. After selection, click <OK> to browse the data in history group in various modes (Grid, Chart, Bar or Plot).
Caution: 1).If you click <Browse> button during the sampling interval of the selected history item, a prompt window will pop up, indicating reading device data failed. That is because the system failed in reading history data from the device as history data is yet to be generated. 2) The data in Browse history dialog is Static. Only when reopen the dialog, you can view the new data.
9-9
In RMON management window, click "Alarm Group" tab to open the data browsing and configuration window of alarm group, as shown in Figure 9-9. The list on the left displays all alarm items defined for the device and meaning of various fields is described in Table 9-4. The functional buttons on the right provide configuration and browsing functions of the alarm items.
9-10
This window is broken into such three parts as "SNMP Object", "Sampling Properties" and "Alarm Threshold and Related Events". Meanings of various configuration items is described in Table 9-5: Table 9-5 Meanings of various configuration items in adding an alarm item
Configuration item Variable Port Interval (second) Type Owner Meaning The variable to be monitored Description of the port that is monitored by the configuration item of the statistics group. Sampling interval in the units of second and in the range of 1 to 3600s. By default it is 10. Include absolute sampling and relative sampling. Absolute sampling refers to the accumulated value from the startup of the system to present and relative sampling refers to current absolute sampling value minus last absolute sampling value. Relative sampling is commonly adopted, whose value is related to sampling interval. Creator of the alarm item and the default value is monitor. Users can also input other names.
9-11
User Manual HUAWEI iManager Quidview Router Network Management System Configuration item Meaning
Threshold of the creation of alarms and events to be generated. It includes such two sections as alarm type control and thresholds and events input. There are three types of alarms that are Rising Alarm Allowed, Falling Alarm Allowed and Create Default Event. If only "Rising Alarm Allowed" check box is selected, the labels of the edit boxes below are "Rising Threshold", "Rising Recovery Value", "Rising Event Index" and "Recovery Event Index". By default, the rate of rising threshold to rising recovery value is 5:4 (i.e., when either of these values is inputted, the other value will be calculated based on this rate). If only "Falling Alarm Allowed" check box is selected, the labels of the edit boxes below are "Falling Threshold", "Falling Recovery Value", "Falling Event Index" and "Recovery Event Index". By default, the rate of falling threshold to falling recovery value is 4:5. When both "Rising Alarm Allowed" and "Falling Alarm Allowed" check boxes are selected, the labels of the edit boxes below are "Rising Threshold", "Falling Threshold", "Rising Event Index" and "Falling Event Index". By default, the rate of Rising threshold to falling threshold is 5:4. When "Create Default Event" check box is selected, you do not need to select event indexes by yourself, instead an event definition will be created according to the selected variables. It sets whether to enable rising alarm. When the monitored alarm item crosses (larger than) this value, an alarm will be created. If this value is specified, "Recovery Value" will be set to 4/5 of it automatically. Index of the rising event When the monitored alarm item is no larger than this value, rising alarm will no longer be created. If this value is specified, the value of "Rising Threshold" will be set to 5/4 of it automatically. It sets whether to enable falling alarm. When the monitored alarm item crosses (larger than) this value, an alarm will be created. If this value is specified, "Recovery Value" will be set to 4/5 of it automatically. Index of the falling event When the monitored alarm item is no larger than this value, falling alarm will no longer be created. If this value is specified, the value of "Falling Threshold" will be set to 5/4 of it automatically. Index of rising or falling event When the check box is selected, you do not need to select event indexes by yourself, instead an event definition will be created according to the selected variables.
Rising Alarm Allowed Rising Threshold Rising Event Index Recovered Value Falling Alarm Allowed Falling Threshold Falling Event Index Recovered Value Recovered Event Index Create Default Event
Caution: When adding an alarm configuration item, make sure that the SNMP variable, port and sampling interval of the newly inputted item are not same with those of any existent item simultaneously. Otherwise, the operation will fail.
The contents of this interface are basically the same with those of Figure 9-9 except the "Reason for Null" field that is new in this interface. Meaning of various fields is described in Table 9-6: Table 9-6 Information display in invalidated alarm items interface
Content Index Interval Variable Sampling Type Value Startup Type Description The unique identification of the alarm item. Sampling interval of alarm data in the range of 1 to 3600s. MIB variable to be monitored, including such two sections as statistical variable and interface name. Include absolute sampling and relative sampling. Statistical data collected during the last sampling interval. Include rising and falling alarm allowed, rising alarm allowed and falling alarm allowed.
9-13
User Manual HUAWEI iManager Quidview Router Network Management System Content Rising Threshold Falling Threshold Rising Event Index Falling Event Index Owner Status Reason for Null Description
Threshold of rising alarms. If the monitored data crosses this value, a rising alarm will be created. Threshold of falling alarms. If the monitored data crosses this value, a falling alarm will be created. Index of rising event Index of falling event Name of the creator of the alarm configuration item Include Active and Inactive. Cause for the invalidation of the alarm configuration item.
In this interface, clicking <Restore Normal Display> button will switch to Figure 9-9.
9-14
Click <Add> button to open the "Add an Event Item" window, as shown in Figure 9-13. Meanings of the information to be inputted in this window is described in Table 9-8:
9-15
Event Description
Type Community
Owner
9-16
In Figure 9-12, click <Invalidate Configuration Entry> button to display the invalidated event list, as shown in Figure 9-14:
The information displayed in this interface is basically the same with that in Figure 9-12 except the "Reason for Null" field that is new in this interface.
" Note: Click <View Log> button without selecting any event in Figure 9-12, and the system will display the complete log information.
9-17
The RouterManager provides configuration of alarm extended group for the device that will generate alarms according to the set conditions. Because this type of alarm is caused by threshold-crossing of the monitored performance data on the device, it is also called "performance alarm". In RMON management window, click "Alarm Extended Group" tab to open the data browsing and configuration window of alarm extended group, as shown in Figure 9-15. The list on the left of the window displays all alarm extended items defined for the device and meanings of various fields is described in Table 9-9. The functional buttons on the right provides configuration and browsing functions of various event items.
9-18
User Manual HUAWEI iManager Quidview Router Network Management System Content Statistics Period Statistics Type Owner Status
Description It is effective only when the sampling type is specified to periodical sampling. It specifies the duration from the creation of an alarm to expiration in the units of hour. Include periodical sampling and permanent sampling. If periodical sampling is specified, the period must be specified in above edit box. If permanent sampling is specified, the sampling period edit box becomes ineffective. Name of the creator of the alarm configuration item Include Active and Inactive.
This window is broken into such three parts as "Object Expression", "Sampling Properties" and "Alarm Threshold and Related Events". Meanings of various configuration items is described in Table 9-10.
9-19
Table 9-10 Meanings of various configuration items in "Add Alarm Extended Item" window
Configuration item Expression Name Expression Formula Meaning Meanings of sampling object expression The formula composed of OIDs and arithmetic operation expressions, whose result generates an alarm. It may correspond to any of the following logical entities: whole device, interface number and other valid OID indexes. For different expression formulas, the available instance values are different. Therefore it is recommended that the instance value be selected from the drop-down list to ensure its validity. For users familiar with the expression formula, this value can be input directly to accelerate the configuration, as it takes time to get data from the device if there are many instance values. Sampling interval in the units of second and in the range of 1 to 3600s. By default it is 10. Include absolute sampling and relative sampling. Absolute sampling refers to the accumulated value from the startup of the system to present and relative sampling refers to current absolute sampling value minus last absolute sampling value. Relative sampling is commonly adopted, whose value is related to sampling interval. Include periodical sampling and permanent sampling. If periodical sampling is specified, the period must be specified in above edit box. If permanent sampling is specified, the sampling period edit box becomes ineffective. It is effective only when the sampling type is specified to periodical sampling. It specifies the duration from the creation of an alarm to expiration in the units of hour. Creator of the alarm extended item and the default value is monitor. You may also input another name. Thresholds of the creation of alarms and events to be generated. It includes such two sections as alarm type control and thresholds and events input. There are three types of alarms that are Rising Alarm Allowed, Falling Alarm Allowed and Create Default Event. If only "Rising Alarm Allowed" check box is selected, the labels of the edit boxes below are "Rising Threshold", "Rising Recovery Value", "Rising Event Index" and "Recovery Event Index". By default, the rate of rising threshold to rising recovery value is 5:4 (i.e., when either of these values is inputted, the other value will be calculated based on this rate). If only "Falling Alarm Allowed" check box is selected, the labels of the edit boxes below are "Falling Threshold", "Falling Recovery Value", "Falling Event Index" and "Recovery Event Index". By default, the rate of falling threshold to falling recovery value is 4:5. When both "Rising Alarm Allowed" and "Falling Alarm Allowed" check boxes are selected, the labels of the edit boxes below are "Rising Threshold", "Falling Threshold", "Rising Event Index" and "Falling Event Index". By default, the rate of Rising threshold to falling threshold is 5:4. When "Create Default Event" check box is selected, you do not need to select event indexes by yourself, instead an event definition will be created according to the selected variables. It sets whether to enable rising alarm. When the monitored alarm item is larger than this value, rising alarm will be created. If this value is specified, "Recovered Value" will be set to 4/5 of it automatically. Index of the rising event When the monitored alarm item is no larger than this value, rising alarm will no longer be created. If this value is specified, the value of "Rising Threshold" will be set to 5/4 of it automatically. It sets whether to enable falling alarm. When the monitored alarm item crosses (larger than) this value, an alarm will be created. If this value is specified, "Recovery Value" will be set to 4/5 of it automatically. Index of the falling event When the monitored alarm item is no larger than this value, falling alarm will no longer be created. If this value is specified, the value of "Falling Threshold" will be set to 5/4 of it automatically. Index of rising or falling event When the check box is selected, you do not need to select event indexes by yourself, instead an event definition will be created according to the selected variables.
Instance Value
Rising Alarm Allowed Rising Threshold Rising Event Index Recovered Value Falling Alarm Allowed Falling Threshold Falling Event Index Recovered Value Recovered Event Index Create Default Event
9-20
Caution: When adding an alarm extended configuration item, make sure that the expression, instance value and sampling interval of the newly inputted item are not same with those of any existent item simultaneously. Otherwise, the operation will fail.
9-21
User Manual HUAWEI iManager Quidview Router Network Management System Content Rising Threshold Falling Threshold Rising Event Index Falling Event Index Statistics Period Statistics Type Owner Status Reason for Null
Description Threshold of rising alarms. If the monitored data crosses this value, a rising alarm will be created. Threshold of falling alarms. If the monitored data crosses this value, a falling alarm will be created. Index of rising event Index of falling event It is effective only when the sampling type is specified to periodical sampling. It specifies the duration from the creation of an alarm to expiration in the units of hour. Include periodical sampling and permanent sampling. If periodical sampling is specified, the period must be specified in above edit box. If permanent sampling is specified, the sampling period edit box becomes ineffective. Name of the creator of the alarm extended configuration item Include Activate and Inactivate. Cause for the invalidation of the alarm extended configuration item.
In this interface, clicking <Restore Normal Display> button will switch to Figure 9-15.
9-22
10-1
The queried information includes all VLAN list of device, VLAN ID, VLAN type, contained access VLAN information, information of aggregate VLAN where the VLAN belongs to, whether to broadcast unknown packet, whether there is layer-3 interface, whether to permit MAC to be learned. If click a VLAN in the list, the port list contained in this VLAN can be queried.
10-2
Input related parameters and select related ports on the window, click <OK>, one new VLAN can be created. The parameters and meanings involved in VLAN creation go as follows: VLAN ID: an integer identifying VLAN uniquely, ranging from 2 to 4094. McastUnknown: select whether to broadcast unknown packet. MAC Learn: select whether to permit MAC to be learned. The VLAN's Ports: when VLAN is created, the user can specify port list contained in VLAN. The method goes as follows: select ports to be contained in the VLAN from the "Available Ports" list box at the left, and then click ">>".
10-3
Caution: 1) The ports listed in selectable port list do not include aggregation-branch port, observing port and port belonging to other VLAN. 2) The selectable port list supports Shift and Ctrl multi-option operation.
Caution: 1) VLAN1 cannot be deleted. 2) The VLAN configured with layer-3 interface cannot be deleted.
10-4
Caution: The existing aggregate VLAN, existing access VLAN and VLAN configured with layer-3 interface or VLAN1 cannot be set as the access VLAN of other aggregate VLAN.
" Note: "Change Type" function can both set common VLAN as aggregate VLAN and set aggregate VLAN as common VLAN, which depends on the type of current selected VLAN.
10-5
The following information can be queried: all VLAN interfaces on this device, including VLAN ID, layer-3 interface IP address, mask of VLAN interface, Route Property, Administration Status, Operation Status, etc.
Caution: Figure 10-3 shows the case of single-port VLAN. When the device supports multi-port VLAN, there is not routing property bar on the window. The single-port VLAN refers to that the routing attribute of a VLAN layer-3 interface must be configured as routing when the VLAN layer-3 interface is connected to the layer-3 interface of other router. Here, the VLAN can only contain one port. In the figure, the routing attribute of VLANs whose ID are 2, 4 and 80 are routing and they can only contains one port. At present, core router only supports single-port VLAN.
10-6
On this window, select VLAN ID, input IP address and Mask, click <OK>, one new VLAN interface can be created.
Caution: If the layer-3 interface used currently is deleted, the management device will not be connected.
10-7
Caution: Figure 10-5 shows the case of single-port VLAN. When the device supports multi-port VLAN, there is not routing property on the window.
Select or modify related attribute on this window. Click <OK> to complete configuration operation.
10-8
The following informaiton is available: VLAN Trunk port description, VLAN Passed and VLAN Allowed to Pass on the port. VLAN Allowed to Pass refers to the VLAN IDs, configured through the NMS, that can pass the device port. They may be the existent VLAN IDs (those actually pass through the device port) configured on the device or new ones.
10-9
The list at the left of the window lists all device interfaces that can act as Trunk port but this list does not include aggregation branch port and observing port. Select one or more ports from optional ports and click ">>" to add the port into the list of port to be set as Trunk. Just click <OK>. If the creation does not succeed, the "Prompt" on main interface will prompt the failure reason to the user.
10-10
In this window, the input example is given and the user can set VLAN for this Trunk port according to the example. After input, click <OK> or <Add> or <Delete> to execute corresponding operation. Click <OK>, the VLAN list input by the user this time will completely overwrite the VLAN list that is allowed to pass formerly on this Trunk port. Click <Add>, the VLAN input by the user this time will add to the list of former VLAN that is allowed to pass. Click <Delete>, the VLAN input by the user this time will be deleted from the list of VLAN that is allowed to pass formerly. On matter which case is selected from <OK>, <Add> or <Delete>, the system will open the confirm window to ask the user to confirm this if the user inputs more VLAN than 1000 at one time.
10-11
11-1
The meaning of each parameter is shown below: RSTP Status: enable and disable RSTP. Some network resources will be occupied after RSTP is enabled on the device. RSTP Operation Mode: Two kinds of operation modes are available for RSTP: RSTP Mode and STP Mode. RSTP can operate in STP Mode, and it is interconnected to STP. If there is the network bridge operating STP in the switching network, the current RSTP can be configured to operate in STP Mode. RSTP Diameter: Network diameter refers to the maximum number of switches between any two terminal devices in the switching network. The parameter can be configured as required, ranging 1 to 7 while 7 by default. RSTP Priority: the size of the network bridge determines whether the network bridge can be selected as the root of the whole spanning tree. Specifying smaller priority sets a certain network bridge as the root of the spanning tree, ranging 0 to 61440. RSTP ForwardDelay: The ForwardDelay feature of the network bridge refers to the delay entering the port from Discarding state to Forwarding state, and its parameter is related to the network diameter of the switching network. If FowardDelay is configured too short, the temporary redundant path may be redistributed; if ForwardDelay is configured too long, the network topology cannot restore the connection in a long time after it is changed. The user is recommended to use the default value for the configuration, 15 seconds by default.
11-2
RSTP Bridge Hello Time: Bridge HelloTime refers to the duration for RSTP to periodically send the configuration message. Proper Hello Time can not only guarantee the bridge to discover the link fault in the network in time, but also occupy less network resources. Longer HelloTime may cause the bridge to wrongly assume the protocol packet loss to be link fault and recalculate the tree, while shorter HelloTime may cause the bridge to repeatedly send the configuration message-resulting in added network load and CPU load. The user is recommended to use the default value to configure the HelloTime of the bridge, 2 seconds by default. RSTP Bridge MaxAge: Maxage feature of the bridge refers to the maximum lifetime of the configuration message. The parameter is used to judge whether the configuration message gets expired and discarded. The user can configure it according to the actual situation. If it is configured too short, the calculation of the spanning tree will be repeated. Network congestion may be wrongly regarded as the link fault. If the parameter is configured too long, it cannot timely discover the link fault and lower the network auto-sensing. The user is recommended to use the default value to configure the MaxAge of the bridge, 20 seconds by default. RSTP RootBridgeAddress: it cannot be configured according to MAC address of the root bridge. The user can modify some parameters based on his requirement. Then, click <Configure>. If <Refresh> is clicked, the system will re-read RSTP information from the device and update the display in the window.
11-3
To configure a certain port, select one port in the port list and click <Config>. The window "Port RSTP Configuration" pops up as shown in Figure 11-3:
11-4
Each parameter is described as follows: Port Description: port name. Port Priority: Setting Ethernet port priority specifies the specific Ethernet port in the spanning tree. Generally, the smaller the configured value is, the higher the port priority is, and the more possible is the Ethernet port in the spanning tree. If all Ethernet ports of the bridge adopt the same priority parameter, the priority level of the Ethernet port is determined by the index of the Ethernet port. It ranges 0 to 255, and by default it is 128. Port RSTP Status: Port RSTP status, including disabled, blocking, listening, learning, forwarding, broken, discarding. Port RSTP Spanning Tree: Whether to enable the port RSTP. Port PathCost: The path cost of Ethernet port is related to the link rate of the port. The higher the link rate is, the smaller the parameter is configured. When the parameter is configured to the default value, RSTP can automatically detect the link rate of the current Ethernet port and converge it into the corresponding path cost. The user is recommended to use the default value so that RSTP can calculate the path cost of the current Ethernet port by itself.
11-5
Port Designated Root: Root bridge ID, the first 16 bits are the priority of the root, while the last 48 bits are MAC address of the root bridge. Port Designated Cost: path designated cost to root bridge. Port Trans Limit: Ethernet port Trans limit refers to the maximum number of configuration messages in HelloTime interval. The parameter is related to the physical state and network structure of the port. If the parameter is configured too large, it occupies more network resources. The user is recommended to adopt the default value to configure the parameter. By default, it is 3. Port EdgePort: Ethernet port EdgePort attribute shows whether the port is directly or indirectly connected to other bridge. If the port is not connected to any Ethernet port of the bridge, the port shall be configured as edge port. In this way, the network bridge operates in RSTP mode, and the port can directly switch to Forwarding state and reduces the unnecessary migrating time. If a certain port is configured as the edge port and it is connected to other port of the network bridge, RSTP can automatically detect and reset it as the non-edge port. Port Point to Point: If the network bridge operates in RSTP mode, the two ports connected by point-to-point link can switch to Forwarding state by transmitting the synchronous packet, which reduces the unnecessary forwarding delay. If the parameter is configured to auto, RSTP can automatically detect whether Ethernet port is connected to point-to-point link. The user can manually configure whether Ethernet port is connected to point-to-point link, but it is recommended that the user set it to auto mode. Port mCheck: Port mCheck attribute is used to detect whether the port in STP compatible mode can be switched to RSTP mode. Setting mCheck checks whether there are other bridges running STP in the network segment connected to the current Ethernet port. If so, RSTP will switch the protocol operation mode to STP compatible mode. In the case of relatively stable network, RSTP will also operate in STP compatible mode although the bridge operating STP in the network segment is disconnected. Setting mCheck variable may force it to switch to RSTP mode. When the command is enabled on the port, if the port still operates in STP compatible mode, it means that STP bridge exist in the network segment connected to the port. Otherwise, the port returns to RSTP mode, which means that no STP bridge exists on the network segment connected to the port. It must be noted that the configuration mode of mCheck variable is somehow special; when mCheck variable is set to True, the command is validated in the process of the configuration, but the variable resumes to False after configuration; when mCheck variable is set to False, it is not validated. Besides, only when mCheck command operates in RSTP mode, detecting STP bridge function can be implemented.
11-6
The user can modify some parameters based on his requirement. Then, click <Ok> for the configuration. If <Refresh> is clicked, the system will re-read RSTP information from the device and update the display in the window.
11-7
" Note: S8016 does not support OSPF/BGP information browsing, but provide routing table browsing function.
Including interface configuration information, interface statistic information, peer router information, etc.
!
Including OSPF attribute, area information, connection state database information, OSPF interface information, peer information, virtual connection information, etc.
!
