• Library Information
  • Library Overview
  • Version Mapping
  • Usage of the Documentation
  • Using the Documentation According to the Roles of Users
  • Using the Documentation According to the Life Cycle of the Product
  • Documentation Details
  • Product Documentation
  • Online Help
  • Release Documentation
  • Documentation Conventions
  • Standards-Compliant Documentation Development
  • Documentation Obtaining and Feedback
  • Obtaining Documentation
  • Documentation Feedback
  • Technical Support
  • Library Changes
  • Description
  • Product Description
  • About This Document
  • Using the Product Photo Gallery
  • Using the Product Comparison Tool
  • Product Positioning and Features
  • Product Positioning
  • Product Features
  • Applicable Scenarios
  • Product Architecture
  • Physical Architecture
  • Logical Architecture
  • Software Architecture
  • Data Forwarding Process
  • List of Software Features
  • Energy Conservation and Emission Reduction
  • NMS
  • Acronyms and Abbreviations
  • Hardware Description
  • About This Document
  • Using the Hardware Tool
  • Chassis
  • NetEngine 8000 F1A-8H20Q
  • NetEngine 8000 F2A-8K36H
  • Power
  • Power Supply System
  • NetEngine 8000 F1A-8H20Q Power Module
  • PAC1K2S12-DB (1200W AC Power Module(Back to Front, Power panel side exhaust))
  • PAC1K2S12-DF (1200W AC Power Module(Front to Back,Power panel side intake))
  • PAC600S12-CB (600W AC Power Module(Back to Front, Power panel side exhaust))
  • PAC600S12-CF (600W AC Power Module(Front to Back,Power panel side intake))
  • PDC1000S12-CB (1000W DC Power Module(Back to Front,Power panel side exhaust))
  • PDC1000S12-CF (1000W DC Power Module(Front to Back,Power panel side intake))
  • NetEngine 8000 F2A-8K36H Power Module
  • PAC3KS54-DB (AC&240VDC PSU,PAC3KS54-DB,3000W AC 240V DC Power Module (Back to Front,Power panel side exhaust))
  • PAC3KS54-DF (AC&240VDC PSU,PAC3KS54-DF,2500W/3000W AC&240VDC Power Module (Front to Back, Power panel side intake))
  • PDC2K2S54-CB (DC Power Module,PDC2K2S54-CB,2200W DC Power Module(Back to Front , Power panel side exhaust))
  • PDC2K2S54-CF (DC Power Module,PDC2K2S54-CF,2200W DC Power Module(Front to Back, Power panel side intake))
  • Fan
  • System Air Channel
  • NetEngine 8000 F1A-8H20Q Fan Module
  • FAN-031A-B (Fan box(B,FAN panel side exhaust))
  • FAN-031A-F (Fan Box(F,FAN panel side intake ))
  • NetEngine 8000 F2A-8K36H Fan Module
  • FAN-180D-B (Fan box(B,FAN panel side exhaust))
  • FAN-180D-F (Fan box(F,FAN panel side intake ))
  • Optical Module
  • Understanding Pluggable Optical Modules
  • Appearance and structure
  • Types of Optical Modules
  • Instruction
  • Instructions on How to Use an Optical Module
  • Configuring an Optical Attenuator
  • Optical Amplifier Overview
  • Function
  • Appearance and Structure
  • Application Scenario
  • Guide to Using Optical Amplifier
  • NetEngine 8000 F1A-8H20Q Optical Module
  • 155Mbps eSFP Optical Module
  • 155Mbps-eSFP-SMF-1550nm-80km-commercial
  • 155Mbps-eSFP-SMF-1310nm-15km-industry
  • 155Mbps-eSFP-SMF-1310nm-40km-industry
  • 155Mbps-eSFP-SMF-1550nm-80km-industry
  • 155Mbps-eSFP-SMF-1310nm-40km-commercial
  • 155Mbps-eSFP-MMF-1310nm-2km-commercial
  • 155Mbps-eSFP-SMF-1310nm-15km-commercial
  • 155Mbps eSFP BIDI Optical Module
  • 155Mbps-eSFP-SM-1310nm-15km-commercial
  • 155Mbps-eSFP-SM-1550nm-15km-commercial
  • 1Gbps Electrical Module
  • 1Gbps-SFP-100m-industry
  • 1Gbps-SFP-100m-industry
  • 1.25Gbps eSFP Optical Module
  • 1.25Gbps-eSFP-MMF-850nm-500m-extended
  • 1.25Gbps-eSFP-SMF-1310nm-10km-industry
  • 1.25Gbps-eSFP-SMF-1310nm-40km-industry
  • 1.25Gbps-eSFP-MMF-850nm-500m-industry
  • 1.25Gbps-eSFP-SMF-1550nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1310nm-10km-commercial
  • 1.25Gbps-eSFP-SMF-1310nm-40km-commercial
  • 1.25Gbps eSFP BIDI Optical Module
  • 1.25Gbps-eSFP-SMF-1310nm-10km-commercial
  • 1.25Gbps-eSFP-SMF-1490nm-10km-commercial
  • 1.25Gbps-eSFP-SMF-1310nm-40km-commercial
  • 1.25Gbps-eSFP-SMF-1490nm-40km-commercial
  • 1.25Gbps-eSFP-SMF-1570nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1490nm-80km-commercial
  • 0.1~1.25Gbps-eSFP-SMF-1310nm-40km-commercial
  • 0.1~1.25Gbps-eSFP-SMF-1550nm-40km-commercial
  • 1.25Gbps eSFP CWDM Optical Module
  • 1.25Gbps-eSFP-SMF-1571nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1591nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1551nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1511nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1611nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1491nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1531nm-80km-commercial
  • 1.25Gbps-eSFP-SMF-1471nm-80km-commercial
  • 125M~2.67Gbps eSFP DWDM Optical Module
  • 125M~2.67Gbps-eSFP-SMF-1560.61nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1559.79nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1558.98nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1558.17nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1557.36nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1556.55nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1555.75nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1554.94nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1554.13nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1553.33nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1552.52nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1551.72nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1550.92nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1550.12nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1549.32nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1548.51nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1547.72nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1546.92nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1546.12nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1545.32nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1544.53nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1543.73nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1542.94nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1542.14nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1541.35nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1540.56nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1539.77nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1538.98nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1538.19nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1537.40nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1536.61nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1535.82nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1535.04nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1534.25nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1533.47nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1532.68nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1531.90nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1531.12nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1530.33nm-120km-commercial
  • 125M~2.67Gbps-eSFP-SMF-1529.55nm-120km-commercial
  • 10Gbps SFP+ Optical Module
  • 10Gbps-SFP+-SMF-1550nm-80km-commercial
  • 10Gbps-SFP+-SMF-1310nm-10km-industry
  • 10Gbps-SFP+-SMF-1550nm-40km-industry
  • 10Gbps-SFP+-MMF-850nm-0.3km-commercial
  • 10Gbps-SFP+-SMF-1310nm-10km-commercial
  • 10Gbps-SFP+-SMF-1550nm-40km-commercial
  • 1.25/9.953/10.3125Gbps SFP+ Optical Module
  • 1.25/9.953/10.3125Gbps-SFP+-SMF-1310nm-10km-commercial
  • 1.25/9.953/10.3125Gbps-SFP+-SMF-1550nm-40km-commercial
  • 10Gbps SFP+ CWDM Optical Module
  • 10Gbps-SFP+-SMF-1511nm-70km-commercial
  • 10Gbps-SFP+-SMF-1471nm-70km-commercial
  • 10Gbps-SFP+-SMF-1491nm-70km-commercial
  • 10Gbps-SFP+-SMF-1531nm-70km-commercial
  • 10Gbps-SFP+-SMF-1551nm-70km-commercial
  • 10Gbps-SFP+-SMF-1571nm-70km-commercial
  • 10Gbps-SFP+-SMF-1591nm-70km-commercial
  • 10Gbps-SFP+-SMF-1611nm-70km-commercial
  • 10Gbps SFP+ BIDI Optical Module
  • 10Gbps-SFP+-SMF-1270nm-40km-commercial
  • 10Gbps-SFP+-SMF-1330nm-40km-commercial
  • 10Gbps-SFP+-SMF-1270nm-10km-industry
  • 10Gbps-SFP+-SMF-1330nm-10km-industry
  • 25Gbps SFP28 Optical Module
  • 25Gbps-SFP28-MMF-850nm-0.1km-commercial (02312PDK)
  • 25Gbps-SFP28-SMF-1310nm-10km-industry (02312PDL)
  • 25Gbps-SFP28-MMF-850nm-0.1km-commercial
  • 25Gbps-SFP28-SMF-1310nm-10km-industry (34061618)
  • 25Gbps-SFP28-MMF-850nm-0.1km-extended (34061631)
  • 25Gbps SFP28 BIDI Optical Module
  • 25Gbps-SFP28-SMF-1270nm(Tx)/1330nm(Rx)-10km-commercial
  • 25Gbps-SFP28-SMF-1330nm(Tx)/1270nm(Rx)-10km-commercial
  • 40Gbps QSFP+ Optical Module
  • 40Gbps(4*10.3)-QSFP+-SMF-1271~1331nm-10km-commercial
  • 40Gbps(4*10.3)-QSFP+-MMF-850nm-0.1km-commercial
  • 40Gbps(4*10.3)-QSFP+-SMF-1310nm-10km-commercial
  • 50Gbps QSFP28 Optical Module
  • 50Gbps-QSFP28-SMF-1311nm-10km-commercial
  • 50Gbps-QSFP28-SMF-1311nm-40km-commercial
  • 50Gbps-QSFP28-SMF-1295.56~1300.05nm-80km-commercial
  • 50Gbps QSFP28 BIDI Optical Module
  • 50Gbps-QSFP28-SMF-1331nm(Tx)/1271nm(Rx)-10km-commercial
  • 50Gbps-QSFP28-SMF-1271nm(TX)/1331nm(RX)-10km-commercial
  • 50Gbps-QSFP28-SMF-1295nm(Tx)/1309nm(Rx)-40km-commercial
  • 50Gbps-QSFP28-SMF-1309nm(Tx)/1295nm(Rx)-40km-commercial
  • 100Gbps QSFP28 Optical Module
  • 100Gbps(4*25.7)-QSFP28-MMF-850nm-0.1km-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1271~1331nm-2km-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1310nm-30km(NO FEC)-40km(FEC)-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1295.56~1309.14nm-10km-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1295.56~1309.14nm-80km-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1295.56~1309.14nm-40km-commercial
  • NetEngine 8000 F2A-8K36H Optical Module
  • 40Gbps QSFP+ Optical Module
  • 40Gbps(4*10.3)-QSFP+-SMF-1271~1331nm-10km-commercial
  • 40Gbps(4*10.3)-QSFP+-MMF-850nm-0.1km-commercial
  • 40Gbps(4*10.3)-QSFP+-SMF-1310nm-10km-commercial
  • 50Gbps QSFP28 Optical Module
  • 50Gbps-QSFP28-SMF-1311nm-10km-commercial
  • 50Gbps-QSFP28-SMF-1311nm-40km-commercial
  • 50Gbps-QSFP28-SMF-1295.56~1300.05nm-80km-commercial
  • 50Gbps QSFP28 BIDI Optical Module
  • 50Gbps-QSFP28-SMF-1331nm(Tx)/1271nm(Rx)-10km-commercial
  • 50Gbps-QSFP28-SMF-1271nm(TX)/1331nm(RX)-10km-commercial
  • 50Gbps-QSFP28-SMF-1295nm(Tx)/1309nm(Rx)-40km-commercial
  • 50Gbps-QSFP28-SMF-1309nm(Tx)/1295nm(Rx)-40km-commercial
  • 100Gbps QSFP28 Optical Module
  • 100Gbps(4*25.7)-QSFP28-MMF-850nm-0.1km-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1271~1331nm-2km-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1310nm-30km(NO FEC)-40km(FEC)-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1295.56~1309.14nm-10km-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1295.56~1309.14nm-80km-commercial
  • 100Gbps(4*25.7)-QSFP28-SMF-1295.56~1309.14nm-40km-commercial
  • 400Gbps QSFP-DD Optical Module
  • 400Gbps(8*56Gb/s PAM4)-QSFP-DD-SMF-1310nm-10km-commercial
  • 400Gbps(8*56Gb/s PAM4)-QSFP-DD-SMF-1310nm-40km-commercial
  • 400Gbps-QSFP-DD-SMF-1547nm-80km-commercial
  • 400Gbps-QSFP-DD-SMF-1528.773~1567.133nm-commercial
  • 400Gbps(4*100Gb/s PAM4)-QSFP-DD-SMF-1310nm-2km-commercial
  • Optical Amplifier Module
  • Optical Amplifier-QSFP28-SMF-1535nm~1547nm
  • Cables
  • NetEngine 8000 F1A-8H20Q Power Cable
  • DC Power Cable
  • AC Power Cable
  • NetEngine 8000 F2A-8K36H Power Cable
  • DC Power Cable
  • AC Power Cable
  • Chassis Ground Cable
  • Standard Serial Cable
  • Clock Cable (External Clock Mode, Delivery-Ready)
  • Clock Cable (External Clock/External Time Mode, Prepared Onsite)
  • Clock Transfer Cable
  • Ethernet Cable
  • Fiber Jumper
  • Fiber Breakout
  • Breakout Fibers
  • Breakout Boxes
  • Product Overview
  • 10-Port-MPO-12-40-Port-LC-Breakout Box(single-mode)
  • Feature Description
  • Using the Packet Format Query Tool
  • VRPv8 Overview
  • About This Document
  • VRP8 Overview
  • Introduction
  • Introduction of VRP8
  • Development of the VRP
  • Architecture
  • VRP8 Componentization
  • VRP8 High Extensibility
  • VRP8 Carrier-Class Management and Maintenance
  • Advantages of the VRP8 Architecture
  • Basic Configurations
  • About This Document
  • TTY Description
  • Overview of TTY
  • Understanding TTY
  • TTY
  • Telnet Description
  • Overview of Telnet
  • Understanding Telnet
  • Telnet
  • Application Scenarios for Telnet
  • Telnet
  • Command Line Interface Description
  • Overview of CLI
  • Understanding Command Line Interfaces
  • CLI Fundamentals
  • Application Scenarios for Command Line Interfaces
  • VFM Description
  • Overview of VFM
  • FTP
  • Overview of FTP
  • FTP Features Supported by VPNs
  • Understanding FTP
  • FTP
  • Data Types
  • Access Control
  • Data Structure
  • Transmission Modes
  • Command Types
  • Application Scenarios for FTP
  • TFTP
  • Overview of TFTP
  • Understanding TFTP
  • TFTP
  • Application Scenarios for TFTP
  • Downloading Files
  • Uploading Files
  • Configuration Management Description
  • Overview of Configuration Management
  • Understanding Configuration Management
  • Two-Phase Validation Mode
  • Configuration Rollback
  • Configuration Trial Run
  • One-click Configuration Import
  • Configuration Replacement
  • ZTP Description
  • Overview of ZTP
  • Understanding ZTP
  • ZTP Fundamentals
  • Preconfiguration Script
  • Intermediate File in the INI Format
  • Intermediate Files in the Python Format
  • Intermediate File in the CFG Format
  • Version File Integrity Check
  • Conditions That Cause ZTP to Exit or Fail
  • Application Scenarios for ZTP
  • Automatic Deployment Through ZTP for an Unconfigured Device
  • Terminology for ZTP
  • SZTP
  • Overview of SZTP
  • Understanding SZTP
  • Networking Environment
  • Startup Process
  • Working Process
  • Key Data
  • Pre-Configuration Script
  • Conditions that Cause SZTP to Exit or Fail
  • Application Scenarios for SZTP
  • Terminology for SZTP
  • System Management
  • About This Document
  • VS Description
  • Overview of VS
  • Understanding VS
  • VS Fundamentals
  • VS Support Statement
  • Application Scenarios for VS
  • Simplification of Network Deployment
  • Service Differentiation and Isolation
  • Multi-Service VPN
  • New Service Verification
  • Information Management Description
  • Overview of Information Management
  • Understanding Information Management
  • Information Classification
  • Information Level
  • Information Format
  • Information Output
  • Application Scenarios for Information Management
  • Monitoring Network Operations Using Collected Information
  • Locating Network Faults Using Collected Information
  • Information Audit
  • Fault Management Description
  • Overview of Fault Management
  • Understanding Fault Management
  • Alarm Masking
  • Alarm Suppression
  • Performance Management Description
  • Overview of Performance Management
  • Understanding Performance Management
  • Application Scenarios for Performance Management
  • Upgrade Maintenance Description
  • Overview of Upgrade Maintenance
  • Understanding Upgrade Maintenance
  • Software Management
  • System Upgrade
  • Patch Upgrade
  • License
  • Overview of Licenses
  • License Classification
  • License Mechanism
  • CM
  • Cloud-based License
  • Application Scenarios for Upgrade Maintenance
  • Upgrade Software
  • Terminology for Upgrade Maintenance
  • SNMP Description
  • Overview of SNMP
  • Understanding SNMP
  • SNMP Fundamentals
  • SNMP Management Model
  • SNMPv1 Principles
  • SNMPv2c Principles
  • SNMPv3 Principles
  • MIB
  • SMI
  • Trap
  • SNMP Protocol Stack Support for Error Codes
  • SNMP Support for IPv6
  • Comparisons of Security in Different SNMP Versions
  • ACL Support
  • SNMP Proxy
  • SNMP Support for AAA Users
  • Application Scenarios for SNMP
  • Monitoring an Outdoor Cabinet Using SNMP Proxy
  • NETCONF Feature Description
  • Overview of NETCONF
  • Understanding NETCONF
  • NETCONF Protocol Framework
  • Basic NETCONF Concepts
  • NETCONF Message Formats
  • NETCONF Authorization
  • HUAWEI-NACM
  • IETF-NACM
  • NETCONF Capabilities Exchange
  • Subtree Filtering
  • YANG Model
  • Overview of YANG
  • Basic Concepts
  • Data Modeling Basics
  • Leaf Node
  • Leaf-List Node
  • Container Node
  • List Node
  • Reusable Node Group (Grouping)
  • Choice Node
  • YANG Data Types
  • Configuration and State Data
  • Built-in Types
  • Derived Types
  • Extending Data Models
  • Precautions for YANG File Loading
  • Extended Syntax
  • NETCONF Base Operations
  • <get-config>
  • <get-data>
  • <get>
  • <edit-config>
  • <edit-data>
  • <copy-config>
  • <delete-config>
  • <lock>
  • <unlock>
  • <close-session>
  • <kill-session>
  • NETCONF Standard Capabilities
  • Writable-running
  • Candidate Configuration
  • Confirmed Commit
  • Rollback
  • Distinct Startup
  • XPath Capability
  • Validate capability
  • URL
  • Notification
  • YANG-library
  • NETCONF Extended Capabilities
  • Sync
  • Active Notification
  • Commit-description
  • with-defaults
  • Application Scenarios for NETCONF
  • NETCONF-based Configuration and Management
  • DCN Description
  • Overview of DCN
  • Understanding DCN
  • Basic Concepts
  • DCN Fundamentals
  • Application Scenarios for DCN
  • Terminology for DCN
  • LAD Description
  • Overview of LAD
  • Understanding LAD
  • Basic Concepts
  • Implementation
  • Application Scenarios for LAD
  • LAD Application in Single-Neighbor Networking
  • LAD Application in Multi-Neighbor Networking
  • LAD Application in Link Aggregation
  • Terminology for LAD
  • LLDP Description
  • Overview of LLDP
  • Understanding LLDP
  • Basic LLDP Concepts
  • LLDP Fundamentals
  • Application Scenarios for LLDP
  • LLDP Applications in Single Neighbor Networking
  • LLDP Applications in Multi-Neighbor Networking
  • LLDP Applications in Link Aggregation
  • Terminology for LLDP
  • Physical Layer Clock Synchronization Description
  • Overview of Clock Synchronization
  • Understanding Clock Synchronization
  • Basic Concepts
  • Physical Layer Synchronization Modes and Precautions
  • Networking Modes of Clock Physical Layer Synchronization
  • Physical Layer Clock Protection Switching
  • Terms and Abbreviations for Clock Synchronization
  • 1588 ACR Clock Synchronization Description
  • Overview of 1588 ACR
  • Understanding 1588 ACR
  • Basic Principles of 1588 ACR
  • Application Scenarios for 1588 ACR
  • Terms and Abbreviations for 1588 ACR
  • 1588v2 G.8275.1 and SMPTE-2059-2 Description
  • Overview of 1588v2 , SMPTE-2059-2 and G.8275.1
  • Understanding 1588v2 , SMPTE-2059-2 and G.8275.1
  • Basic Concepts
  • Principle of 1588v2 Synchronization
  • Principle of G.8275.1 Synchronization
  • Offset Measurement and Automatic Compensation
  • Application Scenarios for 1588v2 , SMPTE-2059-2 and G.8275.1
  • Terms and Abbreviations for 1588v2, SMPTE-2059-2, and G.8275.1
  • 1588 ATR Time Synchronization Feature Description
  • Overview of 1588 ATR
  • Understanding 1588 ATR
  • Principles of 1588 ATR
  • Applications of 1588 ATR
  • Terms and Abbreviations for 1588 ATR
  • Atom GPS Timing Description
  • Overview of Atom GPS
  • Understanding Atom GPS
  • Modules
  • Implementation Principles
  • Application Scenarios for Atom GPS
  • Terms and Abbreviations for Atom GPS
  • Atom GNSS Timing Description
  • Overview of Atom GNSS
  • Understanding Atom GNSS
  • Modules
  • Implementation Principles
  • Application Scenarios for Atom GNSS
  • Terms and Abbreviations for Atom GNSS
  • NTP Description
  • Overview of NTP
  • Understanding NTP
  • NTP Implementation Model
  • Network Structure
  • Format of NTP Messages
  • NTP Operating Modes
  • NTP Events Processing
  • Dynamic and Static NTP Associations
  • NTP Access Control
  • VPN Support
  • Application Scenarios for NTP
  • OPS Description
  • Overview of OPS
  • Understanding OPS
  • OPS Architecture
  • Maintenance Assistant Function
  • OPS Function Based on Python Scripts
  • Python Script Execution Process
  • Python Script Compilation
  • Subscribe to CLI Events
  • Subscribe to Timer Events
  • Subscribe to Route Change Events
  • Subscribe to IPv4 Route Change Events
  • Subscribe to IPv6 Route Change Events
  • Obtain the OID
  • Display and Read Messages on User Terminals
  • Save and Restore Script Variables
  • Support Resident Scripts
  • Multi-Condition Association
  • Multi-Condition Triggering
  • Obtain Environment Variables
  • Record Logs
  • Subscribe to Events
  • Subscribe to Alarms
  • OPS Applications
  • Terminology for OPS
  • CUSP Description
  • Overview of CUSP
  • Understanding CUSP
  • CUSP Fundamentals
  • Control channel Establishment and Maintenance
  • CUSP-based Port Information Reporting
  • CUSP Flow Table Delivery
  • CUSP Reliability
  • Terminology for CUSP
  • RMON Description
  • Overview of RMON
  • Understanding RMON
  • Application Scenarios for RMON
  • Terminology for RMON
  • SAID Description
  • Overview of SAID
  • Understanding SAID
  • Basic SAID Functions
  • SAID for Ping
  • SAID for CFC
  • SAID for SEU
  • Terminology for SAID
  • KPI Description
  • Overview of KPIs
  • Understanding KPIs
  • PADS Description
  • Overview of PADS
  • Understanding PADS
  • Network Reliability
  • About This Document
  • Network Reliability Description
  • Overview of Reliability
  • Reliability Technologies for IP Networks
  • Fault Detection Technologies for IP Networks
  • Protection Switchover Technologies for IP Networks
  • Networking Schemes for IP Network Reliability
  • Faults on an Intermediate Node or on the Link Connected to It - LDP FRR/TE FRR
  • Fault on the Local Link - P2MP TE FRR
  • Fault on the Link Between PEs
  • Fault on the Remote PE - VPN FRR
  • Fault on the Downlink Interface on a PE - IP FRR
  • BFD Description
  • Overview of BFD
  • Understanding BFD
  • Basic BFD Concepts
  • BFD for IP
  • BFD for PST
  • Multicast BFD
  • BFD for PIS
  • BFD for Link-Bundle
  • BFD Echo
  • Board Selection Rules for BFD Sessions
  • BFD Dampening
  • Application Scenarios for BFD
  • BFD for Static Routes
  • BFD for RIP
  • BFD for OSPF
  • BFD for OSPFv3
  • BFD for IS-IS
  • BFD for BGP
  • BFD for LDP LSP
  • BFD for P2MP TE
  • BFD for TE CR-LSP
  • BFD for TE Tunnel
  • BFD for RSVP
  • BFD for VRRP
  • BFD for PW
  • BFD for Multicast VPLS
  • BFD for PIM
  • SBFD for SR-MPLS
  • SBFD For SR-MPLS TE Policy
  • SBFD for SRv6 TE Policy
  • MPLS OAM Description
  • Overview of MPLS OAM
  • Understanding MPLS OAM
  • Basic Detection
  • Auto Protocol
  • Application Scenarios for MPLS OAM
  • Application of MPLS OAM in the IP RAN Layer 2 to Edge Scenario
  • Application of MPLS OAM in VPLS Networking
  • Terminology for MPLS OAM
  • MPLS-TP OAM Description
  • Overview of MPLS-TP OAM
  • Understanding MPLS-TP OAM
  • Basic Concepts
  • Continuity Check and Connectivity Verification
  • Packet Loss Measurement
  • Frame Delay Measurement
  • Remote Defect Indication
  • Loopback
  • Application Scenarios for MPLS-TP OAM
  • Application of MPLS-TP OAM in the IP RAN Layer 2 to Edge Scenario
  • Application of MPLS-TP OAM in VPLS Networking
  • Terminology for MPLS-TP OAM
  • VRRP Feature Description
  • Overview of VRRP
  • Understanding VRRP
  • Basic VRRP Functions and Concepts
  • VRRP Advertisement Packets
  • VRRP Operating Principles
  • Basic VRRP Functions
  • mVRRP
  • Association Between VRRP and a VRRP-disabled Interface
  • VRRP Tracking an Interface Monitoring Group
  • BFD for VRRP
  • VRRP Tracking EFM
  • Association between VRRP and CFM
  • VRRP Association with NQA
  • Association Between VRRP and Route Status
  • Association Between Direct Routes and a VRRP Group
  • Traffic Forwarding by a Backup Device
  • Rapid VRRP Switchback
  • Unicast VRRP
  • Application Scenarios for VRRP
  • IPRAN Gateway Protection Solution
  • Terminology for VRRP
  • Ethernet OAM Description
  • Overview of Ethernet OAM
  • Understanding EFM
  • Basic Concepts
  • Background
  • Basic Functions
  • EFM Enhancements
  • Understanding CFM
  • Basic Concepts
  • Background
  • Basic Functions
  • CFM Alarms
  • Understanding Y.1731
  • Background
  • Basic Functions
  • Ethernet OAM Fault Advertisement
  • Background
  • Fault Information Advertisement Between EFM and Other Modules
  • Fault Information Advertisement Between CFM and Other Modules
  • Application Scenarios for Ethernet OAM
  • Ethernet OAM Applications on a MAN
  • Ethernet OAM Applications on an IPRAN
  • LPT Description
  • Overview of LPT
  • Understanding LPT
  • Basic Principles
  • Application Scenarios for LPT
  • Point-to-Point Ethernet LPT
  • Dual-Device Backup Description
  • Overview of Dual-Device Backup
  • Dual-Device Backup Principles
  • Overview
  • Status Control
  • Service Control
  • IPv4 Unicast Forwarding Control
  • IPv4 Multicast Forwarding Control
  • IPv6 Unicast Forwarding Control
  • Application Scenarios for Dual-Device Backup
  • Dual-Device ARP Hot Backup
  • Dual-Device IGMP Snooping Hot Backup
  • DHCPv4 Server Dual-Device Hot Backup
  • Single-Homing Access in a Multi-Node Backup Scenario
  • Dual-Homing Access in a Multi-Node Backup Scenario
  • Load Balancing Between Equipment
  • Load Balancing Between Links
  • Load Balancing Between VLANs
  • Load Balancing Based on Odd and Even MAC Addresses
  • Multicast Hot Backup
  • Dual-Device ND Hot Backup
  • Terminology for Dual-Device Backup
  • Bit-Error-Triggered Protection Switching Description
  • Overview of Bit-Error-Triggered Protection Switching
  • Understanding Bit-Error-Triggered Protection Switching
  • Bit Error Detection
  • Bit-Error-Triggered Section Switching
  • Bit-Error-Triggered IGP Route Switching
  • Bit-Error-Triggered Trunk Update
  • Bit-Error-Triggered RSVP-TE Tunnel Switching
  • Bit-Error-Triggered SR-MPLS TE LSP Switching
  • Bit-Error-Triggered Switching for PW
  • Bit-Error-Triggered L3VPN Switching
  • Bit-Error-Triggered Static CR-LSP/PW/E-PW APS
  • Relationships Among Bit-Error-Triggered Protection Switching Features
  • Bit Error Rate-based Selection of an mLDP Tunnel Outbound Interface
  • Application Scenarios for Bit-Error-Triggered Protection Switching
  • Application of Bit-Error-Triggered Protection Switching in a Scenario in Which TE Tunnels Carry an IP RAN
  • Application of Bit-Error-Triggered Protection Switching in a Scenario in Which LDP LSPs Carry an IP RAN
  • Application of Bit-Error-Triggered Protection Switching in a Scenario in Which a Static CR-LSP/PW Carries L2VPN Services
  • Terminology for Bit-Error-Triggered Protection Switching
  • Interface and Data Link
  • About This Document
  • Interface Management Feature Description
  • Overview of Interface Management
  • Understanding Interface Management
  • Basic Concepts
  • Logical Interface
  • FlexE
  • Overview of FlexE
  • General Architecture of FlexE
  • FlexE Functions
  • FlexE Shim
  • FlexE Mode Switching
  • FlexE DCN Modes
  • FlexE Time Synchronization Modes
  • FlexE Mux
  • FlexE Demux
  • Interface Group
  • Interface Monitoring Group
  • Interface Management Application
  • Sub-interface
  • Eth-Trunk
  • Application of FlexE
  • FlexE Bonding for Ultra-high Bandwidth Interfaces
  • FlexE Channelization for 5G Network Slicing
  • Interconnection Between FlexE and Optical Transmission Devices
  • Application Scenarios for VLAN Channelized Sub-Interfaces
  • Loopback Interface
  • Null0 Interface
  • Tunnel Interface
  • Interface Group Application
  • Application of Interface Monitoring Group
  • Transmission Alarm Customization and Suppression
  • Introduction of Transmission Alarm Customization and Suppression
  • Principles of Transmission Alarm Customization and Suppression
  • Basic Concepts
  • Transmission Alarm Processing
  • Terms and Abbreviations for Transmission Alarm Customization and Suppression
  • LAN Access and MAN Access
  • About This Document
  • Ethernet Description
  • Overview of Ethernet
  • Understanding Ethernet
  • Ethernet Physical Layer
  • Ethernet Data Link Layer
  • Application Scenarios for Ethernet
  • Computer Interconnection
  • Interconnection Between High-Speed Network Devices
  • MAN Access Methods
  • Trunk Description
  • Overview of Trunk
  • Understanding Trunk
  • Basic Trunk Principles
  • Constraints on the Trunk Interface
  • Types and Features of Trunk Interfaces
  • Link Aggregation Control Protocol
  • E-Trunk
  • Application Scenarios for Trunk
  • Application of Eth-Trunk
  • E-Trunk Application in Dual-homing Networking
  • GVRP Description
  • Overview of GVRP
  • Understanding GVRP
  • Basic Concepts
  • Working Procedure
  • GVRP PDU Structure
  • Application Scenarios for GVRP
  • Terminology for GVRP
  • Layer 2 Protocol Tunneling Description
  • Overview of Layer 2 Protocol Tunneling
  • Understanding Layer 2 Protocol Tunneling
  • Basic Concepts
  • Layer 2 Protocol Tunneling Fundamentals
  • Application Scenarios for Layer 2 Protocol Tunneling
  • Untagged Layer 2 Protocol Tunneling Application
  • VLAN-based Layer 2 Protocol Tunneling Application
  • QinQ-based Layer 2 Protocol Tunneling Application
  • Hybrid VLAN-based Layer 2 Protocol Tunneling Application
  • VLAN Description
  • Overview of VLANs
  • Understanding VLANs
  • Basic Concepts
  • VLAN Communication Principles
  • VLAN Aggregation
  • VLAN Mapping
  • VLAN Damping
  • Flexible Service Access Through Sub-interfaces of Various Types
  • Application Scenarios for VLANs
  • Port-based VLAN Classification
  • VLAN Trunk Application
  • Inter-VLAN Communication Application
  • VLAN Aggregation Application
  • Terminology for VLANs
  • QinQ Description
  • Overview of QinQ
  • Understanding QinQ
  • Basic Concepts
  • QinQ Tunneling
  • Layer 2 Selective QinQ
  • VLAN Stacking
  • Compatibility of EtherTypes in QinQ Tags
  • QinQ-based VLAN Tag Swapping
  • QinQ Mapping
  • Symmetry/Asymmetry Mode
  • IP Forwarding on a Termination Sub-interface
  • Proxy ARP on a Termination Sub-interface
  • DHCP Server on a Termination Sub-interface
  • DHCP Relay on a Termination Sub-interface
  • VRRP on a Termination Sub-interface
  • L3VPN Access Through a Termination Sub-interface
  • VPWS Access Through a Termination Sub-interface
  • VPLS Access Through a Termination Sub-interface
  • Multicast Service on a Termination Sub-interface
  • VPWS Access Through a QinQ Stacking Sub-interface
  • VPLS Access Through a QinQ Stacking Sub-interface
  • 802.1p on a QinQ Interface
  • Application Scenarios for QinQ
  • User Services on a Metro Ethernet
  • Enterprise Leased Line Interconnections
  • Terminology for QinQ
  • EVC Description
  • Overview of EVC
  • Understanding EVC
  • EVC Service Bearing
  • Application Scenarios for EVC
  • Application of EVC Bearing VPLS Services
  • Application of EVC VPWS Services
  • Terminology for EVC
  • STP/RSTP Description
  • Overview of STP/RSTP
  • Understanding STP/RSTP
  • Background
  • Basic Concepts
  • BPDU Format
  • STP Topology Calculation
  • Evolution from STP to RSTP
  • RSTP Implementation
  • Understanding E-STP
  • Application Scenarios for STP/RSTP
  • STP Application
  • BPDU Tunneling
  • Terminology for STP/RSTP
  • MSTP Description
  • Overview of MSTP
  • Understanding MSTP
  • MSTP Background
  • Basic Concepts
  • MST BPDUs
  • MSTP Topology Calculation
  • MSTP Fast Convergence
  • MSTP Multi-process
  • Application Scenarios for MSTP
  • Application of MSTP
  • Application of MSTP Multi-process
  • Terminology for MSTP
  • RRPP Description
  • Overview of RRPP
  • Understanding RRPP
  • Basic Concepts
  • RRPP Snooping
  • ERPS (G.8032) Description
  • Overview of ERPS
  • Understanding ERPS
  • Basic Concepts
  • R-APS PDU Format
  • ERPS Single Ring Fundamentals
  • ERPS Multi-Ring Fundamentals
  • ERPS Multi-instance
  • Association Between ERPS and Ethernet CFM
  • Application Scenarios for ERPS
  • ERPS Layer 2 Protocol Tunneling Application
  • Terminology for ERPS
  • MAC Flapping-based Loop Detection Description
  • Overview of MAC Flapping-based Loop Detection
  • Understanding MAC Flapping-based Loop Detection
  • Application Scenarios for MAC Flapping-based Loop Detection
  • MAC Flapping-based Loop Detection for VPLS Networks
  • Terminology for MAC Flapping-based Loop Detection
  • VXLAN Description
  • VXLAN Introduction
  • VXLAN Basics
  • VXLAN Basic Concepts
  • Combinations of Underlay and Overlay Networks
  • VXLAN Packet Format
  • EVPN VXLAN Fundamentals
  • VXLAN Gateway Deployment
  • Functional Scenarios
  • Centralized VXLAN Gateway Deployment in Static Mode
  • Establishment of a VXLAN in Centralized Gateway Mode Using BGP EVPN
  • Establishment of a VXLAN in Distributed Gateway Mode Using BGP EVPN
  • Function Enhancements
  • Establishment of a Three-Segment VXLAN for Layer 3 Communication Between DCs
  • Using Three-Segment VXLAN to Implement Layer 2 Interconnection Between DCs
  • VXLAN Active-Active Reliability
  • NFVI Distributed Gateway (Asymmetric Mode)
  • NFVI Distributed Gateway (Symmetric Mode)
  • Application Scenarios for VXLAN
  • Application for Communication Between Terminal Users on a VXLAN
  • Application for Communication Between Terminal Users on a VXLAN and Legacy Network
  • Application in VM Migration Scenarios
  • Terminology for VXLAN
  • IP Services
  • About This Document
  • ARP Description
  • Overview of ARP
  • Understanding ARP
  • ARP Fundamentals
  • Dynamic ARP
  • Static ARP
  • Gratuitous ARP
  • Proxy ARP
  • ARP-Ping
  • Dual-Device ARP Hot Backup
  • Association Between ARP and Interface Status
  • Application Scenarios for ARP
  • Intra-VLAN Proxy ARP Application
  • Static ARP Application
  • Terminology for ARP
  • ACL Description
  • Overview of ACL
  • Understanding ACLs
  • Basic ACL Concepts
  • ACL Matching Principles
  • Application Scenarios for ACLs
  • ACLs Applied to Telnet (VTY), SNMP, FTP & TFTP
  • ACLs Applied to a Traffic Policy
  • ACLs Applied to a Route-Policy
  • ACLs Applied to a Filter Policy
  • ACLs Applied to a Multicast Policy
  • ACLs Applied to a CPU Defend Policy
  • ACLs Applied to NAT
  • ACLs Applied to an IPsec Policy
  • ACLs Applied to Filtering BFD Passive Echo
  • Terminology for ACLs
  • DHCP Description
  • Overview of DHCP
  • Understanding DHCP
  • DHCP Overview
  • DHCP Messages
  • DHCP Client
  • DHCP Server
  • DHCP Relay
  • DHCP Plug-and-Play
  • Application Scenarios for DHCP
  • DHCP Server Application
  • DHCP Server Dual-Device Hot Backup
  • DHCPv4/v6 Relay Application
  • DHCP PnP Application
  • DHCPv6 Description
  • Overview of DHCP
  • Understanding DHCPv6
  • DHCPv6 Overview
  • DHCPv6 Messages
  • DHCPv6 Relay
  • Application Scenarios for DHCPv6
  • DHCPv4/v6 Relay Application
  • DHCPv6 Relay Dual-Device Hot Standby
  • DNS Description
  • Overview of DNS
  • Understanding DNS
  • Static DNS
  • Dynamic DNS
  • Application Scenarios for DNS
  • MTU Description
  • Overview of MTU
  • Understanding MTU
  • IP MTU Fragmentation
  • MPLS MTU Fragmentation
  • GRE MTU Fragmentation
  • IPv4 over IPv6 MTU Fragmentation
  • Protocols MTU Negotiation
  • Number of Labels Carried in an MPLS Packet in Various Scenarios
  • Load Balancing Description
  • Overview of Load Balancing
  • Basic Concepts of Load Balancing
  • What Is Load Balancing
  • Per-Flow and Per-Packet Load Balancing
  • ECMP and UCMP
  • ECMP Load Balancing Consistency
  • Basic Principles
  • Conditions for Load Balancing
  • Route Load Balancing
  • Overview
  • Load Balancing Among Static Routes
  • Load Balancing Among OSPF Routes
  • Load Balancing Among IS-IS Routes
  • Load Balancing Among BGP Routes
  • Multicast Load Balancing
  • Tunnel Load Balancing
  • MPLS VPN Tunnel Load Balancing
  • Segment Routing Load Balancing
  • SRv6 TE Policy Load Balancing
  • Eth-Trunk Load Balancing
  • Load Balancing Algorithm
  • Algorithm Overview
  • Analysis for Load Balancing In Typical Scenarios
  • MPLS L3VPN Scenario
  • VPLS Scenario
  • VLL/PWE3 Scenario
  • L2TP/GTP Scenario
  • GRE Scenarios
  • IP Unicast Forwarding Scenarios
  • Multicast Scenarios
  • Broadcast Scenario
  • VXLAN Scenario
  • Appendix: Default Hash Factors
  • Terms, Acronyms, and Abbreviations for Load Balancing
  • UCMP Description
  • Overview of UCMP
  • Applications for UCMP
  • Basic Principles
  • Interface-based UCMP
  • Global UCMP
  • Applications
  • Interface-based UCMP Application
  • Global UCMP Application
  • Terms and Abbreviations for UCMP
  • IPv4 Basic Description
  • Overview of IPv4 Basic
  • Understanding IPv4
  • ICMP
  • TCP
  • UDP
  • RawIP
  • Socket
  • DSCP
  • Application Scenarios for IPv4
  • IPv6 Basic Description
  • Overview of IPv6 Basic
  • Understanding IPv6
  • IPv6 Addresses
  • IPv6 Features
  • ICMPv6
  • Path MTU
  • Dual Protocol Stacks
  • TCP6
  • UDP6
  • RawIP6
  • ND Description
  • Overview of ND
  • Understanding ND
  • ND Fundamentals
  • Static ND
  • Dynamic ND
  • Proxy ND
  • Rate Limiting on ND Messages
  • Rate Limiting on ND Miss Messages
  • NS Multicast Suppression
  • ND Dual-Fed in L2VPN Scenarios
  • Dual-Device ND Hot Backup
  • IP Routing
  • About This Document
  • Basic IP Routing Description
  • Overview of Basic IP Routing
  • Understanding IP Routing
  • Routers
  • Routing Protocols
  • Routing Tables
  • Route Recursion
  • Static and Dynamic Routes
  • Classification of Dynamic Routing Protocols
  • Routing Protocol and Route Priority
  • Priority-based Route Convergence
  • Load Balancing and Route Backup
  • Principles of IP FRR
  • Re-advertisement of Routing Information
  • Indirect Next Hop
  • Default Route
  • Multi-Topology
  • Association Between Direct Routes and a VRRP Group
  • Vlink Direct Route Advertisement
  • Application Scenarios for IP Routing
  • Typical Application of IP FRR
  • Data Center Applications of Association Between Direct Routes and a VRRP Group
  • IPRAN Applications of Association Between Direct Routes and a VRRP Group
  • Appendix List of Port Numbers of Common Protocols
  • Terminology for IP Routing
  • Static Routes Description
  • Overview of Static Routes
  • Understanding Static Routes
  • Components
  • Application Scenarios for Static Routes
  • Functions
  • BFD for Static Routes
  • NQA for Static Routes
  • Static Route Permanent Advertisement
  • Association Between LDP and Static Routes
  • RIP Feature Description
  • Overview of RIP
  • Understanding RIP
  • RIP-1
  • RIP-2
  • Timers
  • Split Horizon
  • Poison Reverse
  • Triggered Update
  • Route Summarization
  • Multi-Process and Multi-Instance
  • BFD for RIP
  • RIP Authentication
  • RIPng Description
  • Overview of RIPng
  • Understanding RIPng
  • RIPng Packet Format
  • Timers
  • Split Horizon
  • Poison Reverse
  • Triggered Update
  • Route Summarization
  • Multi-Process and Multi-Instance
  • IPsec Authentication
  • OSPF Feature Description
  • Overview of OSPF
  • Understanding OSPF
  • Basic Concepts of OSPF
  • OSPF Fundamentals
  • OSPF Route Control
  • OSPF Virtual Link
  • OSPF TE
  • OSPF VPN
  • OSPF NSSA
  • OSPF Local MT
  • BFD for OSPF
  • OSPF Smart-discover
  • OSPF-BGP Synchronization
  • LDP-IGP Synchronization
  • OSPF Fast Convergence
  • OSPF Neighbor Relationship Flapping Suppression
  • OSPF Flush Source Tracing
  • OSPF Multi-Area Adjacency
  • OSPF IP FRR
  • OSPF Authentication
  • OSPF Packet Format
  • OSPF LSA Format
  • Routing Loop Detection for Routes Imported to OSPF
  • OSPFv3 Feature Description
  • Introduction to OSPFv3
  • Understanding OSPFv3
  • OSPFv3 Fundamentals
  • Comparison Between OSPFv3 and OSPFv2
  • BFD for OSPFv3
  • Priority-based Convergence
  • OSPFv3 IP FRR
  • OSPFv3 GR
  • OSPFv3 VPN
  • OSPFv3-BGP Association
  • OSPFv3 Authentication
  • OSPFv3 Neighbor Relationship Flapping Suppression
  • OSPFv3 Flush Source Tracing
  • OSPFv3 Packet Format
  • OSPFv3 LSA Format
  • Routing Loop Detection for Routes Imported to OSPFv3
  • IS-IS Feature Description
  • Overview of IS-IS
  • Understanding IS-IS
  • Basic Concepts of IS-IS
  • Basic Protocols of IS-IS
  • IS-IS Routing Information Control
  • IS-IS Neighbor Relationship Flapping Suppression
  • IS-IS Overload
  • IS-IS Fast Convergence
  • IS-IS LSP Fragment Extension
  • IS-IS 3-Way Handshake
  • IS-IS for IPv6
  • IS-IS TE
  • IS-IS Wide Metric
  • BFD for IS-IS
  • IS-IS Auto FRR
  • IS-IS Authentication
  • IS-IS Purge Source Tracing
  • IS-IS MT
  • IS-IS Local MT
  • IS-IS Control Messages
  • IS-IS GR
  • Routing Loop Detection for Routes Imported to IS-IS
  • Application Scenarios for IS-IS
  • IS-IS MT
  • BGP Description
  • Overview of BGP
  • Understanding BGP
  • BGP Fundamentals
  • BGP Message Format
  • BGP Route Processing
  • Community Attribute
  • Large-Community Attribute
  • AIGP
  • Entropy Label
  • BGP Routing Loop Detection
  • Peer Group and Dynamic BGP Peer Group
  • BGP Confederation
  • Route Reflector
  • Route Server
  • BGP VPN Route Leaking
  • MP-BGP
  • BGP Security
  • BFD for BGP
  • BGP Peer Tracking
  • BGP 6PE
  • BGP ORF
  • VPN ORF
  • BGP Auto FRR
  • BGP Dynamic Update Peer-Group
  • 4-Byte AS Number
  • Fake AS Number
  • BMP
  • BGP Best External
  • BGP Add-Path
  • Route Dampening
  • Suppression on BGP Peer Flapping
  • BGP Recursion Suppression in Case of Next Hop Flapping
  • BGP-LS
  • BGP RPD
  • BGP SR LSP
  • Routing Policy Description
  • Overview of Routing Policy
  • Understanding Routing Policies
  • Application Scenarios for Routing Policies
  • XPL Description
  • Overview of XPL
  • Understanding XPL
  • Application Scenarios for XPL
  • IP Multicast
  • About This Document
  • IP Multicast Basics Description
  • Overview of IP Multicast Basics
  • Understanding Multicast
  • Concepts Related to Multicast
  • Basic Multicast Framework
  • Multicast Addresses
  • Multicast Protocols
  • Multicast Models
  • Multicast Packet Forwarding
  • Application Scenarios for Multicast
  • IGMP Description
  • Overview of IGMP
  • Understanding IGMP
  • IGMP Fundamentals
  • IGMP Policy Control
  • IGMP Static-Group Join
  • IGMP Prompt-Leave
  • IGMP SSM Mapping
  • IGMP On-Demand
  • IGMP IPsec
  • Multi-Instance Supported by IGMP
  • IGMP over L2TP
  • Application Scenarios for IGMP
  • Typical IGMP Applications
  • PIM Feature Description
  • Overview of PIM
  • Understanding PIM
  • PIM-DM
  • PIM-SM
  • PIM-SSM
  • PIM Reliability
  • PIM Security
  • PIM FRR
  • Multicast Source Cloning-based PIM FRR
  • PIM Control Messages
  • Multicast over P2MP TE Tunnels
  • Application Scenarios for PIM
  • PIM-DM Intra-domain
  • PIM Intra-domain
  • PIM-SSM Intra-domain
  • P2MP TE Applications for Multicast Services
  • NON-ECMP PIM FRR Based on IGP FRR
  • NON-ECMP PIM FRR Based on Multicast Static Route
  • PIM over GRE Application
  • Appendix
  • MSDP Description
  • Overview of MSDP
  • Understanding MSDP
  • Inter-Domain Multicast in MSDP
  • Mesh Group
  • Anycast-RP in MSDP
  • Multi-Instance MSDP
  • MSDP Authentication
  • RPF Check Rules for SA Messages
  • Application Scenarios for MSDP
  • Multicast Route Management Description
  • Overview of Multicast Route Management
  • Understanding Multicast Route Management
  • RPF Check
  • Multicast Load Splitting
  • Longest-Match Multicast Routing
  • Multicast Multi-Topology
  • Multicast Boundary
  • Rosen MVPN Feature Description
  • Overview of Rosen MVPN
  • Understanding Rosen MVPN
  • Concepts Related to Rosen MVPN
  • Inter-domain Multicast Implemented by MVPN
  • PIM Neighbor Relationships Between CEs, PEs, and Ps
  • Share-MDT Setup Process
  • Switch-MDT Switchover
  • Multicast VPN Extranet
  • BGP A-D MVPN
  • Application Scenarios for Rosen MVPN
  • Single-AS MD VPN
  • Terminology for Rosen MVPN
  • NG MVPN Feature Description
  • Overview of NG MVPN
  • Understanding NG MVPN
  • NG MVPN Control Messages
  • NG MVPN Routing
  • PIM (S, G) Join/Prune
  • PIM (*, G) Join/Prune
  • NG MVPN Public Network Tunnel Principle
  • MVPN Membership Autodiscovery
  • I-PMSI Tunnel Establishment
  • Switching Between I-PMSI and S-PMSI Tunnels
  • Multicast Traffic Transmission Using NG MVPN
  • NG MVPN Typical Deployment Scenarios on the Public Network
  • NG MVPN Extranet
  • UMH Route Selection Fundamentals
  • NG MVPN Reliability
  • Application Scenarios for NG MVPN
  • Application of NG MVPN to IPTV Services
  • Terminology for NG MVPN
  • mLDP In-Band MVPN Feature Description
  • Overview of mLDP In-Band MVPN
  • Understanding mLDP In-Band MVPN
  • mLDP In-Band MVPN Control Messages
  • mLDP In-Band MVPN Implementation
  • mLDP In-Band MVPN Reliability
  • Terminology for mLDP In-Band MVPN
  • BIER Description
  • Overview of BIER
  • Understanding BIER
  • IS-IS for BIER
  • BIER Forwarding Plane Fundamentals
  • NG MVPN over BIER
  • Introduction to NG MVPN over BIER
  • NG MVPN over BIER Control Message
  • Public Network Tunnels of NG MVPN over BIER
  • BIER I-PMSI Tunnel Establishment
  • BIER S-PMSI Tunnel Establishment
  • MVPN Traffic Forwarding Through NG MVPN over BIER
  • Application Scenarios for BIER
  • BIER Application to MVPN Services
  • Terminology for BIER
  • BIERv6 Feature Description
  • Overview of BIERv6
  • Understanding BIERv6
  • BIERv6 Fundamentals
  • BIERv6 Control Plane Fundamentals
  • IS-ISv6 for BIERv6
  • BIFT Generation
  • Hosts Joining a Multicast Group on a BIERv6 Network
  • BIERv6 Forwarding Plane Fundamentals
  • MVPN over BIERv6
  • Overview of MVPN over BIERv6
  • MVPN over BIERv6 Control Messages
  • MVPN over BIERv6 Forwarding Process
  • BIERv6 PMSI Tunnel Establishment
  • BIERv6 I-PMSI Tunnel Establishment
  • BIERv6 S-PMSI Tunnel Establishment
  • Switchback from an S-PMSI Tunnel to the I-PMSI Tunnel
  • BIERv6 Inter-AS Static Traversal and Intra-AS Automatic Traversal
  • MVPN over BIERv6 Dual-Root 1+1 Protection
  • BIERv6 OAM
  • BIERv6 Applications
  • BIERv6 Applications in IPTV and MVPN Services
  • Terminology for BIERv6
  • MLD Description
  • Overview of MLD
  • Understanding MLD
  • MLDv1 and MLDv2
  • MLD Group Compatibility
  • MLD Querier Election
  • MLD On-Demand
  • Protocol Comparison
  • Application Scenarios for MLD
  • User-side Multicast Description
  • Overview of User-side Multicast
  • Understanding User-side Multicast
  • Overview
  • Multicast Program Join
  • Multicast Program Leave
  • Multicast Program Leave by Going Offline
  • User-side Multicast CAC
  • Application Scenarios for User-side Multicast
  • User-side Multicast for PPPoE Access Users
  • User-side Multicast for IPoE Access Users
  • User-side Multicast VPN
  • Multicast NAT Feature Description
  • Overview of Multicast NAT
  • Multicast NAT Fundamentals
  • Understanding Multicast NAT's Clean Switching
  • Application of Multicast NAT on a Production and Broadcasting Network
  • Terminology for Multicast NAT
  • Layer 2 Multicast Description
  • Overview of Layer 2 Multicast
  • Understanding Layer 2 Multicast
  • IGMP Snooping
  • Static Layer 2 Multicast
  • Layer 2 SSM Mapping
  • IGMP Snooping Proxy
  • Multicast VLAN
  • Layer 2 Multicast Entry Limit
  • Layer 2 Multicast CAC
  • Rapid Multicast Data Forwarding on a Backup Device
  • Layer 2 Multicast Instance
  • MLD Snooping
  • Application Scenarios for Layer 2 Multicast
  • Application of Layer 2 Multicast for IPTV Services
  • MLD Snooping Application
  • Terminology for Layer 2 Multicast
  • MPLS
  • About This Document
  • MPLS Overview Description
  • Overview of MPLS
  • Understanding MPLS
  • Concepts
  • LSP Establishment
  • MPLS Forwarding
  • MPLS P Fragmentation
  • Application Scenarios for MPLS
  • MPLS-based VPN
  • PBR to an LSP
  • MPLS LDP Description
  • Overview of MPLS LDP
  • Understanding MPLS LDP
  • Basic Concepts
  • LDP Session
  • Label Advertisement and Management
  • Entropy Label
  • Outbound and Inbound LDP Policies
  • Establishment of an LDP LSP
  • LDP Session Protection