Including the browsing of static routing table and dynamic routing table. Such function is provided by S8016 device. Routing protocol management can be done through the following two methods: 1) Function tree
12-1
Figure 12-1 Function tree of routing protocol management (not including S8016 device)
Double click related nodes on function tree to browse related routing protocol. 2) Device menu
Right click on device panel and the device menu shown as following figure will pop up. So the user can browse related routing protocol.
12-2
The functions of two methods are same. The function tree is described as an example in this chapter.
12-3
The description of various parameters in interface configuration information browsing is shown in following table: Table 12-1 Description of RIP interface configuration information
Content Interface Address Authentication Type Key Description Interface address of specified sub-network Interface authentication type: noAuthentication: none authentication simplePassword: plain text authentication is needed. md5: MD5 authentication is needed Authentication password when the authentication type is simplePassword or md5 RIP sends the following kinds of versions: doNotSend: forbid the interface to send RIP packet outside. ripVersion1: default value. The interface RIP version is RIP-1 and only RIP-1 broadcast packet is sent. rip1Compatible: the interface runs in RIP-2 broadcast mode and only RIP-1 and RIP-2 broadcast packets are sent. ripVersion2: specify the interface to run in RIP-2 multicast mode and only RIP-2 multicast packet is sent. Version of received RIP packet: rip1: default value. The interface RIP version is RIP-1 and only RIP-1 and RIP-2 broadcast packets are received. RIP-2 multicast packet is not received. rip2: specify interface to run in RIP-2 multicast mode and only RIP-2 multicast packet is received. RIP-1 and RIP-2 broadcast packets are not received. rip1OrRip2: the interface runs in RIP-2 broadcast mode and only RIP-1 and RIP-2 broadcast packets are received. RIP-2 multicast packet is not received. doNotRecieve: any RIP packet is not received.
Version of Sent
Version of Received
12-4
User Manual HUAWEI iManager Quidview Router Network Management System Content Default Metric Description
Default metric is used in route import. If no Metric is specified in route import, the value of default-metric is used by default.
The description of various parameters in interface statistic information browsing is shown in following table: Table 12-2 Parameter description of RIP statistic information table
Name Interface Address Received Bad Response Packets Discarded Routes Triggered RIP Updates Description Interface address of specified sub-network Received bad response packets on this interface Discarded routes in received valid RIP packets Triggered RIP update packets sent out on this interface, not including the update packets sent at interval
12-5
The description of various parameters in peer router information browsing is shown in following table: Table 12-3 Parameter description of RIP peer router interface table
Name Peer Address Domain Last Update RIP Version Received Invalid Response Packets Discarded Routes Description Interface address of peer router (Peer) RIP2 does not Routing Domain, and this domain must be 0x0000h. The system operation time when the update packet from peer router is received last time. Version of RIP packet received last time Received invalid response packets from the peer router Discarded routes for wrong route information format in the received valid packets from peer router
12-6
virtual concept is introduced, the areas divided physically can keep logical connection. The router connecting with AS is called autonomous system boundary router (ASBR). If OSPF protocol is configured on device, double click [Route Procotol
Management/OSPF Browsing] on function tree, the right display area will display OSPF protocol related information, including OSPF Attribute, OSPF Area Information, LSDB Information, OSPF Interface, Peer Information, Virtual Link Information, etc.
Various parameters in OSPF protocol attribute information browsing are described in following table: Table 12-4 OSPF protocol attribute
Name Router ID OSPF Status Description Unique ID of router in AS OSPF protocol management status
12-7
User Manual HUAWEI iManager Quidview Router Network Management System Name OSPF Version Is Area Border Router Is AS Border Router ASE-LSA Count Sum of The ASE-LSA Checksums TOS Support New LSA Originated New LSA Received
Version of current OSPF protocol Is this router area border router Is this router AS border router Amount of ASE-LSA in LSDB Sum of ASE-LSA checksums in LSDB Does the router support TOS route Amount of new LSA originated by this router Amount of received new LSA
" Note: LSDB: Link State Database ASE-LSA: AS-external-LSA, type 5 LSA, the routing that is generated by ASBR and reaches to other AS. It will be broadcasted to the whole AS (not including Stub area).
Area information
Click "Area Information" tab on "OSPF Area Information - Area Information" window, the content of area information can be displayed, shown as following figure:
12-8
Various parameters in information browsing are described in following table: Table 12-5 OSPF Browsing-Area Information
Name Area Auth Type Import As Extern LSA Spf Number of ABR Number of ASBR Number of LSA sum of LSA Checksum Description 32-byte integer identifying area uniquely Specify authentication type of area: None(0): none authentication Simple(1): plain text authentication MD5(2): MD5 authentication Does the area support the import of connection status broadcast outside of AS Times that the area link status is used to calculate routing table in area Number of reachable ABR in this area Number of reachable ASBR in this area Number of reachable LSA in link status database of this area Sum of LSA checksum in link status database in this area
Click "Stub Area Information" on "OSPF Browsing-Stub Area Information" window, and the content of Stub area information will be displayed, shown as following figure:
12-9
Various parameters in information browsing are described in following table: Table 12-6 OSPF Browsing-Stub Area Information
Name Area TOS Type Metric Status Description Area number of Stub area Which TOS does the next metric belong to Default metric of imported Stub area Status of this line
12-10
Various parameters in OSPF protocol connection status database information are described in following table: Table 12-7 OSPF Browsing-LSDB Information
Name Area Type LS ID Originating Router Sequence Number Age(s) Checksum Description Number of Area to which LSA belongs LSA type: routerLink, networkLink, summaryLink, asSummaryLink, asExternalLink. LS_ID of LSA ID of router originating LSA LSA serial number Time generating LSA Checksum of LSA
Interface Information
Click "Interface Information" tab on "OSPF Browsing-Interface Information" window, the content of interface information can be displayed, shown as following figure:
12-11
Various parameters of interface information browsing are described in following table: Table 12-8 OSPF Browsing-Interface Information
Name Interface Address Area Description IP address of OSPF interface Area where the interface lies Interface network type: broadcast: when link layer protocol is Ethernet,FDDI, OSPF regard the network type as Broadcast by default. nbma: when link layer protocol is ATM, frame-relay, HDLC or X.25, OSPF regards the network type as NBMA (Non Broadcast MultiAccess) by default. pointToPoint: when link layer protocol is PPP, LAPB or POS, OSPF regards the network type as Point-to-Point by default. pointToMultiPoint: no link layer protocol will be regarded as Point-to-Multipoint by default. It is formed through manual modifying NBMA, If NBMA network is not connected completely. Indicate whether the interface is available Priority of router Link status transit delay Link status retransmit interval Sending interval of interface hello packet Dead time interval of interface peer Polling interval of dead peer Interface status: down, loopback, waiting, pointToPoint, designatedRouter, backupDesignatedRouter, otherDesignatedRouter. IP address of specified router IP address of backup specified router Times of interface status change or error occurrence Plain text authentication key of interface
Type
Admin Status Priority Transit Delay Retrans Interval Hello Interval Dead Time Interval Poll Interval Status DR BDR Events Authentication Key
Click "Interface TOS Metric" tab on "OSPF Browsing-OSPF Interface" window, and the related content of interface TOS metric can be displayed, shown as following figure:
Various parameters in interface TOS metric information browsing are described in following table: Table 12-9 OSPF Browsing-Interface TOS Metric
Name Interface Metric TOS Metric Value Description IP address of OSPF interface (interface index when OSPF interface has no IP address) TOS type of OSPF interface Route metric value of OSPF interface
12-13
Various parameters in peer information browsing are described in following table: Table 12-10 OSPF Browsing-Peer Information
Name Peer Address Router ID Priority Status Events Length of The Retransmission Queue Description IP address of peer (index of interface without IP address) Router ID of peer Priority of peer Status of relationship with peer: down, attempt, init, twoWay, exchangeStart, exchange, loading, full Times of status change of relationship with peer or error occurrence Length of current retransmission queue
Click "Virtual Link Interface" on "OSPF Browsing-Virtual Link Information" window, and the information of virtual link interface can be displayed, shown as following figure:
12-14
Various parameters in virtual link interface browsing are described in following table: Table 12-11 OSPF Browsing-Virtual Link Interface
Name Transit Area Peer Router ID Transit Delay Retrans Interval Hello Interval Dead Time Interval Status Events Authenticaion Key Description Transit area of virtual link Router ID of virtual link peer Link status transit delay Link status retransmit interval Sending interval of interface hello packet Dead time interval of interface peer Interface status of virtual link Times of interface status change of virtual link or error occurrence Plain text authentication key of virtual link interface
Click "Virtual Link Peer" on "OSPF Browsing-Virtual Link Information" window, and the information of virtual link peer can be displayed, shown as following figure:
12-15
Various parameters in virtual link peer browsing are described in following table: Table 12-12 OSPF Browsing-Virtual Link Peer
Name Transit Area Peer Router ID Peer Address Status Events Authentication Key Description Transit area number ID of virtual link peer router IP address of virtual link peer Status of virtual link peer: Down, Attempt, Init, TwoWay, ExchangeStart, Exchange, Loading, full Times of status change of relationship with peer or error occurrence Plain text authentication key
12-16
based on AS level. T path reachable information with sequence attribute of AS number can cancel routing loop. BGP is often used between ISP. BGP was started to use from 1989. Its three earliest released versions are RFC1105 (BGP-1), RFC1163 (BGP-2) and RFC1267 (BGP-3) respectively. At present, RFC1771 (BGP-4) is applied. It is applicable to distributed structure and supports Classless InterDomain Routing (CIDR). BGP-4 has been the actual Internet EGP standard. If BDP is configured on the device, double click [Route Protocol Management/BGP Browsing] on function tree, and the right display area will display BGP related information.
Various parameters in information browsing are described in following table: Table 12-13 BGP Browsing-BGP Attribute
Name The BGP Local ID The Local AS Number BGP ID of local system Local AS number Description
12-17
Basic Information
Click Basic Information" tab on "BGP Browsing-Peer Information" window, and the Basic Information of BGP peer can be displayed, shown as following figure:
Various parameters in peer information browsing are described in following table: Table 12-14 BGP Browsing-Peer Information
Name Peer ID Status Negotiated Version Local IP Address Local Port Remote IP Address Remote Port Remote AS Description BGP peer ID Connection status of BGP peer: idle, connect, active, opensent, openconfirm, established. BGP negotiation version run between two peers Local IP address of BGP connection Local port of TCP connection between BGP peers Remote IP address of BGP peer Remote port of TCP connection between BGP peer Remote AS number
Statistic Information
Click "Statistic Information" tab on "BGP Browsing-Peer Information" window, and the statistic information of BGP peer can be displayed, shown as following figure:
12-18
Various parameters in peer statistic information browsing are described in following table: Table 12-15 BGP Browsing-Peer Statistic Information
Name Peer IP Address Updates Received Updates Transmitted Total Messages Received Total Messages Transmitted Last Error FSM Established Transitions FSM Established Time(s) Description BGP peer IP address Received BGP update messages in this connection Transmitted BGP update packets in this connection Total messages received from remote peer in this connection Total messages transmitted to remote peer in this connection Last error code and sub-code seen by peer in this connection Times of BGP FSM transiting to Established status Duration when the peer is in Established status
Time Attribute
Click "Time Attribute" tab on "BGP Browsing-Peer Information", and the content of BGP time parameters can be displayed, shown as following figure:
12-19
Various parameters in peer time parameter browsing are described in following table: Table 12-16 BGP Browsing-Peer Time Parameter
Name Peer IP Address Connect Retry Interval(S) Hold Time(S) KeepAlive(S) Hold Time Configured(S) KeepAlive Configured(S) Route Advertisement Interval(S) Update Elapsed Time(S) Description BGP peer IP address Interval (s) of establishing connection timer Same as the interval (s) of holding timer established by peer Same as the interval (s) of KeepAlive timer established by peer Holding timer interval (s) configured for BGP addresser and peer KeepAlive timer interval (s) configured for BGP addresser and peer Interval of transmitting routing information Interval from the last time of receiving update packet to now
12-20
Various parameters in BGP4 path information browsing are described in following table: Table 12-17 BGP4 Path Information
Name Peer IP Address IP Address Prefix Len IP Address Prefix Origin AS Path Segment Next Hop Multi Exit Metric Priority Atomic Aggregate Route Aggregator AS Aggregator IP Address Local Priority Calculated IsBest Unknown Attributes Description Peer IP address IP address prefix length of NLRI domain IP address prefix of NLRI domain Path information origin: igp, egp, incomplete AS path segment sequence Next hop address of destination network The value is used to distinguish multiple exits of adjacent AS Priority of origin BGP4 addresser advertisement route Does local system selects non-specific route or the specific route: LessSpecificRouteNotSelected: non-specific route lessSpecificRouteSelected: specific route AS number of BGP4 addresser executing route aggregation IP address of BGP4 addresser executing route aggregation Priority calculated by BGP4 addresser receiving route for advertisement route Is the local route selected as best route? One or more attributes unknown for BGP4 addresser. If it is 0, it indicates that there is no this attribute.
12-21
Click the "enable" or "disable" radio buttons corresponding to various protocols and click <Config> to finish the configuration. If you enable the BGP, you must further specify the local AS number in the range of 1 to 65535.
" Notes: If you fail to enable the routing protocol, the Telnet parameters of the device may have not been configured properly.
12-22
The routing table includes the following key items: destination address, network mask, output interface, next hop IP address, priority of local routing joining in IP route table. Double click [Route Protocol Management/Route Table Browsing] on S8016 function tree and the right information display area will display the content of device routing table, including static routing table and dynamic routing table.
The static routing includes the following contents: Table 12-18 Static Routing table
Content Serial Destination IP Destination Mask Next Hop Interface Description Description Index number of this route Destination address or destination network identifying IP packet Identifying, together with destination address, the address of network segment where the destination host or router is located. Perform AND operation to destination address and network mask to obtain the address of network segment where the destination host or router is located. For example, the address of network segment where the host or router whose destination address is 129.102.8.10 and mask is 255.255.0.0 is 129.102.0.0. Next router that IP packet passes through Which interface of this router is the IP packet forwarded from?
12-23
User Manual HUAWEI iManager Quidview Router Network Management System Content Priority Description
Tag
Priority of this static routing. The priority of each static routing can be different, ranging from 0 to 255. And the default priority of static routing is 60. There are following route tags: reject: destination unreachable route. When the static routing to a destination has "reject" attribute, any IP packet to this destination will be discarded and the source host is notified that the destination is unreachable. blackhole: route whose destination is blackhole. When the static routing to a destination has "blackhole" attribute, any IP packet to this destination will be discarded and the source host is not notified. noflag: reachable route. The normal routes are such routes, i.e., IP packet is sent to the next hop according to the route identified by destination, which is the common use of static routing.
12-24
Tag
There may be some routes for different next hop. These different routes may be discovered by different route protocols or may be static route configured manually. The route with highest priority (the value is small) will be the best route currently. The user can configure many routes to the same destination but with different priority and the system selects a unique route to forward IP packet according to priority sequence.
12-25
This is to say, these address segments will not be assigned on the Internet, but can be used on Intranets or MANs. Based on the estimate to the number of hosts in the predictable future, you can select a proper private network segment for an Intranet or a MAN. Different Intranets or MANs can share the same private address segment. If an enterprise selects a public network segment as its internal network address segment, routing table confusion may occur on the Internet. Address conversion falls into two types, basic address conversion and network address-port conversion. In the former case, certain number of public addresses (may be less than the number of internal hosts) are allocated to a private network. The internal network adopts private addresses, and a NAT device is engaged in dynamically mapping an internal address to a valid public IP address when a host needs to communicate externally. The number of hosts that have external access depends on the number of public IP addresses. The later case implements mapping from the mix of a private address and port to the mix of a public address and port. As a TCP/UDP port is 16bit long and occupies 64K coding space, the number of simultaneous ports used on a computer is usually small and hence the combination of a public address and port
13-1
can be mapped to several combinations of private address and port. This expands the number of addresses. NAT management function applies to S8016. S8016 routing switch supports network address-port conversion and mixed networking of public and private addresses (that is, you can configure either private addresses or public addresses on the private network). NAT processing provides conversion from any address to any address, that is, supports conversion from private addresses to public addresses, public addresses to public addresses and public addresses to private addresses.
" Note: Not any application can pass through a NAT device smoothly. For example, the FTP negotiates data channel IP address and port through the control channel, and attaches the IP address and port to packets for transmission over the channel. Therefore, it is necessary to track the packets through the control channel and convert the attached IP address and port. This function is implemented by the application layer gateway (ALG).
13-2
Here you can query the attributes of all the NAT boards on the device. These attributes include status (usable/unusable), blacklist function (stopped/started), packet fragment function (enable/disable) and available ports. This interface provides attribute configuration, flow monitor and dynamic information clearance operations for NAT boards.
Here you can modify the attributes of a NAT board, such as enabling/disabling the blacklist and packet fragment functions on the board. After modification, click <OK> to finish the attribute configuration. Blacklist: To prevent a NAT board from been affected by such attacks as DOS attack, the board supports to control the maximum number of user connections and the maximum speed at which links are established. You can enable/disable the blacklist function and control over connection speed and total connections on each NAT board. When the blacklist function is enabled, a user will be blacklisted and its connection be disabled or the packet sending speed of the newly established links be limited if the total connections or connection speed exceed the preset thresholds. When the threshold-crossing recovers, the user will be cleared from the blacklist for reestablishing connections. If you enable the blacklist function on a NAT board without selecting any blacklist attribute, the device will not conduct any control but send an alarm when a user is appropriate to be blacklisted.
13-3
" Note: The initiator of DOS (Denial Of Service) attack aims to deny legal users from accessing certain resource, for instance, by sending a large amount of packets to use up network bandwidth resource.
Operation Fails
13-4
After defining NAT address group and ACL, you can correlate them by configuring the bind between them. This correlation specifies to perform NAT processing on "the IP packets matching certain ACL" using "the addresses in the specified public address group". This correlation serves as the basis for address conversion. For example, when sending a packet externally from a private network, the system checks the packet against the NAT ACL. If match, the system will find the corresponding address group according to the correlation and then convert the source address to a certain one in the address group.
Here you can view the information of all the NAT address groups on the device, including the NAT Board Number, Address Group Name, Active NAT Board Number, Start IP and End IP of each address group.
13-5
Here select a NAT board, type the group name, start IP and end IP, and click <OK> to create an address group.
13-6
Here you can view the information of all the NAT ACLs on the device, including ACL number, source IP and wildcard of source IP.
13-7
Here select an ACL number, type the source IP and wildcard, and click <OK> to create a NAT ACL.
Caution: Source IP address and wildcard are the reverses of the mask. For example, the mask is 255.255.255.0 and hence the wildcard should be 0.0.0.255.
13-8
Here you can view the information of all the NAT binds on the device, including the interface description, NAT ACL and NAT address group of each bind.
Here select a port description (since NAT bind is configured on a VLAN interface or a POS interface), an ACL number and an address group (bracketed are the start address and the number of addresses included in the address group), and click <OK> to create a NAT bind.
13-9
The information shown in the interface is described in Table 13-2: Table 13-2 Parameters for NAT Server Management
Name Port Protocol Global IP Global Port Description Interface of the server Type of IP packets used to access the server, including tcp and udp. Public IP address used by the server Destination port used by public network users to access the server. It ranges from 1 to 65535. For some special services (currently including FTP, Telnet, www, DNS and TFTP) provided by the server, you can directly enter the keywords of their English descriptions. Private IP address of the server Port on which the server provides services. It ranges from 1 to 65535. For some special services (currently including FTP, Telnet, www, DNS and TFTP) provided by the server, you can directly enter the keywords of their English descriptions. NAT board number of the server NAT board in use
13-10
The meaning of various parameters in the interface is described in Table 13-2. Set the parameters properly and click <OK> to finish the configuration. Error information will be prompted under the following conditions:
!
The mix of public address and port of the new server is identical with that of an existent one. The public address of the new server is same as that of an existent one, but their NAT board numbers are different. The mix of private address and port of the new server is identical with that of an existent one. The private address of the new server is same (the port is different) as that of a server configured on the same interface, but their NAT board numbers are different.
There may be two reasons that cause failure information to be returned: The public address is included in a NAT address group with the NAT board number different from that of the server, or a NAT ACL including a single private address exists, which is exactly the one you have input.
13-11
Here you can browse and configure the aging time of the connection entries of the TCP, UDP, ICMP and FTP. By default, the valid time for the TCP, UDP, ICMP and FTP are 300 seconds, 120 seconds, 60 seconds and 3600 seconds respectively.
13-12
Here you can browse the NAT enable status of various interfaces on the device. Click on an interface with the status as enable in the left list, you can also view the destination segments configured on the interface with the NAT function disabled.
13-13
Here type an IP address and a mask and click <OK> to create a destination segment with the NAT function disabled.
13-14
Here you can view the blacklist information on the device, including the IP address, NAT board, total number of connections, connection establishing speed and reason for being blacklisted (such as "Too large connection number", "Too fast connection-establishing speed" and "Unknown") of each blacklist user.
Caution: Some versions of the S8016 device do not support blacklist information deletion and hence the <Delete> button defaults in the related NAT blacklist information interfaces.
13-15
Here you can view and configure the status of the limitation function for total connections, upper threshold and lower threshold. If the limitation function is disabled, the device will not conduct any control but send an alarm when the total number of connections of a user exceeds the preset threshold. In this interface, you can also browse and configure the status of the limitation function for link establishing speed, upper threshold and lower threshold. If the limitation function is disabled, the device will not conduct any control but send an alarm when the speed of a user exceeds the preset threshold. Theoretically, the link establishing speed set in the NMS limits the number of connections established per second, but in practice this parameter is something different from the actual link establishing speed of a user and the two values are not in linear relation. The reason is that this value is related to the number of packets sent consecutively by a user. Figure 13-16 shows the specific relation between the speed
13-16
set in the NMS (represented by Y-axis) and the actual speed (represented by X-axis). Various fold-lines show the cases of different number of packets sent consecutively.
Figure 13-16 Relation between the speed set in the NMS and the actual speed
13-17
Here you can view the all the connection limitations configured for special IPs, including the corresponding IP address, upper threshold of total connection number, lower threshold of total connection number, upper threshold of connection-establishing speed and lower threshold of connection-establishing speed of each limitation.
Caution: After you configure the upper and lower thresholds of total connection number for a special IP, the general thresholds set in the "Connection Limitation" page become ineffective for the address.
13-18
Here type the IP address, upper threshold of total connection number, lower threshold of total connection number, upper threshold of connection-establishing speed and lower threshold of connection-establishing speed, and click <OK> to create the connection limitation for a special IP.
13-19
Ethernet_II and Ethernet_SNAP are used to support IP protocol. FE and GE can identify the received frame format, but they can only send one format of frame at one time. Ethernet interface configuration includes: interface parameter configuration, interface information query, real-time flow statistics, real-time collision statistics, and real-time error statistics. In addition, NE80 and NE40 also provide the sub-interface configuration management function. Ethernet interface can be configured via the following methods: Function tree The function menu of the Ethernet interface configuration is shown in the following figure:
14-1
14-2
Double-click relevant nodes in the function tree, and configure the related parameters on the Ethernet interface. 2) Device menu
Select a certain Ethernet interface on the device panel, and right-click the mouse. The device menu shown in the following figure pops up. Select and configure the related parameters on the menu.
The two kinds of operation methods have the same function. The chapter is described with the example of the function tree.
14-3
The user select "up" or "down" administration status from the pull-down list. Click <Config>. The user configures the management status of the Ethernet interface according to the setting of the user device. If it is configured successfully, the interface status configuration window is refreshed and the interface status has changed. Refreshing the panel can see the change of the interface color.
14-4
If the configuration fails or SNMP operation expires, the system prompts the user of the failed configuration or expired SNMP operation.
The parameter description of the configured interface parameter is shown in the following table: Table 14-1 Interface parameter configuration description
Contents Interface Description Frame Type Negotiation Mode Interface Operating Mode Interface Transmission Speed Loopback Mode Max Transport Unit Description Interface name, not configurable Three kinds of link layer frame formats: Ethernet_II, Ethernet_SAP, Ethernet_SNAP Two kinds of negotiation modes: Self-Negotiation, No Self-Negotiation Two kinds of interface operation modes: full duplex, half duplex Three kinds of interface transmission rate: 10M, 100M, 1000M Three kinds of loopback modes: none, interior, exterior Ranges from 328 to 1500 bytes (The maximum value of the GE interface of NE80 and NE40 routers is 8000 bytes and that for S8016 is 1548.)
14-5
Frame format: Three kinds of frame formats are available for Ethernet: Ethernet_II, Ethernet_SNAP, and Ethernet_SAP. Both Ethernet interface and subinterface can receive the frame of any format at the same time, but they can only send one kind of frame format at one time. Negotiation mode: For FE electrical interface, if the two parties are connected in auto negotiation mode, they will determine the operating speed and mode by negotiation. If one party is not in auto negotiation mode, the negotiated result can not be guaranteed. By default, FE electrical interface is in auto negotiation mode, while FE optical interface and GE interface are not in auto negotiation modes, because the operating speed and mode of the optical interface are fixedly configured. Interface Operating Mode: Full duplex and half duplex are available for FE electrical interface, while GE and GE optical interface can only operate in full duplex mode and cannot be configured. Interface Transmission Speed: FE electrical interface supports 10Mbit/s and 100Mbit/s, while FE optical interface only supports 100Mbit/s and GE optical interface only supports 1000Mbit/s and cannot be configured. By default, the speed of Ethernet FE electrical interface is 10Mbit/s. If the auto negotiation state is enabled, it will determine the operating speed with the peer interface by negotiation (10Mbit/s or 100Mbit/s). Upon configuration, the peer device must be configured to the same speed. Loopback mode: In Ethernet interface configuration mode, the loopback test can be configured. Loopback is mainly applied in some special cases. Normally, the loopback shall be disabled. By default, loopback of any form shall be disabled. When the loopback function is configured, the interface must be configured to full duplex mode. Maximum Transmission Unit: The maximum transmission unit MTU (Maximum Transmission Unit) affects the fragment and restructure of IP packet. By default, it is 1500. The following must be configured upon configuration:
!
When the interface is the electrical interface, "Interface Transmission Speed" can only be configured as 10M and 100M. When "Interface Operating Mode" is "Half Duplex", "Loopback Mode" can only be "None". Maximum transmission unit can only be 328 to 1500 bytes; otherwise, it prompts error upon configuration. If the interface is the optical interface, "Interface Operating Mode" and "Interface Transmission Speed" cannot be compiled. If the interface is the electrical interface and the negotiation mode is configured as "Self-Negotiation", "Interface Operating Mode" and "Interface Transmission Speed" are not compiled.
14-6
Click <Config>. The system configures the various parameters of Ethernet interface according to the user setting. If it is configured successfully, the interface status configuration window is refreshed. The interface parameter has changed. If the configuration fails or SNMP operation expires, the system prompts the user of the failed configuration or expired SNMP operation.
The user can select whether to reset the interface counter in the pull-down list. When the status of the reset counter is "YES", click <Config>. Click <Ok> in the pop-up window, and the system resets the counter of the interface. If it is operated successfully, the system prompts the user that resetting counter succeeded. If the operation fails or SNMP operation expires, the system prompts the user that resetting counter failed.
14-7
14-8
14-9
14-10
The following table describes the Browse Sent Information: Table 14-4 Browse sent information description
Contents Interface Description Sent Short Frames(Correct Check) Sent Short Frames(Check Errors) Sent Frames (64Bytes) Sent Frames (65~127Bytes) Sent Frames (128~255Bytes) Sent Frames (256~511Bytes) Sent Frames (512~1023Bytes) Sent Frames (1024~1518Bytes) Sent Frames (1519~9018Bytes) Sent Too-Long Frames of Correct Check Sent Too-Long Frames of Check Errors Total Sent Conflicted Frames Abnormally Sent Frames Aborted by PMM Out-Interface All Check Error Frames Successfully Sent Broadcast Frames Successfully Sent Multicast Frames Description Name of the interface Number of short frames (of less than 64 bytes) sent from the interface Number of short frames with checksum error sent from the interface Number of 64-byte frames sent from the interface Number of 65~127-byte frames sent from the interface Number of 128~255-byte frames sent from the interface Number of 256~511-byte frames sent from the interface Number of 512~1023-byte frames sent from the interface Number of 1024~1518-byte frames sent from the interface Number of 1519~9018-byte frames sent from the interface Number of long frames with correct checksum sent from the interface Number of long frames with checksum error sent from the interface Number of collision frames sent from the interface Number of abnormal frames aborted by PMM egress Number of frames with checksum error sent from the interface Number of frames successfully broadcast from the interface Number of frames successfully multicast from the interface
14-11
" Note: S8016 does not provide the "Invalid VLAN ID View" tab.
In the Interface Information Query interface select "Browse Invalid VLAN ID" tab to view the information with invalid VLAN ID received/sent by/from a specified Ethernet interface, shown as the following figure:
The following table describes the Browse Invalid VLAN ID: Table 14-5 Browse invalid VLAN ID description
Contents Interface Description Sent Invalid Frames Received Invalid Frames Sent Invalid Octets Received Invalid Octets Description Name of the interface Number of frames with invalid VLAN ID sent by the master port Number of frames with invalid VLAN ID received via the master port Number of octets with invalid VLAN ID sent by the master port Number of octets with invalid VLAN ID received via the master port
14-12
The following table describes Browse E4GC Information: Table 14-6 Browse E4GC information description
Contents Interface Description Status Vendor Name Compliance Part Number Length9u (Km/n) Length50u (Km/n) Length62u (Km/n) WaveLength Description Name of the interface Online or Offline Vendor name of the optical module Attributes of the optical module Model of the optical module The maximum transmission distance supported by the 9u optical fiber (Km/n) The maximum transmission distance supported by the 50u optical fiber (Km/n) The maximum transmission distance supported by the 62u optical fiber (Km/n) Wavelength
Caution: If you select a interface other than E4GC, the information window prompts The selected port doesnt support this function."; if the E4GC port is not online, it prompts "E4GC module isn't online".
14-13
The following table describes the traffic statistics items: Table 14-7 Real-time flow statistics monitor items
Contents Sent Frame(64Bytes) Sent Frame(65~127Bytes) Sent Frame (128~255Bytes) Sent Frame (256~511Bytes) Sent Frame (512~1023Bytes) Sent Frame (1024~1518Bytes) Received Frame (64Bytes) Received Frame (65~127Bytes) Received Frame (128~255Bytes) Description Number of 64-byte frames sent from the interface Number of 65~127-byte frames sent from the interface Number of 128~255-byte frames sent from the interface Number of 256~511-byte frames sent from the interface Number of 512~1023-byte frames sent from the interface Number of 1024~1518-byte frames sent from the interface Number of 64-byte frames received via the interface Number of 65~127-byte frames received via the interface Number of 128~255-byte received via the interface 1
14-14
User Manual HUAWEI iManager Quidview Router Network Management System Contents Received Frame (256~511Bytes) Received Frame (512~1023Bytes) Received Frame (1024~1518Bytes)
Number of 256~511-byte received via the interface Number of 512~1023-byte frames received via the interface Number of 1024~1518-byte frames received via the interface 1024~1518
In the "Real-Time Flow Statistics" interface, you can select and view an Ethernet interface.
The following table describes the real-time collision statistics items: Table 14-8 Real-time collision statistics monitor items
Contents Single Collision Frames (frames/s) Multiple Collision Frames (frames/s) Excessive Collisions (frames/s) Sent Total Collisions (frames/s) Description Number of single collision frames successfully sent per second Number of multiple collision frames successfully sent per second Number of cancelled frames per second due to excessive collisions Total collision frames sent per second
14-15
In the "Real-time Collision Statistics" interface, you can select and view an Ethernet interface.
The following table describes the real-time error statistics items: Table 14-9 Real-time error statistics monitor items
Contents AlignmentErrors (frames/s) FCSErrors (frames/s) Deferred Transmissions (frames/s) Description Number of received frames with intact octet and FCS error per second Number of received frames with tact octet and FCS error per second Number of deferred frames to be transmitted due to lack of medium
In the "Real-Time Error Statistics" interface, you can select and view an Ethernet interface.
14-16
The Ethernet interface of NE80 core router supports the subinterface concept. A physical interface allows you to configure multiple subinterfaces, which makes the networking much more flexible. Both the FE and GE port LPUs provide subinterfaces. An FE/GE interface supports up to 4095 subinterfaces, numbered as 1 to 4095. Note that a subinterface can be configured with the parameters such as IP address only if it has been encapsulated with VLAN. Besides, a sub port will always stay administratively down and turn up only after the interface is physically up.
You can perform the following operations of sub port in the above interface: Add, Delete, Config, and Refresh. They will be introduced respectively in the following sections. In the "Subinterface Management" interface, you can select and view an Ethernet interface.
14-17
I. Adding a subinterface
Click <Add> on the Subinterface Management interface and the Add Subinterface will pop up, shown as the following figure:
You need input the subinterface ID, which ranges from 1 to 4095. Click <OK> and add a subinterface. If successful, the system will refresh the Subinterface Management interface and you will see the new subinterface on the list. The VLAN ID of the new subinterface is 0 and the encapsulation format is dot1q(1). You can use the "Config" function to set the VLAN ID of the subinterface. For details, refer to the contents in the later part of this chapter. If the system fails to add a subinterface or SNMP operation timeouts, the system will prompt accordingly.
14-18
The following table describes the subinterface configuration parameters. Table 14-10 Configuring subinterface parameters
Contents Sub Interface ID Encapsulation Type VLAN ID Description Composed by and fixed as "Ethernet interface name""+"."+ "Subinterface ID input by a user". dot1q, while NE80 only supports 802.1Q encapsulation only. The VLAN ID with the value range of 0~4094. 0 means to cancel the VLAN ID.
A subinterface can be configured with a VLAN ID. The VLAN of NE80 core router does not support L2 switching, but support L3 switching.
" Note: In an NE80 core router, a VLAN domain is identified with physical interfaces and VLAN ID together. The subinterfaces of a physical interface should have different VLAN IDs. The subinterfaces of different interfaces may have the same VLAN ID, yet they belong to different VLAN domains.
A subinterface can be configured with such parameters as IP address and MTU only after it have been configured with VLAN encapsulation.
14-19
Management and you can find the selected interface(s) has/have been removed from the list. If the system fails to delete the interface(s) or SNMP operation timeouts, the system will prompt accordingly.
The following table describes the Subinterface MultiCast Query. Table 14-11 Subinterface multicast query parameters
Contents Subinterface Description Sent Multicast Packets Received Multicast Packets Sent Multicast Bytes Received Multicast Bytes Description Subinterface ID, composed by "Ethernet interface name"+"."+"Subinterface ID input by a user". Number of multicast packets sent from a subinterface. Number of multicast packets received by a subinterface Number of multicast bytes sent from a subinterface. Number of multicast bytes received by a subinterface.
In the "Subinterface MultiCast Query" interface, you can select and view the specified Ethernet interface.
14-20
The following table describers the Subinterface Flow Query. Table 14-12 Subinterface flow query parameters
Contents Subinterface Description Input Octets Input Unicast Frames Input Non-Unicast Frames Discarded input Frames Output Octets Output Unicast Frames Output Non-Unicast Frames Discarded Output Frames Description Subinterface ID, composed by "Ethernet interface name"+"."+"Subinterface ID input by a user". Number of octets received by a subinterface. Number of unicast frames received by a subinterface. Number of non-unicast frames received by a subinterface. Number of the discarded frames received by a subinterface Number of octets sent from a subinterface. Number of unicast frames sent from a subinterface. Number of non-unicast frames sent from a subinterface. Number of the discarded frames sent from a subinterface
In the "Subinterface Flow Query" window, you can select and view the specified Ethernet interface.
14-21
Double click the relevant node on the function tree to configure the Ethernet trunk. Device menu
15-1
Right click the device panel to pop up the device menu, as shown in the following figure, where you can configure relevant parameters of the Ethernet trunk.
The two operation methods have the same functions. This chapter takes the function tree operations as an example. Double click the function node [ETH Trunk Management/ETH Trunk Management] on the function tree in the function window, and the Eth Trunk Management window will display in the information display area at the right, as shown in the following figure:
Operations of Add, Delete, Config, View, Monitor and Refresh, etc. can be performed for the Eth Trunk in this window, and they are respectively described as follows.
15-2
The user is required to input the ID of the Trunk to be added in the Add Trunk window, and the Trunk ID is an integer within 0 ~ 15. Click <OK> and the system will add an Eth Trunk interface. If the interface is added successfully, the system will refresh the main Eth Trunk Management interface, where the user can find the added Eth Trunk. The parameters of the Eth Trunk employ the default values, as shown in the following table: Table 15-1 Default Eth Trunk parameters
Content Trunk Description Trunk ID Trunk Name MTU Encapsulation Type Reset Counter Administration Status Operation Status Description Description of the Trunk, consisting of "Eth-Trunk" and "Trunk ID" input by the user. This parameter can not be modified. ID of the corresponding Eth Trunk interface, input by the user. Name of the corresponding Eth Trunk, automatically generated by the system, consisting of "HUAWEI, Quidway Series, Eth-Trunk", "Trunk ID" and " Interface". This parameter can be modified.. MTU value of the corresponding Eth Trunk, "1500" by default. This parameter can be modified. Link encapsulation type of the corresponding Eth Trunk, "Ethernet_II" by default. This parameter can be modified. The flag indicating whether to clear the statistical data, "YES" by default. This parameter can be modified. Administration status, "up" by default. This parameter can be modified. Operation status, "down" by default. This parameter can not be modified.
The user can set the Trunk Name, MTU, Encapsulation Type, Reset Counter and Administration Status, etc. of the Eth Trunk via the "Config" function. For details, see the following relevant contents of this chapter.
15-3
If the Add operation fails or the SNMP operation times out, the system will prompt the user accordingly.
15-4
The description of the Eth Trunk Status Configuration window is shown in the following table: Table 15-2 Eth Trunk status configuration
Content Trunk ID Trunk Name Trunk Description Administration Status Operation Status Description ID of the corresponding Eth Trunk interface, which can not be configured. Name of the corresponding Eth Trunk, which can not be configured. Trunk description information, which can not be configured. Administration status, including "up" and "down". Operation status, which can not be configured.
Click <Config> and the system will configure the administration status of the Eth Trunk as set by the user. If the configuration is successful, the system will refresh and display the result after configuration. If the configuration operation fails or the SNMP operation times out, the system will prompt the user accordingly.
15-5
The description of the Eth Trunk Parameter Configuration window is shown in the following table: Table 15-3 Eth Trunk Parameter Configuration
Content Trunk ID Trunk Name Trunk Description MTU Encapsulation Type Description ID of the corresponding Eth Trunk interface, which can not be configured. Name of the corresponding Eth Trunk, with the value range of 1~ 47 characters. Trunk description information, which cannot be configured.. MTU value of the corresponding Eth Trunk, with the value range of 328~1500. Link encapsulation type of the corresponding Eth Trunk. Three types are available: Ethernet_II, Ethernet_SAP, and ethernet_SNAP.
Click <Config> and the system will configure the parameters of the Eth Trunk as set by the user. If the configuration is successful, the system will refresh and display the result after the configuration.
15-6
If the configuration operation fails or the SNMP operation times out, the system will prompt the user accordingly.
Select "yes", and the system will clear the statistical data flag. Otherwise, it will not clear this flag. Click <Config>, and the system will configure the reset status of the operation statistic counter as set by the user. If the configuration is successful, the system will refresh and display the result after the configuration. If the configuration operation fails or the SNMP operation times out, the system will prompt the user accordingly.
15-7
This interface includes two lists: "Available Ports" and "This Trunk's Ports". "Available Ports" lists all the fast Ethernet interfaces (FE) and gigabit Ethernet interfaces (GE) included in this device, but it does not include the sub-interfaces. "This Trunk's Ports" lists the Ethernet interfaces included in the currently selected Eth Trunk. Select one or more interfaces in "Available Ports", then click ">>" in the figure, and the selected interface(s) will be added to "This Trunk's Ports". Similarly, select one or more interfaces in "This Trunk's Ports", then click "<<" in the figure, and the selected interface(s) will be deleted from "This Trunk's Ports ". To configure the Eth Trunk member interface, the following conditions must be available:
! !
The administration status of the interface is "UP". The physical port added to the Trunk must be in the full duplex mode, and no other configurations can be made before it is added (For FE, the interface can only be configured as "negotiation auto" and "no shutdown". For GE, the interface can only be configured as "no negotiation auto" and "no shutdown".)
15-8
One Eth Trunk interface can be configured with up to 16 member interfaces, which must be of the same type. That is, all of them must be FE or GE, with the same bandwidth, and moreover, FE and GE can not be bound together.
Click <Config> and the system will configure the member interfaces of this Eth Trunk as set by the user. If the configuration is successful, the system will refresh and display the result after the configuration. If the configuration operation fails or the SNMP operation times out, the system will prompt the user accordingly.
15-9
The description of query information is shown in the table below: Table 15-4 Default Eth Trunk parameters
Content Trunk ID Trunk Name Trunk Description Administration Status Operation Status MTU Encapsulation Type Reset Counter Description ID of the corresponding Eth Trunk interface. Name of the corresponding Eth Trunk Description information of this Trunk Administration status of this Trunk Operation status of this Eth Trunk MTU value of the corresponding Eth Trunk. Link encapsulation type of the corresponding Eth Trunk. The flag indicating whether to clear the statistical data.