  • LDP Auto FRR
  • LDP-IGP Synchronization
  • LDP GR
  • BFD for LDP
  • LDP Bit Error Detection
  • LDP MTU
  • LDP Authentication
  • LDP over TE
  • LDP GTSM
  • Compatible Local and Remote LDP Session
  • Assigning Labels to Both Upstream and Downstream LSRs
  • mLDP
  • mLDP FRR Link Protection
  • Support for the Creation of a Primary mLDP P2MP LSP in the Class-Specific Topology
  • LDP Traffic Statistics Collection
  • BFD for P2MP Tunnel
  • LDP Extension for Inter-Area LSP
  • Application Scenarios for MPLS LDP
  • mLDP Applications in an IPTV Scenario
  • MPLS TE
  • Overview of MPLS TE
  • MPLS TE Fundamentals
  • Technology Overview
  • Information Advertisement Component
  • Path Calculation Component
  • Establishing a CR-LSP Using RSVP-TE
  • RSVP Summary Refresh
  • RSVP Hello
  • Traffic Forwarding Component
  • Priorities and Preemption
  • Affinity Naming Function
  • Tunnel Optimization
  • Tunnel re-optimization
  • Automatic Bandwidth Adjustment
  • PCE+
  • IP-Prefix Tunnel
  • MPLS TE Reliability
  • Make-before-break
  • TE FRR
  • CR-LSP Backup
  • Isolated CR-LSP Computation
  • Association Between CR-LSP Establishment and the IS-IS Overload
  • SRLG
  • MPLS TE Tunnel Protection Group
  • BFD for TE CR-LSP
  • BFD for TE Tunnel
  • BFD for P2MP TE
  • BFD for RSVP
  • RSVP GR
  • Self-Ping
  • MPLS TE Security
  • RSVP Authentication
  • DS-TE
  • Background
  • Related Concepts
  • Implementation
  • Entropy Label
  • Checking the Source Interface of a Static CR-LSP
  • Static Bidirectional Co-Routed LSPs
  • Associated Bidirectional CR-LSP
  • CBTS
  • P2MP TE
  • Application Scenarios for MPLS TE
  • P2MP TE Applications for Multicast Services
  • Terminology for MPLS TE
  • Seamless MPLS Description
  • Overview of Seamless MPLS
  • Understanding Seamless MPLS
  • Seamless MPLS Fundamentals
  • BFD for BGP Tunnel
  • Application Scenarios for Seamless MLPS
  • Seamless MPLS Applications in VPN Services
  • GMPLS UNI Description
  • Overview of GMPLS UNI
  • Understanding GMPLS UNI
  • Basic Concepts
  • Establishment of a GMPLS UNI Tunnel
  • UNI LSP Graceful Deletion
  • UNI Tunnel Calculation Using Both IP and Optical PCE Servers
  • SRLG Sharing Between Optical and IP Layers Within a Transport Network
  • Deployment Scenario
  • General GMPLS UNI Scheme
  • Segment Routing
  • About This Document
  • Segment Routing MPLS Description
  • Overview of Segment Routing MPLS
  • Understanding Segment Routing MPLS
  • Segment Routing MPLS Fundamentals
  • IS-IS for SR-MPLS
  • OSPF for SR-MPLS
  • BGP for SR-MPLS
  • SR-MPLS BE
  • SR-MPLS BE and LDP Communication
  • SR-MPLS Flex-Algo
  • SR-MPLS TE
  • Topology Collection and Label Allocation
  • SR-MPLS TE Tunnel Creation
  • SR-MPLS TE Data Forwarding
  • SR-MPLS TE Tunnel Reliability
  • BFD for SR-MPLS TE
  • SR-MPLS TE Load Balancing
  • DSCP-based Tunneling for IP Packets to Enter SR-MPLS TE Tunnels
  • Inter-AS E2E SR-MPLS TE
  • Binding SID
  • E2E SR-MPLS TE Tunnel Creation
  • Data Forwarding on an E2E SR-MPLS TE Tunnel
  • Reliability of E2E SR-MPLS TE Tunnels
  • One-Arm BFD for E2E SR-MPLS TE
  • Cross-Multi-AS E2E SR-MPLS TE
  • Traffic Steering
  • Public IP Route Recursion to an SR Tunnel
  • L3VPN Route Recursion to an SR Tunnel
  • L2VPN Route Recursion to an SR Tunnel
  • EVPN Route Recursion to an SR Tunnel
  • SBFD for SR-MPLS
  • SR-MPLS TE Policy
  • SR-MPLS TE Policy Creation
  • Traffic Steering into an SR-MPLS TE Policy
  • SR-MPLS TE Policy-based Data Forwarding
  • SBFD for SR-MPLS TE Policy
  • SR-MPLS TE Policy Failover
  • SR-MPLS TE Policy OAM
  • TI-LFA FRR
  • Anycast FRR
  • SR-MPLS Microloop Avoidance
  • SR-MPLS OAM
  • MPLS in UDP
  • SR-MPLS TTL
  • Application Scenarios for Segment Routing MPLS
  • Single-AS SR-MPLS TE
  • Inter-AS E2E SR-MPLS TE
  • SR-MPLS TE Policy Application
  • Terminology for Segment Routing MPLS
  • Segment Routing IPv6 Description
  • Overview of Segment Routing IPv6
  • Understanding Segment Routing IPv6
  • SRv6 Fundamentals
  • SRv6 Segments
  • SRv6 Nodes
  • IS-IS for SRv6
  • BGP for SRv6
  • SRv6 BE
  • L3VPNv4 over SRv6 BE
  • EVPN L3VPNv4 over SRv6 BE
  • EVPN L3VPNv6 over SRv6 BE
  • EVPN VPWS over SRv6 BE
  • EVPN VPLS over SRv6 BE
  • Public IP over SRv6 BE
  • SRv6 TE Policy
  • SRv6 TE Policy Creation
  • Traffic Steering into an SRv6 TE Policy
  • SRv6 TE Policy-based Data Forwarding
  • SBFD for SRv6 TE Policy
  • U-BFD for SRv6 TE Policy
  • SRv6 TE Policy Failover
  • TTL Processing by an SRv6 TE Policy
  • SRv6 TE Policy Shortcut
  • SRv6 Flex-Algo
  • SRv6 Flex-Algo Delay Tolerance
  • SRv6 Flex-Algo Route Leaking
  • SRv6 Flex-Algo Route Import
  • BGP-LS Extension of SRv6 Flex-Algo
  • SRv6 SRH Compression
  • SRv6 Network Slicing
  • Background of Network Slicing
  • Protocol Extension for Network Slicing
  • Fundamentals of Network Slicing
  • Comparison of Network Slicing Solutions
  • Typical Application of Network Slicing
  • SRv6 TI-LFA FRR
  • SRv6 Midpoint Protection
  • SRv6 Microloop Avoidance
  • SRv6 OAM
  • SRv6 OAM Extensions
  • SRv6 SID Ping and Tracert
  • SRv6 TE Policy Ping and Tracert
  • SRv6 SFC
  • SRv6 SFC Implementation
  • SRv6 SFC Reliability
  • Application Scenarios for Segment Routing IPv6
  • SRv6 Application on an IP Bearer Network
  • SRv6 Application for Cross-Domain Cloud Backbone Private Lines
  • SRv6 Application in the Smart Government Field
  • Terminology for Segment Routing IPv6
  • VPN
  • About This Document
  • VPN Basics Description
  • Overview of VPN Basics
  • Classification
  • Architecture
  • Typical Networking
  • Understanding VPN Basics
  • Tunneling
  • Implementation Modes
  • Features Related to VPN Implementation
  • GRE Description
  • Overview of GRE
  • Understanding GRE
  • GRE Fundamentals
  • Keepalive Detection
  • Security Mechanism
  • Application Scenarios for GRE
  • Enlarging the Operation Scope of the Network with Limited Hops
  • Connecting Discontinuous Sub-networks to Establish a VPN
  • CEs Connecting to the MPLS VPN over GRE Tunnels
  • Appendix
  • DSVPN Description
  • Overview of DSVPN
  • Understanding DSVPN
  • Basic Concepts
  • DSVPN Fundamentals
  • DSVPN IPsec Protection
  • Dual Hubs in Active/Standby Mode
  • Application Scenarios for DSVPN
  • DSVPN Deployment on a Small- or Medium-sized Network
  • DSVPN Deployment on a Large-sized Network
  • Deploying DSVPN in Hierarchical Hub Networking
  • L2TPv3 Description
  • Overview of L2TPv3
  • Understanding L2TPv3
  • L2TPv3 Basic Concepts
  • L2TPv3 Fundamentals
  • Application Scenarios for L2TPv3
  • Terminology for L2TPv3
  • Tunnel Management
  • Overview of Tunnel Management
  • Understanding Tunnel Management
  • Tunnel Policy
  • Tunnel Policy Selector
  • BGP/MPLS IP VPN Description
  • Overview of BGP/MPLS IP VPN
  • Understanding BGP/MPLS IP VPN
  • Basic BGP/MPLS IP VPN Fundamentals
  • Hub & Spoke
  • MCE
  • Inter-AS VPN
  • Carrier's Carrier
  • HVPN
  • BGP/MPLS IP VPN Label Allocation Modes
  • BGP SoO
  • Route Import Between VPN and Public Network
  • VPN FRR
  • BGP/MPLS IPv6 VPN Extension
  • VPN Dual-Stack Access
  • VPN MPLS/VPN SRv6 Dual-Stack Tunnel
  • Application Scenarios for BGP/MPLS IP VPN
  • Application of MCEs on a Campus Network
  • Application of MCEs on a Data Center Network
  • Application of HVPN on an IP RAN
  • Application of Route Import Between VPN and Public Network in the Traffic Cleaning Networking
  • VPWS Description
  • Overview of VPWS
  • Understanding VPWS
  • VPWS Basic Functions
  • VPWS in CCC Mode
  • LDP VPWS
  • VPWS in SVC Mode
  • VPWS in BGP Mode
  • Heterogeneous VPWS
  • VCCV
  • PW Redundancy
  • PW APS
  • Comparison of VPWS Implementation Modes
  • Comparison of LDP VPWS and BGP/MPLS IP VPN
  • Inter-AS VPWS
  • Flow-Label-based Load Balancing
  • Mutual Protection Between an LDP VC and a CCC VC
  • Multi-Segment PW Redundancy
  • Application Scenarios for VPWS
  • Enterprise Leased Line Service Bearer Using PWE3
  • HSI Service Bearer Using PWE3
  • PW APS Application
  • IP Hard Pipe Description
  • Overview of IP Hard Pipe
  • Understanding IP Hard Pipe
  • Centralized Management of IP Hard-Pipe-based Leased Line Services on the NMS
  • Interface-based Hard Pipe Bandwidth Reservation
  • AC Interface Service Bandwidth Limitation
  • Hard-Pipe-based TE LSP
  • Hard Pipe-based VPWS/VPLS
  • Hard Pipe Reliability
  • Hard Pipe Service Quality Monitoring
  • Application Scenarios for IP Hard Pipe
  • Hard-Pipe-based Enterprise Leased Line Application
  • Hard-Pipe-based Enterprise Leased Line Protection
  • Hard-Pipe-based Leased Line Services Implemented by Huawei and Non-Huawei Devices
  • Terminology for IP Hard Pipe
  • VPLS Description
  • Overview of VPLS
  • Understanding VPLS
  • VPLS Description
  • VPLS Functions
  • LDP VPLS
  • BGP VPLS
  • HVPLS
  • BGP AD VPLS
  • Inter-AS VPLS
  • Flow-Label-based Load Balancing
  • VPLS PW Redundancy
  • Multicast VPLS
  • VPLS Multi-homing
  • VPLS Service Isolation
  • VPLS E-Tree
  • Application Scenarios for VPLS
  • Application of VPLS in Residential Services
  • Application of VPLS in Enterprise Services
  • VPLS PW Redundancy for Protecting Multicast Services
  • VPLS PW Redundancy for Protecting Unicast Services
  • Application of Multicast VPLS
  • VPWS Accessing VPLS
  • VPLS Multi-Homing Application
  • L2VPN Accessing L3VPN Description
  • Overview of L2VPN Accessing L3VPN
  • Understanding L2VPN Accessing L3VPN
  • L2VPN Accessing L3VPN Fundamentals
  • Classification of L2VPN Accessing L3VPN
  • Application Scenarios for L2VPN Accessing L3VPN
  • VPWS Accessing L3VPN
  • VPLS Accessing L3VPN
  • Terminology for L2VPN Accessing L3VPN
  • EVPN Feature Description
  • Overview of EVPN
  • EVPN Fundamentals
  • EVPN-MPLS
  • EVPN Multi-Homing
  • Fundamentals of EVPN Seamless MPLS
  • EVPN Service Modes
  • EVPN-VXLAN
  • EVPN VXLAN Fundamentals
  • EVPN VPWS
  • EVPN VPWS Fundamentals
  • PBB-EVPN
  • PBB-EVPN Fundamentals
  • Migration from an HVPLS Network to a PBB-EVPN
  • EVPN E-Tree
  • MAC Duplication Suppression for EVPN
  • EVPN ORF
  • IGMP Snooping over EVPN MPLS
  • EVPN Function Enhancements
  • Support for Ring Network Access by EVPN
  • Application Scenarios for EVPN
  • Using EVPN to Interconnect Other Networks
  • EVPN L3VPN HVPN
  • EVPN 6VPE
  • EVPN Interworking Scenarios
  • Inter-AS EVPN Option C
  • DCI Scenarios
  • NFVI Distributed Gateway (SR Tunnels)
  • NFVI Distributed Gateway Function (BGP VPNv4/v6 over E2E SR Tunnels)
  • NFVI Distributed Gateway Function (BGP EVPN over E2E SR Tunnels)
  • Application Scenarios for EVPN E-LAN Accessing L3VPN
  • PBB VPLS Description
  • Overview of PBB VPLS
  • Understanding PBB VPLS
  • PBB VPLS Fundamentals
  • Application Scenarios for PBB VPLS
  • PBB VPLS Application
  • Proactive Loop Detection Description
  • Overview of Proactive Loop Detection
  • Understanding Proactive Loop Detection
  • Proactive Loop Detection
  • Loop Detection Packet Format
  • Application Scenarios for Proactive Loop Detection
  • AC Interface Receiving a Loop Detection Packet
  • PW Side Receiving a Loop Detection Packet
  • QoS
  • About This Document
  • QoS Basic Description
  • Overview of QoS Basic
  • Understanding QoS Basic
  • Overview of DiffServ
  • DiffServ Model
  • DSCP and PHB
  • Components in the DiffServ Model
  • End-to-End QoS Service Models
  • Application Scenarios for QoS Basic
  • QoS Specifications
  • Common QoS Specifications
  • Classification and Marking Description
  • Traffic Classifiers and Traffic Behaviors
  • QoS Priority Fields
  • BA Classification
  • What Is BA Classification
  • QoS Priority Mapping
  • BA and PHB
  • MF Classification
  • What Is MF Classification
  • Traffic Policy Based on MF Classification
  • QPPB
  • Traffic Policing and Traffic Shaping Description
  • Overview of Traffic Policing and Traffic Shaping
  • Traffic Policing
  • Overview of Traffic Policing
  • Token Bucket
  • CAR
  • Application Scenarios for Traffic Policing
  • Traffic Shaping
  • Comparison Between Traffic Policing and Traffic Shaping
  • Congestion Management and Avoidance Description
  • Overview of Congestion Management and Avoidance
  • Traffic Congestion and Solutions
  • Queues and Congestion Management
  • Congestion Avoidance
  • Impact of Queue Buffer on Delay and Jitter
  • HQoS Description
  • Overview of HQoS
  • Understanding HQoS
  • Application Scenarios for HQoS
  • MPLS QoS Description
  • Overview of MPLS QoS
  • MPLS DiffServ
  • MPLS HQoS
  • Understanding MPLS HQoS
  • Application Scenarios for MPLS HQoS
  • Multicast Virtual Scheduling Description
  • Overview of Multicast Virtual Scheduling
  • Understanding Multicast Virtual Scheduling
  • Multicast Virtual Scheduling Fundamentals
  • Application Scenarios for Multicast Virtual Scheduling
  • Typical Single-Edge Network with Multicast Virtual Scheduling
  • Typical Double-Edge Network with Multicast Virtual Scheduling
  • L2TP QoS Description
  • Overview of L2TP QoS
  • Understanding L2TP QoS
  • L2TP QoS Fundamentals
  • Terminology for QoS
  • Security
  • About This Document
  • AAA and User Management Description (Administrative User)
  • Overview of AAA and User Management
  • Understanding AAA and User Management
  • AAA
  • Local Authentication and Authorization
  • HWTACACS
  • RADIUS
  • Domain-based User Management
  • User Group-based and Task Group-based User Management
  • Application Scenarios for AAA and User Management
  • Terminology for AAA and User Management
  • HWTACACS Attribute
  • ARP Security Description
  • Overview of ARP Security
  • Understanding ARP Security
  • Validity Check of ARP Packets
  • Strict ARP Learning
  • ARP Entry Limit
  • ARP Message Rate Limiting
  • ARP Miss Message Rate Limit
  • Gratuitous ARP Packet Discarding
  • Application Scenarios for ARP Security
  • Anti-ARP Spoofing Application
  • Anti-ARP Flood Application
  • Terminology for ARP Security
  • BGP Flow Specification Description
  • Overview of BGP Flow Specification
  • Understanding BGP Flow Specification
  • BGP Flow Specification Fundamentals
  • Understanding BGP VPNv4 Flow Specification
  • Principles of BGP VPNv6 Flow Specification
  • Application Scenarios for BGP Flow Specification
  • Application of BGP Flow Specification on a Network with Multiple Ingresses
  • Application of BGP Flow Specification on a VPN
  • Application of BGP VPNv4 Flow Specification
  • Application of BGP VPNv6 Flow Specification
  • DHCP Snooping Description
  • Overview of DHCP Snooping
  • Understanding DHCP Snooping
  • Basic Concepts of DHCP Snooping
  • Bogus DHCP Server Attack
  • Man-in-the-middle Attack, IP/MAC Spoofing Attack, and DHCP Exhaustion Attack
  • Starvation Attack
  • DHCP DoS Attack by Changing CHADDR
  • Application Scenarios for DHCP Snooping
  • DHCPv6 Snooping
  • Overview of DHCPv6 Snooping
  • Understanding DHCPv6 Snooping
  • Fundamentals of DHCPv6 Snooping
  • IPv6/MAC Spoofing Attacks
  • Association Between ND Probe and DHCPv6 Snooping
  • Applications of DHCPv6 Snooping
  • HIPS Description
  • Overview of HIPS
  • Understanding HIPS
  • Keychain Description
  • Overview of Keychain
  • Understanding Keychain
  • Principles of Keychain
  • Application Scenarios for Keychain
  • Non-TCP Applications of Keychain
  • TCP Applications of Keychain
  • Terminology for Keychain
  • URPF Description
  • Overview of URPF
  • Understanding URPF
  • URPF Fundamentals
  • Application Scenarios for URPF
  • Terminology for URPF
  • MAC Address Limit Description
  • Overview of MAC Address Limit
  • Understanding MAC Address Limit
  • MAC Address Limit Fundamentals
  • Traffic Suppression Fundamentals
  • Application Scenarios for MAC Address Limit
  • Terminology for MAC Address Limit
  • Layer 2 Loop Detection Description
  • Overview of Layer 2 Loop Detection
  • Understanding Layer 2 Loop Detection
  • Layer 2 Loop Detection Fundamentals
  • Terminology for Layer 2 Loop Detection
  • Layer 3 Loop Detection Description
  • Overview of Layer 3 Loop Detection
  • Understanding Layer 3 Loop Detection
  • Layer 3 Loop Detection Fundamentals
  • Terminology for Layer 3 Loop Detection
  • Device Security Description
  • Overview of Device Security
  • Understanding Device Security
  • Fundamentals
  • Application Layer Association
  • Management and Service Plane Protection
  • TCP/IP Attack Defense
  • Local URPF
  • Attack Source Tracing
  • Dynamic Link Protection
  • GTSM
  • TM Multi-Level Scheduling
  • CP-CAR and Host-CAR
  • Whitelist, Blacklist, and Customer-Defined Flow
  • Alarm
  • Application Scenarios for Defense Against Attacks
  • Terminology for Device Security
  • Acronyms and Abbreviations
  • SOC Description
  • Overview of SOC
  • Understanding SOC
  • Architecture
  • SOC Processing
  • Terminology for SOC
  • IPsec Description
  • Introduction to IPsec
  • Application Scenario for IPsec
  • Carrier Scenario
  • Enterprise Scenario
  • IPsec Framework
  • Security Protocol
  • Encapsulation Mode
  • Encryption Algorithm
  • Authentication Algorithm
  • Key Exchange
  • IPsec SA
  • IKEv2 SA Negotiation Process
  • IPsec Packet Processing
  • IPsec DPD
  • IPsec Security
  • IPsec QoS
  • IPsec NAT Traversal
  • Enhanced IPsec Functions
  • Application Scenarios for Extended IPsec
  • GRE over IPsec
  • IPsec Application in the L2VPN or L3VPN Scenario
  • Mirroring Description
  • Overview of Mirroring
  • Understanding Mirroring
  • Fundamentals of Mirroring
  • Application Scenarios for Mirroring
  • SSH Description
  • Overview of SSH
  • Understanding SSH
  • SSH
  • Application Scenarios for SSH
  • Support for STelnet
  • Support for SFTP
  • Support for SCP
  • Support for Private Network Access
  • Support for Server Access Through Other Ports
  • Support for ACLs
  • Support for SNETCONF
  • SSL Description
  • Overview of SSL
  • Understanding SSL
  • SSL
  • Application Scenarios for SSL
  • SSL
  • Obtaining Packet Headers Description
  • Overview of Obtaining Packet Headers
  • Understanding Obtaining Packet Headers
  • Application Scenarios for Obtaining Packet Headers
  • PKI Description
  • Overview of PKI
  • Understanding PKI
  • PKI System
  • Certificate Application
  • Certificate Acquisition
  • CRL
  • CMPv2
  • Application Scenarios for PKI
  • Certificate Application on the IPsec VPN
  • Certificate Attribute-based VPN Access Control
  • Whitelist-based Access Control
  • Management Plane Access Control Description
  • Overview of Management Plane Access Control Description
  • Principles
  • Terminology
  • 802.1X Port-based Authentication Description
  • Overview of 802.1X Access
  • Understanding 802.1X Access
  • Basic Concepts of 802.1X Port-based Authentication
  • 802.1X Port-based Authentication Process
  • Application Scenarios for 802.1x Access
  • Terminology for 802.1X Access
  • Trusted System Description
  • Overview of Trusted System
  • Understanding the Trusted System
  • Digital Signature
  • SELinux
  • Trusted Boot
  • Secure Boot
  • Remote Attestation
  • IMA
  • System Monitor
  • About This Document
  • IP FPM Description
  • Overview of IP FPM
  • Understanding IP FPM
  • IP FPM Basic Concepts
  • Basic Functions
  • Application Scenarios for IP FPM
  • IP FPM Applications on Seamless MPLS
  • IP FPM Applications on IP RANs
  • End-to-End Performance Measurement Scenarios
  • Hop-by-hop Performance Measurement Scenarios
  • Terminology for IP FPM
  • NetStream Description
  • Overview of NetStream
  • Understanding NetStream
  • Basic Functions of NetStream
  • Flow Sampling and Establishment
  • Aging of a Flow
  • Export of a Flow
  • Format Versions of NetStream Packets
  • Packet Exported in V5 Format
  • Packet Exported in V8 Format
  • Packet Exported in V9 Format
  • Packet Exported in IPFIX Format
  • Application Scenarios for NetStream
  • NQA Description
  • Overview of NQA
  • Understanding NQA
  • NQA Overview
  • NQA Detection on an IP Network
  • DNS Test
  • ICMP Test
  • TCP Test
  • UDP Test
  • Path Jitter Test
  • Path MTU Test
  • SNMP Test
  • Trace Test
  • UDP Jitter Test
  • ICMP Jitter Test
  • NQA Detection on a VPN
  • PWE3 Ping Test
  • PWE3 Trace Test
  • VPLS MAC Ping Test
  • VPLS PW Ping/Trace Test
  • NQA Detection on a Layer 2 Network
  • MAC Ping Test
  • NQA Detection on an MPLS Network
  • LSP Ping Test
  • LSP Trace Test
  • LSP Jitter Test
  • RFC 2544 Generalflow Test
  • Y.1564 Ethernet Service Activation Test
  • Terminology for NQA
  • Ping and Tracert Description
  • Overview of Ping and Tracert
  • Understanding Ping and Tracert
  • Ping/Tracert
  • MPLS Ping/Tracert
  • PW Ping/Tracert
  • VPLS MAC Ping
  • EVPN VPLS MAC Ping
  • EVPN VPWS Ping/Tracert
  • CE Ping
  • GMAC Ping/Trace
  • 802.1ag MAC Ping/Trace
  • MTrace
  • BIERv6 Ping/Tracert
  • SRv6 SID Ping and Tracert
  • SRv6 TE Policy Ping and Tracert
  • Telemetry Description
  • Overview of Telemetry
  • Understanding Telemetry
  • Service Process of Static Telemetry Subscription
  • Service process of Telemetry dynamic subscription
  • Key Telemetry Technologies
  • Sampling Data
  • Encoding Format
  • Transport Protocol
  • Understanding gRPC
  • Application Scenarios for Telemetry
  • Telemetry Applications in a Traffic Adjustment Scenario
  • Terminology for Telemetry
  • TWAMP Description
  • Overview of TWAMP
  • Understanding TWAMP
  • Understanding TWAMP
  • TWAMP Implementation Process
  • Application Scenarios for TWAMP
  • TWAMP Applications on an IP Network
  • TWAMP Applications on an L3VPN
  • TWAMP Applications on an L3 VXLAN
  • Terminology for TWAMP
  • TWAMP Light Description
  • Overview of TWAMP Light
  • Understanding TWAMP Light
  • TWAMP Light Fundamentals
  • Communication Model
  • Packet Format
  • Measurement Type
  • Indicators
  • Operation Process of TWAMP Light
  • Application Scenarios for TWAMP Light
  • TWAMP Light Application on an IP Network
  • TWAMP Light application on an IPv6 network
  • TWAMP Light Application on an L3VPN/EVPN L3VPN
  • TWAMP Light Application on a VLL+L3VPN Network
  • TWAMP Light application on an L3 VXLAN
  • TWAMP Light Application in Eth-Trunk Member Interface-based Measurement Scenarios
  • Terminology for TWAMP Light
  • sFlow Description
  • Overview of sFlow
  • Understanding sFlow
  • Application Scenarios for sFlow
  • Terminology for sFlow
  • iFIT Feature Description
  • Overview of iFIT
  • Understanding iFIT
  • iFIT Statistical Model
  • iFIT Measurement Mode
  • iFIT Measurement Metrics
  • iFIT Data Reporting
  • Application Scenarios for iFIT
  • iFIT Applications on an L3VPN
  • iFIT Applications on an HVPN
  • iFIT Applications on an EVPN L3VPN
  • iFIT Applications on an EVPN VPWS
  • iFIT Applications in a Scenario Where Public Network Traffic Enters an SRv6 Tunnel
  • Application of Bidirectional iFIT Flow Instances
  • Application of iFIT Automatic Learning for Dynamic Flows
  • iFIT Applications in an Inter-AS VPN Option A Scenario
  • EMDI Description
  • Overview of EMDI
  • Understanding EMDI
  • RTP Packets
  • Basic Principles of eMDI Detection
  • eMDI Detection Indicators
  • Application Scenarios for EMDI
  • eMDI in Common Layer 3 Multicast Scenarios
  • eMDI in Rosen-MVPN Scenarios
  • eMDI in NG-MVPN Scenarios
  • eMDI in NG-MVPN over BIER Scenarios
  • eMDI in L2VPN Scenarios
  • Terminology for EMDI
  • ESQM Description
  • Overview of ESQM
  • Understanding ESQM
  • Application Scenarios for ESQM
  • Flow Recognition Description
  • Overview of Flow Recognition
  • Understanding Flow Recognition
  • Application Scenarios for Flow Recognition
  • Application of Flow Recognition on a Media Network
  • Intelligent Monitoring Description
  • Overview of Intelligent Monitoring
  • Understanding Intelligent Monitoring
  • Intelligent Resource Trend Prediction
  • Application Scenarios for Intelligent Monitoring
  • Path Detection
  • Overview of Path Detection
  • Principles of Path Detection
  • User Access
  • About This Document
  • AAA and User Management Description (Access User)
  • Overview of AAA and User Management
  • Understanding AAA and User Management
  • AAA
  • User Types
  • RADIUS
  • Diameter
  • BRAS User Management
  • BRAS User Domain Classification
  • Validation Rules for Domain Names
  • Application Scenarios for AAA and User Management
  • Terminology for AAA and User Management
  • IPv4 Address Allocation and Management Description
  • Overview of IPv4 Address Allocation and Management
  • IPv4 Address Allocation
  • Address Allocation Methods for Different Users
  • Principles of DHCPv4 Address Allocation
  • IPv4 Address Management
  • IPv4 Address Management
  • User Route Generation and Advertisement
  • IPv4 Option
  • Option0
  • Option1
  • Option3
  • Option 4
  • Option6
  • Option 7
  • Option12
  • Option 15
  • Option 33
  • Option 43
  • Option44
  • Option 46
  • Option 50
  • Option 51
  • Option53
  • Option54
  • Option55
  • Option 57
  • Option 58
  • Option59
  • Option 60
  • Option 64
  • Option61
  • Option77
  • Option82
  • Option 119
  • Option 120
  • Option121
  • Option 125
  • Option129
  • Option 224-254
  • Option255
  • Dynamic Address Pool
  • Understanding Dynamic Address Pools
  • Dynamic Address Pool Fundamentals
  • Packet Exchanges Involved in Dynamic Address Pool Implementation
  • Application Scenarios for Dynamic Address Pools
  • Terminology for Dynamic Address Pools
  • IPv6 Address Allocation and Management Description
  • Overview of IPv6 Address Allocation and Management
  • IPv6 Address Allocation
  • Fundamentals of DHCPv6 Address Allocation
  • Principles of Stateless Address Autoconfiguration
  • IPv6 Address Management Technology
  • UNR Generation and Advertisement
  • Fundamentals of ND Proxy
  • IPv6 Option
  • Option1
  • Option2
  • Option3
  • Option 4
  • Option5
  • Option6
  • Option7
  • Option9
  • Option11
  • Option12
  • Option13
  • Option14
  • Option15
  • Option16
  • Option17
  • Option18
  • Option19
  • Option20
  • Option23
  • Option24
  • Option 25
  • Option26
  • Option37
  • Option38
  • Option64
  • Option79
  • Option89
  • Option90
  • Option91
  • Option93
  • Option94
  • Option95
  • IPoE Access Description
  • Overview of IPoE Access
  • Overview of IPoEv4 Access
  • Overview of IPoEv6 Access
  • Understanding IPoE Access
  • IPoEv4 Access Fundamentals
  • IPoEv6 Access Fundamentals
  • Web Authentication Process
  • Web+MAC Authentication Process
  • Binding Authentication Process
  • Fast Authentication Process
  • Application Scenarios for IPoE Access
  • Application Scenario for IPoEv4 Access
  • Application Scenario for IPoEv6 Access
  • Terminology for IPoE Access
  • PPPoE Access Description
  • Overview of PPPoE Access
  • Understanding PPPoE Access
  • PPPoE User Login Process
  • PPPoE MTU and MRU Negotiation
  • PPPoE Packet Format
  • Application Scenarios for PPPoE Access
  • PPPoE Application
  • Terminology for PPPoE Access
  • 802.1X Access Description
  • Overview of 802.1X Access
  • Understanding 802.1X Access
  • 802.1X Access Fundamentals
  • Authentication Initiation and User Logoff
  • EAP Packet Relaying and Termination
  • Basic Process of the IEEE 802.1x Authentication System
  • Application Scenarios for 802.1X Access
  • Terminology for 802.1X Access
  • L2TP Access Feature Description
  • Overview of L2TP Access
  • Understanding L2TP Access
  • L2TP Packets
  • L2TP Tunnel Establishment Process
  • L2TP Session Establishment Process
  • L2TP Tunnel Switching
  • Dual-Device Hot Backup on the LAC Side
  • 1:1 Inter-Board Backup on the LNS
  • Application Scenarios for L2TP Access
  • Terminology for L2TP Access
  • User Access Multi-Device Backup Description
  • Overview of User Access Multi-Device Backup
  • User Access Multi-Device Backup Principles
  • Status Control
  • Service Control
  • IPv4 Unicast Service Forwarding Control
  • IPv4 Multicast Forwarding Control
  • IPv6 Unicast Forwarding Control
  • Application Scenarios for User Access Multi-Device Backup
  • Typical Application of User Access Multi-Device Backup
  • Single-Homing Access in a User Access Multi-Device Backup Scenario
  • Load Balancing
  • Multicast Hot Backup
  • User Access Dual-device Hot Backup Configured Together with Value-Added Services
  • Terms, Acronyms, and Abbreviations
  • Appendix: RADIUS Attributes
  • RADIUS Attribute Dictionary
  • Attributes Carried in RADIUS Packets
  • Attributes in RADIUS Access Packets
  • Attributes in RADIUS Accounting Packets
  • Attributes in RADIUS COA&DM Packets
  • RADIUS Attribute Prohibition, Conversion, and Default Carrying Status
  • Description of RADIUS Attributes
  • RADIUS Attributes Defined by RFC
  • User-Name (1)
  • User-Password (2)
  • CHAP-Password (3)
  • NAS-IP-Address (4)
  • NAS-Port (5)
  • Service-Type (6)
  • Framed-Protocol (7)
  • Framed-IP-Address (8)
  • Framed-IP-Netmask (9)
  • Filter-Id (11)
  • Framed-MTU (12)
  • Login-IP-Host (14)
  • Login-Service (15)
  • Reply-Message (18)
  • Callback-Number (19)
  • Framed-Route (22)
  • State (24)
  • Class (25)
  • Vendor-Specific (26)
  • Session-Timeout (27)
  • Idle-Timeout (28)
  • Termination-Action (29)
  • Called-Station-Id (30)
  • Calling-Station-Id (31)
  • NAS-Identifier (32)
  • Proxy-State (33)
  • Acct-Status-Type (40)
  • Acct-Delay-Time (41)
  • Acct-Input-Octets (42)
  • Acct-Output-Octets (43)
  • Acct-Session-Id (44)
  • Acct-Authentic (45)
  • Acct-Session-Time (46)
  • Acct-Input-Packets (47)
  • Acct-Output-Packets (48)
  • Acct-Terminate-Cause (49)
  • Acct-Multi-Session-Id (50)
  • Acct-Input-Gigawords (52)
  • Acct-Output-Gigawords (53)
  • Event-Timestamp (55)
  • CHAP-Challenge (60)
  • NAS-Port-Type (61)
  • Port-Limit (62)
  • Tunnel-Type (64)
  • Tunnel-Medium-Type (65)
  • Tunnel-Client-Endpoint (66)
  • Tunnel-Server-Endpoint (67)
  • Acct-Tunnel-Connection (68)
  • Tunnel-Password (69)
  • Connect-Info (77)
  • Message-Authenticator (80)
  • Tunnel-Private-Group-ID (81)
  • Tunnel-Assignment-ID (82)
  • Tunnel-Preference (83)
  • Acct-Interim-Interval (85)
  • Acct-Tunnel-Packets-Lost (86)
  • NAS-Port-Id (87)
  • Framed-Pool (88)
  • Chargeable-User-Identity (89)
  • Tunnel-Client-Auth-ID (90)
  • Tunnel-Server-Auth-ID (91)
  • NAS-IPv6-Address (95)
  • Framed-Interface-Id (96)
  • Framed-Ipv6-Prefix (97)
  • Framed-Ipv6-Route (99)
  • Framed-Ipv6-Pool (100)
  • Error-Cause (101)
  • Delegated-Ipv6-Prefix (123)
  • Private RADIUS attribute defined by the Huawei RADIUS 1.1 protocol. The attribute number is 26, vendor ID is 2011, and sub-attribute ranges from 1 to 255. For details, see the following:
  • HW-Input-Committed-Burst-Size (1)
  • HW-Input-Committed-Information-Rate (2)
  • HW-Input-Peak-Information-Rate (3)
  • HW-Output-Committed-Burst-Size (4)
  • HW-Output-Committed-Information-Rate (5)
  • HW-Output-Peak-Information-Rate (6)
  • HW-Input-Kilobytes-Before-Tariff-Switch (7)
  • HW-Output-Kilobytes-Before-Tariff-Switch (8)
  • HW-Input-Packets-Before-Tariff-Switch (9)
  • HW-Output-Packets-Before-Tariff-Switch (10)
  • HW-Input-Kilobytes-After-Tariff-Switch (11)
  • HW-Output-Kilobytes-After-Tariff-Switch (12)
  • HW-Input-Packets-After-Tariff-Switch (13)
  • HW-Output-Packets-After-Tariff-Switch (14)
  • HW-Remanent-Volume (15)
  • HW-Tariff-Switch-Interval (16)
  • HW-Subscriber-QoS-Profile (17)
  • HW-Command (20)
  • HW-Priority (22)
  • HW-Connect-ID (26)
  • HW-Portal-URL (27)
  • HW-FTP-Directory (28)
  • HW-Exec-Privilege (29)
  • HW-QOS-Profile-Name (31)
  • HW-SIP-Server (32)
  • HW-User-Password (33)
  • HW-Command-Mode (34)
  • HW-Renewal-Time (35)
  • HW-Rebinding-Time (36)
  • HW-Igmp-Enable (37)
  • HW-NAS-Startup-Time-Stamp (59)
  • HW-IP-Host-Address (60)
  • HW-Up-Priority (61)
  • HW-Down-Priority (62)
  • HW-Tunnel-VPN-Instance (63)
  • HW-User-Date (65)
  • HW-User-Class (66)
  • HW-Subnet-Mask (72)
  • HW-Gateway-Address (73)
  • HW-Lease-Time (74)
  • HW-Ascend-Client-Primary-WINS (75)
  • HW-Ascend-Client-Second-WIN (76)
  • HW-Input-Peak-Burst-Size (77)
  • HW-Output-Peak-Burst-Size (78)
  • HW-Tunnel-Session-Limit (80)
  • HW-Data-Filter (82)
  • HW-Access-Service (83)
  • HW-Accounting-Level (84)
  • HW-Portal-Mode (85)
  • HW-Policy-Route (87)
  • HW-Framed-Pool (88)
  • HW-L2TP-Terminate-Cause (89)
  • HW-Multicast-Profile-Name (93)
  • HW-VPN-Instance (94)
  • HW-Policy-Name (95)
  • HW-Tunnel-Group-Name (96)
  • HW-Multicast-Type (99)
  • HW-Client-Primary-DNS (135)
  • HW-Client-Secondary-DNS (136)
  • HW-Domain-Name (138)
  • HW-HTTP-Redirect-URL (140)
  • HW-Qos-Profile-Type (142)
  • HW-Max-List-Num (143)
  • HW-Acct-ipv6-Input-Octets (144)
  • HW-Acct-ipv6-Output-Octets (145)
  • HW-Acct-ipv6-Input-Packets (146)
  • HW-Acct-ipv6-Output-Packets (147)
  • HW-Acct-ipv6-Input-Gigawords (148)
  • HW-Acct-ipv6-Output-Gigawords (149)
  • HW-DHCPv6-Option37 (150)
  • HW-DHCPv6-Option38 (151)
  • HW-User-Mac (153)
  • HW-DNS-Server-IPv6-Address (154)
  • HW-DHCPv4-Option121 (155)
  • HW-DHCPV4-Option43 (156)
  • HW-Framed-Pool-Group (157)
  • HW-Framed-IPv6-Address (158)
  • HW-Acct-Update-Address (159)
  • HW-NAT-Policy-Name (160)
  • HW-Nat-IP-Address (161)
  • HW-NAT-Start-Port (162)
  • HW-NAT-End-Port (163)
  • HW-NAT-Port-Forwarding (164)
  • HW-Nat-Port-Range-Update (165)
  • HW-DS-Lite-Tunnel-Name (166)
  • HW-PCP-Server-Name (167)
  • HW-Public-IP-Addr-State (168)
  • HW-Auth-Type (180)
  • HW-Acct-terminate-subcause (181)
  • HW-Down-QOS-Profile-Name (182)
  • HW-Port-Mirror (183)
  • HW-Account-Info (184)
  • HW-Service-Info (185)
  • HW-Dhcp-Option (187)
  • HW-Avpair (188)
  • HW-Dhcpv6-Option (189)
  • HW-Delegated-IPv6-Prefix-Pool (191)
  • HW-IPv6-Prefix-Lease (192)
  • HW-IPv6-Address-Lease (193)
  • HW-IPv6-Policy-Route (194)
  • HW-MNG-IPv6 (196)
  • HW-USR-GRP-NAME (251)
  • HW-USER-SRVC_TYPE (252)
  • HW-Web-URL (253)
  • HW-Version (254)
  • HW-Product-ID (255)
  • Private RADIUS attribute defined by Microsoft. The attribute number is 26, vendor ID is 311, and sub-attribute ranges from 1 to 255. For details, see the following:
  • MS-CHAP-Response (1)
  • MS-CHAP-Error (2)
  • MS-CHAP-CPW-2 (4)
  • MS-CHAP-NT-Enc-PW (6)
  • MS-CHAP-Challenge (11)
  • MS-MPPE-Send-Key (16)
  • MS-MPPE-Recv-Key (17)
  • MS-CHAP2-Response (25)
  • MS-CHAP2-Success (26)
  • MS-CHAP2-CPW (27)
  • MS-Primary-DNS-Server (28)
  • MS-Secondary-DNS-Server (29)
  • RADIUS attribute defined by the DSL forum. The attribute number is 26, vendor ID is 3561, and sub-attribute number ranges from 1 to 255. For details, see the following:
  • Agent-Circuit-Id (1)
  • Agent-Remote-Id (2)
  • Actual-Data-Rate-Upstream (129)
  • Actual-Data-Rate-Downstream (130)
  • Minimum-Data-Rate-Upstream (131)
  • Minimum-Data-Rate-Downstream (132)
  • Attainable-Data-Rate-Upstream (133)
  • Attainable-Data-Rate-Downstream (134)
  • Maximum-Data-Rate-Upstream (135)
  • Maximum-Data-Rate-Downstream (136)
  • Minimum-Data-Rate-Upstream-Low-Power (137)
  • Minimum-Data-Rate-Downstream-Low-Power (138)
  • Maximum-Interleaving-Delay-Upstream (139)
  • Actual-Interleaving-Delay-Upstream (140)
  • Maximum-Interleaving-Delay-Downstream (141)
  • Actual-Interleaving-Delay-Downstream (142)
  • Access-Loop-Encapsulation (144)
  • Private RADIUS attribute defined by Redback. The attribute number is 26, vendor ID is 2352, and sub-attribute ranges from 1 to 255. For details, see the following:
  • Forward-Policy (92)
  • BB-Caller-ID (97)
  • NPM-Service-Id (106)
  • HTTP-Redirect-Profile-Name (107)
  • HTTP-Redirect-URL (165)
  • Private RADIUS attribute defined by Ascend (the attribute may conflict with the standard RADIUS attribute). The attribute number is 26, Vendor ID is 3561, and sub-attribute number ranges from 1 to 255. For details, see the following:
  • Ascend-Client-Primary-Dns (135)
  • Ascend-Client-Secondary-Dns (136)
  • RADIUS Attributes Defined by Huawei+1.0 Protocol
  • Remanent-Volume (80)
  • Tariff-Switch-Interval (81)
  • In-Kb-Before-T-Switch (111)
  • Out-Kb-Before-T-Switch (112)
  • In-Pkts-Before-T-Switch (113)
  • Out-Pkts-Before-T-Switch (114)
  • In-Kb-After-T-Switch (115)
  • Out-Kb-After-T-Switch (116)
  • In-Pkts-After-T-Switch (117)
  • Out-Pkts-After-T-Switch (118)
  • Input-Peak-Rate (121)
  • Input-Average-Rate (122)
  • Output-Peak-Rate (124)
  • Output-Average-Rate (125)
  • OnLine-User-Id (127)
  • Connect-port (128)
  • Private RADIUS Attributes Defined by Carrier, Vendor ID 28357 (These Attributes May Conflict with Standard Attributes)
  • CMCC-NAS-Type (201)
  • Cisco-Defined Private Attribute (Vendor ID = 9)
  • CISCO-AVPair (1)
  • RADIUS Server Selection
  • Description for the Attributes of OWN Type
  • Reasons for User Offline
  • More Information About HW-Data-Filter (82)
  • More Information About NAS-Port-Id (87)
  • More Information About HW-Dhcp-Option (187)
  • More Information About HW-Avpair (188)
  • More Information About HW-DHCPv6-Option (189)
  • Appendix: Gx Interface Reference
  • About This Document
  • Description Agreement
  • Description of the Gx Interface
  • Definition of the Gx Interface
  • Functions of the Gx Interface
  • Diameter Protocol Stack on the Gx Interface
  • Message Exchanging on the Gx Interface
  • Description of the Gx Interface Messages
  • Message Format Convention
  • CCR
  • CCA (Credit-Control-Answer)
  • RAR
  • RAA (Re-Auth-Answer)
  • Abort-Session-Request (ASR)
  • Abort-Session-Answer (ASA)
  • Description of Associated AVPs
  • AVP Format Convention
  • Auth-Application-Id AVP
  • CC-Request-Number AVP
  • CC-Request-Type AVP
  • CC-Time AVP
  • CC-Total-Octets AVP
  • Charging-Rule-Definition AVP
  • Charging-Rule-Install AVP
  • Charging-Rule-Name AVP
  • Charging-Rule-Remove AVP
  • Charging-Rule-Report AVP
  • Destination-Host AVP
  • Destination-Realm AVP
  • Error-Message AVP
  • Experimental-Result AVP
  • Experimental-Result-Code AVP
  • Event-Trigger AVP
  • Feature-List AVP
  • Feature-List-ID AVP
  • Framed-IP-Address AVP
  • Framed-IPv6-Prefix AVP
  • Granted-Service-Unit AVP
  • Guaranteed-Bitrate-DL AVP
  • Guaranteed-Bitrate-UL AVP
  • IP-CAN-Type AVP
  • Max-Requested-Bandwidth-DL AVP
  • Max-Requested-Bandwidth-UL AVP
  • Monitoring-Key AVP
  • Origin-Host AVP
  • Origin-Realm AVP
  • Origin-State-Id
  • PCC-Rule-Status AVP
  • QoS-Information AVP
  • Re-Auth-Request-Type AVP
  • Result-Code AVP
  • Rule-Failure-Code AVP
  • Session-Id AVP
  • Session-Release-Cause AVP
  • Subscription-Id AVP
  • Subscription-Id-Data AVP
  • Subscription-Id-Type AVP
  • Supported-Features AVP
  • Termination-Cause
  • Usage-Monitoring-Information AVP
  • Usage-Monitoring-Level AVP
  • Usage-Monitoring-Report AVP
  • Usage-Monitoring-Support AVP
  • User-Equipment-Info AVP
  • User-Equipment-Info-Type AVP
  • User-Equipment-Info-Value AVP
  • Used-Service-Unit AVP
  • Vendor-Id AVP
  • Vendor-Specific-Application-Id AVP
  • X-HW-User-Physical-Info-Value AVP
  • X-HW-MS-Group-Name AVP
  • X-HW-ACL-Group-Name AVP
  • X-HW-Interim-Interval AVP
  • X-HW-Service-Type AVP
  • Synchronization Conventions for Message Processing
  • Session Establishment
  • Response to the RAR Message
  • Error Code of the Gx Interface
  • Compliance Information for Standards
  • Compliance Information of CCR Command
  • Compliance Information of CCA Command
  • Compliance Information of RAR Command
  • Compliance Information of RAA Command
  • Standard Compliance of ASR Messages
  • Standard Compliance of ASA Messages
  • NAT and IPv6 Transition
  • About This Document
  • NAT Description
  • Overview of NAT
  • Understanding NAT
  • Basic NAT Processes
  • NAT Classification
  • NAT Address Pool and Its Conversion Basis
  • NAT Port Allocation
  • NAT Static Source Tracing Algorithm
  • NAT Traffic Diversion
  • NAT Server
  • NAT ALG
  • NAT Security
  • NAT Logging
  • Flow Log Format
  • Flow Syslog Format
  • Flow eLog Format
  • Flow NetStream Log Format
  • Application Scenarios for NAT
  • Typical NAT Deployment Solution for Enterprise Networks
  • NAT Deployment in Outbound Interface Traffic Diversion Mode for Education Network
  • Dual NAT Deployment for Finance Network
  • NAT Easy IP and a GRE Tunnel Sharing an Interface IP Address
  • Terminology for NAT
  • NAT64 Description
  • Overview of NAT64
  • Understanding NAT64
  • Basic NAT64 Concepts
  • NAT64 Port Allocation
  • NAT64 Server
  • NAT64 ALG
  • NAT64 Resource Protection
  • NAT64 Backup
  • NAT64 Logs
  • Application Scenarios for NAT64
  • NAT64 Deployment
  • Terminology for NAT64
  • MAP Description
  • Overview of MAP
  • Understanding MAP-T/MAP-E
  • Basic MAP-T/MAP-E Architecture
  • MAP-T/MAP-E Packet Processing
  • MAP-T/MAP-E Mapping Rules
  • Obtaining MAP-T/MAP-E IPv6 Prefixes
  • IPv4 over IPv6 Tunnel Technology Description
  • Overview of IPv4 over IPv6 Tunnel Technology
  • Understanding IPv4 over IPv6 Tunnel Technology
  • IPv6 over IPv4 Tunnel Technology Description
  • Overview of IPv6 over IPv4 Tunnel Technology
  • Understanding IPv6 over IPv4 Tunnel Technology
  • Value-Added-Service
  • About This Document
  • BOD Description
  • Introduction of BOD
  • Understanding BOD
  • BOD Overview
  • BOD Service Activation and Deactivation
  • BOD Service Quota Management
  • BOD Service Accounting
  • BOD Service Traffic Statistics
  • Application Scenarios for BOD
  • Terminology for BOD
  • DAA Description
  • Overview of DAA
  • Understanding DAA
  • Basic Concepts of DAA
  • DAA Service Accounting
  • DAA Service Policy Switching
  • DAA Service Quota Management
  • Application Scenarios for DAA
  • Typical Usage Scenarios of DAA
  • Terminology for DAA
  • EDSG Description
  • Introduction of EDSG
  • Understanding EDSG
  • Basic Concepts
  • Key EDSG Techniques
  • EDSG Service Activation and Deactivation
  • EDSG Service Replacement and Restoration
  • EDSG Service Policy Obtainment
  • EDSG Service Authentication
  • EDSG Service Accounting
  • Prepaid Quota Management for EDSG Services
  • EDSG Information Query over CoA
  • EDSG Traffic Reporting Frequency
  • Application Scenarios for EDSG
  • Typical EDSG Networking
  • Terminology for EDSG
  • Installation and maintenance
  • Hardware Installation and Maintenance of NetEngine 8000 F1A-8H20Q
  • Hardware Installation and Usage Precautions
  • A66E Cabinet Installation
  • Introduction to the A66E Cabinet
  • Cabinet Accessories
  • (Optional) Cabinet Stand
  • A66E Cabinet Installation
  • Installing the Cabinet on the Concrete Floor
  • Removing the Ground Cables and Cabinet Doors
  • Determining the Installation Position of the Cabinets
  • Installing Expansion Bolts
  • Installing the Cabinet
  • Leveling the cabinet and testing the insulation
  • Attaching the cabinets
  • Installing cabinet doors
  • Installing the Cabinet on the ESD Floor
  • Removing the Ground Cables and Cabinet Doors
  • Determining the Installation Position of the Supports
  • Installing Expansion Bolts
  • Installing Supports
  • Installing the Cabinet
  • Testing the Insulation and Installing the Front Pallet
  • Attaching the Cabinets and Restoring the ESD Floor
  • Installing Cabinet Doors
  • Device Installation Process
  • Preparation before installation
  • Reading Carefully the Safety Precautions
  • Checking the Installation Site
  • Checking the Cabinet
  • Preparing Installation Tools and Accessories
  • Inspecting and Cleaning Optical Fiber Connectors and Adapters
  • Overview
  • Protection of Optical Fiber Connectors
  • Tools, Equipment, and Materials
  • Inspecting Optical Fiber Connectors
  • Inspecting the Optical Fiber Link
  • Cleaning Optical Fiber Connectors Using the Cassette Cleaner
  • Cleaning Optical Fiber Connectors Using Lens Tissue
  • Cleaning Optical Fiber Adapters Using Dustfree Absorbent Swabs
  • Inspection of power distribution environment
  • Introduction to the Power Distribution System
  • DC Power Distribution Guide
  • AC Power Distribution Guide
  • Unpacking a Device
  • Unpacking a Carton
  • Installing a Chassis in Cabinet
  • Cable Routing Planning
  • AC Power Cable Routing Planning
  • DC Power Cable Routing Planning
  • Installation of cables
  • Installing Optical Fibers
  • Installing Network Cables
  • Installing a Cabinet Ground Cable
  • Post-Installation Check
  • Power-on Check
  • (Optional) Checking Optical Power
  • Maintenance of the device
  • Basic Operation Process and Precautions
  • Replacing a power module
  • Replacing the DC Power Module
  • Replacing the AC Power Module
  • Replacing the Fan Module
  • Replacing an Optical Module
  • Replacing an Optical Cable
  • Replacing a Network Cable
  • Appendix
  • On-site Cable Assembly and Installation
  • Cable Assembly Precautions
  • Assembling Power Cables
  • Assembling the OT Terminal and Power Cable
  • Assembling the JG2 Terminal and Power Cable
  • Assembling the Cord End Terminal and Power Cable
  • Assembling an SPC1 Connector and the Power Cable
  • Assembling Ethernet Cables
  • Assembling the Shielded RJ45 Connector and Ethernet Cable
  • Assembling an Unshielded RJ45 Connector and Ethernet Cable
  • Checking the Appearance of Contact Strips
  • Testing the Connection of Assembled Cables
  • Installing Cable Accessories
  • Precautions for Installing Cable Accessories
  • Installing Power Adapters
  • Installing the OT Terminal
  • Installing Ethernet Adapters
  • Installing a Shielded Ethernet Connector
  • Installing an Unshielded Ethernet Connector
  • Installing Fiber Connectors
  • Installing an FC Fiber Connector
  • Installing an LC Fiber Connector
  • Installing an SC Fiber Connector
  • Installing an MTRJ Fiber Connector
  • Installing an MPO Connector
  • Replacing the Mold of the Crimping Tool
  • Environmental Requirements for Device Operation
  • Environmental Requirements for Equipment Room
  • Requirements for Selecting a Site for Equipment Room
  • Equipment Room Layout
  • Construction Requirements for the Equipment Room
  • Equipment Room Environment
  • Requirements for Corrosive Gases
  • Requirements for ESD Prevention
  • Electromagnetism Requirements for the Equipment Room
  • Requirements for Lightning Proof Grounding
  • Requirements for Power Supply
  • Requirements for AC Power Supply
  • Recommendations for AC Power Supply
  • Requirements for DC Power Supply
  • Recommendations for DC Power Supply
  • Equipment Grounding Specifications
  • General Grounding Specifications
  • Grounding Specifications for Equipment Room
  • Grounding Specifications for Devices
  • Grounding Specifications for Communications Power Supply
  • Grounding Specifications for Signal Cables
  • Specifications for Laying Out Grounding Cables
  • Engineering Labels for Cables
  • Introduction to Labels
  • Label Materials
  • Type and Structure
  • Label Printing
  • Writing Labels
  • Attaching Labels
  • Contents of Engineering Labels
  • Precautions for Using Engineering Labels
  • Engineering Labels for Optical Fibers
  • Labels for the Optical Fibers Connecting Devices
  • Labels for the Optical Fibers Connecting the Device and an ODF
  • Engineering Labels for Network Cables
  • Engineering Labels for User Cables
  • Engineering Labels for Power Cables
  • Engineering Labels for DC Power Cables
  • Engineering Labels for AC Power Cables
  • Hardware Installation and Maintenance of NetEngine 8000 F2A-8K36H
  • Hardware Installation and Usage Precautions
  • A610 Cabinet Installation
  • Introduction to the A610 Cabinet
  • Cabinet Accessories
  • (Optional) Cabinet Stand
  • Cabinet Installation
  • Installing Cabinets on an ESD Floor
  • Perspective View After Installation
  • Installation Tools
  • Installation Procedure
  • Pre-installation Check
  • Assembling the Cabinet Stand
  • Positioning the Cabinet Stand
  • Positioning a Single Cabinet Stand (for Installation of One Cabinet)
  • Positioning Cabinet Stands Side by Side (for Installation of Two or More Cabinets)
  • Drilling Holes
  • Installing Expansion Bolts