15-10
The description of query information is shown in the table below: Table 15-5 Eth Trunk Port Information query
Content Trunk ID Port Description Lacp Success Description ID of the corresponding Eth Trunk interface Description information of the Eth Trunk member interface Whether the Trunk member starts the LACP protocol successfully
15-11
See the previous chapters for operations of different functions in this real-time statistics interface. This chapter will focus on the data items that can be monitored in this real-time statistics interface. The data items that can be monitored in the Eth Trunk real-time statistics interface fall into four groups. The user can select Receive Monitor, Send Monitor, Error Monitor or LACP Monitor for the selected Eth Trunk. The detailed description can be found in the following table: Table 15-6 Eth Trunk statistic information query
Statistics category Statistics item Received Short Frames (less than 64 bytes) Received Frames (64 bytes) Received Frames (65 ~ 127 bytes) Received Frames (128 ~ 255 bytes) Received Frames (256 ~ 511 bytes) Received Frames (512 ~ 1023 bytes) Received Frames (1024 ~ 1518 bytes) Received Frames (1519 ~ 9018 bytes, or 1519 ~ 9022 bytes when VLAN is supported). Long Frames Received Broadcast Frames Multicast Frames Total Number of Frames (including check errors, multicast, broadcast and ultra long frames)
Receive Monitor
15-12
User Manual HUAWEI iManager Quidview Router Network Management System Statistics category Statistics item
Send Monitor
Error Monitor
Sent Short Frames (less than 64 bytes) Sent Run Frames Sent Frames (64 bytes) Sent Frames (65~127 bytes) Sent Frames (128~255 bytes) Sent Frames (256~511 bytes) Sent Frames (512~1023 bytes) Sent Frames (1024~1518 bytes) Sent Frames (1519~9018 bytes, or 1519~9022 bytes when vlan is supported) Sent Long Frames Received Broadcast Frames Multicast Frames RevJabber RevNumberofFrameswithBadCRC RevReceiveErrors RevOverrun RevNumberofPause SentJabber SentTotalCollisions SentAbort SentCRCError
15-13
Here you can add, delete, configure, refresh and browse Trunk subinterfaces. The specific operation procedures are as follows:
15-14
Click <OK> to add a Trunk subinterface. If succeed, the system will refresh the Trunk subinterface management interface where you can browse the new Trunk subinterface with the VLAN ID as 0 and encapsulation format as dot1q(1). Here can set the VLAN ID of the subinterface with the "Config" function (see the subsequent sections for more detail). If adding subinterface fails or in the case of SNMP operation timeout, you will be prompted accordingly.
Various parameters in the interface are described in the following table: Table 15-7 Subinterface configuration parameters
Content Subinterface ID Encapsulation Type VLAN ID Description Name of the Ethernet Trunk interface plus the subinterface ID specified by the user. This parameter is not configurable. Currently NE80 only supports dot1q (802.1Q) encapsulation. The value range varies according to different Ethernet interfaces, where 0 refers to canceling VLAN ID.
A Trunk subinterface can only be configured with a single VLAN ID ranging from 1 to 4094. A Trunk supports up to 255 subinterfaces connecting to 255 VLANs. The VLANs of an NE80 core router support not L2 switching but L3 switching.
15-15
" Note: On an NE80 core router, a VLAN domain is jointly identified by a physical port and a VLAN ID. On a physical port, the VLAN IDs of various subinterfaces should be different, while the subinterfaces of different physical ports may have the same VLAN ID through they belong to different VLAN domains.
You must configure VLAN encapsulation for a Trunk subinterface, and then the IP address, MTU and other parameters.
15-16
The multicast parameters of a Trunk subinterface are described in the following table: Table 15-8 Multicast parameters of a Trunk subinterface
Content Subinterface Description Sent Multicast Packets Received Multicast Packets Sent Multicast Bytes Received Multicast Bytes Description ID of the subinterface, that is, the Ethernet Trunk interface name plus the subinterface ID entered by the user Number of multicast packets sent by the subinterface Number of multicast packets receive by the subinterface Number of multicast octets sent by the subinterface Number of multicast octets received by the subinterface
In above interface, you can select a Trunk interface from the left Trunk interface list to access the Ethernet Trunk interface you want to manage.
15-17
The flow parameters of a Trunk subinterface are described in the following table: Table 15-9 Flow parameters of a subinterface
Content Subinterface Description Input Octets Input Unicast Frames Input Non-Unicast Frames Discarded Input Frames Output Octets Output Unicast Frames Output Non-Unicast Frames Discarded Output Frames Description ID of the subinterface, that is, the Ethernet Trunk interface name plus the subinterface ID entered by the user Number of input octets of the subinterface Number of input unicast frames of the subinterface Number of input non-unicast frames of the subinterface Number of discarded input frames of the subinterface Number of output octets of the subinterface Number of output unicast frames of the subinterface Number of output non-unicast frames of the subinterface Number of discarded output frames of the subinterface
In above interface, you can select a Trunk interface from the left Trunk interface list to access the Ethernet Trunk interface you want to manage.
15-18
Double click the relevant node on the function tree to configure the IP Trunk. 2) Device menu
16-1
Right click the device panel to pop up the device menu shown in the following figure, where you can configure relevant parameters of the IP Trunk.
The two operation methods have the same functions. This chapter takes the function tree operations as an example. Double click the function node [IP Trunk Management/IP Trunk Management] on the function tree in the function window, and the IP Trunk Management window will display in the information display area at the right, as shown in the following figure:
Operations of Add, Delete, Config, View and Refresh, etc. can be performed in this window for the IP Trunk, as described below.
16-2
The user is required to input the ID of the Trunk to be added in the Add IP Trunk window. The value range of the Trunk ID is an integer within 0~15. Click <OK> and the system will add an IP Trunk interface. If it is added successfully, the system will refresh the main IP Trunk Management interface, and the user can find the added IP Trunk, whose parameters use the default values, as shown in the following table: Table 16-1 Default IP Trunk parameters
Content IP Trunk ID IP Trunk Description Administration Status Operation Status MTU Encapsulation Type Description ID of the corresponding IP Trunk interface, input by the user. IP Trunk description, consisting of "Ip-Trunk" and "IP Trunk ID" input by the user, read-only. Administration status, "up" by default, readable and writable. Operation status, "down" by default, read-only. MTU value of the corresponding IP Trunk, "1500" by default, read-only. Link encapsulation type of the corresponding IP Trunk, "PPP" by default, readable and writable.
The user can set the Encapsulation Type, Administration Status, and Member Ports, etc. of the IP Trunk via the "Config" function. For details, see the following contents of this chapter. If the adding operation fails or the SNMP operation times out, the system will prompt the user accordingly.
16-3
16-4
The description of the IP Trunk Status Configuration tab is shown in the following table: Table 16-2 IPTrunk Status Configuration
Content Trunk ID Trunk Description Administration Status Operation Status Description ID of the corresponding IP Trunk interface, read-only. Trunk description, read-only. Administration status, including "up" and "down", which can be configured by the user. Operation status, including "up" and "down", read-only.
The user can select an IP Trunk in this interface and configure the administration status as "up" or "down". Click <Config> and the system will configure the administration status of the IP Trunk as set by the user. If the configuration is successful, the system will refresh and display the result after the configuration. If the configuration operation fails or the SNMP operation times out, the system will prompt the user accordingly.
16-5
The link encapsulation protocol of IP Trunk supports PPP and HDLC, "PPP" by default. When the user clicks <Config> after configuring the link encapsulation protocol, the system will configure the link encapsulation protocol as set by the user. If the configuration is successful, the system will refresh and display the result after the configuration. If the configuration operation fails or the SNMP operation times out, the system will prompt the user accordingly.
Up to 16 POS interfaces can be bound for the IP Trunk, and one POS interface can be added to one IP Trunk at most.
16-6
Before the POS interface is added to IP Trunk, neither the interface administration status nor the link encapsulation status can be configured. Instead, they are configured via the IP Trunk. See the contents of the previous chapters. If the user selects an IP Trunk to be configured in the IP Trunk interface, the member interfaces of this IP Trunk will be listed in the list box "Ports to be configured" of the interface shown above, and the POS interfaces available on the device (the non-channelized POS interfaces, not including those added to the APS group) will be listed in the list box "Available Ports". Select one or more POS interfaces in the list box "Available Ports", then click ">>" to add the selected interface(s) to the list box "Ports to be configured". Select one or more POS interfaces in the list box "Ports to be configured", then click "<<" to delete the selected interface(s) from the list box "Ports to be configured" and move it to the list box "Available Ports". Click <Config> and the system will configure the member interface of this IP Trunk as set by the user. If the configuration is successful, it can be found on this interface that the member interfaces of this IP Trunk has been set as required by the user. If the configuration operation fails or the SNMP operation times out, the system will prompt the user accordingly.
16-7
The query information is shown in the following table: Table 16-3 IP Trunk member interface query
Content IP Trunk ID Member Port Description Running Status Description ID of the corresponding IP Trunk interface. Name of the corresponding member interface. Status of the corresponding member interface, including "up" and "down".
16-8
The statistics information that can be queried includes: number of the received bytes, number of the received unicast packets, number of the multicast packets, number of the received broadcast packets, number of the received error packets, number of the received packets discarded, number of the sent bytes, number of the sent unicast packets, number of the sent multicast packets, number of the sent broadcast packets, number of the sent error packets and number of the sent packets discarded, etc. Click <Refresh> and the system will refresh the flow statistics information of this interface.
16-9
The function menus of POS interface management are shown in the following figure:
17-1
Select a POS interface in the panel and double click the relevant node on the function tree to configure relevant functions of the POS interface. 2) Device menu
Select a POS interface in the panel, and right click to pop up the interface-level menu as shown in Figure 17-2, then select the lower-level menu in <POS Interface Management> to configure relevant functions of the POS interface.
The two operation methods have the same functions. This chapter takes the function tree operations as an example.
Caution: Only after a POS interface is selected in the panel, can operations related with POS interface management be performed.
17-2
There are two attribute tabs in the figure: "Status Configuration" and "Parameter Configuration". When switching to the attribute tab "Parameter Configuration", the configuration window is shown in Figure 17-4:
17-3
The meanings of interface configuration parameters are shown in Table 17-1 Table 17-2: Table 17-1 Description of the Interface Status Configuration parameters
Name Interface Description Administration Status Operation Status Description Description of the selected interface, read-only. Administration status of the interface, including the values of "up" and "down", readable and writable. Operation status of the interface, including the values of "up" and "down", read-only.
17-4
Modify relevant parameters and click <Config> to complete the interface configuration operation.
There are two attribute tabs in the figure: "Path Parameter Configuration" and "Link Configuration". When switching to the attribute tab "Link Configuration", the configuration window is shown in Figure 17-6:
17-5
The meanings of path configuration parameters are shown in Table 17-3 Table 17-4: Table 17-3 Description of the POS path configuration parameters
Name Interface Description Scramble C2 J1 Description Description of the selected interface; read-only. Setting whether to scramble, including the optional values of "Scramble" (enable scrambling) and "UnScramble" (disable scrambling). Setting the multiplex structure of the VC frame and the nature of the information payload, with the value range of 0~255. Setting continuity of the transmitting/receiving end of the path layer, with the value range being a string of 1~15 characters.
17-6
" Note: If the Scramble of the POS interface is configured as "enable", the C2 should be configured as 22 (0x16). Otherwise (if the Scramble is configured as "disable"), the C2 should be configured as 207 (0xCF).
Description of the selected interface. Setting the encapsulation protocol type of the link layer, including the optional values of Encapsulation "ppp" and "hdlc". KeepAlive Timeout Setting the timeout interval of the KeepAlive message, with the value range of 0~32767s. Setting the PPP authentication protocol, including the optional values of "pap", "chap", PPP Authentication "chappap", and "noauthentication". The parameter is effective only when the encapsulation protocol type of the link layer is set as "PPP". Setting the timeout interval of the PPP protocol negotiation, with the value range of PPP Negotiate Timeout 1~10s. This parameter is effective only when the encapsulation protocol type of the link layer is set as "PPP". Setting the host name of the Chap authentication protocol, with the value range being a Chap Host string of 1~32 characters. This parameter is effective only when the encapsulation protocol type of the link layer is set as "PPP". Set the user name of the Pap authentication protocol, with the value range being a string Pap Username of 1~32 characters. This parameter is effective only when the encapsulation protocol type of the link layer is set as "ppp". Setting the password display mode of the Pap authentication protocol: "noEncrypt" or Pap PasswdEncrypt "Encrypt". This parameter is effective only when the encapsulation protocol type of the link layer is set as "PPP". Setting the password of the Pap authentication protocol, with the value range being a Pap Password string of 1~16 characters. This parameter is effective only when the encapsulation protocol type of the link layer is set as "PPP".
The following corresponding relationships are available for the parameters in the PPP protocol parameter configuration: When the PPP authentication protocol is "pap", the timeout interval of the ppp protocol negotiation, the user name, the password display mode and the password of the pap authentication protocol are effective. 2) When the PPP authentication protocol is "chap", the timeout interval of the ppp protocol negotiation and the host name of the chap authentication protocol are effective. 3) When the PPP authentication protocol is "chappap", all parameters will be effective, and they are verified in sequence from chap to pap. Modify the relevant parameters and click <Config> to complete the path configuration operation.
17-7
Figure 17-7 SDH Interface Current Status (Physical Medium Layer) query window
There are four attribute tabs in the figure: "Physical Medium Layer", "Section Layer", "Line Layer", and "Farend Line Layer". The other attribute tabs are similar to the above figure. For the specific parameter description, see the following tables: Table 17-5 Description of the SDH Interface Current Status (Physical Medium Layer) query parameters
Name Interface Description Medium Type Line Coding Line Type Transfer Model Description Description of the selected interface. Sonet, SDH sonetMediumOther, sonetMediumB3ZS, sonetMediumCMI, sonetMediumNRZ, sonetMediumRZ singleMode1300of15km, multiMode1300of200mOr2km, singleMode1300of2km, singleMode1300ofOver40km, singleMode1550, coaxOrUTP, other Sonet or SDH
17-8
User Manual HUAWEI iManager Quidview Router Network Management System Name J0 loopback Clock Source Time Elapsed Valid Intervals Invalid Intervals Description
The value is a number within 0~255 when the transmission mode is Sonet. The value is a character string within 1~15 when the transmission mode is SDH. NoLoop (no loopback), FacilityLoop (internal loopback), TerminalLoop (remote loopback) Inside, Line 1 ~ 900 s 0 ~ 96 0 ~ 96
Table 17-6 Description of the SDH Interface Current Status (Section Layer) query parameters
Name Interface Description CurrentStatus CurrentESs CurrentSESs CurrentSEFSs CurrentCVs Description Description of the selected interface. NoDefect; LOS; LOF; LOS, LOF. Errored seconds of the current statistic interval (15 minutes). Severely errored seconds of the current statistic interval (15 minutes). Severely errored frame seconds of the current statistic interval (15 minutes). Code violations of the current statistic interval (15 minutes).
Table 17-7 Description of the SDH Interface Current Status (Line Layer) query parameters
Name Interface Description CurrentStatus CurrentESs CurrentSESs CurrentCVs CurrentUASs Description Description of the selected interface. NoDefect; AIS; RDI; AIS, RDI. Errored seconds of the current statistic interval (15 minutes), 0~900. Severely errored seconds of the current statistic interval (15 minutes), 0~900. Code violations of the current statistic interval (15 minutes), 0~232-1. Unavailable seconds of the current statistic interval (15 minutes), 0~900.
Table 17-8 Description of the SDH Interface Current Status (Farend Line Layer) query parameters
Name Interface Description CurrentESs CurrentSESs CurrentCVs CurrentUASs Description Description of the selected interface. Errored seconds of the current statistic interval (15 minutes), 0~900. Severely errored seconds of the current statistic interval (15 minutes), 0~900. Code violations of the current statistic interval (15 minutes), 0~232-1. Unavailable seconds of the current statistic interval (15 minutes), 0~900.
17-9
Figure 17-8 SDH Interface Interval Status (Section Layer) query window
The relevant history data are listed via the history status query. There are three attribute tabs in the figure: "Section Layer", "Line Layer", and "Farend Line Layer". Other attribute tabs are similar to the above figure. For the specific parameter description, see the following tables: Table 17-9 Description of the SDH Interface Interval Status (Section Layer) query parameters
Name Interval Number ES SESs SEFSs CVs ValidData Description Sequence number of the reported statistic data, with the value range of 1~32. Errored seconds of the interval . Severely errored seconds of the interval . Severely errored frame seconds of the interval. Code violations of the interval. Indicating if the data at this time interval is valid.
Table 17-10 Description of the SDH Interface Interval Status (Line Layer, Farend Line Layer) query parameters
Name Interval Number ES SESs CVs UASs ValidData Description Sequence number of the statistic data, with the value range of 1 ~ 32. Errored seconds of the interval. Severely errored seconds of the interval. Code violations of the interval. Unavailable seconds of the interval. Indicating if the data at this time interval is valid.
17-10
Figure 17-9 SDH Path Current Status (Path Layer) query window
The attribute tab "Farend Path Layer" in this figure is similar to the above one. For the specific parameter description, see the two tables as follows:
17-11
Table 17-11 Description of SDH Path Current Status (Path Layer) query parameters
Name Interface Description CRC C2 S1 Scramble J1 CurrentWidth CurrentStatus CurrentESs CurrentSESs CurrentCVs CurrentUASs Description Description of the selected interface. crc16 (16-bit check), crc32 (32-bit check) Setting the multiplex structure of the VC frame and the nature of the information payload, with the value range of 0~255. unknown, prc, tnc, lnc, sets, dnu Scramble (enable scrambling), UnScramble (disable scrambling) A string of les than 16 characters sts1, sts3cSTM1, sts12cSTM4, sts24c, sts48cSTM16 NoDefect, LOP, PAIS, PRDI, PUNEQ, PSLM Errored seconds of the current statistic interval (15 minutes), 0~900. Severely errored seconds of the current statistic interval (15 minutes), 0~900. Code violations of the current statistic interval (15 minutes), 0~232-1. Unavailable seconds of the current statistic interval (15 minutes), 0~900.
Table 17-12 Description of the SDH Path Current Status (Farend Path Layer) query parameters
Name Interface Description CurrentESs CurrentSESs CurrentCVs CurrentUASs Description Description of the selected interface. Errored seconds of the current statistic interval (15 minutes), 0~900. Severely errored seconds of the current statistic interval (15 minutes), 0~900. Code violations of the current statistic interval (15 minutes), 0~232-1. Unavailable seconds of the current statistic interval (15 minutes), 0~900.
17-12
Figure 17-10 SDH Path Interval Status (Path Layer) query window
The relevant history data are listed via the history status query. The attribute tab "Farend Path Layer" in this figure is similar to the above one. For the specific parameter description, see the contents in Table 17-10.
17-13
After selecting a RPR interface in the panel, double click the related node in the function tree to configure the related functions of the RPR interface. 2) Device menu
Select the RPR interface in the panel, and then right click to pop up an interface-level right-click menu, as shown in Figure 18-2. To configure the related functions of the RPR interface, select the menu items of <RPR Interface Management>.
18-1
The functions of these two operations are completely the same. This chapter takes the function tree operations as an example.
Caution: Only after a RPR interface is selected from the panel, can you implemented the relevant operations of RPR interface management.
18-2
Caution: When the NE80 router only has two physical interfaces, no matter which interface the customer selects, the current logical interface will not change. This is because they belong to the same logical interface. As shown in Figure 18-3, no matter whether Rpr7/0/0 or Rpr8/0/0 is selected, the function interface later opened always shows the logical interface description is Rpr7/0/0.
18-3
The interface management window contains three tabs: MAC Parameter, Interface Status, and Interface Parameter.
Interface Description: Displays the interface description of the currently selected logical interface. Interface Side: Used to select a side. Side Parameters: Displays the MAC layer parameters of side A or B.
! !
I. Side selection
To query the MAC layer parameters of side A or B, you can check the radio button in the "Interface Side" area. To query the MAC layer parameters of side A, check "Side A". To query the MAC layer parameters of side B, check "Side B".
18-4
" Note: When configuring the operation request parameters, if the operation request is ManualSwitch, you can cancel it by configuring NoManualSwitch. Similarly, to cancel the ForcedSwitch request, configure the NoForceSwitch operation request.
18-5
To modify the value of the interface administration status, click <Config> in Figure 18-5. The parameters are described in Table 18-2: Table 18-2 Description of the interface state parameters
Name Description
Interface Description Read-only, the interface description of the logical interface Interface Administration status Readable and writable, the current administration state of the interface, value range: up, down Interface Operation status Readable and writable, the current running state of the interface, value range: up, down
18-6
The parameters are described in Table 18-3: Table 18-3 Description of interface parameters
Name Interface Description IP Address Priority Threshold Nodes On Ring IPS status Time Elapsed Valid Intervals Description Description of a logical interface The IP address of an interface The priority threshold; used to determine what type of a queue (two types, i.e. high priority, and low priority) the packets will be placed in according to the packet type. E.g. if the priority is 5, then 0~5 indicates the low priority while 6~7 indicates the high priority. Number of nodes on the RPR The IPS state of a node, value range: idle, passthrough, wrapped Time from the last statistics report in seconds. Number of intervals during which the statistical data is reported effectively; each interval is 15 minutes.
information display area on the right, the Counter Configuration window will pop up, as shown in Figure 18-7:
The Counter Configuration window includes three tabs: Source Counter Configuration, Destination Counter Configuration, and Source Reject Counter Configuration.