  • Installing the Cabinet Stand
  • Installing a Single Cabinet Stand (for Installation of One Cabinet)
  • Installing Cabinet Stands Side by Side (for Installation of Two or More Cabinets)
  • Placing the Cabinet
  • Leveling the Cabinet
  • (Optional) Combining Cabinets
  • Securing the Cabinet
  • Testing the Insulation Performance
  • Installing Supporting Brackets on the Stand
  • Installing Cabinets on a Concrete Floor
  • Perspective View After Installation
  • Installation Tools
  • Installation Procedure
  • Pre-installation Check
  • Marking Mounting Holes
  • Drilling Holes
  • Installing Expansion Bolts
  • Placing the Cabinet
  • Leveling the Cabinet
  • (Optional) Combining Cabinets
  • Securing the Cabinet
  • Testing the Insulation Performance
  • Connecting PGND Cables
  • Device Installation Process
  • Preparation before the installtion
  • Reading Carefully the Safety Precautions
  • Checking the Installation Site
  • Checking the Cabinet
  • Preparing Installation Tools and Accessories
  • Inspecting and Cleaning Optical Fiber Connectors and Adapters
  • Overview
  • Protection of Optical Fiber Connectors
  • Tools, Equipment, and Materials
  • Inspecting Optical Fiber Connectors
  • Inspecting the Optical Fiber Link
  • Cleaning Optical Fiber Connectors Using the Cassette Cleaner
  • Cleaning Optical Fiber Connectors Using Lens Tissue
  • Cleaning Optical Fiber Adapters Using Dustfree Absorbent Swabs
  • Inspection of Power Distribution Environment
  • Introduction to the Power Distribution System
  • DC Power Distribution Guide
  • AC Power Distribution Guide
  • Unpacking a Device
  • Installing a chassis in a Cabinet
  • Cable Routing Planning
  • Installation of cables
  • Installing Optical Fibers
  • Installing Network Cables
  • Installing a Cabinet Ground Cable
  • Post-Installation Check
  • Power-on Check
  • Maintenance of the device
  • Basic Operation Process and Precautions
  • Replacing a power module
  • Replacing the DC Power Module
  • Replacing the AC Power Module
  • Replacing the Fan Module
  • Replacing an Optical Module
  • Replacing an Optical Cable
  • Replacing a Network Cable
  • Appendix
  • Environmental Requirements for Device Operation
  • Environmental Requirements for Equipment Room
  • Requirements for Selecting a Site for Equipment Room
  • Equipment Room Layout
  • Construction Requirements for the Equipment Room
  • Equipment Room Environment
  • Requirements for Corrosive Gases
  • Requirements for ESD Prevention
  • Electromagnetism Requirements for the Equipment Room
  • Requirements for Lightning Proof Grounding
  • Requirements for Power Supply
  • Requirements for AC Power Supply
  • Recommendations for AC Power Supply
  • Requirements for DC Power Supply
  • Recommendations for DC Power Supply
  • On-site Cable Assembly and Installation
  • Cable Assembly Precautions
  • Assembling Power Cables
  • Assembling the OT Terminal and Power Cable
  • Assembling the JG2 Terminal and Power Cable
  • Assembling the Cord End Terminal and Power Cable
  • Installing Power Cables in a Dual-DC Connector
  • Assembling Ethernet Cables
  • Assembling the Shielded RJ45 Connector and Ethernet Cable
  • Assembling an Unshielded RJ45 Connector and Ethernet Cable
  • Checking the Appearance of Contact Strips
  • Testing the Connection of Assembled Cables
  • Installing Cable Accessories
  • Precautions for Installing Cable Accessories
  • Installing Power Adapters
  • Installing the OT Terminal
  • Installing Ethernet Adapters
  • Installing a Shielded Ethernet Connector
  • Installing an Unshielded Ethernet Connector
  • Installing Fiber Connectors
  • Installing an FC Fiber Connector
  • Installing an LC Fiber Connector
  • Installing an SC Fiber Connector
  • Installing an MTRJ Fiber Connector
  • Installing an MPO Connector
  • Replacing the Mold of the Crimping Tool
  • Equipment Grounding Specifications
  • General Grounding Specifications
  • Grounding Specifications for Equipment Room
  • Grounding Specifications for Devices
  • Grounding Specifications for Communications Power Supply
  • Grounding Specifications for Signal Cables
  • Specifications for Laying Out Grounding Cables
  • Engineering Labels for Cables
  • Introduction to Labels
  • Label Materials
  • Type and Structure
  • Label Printing
  • Writing Labels
  • Attaching Labels
  • Contents of Engineering Labels
  • Precautions for Using Engineering Labels
  • Engineering Labels for Optical Fibers
  • Labels for the Optical Fibers Connecting Devices
  • Labels for the Optical Fibers Connecting the Device and an ODF
  • Engineering Labels for Network Cables
  • Engineering Labels for User Cables
  • Engineering Labels for Power Cables
  • Engineering Labels for DC Power Cables
  • Engineering Labels for AC Power Cables
  • License Guide
  • Configuration
  • Basic Configuration
  • About This Document
  • First-Login Configuration
  • Overview of First Login
  • Configuration Precautions for First Login
  • Logging In to a Device Through a Console Port
  • Establishing a Physical Connection
  • Logging In to a Device
  • Logging In to a Device Through the Management Network Port
  • Performing Batch Device Deployment Through the Plug-and-Play Function
  • Command Line Interface Configuration
  • CLI Overview
  • Configuration Precautions for CLI
  • Establishing a Command Line Running Environment
  • Configuring Header Information
  • Configuring a Device Name
  • Configuring Command Levels
  • Locking a User Interface
  • Configuring the System to Allow the Execution of User-View Commands in the System View
  • (Optional) Configuring the Command Timestamp Function
  • How to Use the CLI
  • Entering a Command View
  • Editing a Command
  • Verifying the Command Line Configuration
  • Checking the Diagnostic Information
  • Command Display Mode
  • Error Messages
  • Configuring an Alias for a Command
  • Intelligent Rollback
  • How to Obtain Command Help
  • How to Use Shortcut Keys
  • Classification of Shortcut Keys
  • Defining Shortcut Keys
  • Displaying Shortcut Keys and Their Functions
  • Configuring the Session Log Function
  • Configuration Examples for Command Lines
  • Example for Using Tab
  • Example for Defining Shortcut Keys
  • User Interface Configuration
  • Overview of User Interfaces
  • Configuration Precautions for User Interface
  • Configuring a Console User Interface
  • Configuring Physical Attributes for the Console User Interface
  • Configuring Terminal Attributes for the Console User Interface
  • Configuring a User Level for the Console User Interface
  • Configuring an Authentication Mode for the Console User Interface
  • Verifying the Configuration of the Console User Interface
  • Configuring VTY User Interfaces
  • Configuring the Maximum Number of VTY User Interfaces
  • Configuring the Limit on Incoming and Outgoing Calls for a VTY User Interface
  • Configuring Terminal Attributes for a VTY User Interface
  • Configuring a User Level for a VTY User Interface
  • Configuring an Authentication Mode for a VTY User Interface
  • Configure an Alarm Threshold for the Number of Available VTY Channels
  • Enabling the VTY User Interface's Security Policy
  • Verifying the Configuration of VTY User Interfaces
  • Configuration Examples for User Interfaces
  • Example for Configuring the Console User Interface
  • Example for Configuring VTY User Interfaces
  • User Login Configuration
  • Overview of User Login
  • Configuration Precautions for User Login
  • Configuring Login Through a Console Port
  • Logging In to a Router Through a Console Port
  • (Optional) Configuring the Console User Interface
  • Verifying the Configuration of Logging In to the System Through the Console Port
  • Configuring a User to Log In Through Telnet
  • Configuring a User Level and Authentication Mode for the VTY User Interface
  • Enabling the Telnet Server Function
  • Using Telnet to Log In to the System
  • Configuring Telnet Server Parameters
  • (Optional) Configuring CAR for Whitelisted Telnet Sessions
  • (Optional) Configuring Telnet Access Control
  • (Optional) Enabling the IP Address Blocking Function for Telnet Connections
  • (Optional) Configuring Alarm Generation and Clearance Thresholds for Telnet Server Login Failures
  • (Optional) Configuring the Maximum Number of Connections for Telnet Login to the Server Using a Single IP Address
  • Verifying the Configuration of User Login to the System Using Telnet
  • Configuring STelnet Login
  • Configuring a User Level and Authentication Mode for VTY User Interfaces
  • Configuring VTY User Interfaces to Support SSH
  • Configuring an SSH User and Specifying a Service Type
  • Enabling the STelnet Server Function
  • Using STelnet to Log In to a Server
  • Configuring STelnet Server Parameters
  • (Optional) Configuring CAR for Whitelisted SSH Sessions
  • (Optional) Configuring Alarm Generation and Clearance Thresholds for SSH Server Login Failures
  • (Optional) Configuring the Maximum Number of Connections for SSH Login to the Server Using a Single IP Address
  • (Optional) Configuring the Local Port Forwarding Service for the SSH Server
  • Configuring the Keyboard-Interactive Authentication Mode for an SSH Server
  • Setting Criteria for SSH Session Key Re-negotiation
  • Verifying the Configuration of User Login to the System Using STelnet
  • Configuration Examples for User Login
  • Example for Configuring Login Through a Console Port
  • Example for Configuring Telnet Login for an IPv4 User
  • Example for Configuring Telnet Login for an IPv6 User
  • Example for Configuring STelnet Login for an IPv4 User
  • Example for Configuring STelnet Login for an IPv6 User
  • Example for Configuring an NMS to Communicate with a Device by SSH over a VPN
  • File System Configuration
  • Overview of File System Management
  • Configuration Precautions for File System Management
  • Operating Files After Logging In to a Device
  • Managing Directories
  • Managing Files
  • Using FTP to Operate Files
  • Configuring a Local FTP User
  • (Optional) Specifying a Listening Port Number for the FTP Server
  • Enabling the FTP Server Function
  • Configuring FTP Server Parameters
  • (Optional) Configuring CAR for Whitelisted FTP Sessions
  • (Optional) Configuring FTP Access Control
  • (Optional) Configuring the IP Address Locking Function
  • Using FTP to Access a Device
  • Using FTP Commands to Operate Files
  • Verifying the Configuration of Using FTP to Operate Files
  • Using SFTP to Operate Files
  • Configuring an SSH User and Specifying a Service Type
  • Enabling the SFTP Service
  • Configuring SFTP Server Parameters
  • (Optional) Configuring CAR for Whitelisted SSH Sessions
  • Configuring an Authorized SFTP Server Directory
  • Using SFTP to Log In to the System
  • Using SFTP Commands to Operate Files
  • Verifying the Configuration of SFTP-based File Operations
  • Using HTTPS to Download Files
  • Configuration Examples for File System Management
  • Example for Managing Files After Logging In to the System
  • Example for Operating Files After Logging In to the System
  • Example for Using FTP to Operate Files
  • Example for Using SFTP to Operate Files
  • Example for Using SFTP IPv6 to Operate Files
  • Configuration Management Configuration
  • Overview of Configuration Management
  • Configuration Precautions for Configuration Management
  • Configuring a Validation Mode
  • Configuring the Immediate Validation Mode
  • Configuring the Two-Phase Validation Mode
  • Disabling the Re-confirmation Function
  • Performing Configuration Rollback
  • Configuring or Deleting the Configuration Rollback Point Generated Periodically
  • Performing Configuration Rollback
  • Managing Configuration Files
  • Default Configuration File
  • Setting a Default Configuration File for the Startup with Base Configuration
  • Saving Configurations
  • Comparing Configuration Files
  • Loading Configuration Files
  • Specifying the Configuration File to Be Loaded at the Next Startup
  • Clearing a Configuration File
  • Enabling Automatic Database Information Verification
  • Locking the System Configuration
  • Using a Configuration Template to Deliver Configurations
  • Viewing the Difference Between the Candidate Configuration and Current Running Configuration
  • Verifying the Configuration of Configuration File Management
  • Configuration Replacement
  • Replacing Configurations
  • Pasting Differential Configurations
  • Replacing Characters
  • Configuration Examples for Configuration Management
  • Example for Configuring Services in Immediate Validation Mode
  • Example for One User to Configure Services After Another User Locks Configurations in Two-Phase Validation Mode
  • Example for Multiple Users to Perform the Same Configuration for a Service in Two-Phase Validation Mode
  • Example for Multiple Users to Perform Different Configurations for a Service in Two-Phase Validation Mode
  • Example for Multiple Users to Configure Different Services in Two-Phase Validation Mode
  • Example for Configuration Rollback
  • Example for Managing Configuration Files
  • Accessing Other Devices Configuration
  • Overview of Accessing Other Devices
  • Configuration Precautions for Accessing Other Devices
  • Using Telnet to Log In to Other Devices
  • (Optional) Configuring a Source Address for the Telnet Client
  • Using Telnet to Log In to Other Devices
  • Verifying the Configuration of Using Telnet to Log In to Other Devices
  • Using STelnet to Log In to Other Devices
  • Configuring First Login to the SSH Server (Enabling First Login on the SSH Client)
  • Configuring First Login to the SSH Server (Configuring the SSH Client to Assign the Public Key to the SSH Server)
  • (Optional) Configuring the Keepalive Feature on the SSH Client
  • Using STelnet to Log In to Other Devices
  • Verifying the Configuration of Using STelnet to Log In to Other Devices
  • Using TFTP to Access Other Devices
  • Configuring a Source Address for a TFTP Client
  • Configuring TFTP Access Control
  • Using TFTP to Download Files from Other Devices
  • Using TFTP to Upload Files to Other Devices
  • Verifying the Configuration of Using TFTP to Access Other Devices
  • Using FTP to Access Other Devices
  • (Optional) Configuring a Source Address for an FTP Client
  • Using FTP to Connect an FTP Client to Other Devices
  • Using FTP Commands to Operate Files
  • (Optional) Changing a Login User Role
  • Ending a Connection to the FTP Server
  • Verifying the Configuration of Using FTP to Access Other Devices
  • Using SFTP to Access Other Devices
  • (Optional) Configuring a Source Address for the SFTP Client
  • Configuring First Login to the SSH Server (Enabling First Login on the SSH Client)
  • Configuring First Login to the SSH Server (Configuring the SSH Client to Assign the Public Key to the SSH Server)
  • Using SFTP to Log In to Other Devices
  • Using SFTP Commands to Operate Files
  • Verifying the Configuration of Using SFTP to Access Other Devices
  • Configuring the SFTP Client to Use the One-click File Operation Command to Perform File Operations
  • Using SCP to Access Other Devices
  • Configuring the SCP Server
  • Configuring the SCP Client
  • Verifying the Configuration of Using SCP to Access Other Devices
  • Configuring an SSL Cipher Suite
  • Configuring and Binding an SSL Policy
  • Logging In to a Device Using HTTP
  • Configuring a DSCP Value for Telnet/SSH Packets
  • Configuration Examples for Accessing Other Devices
  • Example for Using Telnet to Log In to Other Devices
  • Example for Using STelnet to Log In to Other Devices (RSA Authentication Mode)
  • Example for Using STelnet to Log In to Other Devices (DSA Authentication Mode)
  • Example for Using STelnet to Log In to Other Devices (ECC Authentication Mode)
  • Example for Using STelnet to Log In to Other Devices (SM2 Authentication Mode)
  • Example for Using TFTP to Access Other Devices
  • Example for Using FTP to Access Other Devices
  • Example for Using SFTP to Log In to Other Devices (RSA Authentication Mode)
  • Example for Using SFTP to Log In to Other Devices (DSA Authentication Mode)
  • Example for Using SFTP to Log In to Other Devices (ECC Authentication Mode)
  • Example for Using SFTP to Log In to Other Devices (SM2 Authentication Mode)
  • Example for Using a Non-default Listening Port Number to Access the SSH Server
  • Example for Configuring SSH Clients on the Public Network to Access an SSH Server on a Private Network
  • Example for Using SCP to Access Files on Other Devices
  • Example for Configuring HTTP for Device Login
  • ZTP Configuration
  • Overview of ZTP
  • Configuration Precautions for ZTP
  • Configuring Automatic ZTP Deployment Through DHCP
  • Editing an Intermediate File
  • Configuring a DHCPv4 Server and Relay Agent
  • Configuring a DHCPv6 Server and Relay Agent
  • Configuring a File Server
  • Powering on the Device
  • (Optional) Uploading a Pre-Configuration Script
  • Enabling ZTP
  • Verifying the ZTP Configuration
  • Configuration Examples for ZTP
  • Example for Configuring Automatic Deployment Through DHCP
  • SZTP Configuration
  • Overview of SZTP
  • Configuration Precautions for SZTP
  • Configuring DHCP-based Automatic SZTP Deployment
  • Configuring a DHCPv4 Server and a DHCPv4 Relay Agent
  • Configuring a Bootstrap Server
  • Configuring a Version File Server
  • Powering On a Device
  • (Optional) Loading a Pre-Configuration Script
  • Enabling the SZTP Function
  • Verifying the Configuration
  • Example for Configuring SZTP
  • System Management
  • About This Document
  • VS Configuration
  • Overview of VSs
  • Configuration Precautions for VS
  • Managing VSs by a PS Administrator
  • Creating a VS
  • Configuring Hardware Resources for the VS
  • (Optional) Configuring Logical Resources for the VS
  • (Optional) Switching a VS
  • Verifying the VS Configuration
  • Maintaining VSs
  • Resetting a VS
  • Configuration Examples for VSs
  • Example for Creating VSs
  • LAD Configuration
  • Overview of LAD
  • Configuration Precautions for LAD
  • Configuring LAD
  • Maintaining LAD
  • Deleting LAD Neighbor Information
  • Deleting LAD Alarms in the Trap Buffer
  • Configuration Examples for LAD
  • Example for Configuring LAD
  • LLDP Configuration
  • Overview of LLDP
  • Configuration Precautions for LLDP
  • Configuring Basic LLDP Functions
  • Enabling LLDP
  • (Optional) Configuring an LLDP Management IP Address
  • (Optional) Configuring Types of TLVs Allowed to Be Advertised by LLDP
  • (Optional) Optimizing LLDP Performance
  • Verifying the Configuration of Basic LLDP Functions
  • Configuring the LLDP Alarm Function
  • Enabling the LLDP Alarm Function
  • (Optional) Configuring a Delay for Sending LLDP Alarms
  • Verifying the Configuration of the LLDP Alarm Function
  • Maintaining LLDP
  • Clearing LLDP Statistics
  • Monitoring LLDP Status
  • Configuration Examples for LLDP
  • Example for Configuring Basic LLDP Functions
  • NTP Configuration
  • Overview of NTP
  • Configuration Precautions for NTP
  • Configuring Basic NTP Functions
  • Configuring the NTP Master Clock and Listening Interfaces
  • Configuring the Time Interval to Update Client Clock and Maximum NTP Synchronization Distance Threshold
  • (Optional) Configuring the Client/Server Mode
  • (Optional) Configuring the Peer Mode
  • (Optional) Configuring the Broadcast Mode
  • (Optional) Configuring the Multicast Mode
  • (Optional) Configuring the Manycast Mode
  • (Optional) Disabling the Interface From Receiving NTP Packets
  • Enabling the NTP Service Function
  • Verifying the Configuration of Basic NTP Functions
  • Configuring NTP Security Mechanisms
  • Setting NTP Access Authorities
  • Enabling NTP Authentication
  • (Optional) Configuring NTP Authentication in Unicast Server/Client Mode
  • (Optional) Configuring NTP Authentication in Peer Mode
  • (Optional) Configuring NTP Authentication in Broadcast Mode
  • (Optional) Configuring NTP Authentication in Multicast Mode
  • (Optional) Configuring NTP Authentication in Manycast Mode
  • Verifying the NTP Security Configuration
  • Configuring the System Clock
  • Configuring KOD
  • Configuring KOD on a Server
  • Verifying the KOD Configuration
  • Maintaining NTP
  • Monitoring the NTP Operating Status
  • Configuration Examples for NTP
  • Example for Configuring NTP Authentication in Client/Server Mode
  • Example for Configuring NTP Peer Mode
  • Example for Configuring NTP Authentication in Broadcast Mode
  • Example for Configuring the NTP Multicast Mode
  • Example for Configuring the Manycast Mode
  • Example for Configuring KOD in Unicast Client/Server Mode
  • OPS Configuration
  • Overview of OPS
  • Configuration Precautions for OPS
  • Manually Running a Python Script
  • Configuring a Command Assistant
  • Configuring a Command Assistant Based on Commands
  • Configuring a Command Assistant Based on Batch Files
  • Verifying the Command Assistant Configuration
  • Configuring a Script Assistant
  • Maintaining OPS
  • Stopping an OPS Task
  • Stopping an Assistant
  • Disabling the Maintenance Assistant Function
  • Uninstalling a Script or Batch File
  • Disabling the MTP Function for Maintenance Assistants
  • Configuration Examples for OPS
  • Example for Configuring an Assistant for Automatic Health Check (Using Commands)
  • Example for Configuring an Assistant for Automatic Health Check (Using a Python Script)
  • Physical Layer Clock Synchronization Configuration
  • Overview of Clock Synchronization
  • Configuration Precautions for Physical Layer Clock Synchronization
  • Configuring the Automatic Clock Source Selection Mode
  • Configuring a Clock Source
  • (Optional) Configuring Parameters for Automatic Clock Source Selection
  • Configuring the Automatic Clock Source Selection Mode and Reference Factors
  • Verifying the Configuration of the Automatic Clock Source Selection Mode
  • Configuring the Manual or Forcible Clock Source Selection Mode
  • Configuring a Clock Source
  • Configuring the Manual or Forcible Clock Source Selection Mode
  • Verifying the Configuration of the Manual or Forcible Clock Source Selection Mode
  • Maintaining Clock Synchronization
  • Configuration Examples for Clock Synchronization
  • Example for Configuring Clock Synchronization on a Ring Network
  • Example for Configuring Hybrid Network Clock Synchronization
  • 1588v2 Configuration
  • Overview of 1588v2
  • Configuration Precautions for 1588v2
  • Configuring Dynamic 1588v2 Functions
  • Importing Time Signals from an External BITS Source
  • Configuring Clock Source Attributes for BMC Selection
  • Globally Enabling 1588v2
  • (Optional) Enabling the Control of Access to 1588v2 Clock Sources
  • (Optional) Monitoring the Performance of a Passive Interface
  • Enabling 1588v2 on a Specific Interface
  • (Optional) Configuring Time Attributes for 1588v2 Packets
  • (Optional) Configuring a 1588v2 Packet Encapsulation Mode
  • Verifying the Configuration of Dynamic 1588v2 Functions
  • Configuring Static 1588v2 Functions
  • Importing Time Signals from an External BITS Source
  • Globally Enabling 1588v2
  • (Optional) Monitoring the Performance of a Passive Interface
  • Enabling 1588v2 on a Specific Interface
  • Specifying the 1588v2 Interface Status
  • (Optional) Configuring Time Attributes for 1588v2 Packets
  • (Optional) Configuring a 1588v2 Packet Encapsulation Mode
  • Verifying the Configuration of Static 1588v2 Functions
  • Configuring UTC Time Correction
  • Configuring the Reference Interface for Deviation Measurement
  • (Optional) Configuring Lightweight Time Synchronization
  • Maintaining 1588v2
  • Clearing 1588v2 Statistics
  • Monitoring the 1588v2 Operating Status
  • Configuring the Time Synchronization Alarm Function
  • Configuration Examples for 1588v2