18-8
Source MAC address The MAC address of the source address counter Time Stamp-D,H:M:S.00th The time interval from the last counting Source Packet Count Number of packets counted by the source address counter The counter clear flag, value range: true, false. The value of this flag bit is True at the Clear Count Flag moment when the counter is restarted and becomes False immediately after counting.
The "Add Source Counter" window includes two list boxes. The "Available Node" list on the left lists the nodes that can be added. You can select one line or more according to actual needs and then click ">>" to add the selected nodes to the "Selected Node" list, as shown in Figure 18-9:
18-9
Also, you can select one line or more from the "Selected Node" list on the right, and then click "<<" to remove the nodes from the "Selected Node" list. Click <Ok> to add the nodes from the "Selected Node" list to the source counter.
" Note: The same node cannot be added to the source address counter repeatedly. That is, the nodes added to the source address counter will be filtered out in the "Available Node" list.
18-10
18-11
The operations of add/delete/reset the destination counter and the operation of taking statistics are completely the same as those of the source address counter. Please refer to the contents of section 18.3.1 .
18-12
Figure 18-12 The window for configuring the source reject counter
The operations of add/delete the source reject counter are completely the same as those of the source counter. Please refer to the contents of section 17.4.2.
" Note: One node cannot be added to different counters simultaneously. That is, the nodes already added to the source address counter will be filtered out of the Available Node list of the destination address counter or refusing source address counter.
18-13
The topology management window includes two tabs: Static Ring Selection, and Topology Info.
18-14
Figure 18-14 The window for adding the static ring selection
The "Add Static Ring Selection" window includes two list boxes. The "Available Node" list on the left lists the nodes that can be added. You can select one or more lines according to needs and then click ">>" to add the selected nodes to the "Selected Node" list, as shown in Figure 18-15:
18-15
Figure 18-15 The window for adding the static ring selection
Select one or more lines in "Selected Node" on the right, and then click "<<" to remove the nodes from the "Selected Node" list. After selecting "Ring Identifier" from the "Selected Node" list, click <Ok> to finish the operation of adding the static ring selection.
" Note: The parameters of a configured RPR static ring cannot be modified. If it is necessary to do so, you must first delete it and then add it anew.
18-16
The parameters are described in Table 18-6: Table 18-6 Description of the topology information parameters
Name Node Hops Number Node MAC Address Node IP Address Node Name Node Wrap Status Description The hop count between the ring node and the current node The MAC address of the ring node The IP address of the ring node The name of the ring node The Wrap status of the ring node
18-17
Figure 18-17 The window for querying the SDH interface current status
In this window, you can select "Side A" or "Side B" from the "Side" area to switch between the display of the SDH interface information of different physical interfaces.
18-18
Figure 18-18 The window for querying the SDH path current status
In this window, you can select "Side A" or "Side B" from the "Side" area to switch between the display of the SDH path information of different physical interfaces.
18-19
In this window, click <Select Items>. Then, the "Select Monitor Item" window will pop up, as shown in Figure 18-20:
18-20
Group of monitored items: divided into two groups, side A and side B. Monitor item: available statistical items, which are the same for side A and side B. Description of each statistical item can be found in Table 18-7:
Select the group of monitored items. Then, according to actual needs, select one or more statistical items from the "Monitor Item" list. After that, click <Ok> to finish the selection of statistical items. For detailed use of the window for the ring monitoring, see "Performance Monitoring".
18-21
Here, the operations of selecting statistical items are totally the same as those for the statistics of topology ring counting. For details, see section 17.8.The description of each statistical item is shown in Table 18-8: Table 18-8 Description of the statistical items of host monitoring
Name HostCurrentUcastLowPriPktsIn/s HostCurrentUcastLowPriOctetsIn/s HostCurrentMcastLowPriPktsIn/s HostCurrentMcastLowPriOctetsIn/s HostCurrentUcastHighPriPktsIn/s HostCurrentUcastHighPriOctetsIn/s HostCurrentMcastHighPriPktsIn/s HostCurrentMcastHighPriOctetsIn/s HostCurrentUcastLowPriPktsOut/s HostCurrentUcastLowPriOctetsOut/s HostCurrentMcastLowPriPktsOut/s HostCurrentMcastLowPriOctetsOut/s Description The number of low priority unicast packets received by the host within unit time The number of low priority unicast bytes received by the host within unit time The number of low priority multicast packets received by the host within unit time The number of low priority multicast bytes received by the host within unit time The number of high priority unicast packets received by the host within unit time The number of high priority unicast bytes received by the host within unit time The number of high priority multicast packets received by the host within unit time The number of high priority multicast bytes received by the host within unit time The number of low priority unicast packets transmitted by the host within unit time The number of low priority unicast bytes transmitted by the host within unit time The number of low priority multicast packets transmitted by the host within unit time The number of low priority multicast bytes transmitted by the host within unit time
18-22
User Manual HUAWEI iManager Quidview Router Network Management System Name HostCurrentUcastHighPriPktsOut/s HostCurrentUcastHighPriOctetsOut/s HostCurrentMcastHighPriPktsOut/s HostCurrentMcastHighPriOctetsOut/s
The number of high priority unicast packets transmitted by the host within unit time The number of high priority unicast bytes transmitted by the host within unit time The number of high priority multicast packets transmitted by the host within unit time The number of high priority multicast bytes transmitted by the host within unit time
For detailed use of the window for the host monitoring, see "Performance Monitoring".
Here, the operations of selecting statistical items are totally the same as those for the statistics of topology ring counting. For details, see section 17.8. The description of each statistical item is shown in Table 18-9:
18-23
For detailed use of the window for the error monitoring, see "Performance Monitoring".
18-24
The Topology Ring Display window is divided into two parts: 2) Functional buttons
These buttons are located on the left of the window. From the top downward they are:
! ! ! ! ! ! !
<Pan>: used to drag the topology ring; <Select>: used to select a node inside the ring and drag the node freely; <Zoom in rect>: used to magnify part of the topology ring; <Zoom in>: used to magnify the topology ring; <Zoom out>: used to reduce the topology ring; <Fit to view>: used to adjust the size of the topology ring to fit the current view; <Layout>: used to arrange the view again. Topology ring display area
3)
This area is on the right of the window, used to display the RPR topology ring where the current node lies. The viewable information includes:
! !
IP address of the node: displayed below the node icon. Node name: once the cursor is placed in the node area, the prompt information of the node name will be displayed. Wrap or not: for the node where Wrap occurs, the topological view will disconnect the connection among nodes. As shown in Figure 18-24, Wrap occurs on node 201.1.1.1 and node 201.1.1.2:
" Note: The topology ring view polls and refreshes the topology view display based on the time interval set by the parameter of "Browse polling interval".
18-25
Select any other node except this node in the topology ring. Then right click and select the [Open Device] menu, to open this node device.
18-26
The function menu of CPOS interface management is shown in the following figure:
Select a CPOS interface from the panel and double click on different nodes on the function tree to configure the related functions of the CPOS interface. 2) Device menu
Select a CPOS interface from the panel and right click on it to access the short-cut menu of interface level, as shown in Figure 19-2. Select the sub-items of [CPOS Port Management] to perform the related configuration on the CPOS interface.
19-1
The two operations function the same, and this chapter takes the function tree operation as an example.
Caution: Only when you select a CPOS interface from the panel, can you perform the related operations of CPOS interface management. Multilink management addresses CPOS interface boards.
19-2
This interface includes two tabbed pages, "Port Status Configuration" and "Port Parameter Configuration". The "Port Parameter Configuration" page is shown in Figure 19-5:
Parameters in the interface are described in Table 19-1 and Table 19-2:
19-3
Modify the parameters on your demand and then click <Config> to finish the configuration operation.
19-4
The configuration parameters of a higher-order path are described in Table 19-3: Table 19-3 Configuration parameters of a CPOS higher-order path
Name Higher-Order Path Description J1 C2 S1S0 Description Description of the path, real-only It is a string including 1 to 15 characters, which is used to check the connectivity between the receiving and sending ends over the path. It ranges from 0 to 255, which sets the property of VC frame multiplexing structure and information payload. Load pointer byte, ranging from 0 to 3
19-5
19-6
Parameters of higher-order path current view are described in Table 19-4 and Table 19-5: Table 19-4 Parameters of higher-order path current view
Name Interface Description C2 J1 Current Width Current Status Current ESs Current SESs Current CVs Current UASs Description Description of the path, read-only Sets the property of VC frame multiplexing structure and information payload Checks the connectivity between the receiving and sending ends over the path Includes sts1, sts3cSTM1, sts12cSTM4, sts24c and sts48cSTM16 Includes NoDefect, LOS, LOF, LOS and LOF. The number of errored seconds in current statistical interval (15 minutes) The number of severely errored seconds in current statistical interval (15 minutes) Times of code violation in current statistical interval (15 minutes) The number of invalid seconds in current statistical interval (15 minutes), ranging from 0 to 900
19-7
19-8
Parameters of higher-order path history view are described in Table 19-6: Table 19-6 Parameters of higher-order path/farend higher-order path history view
Name Interval Number ESs SESs CVs UASs Valid Data Description Serial number for statistics report, ranging from 1 to 32 The number of errored seconds in the interval The number of severely errored seconds in the interval Times of code violation in the interval The number of invalid seconds in the interval Specifies whether the data collected in the interval is valid
19-9
Here you need to type the path number in the range of 1 to 63 (for an E1 path) or 1 to 84 (for a T1 path). Click <OK> to add a lower-order path. If succeed, the system will refresh the lower-order path management interface, where you can browse the new lower-order path. Various parameters of the lower-order path use the default values, as described in the following table: Table 19-7 Default parameters of a lower-order path
Content Lower-Order Path Number Lower-Order Path Description Admin Status Oper Status MTU(byte) Description The number of the lower-order path Description of the lower-order path By default, the administration status is up. This parameter can be modified. By default, the operation status is down. This parameter cannot be modified. MTU of the lower-order path. It is defaulted to 1500 and is configurable.
You can configure the MTU and administration status of the lower-order path with the "Config" function (see the subsequent sections of this chapter). If the adding fails or in the case of SNMP operation timeout, you will be prompted accordingly.
19-10
If the deletion fails or in the case of SNMP operation timeout, you will be prompted accordingly.
19-11
19-12
Various configuration parameters are described in Table 19-8, Table 19-9 and Table 19-10: Table 19-8 Status configuration parameters of a lower-order path
Name Lower-Order Path Description Admin Status Oper Status Description Description of the lower-order path, read-only Administration status of the lower-order path, including up and down, read-write Operation status of the lower-order path, including up and down, read-only
19-13
The corresponding relations between the authentication protocols and parameters are as follows: 2) 3) 4) For pap authentication, PPP Negotiate Timeout, Pap User Name, Pap Password Encrypt and Pap Password are effective. For chap authentication, PPP Negotiate Timeout and Chap Host are effective. For Chappap authentication, all the parameters are effective, and the authentication proceeds chap authentication to pap authentication. Modify the parameters on your demand and click <Config> to finish the configuration operation.
19-14
Click <Select Items> to open the "Select Monitor Item" window, as shown in Figure 19-18:
19-15
Various items are described in the following table: Table 19-11 Traffic monitor items
Monitor item ifHCInOctets/s ifHCInUcastPkts/s ifHCInMulticastPkts/s ifHCInBroadcastPkts/s ifInErrors/s ifInDiscards/s ifHCOutOctets/s ifHCOutUcastPkts/s ifHCOutMulticastPkts/s ifHCOutBroadcastPkts/s ifOutErrors/s ifOutDiscards/s Description The number of octets received on the port The number of unicast packets received on the port The number of multicast packets received on the port The number of broadcast packets received on the port The number of error packets received on the port The number of discarded input packets sent on the port The number of octets sent on the port The number of unicast packets sent on the port The number of multicast packets sent on the port The number of broadcast packets sent on the port The number of error packets sent on the port The number of discarded output packets sent on the port
19-16
Parameters of lower-order path current view are described in Table 19-12 and Table 19-13: Table 19-12 Parameters of CPOS lower-order path current view
Name Interface Description Current Width Current Status Current ESs Current SESs Current CVs Current UASs Description Description of the path, read-only Includes sts1, sts3cSTM1, sts12cSTM4, sts24c and sts48cSTM16 Includes NoDefect, LOS, LOF, LOS and LOF The number of errored seconds in current statistical interval (15 minutes) The number of severely errored seconds in current statistical interval (15 minutes) Times of code violation in current statistical interval (15 minutes) The number of invalid seconds in current statistical interval (15 minutes), ranging from 0 to 900
19-17
19-18
Parameters of lower-order path history view are described in Table 19-14: Table 19-14 Parameters of lower-order path/farend lower-order path history view
Name Interval Number ESs SESs CVs UASs Valid Data Description Serial number for statistics report, ranging from 1 to 32 The number of errored seconds in the interval The number of severely errored seconds in the interval Times of code violation in the interval The number of invalid seconds in the interval Specifies whether the data collected in the interval is valid
19-19
Here you need to type a multilink number in the range of 1 to 168. Click <OK> to add a multilink. If succeed, the system will refresh the multilink management interface, where you can view the new multilink. The parameters of the multilink use default values, as described in the following table:
19-20
You can configure such parameter as administration status of the multilink with the "Config" function (see the subsequent sections for more detail). If the adding fails or in the case of SNMP operation timeout, you will be prompted accordingly.
19-21
Parameters in the interface are described in the following table: Table 19-16 Parameters of multilink status configuration
Content Multilink Description Admin Status Oper Status Description Description of the multilink, not configurable Administration status includes up and down Operation status is not configurable
Click <Config> to configure the administration status of the multilink. If succeed, you can refresh the interface and view the result. If the configuration fails or in the case of SNMP operation timeout, you will be prompted accordingly.
19-22
Parameters of multilink parameter configuration are described in the following table: Table 19-17 Parameters of multilink parameter configuration
Content Multilink Description Mrru Description Description of the multilink, not configurable MRRU (Max-Receive-Reconstructed Unit) is the necessary parameter for MP negotiation. The peer end reconstructs the received fragments to packets. This parameter is used to set the maximum size (ranging from 4 to 470) of the reconstructed packets so as to facilitate the fragmentation of IP packets. The timeout of an MP fragment ranges from 10ms to 100ms and is defaulted to 100ms. Enables/Disables short-sequence MP packet header negotiation Enables/Disables terminal authentication key MP packets can be divided into fragments of 128 bytes, 256 bytes or 512 bytes, or not be fragmented.
Click <Config> to configure the parameters of the multilink. If succeed, you can refresh the interface and view the result. If the configuration fails or in the case of SNMP operation timeout, you will be prompted accordingly.
19-23
This interface includes two lists, "Available Path" and "Select Path". The former lists the currently available lower-order paths, and the latter lists the lower-order paths to be included in the multilink. Select one or more lower-order paths from the "Available Path" list and click >> to add them to the "Select Path" list. Likewise, you can select one or more lower-order paths from the "Select Path" list and click << to remove them. A multilink can be bound with 12 paths, while a path can only belong to a single multilink at any time. To add a path to a new multilink, you must remove it from the former multilink first. The physical status of a multilink is UP when the physical status any of its paths is UP, and physical status of a multilink is DOWN when that of all the paths is DOWN.
19-24
When a path joints a multilink, some of its interface attributes and configurations (such as IP, MPLS, peer and ISIS) that are related to network layer configuration are disabled and will be recovered when the path is removed from the multilink interface. Click <Config> to configure the lower-order paths of the multilink. If succeed, you can refresh the interface and view the result. If the configuration fails or in the case of SNMP operation timeout, you will be prompted accordingly.
" Note: You cannot bind paths of different service boards to a multilink. A service board does not provide E1 and T1 at the same time, but can be channelized to E1 or T1 according to the factory defaults (not changeable).
19-25
This interface includes four tabbed pages, "Section Layer", "Line Layer", "Farend Line Layer" and "E4GC Information", with the contents similar to those shown in above figure. The parameters of each tabbed page are described in the following tables: Table 19-18 Current status (Section Layer) parameters of an SDH interface
Name Interface Description Current Status Current ESs Current SESs Current SEFSs Current CVs Description Description of the interface Includes NoDefect, LOS, LOF, LOS and LOF The number of errored seconds in current statistical interval (15 minutes) The number of severely errored seconds in current statistical interval (15 minutes) The number of serious error frame seconds in current statistical interval (15 minutes) Times of code violation in current statistical interval (15 minutes)
User Manual HUAWEI iManager Quidview Router Network Management System Name Current UASs Description
The number of invalid seconds in current statistical interval (15 minutes), ranging from 0 to 900
Table 19-20 Current status (Farend Line Layer) parameters of an SDH interface
Name Interface Description Current ESs Current SESs Current CVs Current UASs Description Description of the interface The number of errored seconds in current statistical interval (15 minutes), ranging from 0 to 900 The number of severely errored seconds in current statistical interval (15 minutes), ranging from 0 to 900 Times of code violation in current statistical interval (15 minutes), ranging from 0 to 232-1 The number of invalid seconds in current statistical interval (15 minutes), ranging from 0 to 900
Caution: If the selected interface is not an optical module, the following information will appear in the message window: "The selected port doesnt support this function". If the optical module is not in service, you will be prompted "E4GC module isn't online".
19-27
This interface lists the related history data in three tabbed pages, that is, "Section Layer", "Line Layer" and "Farend Line Layer". The contents of various pages are similar to those shown in above figure and the specific parameters included in each page are described in the following tables: Table 19-22 History status (Section Layer) parameters of an SDH interface
Name Interval Number ESs SESs SEFSs CVs Valid Data Description Serial number for statistics report, ranging from 1 to 32 The number of errored seconds in the interval The number of severely errored seconds in the interval The number of serious frame errored seconds in the interval Times of code violation in the interval Specifies whether the data collected in the interval is valid
Table 19-23 History status (Line Layer and Farend Line Layer) parameters of an SDH interface
Name Interval Number ESs SESs CVs UASs Valid Data Description Serial number for statistics report, ranging from 1 to 32 The number of errored seconds in the interval The number of severely errored seconds in the interval Times of code violation in the interval The number of invalid seconds in the interval Specifies whether the data collected in the interval is valid
19-28
The function menu of ATM interface management is shown in the following figure:
20-1
Select an ATM interface from the device panel and double click on different nodes on the function tree, and you can configure various functions of the ATM interface. 2) Device menu
Select an ATM interface from the device panel and right click on it to access the short-cut menu of interface level, as shown in Figure 20-2. Select various sub-items of [ATM Interface Management], and you can configure the related ATM interface functions.
The two operations function the same, and this chapter takes the function tree operation as an example.
Caution: Before performing any interface-related operation (such as configuration, query and statistics), you must select an interface first.
20-2
This interface includes two tabbed pages, Interface Maintenance and SDH Parameter Configuration.
20-3
20-4
" Note: To configure "MAX VPI Bit" successfully, make sure that none of the interfaces is configured with PVC and all the configured interfaces are down.
20-5
Various parameters are described in Table 20-2: Table 20-2 Parameters of SDH parameter configuration
Name Interface Description Medium Type Transfer Model J0 Description Description of the interface, read-only Type of medium, including Sonet and SDH, read-write Type of the remote device, including Sonet and SDH, read-write It is used by the receiving end to check the connectivity with the sending end. It is a number ranging from 0 to 255 when the transfer model is set to "Sonet", and is a string including 1 to 15 characters when the transfer model is set to "SDH". Read-write For loopback test, NoLoop (no loopback), FacilityLoop (internal loopback) and TerminalLoop (remote loopback), read-write Synchronous timing parameter, including master (internal clock) and slave (line recovery clock), read-write Sets whether to enable scramble, including Scramble (enable) and UnScramble (disable), read-write Sets the property of VC frame multiplexing structure and payload information, ranging from 0 to 255, read-write It is a string including 1 to 15 characters and is used to check the connectivity between the receiving and sending ends on the path layer. Read-write
20-6
The "Port Selection" list on the left lists the currently selected main interface and its subinterfaces, and the right page shows the related PVC information. Select different interfaces from the "Port Selection" list, and the tabbed pages on the right are refreshed automatically. The PVC management window includes such two tabbed pages as PVC Configuration and OAM Test Configuration.
Administration Status Operation Status AAL Type AAL5 Encaps Type Service Category PCR(kbps) SCR(kbps) MBS
20-7
User Manual HUAWEI iManager Quidview Router Network Management System Name TransSDU Size RedvSDU Size Integer, read-only Integer, read-only Description
I. Adding a PVC
In Figure 20-7, click <Add> to open the "Add PVC" window, as shown in Figure 20-8. Here type the required PVC parameters and click <OK> to add a PVC.