  • Example for Configuring the Unicast UDP Encapsulation Mode for 1588v2 Packets to Implement Network-wide Clock Synchronization
  • Example for Configuring the Multicast MAC Encapsulation Mode for 1588v2 Packets to Implement Network-wide Clock Synchronization
  • CU-106 Configuration
  • Overview
  • Configuration Precautions for CU-106
  • Configuring CU-106
  • Configuring a BITS Source as the T-GM
  • Configuring Clock Source Attributes for BMC Selection
  • Globally Enabling CU-106
  • (Optional) Configuring the Time Synchronization Alarm Function
  • Configuring CU-106 on an Interface
  • Configuring Time Attributes for CU-106 Packets
  • Configuring Encapsulation Modes for CU-106 Packets
  • Verifying the Configuration of CU-106
  • G.8275.1 Configuration
  • Overview of G.8275.1
  • Configuration Precautions for G.8275.1
  • Configuring G.8275.1
  • Configuring a BITS Source As the T-GM
  • Configuring Clock Source Attributes for BMC Selection
  • Globally Configuring G.8275.1
  • (Optional) Configuring the Time Synchronization Alarm Function
  • Configuring G.8275.1 on an Interface
  • Configuring Time Attributes for G.8275.1 Packets
  • Configuring Encapsulation Modes for G.8275.1 Packets
  • Verifying the G.8275.1 Configuration
  • Configuration Examples for G.8275.1
  • Example for Configuring the Multicast MAC Encapsulation Mode for G.8275.1 Packets to Achieve Network-wide Time Synchronization
  • 1588 ACR Configuration
  • Overview of 1588 ACR
  • Configuration Precautions for 1588 ACR
  • Configuring 1588 ACR in Single-Server Mode
  • Configuring the Unicast Negotiation Function for a Client
  • Configuring the Unicast Negotiation Function for a Server
  • (Optional) Adjusting Parameters for Establishing a Unicast Negotiation Connection
  • Verifying the Configuration of 1588 ACR
  • Configuration Examples for 1588 ACR
  • Example for Configuring 1588 ACR Clock Synchronization in a Single-Server Scenario
  • Example for Configuring 1588 ACR Clock Synchronization in a Dual-Server Scenario
  • 1588 ATR Configuration
  • Overview of 1588 ATR
  • Configuration Precautions for 1588 ATR
  • Configuring 1588 ATR Time Synchronization
  • Configuring the Unicast Negotiation Function for a Client
  • Configuring Unicast Negotiation on a 1588 ATR Server
  • (Optional) Adjusting Unicast Negotiation Parameters
  • (Optional) Configuring Lightweight Time Synchronization
  • Configuring Time Synchronization in Server-and-Client Mode
  • Verifying the Configuration
  • Maintaining 1588 ATR
  • Clearing 1588 ATR Statistics
  • Configuration Examples for 1588 ATR
  • Example for Configuring 1588 ATR Transparent Transmission Time Synchronization in a Dual-Server Scenario
  • Example for Configuring 1588 ATR Client Hop-by-Hop Time Synchronization
  • Example for Configuring 1588 ATR Time Synchronization in Server-and-Client Mode
  • Atom GPS Timing Configuration
  • Overview of Atom GPS
  • Configuration Precautions for Atom GPS
  • Configuring the SyncE Function
  • Configuring the SyncE Function on an Atom GPS Module
  • Configuring the SyncE Function on the Device Where an Atom GPS Module Houses
  • Verifying the Configuration
  • Configuring the Time Synchronization Function
  • Configuring the Time Synchronization Function on an Atom GPS Module
  • Configuring the 1588v2 Synchronization Function on the Device Where an Atom GPS Module Houses
  • Configuring the G.8275.1 Synchronization Function on the router Where an Atom GPS Module Houses
  • Verifying the Configuration
  • Maintaining Atom GPS
  • Resetting an Atom GPS Module
  • Enabling Self-healing of an Atom GPS Module
  • Configuration Examples for Atom GPS
  • Example for Configuring Atom GPS Timing
  • Atom GNSS Timing Configuration
  • Overview of Atom GNSS
  • Configuration Precautions for Atom GNSS Timing
  • Configuring the SyncE Function
  • Configuring the SyncE Function on an Atom GNSS Module
  • Configuring the SyncE Function on the Device Where an Atom GNSS Module Houses
  • Verifying the Configuration
  • Configuring the Time Synchronization Function
  • Configuring the Time Synchronization Function on an Atom GNSS Module
  • Configuring the 1588v2 Synchronization Function on the router Where an Atom GNSS Module Houses
  • Configuring the G.8275.1 Synchronization Function on the router Where an Atom GNSS Module Houses
  • Checking the Configurations
  • Maintaining Atom GNSS
  • Resetting an Atom GNSS Module
  • Enabling Self-healing of an Atom GNSS Module
  • Configuration Examples for Atom GNSS
  • Example for Configuring Atom GNSS Timing
  • SMPTE-2059-2 Configuration
  • Overview of SMPTE-2059-2
  • Configuration Precautions for SMPTE-2059-2
  • Configuring SMPTE-2059-2
  • Importing Time Signals from an External BITS Source
  • Configuring Clock Source Attributes for Dynamic BMC Selection
  • Globally Enabling SMPTE-2059-2
  • (Optional) Configuring Access Control for SMPTE-2059-2 Clock Sources
  • (Optional) Monitoring the Performance of a Passive Interface
  • Enabling SMPTE-2059-2 on an Interface
  • (Optional) Configuring Time Attributes for SMPTE-2059-2 Packets
  • (Optional) Configuring an SMPTE-2059-2 Packet Encapsulation Mode
  • Verifying the SMPTE-2059-2 Configuration
  • SNMP Configuration
  • Overview of SNMP
  • Configuration Precautions for SNMP
  • Configuring a Device to Communicate with an NMS Using SNMPv1
  • Configuring Basic SNMPv1 Functions
  • (Optional) Controlling the NMS's Access to the Device
  • (Optional) Configuring the Trap Function
  • (Optional) Configuring SNMP Anti-Attack
  • Verifying the Configuration for a Device to Communicate with an NMS Using SNMPv1
  • Configuring a Device to Communicate with an NMS Using SNMPv2c
  • Configuring Basic SNMPv2c Functions
  • (Optional) Controlling the NMS's Access to the Device
  • (Optional) Configuring the Trap Function
  • (Optional) Configuring the Inform Function
  • (Optional) Configuring SNMP Anti-Attack
  • Verifying the Configuration for a Device to Communicate with an NMS Using SNMPv2c
  • Configuring a Device to Communicate with an NMS Using SNMPv3 USM User
  • Configuring Basic SNMPv3 Functions
  • (Optional) Controlling the NMS's Access to the Device
  • (Optional) Configuring the Trap Function
  • (Optional) Configuring the Inform Function
  • (Optional) Configuring SNMPv3 Anti-Attack
  • Verifying the Configuration for a Device to Communicate with an NMS Using SNMPv3 USM User
  • Configuring a Local SNMPv3 User on a Device to Communicate with an NMS
  • Configuring Basic SNMPv3 Functions
  • (Optional) Configuring SNMP Anti-Attack
  • Verifying the Configuration for a Local SNMPv3 User on a Device to Communicate with an NMS
  • Configuring SNMP Proxy Using User-Defined Parameter Settings
  • Configuring the Middle-Point Device
  • Configuring the Managed Device
  • Verifying the Configuration of SNMP Proxy Using User-Defined Parameter Settings
  • Configuration Examples for SNMP
  • Example for Configuring a Device to Communicate with an NMS by Using SNMPv1
  • Example for Configuring a Device to Communicate with an NMS by Using SNMPv2c
  • Example for Configuring a USM SNMPv3 User on a Device to Communicate with an NMS
  • Example for Configuring a Local SNMPv3 User on a Device to Communicate with an NMS
  • Example for Configuring SNMP Proxy Using User-Defined Parameter Settings
  • NETCONF Configuration
  • Overview of NETCONF
  • Configuration Precautions for NETCONF
  • Establishing Communication Between the NMS and a Device Using NETCONF
  • Configuring an SSH User
  • Enabling NETCONF
  • (Optional) Enabling Proactive NETCONF Registration
  • (Optional) Configuring NETCONF Authorization
  • Configuring Huawei-NACM Authorization
  • Configuring IETF-NACM Authorization
  • (Optional) Configuring NETCONF YANG Model Switching
  • Logging in to the Server Using the NMS
  • Verifying the Configuration of Communication Between the NMS and a Device Using NETCONF
  • Translating Configuration Commands to XML Packets
  • Maintaining NETCONF
  • Enabling NETCONF Operation Log Query
  • Configuration Examples for NETCONF
  • Example for Establishing Communication Between the NMS and a Device Using NETCONF
  • Device Management Configuration
  • Overview of Device Management
  • Configuration Precautions for Device Management
  • Changing the Password of the BootROM Menu
  • Configuring Global Padding
  • Managing Online Devices
  • Checking Device Versions
  • Checking Basic Device Information
  • Checking Electronic Labels
  • Activating and Viewing Digital Warranties
  • Checking the Software Package ID
  • Checking Memory Usage
  • Checking CPU Usage
  • Displaying the Usage of System Process Resources
  • Checking Device Temperatures
  • Checking Device Voltages
  • Checking a Power Module
  • Restarting the Device
  • Resetting a Board
  • (Optional) Querying Board Resource Usage
  • (Optional) Configuring Memory Usage Reliability
  • (Optional) Configuring the Level-1 and Level-2 Notification Thresholds and Detection Period for CPU Overload
  • (Optional) Configuring Automatic Board Power Off Under High Temperature
  • Configuring the Alarm Threshold for the CPU Usage of a Board
  • Configuring the Alarm Threshold for the Usage of a Single CPU on a Board
  • Configuring Alarm Thresholds for Board Performance
  • Configuring the Thresholds of CPU Usage and Memory Usage
  • Configuring the Threshold of CPU Usage
  • Configuring the Threshold of Memory Usage
  • Verifying the Configuration of CPU Usage and Memory Usage Thresholds
  • Information Management Configuration
  • Overview of Information Management
  • Configuration Precautions for Information Management
  • Configuring the Information Filtering Function
  • Setting the Timestamp Format of the Information
  • Outputting Information to a Local Device
  • Outputting Information to an Information Buffer
  • Outputting Information to an Information File
  • Verifying the Configuration of Outputting Information to a Local Device
  • Outputting Information to a Terminal or a Remote Server
  • Outputting Information to a Console
  • Outputting Information to a Remote Terminal
  • Sending Information to a Syslog Server
  • Outputting Information to an SNMP Agent
  • Verifying the Configuration of Outputting Information to a Terminal or a Remote Server
  • Configuring Event Management
  • Configuring Delayed Event Reporting
  • Configuring Event Log Recording Globally
  • Verifying the Event Management Configuration
  • Maintaining Information Management
  • Resetting Information Management Statistics
  • Viewing Information Management Information
  • Configuration Examples for Information Management
  • Example for Outputting Information to the FTP Server
  • Example for Outputting Information to a Remote Terminal
  • Example for Outputting Information to a Syslog Server
  • Example for Outputting Information to an SNMP Agent
  • Fault Management Configuration
  • Overview of Fault Management
  • Configuration Precautions for Fault Management
  • Configuring Fault Management
  • Setting the Alarm Severity
  • Configuring a Suppression Period for an Alarm
  • Configuring Alarm Suppression
  • Filtering Out All Alarms
  • Configuring an Alarm Filtering Table to Filter Out Alarms
  • Configuring Alarm Inversion
  • Configuring NMS-based Correlative Alarm Suppression
  • Enabling Alarm Status Re-check
  • Maintaining Fault Management
  • Clearing Alarms
  • Clearing Alarm Statistics
  • Monitoring the Alarm Status
  • Configuration Examples for Fault Management
  • Example for Configuring FM
  • Performance Management Configuration
  • Overview of Performance Management
  • Configuration Precautions for Performance Management
  • Configuring Performance Management Functions
  • Configuring a Performance Statistics Task
  • (Optional) Uploading Performance Statistics Files
  • Verifying the Performance Management Configuration
  • Configuration Examples for Performance Management
  • Example for Configuring Performance Management Functions
  • Upgrade Maintenance Configuration
  • Overview of Upgrade Maintenance
  • Configuration Precautions for Upgrade Maintenance
  • Performing Software Upgrade that Takes Effect at the Next Startup
  • Checking the System Before the Upgrade
  • Uploading the System Software
  • Specifying the System Software to Be Used at the Next Startup
  • Restarting a Device
  • Verifying the Configuration of Software Upgrade that Takes Effect at the Next Startup
  • Performing In-Service Patch Installation
  • Installing a Patch File
  • Verifying the Configuration of In-Service Patch Installation
  • Performing Patch Installation that Takes Effect at the Next Startup
  • Specifying the Patch to Be Loaded at the Next Startup
  • Restarting a Device
  • Verifying the Configuration of In-Service Patch Installation
  • Dynamically Installing Modules
  • Activating Distributed Patch Files
  • Maintaining the Upgrade
  • Clearing the Name of the Patch File to Be Used at the Next Startup from the Configuration File
  • Configuration Examples for Upgrade Maintenance
  • Example for Performing Software Upgrade that Takes Effect at the Next Startup
  • Example for Performing In-Service Patch Installation
  • Example for Performing Patch Installation that Takes Effect at the Next Startup
  • DCN Configuration
  • Overview of DCN
  • Configuration Precautions for DCN
  • Configuring Basic DCN Functions
  • Configuring Extended DCN Functions
  • Configuring Multi-Process and Multi-Area DCN
  • Configuring the DCN Compatible Mode on a GNE
  • Configuring an Entry for DCN Packet Transparent Transmission
  • Enabling DCN Communication Through Sub-interface 4094
  • Configuring an Authentication Message for the Private TLV That Supports NMS Automatic NE Management in LLDP Packets
  • Verifying the Configuration of Extended DCN Functions
  • Improving DCN Security
  • Configuring an Alarm Threshold for the Number of NEs Connected to a GNE
  • Configuring SSL Authentication on a GNE
  • Binding a DTLS Policy to a GNE
  • Configuring OSPF Interface Authentication
  • Optimizing DCN Routes
  • Configuring a Forwarding Priority for DCN Packets
  • Configuring an ACL-based DCN Policy
  • Disabling Fast DCN Session Restart Triggered by DCN PPPoE Terminate Packets
  • Configuring Encryption for the Channel Between a GNE and an NE
  • Verifying the DCN Security Configuration
  • DCN Configuration Examples
  • Example for Configuring DCN
  • Example for Configuring DCN Traversal over a Third-Party Layer 2 Network
  • RMON Configuration
  • Overview of RMON
  • Configuration Precautions for RMON
  • Configuring RMON
  • Configuring the RMON Statistics Function
  • Configuring the RMON Alarm Function
  • Verifying the RMON Configuration
  • Configuration Examples for RMON
  • Example for Configuring RMON
  • SAID Configuration
  • Overview of SAID
  • Configuration Precautions for SAID
  • Enabling/Disabling a SAID Node
  • Enabling the CFC Node Recovery Function
  • PADS Configuration
  • Configuration Precautions for PADS
  • Enabling and Disabling the PADS
  • Network Reliability
  • About This Document
  • BFD Configuration
  • Overview of BFD
  • Configuration Precautions for BFD
  • Summary of BFD Configuration Tasks
  • Configuring BFD to Monitor an IP Link
  • Enabling BFD Globally
  • Establishing a BFD Session
  • (Optional) Changing the BFD Detection Time
  • (Optional) Setting the BFD WTR Time
  • (Optional) Configuring a Description for a BFD Session
  • (Optional) Setting the Priority of a BFD Session
  • Verifying the Configuration of BFD to Monitor an IP Link
  • Configuring BFD to Monitor VPN Routes
  • Enabling BFD Globally
  • Establishing a BFD Session
  • (Optional) Changing the BFD Detection Time
  • (Optional) Setting the BFD WTR Time
  • (Optional) Configuring a Description for a BFD Session
  • (Optional) Setting the Priority of a BFD Session
  • Verifying the Configuration of BFD to Monitor VPN Routes
  • Configuring a Static BFD Session with Automatically Negotiated Discriminators
  • Enabling BFD Globally
  • Establishing a BFD Session
  • (Optional) Changing the BFD Detection Time
  • (Optional) Setting the BFD WTR Time
  • (Optional) Configuring a Description for a BFD Session
  • (Optional) Configuring a Priority for a BFD Session
  • Verifying the Configuration of a Static BFD Session with Automatically Negotiated Discriminators
  • Configuring Multi-hop BFD
  • Enabling BFD Globally
  • Establishing a BFD Session
  • (Optional) Changing the BFD Detection Time
  • (Optional) Setting the BFD WTR Time
  • (Optional) Configuring a Description for a BFD Session
  • (Optional) Setting the Priority of a BFD Session
  • Verifying the Multi-hop BFD Configuration
  • Configuring a BFD for Link-Bundle Session to Detect Eth-Trunk Member Link Faults
  • Enabling BFD Globally
  • Creating a BFD for Link-Bundle Session
  • (Optional) Changing the BFD Detection Time
  • (Optional) Setting the BFD WTR Time
  • (Optional) Configuring a Priority of a BFD Session
  • Verifying the Configuration of BFD for Link-Bundle Session to Detect Eth-Trunk Member Link Faults
  • Configuring a One-Arm BFD Echo Session
  • Enabling BFD Globally
  • Creating a One-Arm BFD Echo Session
  • (Optional) Changing the BFD Detection Time
  • (Optional) Setting the BFD WTR Time
  • (Optional) Configuring a Description for a BFD session
  • (Optional) Setting the Priority of a BFD Session
  • Verifying the One-Arm BFD Echo Session Configuration
  • Configuring SBFD
  • Configuring an SBFD Reflector Function
  • Configuring the SBFD Initiator Functions
  • Verifying the SBFD Session Configuration
  • Configuring Passive BFD Echo
  • Configuring the Delay of a BFD Session to Go Up
  • Associating a BFD Session with an Interface
  • Associating a BFD Session with a Sub-interface
  • Configuring BFD to Modify the Port or Link State Table
  • Configuring Association Between a BFD Session and an Interface
  • Configuring BFD Sessions to Enter the AdminDown State
  • Configuring BFD Session Flapping Suppression
  • Configuring Static BFD for TE with Automatically Negotiated Discriminators
  • Configuring BFD Session Authentication Information
  • Configuring IPv4 and IPv6 Alarm Separation
  • Maintaining BFD
  • Clearing BFD Statistics
  • Monitoring the BFD Operating Status
  • Configuration Examples for BFD
  • Example for Configuring Single-Hop BFD for a Layer 3 Eth-Trunk
  • Example for Configuring BFD to Monitor VPN Routes
  • Example for Configuring BFD for Static VPN Routes
  • Example for Configuring Multi-hop BFD
  • Example for Configuring Single-hop BFD for IPv6
  • Example for Configuring Multi-hop BFD for IPv6
  • Example for Configuring Sub-Interfaces for QinQ VLAN Tag Termination to Support BFD
  • Example for Configuring Sub-Interfaces for Dot1q VLAN Tag Termination to Support BFD
  • Example for Configuring a BFD for Link-Bundle Session to Detect Layer 3 Eth-Trunk Member Link Faults
  • Example for Configuring a BFD for Link-Bundle Session to Detect Layer 3 Eth-Trunk Member Link Faults (IPv6)
  • Example for Configuring a One-Arm BFD Echo Session
  • Example for Configuring the Delay of a BFD Session to Go Up
  • Example for Associating a BFD Session with an Interface
  • Example for Associating a BFD Session and a Sub-interface
  • Example for Enabling BFD to Modify the PST
  • Example for Configuring Static BFD for TE with Automatically Negotiated Discriminators
  • VRRP Configuration
  • Overview of VRRP
  • Configuration Precautions for VRRP
  • Configuring Basic VRRP Functions
  • Creating a VRRP Group
  • Configuring a Unicast VRRP Group
  • (Optional) Configuring VRRP Stability Functions
  • (Optional) Configuring a VRRP Security Policy
  • (Optional) Optimizing VRRP
  • (Optional) Enabling Backup Devices to Forward Service Traffic
  • Verifying the VRRP Configuration
  • Configuring an mVRRP Group
  • Creating an mVRRP Group
  • Verifying the mVRRP Group Configuration
  • Configuring VRRP Association
  • Associating a VRRP Group with an Interface
  • Associating a VRRP Group with a BFD Session to Implement a Rapid Master/Backup VRRP Switchover
  • Associating VRRP with EFM
  • Associating a VRRP Group with a Route
  • Associating a VRRP Group with an NQA Test Instance
  • Verifying the VRRP Association Configuration
  • Enabling Rapid VRRP Switchback
  • Enabling Enhanced Sending and Replication of Gratuitous ARP Packets for a VRRP Group
  • Maintaining VRRP
  • Clearing VRRP Statistics
  • Monitoring the Operating Status of VRRP
  • Configuration Examples for VRRP
  • Example for Configuring a VRRP Group
  • Example for Configuring VRRP Groups to Work in Multi-gateway Load Balancing Mode
  • Example for Connecting VRRP Groups to L3VPNs
  • Example for Configuring an mVRRP Group
  • Example for Associating a VRRP Group with a VRRP-disabled Interface
  • Example for Associating a VRRP Group with a BFD Session
  • Example for Associating a VRRP Group with an NQA Test Instance
  • Example for Configuring a Unicast VRRP Group
  • VRRP6 Configuration
  • Overview of VRRP6
  • Configuration Precautions for VRRP6
  • Configuring Basic VRRP6 Functions
  • Creating a VRRP6 Group
  • (Optional) Configuring VRRP6 Stability Functions
  • (Optional) Optimizing a VRRP6 Group
  • (Optional) Enabling Backup Devices to Forward Service Traffic
  • Verifying the Basic VRRP6 Function Configuration
  • Configuring VRRP6 Association
  • Associating a VRRP6 Group with a VRRP6-disabled Interface
  • Associating VRRP6 with IPv6 BFD to Implement a Rapid Master/Backup VRRP6 Switchover
  • Verifying the VRRP6 Association Configuration
  • Configuring an mVRRP6 Group
  • Creating an mVRRP6 Group
  • Binding a Common VRRP6 Group to an mVRRP6 Group
  • Verifying the mVRRP6 Group Association Configuration
  • Enabling Enhanced Sending and Replication of NA Messages for a VRRP6 Group
  • Maintaining a VRRP6 Group
  • Clearing VRRP6 Statistics
  • Monitoring the Operating Status of a VRRP6 Group
  • Configuration Examples for VRRP6
  • Example for Configuring a VRRP6 Group to Work in Master/Backup Mode
  • Example for Configuring VRRP6 Groups to Work in Multi-gateway Load Balancing Mode
  • Example for Configuring VRRP6 Association
  • Ethernet OAM Configuration
  • Overview of Ethernet OAM
  • Configuration Precautions for Ethernet OAM
  • CFM Configuration
  • Overview of CFM
  • Configuring Basic CFM Functions
  • Enabling CFM Globally
  • (Optional) Switching CFM Versions
  • Creating an MD
  • Creating an MA
  • Creating MEPs
  • (Optional) Creating a MIP
  • (Optional) Switching MAC Address Models for MPs
  • Configuring CC
  • Verifying the Basic CFM Function Configuration
  • Setting CFM Alarm Parameters
  • Configuring CFM Association
  • Associating CFM with an Interface
  • Configuring Fault Message Transmission Between Ethernet CFM and Its Bound Interface
  • Associating CFM with EFM
  • Associating CFM with VRRP
  • Configuring Association Between CFM and EVPN DF Election
  • Configuration Examples for CFM
  • Example for Configuring VPLS-based CFM
  • Example for Configuring Basic Ethernet CFM Functions Based on BGP VPLS
  • Example for Configuring Basic Ethernet CFM Functions Based on BGP VPWS
  • EFM OAM Configuration
  • Overview of EFM OAM
  • Configuring Basic EFM OAM Functions
  • Enabling EFM OAM Globally
  • Configuring an EFM OAM Working Mode for an Interface
  • (Optional) Setting OAM PDU Parameters
  • Enabling EFM OAM on an Interface
  • Verifying the Basic EFM OAM Function Configuration
  • (Optional) Configuring Link Monitoring
  • (Optional) Configuring Errored Frame Detection
  • (Optional) Configuring Errored Code Detection
  • (Optional) Configuring Errored Frame Second Detection
  • (Optional) Configuring Periodic EFM Errored Frame Detection
  • Verifying the Link Monitoring Configuration
  • Configuring Packet Loss Ratio Testing for a Physical Link
  • Configuring Remote Loopback
  • Configuring an Interface to Send Testing Packets
  • (Optional) Disabling Remote Loopback