20-8
" Note: You cannot delete an enabled PVC, so make sure that the administration status of the PVC to be deleted is down.
20-9
" Note: You cannot configure the parameters of an enabled PVC, so make sure that the administration status of the PVC is down before configuration.
20-10
There three PVC performance statistics items, InArp Statistics Item, OAM Statistics Item and AAL5 Statistics Item. Various items are described in Table 20-4, Table 20-5 and Table 20-6: Table 20-4 InArp statistics item
Name Received InArp requests/s Sent InArp requests/s Received InArp replies/s Sent InArp replies/s Received Invalid InArp requests/s Sent Invalid InArp requests/s Description The number of request packets received in a time unit The number of request packets sent in a time unit The number of response packets received in a time unit The number of response packets sent in a time unit The number of invalid requests received in a time unit The number of invalid requests sent in a time unit
20-11
For the detailed operation of the window, refer to Chapter 8 "Performance Monitoring".
Various parameters are described in Table 20-7: Table 20-7 Configuration parameters of OAM test
Name Link VPI Link VCI Description VPI of current PVC, ranging from 0 to 255, read-only VCI of current PVC. The value of this parameter depends on the VCI bits configured on the interface. For example, if the VCI is 5bit long, this value ranges from 0 to 31. In addition, this item should not be set to 3 or 4, and VPI and VCI cannot be 0 at a time. Read-only Includes enable and disable, read-write Includes up and down, read-only Ranges from 1 second to 600 seconds, read-write
20-12
20-13
The NE16E/08E/05 router is engaged in controlling the access rights of the Portal users. When a Portal user dials on the NAS, the NAS may communicate with the NE16E/08E/05 router in two modes. In the first mode, the NAS is A8010 that sends a Portal user login message to the NE16E/08E/05 router. Upon receiving the message, the latter reassembles it and sends the packet to the iTELLIN. In the other mode, the NAS is not A8010 but a third-party access server, and the NE16E/08E/05 router will
21-1
check whether the login user is a Portal user. If it is, the router will send a Portal user login message to the iTELLIN. Otherwise, the router will forward the packet according to common procedure. When receiving the HTTP packets of a Portal user, if not being informed by the iTELLIN that the user can access any other site, the NE16E/08E/05 router will redistribute the packets to the Portal Server. When the iTELLIN allows the user to access the other sites, it informs the NE16E/08E/05 router. After receiving the message, the NE16E/08E/05 router will no longer redistribute the packets of the user. A user may log out initiatively or be forced to logout. After logout, the NE16E/08E/05 router will clear the related data items of the Portal user.
Enable Portal Portal ID Configuration Address Pool Configuration NAS Configuration iTELLIN Server Key Configuration Browse Portal user information Browse Portal status information
21-2
Only when an interface is set to "portal server" status, could it process the Portal-related packets from the Portal Server and iTELLIN. Likewise, only when an interface is set to "portal user" status, could it process the Portal-related packets from the NAS. Therefore, before launching the Portal service, you must set the related interface to a proper status for communication. The status of a Portal port is described in Table 21-1: Table 21-1 Portal interface status
Status disable portal only enable portal server only enable portal user enable both portal server and portal user Description Disables the Portal function on the interface Enables the interface to conduct Portal service communicate with the iTELLIN and the Portal Server Enables the interface to conduct Portal service communicate with the NAS Enables the interface to conduct Portal service communicate with the NAS, iTELLIN and Portal Server simultaneously
21-3
Portal ID configuration includes creation, deletion and configuration. The interface is shown in Figure 21-3:
This interface displays all the configured Portal IDs and their attributes.
I. Creating a Portal ID
Click <New> to open the "Create Portal ID" dialog box, as shown in Figure 21-4:
21-4
Set various attributes and click <OK> to validate your configuration. If the settings are correct, the Portal ID will be set to "active" status automatically. Otherwise, the configuration will fail. The meaning of various attributes is described in Table 21-2: Table 21-2 Portal ID attributes
Attribute Portal ID Portal ID Description Server IP Address iTELLIN IP Address ITELLIN Timeout ITELLIN Retry Times Hold Time DestIPMaxcymometer ITELLIN Aging Time hwNBPortalEnableRe direct Max Idle Time Nas Secret Key Description The unique identifier of a Portal configuration, once configured, not editable A custom description of the Portal ID. If not specified, the system default value will be used. The IP address of the Portal server The IP address of the iTELLIN server iTELLIN packet response timeout in second The times of retries on the iTELLIN when the communication with it fails Hole time in second Update frequency of the destination IP User update timeout on the iTELLIN. If a user is not updated for the specified time, it will log out automatically. Specifies whether to force a user to enter the Portal status after successful authentication, yes by default The maximum idle time is not 0 and is effective for all the users logging in from a non-A8010 access server. If there is not packet received from a user for the specified time, the user will log out automatically. The key used to communicate with the NAS 21-5
21-6
Set various attributes and click <OK> to validate your configuration. The meaning of various attributes is described in Table 21-3: Table 21-3 Address pool attributes
Attribute Portal ID Pool Number First Address Last Address Description Select a Portal ID from the existent ones Identifier of the address pool Start address of the address pool End address of the address pool
21-7
Various parameters are described in Table 21-4: Table 21-4 NAS configuration parameters
Parameter Nas TimeOut Nas Retry Times Nas Aging Time Description User update message timeout in second on the NAS. If there is no update message received from a user for the specified time, the user will log out automatically. Times of retries on the NAS when the communication with it fails NAS communication timeout
21-8
This interface lists all the iTELLIN server addresses specified when configuring the Portal ID. Select a line and click <Config> to enter the configuration interface, as shown in Figure 21-9:
Various parameters are described in Table 21-5: Table 21-5 iTELLIN server configuration parameters
Parameter Server IP Key The IP address of the iTELLIN server The key of the iTELLIN server Description
21-9
Various parameters are described in Table 21-6: Table 21-6 User information
Attribute Portal ID Registing User Number UnRegisting User Number Holding User Number Redirect User Number URL Filter User Number Common User Number Description The unique identifier of a Portal configuration The number of registering users The number of users that are logging out The number of users in holding status The number of users to be redirected The number of users whose packets are to be filtered The number of users that can normally access the network and do not require redirection and packets filtering
21-10
Various parameters are described in Table 21-7: Table 21-7 Portal status information
Attribute User IP User Status User Nas IP User Portal ID User Type User Online Time A valid IP address Current status of a user NAS address of a user Portal ID used by a user 1) Narrowband user that is registered by the NAS 2) Narrowband user that is automatically identified Online duration of a user Description
21-11
Double click the relevant node in the function tree to configure related functions of Voice service. 2) Device menu
Right click the device panel and a device menu will pop up as shown in the figure below. Select relevant menus to configure the functions related to Voice service.
22-1
The functions of these two operations are completely the same. This chapter takes the function tree operations as an example for illustration.
The meaning of each parameter in the figure is shown in the table below:
22-2
JitterBuffer Sending Voice Data Optional: normal, fast. Flow Mode Receiving Voice Data Optional: normal, fast. Flow Mode
Select or modify the parameter in the figure, and click <Config> to finish configuration.
22-3
"Analog Port" attribute tab in the figure is divided into the upper and lower parts. The upper part shows the list of analog voice ports on the device, which specifies several voice point parameters such as "Port No", "Type", "Description" and "Status". The lower part is "Current Calling Information", which lists the ongoing call information about the selected port. Select a line of data in the port list. Click <Config>, and the "Voice Port Details" window will pop up. It is allowed to configure parameters related to voice ports in this window. Depending on different port types, the configuration interface differs. Analog voice port is of three types: FXS, FXO and E&M. Specific configuration parameters will be described below one by one.
Figure 22-5 FXS Port Details (Analog Port Attribute) configuration window
There are two attribute tabs in the window: Analog Port Attribute and Common Information. Common Information attribute tab is illustrated in the figure below:
22-4
The meaning of each parameter in the figure is given in the table below: Table 22-2 Description of FXS port parameters
Name Port Number Port Type Port Description Port Status Initial Timeout Interdigit Timeout Description As the sequence number of this port in the interface board, it is read-only. It refers to port type: fxs, fxo or E&M. This parameter is read-only. Descriptive character string for this port. Two states are available: up, down; read-only. Used to set timeout time for port initialization, which ranges from 0 to 120s, 10s by default. Used to set key timeout, which ranges from 0 to 120s, 10s by default.
22-5
User Manual HUAWEI iManager Quidview Router Network Management System Name Enable Noise Input Gain Output Gain Common Information Enable Echo Cancelled Echo Cancel Depth Echo Cancel Delay Private Line Number Nation
Whether to insert comfortable noise mode to disable auditory stimulation caused to users. Used to set the size of gain at the receiving end of voice interface, ranging from -14 to 14 dbs and 0 db by default. Used to set the size of gain at the transmitting end of voice interface, ranging from -14 to 14 dbs and 0 db by default. Used to set whether to enable echo cancellation; enabled by default. Used to set echo cancellation depth of a voice port, Options: 16ms, 24ms, 32ms. The default value is 16ms. This parameter is valid only when echo cancellation is enabled, Used to set echo cancellation delay of a voice port, ranging from 0 to 64ms, and 32ms by default. Used to specify private line number. Used to specify the nation.
Modify the parameters to be configured, and then click the <OK> button to complete the port parameter configuration.
22-6
As the attribute tabs "Analog Port Attribute" and "Common" in the figure are common to analogy voice port and their parameters are also identical, no more detail will be given here. The meanings of FXO port parameters are described in the table below: Table 22-3 Description of FXO port parameters
Name Description
Used to set busy tone type at FXO port. Options: europe, custom, north-america; Europe by Area default. This item is configurable for the first FXO port of a voice card, and is read-only for the others. DTMF Digit Used to set DTMF digit duration output from the voice port, it ranges from 50 to 500ms and is Duration 120ms by default. DTMF inter-digit Used to set the DTMF inter-digit duration output from the voice port, it ranges from 50 to 500ms Duration and is 120ms by default.
Modify the parameters to be configured, and then click the <OK> button to complete the port parameter configuration.
22-7
When you switch to the attribute tab "Interface Timing Parameter", the configuration window is shown in the following figure:
22-8
The meanings of parameters in the figure are given in the table below: Table 22-4 Description of E&M port parameters
Name E&M Signaling Type Signal Operation Analog Port E&M Attribute Type Ringing no answer Timeout Timeout Wait Cancelled Number Timeout Timeout Description Used to set the signaling type of E&M voice port, it has the following options: delay-dial (designate delay start mode in digital E&M signaling, immediate (designate immediate start mode in digital E&M signaling), wink-start (designate wink start mode in digital E&M signaling). The default value is "immediate". Used to set the type of line used by analog E&M signal, it has the following options: twoWires (one pair of receiving and sending wires), fourWires (two pairs of receiving and sending wires). The default value is fourWires. Used to specify the type of trunk used in analog E&M signals, it has the following options: typeI, typeII, typeIII, typeV. The default value is typeV. Used to decide whether to time out in case of ringing no answer from E&M voice port. Used to specify timeout for ringing no answer from analog E&M voice port, it ranges from 5 to 600s, and is 60s by default. Used to decide whether to time out when analog E&M voice port is waiting for called number. Used to specify the timeout value for analog E&M voice port waiting called number, its value ranges from 3 to 600s and is 5s by default.
22-9
User Manual HUAWEI iManager Quidview Router Network Management System Name DTMF Digit Duration DTMF Inter-digit Duration Time of Cleaning Call Waiting Time Before Sending Wink Signal Max Time To Wait For Wink Signal Max Wink Duration Timing of Generatio n of Delay Start Signal Max Delay Signal Duration Delay Before Sending Out Called Digit
Used to set DTMF digit duration output from the voice port, it ranges from 50 to 500ms and is 120ms by default. Used to set DTMF inter-digit duration output from the voice port, it ranges from 50 to 500ms and is 120ms by default. Used to set time interval of clearing call, it ranges from 200 to 2000ms; 200ms by default. Used to set the waiting time before the called sends wind signal, it ranges from 100 to 5000ms; 500ms by default. This parameter is valid only when "E&M start type" is set as "wink-start". Used to set the timeout value for the caller to wait for wink signal, it ranges from 100 to 5000ms; 2000ms by default. This parameter is valid only when "E&M start type" is set as "wink-start". Used to set the wink delay, this parameter ranges from 100 to 3000ms; 500ms by default. This parameter is valid only when "E&M start type" is set as "wink-start". Used to set timing of generation of delay start signal, this parameter ranges from 20 to 2000ms; 300ms by default. This parameter is valid only when "E&M start type" is set as "delay-dial". Used to set the maximum delay signal duration, it ranges from 100 to 5000ms; 300ms by default. This parameter is valid only when "E&M start type" is set as "delay-dial".
Used to set the delay before sending out the called number, it ranges from 50 to 5000ms; 300ms by default. This parameter is valid only when "E&M start type" is set as "immediate".
Modify the parameters to be configured, and then click the <OK> button to complete the port parameter configuration.
22-10
The "Digital Port" attribute tab in the figure consists of the upper part and lower part. The upper part shows the list of digital voice ports, which specifies the values of several voice port parameters including "Port No", "Group No", "Board Type", "Signaling Type", "Port Description" and "Port Status". The lower part is "Current TimeSlot Calling Information", which lists the time slot status of current port. Select a line of data in the port list. Click <Config >, and the "Voice Port Details" window will pop up. You may configure the parameters related to the voice port in this window. Depending on different port types, the configuration windows differ from each other. The digit port is of three signaling types in all: R2, E&M and DSS1, as described below.
22-11
Figure 22-11 R2 Digital Port Details (Digital Port Attribute) configuration window
As the parameters under the "Common" attribute tab in the figure are identical to those in the voice port, no more detail will be given here. The meanings of Digital Port Attribute parameters are given in the table below: Table 22-5 Description of Digital Port Attribute parameters
Name Port Number Group Number Port Type Signal Type Port Description Port Status Description As the sequence number of this port in the interface board, it is read-only. As ds0 or pri group number, it ranges from 0 to 30, and is read-only. The port is of two types: e1vi and t1vi. This parameter is read-only. There are three types of port signaling: r2, dss1 and E&M. This parameter is read-only. Descriptive character string for this port. Two states are available: up, down; this parameter is read-only .
When you switch to the "R2 Signal Information" attribute tab, the configuration window is shown in the following figure:
22-12
The meanings of R2 signaling information parameters are shown in the following table: Table 22-6 Description of R2 digit port parameters
Name Number of Bits Needed Description
Used to specify the number of bits required for calling number, this parameter ranges from 1 to 10; 1 by default. Used to set the line signaling effect time, this parameter ranges from 10 to 40ms; 40ms by Line Signal Effect Time default. KA Signal Encode Used to set KA signal code, this parameter ranges from 1 to 15; 1 by default. KD Signal Encode Used to set KD signal code, this parameter ranges from 1 to 15; 3 by default. Waiting Time of Used to set waiting time of sending holding confirmation signal, this parameter ranges Sending Holding from 200 to 3000ms; 1000ms by default. Confirm Signal Used to set R2 relay routing mode, this parameter has several options: max, maxpoll, min R2 Relay Route Mode and minpoll; min by default. Timeout of Waiting Used to set the timeout of waiting to receive KB signal, this parameter ranges from 1000 Receive KB Signal to 50000ms; 5000ms by default. Timeout of Waiting Used to set the timeout of waiting to receive KD signal, this parameter ranges from 1000 Receive KD Signal to 50000ms; 5000ms by default. Timeout of Waiting Used to set the timeout of waiting for next called number, this parameter ranges from Next Calling Number 1000 to 50000ms; 5000ms by default. Timeout of Waiting Used to set the timeout value of waiting to release monitoring, this parameter ranges from Releasing Monitor 200 to 3000ms; 1000ms by default. Waiting Time of End of Used to set the time of waiting for the end of ringing, this parameter ranges from 1000 to Ringing 240000ms; 30000ms by default.
22-13
User Manual HUAWEI iManager Quidview Router Network Management System Name Interval of Waiting Sending Response Signal Line Signal Reverse Mode Value of C,D Signal
Description Used to set the interval of waiting to send response, this parameter ranges from 50 to 1000ms; 500ms by default. Used to set whether to reverse signal, each bit can be any of the two possible values: 0 (disable) and 1 (enable); 0000 by default (i.e. all four bits are set to "disable"). Used to set the signal bit, which needs to be sent but is not sent yet; 1111 by default.
Modify the parameters to be configured, and then click the <OK> button to complete the port parameter configuration.
Figure 22-13 E&M Digital Port Details (E&M Attribute) configuration window
The parameters under the attribute tab "Interface Timing Parameter" are identical to relevant attributes of E&M port. For details, see Table 22-4. The meanings of E&M attribute parameters are given in the table below:
22-14
Wait Cancelled Number Used to set whether to time out while waiting for called number. Timeout Used to set the timeout value of waiting for the called number, this parameter ranges Timeout from 3 to 600s; 5s by default. ABCD Bit Value of Used to set ABCD bit value of receiving idle signaling, each bit of this parameter can be Receiving Idle Signaling two possible values: 0 (disable) and 1 (enable); 1101 by default. ABCD Bit Value of Used to set ABCD bit value of receiving busy signaling, each bit of this parameter can be Receiving Busy two possible values: 0 (disable) and 1 (enable); 0101 by default. Signaling ABCD Bit Value of Used to set ABCD bit value of sending idle signaling, each bit of this parameter can be Sending Idle Signaling two possible values: 0 (disable) and 1 (enable); 1101 by default. ABCD Bit Value of Used to set ABCD bit value of sending busy signaling, each bit of this parameter can be Sending Busy Signaling two possible values: 0 (disable) and 1 (enable); 0101 by default.
Modify the parameters to be configured, and then click the <OK> button to complete the port parameter configuration.
22-15
This window contains two attribute tabs: "POTS Voice Entity" and "VOIP Voice Entity", which will be described in detail one by one as follows.
22-16
The figure lists basic information required for POTS voice entity to be added. The meanings of the parameters in the figure are shown in the table below: Table 22-8 Description of POTS Voice Entity (Common) parameters
Name Voice Entity ID Telephone Number Prefix Voice Port Cancel Truncate Description As the unique expression of the set entity, its value range is 1~231-1. This parameter indicates the telephone number of local entity. Used to set dialing prefix, which can either be any digit of the numbers 0~9 or ",". Voice port on the device. Used to set whether to disable truncating the called number.
When you switch to the attribute tabs "Advanced" and "IP FAX", the configuration window is illustrated in the following two figures. For parameter meanings, please refer to Table 22-9 and 0.
22-17
22-18
Shutdown Used to set whether to disable this entity. Voice Activity Detect Used to set whether to enable mute compression. IP Precedence Used to set IP packet parameters, this parameter ranges from 0 to 7; 0 by default. Used to specify DTMF transmission mode, this parameter can be either "voice" or DTMF Relay "h245Alphanumeric"; voice by default. Used to specify the encode/decode mode, the value of this parameter can be any of the Encode/Decode following: G.711 A Law 64000 bps,G.711 U Law 64000 bps,G.723.1 5300bps,G.723.1 Type 6300bps,G.729 8000bps,G.729 A and Default; Default by default.
22-19
User Manual HUAWEI iManager Quidview Router Network Management System Name Fax Level Description
Used to set the transmitting energy level of gateway carrier wave, its value ranges from 3 to 60db; 15db by default. Fax Relay(ECM) Used to set whether to use ECM in fax. Send Nsf Used to set whether to enable nonstandard capacity. Used to set supported fax protocols, the value of this parameter can be any of the followings: Fax Protocol Nonstandard-compatible,T38, and its default value is T38. High Speed Used to specify the number of T38 high speed redundancy packets, its value ranges from 0 to 2; Redundancy 0 by default. Low Speed Used to set the number of T38 low speed redundancy packets, its value ranges from 2 to 5; 0 by Redundancy default. Used to set the mode of interworking with other devices, the value of this parameter can either Support Mode be rtp or vt; rtp by default.
Fill in or choose relevant parameter values in the three attribute tabs, and click the <OK> button to complete POTS voice entity operation.
22-20
22-21
The figure lists the basic information required for the VOIP voice entity to be added. The parameter meanings are given in the following table: Table 22-11 Description of VOIP Voice Entity (Common) parameters
Name Description
Voice Entity ID As the unique expression of the set entity, its value range is 1~231-1. Telephone Number Used to indicate remote telephone numbers. Used to technology prefix, the value of this parameter can either be any of the numbers 0 to Technology Prefix 9 or "#". Used to set routing type, the value of this parameter can be any of the following: IPV4,RAS Session Target and Unknown; Unknown by default. Fast Connect Used to set whether to enable fast connection. Tunnel Used to set whether to enable tunnel, which is valid only when fast connection is enabled.
The two attribute tabs "Advanced" and "IP FAX" are totally the same as POTS voice entity. For relevant parameter meanings, please refer to Table 22-9 and 0. Fill in or choose relevant parameter values in the three attribute tabs, and click the <OK> button to add POTS voice entity.