  • Verifying the Configuration of Packet Loss Ratio Testing for a Physical Link
  • Configuring the Association Between EFM OAM and an Interface
  • Associating EFM OAM with an Interface
  • (Optional) Setting the Time During Which the EFM OAM Status of an Interface Remains Down
  • Verifying the Configuration of the Association Between EFM OAM and an Interface
  • Maintaining EFM OAM
  • Monitoring the Operating Status of EFM OAM
  • Configuration Examples for EFM
  • Example for Configuring EFM OAM
  • Y.1731 Configuration
  • Overview of Y.1731
  • Configuring Y.1731 Functions in VLL Networking
  • Binding an MA to a VLL
  • Configuring Single-ended Frame Loss Measurement in VLL Networking
  • Configuring Dual-ended Frame Loss Measurement in VLL Networking
  • Configuring One-way Frame Delay Measurement in VLL Networking
  • Configuring Two-way Frame Delay Measurement in VLL Networking
  • Configuring Single-ended SLM in VLL Networking
  • Configuring the ETH-Test Function for a VLL
  • Configuring AIS
  • Configuring Y.1731 Functions in VPLS Networking
  • Binding an MA to a VPLS Network
  • Configuring Single-ended Frame Loss Measurement in VPLS Networking
  • Configuring Dual-ended Frame Loss Measurement in VPLS Networking
  • Configuring One-way Frame Delay Measurement in VPLS Networking
  • Configuring Two-way Frame Delay Measurement in VPLS Networking
  • Configuring Single-ended SLM in VPLS Networking
  • Configuring the ETH-Test Function for a VPLS Connection
  • Configuring AIS
  • Configuring Y.1731 Functions in VLAN Networking
  • Binding an MA to a VLAN
  • Configuring Single-ended Frame Loss Measurement in VLAN Networking
  • Configuring Dual-ended Frame Loss Measurement in VLAN Networking
  • Configuring One-way Frame Delay Measurement in VLAN Networking
  • Configuring Two-way Frame Delay Measurement in VLAN Networking
  • Configuring Single-ended SLM in VLAN Networking
  • Configuring the ETH-Test Function for a VLAN
  • Configuring AIS
  • Enabling the ETH-BN Receiving Function for a VLAN
  • Configuring Y.1731 Functions When an L2VPN Is Connected to an L3VPN
  • Single-ended Frame Loss Measurement When an L2VPN Is Connected to an L3VPN
  • Dual-ended Frame Loss Measurement When an L2VPN Is Connected to an L3VPN
  • One-Way Frame Delay Measurement When an L2VPN Is Connected to an L3VPN
  • Two-Way Frame Delay Measurement When an L2VPN Is Connected to an L3VPN
  • Configuring Y.1731 Functions in EVPN Networking
  • Binding an MA to a EVPN
  • Configuring Single-ended Frame Loss Measurement in EVPN Networking
  • Configuring Dual-ended Frame Loss Measurement in EVPN Networking
  • Configuring One-way Frame Delay Measurement in EVPN Networking
  • Configuring Two-way Frame Delay Measurement in EVPN Networking
  • Configuring Single-ended SLM in EVPN Networking
  • Configuring the ETH-Test Function for a EVPN
  • Configuring AIS in EVPN Networking
  • Configuring the ETH-LCK Function for EVPN
  • Configuring Y.1731 Functions in BD EVPN Networking
  • Binding an MA to a BD
  • Configuring Dual-ended Frame Loss Measurement in BD EVPN Networking
  • Configuring Single-ended Frame Loss Measurement in BD EVPN Networking
  • Configuring One-way Frame Delay Measurement in BD EVPN Networking
  • Configuring Two-way Frame Delay Measurement in BD EVPN Networking
  • Configuring Single-ended SLM in BD Networking
  • Configuring the ETH-Test Function for a BD
  • Configuring AIS
  • Configuring the ETH-LCK Function for a BD
  • Maintaining Y.1731
  • Clearing Y.1731 Statistics
  • Deleting Y.1731 ETH-Test Statistics
  • Configuration Examples for Y.1731
  • Example for Configuring Single-ended Frame Loss Measurement in VLL Networking
  • Example for Configuring Dual-ended Frame Loss Measurement in VLL Networking
  • Example for Configuring One-way Frame Delay Measurement in VLL Networking
  • Example for Configuring Two-Way Frame Delay Measurement in VLL Networking
  • Example for Configuring Single-ended SLM in VLL Networking
  • Example for Configuring Single-ended Frame Loss Measurement in VPLS Networking
  • Example for Configuring Dual-ended Frame Loss Measurement in VPLS Networking
  • Example for Configuring One-way Frame Delay Measurement in VPLS Networking
  • Example for Configuring Two-way Frame Delay Measurement in VPLS Networking
  • Example for Configuring Single-ended SLM in VPLS Networking
  • Example for Configuring Single-ended Frame Loss Measurement in VLAN Networking
  • Example for Configuring Dual-ended Frame Loss Measurement in VLAN Networking
  • Example for Configuring One-Way Frame Delay Measurement in a VLAN
  • Example for Configuring Two-Way Frame Delay Measurement in a VLAN
  • Example for Configuring Single-ended SLM in VLAN Networking
  • Example for Configuring Single-ended Frame Loss Measurement (When an L2VPN Is Connected to an L3VPN)
  • Example for Configuring Dual-ended Frame Loss Measurement (When an L2VPN Is Connected to an L3VPN)
  • Example for Configuring One-Way Frame Delay Measurement (When an L2VPN Is Connected to an L3VPN)
  • Example for Configuring Two-Way Frame Delay Measurement (When an L2VPN Is Connected to an L3VPN)
  • Example for Configuring the AIS Function
  • Example for Configuring Networking Service ETH-Test
  • Example for Configuring Networking Service ETH-BN
  • Example for Configuring Single-ended Frame Loss Measurement in EVPN Networking
  • Example for Configuring Dual-ended Frame Loss Measurement in EVPN Networking
  • Example for Configuring One-way Frame Delay Measurement in EVPN Networking
  • Example for Configuring Two-Way Frame Delay Measurement in EVPN Networking
  • Example for Configuring Single-ended SLM in EVPN Networking
  • Example for Configuring Single-ended Frame Loss Measurement in BD EVPN Networking
  • Example for Configuring Dual-ended Frame Loss Measurement in BD EVPN Networking
  • Example for Configuring One-way Frame Delay Measurement in BD EVPN Networking
  • Example for Configuring Two-Way Frame Delay Measurement in BD EVPN Networking
  • Example for Configuring Single-ended SLM in BD EVPN Networking
  • Example for Configuring Y.1731 ETH-LCK EVPN
  • Example for Configuring Y.1731 ETH-LCK (BD EVPN)
  • LPT Configuration
  • Configuration Precautions for LPT
  • Configuring LPT
  • Dual-Device Backup Configuration
  • Overview of Dual-Device Backup
  • Configuration Precautions for Dual-Device Backup
  • Configuring Manually Triggered Dual-Device ARP Hot Backup in VRRP Scenarios
  • Establishing a Dual-Device Backup Platform
  • Enabling Remote Backup for ARP Services
  • Verifying the Configuration of Manually Triggered Dual-Device ARP Hot Backup in VRRP Scenarios
  • Configuring a Device to Automatically Enable Dual-Device ARP Hot Backup in E-Trunk Scenarios
  • Configuring Dual-Device IGMP Snooping Hot Backup in a Master/Backup E-Trunk Scenario
  • Establishing a Dual-Device Backup Platform
  • Enabling Remote Backup for IGMP Snooping Services
  • Verifying the Configuration of Dual-Device IGMP Snooping Hot Backup in a Master/Backup E-Trunk Scenario
  • Enabling ARP Dual-Device Hot Backup in an E-Trunk Active-Active Scenario
  • Configuring Manually Triggered Dual-Device ND Hot Backup
  • Configuring Whitelist Session-CAR for Dual-Device Backup
  • Maintaining Dual-Device Backup
  • Clearing Dual-Device Backup Information
  • Monitoring Dual-Device Backup Information
  • Configuration Examples for Dual-Device Backup
  • Example for Configuring Manually Triggered Dual-Device ARP Hot Backup
  • Example for Configuring Dual-Device IGMP Snooping Hot Backup
  • Bit-Error-Triggered Protection Switching Configuration
  • Overview of Bit-Error-Triggered Protection Switching
  • Configuration Precautions for Bit-Error-Triggered Protection Switching
  • Summary of Bit Error Switch Configuration Tasks
  • Guide to Configuring Bit Error Alarm Thresholds
  • Configuring Bit-Error-Triggered Section Switching
  • Configuring Bit-Error-Triggered IGP Route Switching
  • Configuring an IPv4 IS-IS Interface to Automatically Adjust the Link Cost
  • Configuring an IPv6 IS-IS Interface to Automatically Adjust the Link Cost
  • Configuring an OSPF Interface to Automatically Adjust the Link Cost
  • Configuring an OSPFv3 Interface to Automatically Adjust the Link Cost
  • Verifying the Configuration of Bit-Error-Triggered IGP Route Switching
  • Configuring Bit-Error-Triggered Trunk Update
  • Configuring Bit-Error-Triggered RSVP-TE Tunnel Switching
  • Configuring Bit-Error-Triggered PW Switching
  • Configuring Bit-Error-Triggered L3VPN Route Switching
  • Configuring Bit-Error-Triggered EVPN L3VPN Route Switching
  • Configuring Bit-Error-Triggered Protection Switching for a Specific IGP Neighbor Relationship
  • Associating Bit Error Alarms with Static TE-LSP/PW/E-PW APS
  • Configuration Examples for Bit-Error-Triggered Protection Switching
  • Example for Configuring Bit-Error-Triggered Section Switching
  • Example for Configuring the Association Between Bit Errors and IGP Routes
  • Example for Configuring Bit-Error-Triggered Trunk Update
  • Example for Configuring Bit-Error-Triggered RSVP-TE Tunnel Switching
  • Example for Configuring Bit-Error-Triggered PW Switching
  • Example for Configuring Bit-Error-Triggered L3VPN Route Switching
  • Example for Configuring Bit-Error-Triggered EVPN L3VPN Route Switching
  • Example for Configuring Bit-Error-Triggered Protection Switching on an NG MVPN
  • Example for Associating MAC-Layer SD Alarms with E-PW APS
  • MPLS OAM Configuration
  • Overview of MPLS OAM
  • Configuration Precautions for MPLS OAM
  • Configuring MPLS OAM for an Associated Bidirectional LSP
  • Configuring Basic Detection Functions
  • Verifying the Configuration of MPLS OAM for an Associated Bidirectional LSP
  • Configuring MPLS OAM for a Static Bidirectional Co-routed LSP
  • Configuring Basic Detection Functions
  • Verifying the Configuration of MPLS OAM for a Static Bidirectional Co-routed LSP
  • Configuring MPLS OAM for a PW
  • Configuring Basic Detection Functions
  • Verifying the Configuration of MPLS OAM for a PW
  • Maintaining MPLS OAM
  • Clearing MPLS OAM Statistics
  • Configuration Examples for MPLS OAM
  • Example for Configuring MPLS OAM for a Static Associated Bidirectional LSP
  • Example for Configuring MPLS OAM for a Static Bidirectional Co-routed LSP
  • Example for Configuring MPLS OAM for a PW
  • MPLS-TP OAM Configuration
  • Overview of MPLS-TP OAM
  • Configuration Precautions for MPLS-TP OAM
  • Configuring MPLS-TP OAM for a Bidirectional Co-routed LSP
  • Creating an ME Instance and Binding It to a Tunnel Interface
  • (Optional) Configuring CC and CV for an LSP
  • (Optional) Configuring LB for an LSP
  • (Optional) Configuring Frame LM
  • (Optional) Configuring Frame DM
  • Verifying the Configuration of MPLS-TP OAM for an LSP
  • Configuring MPLS-TP OAM for a PW
  • Creating an ME Instance and Binding It to a PW
  • (Optional) Configuring CC and CV for an LSPa TE-LSP
  • (Optional) Configuring LB for an LSP
  • (Optional) Configuring Frame LM
  • (Optional) Configuring Frame DM
  • Verifying the Configuration of MPLS-TP OAM for a PW
  • Maintaining MPLS-TP OAM
  • Monitoring the MPLS-TP OAM Operating Status
  • Clearing MPLS-TP OAM Statistics
  • Configuration Examples for MPLS-TP OAM
  • Example for Configuring CC and CV for a Bidirectional LSP
  • Example for Configuring LB for a Bidirectional LSP
  • Example for Configuring Frame LM for a Bidirectional LSP
  • Example for Configuring Frame DM for a Bidirectional LSP
  • Example for Configuring CC and CV for a PW
  • Example for Configuring LB for a PW
  • Example for Configuring Frame LM for a PW
  • Example for Configuring Frame DM for a PW
  • Interface and Data Link
  • About This Document
  • Interface Management Configuration
  • Overview of Interface Management
  • Configuration Precautions for Interface Management
  • Interface Basics Configuration
  • Entering the Interface View
  • (Optional) Setting Interface Parameters
  • Enabling an Interface
  • (Optional) Configuring a Device to Send a Trap Message to an NMS When an Interface Physical Status Changes
  • (Optional) Configuring IPv4 and IPv6 Traffic Statistics Collection on a Main Interface
  • (Optional) Configuring Power Locking and Gain Locking for an Optical Amplifier Module
  • Configuring a Bandwidth Mode for an Interface
  • (Optional) Configuring an Interface Splitting Mode
  • Verifying the Configuration
  • Configuring the Physical Link Detection Function
  • Configuring the Alarm Function for CRC Errors, SDH Errors, Input Errors, Output Errors, or Optical Module Power Exceptions
  • Configuring the Alarm Function for Pause-Frame Errors Received on an Interface
  • Configuring the Alarm Function in Case the Number of SDH B1 or SDH B2 Error Packets That an Interface Receives Exceeds an Alarm Threshold
  • Configuring the Alarm Function in Case the Number of Bytes of Error Packets That an Interface Receives Exceeds an Alarm Threshold
  • Verifying the Configuration
  • Configuring MAC Accounting
  • Configuring Strict Filter for EVC Sub-Interfaces
  • Enabling the Signal Sending Delay Function
  • Enabling or Disabling the Optical Module Laser
  • Disabling the Optical Module Laser
  • (Optional) Enabling the Optical Module Laser
  • Verifying the Configuration of Enabling or Disabling the Optical Module Laser
  • Enabling the Optical Module Alarm Threshold Standardization Function
  • Disabling the Optical Module Alarm Function
  • Managing Non-Huawei-Certified Optical Modules
  • Configuring the Control-Flap Function
  • Logical Interface Configuration
  • Creating a Global-VE interface
  • Configuring a VLAN Channelized Sub-Interface
  • Creating a Loopback Interface and Configuring an IP Address for It
  • Entering the NULL Interface View
  • Verifying the Configuration
  • FlexE Interface Configuration
  • Activating the FlexE Interface License on a Board
  • Configuring a Standard Ethernet Interface to Work in FlexE Mode
  • Configuring a PHY Number for a FlexE Physical Interface
  • Creating a FlexE Group and Binding a FlexE Physical Interface to It
  • Configuring a Number for a FlexE Group
  • (Optional) Configuring a Sub-timeslot Granularity for a FlexE Card
  • (Optional) Configuring a Mode for a FlexE Card
  • Creating a FlexE Client and Configuring an ID and Bandwidth for It
  • Adding a FlexE NE in an Ethernet Service Scenario
  • Adding a FlexE or Ethernet NE in a FlexE Service Scenario
  • (Optional) Configuring a Time Synchronization Mode for a FlexE Physical Interface
  • Verifying the Configuration
  • Interface Group Configuration
  • Configuring an Interface Monitoring Group
  • Maintaining Interfaces
  • Clearing Interface Statistics
  • Monitoring Interface Information
  • Configuration Examples for Interface Management
  • Example for Managing Interfaces
  • Example for Configuring FlexE Interfaces
  • Transmission Alarm Customization and Suppression Configuration
  • Overview of Transmission Alarm Customization and Suppression
  • Configuration Precautions for Transmission Alarm Customization and Suppression
  • Configuring Transmission Alarm Customization
  • Configuring the Types of Alarms that Affect the Physical Status of Interfaces
  • Configuring Transmission Alarm Filtering Intervals
  • Configuring Transmission Alarm Suppression
  • Maintaining Transmission Alarm Customization and Suppression
  • Clearing the Information About Transmission Alarms
  • LAN Access and MAN Access
  • About This Document
  • MAC Configuration
  • Overview of MAC Addresses
  • Configuration Precautions for MAC
  • Configuring Static MAC Address Entries
  • Configuring Static Blackhole MAC Address Entries
  • Configuring MAC Accounting for a Broadcast Domain
  • Configuring Parameters for Dynamic MAC Address Entries
  • Configuring an Aging Time for Dynamic MAC Address Entries
  • Configuring a MAC Address Learning Limit Rule
  • Verifying the Configuration of Parameters for Dynamic MAC Address Entries
  • Disabling MAC Address Learning
  • Disabling MAC Address Learning in a VLAN
  • Verifying the Configuration of Disabling MAC Address Learning
  • Configuring Sticky MAC
  • Configuring a MAC Address for a Sub-interface
  • Configuring the Global MAC Hopping-based Loop Detection Alarm Function
  • Maintaining MAC Address Tables
  • Monitoring the Usage of MAC Address Tables
  • Disabling a Device from Emptying a MAC Address Queue
  • Configuration Examples for MAC Address Tables
  • Example for Configuring a MAC Address Table
  • Example for Configuring a VLAN-based MAC Address Learning Limit Rule
  • Example for Configuring a MAC Address Learning Limit Rule in a VSI
  • Ethernet Interface Configuration
  • Overview of Ethernet Interfaces
  • Configuration Precautions for Ethernet Interface
  • Configuring an Ethernet Interface on an Interface Board
  • Setting the Maximum Frame Length Allowed by an Ethernet Interface
  • Configuring the MTU for an Ethernet Interface
  • Configuring a Working Mode for an Ethernet Interface
  • Configuring the Working Rate for an Ethernet Electrical Interface
  • Configuring the LAN/WAN Transmission Mode for a 10GE Interface
  • Configuring the Overhead Byte for a 10GE WAN Interface
  • Enabling Flow Control on a GE Interface
  • Configuring Self-Loop Detection on the GE Interface
  • Enabling the Statistics Function on a Sub-interface
  • Configuring the Hold-Time Interval After an Interface Goes Up/Down
  • Disabling an Ethernet Interface or Sub-interface from Broadcasting Packets
  • (Optional) Setting a Bandwidth Mode for an Interface
  • Verifying the Ethernet Interface Configuration
  • Configuring Ethernet Sub-interfaces to Support Communication Between VLANs
  • Creating a Sub-interface
  • Configuring an IP address
  • Configuring 802.1Q Encapsulation
  • Verifying the Ethernet Sub-interface Configuration
  • Configuration Examples for Ethernet Interfaces or Sub-interfaces
  • Example for Configuring Ethernet Interface Parameters
  • Example for Configuring Ethernet Sub-interfaces to Support Communication Between VLANs
  • Example for Configuring Ethernet Sub-interfaces for Communication Between VLAN Users and Non-VLAN Users
  • Eth-Trunk Interface Configuration
  • Overview
  • Configuration Precautions for Eth-Trunk Interface
  • Summary of Eth-Trunk Configuration Tasks
  • Configuring an Eth-Trunk Interface to Work in Manual Load Balancing Mode
  • Creating an Eth-Trunk Interface and Configuring It to Work in Manual Load Balancing Mode
  • Adding Physical Interfaces to the Eth-Trunk Interface
  • Configuring Eth-Trunk Interface Parameters
  • Configuring Parameters for Eth-Trunk Member Interfaces
  • (Optional) Configuring an Eth-Trunk Sub-interface
  • Verifying the Configuration of the Eth-Trunk Interface in Manual Load Balancing Mode
  • Configuring an Eth-Trunk Interface to Work in Static LACP Mode
  • Creating an Eth-Trunk Interface and Configuring It to Work in Static LACP Mode
  • Adding Physical Interfaces to the Eth-Trunk Interface
  • Configuring Eth-Trunk Interface Parameters
  • Configuring Parameters for Eth-Trunk Member Interfaces
  • (Optional) Configuring an Eth-Trunk Sub-interface
  • (Optional) Enabling State Flapping Suppression on an Eth-Trunk Interface
  • Verifying the Configuration of the Eth-Trunk Interface in Static LACP Mode
  • Configuring an Eth-Trunk Interface to Work in Manual 1:1 Master/Backup Mode
  • Creating an Eth-Trunk Interface in Manual 1:1 Master/Backup Mode
  • Adding Interfaces to an Eth-Trunk Interface
  • (Optional) Specifying the Master Member Interface in an Eth-Trunk Interface
  • Enabling an Eth-Trunk Interface to Send SmartLink Flush Packets
  • Enabling an Intermediate Device to Receive SmartLink Flush Packets
  • Verifying the Configuration of the Eth-Trunk Interface in Manual 1:1 Master/Backup Mode
  • Configuring an Eth-Trunk Interface in Manual 1:1 Master/Backup Mode to Connect to a Non-Huawei Device
  • Configuring an E-Trunk for Backup in a Link Aggregation Group
  • Creating an E-Trunk
  • Adding an Interface to an E-Trunk
  • (Optional) Configuring E-Trunk Parameters
  • (Optional) Configuring a Working Mode for an E-Trunk Member Interface
  • (Optional) Binding an E-Trunk to BFD
  • (Optional) Configuring an E-Trunk to Determine the Master/Backup Status of Devices Based on the Number of Available Eth-Trunk Member Links or the Available Eth-Trunk Bandwidth
  • (Optional) Configuring Whitelist Session-CAR for E-Trunk
  • Verifying the Configuration
  • Maintaining Eth-Trunk
  • Clearing the Statistics on Eth-Trunk Interfaces
  • Configuration Examples for Eth-Trunk Interfaces
  • Example for Configuring an Eth-Trunk Interface to Work in Static LACP Mode
  • Example for Configuring Eth-Trunk Interfaces to Work in Manual Load Balancing Mode
  • Example for Configuring Eth-Trunk Interfaces in Manual 1:1 Master/Backup Mode
  • Example for Configuring Eth-Trunk Sub-interfaces to Support Communication Between VLANs
  • Example for Configuring an E-Trunk Associated with VPLS
  • GVRP Configuration
  • Overview
  • Configuration Precautions for GVRP
  • Configuring GVRP
  • Enabling GVRP
  • (Optional) Configuring a GVRP Registration Mode for an Interface
  • (Optional) Setting GARP Timers
  • Verifying the GVRP Configuration
  • Maintaining GVRP
  • Clearing GVRP Statistics
  • Configuration Examples for GVRP
  • Example for Configuring GVRP
  • Layer 2 Protocol Tunneling Configuration
  • Overview of Layer 2 Protocol Tunneling
  • Configuration Precautions for Layer 2 Protocol Tunneling
  • Default Actions on Protocol Packets
  • Configuring Layer 2 Protocol Tunneling (By Replacing Multicast Destination MAC Address)
  • Configuring an Edge Device to Replace the Multicast Destination MAC Address
  • Enabling Layer 2 Protocol Tunneling on an Interface
  • Verifying the Configuration of Interface-based Layer 2 Protocol Tunneling
  • Layer 2 Protocol Tunneling Configuration (Not By Replacing Multicast Destination MAC Address)
  • Configuring Transparent Transmission of Link-Layer-Protocol Packets on VPWS/EVPL Networks
  • Configuring Transparent Transmission of Link-Layer-Protocol Packets On VPLS/EVPN Networks
  • Configuring Ring Network Topology Isolation in an EVPN Access Scenario
  • Configuring an Interface to Transparently Transmit LACP Packets
  • Configuring an Interface to Drop LACP Packets
  • Configuration Examples for Layer 2 Protocol Tunneling
  • Example for Configuring Untagged Layer 2 Protocol Tunneling
  • Example for Configuring VLAN-based Layer 2 Protocol Tunneling
  • Example for Configuring QinQ-based Layer 2 Protocol Tunneling
  • Example for Configuring Tunneling of Special Link-Layer-Protocol Packets over a VPWS PW
  • Example for Configuring Tunneling of Special Link-Layer-Protocol Packets over a VPLS PW
  • VLAN Configuration
  • VLAN Overview
  • Configuration Precautions for VLAN
  • Summary of VLAN Configuration Tasks
  • Configuring a VLAN Based on Ports
  • Creating a VLAN
  • Configuring the Type of a Layer 2 Ethernet Port
  • Adding a Port to a VLAN
  • Verifying the Configuration of a Layer 2 Interface-based VLAN
  • Configuring Layer 3 Communication Between VLANIF Interfaces
  • Creating a VLANIF Interface
  • Assigning an IP Address to a VLANIF Interface
  • (Optional) Setting a Delay After Which a VLANIF Interface Goes Down
  • (Optional) Configuring Bandwidth for a VLANIF Interface
  • Verifying the VLANIF Interface Configuration
  • Configuring Inter-VLAN Communication
  • Configuring Sub-interfaces for Inter-VLAN Communication
  • Configuring VLANIF Interfaces for Inter-VLAN Communication
  • Configuring VLAN Mapping for Inter-VLAN Communication
  • Verifying the Inter-VLAN Communication Configuration
  • Configuring VLAN Security Attributes
  • Disabling a Port from Broadcasting Packets to Other Ports in the Same VLAN
  • Disabling MAC Address Learning in a VLAN
  • Verifying the VLAN Security Attribute Configuration