22-22
22-23
AAA information configured here is all related to voice function. Modify the parameter to be configured, and click <Config> to complete AAA attribute configuration.
The above configuration window lists the information about configured local users. The three buttons at the bottom of this window <Add>, <Delete> and <Modify Password...> are used for relevant configurations.
I. Adding a user
Click <Add> and enter the username and password to be added in the popup "Add a Local User" window. Click the <OK> button in the window to add the user.
22-24
The above configuration window lists the information about configured access numbers. The three buttons <Add>, <Delete> and <Modify Password...> at the bottom of this window are used for relevant configurations.
22-25
The meanings of parameters in the window are given in the table below: Table 22-13 Description of Access Number parameters
Name Access Number Description
Used to set access number for AAA client, this parameter can be any character from 0 to 9. Dial-two Authentication Used to set whether to enable dial-two voice authentication. Used to set whether to enable dial-two voice authorization. When dial-two voice Dial-two Authorization authentication is not enabled, this option cannot be started either. Used to choose dial-two process, the value of this parameter can be either Card Number Dial-two Process or Caller Number; Card Number by default. Used to set the number of card digits, this parameter ranges from 1 to 31; 12 by default. Card Digit This option is valid only when "Card Number" is selected. Used to set the number of password digits, the value range of this parameter is 1~16; 6 by Password Digit default. This option is valid only when "Card Number" is selected. Used to specify redialing times, the value of this parameter ranges from 1 to 10; 3 by Redial Times default. This option is valid only when "Card Number" is selected.
Fill in or select relevant parameter values, and then click <OK> to add the access number.
22-26
22-27
The meanings of parameters in the figure are given in the table below: Table 22-14 Description of GK Client parameters
Name GK Client Status Description
Used to set whether to enable GK, the value of this parameter can either be Enable or Disable; Disable by default. Interface Used to set a gateway interface used to connect GK. IP Address Used to display the interface IP address Gateway ID Used to set gateway ID. Gateway Technology Used to set technology prefix of the gateway, the value of this parameter can be a Prefix character within the range of 0~9, #,; with this technology prefix, GK identifies gateway types. A gateway can be configured with 30 prefixes, separated by ";". The prefix may contain a maximum of 31 characters. Gatekeeper ID Used to set GKs ID. Gatekeeper IP Address Used to set IP address of GK. TCP Port Used to set GKs port number.
22-28
Modify the parameters to be configured, and then click the <Config> button to complete GK Client configuration.
Choose a line of data from the figure. Click the <Detail> button, and the "Active Calling Details" window will pop up, as shown in the following figure:
22-29
When you switch to the attribute tab "Call History Information", the window is shown in the following figure:
22-30
Choose a line of data from the figure. Click the <Detail> button, the "Call History Details" window will pop up, as shown in the following figure:
22-31
The "Call History Details" window contains three attribute tabs: "Common Information", "VOIP Information" and "PSTN Information". When you switch to the last two attribute tabs, a window will appear, as shown in the following figure:
22-32
22-33
The buttons on the left side are <Select Items>, <Bar>, <Plot>, <Exporting Data>, <Importing Data>, <Properties> respectively from top down.
22-34
As shown in the above figure, choose a message group from the "Group" drop box, and then choose the item to be monitored from the list of monitor items. Click <OK> and return to the "H.323 Call Statistics" window to see data curves, which vary with time, and the corresponding legend lists. The monitor items available for choice are shown in the following table:
22-35
H225 Statistics
22-36
Monitor item group Sent TCSRequests Sent TCSAcks Sent TCSRejects Sent MSDRequests Sent MSDAcks Sent MSDRejects Sent OLCRequests Sent OLCAcks Sent OLCRejects Sent CLCRequests Sent CLCAcks Sent UserInputs Sent ErrorH245Msgs Received TCSRequests Received TCSAcks Received TCSRejects Received MSDRequests Received MSDAcks Received MSDRejects Received OLCRequests Received OLCAcks Received OLCRejects Received CLCRequests Received CLCAcks Received UserInputs Received UnknownH245Msgs Sent GRQs Sent RRQs Sent ARQs Sent BRQs Sent DRQs Sent URQs Sent UCFs Sent IRRs Sent ErrorRASMsgs Received GCFS Received RCFS Received ACFS Received BCFS Received DCFS Received GRJS Received RRJS Received ARJS Received BRJS Received DRJS Received URJS Received UCFs Received URJs Received IRQs Received UnknownRASMsgs
Monitor item
H245 Statistics
RAS Statistics
22-37
22-38
23-1
The meaning of each parameter is described in Table 23-1: Table 23-1 POS access comm. information
Content Enable POS Enable POS Trap Open Access POS Debug Switch Open App Debug Switch FCM Answer Time FCM Trade Time FCM Packet Interval Description Enable POS access server. Used to send SNMP alarms related to POS access to the NM system when the equipment is running. By default, no such a alarm is sent. Open Debug switch for all POS access ports. By default, Debug switch is disabled. Open Debug switch for all POS applications. By default, Debug switch is disabled. As answer time of dialing via FCM port, its value ranges from 500 to 2000ms; 500ms by default. As timeout value of a single POS transaction, it ranges from 30000 to 1200000ms; 60000ms by default. As timeout value of POS response packet, its value ranges from 3500 to 10000ms; 5000ms by default.
Users may modify part of the parameters according to needs, and then click <Config> to make configurations. If the user clicks <Refresh>, the system will read POS access common information from the device again and update information displayed in the window. The <Reset Statistics> button is used to reset statistical information counters for the current devices POS access port and POS applications, so as to count corresponding packets again starting from zero. After such click, conformation information will pop up. Upon confirmation, statistical information will be reset.
23-2
The parameters are described in Table 23-2: Table 23-2 Description of parameters for browsing POS access port information
Name ID Description A unique ID must be allocated to each POS access port. While adding a POS access port, the user may specify its ID, which ranges from 0 to 127.
Access Port Name of this POS access port. Connect Status The physical status of this POS access port. There are four types in all: noset, down, up and ok. Debug Switch The debug information switch of POS access port. 23-3
In the "POS Access Management" window, click the <Refresh> button, and the system will read POS access port data and refresh the display information.
Enter POS access port number in this window. The "Access Port" drop box lists all device interfaces, which can be configured as POS access ports. Users may select an appropriate port according to needs. Finally, choose Debug switch status and click <OK> to add a new POS port. If your click <Cancel>, the system will do nothing but return to the "POS Access Port" window.
23-4
Caution: 1) POS access port number ranges from 0 to 127. The number you enter cannot be an existing POS access port number. It is allowed to add a maximum of 128 such access ports. 2) The port selected in the list of POS access ports must work in asynchronous mode and does not stay in other application modes, such as POS application port and terminal access port. Otherwise, a message will appear indicating the configuration has failed.
A user is only allowed to modify the Debug switch status of the current POS access port in the "Config POS Access Port" window. After modification, click <OK> to finish configuration. If your click <Cancel>, the system will do nothing but return to the "POS Access Management" window.
23-5
Figure 23-5 Window for monitoring statistical information of POS access port
The monitoring items are described in Table 23-3: Table 23-3 Description of POS access port items to be monitored
Name Received Packets Received Error Packets POS Map Error Packets Buffed Packets Discarded Packets Description The total number of packets received from this access port. The switching packet data that cannot be identified as complete, such as check sum error or incomplete packet. The number of packets whose correspondence cannot be found. The number of packets in the buffer to be allocated to this POS access port. The number of packets that cannot be sent out and thus are discarded after the application packets the router receives are distributed to this POS access port for such reasons as link disconnection, full buffer or failure to set the interface.
23-6
The "Port Available" list in the left part shows the ports available for the current device, while the "Port Selected" list in the right part shows the POS application ports available on the current device. Choose a port from "Port Selected" list, and click the ">>" button to move this port to the "Port Selected" list, i.e. add a POS application port. Likewise, click "<<" and you may move a port in the "Port Selected" list to the "Port Available" list, that is, delete a POS application port. After that, click the <Config> button to make configurations. If you fail to configure a port, a message will appear indicating the configuration has failed. If you click the <Refresh> button, the system will read information on POS application port again from the device, and update the information in the window.
23-7
Caution: 1) It is allowed to configure 128 POS application ports at most. 2) The interface to be configured as a POS application port must work in asynchronous mode and does not stay in any other application mode, such as POS application port and terminal access port. Otherwise, a message will appear indicating the configuration has failed.
23-8
The parameters are described in Table 23-4: Table 23-4 Description of parameter for browsing POS application
Name Application ID Description A unique ID should be allocated to each POS application. While adding a POS application, the user can specify such ID, which ranges from 0 to 31.
POS access router is connected to UNIX front end processor in two ways: streaming mode and TCP mode. Mode Streaming mode requires no IP address or port number but asynchronous port configuration; TCP application requires IP address and port number but no asynchronous port configuration. Application connection is in the following 7 states: noset: TCP application not configured; down: asynchronous application "down"; up: asynchronous application "up"; Status ok: synchronous application "ok", indicating "up" state of successful authentication; kept: TCP application not connected. linking: connecting TCP application. linked: connected TCP application. App Port Physical port of POS application in streaming mode IP Address Application IP address in TCP mode TCP Port Application port number in TCP mode, ranging from 1 to 65535 Source IP address of TCP application: when several terminals use a single TCP connection via terminal access server to communicate with host application, it is sometimes necessary to hide the real IP address for uplink TCP connection of the terminal access server for the sake of security or Source IP other considerations, and set another IP address as required; at the same time, in order for link Address backup, the terminal access server enables the function of TCP source address binding. TCP source address binding works in this way: first configure an IP address at a router interface not in use, and use that IP address as the IP for uplink TCP connection of the terminal server. Debug Switch Debug information switch of current POS application.
23-9
If you click <Refresh> in "POS Access Management" window, the system will read POS application data from the device and refresh its display information.
Enter POS application ID in this window and select an application mode. If you select TCP/IP Mode, you need to enter application IP address and TCP port ID; if you select "Flow Mode", you need to choose a port from the "App Port" drop box, which lists the interfaces that are configured as POS application ports. A user may select an appropriate port according to his needs; source address of TCP application is only configured in case of TCP application mode but it can also be null. During configuration, click the button on the right of TCP application source address edit box, and the window "Set Source IP Address for Application" will pop up. The list in this window shows the current IP addresses configured with the device. Choose one of them and click <OK>; finally, choose Debug switch status and click <OK> to add a new POS application. If you click the <Cancel> button, the system will do nothing but return to the "POS Access Management" window.
23-10
Caution: 1) POS application ID ranges from 0 to 31. It is not allowed to enter any number beyond the above range in the edit box and the number you enter cannot be the same as an existing POS application ID. A maximum of 32 POS applications can be added. 2) When you select TCP mode, you need to enter the application IP address and TCP port ID; when you choose streaming mode, you need to select an application port; otherwise, it is impossible to add an application. 3) When you select TCP mode, the combination of IP address and TCP port ID cannot be identical to an existing POS application. Otherwise, a message will appear indicating a failure. 4) Binding TCP connection source IP is configured only when the state of this application is without TCP connection. Otherwise, the system will give a message indicating the configuration has failed.
23-11
The monitoring items are described in Table 23-5: Table 23-5 Description of POS monitor items
Name Received Packets Received Error Packets Received Packets can not be sent to port Buffed Packets Discarded Packets Description Total number of packets this application receives. The switching packet data that cannot be identified as complete, such as check sum error or incomplete packet. The number of packets whose access port correspondence cannot be found with distribution processing errors. The number of packets that are sent to the front end processor via this application, but cannot be sent out and thus are discarded for such reasons as link disconnection, full buffer or failure to set this application. The number of packets that exist in this applications sending cache.
corresponds to an item in the mapping table, the packet will be sent to the corresponding application; if such matched item is not found, the packet will be sent to the default application. This function is used to browse, add, delete or configure POS multi-application mapping information on a medium or low end router.
The parameters are described in Table 23-6: Table 23-6 Description of parameters used to browse POS multi-application mapping
Name Destination Code Description Packets sent from a POS all contain a package destination address. These packets are sent to different POS applications via destination code. While adding POS multi-application map, a user may specify such code, which ranges from 0 to 65535.
23-13
If you click <Refresh> in the "POS Access Management" window, the system will read POS multi-application mapping data from the device again and refresh its display information.
Edit in this window. If you select "Default", you need not enter the destination code. Otherwise, you need to enter a number and then the POS application ID, and click <OK> to add a new POS Map. If you click <Cancel>, the system will do nothing but return the window "POS Access Management".
Caution: 1) In case the current device has no default application, the Add window will display "Default" check box. Otherwise, such box will not appear. 2) It is allowed to add 32 POS multi-application maps at most. 3) The application ID can either be an existent one or not created.
23-14
23-15
The table is designed for the user to browse the times of disconnection due to timeout and the times of failed handshake negotiation that occur to all FCM ports of the current device. Click the <Reset> button to reset the statistical information counter for FCM ports of the current device, and restart counting over again.
23-16
encryption/decryption operations using NDECs (Network Data Encryption Cards, modularized hardware cards). This eliminates the effect on a router's performance by the VRP principal software's processing on the IPSec and hence improves the working efficiency of the router. The encryption/decryption procedure with the participation of an NDEC is as follows: The router sends the data to be encrypted or decrypted to the NDEC that will then perform encryption/decryption operation on the data and add/remove encrypted frame headers to/from the data. After data encryption/decryption, the NDEC sends the data to the router for forwarding. User data processing by multiple NDECs: Each Quidway modularized router supports several NDECs. In the mode of polling, the host software sends user data to several normal NDECs for processing, thus implementing synchronous processing of user data on several NDECs and accelerating data encryption/decryption. When you apply the IPSec on NDECs, if all the NDECs on a router are abnormal, IPSec processing will abort. In this case, if host backup has been enabled and the IPSec module of the VRP principal software supports the encryption/authentication algorism used by the NDECs, the IPSec module will replace the NDECs for IPSec processing, thus implementing NDEC backup.
24-1
Various parameters are described in Table 24-1: Table 24-1 NDEC management parameters
Content NDEC Connection Backup Description The number of currently activated IPSec connections Specified whether to enable host backup function, including 0 (disable) and 1 (enable)
24-2
Various parameters are described in Table 24-2: Table 24-2 NDEC information parameters
Content Card Slot InPac OutPac InByte OutByte DropPac Status Hardware Version Software Version CPLD Version Discarded Packets In Unit Time Description Slot number of the NDEC The number of received packets The number of sent packets The number of received octets The number of sent octets The number of discarded packets Current status of the NDEC Hardware version of the NDEC Software version of the NDEC CPLD version of the NDEC The number of packets discarded in a time unit
24-3
In Figure 24-2, select a line and click <Reset>. After confirmation, you can reset the NDEC.
24-4
Various parameters are described in Table 24-3: Table 24-3 SA information parameters
Content Peer IP Security Protocol SPI Encyrpt Auth Local IP Life(KByte) Life(Second) ByCard Negotiate SA Mode Exp_bytes Soft_bytes Exp_timeout Soft_timeout Description The IP address of the peer end The security protocol used by the NDEC Security policy identifier The encryption algorism adopted by the NDEC The authentication algorism adopted by the NDEC Local IP address Current life cycle in KByte of the SA Current life cycle in second of the SA Whether to use NDEC Includes manual negotiation (Manual) and IKE negotiation (isakmp) Hard timeout in KByte Soft timeout in KByte Hard timeout in second Soft timeout in second
Various parameters are described in Table 24-4: Table 24-4 NDEC IKE SA information parameters
Content Conn-ID The identifier of the security path 24-5 Description
User Manual HUAWEI iManager Quidview Router Network Management System Content Peer IP Phase
Flag Domain
The peer IP address of the SA The status of the SA: NONE: The SA is being established. READY: The SA has been successfully established. STAYALIVE: The initiator of the SA, which will reinitiate a negotiation in the case of soft timeout (a new negotiation is initiated before the end of the SA's life). REPLACED: The SA has been replaced by a new one, is not in use currently and will be deleted 10 seconds later. FADING: Though soft timeout occurs, the SA is still in use till a new SA is negotiated or hard timeout (the SA live through its whole life till timeout), when it will be deleted. The phase of the SA, including unknown, phase1 and phase2 The explanation domain of SA, including unknown and ipsec
Select a line and click <Delete>. After confirmation, you can delete the information.
24-6
Various parameters are described in Table 24-6: Table 24-6 Security policy information parameters
Content Name Priority NegMode ACL ID Peer IP Transfer Name Lifetime Lifesize Local IP Name Used In AH SPI In ESP SPI Out AH SPI Description The name of the security policy The priority of the security policy The negotiation mode of the security policy ACL ID matching the policy Peer IP address corresponding to the policy Policy transference mode name Life cycle in second of the security connection Life cycle in KByte of the security connection Local IP address The name of the interface applying the policy SPI of the packet stream received by the AH SPI of the packet stream received by the ESP SPI of the packet stream sent by the AH
24-7
User Manual HUAWEI iManager Quidview Router Network Management System Content Out ESP SPI In AH Hex Key String In ESP Hex Key String In ESP AuthenHexKeyString In AH StringKeyString In ESP StringKeyString Out AH HexKeyString Out ESP CipherHexKeyString Out ESP AuthenHexKeyString Out AH StringKeyString Out ESP StringKeyString
SPI of the packet stream sent by the ESP Key of the packet stream received by the hexadecimal AH Key of the packet stream received by the hexadecimal ESP Authentication key of the packet stream received by the hexadecimal ESP Key of the packet stream received by the AH in character string mode Key of the packet stream received by the ESP in character string mode Key of the packet stream sent by the hexadecimal AH Key of the packet stream sent by the hexadecimal ESP Authentication key of the packet stream sent by the hexadecimal ESP Key of the packet stream sent by the AH in character string mode Key of the packet stream sent by the ESP in character string mode
Various parameters are described in Table 24-7: Table 24-7 Transform mode security information parameters
Content Transform Name Transform Mode Transform Protocol AH ESP-Encrypt ESP-Auth IsCardTransform Description Name of transform Includes transport and tunnel Protocol used for authentication/encryption AH protocol (AH authentication algorism) ESP (encryption algorism) ESP (authentication algorism) Whether to use NDEC
24-8
Information in this window falls into two types, general information and debugging information. Various parameters are described in Table 25-1:
25-1
Various parameters are described in Table 25-2: Table 25-2 Terminal access application management parameters
Content App ID Description The application ID of the terminal server. Its value depends on the number of asynchronous serial interfaces on the device. If there are two available interfaces, it ranges from 0 to 7. If there is one available interface, it ranges from 0 to 3. The IP address of the UNIX host where the terminal server application resides TCP port of the UNIX host where the terminal server application resides, ranging from 1025 to 65535 Includes normal and special The name of the terminal server application The source IP address bound to the application Local port
App IP App Port App Type App Name4 Source IP Local Port
25-2
User Manual HUAWEI iManager Quidview Router Network Management System Content Unix ID Server Status Socket Received Buffer Socket Sent Buffer Socket Received Bytes Socket Sent Bytes Last Received Time Last Sent Time Description
The index of the management path information Displays the connection status between the UNIX host and the router, including kept, linked and linking Related statistics of the terminal access application
Various parameters are described in Table 25-2. Click <> following the "Source IP" edit box, and you will open the IP address window, as shown in Figure 25-4:
25-3
Select a line and click <OK> to finish the selection of source IP address. In Figure 25-3, click <OK> to finish the adding operation.
25-4
All the parameters except App ID are configurable. The meaning of various parameters is same as that in the adding window.
25-5
Various parameters are described in Table 25-3: Table 25-3 Physical terminal and virtual terminal management parameters
Content Tty ID Vty ID Interface App ID Status Flow Control Description ID of the physical terminal. Its value depends on the number of interfaces supporting terminal access on the device. For example, if the number of such interfaces is 2, it ranges from 0 to 1. Virtual terminal ID ranging from 0 to 3 The interface supported by the device Application ID that subjects to the configuration of terminal access application management Current status of the physical terminal and its virtual terminal Flow control setting of the physical terminal and its virtual terminal
25-6
Various parameters are described in Table 25-3. Enter various parameters and click <OK> to add a physical terminal and a virtual terminal.
Caution: If the adding fails and you are prompted "Config failed, please confirm the port selected is in async mode instead of pos access port, pos app port or any other ports", please run the "async mode protocol" command on the device in the proper interface mode.
25-7
25-8
Various parameters are described in Table 25-4: Table 25-4 Physical terminal information parameters
Content TTY ID Buffer Size Auto Link Auto Close Link ConnPrint Delay Logo Print MenuKey1/2/3 Read Block RedrawKey1/2/3 ResetKey1/2/3 TCP No Delay RecvBufferSize SendBufferSize TestKey1/2/3 Buffer Rate TtyRecvBytes TtySendBytes TtyLastRecvTime TtyLastSendTime CurrentVty CurrentVtyRecv CurrentVtySend CurrentApp CurrentAppRecv CurrentAppSend Debug tty all Debug tty brief Debug tty socket Debug tty timestamp Debug tty tty Description Physical terminal ID that depends on the number of interfaces supporting terminal access. For example, if the number of such interfaces is 2, it ranges from 0 to 1. Buffer size ranging from 4096 to 204800 Connection auto creation time ranging from 5 seconds to 3600 seconds Connection auto closing time ranging from 5 seconds to 3600 seconds Includes english, chinese and none Ranges from 0 to 1200 seconds Whether to display terminal server Logo Hotkey for menu Reads the blocking mode of physical terminal data, including Set and noSet Hotkey for redrawing screen Hotkey for reset Sets whether to enable TCP delay Size of receiving buffer ranging from 512 to 16384 Size of sending buffer ranging from 512 to 16384 Hotkey for test Utilization rate of the buffer The number of octets received by the physical terminal The number of octets sent by the physical terminal Time when the physical terminal receives data the last time Time when the physical terminal sends data the last time Current virtual terminal ID The number of octets received by current virtual terminal The number of octets sent by current virtual terminal Current application ID The number of octets received by current application The number of octets sent by current application Sets whether to enable debugging Sets whether to enable brief information to be received/sent Sets whether to enable socket information to be received/sent Sets whether to log timestamp access information Sets whether to enable the physical terminal information to be received/sent
25-9
Various parameters are described in Table 25-4. Enter the parameters, click <OK> and confirm to finish the operation.
25-10
25-11
Various parameters are described in Table 25-5: Table 25-5 Management path information parameters
Content Unix Index Unix Socket ID Local IP Managed Apps Description Management path index Socket ID Local IP address The number of applications covered by the management path
25-12
As shown, the router running DLSW converts the LLC2 frames from a local SNA device to SSP frames that can be encapsulated in TCP packets and sends them to a remote device cross WAN over a TCP channel. The remote device converts the SSP frames to LLC2 frames again and sends them to the peer SNA device. In this case, the local terminal device thinks that the remote device resides on the same network. Different from transparent bridge, DLSW does not transparently transmit LLC2 frames to the peer end directly, but converts them to SSP frames so that they can be encapsulated in TCP packets. DLSW uses local response mechanism to reduce unnecessary data traffic (ACK and Keepalive frames) and to solve the problem of data link control timeout. With the DLSW technology, you can also implement SDLC transmission over TCP/IP in the following way: Convert packets of SDLC format to those of LLC2 format and communicate with the peer end via DLSW. In this way, DLSW also supports the interconnection between LAN and SDLC over different mediums.
26-1
Various parameters are described in Table 26-1: Table 26-1 DLSW configuration parameters
Content Status Connection Timeout Local Pend Timeout Remote Pend Timeout Sna Cache Timeout Description Sets the status of the DLSW service to active or inactive Sets connection hole time in the range of 60ms to 60000ms Sets local timeout in the range of 1ms to 60000ms Sets remote timeout in the range of 1ms to 60000ms Sets address storage timeout of the buffer in the range of 1ms to 60000ms
Caution: Before configuring local peer, you must set the status of DLSW to active.
This function configures the related parameters of local peer, and the interface is shown in Figure 26-3:
26-2
Various parameters are described in Table 26-2: Table 26-2 Local peer configuration parameters
Content Local Address Promiscuous Keepalive Interval Virtual Segment LF-Size Init Pacing Window Max Pacing Window Cost Description Sets the IP address of DLSW local peer Sets whether to enable an un-configured remote peer to establish a connection, including permit, forbid and unknown Sets DLSW life cycle in the range of 1ms to 2000ms Sets the maximum frame length of local peer, including 516, 1470, 1500, 2052, 4472, 8144, 11407, 11454, 17800 and 65535 Initial window size in the range of 1 to 2000 Maximum window size in the range of 1 to 2000 Cost value in the range of 1 to 5
26-3
This interface includes the parameters and statistics of the remote peer. Various parameters are described in Table 26-3: Table 26-3 Remote peer configuration parameters
Content Address Pack Window Init IsConfig Cost KeepAlive Virtual Segment LF-Size TcpQueueMax HaveBackup IsBackup PrimaryEntityAddr Peer Linger Link Status Reveived Packets Sent Packets Drops Uptime DLSW Version DLSW OUI OS Version Description Sets the IP address of the DLSW remote peer Initial window size Whether the peer is a static peer Cost value ranging from 1 to 5 Life cycle ranging from 0 to 1200ms Maximum frame length, including 516, 1470, 1500, 2052, 4472, 8144, 11407, 11454 and 17800 Maximum length of a TCP queue, ranging from 50 to 2000 Whether the peer is a primary peer Whether the peer is a backup peer Address of the primary peer Hold time of the backup peer Connection status The number of received packets The number of sent packets Disconnection times Connection hole time DLSW version number and release number The OUI of DLSW Operating system version number
26-4
Various parameters are described in Table 26-3. Select or modify the parameters and click <OK> to finish the operation.
26-5
On the left of the window is a bridge group list and the interfaces included in each bridge group are displayed in the right list.
26-6
Type the bridge group ID (in the range of 1 to 63) and click <OK> to create a bridge group.
26-7
This window lists the selected interfaces of the bridge group and those available for selection. You can click >> or << to move interfaces to or form the bridge group, and then click <OK> to finish the operation.
26-8
Various parameters are described in Table 26-4: Table 26-4 SDLC interface configuration parameters
Content Serial Port Name Encapsulating SDLC Role Virtual MAC Hold Queue Size Sending Window Size Modulus Max Receivable Frame Length Retry Poll Pause Interval Simultaneous Enable Calling Waiting Interval Called Waiting Interval Description The name of the SDLC port Sets to encapsulation protocol of the synchronous interface to the SDLC, including SDLC, PPP and OTHER Includes primary, secondary and norole The MAC address of the SDLC virtual circuit The length of sending queue ranging from 20 to 255 The size of sending window ranging from 1 to 7 Includes m8 and m128 Maximum receivable frame length ranging from 1 to 17680 Retry times in the case of timeout ranging from 1 to 255 Interval at which each secondary site is polled, ranging from 1ms to 10000 ms Sets whether to enable SDLC bi-directional transmission The timeout of the response to the primary site, ranging from 1ms to 60000ms The timeout of the response to the secondary site, ranging from 1 to 60000ms
26-9
This interface includes two tabbed pages, SDLC Port Attribute and SDLC Port Remote Peer. Various parameters in the "SDLC Port Attribute" page are described in Table 26-4.
26-10
This interface provides adding, deletion and modification of SDLC port remote peers.
26-11
Various parameters are described in Table 26-5: Table 26-5 SDLC port remote peer parameters
Content SDLC Address XID Remote Peer MAC Peer Source SAP Peer Destination SAP Description Ranges from 1 to 254 The XID of SDLC, ranging from 0 to 2147483647 The MAC address of the remote peer The source SAP address of the peer end, ranging from 1 to 254 The destination SAP address of the peer end, ranging from 1 to 254
Enter the parameters and click <OK> to create an SDLC port remote peer.
26-12
Select a line and click <Config> to open the "LLC2 Parameter Configuration" window, as shown in Figure 26-14:
26-13
Various parameters are described in Table 26-6: Table 26-6 LLC2 parameters
Content Acknowledge Delay Time Acknowledge Max Frame Local Window Size Modulus Retry Wait Time for Acknowledge Busy Time Wait Time of P/F Reject Status Time Send Queue Size Description Delay of information frame acknowledgement, ranging from 1ms to 60000ms The maximum number of information frames that can be received before an acknowledgement frame is sent, ranging from 1 to 127 The maximum number of information frames that can be sent before an acknowledgement frame is received, ranging from 1 to 127 LLC2 modulus, including m8 and m128 Times of retries, ranging from 1 to 255 Acknowledgement timeout, ranging from 1ms to 60000ms Polling interval for a busy site, ranging from 1ms to 60000ms Duration from the sending of a P frame to the reception of a correct information frame, ranging from 1ms to 60000ms Duration from the sending of a rejection frame to the reception of a correct information frame, ranging from 1ms to 60000ms Length of the LLC2 information frame output queue, ranging from 20 to 200
Select or modify the related parameters, click <OK> and confirm to finish the configuration operation.
26-14
26-15
Various parameters are described in Table 26-7, Table 26-8 and Table 26-9: Table 26-7 DLSW static information parameters
Content DLSW Version DLSW OUI DLSW Product Information Circuit Pacing Type Description Standard DLSW version The OUI of the DLSW Information of the product applying the DLSW Type of circuit pacing
26-16
User Manual HUAWEI iManager Quidview Router Network Management System Content Status Description
Current status of the circuit, including disconnected(1), circuitStart(2), resolvePending(3), circuitPending(4), circuitEstablished(5), connectPending(6), contactPending(7), connected(8), disconnectPending(9), haltPending(10), haltPendingNoack(11), circuitRestart(12) and restartPending(13) Includes unsupported(1), low (2), medium (3), high (4) and highest (5) The number of SSP messages that can be sent by the DLSW over the circuit according to the pacing window size, ranging from 0 to 65535 Current window length of the DLSW as a sender, ranging from 0 to 65535
26-17
27-1
Parameters in the window are described as in Table 27-1: Table 27-1 Description of parameters of DHCP Server Group Management
Name Description
Group ID DHCP server groups unique ID DHCP Server IP Address1 First DHCP server address in the group DHCP Server IP Address2 Second DHCP server address in the group
The information viewable including all DHCP server groups list on the same equipment and the according 2 IP address for each group.
27-2
Input the DHCP server IP addresses in the window for this server group and click <OK> button to finish the configuration.
27-3
Parameters in the window are described as in Table 27-2: Table 27-2 Description of parameters of DHCP Relay
Name VLAN ID Description An integer for unique VLAN identification
DHCP Server Group ID DHCP server groups unique ID DHCP Server IP Address1 First DHCP server address in the group DHCP Server IP Address2 Second DHCP server address in the group
The associating VLAN and DHCP server group on the equipment can be seen including VLAN ID, associating DHCP server group ID and the IP addresses of the servers in the group.
27-4
This window provides example of the input. User can input the VLAN ID list like the example and choose DHCP server group then click <OK> to finish this operation.
27-5
In this window choose the DHCP server group again and click <OK> button to finish.
Parameters in the window are described as in Table 27-3: Table 27-3 Description of parameters of VLAN Address Pool
Name VLAN ID Address Allocation Mode L3 Interface Address Mask Primary DNS Secondary DNS Primary WINS Secondary WINS DHCP server groups unique ID User address allocation mode in current VLAN. When address allocation mode is local, it become VLAN address pool VLAN address pool Layer 3 interface IP address VLAN address pools subnet mask Primary DNS server IP address Secondary DNS server IP address Primary WINS server IP address Secondary WINS server IP address Description
27-6
Information viewable including associating address allocation method of each VLAN on the equipment. When the method is local, it is the VLAN address pool and the Layer 3 interface IP address, subnet mask, primary/secondary DNS/WINS server addresses and reserved address range in the pool can be seen.
In the window, Primary/Secondary DNS/WINS addresses can be configured. After modification, click <OK> to finish the operation.
27-7
Parameters in the window are described as in Table 27-4: Table 27-4 Description of parameters of VLAN Address Pool Statistics
Name Used Addresses Unused Addresses Disabled Addresses Total Addresses Description Number of addresses being used in the pool Number of free addresses in the pool Number of disabled addresses in the pool Number of all addresses in the pool
This window displays pool information including Used Addresses, Unused Addresses, Disabled Addresses and Total Addresses.
27-8
Parameters in the window are described as in Table 27-5: Table 27-5 Description of parameters of Disabled IP Segment Creation
Name VLAN ID Low Address High Address VLAN address pool VLAN ID Start address of the disabled address segment Last address of the disabled address segment Description
Input the disabled segments Low Address and High Address in the window then click <OK> button to finish the operation. Now new disabled segment can be seen in the window shown as in Figure 27-6.
27-9
The length in the window means the length of the segment needs cancellation. The value is between 1 to actual length of the segment. Input length, click <OK> button to finish the cancellation operation.
" Note: The first and the last address value in the disabled segment (the low and high address of Disabled IP Segments) cannot be cancelled.
27-10
Information viewable including Name, Gateway, Mask, Router IP, Primary/Secondary DNS/WINS addresses and disabled address segment in the pool.
27-11
Parameters in the window are described as in Table 27-6: Table 27-6 Description of parameters of Global Address Pool
Name Name Gateway Mask Router IP Primary DNS Secondary DNS Primary WINS Secondary WINS Global address pool unique ID Global address pool Gateway address Global address pool subnet mask, with address pool gateway address, defines ip address range with in the pool Router IP address for this pool Primary DNS Server IP address Secondary DNS Server IP address Primary WINS Server IP address Secondary WINS Server IP address Description
In
the
window,
input
parameters
of
Name,
Gateway,
Mask,
Router
IP,
27-12
Table 27-7 Global Address Pool Configuration In the window the configurable parameters including Router IP, Primary/Secondary DNS/WINS address. After modification, click <OK> button to finish the operation.
27-13
Parameters in the window are described as in Table 27-8: Table 27-8 Description of parameters of Global Address Pool Statistics
Name Used Addresses Unused Addresses Disabled Addresses Total Addresses Description Number of addresses being used in the pool Number of free addresses in the pool Number of disabled addresses in the pool Number of all addresses in the pool
27-14
Parameters in the window are described as in Table 27-9: Table 27-9 Description of parameters of Disabled IP Segment Creation
Name Pool Name Low Address High Address Description Name of the pool to create a disabled segment Start address of the disabled address segment Last address of the disabled address segment
Input the Low Address and the High Address in the window, click <OK> button to finish the operation. Now new disabled segment can be seen in the window shown as in Figure 27-11.
27-15
In the window, the length means the address range length to be cancelled, ranging from 1 to actual segment length. Input length value click <OK> button to finish operation.
" Note: The first and the last address value in the disabled segment (the low and high address of Disabled IP Segments) cannot be cancelled.
27-16
For detail operation procedures of DHCP Traffic Monitoring window, please see Chapter 8 "Performance Monitoring" part.
27-17
Appendix A
Select Server and the <Next> button will become activated. Click <Next> to start installation. In the pop-up window, select the installation directory, and the Discovery Seed window shown in Figure A-2 will pop up.
A-1
Appendix A
Enter the IP address, subnet mask and community name of a device in the Discovery Seed input box. Usually this device is the gateway or the core device (such as the router) in the managed network. SNMPc 5.0 will use this device as the seed node to automatically discover other device quickly. If wrong information is entered, the network discovery function of SNMPc may become abnormal. If the Start with Discovery off option on the lower part is selected, the network discovery will not be implemented after SNMPc is started. After the installation of SNMPc is accomplished, the installation program of Air Messenger Pro paging application will be started automatically. Air Messenger Pro can send via E-mail the alarm information to the SNMPc management user. You can select to install or quit the installation of Air Messenger Pro. Restart the computer after the installation.
A-2
Appendix A
The user name is Administrator by default, and there is no password. Click <OK> to log in to the SNMPc main interface. If SNMPc is running for the first time after Quidview is integrated, you will be asked whether to compile MIBs. Select <Yes> to compile. The SNMPc interface is shown in Figure A-4.
The functions of tools are as follows: Main Button Bar Edit Button Bar Selection Tool Event Log Tool To quickly run the commands. To quickly add a device into Map. To select different SNMPc functional modules. To display the event log information.
A-3
Appendix A
View Window Area To display topology map, MIB table and MIB interface. Select the menu [Config/Discovery Agent....] to pop up the interface shown in Figure A-5.
Figure A-5 Discovery Agents interface 2) 3) 4) In the General page, check the Enable Discover and Enable Status Poll. In the Seed page, enter the IP address of the device (multiple addresses can be entered to facilitate topology map discovery). In the Community page, enter the community name of the device, and then click <OK>.
Note:
If there are too many devices in the network, remove Find Non-SNMP (Ping) Nodes from Protocol page, so that SNMPc 5.0 discovers only the devices supporting SNMP. Or use the Filter function to limit the areas discovered. Specific operations are as follows: In the Address edit box of the Filter page, enter the IP address (the wildcard * can be included) in one of the following formats: 207.* 207.212.33.* 198.*.*.22-88 207.100-211.*
Then, select the [File/Reset] menu to delete the current topology view. Use the setting of Filter to rediscover devices and generate new topology map. After the setting is completed, SNMPc 5.0 will perform device discovery automatically and put the devices topology map in the main interface.
A-4
Appendix A
A-5
Appendix A
Enter the IP address and Label of the device, and then click <OK> to add the new device icon into the topology map. If too many network devices are discovered, you can delete manually the unwanted nodes. Select the device to be deleted and then select the [Edit/Del] to delete.
A-6
Appendix B
Abbreviations
Appendix B Abbreviations
Abbreviation ADM APS ATM DTMF DWDM FCS FXO FXS GK GSR GW LACP LOF LOP LOS PAIS POS POTS PRDI PSLM PUNEQ RAS RPR RSTP SDH SONET SPE TDM VC VLAN VOIP VPC VPI Add Drop Multiplexer Automatic Protection Switching Asynchronous Transfer Mode Dual Tone Multi Frequency Dense Wave Division Multiplexer Frame check sequeces Foreign eXchange Office Foreign eXchange Station GateKeeper Gigabit Switch Router GateWay Link Aggregation Control Protocol Loss of Frame Loss of Pointer Loss of Signal Path Alarm Indication Signal Packet Over SDH Plain Old Telephone Service Path Remote Defect Indication Path Signal Label Mismatch Path Unequipped Registration, Admission, Status Protocol Resilient Packet Ring Rapid Spanning Tree Protocol Synchronous Digital Hierarchy Synchronous Optical Network Synchronous Payload Envelope Time Division Multiplexing Virtual Channel Virtual LAN Voice Over IP Virtual Path Connection Virtual Path Identifier Full name
B-1
Appendix C
FAQ
Appendix C FAQ
I. Why did I fail in connecting the host through [Tools/Telnet] menu operation?
Troubleshooting: Please check whether the telnet function has been enabled on the host. You cannot create a telnet connection from a network management station to the host, unless the telnet service is enabled on the latter.
II. Why did I fail in executing the "Telnet" command by selecting [Tools/Telnet] on a Sun or HP workstation?
Troubleshooting: To run the "Telnet" command on a Sun or HP workstation, you may need to execute the "/usr/dt/bin/detterm" command first. The "detterm" command, however, is not involved in the environment variables by default, so you should set it to the environment variables or run it manually before performing the "Telnet" command.
III. Why did I fail in opening the device under management in Quidview?
Troubleshooting: First, check the connectivity of the network with the "Ping" command. If you can ping the device successfully, but still cannot open it in Quidview, check whether the SNMP community names are correct following the procedure below: 1) Perform the following command to telnet to the device under management:
Telnet 10.110.99.59 2) Execute the following command in system view to check the SNMP community names of the device: [R2631E]display snmp community 3) In the "Protocol parameters" dialog box of Quidview, configure the default read-only and read-write community names of the system to the same as those of the device, and click <OK> button. 4) Click <Open> button on the toolbar once again, enter the IP address of the device under management in the popup dialog box, and click <OK> button. Then you will be able to open the device.
C-1
Appendix C
FAQ
VI. Which versions are supported by Huawei data communication products at present?.
Troubleshooting: SNMPv1, SNMPv2c and SNMPv3.
VII. My router and the network operate normally, and the version, community names (users) and related view information have been properly configured. Why did I fail in connecting the NMS?
Troubleshooting: Check whether you are separated by the firewall following the procedure below: Browse the configuration with the "display current-configuration" command, or check whether the community name (user) in use and its group are configured with an ACL that denies your IP address with the "display snmp-agent community/display snmp-agent group" and "display snmp-agent usm-user" commands.
VIII. Why was a packet with the content as "hello" and destined for the same port as its subsequt trap packet always captured by the capturing tool?
Troubleshooting: Generally, this happens on the traps of "linkdown/linkup" and "coldstart" types. While sending such trap, the port may be down, and will send a "hello" character string to the specified trap port to ensure that the trap packet can reach the NMS. This is normal.
IX. Why was timeout always encountered on certain node when I conduct walk operation on the device via MIBBROSER?
Troubleshooting: Usually, there are several empty tables under the node. In this case, you may adjust the timeout value of the NMS for troubleshooting.
C-2
Appendix C
FAQ
XI. The MIBBrowser could receive alarms from a router with the SNMP VERSION configured as "1" not "V2C" (when the MIBBrowser is configured as "V2C" either). Meanwhile I failed in detecting the alarm packets sent from the router with NETXRAY in the later case. Why?
Troubleshooting: You should use the following command to configure the trap host of SNMPv2c: snmp-agent target-host trap address udp-domain x.x.x.x params securityname string v2c
XII. My router can send not SNMPv2c trap but SNMPv1 trap packets. Why?
Troubleshooting: First, check whether SNMPv2c has been enables. If enabled, check whether the trap host of SNMPv2c has been configured.
C-3