  • Configuring Intra-VLAN Interface Isolation
  • Configuring Interface Isolation for a Common VLAN
  • Configuring Interface Isolation for an Outer VLAN in VLAN Stacking or a Service Provider VLAN in VLAN Mapping
  • Enabling Intra-VLAN Proxy ARP
  • Verifying the Intra-VLAN Interface Isolation Configuration
  • Maintaining VLAN
  • Clearing the Statistics of VLAN Packets
  • Monitoring the VLAN Operating Status
  • Configuration Examples for VLANs
  • Example for Dividing a LAN into VLANs Based on Ports
  • Example for Configuring Users in a VLAN to Communicate by Using a Trunk Link
  • Example for Configuring Inter-VLAN Communication by Using Sub-interfaces
  • Example for Configuring VLAN and Non-VLAN Users to Communicate by Using Sub-interfaces
  • Example for Configuring Inter-VLAN Communication by Using VLANIF Interfaces
  • Example for Configuring 1 to 1 VLAN Mapping for Inter-VLAN Communication
  • Example for Configuring Communication Between VLANs Through VLAN Aggregation
  • QinQ Configuration
  • Overview of QinQ
  • Configuration Precautions for QinQ
  • Summary of QinQ Configuration Tasks
  • Configuring the QinQ Function
  • Configuring a QinQ Tunnel
  • (Optional) Changing the Ethernet Encapsulation Type of the Outer Tag
  • (Optional) Configuring Ethernet Interfaces to Retain the Original Outer TPID EtherType Value in Received QinQ Packets
  • Verifying the QinQ Function Configuration
  • Configuring QinQ-based VLAN Tag Swapping
  • Configuring QinQ Mapping
  • Configuring 1 to 1 QinQ Mapping
  • Verifying the QinQ Mapping Configuration
  • Configuring IP Services on a VLAN Tag Termination Sub-Interface
  • Configuring a VLAN Tag Termination Sub-interface
  • Configuring IP Services
  • Verifying the IP Service Configuration on the VLAN Tag Termination Sub-Interface
  • Configuring a VLAN Tag Termination Sub-interface to Transmit the VPN Service
  • Configuring a VLAN Tag Termination Sub-interface
  • (Optional) Configuring a PW-Tag Action
  • Configuring VPN Services
  • Verifying the VPN Service Configuration on the VLAN Tag Termination Sub-interface
  • Configuring Multicast Services on a VLAN Tag Termination Sub-interface
  • Configuring a VLAN Tag Termination Sub-interface
  • Configuring Multicast Services
  • Verifying the Multicast Service Configuration on the VLAN Tag Termination Sub-interface
  • Configuring a QinQ VLAN Tag Termination Sub-Interface to Support 802.1p Mapping
  • Configuring an L2VPN Service on a QinQ Stacking Sub-interface
  • Configuring a QinQ Stacking Sub-interface
  • (Optional) Configuring a PW-tag Action
  • Configuring an L2VPN Service
  • Verifying the L2VPN Service Configuration on the QinQ Stacking Sub-interface
  • Configuring a User-VLAN Sub-interface on a BRAS's User-Side Interface
  • Maintaining QinQ
  • Clearing QinQ Statistics
  • Monitoring the QinQ Operating Status
  • Configuration Examples for QinQ
  • Example for Configuring a QinQ Tunnel
  • Example for Configuring the Compatibility of the EtherType Field in the Outer Tag of QinQ Packets
  • Example for Configuring Selective QinQ
  • Example for Configuring QinQ-based VLAN Tag Swapping for VPLS Access
  • Example for Configuring a Dot1q VLAN Tag Termination Sub-Interface to Support Proxy ARP
  • Example for Configuring a QinQ VLAN Tag Termination Sub-Interface to Support Proxy ARP
  • Example for Configuring a Dot1q VLAN Tag Termination Sub-Interface to Support VRRP
  • Example for Configuring a QinQ VLAN Tag Termination Sub-Interface to Support VRRP
  • Example for Configuring a Dot1q VLAN Tag Termination Sub-Interface to Access an L3VPN
  • Example for Configuring a QinQ VLAN Tag Termination Sub-Interface to Access an L3VPN
  • Example for Configuring a Dot1q VLAN Tag Termination Sub-Interface to Access an L2VPN
  • Example for Configuring a QinQ VLAN Tag Termination Sub-Interface to Access an L2VPN
  • Example for Configuring a Dot1q VLAN Tag Termination Sub-Interface to Support DHCP Relay
  • Example for Configuring a QinQ VLAN Tag Termination Sub-Interface to Support DHCP Relay
  • Example for Configuring a QinQ VLAN Tag Termination Sub-Interface to Support the Local Connection
  • Example for Configuring the QinQ Stacking Sub-interface to Access an L2VPN
  • Example for Configuring a QinQ VLAN Tag Termination Sub-Interface in a VSI to Support IGMP Snooping
  • Example for Configuring a Dot1q VLAN Tag Termination Sub-Interface in a VSI to Support IGMP Snooping
  • Example for Configuring QinQ VLAN Tag Termination Sub-Interfaces to Statically Join Multicast Groups
  • Example for Configuring Untagged+DSCP for L3VPN Access
  • EVC Configuration
  • Overview of EVC
  • Configuration Precautions for EVC
  • Summary of EVC Configuration Tasks
  • Establishing the EVC Model
  • Creating a Bridge Domain
  • Configuring a Service Access Point
  • Verifying the Configuration
  • Configuring a Bridge Domain-based MAC Address Table
  • Configuring a Static MAC Address Entry
  • Configuring a Static Blackhole MAC Address Entry
  • Adjusting Dynamic MAC Address Learning Parameters
  • Verifying the Configuration
  • Configuring EVC Security Attributes
  • Disabling an Interface from Broadcasting Packets to Other Interfaces in a Bridge Domain
  • Disabling Devices in a Bridge Domain from Learning One Another's MAC Addresses
  • Configuring Split Horizon in a Bridge Domain
  • Verifying the Configuration
  • Configuring a DiffServ Mode for a BD
  • Configuring Layer 3 Communication Between VBDIF Interfaces
  • Configuring the EVC Model to Carry L2VPN Services
  • Configuring the EVC Model to Carry VPLS Services
  • Configuring the EVC Model to Carry VPWS Services
  • Verifying the Configuration
  • Configuring an EVC to Transmit Multicast Services
  • Configuring an EVC to Transmit Layer 3 Multicast Services
  • Configuring an EVC to Transmit Layer 2 Multicast Services
  • Verifying the Configuration
  • Configuring EVC VPLS Accessing L3VPN
  • Configuring an EVC to Transmit DHCP Relay Services
  • Maintaining EVC
  • Deleting Statistics About Packets Transmitted in a Bridge Domain
  • Monitoring the EVC Operating Status
  • Configuration Examples for EVC
  • Example for Establishing an EVC Model
  • Example for Configuring an EVC Model to Transmit VPLS Services
  • Example for Configuring the EVC Model to Carry VPLS Services (in VSI Pipe Service Mode)
  • Example for Configuring an EVC Model to Carry VPWS Services
  • Example for Configuring EVC VPLS Accessing L3VPN
  • Example for Configuring an EVC to Transmit Layer 3 Multicast Services
  • Example for Configuring an EVC Module to Transmit Layer 2 Multicast Services
  • Example for Configuring an EVC to Transmit DHCP Relay Services
  • Example for Configuring MSTP in an EVC Model
  • ERPS (G.8032) Configuration
  • Overview of ERPS
  • Configuration Precautions for ERPS (G.8032)
  • Summary of ERPS Configuration Tasks
  • (Optional) Configuring Timers for an ERPS Ring
  • Configuring ERPSv1
  • Configuring an ERPS Ring
  • (Optional) Configuring Association Between ERPS and Ethernet CFM
  • (Optional) Configuring the TC Notification Function on an ERPS-enabled Interface
  • (Optional) Configuring a Forcible Broadcast Period for an ERPS Ring
  • Verifying the ERPSv1 Configuration
  • Configuring ERPSv2
  • Configuring an ERPS Ring
  • Configuring Topology Change Notification
  • (Optional) Configuring ERPS Protection Switching
  • (Optional) Configuring Association Between ERPS and Ethernet CFM
  • (Optional) Configuring a Forcible Broadcast Period for an ERPS Ring
  • Verifying the ERPSv2 Configuration
  • Maintaining ERPS
  • Clearing ERPS Statistics
  • Configuration Examples for ERPS
  • Example for Configuring an ERPS Single Ring
  • Example for Configuring an ERPS Multi-ring Network
  • Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs Through VLANIF Interfaces
  • Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs Through Ethernet Sub-interfaces
  • MAC Flapping-based Loop Detection Configuration
  • Overview of MAC Flapping-based Loop Detection
  • Configuration Precautions for MAC Flapping-based Loop Detection
  • Summary of MAC Flapping-based Loop Detection Configuration Tasks
  • Configuring MAC Flapping-based Loop Detection for a BD
  • Enabling MAC Flapping-based Loop Detection
  • (Optional) Configuring a Blocking Policy
  • Verifying the Configuration of MAC Flapping-based Loop Detection for a BD
  • Configuring MAC Flapping-based Loop Detection for a VPLS Network
  • Enabling MAC Flapping-based Loop Detection
  • (Optional) Configuring a Blocking Policy
  • (Optional) Configuring Traffic Suppression of MAC Flapping-based Loop Detection
  • Verifying the Configuration of MAC Flapping-based Loop Detection for a VPLS Network
  • Configuring MAC Flapping-based Loop Detection for a VLAN
  • Enabling MAC Flapping-based Loop Detection
  • (Optional) Configuring Interface Blocking Priorities
  • (Optional) Configuring the Accurate Loop Blocking Function
  • (Optional) Configuring Traffic Suppression of MAC Flapping-based Loop Detection
  • Verifying the Configuration of MAC Flapping-based Loop Detection for a VLAN Network
  • Configuring MAC Flapping-based Loop Detection Association
  • Maintaining MAC Flapping-based Loop Detection
  • Resetting Traffic Suppression of MAC Flapping-based Loop Detection
  • Configuration Examples for MAC Flapping-based Loop Detection
  • Example for Configuring MAC Flapping-based Loop Detection for a VPLS Network
  • STP and RSTP Configuration
  • Overview of STP/RSTP
  • Configuration Precautions for STP and RSTP
  • Configuring Basic STP/RSTP Functions
  • Configuring the STP/RSTP Mode
  • (Optional) Configuring Device Priorities
  • (Optional) Configuring the Path Cost for a Port
  • (Optional) Configuring Port Priorities
  • Enabling STP/RSTP
  • Verifying the Basic STP/RSTP Function Configuration
  • Configuring STP/RSTP Parameters on an Interface
  • Configuring System Parameters
  • Configuring Port Parameters
  • Verifying the STP/RSTP Parameter Configuration
  • Configuring RSTP Protection Functions
  • Configuring BPDU Protection on a Device
  • Configuring TC Protection on a Device
  • Configuring TC/TCN Packet Suppression
  • Configuring Root Protection on a Port
  • Configuring Loop Protection on a Port
  • Configuring Abnormal Packet Filtering
  • Verifying the RSTP Protection Function Configuration
  • Configuring the TC Notification Function for an Access-Side Interface Used by a Ring Network to Connect to EVPN
  • Configuring the TC Notification Function for an Access-Side Interface Used by a Ring Network to Connect to VPLS
  • Configuring STP/RSTP Interoperability Between Huawei Devices and Non-Huawei Devices
  • Configuring the Proposal/Agreement Mechanism
  • (Optional) Configuring an Interface to Transparently Transmit HVRP Packets
  • Verifying the STP/RSTP Interoperability Configuration
  • Maintaining STP/RSTP
  • Monitoring the Statistics on STP/RSTP Topology Changes
  • Clearing STP/RSTP Statistics
  • Configuration Examples for STP/RSTP
  • Example for Configuring Basic STP Functions
  • Example for Configuring Basic RSTP Functions
  • MSTP Configuration
  • Overview of MSTP
  • Configuration Precautions for MSTP
  • Summary of MSTP Configuration Tasks
  • Configuring Basic MSTP Functions
  • Configuring the MSTP Mode
  • Configuring an MST Region
  • (Optional) Configuring a Priority for a Device in an MSTI
  • (Optional) Configuring a Path Cost of a Port in an MSTI
  • (Optional) Configuring a Port Priority in an MSTI
  • Enabling MSTP
  • Verifying the Basic MSTP Function Configuration
  • Configuring MSTP Multi-process
  • Creating an MSTP Process
  • Adding an Interface to an MSTP Process - Access Links
  • Adding an Interface to an MSTP Process - Share Link
  • Configuring Priorities and Root Protection in MSTP Multi-process
  • Configuring TC Notification in MSTP Multi-process
  • Verifying the MSTP Multi-process Configuration
  • Configuring MSTP Parameters on an Interface
  • Configuring System Parameters
  • Configuring Port Parameters
  • Verifying the MSTP Parameter Configuration
  • Configuring MSTP Protection Functions
  • Configuring BPDU Protection on a Device
  • Configuring TC Protection on a Device
  • Configuring TC/TCN Packet Suppression
  • Configuring Root Protection on an Interface
  • Configuring Loop Protection on an Interface
  • Configuring Share-Link Protection on a Device
  • Configuring Abnormal Packet Filtering
  • Verifying the MSTP Protection Function Configuration
  • Configuring the TC Notification Function for an Access-Side Interface Used by a Ring Network to Connect to an EVPN
  • Configuring the TC Notification Function for an Access-Side Interface Used by a Ring Network to Connect to a VPLS Network
  • Configuring MSTP Interoperability Between Huawei Devices and Non-Huawei Devices
  • Configuring a Proposal/Agreement Mechanism
  • Configuring the MSTP Protocol Packet Format on an Interface
  • Enabling the Digest Snooping Function
  • (Optional) Configuring an Interface to Transparently Transmit HVRP Packets
  • Verifying the MSTP Interoperability Configuration
  • Maintaining MSTP
  • Monitoring the Statistics on MSTP Topology Changes
  • Clearing MSTP Statistics
  • Configuration Examples for MSTP
  • Example for Configuring Basic MSTP Functions
  • Example for Configuring MSTP Multi-process for Layer 2 Single-Access Rings and Layer 2 Multi-Access Rings
  • Example for Configuring E-STP Using Inter-AS Option A in LDP Mode
  • Example for Configuring E-STP Using Inter-AS PWs in LDP Mode
  • Example for Configuring E-STP in CE Dual-homing Scenarios
  • Example for Configuring MSTP in an EVC Model
  • RRPP Configuration
  • Configuration Precautions for RRPP
  • Configuring RRPP Snooping
  • Enabling RRPP Snooping
  • (Optional) Configuring the VSI Associated with the RRPP Snooping
  • Verifying the RRPP Snooping Configuration
  • Maintaining RRPP
  • Clearing RRPP Running Information
  • BPDU Tunnel Configuration
  • Overview of BPDU Tunneling
  • Configuration Precautions for BPDU Tunnel
  • Configuring Interface-based BPDU Tunneling Function
  • Enabling the Spanning Tree Calculation
  • Adding an Interface to a Specified VLAN
  • Configuring Interface-based BPDU Tunneling
  • Configuring an Interface to Allow Packets with Specified VLAN IDs to Pass
  • Verifying the Configuration of the Interface-based BPDU Tunneling Function
  • Configuring VLAN-based BPDU Tunneling Function
  • Enabling the Spanning Tree Calculation
  • Configuring an Interface to Add a Specified VLAN ID to BPDUs
  • Configuring VLAN-based BPDU Tunneling
  • Configuring an Interface to Allow Packets with Specified VLAN IDs to Pass
  • Verifying the Configuration of the VLAN-based BPDU Tunneling Function
  • Configuring QinQ-based BPDU Tunneling Function
  • Enabling the Spanning Tree Calculation
  • Configuring an Interface to Add a Specified VLAN ID to BPDUs
  • Configuring QinQ-based BPDU Tunneling
  • Configuring an Interface to Allow Packets with Specified VLAN IDs to Pass
  • Verifying the Configuration of the QinQ-based BPDU Tunneling Function
  • Configuration Examples for BPDU Tunneling
  • Example for Configuring Interface-based BPDU Tunneling on Devices with Different Roles
  • Example for Configuring Interface-based BPDU Tunneling on Devices with the Same Role
  • Example for Configuring VLAN-based BPDU Tunneling
  • Example for Configuring QinQ-based BPDU Tunneling
  • VXLAN Configuration
  • Overview of VXLAN
  • Configuration Precautions for VXLAN
  • Configuring VXLAN in Centralized Gateway Mode for Static Tunnel Establishment
  • Configuring a VXLAN Service Access Point
  • Configuring a VXLAN Tunnel
  • Configuring a Layer 3 VXLAN Gateway
  • (Optional) Configuring Static MAC Address Entries and MAC Address Limiting
  • Verifying the Configuration of VXLAN in Centralized Gateway Mode
  • Configuring IPv6 VXLAN in Centralized Gateway Mode for Static Tunnel Establishment
  • Configuring a VXLAN Service Access Point
  • Configuring an IPv6 VXLAN Tunnel
  • (Optional) Configuring a Layer 3 Gateway on an IPv6 VXLAN
  • (Optional) Configuring a Static MAC Address Entry
  • (Optional) Configuring a Limit on the Number of MAC Addresses Learned by an Interface
  • Verifying the Configuration
  • Configuring VXLAN in Centralized Gateway Mode Using BGP EVPN
  • Configuring a VXLAN Service Access Point
  • Configuring a VXLAN Tunnel
  • Configuring a Layer 3 VXLAN Gateway
  • (Optional) Configuring Static MAC Address Entries and MAC Address Limiting
  • Verifying the Configuration of VXLAN in Centralized Gateway Mode Using BGP EVPN
  • Configuring IPv6 VXLAN in Centralized Gateway Mode Using BGP EVPN
  • Configuring a VXLAN Service Access Point
  • Configuring an IPv6 VXLAN Tunnel
  • (Optional) Configuring a Layer 3 Gateway on an IPv6 VXLAN
  • (Optional) Configuring a Limit on the Number of MAC Addresses Learned by an Interface
  • Verifying the Configuration
  • Configuring VXLAN in Distributed Gateway Mode Using BGP EVPN
  • Configuring a VXLAN Service Access Point
  • Configuring a VXLAN Tunnel
  • (Optional) Configuring a VPN Instance for Route Leaking with an EVPN Instance
  • (Optional) Configuring a Layer 3 Gateway on the VXLAN
  • (Optional) Configuring VXLAN Gateways to Advertise Specific Types of Routes
  • (Optional) Configuring Static MAC Address Entries and MAC Address Limiting
  • Verifying the Configuration of VXLAN in Distributed Gateway Mode Using BGP EVPN
  • Configuring IPv6 VXLAN in Distributed Gateway Mode Using BGP EVPN
  • Configuring a VXLAN Service Access Point
  • Configuring an IPv6 VXLAN Tunnel
  • (Optional) Configuring a VPN Instance for Route Leaking with an EVPN Instance
  • (Optional) Configuring a Layer 3 Gateway on the IPv6 VXLAN
  • (Optional) Configuring IPv6 VXLAN Gateways to Advertise Specific Types of Routes
  • (Optional) Configuring a Limit on the Number of MAC Addresses Learned by an Interface
  • Verifying the Configuration
  • Configuring Three-Segment VXLAN to Implement DCI
  • Configuring Three-Segment VXLAN to Implement Layer 3 Interworking
  • Configuring Three-Segment VXLAN to Implement Layer 2 Interworking
  • Verifying the Configuration of Using Three-Segment VXLAN to Implement DCI
  • Configuring the Static VXLAN Active-Active Scenario
  • Configuring the Dynamic VXLAN Active-Active Scenario
  • Configuring the Dynamic IPv6 VXLAN Active-Active Scenario
  • Configuring VXLAN Accessing BRAS
  • Creating an L2VE Interface
  • Creating an L3VE Interface
  • Associating the L2VE Interface with a BD
  • Configuring the L3VE Interface as a BAS Interface
  • Verifying the Configuration
  • Configuring NFVI Distributed Gateway (Asymmetric Mode)
  • Configuring an L3VPN Instance on a DCGW
  • Configuring Route Advertisement on a DC-GW
  • Configuring Route Advertisement on an L2GW/L3GW
  • Configuring Load Balancing
  • Verifying the NFVI Distributed Gateway Configuration
  • Configuring NFVI Distributed Gateways (Symmetric Mode)
  • Configuring an L3VPN Instance on a DC Gateway
  • Configuring Route Advertisement on a DC Gateway
  • Configuring Route Advertisement on L2GWs/L3GWs
  • Configuring Load Balancing
  • Verifying the Configuration
  • Maintaining VXLAN
  • Configuring the VXLAN Alarm Function
  • Collecting and Checking VXLAN Packet Statistics
  • Clearing VXLAN Packet Statistics
  • Checking Statistics about MAC Address Entries in a BD
  • Clearing Statistics about Dynamic MAC Address Entries in a BD
  • Configuration Examples for VXLAN
  • Example for Configuring Users on the Same Network Segment to Communicate Through a VXLAN Tunnel
  • Example for Configuring Users on Different Network Segments to Communicate Through a VXLAN Layer 3 Gateway
  • Example for Configuring VXLAN in Centralized Gateway Mode Using BGP EVPN
  • Example for Configuring VXLAN in Distributed Gateway Mode Using BGP EVPN
  • Example for Configuring IPv6 VXLAN in Distributed Gateway Mode Using BGP EVPN
  • Example for Configuring Three-Segment VXLAN to Implement Layer 3 Interworking
  • Example for Configuring Three-Segment VXLAN to Implement Layer 2 Interworking
  • Example for Configuring Static VXLAN in an Active-Active Scenario (Layer 2 Communication)
  • Example for Configuring Dynamic VXLAN in an Active-Active Scenario (Layer 3 Communication)
  • Example for Configuring VXLAN over IPsec in an Active-Active Scenario
  • Example for Configuring the Static VXLAN Active-Active Scenario (in VLAN-Aware Bundle Mode)
  • Example for Configuring IPv4 NFVI Distributed Gateway
  • Example for Configuring IPv6 NFVI Distributed Gateway
  • Example for Configuring the NFVI Distributed Gateway Function (Quad-Active DC-GWs)
  • Example for Configuring Three-Segment VXLAN to Implement Layer 3 Interworking (IPv6 Services)
  • IP Services
  • About This Document
  • ARP Configuration
  • Overview of ARP
  • Configuration Precautions for ARP
  • Configuring Static ARP
  • Configuring Dynamic ARP
  • Configuring Routed Proxy ARP
  • Configuring an IP Addresses for an Interface
  • Enabling Routed Proxy ARP
  • Verifying the Configuration of Routed Proxy ARP
  • Configuring Proxy ARP Anyway
  • Configuring an IP Address for an Interface
  • Enabling Proxy ARP Anyway
  • Verifying the Configuration
  • Configuring Proxy ARP Within a VLAN
  • Configuring an IP Addresses for an Interface
  • (Optional) Associating the Sub-interface with a VLAN
  • Enabling Proxy ARP Within a VLAN
  • Verifying the Configuration of Proxy ARP Within a VLAN
  • Configuring Proxy ARP Between VLANs
  • Configuring an IP Addresses for an Interface
  • (Optional) Associating the Sub-interface with a VLAN
  • Enabling Proxy ARP Between VLANs
  • Verifying the Configuration of Proxy ARP Between VLANs
  • Configuring Local Proxy ARP
  • Assigning an IP address to a VBDIF Interface
  • Enabling Local Proxy ARP
  • Configuring ARP-Ping
  • Configuring ARP-Ping IP
  • Configuring ARP-Ping MAC
  • Configuring Unicast ARP Probe
  • Configuring the Function to Send ARP Packets at a Constant Speed
  • Configuring Association Between ARP and Interface Status
  • Configuring a Rate for Sending ARP Broadcast Packets
  • Configuring the Payload Length of ARP Packets to Be Sent
  • (Optional) Disabling ARP-MAC Association
  • Maintaining ARP
  • Clearing ARP Statistics
  • Monitoring the ARP Operating Status
  • Configuration Examples for ARP
  • Example for Configuring Static ARP
  • Example for Configuring Routed Proxy ARP
  • Example for Configuring Proxy ARP Within a VLAN
  • Example for Configuring Proxy ARP Between VLANs
  • Example for Configuring Local Proxy ARP
  • Example for Configuring Association Between ARP and Interface Status
  • ACL Configuration
  • Overview of ACLs
  • Configuration Precautions for ACL
  • Configuring an Interface ACL
  • (Optional) Creating a Validity Period for an ACL Rule
  • Creating an Interface ACL
  • Configuring an Interface-based ACL Rule
  • Verifying the Configuration of an Interface ACL
  • Configuring a Basic ACL
  • (Optional) Creating a Validity Period for an ACL Rule
  • Creating a Basic ACL
  • Configuring a Basic ACL Rule
  • Applying a Basic ACL
  • Verifying the Configuration of a Basic ACL
  • Configuring an Advanced ACL
  • (Optional) Creating a Validity Period for an ACL Rule
  • Creating an Advanced ACL
  • (Optional) Configuring an ACL IP Address Pool
  • (Optional) Configuring an ACL Port Pool
  • Configuring an Advanced ACL Rule
  • Applying an Advanced ACL
  • Verifying the Configuration of an Advanced ACL
  • Configuring a Layer 2 ACL
  • (Optional) Creating a Validity Period in Which an ACL Rule Takes Effect
  • Creating a Layer 2 ACL
  • Configuring Rules for a Layer 2 ACL
  • Applying a Layer 2 ACL
  • Verifying the Configuration of a Layer 2 ACL
  • Configuring a User ACL
  • (Optional) Creating a Validity Period for an ACL Rule
  • Creating a User ACL
  • Configuring a User ACL Rule
  • Applying a User ACL
  • Verifying the Configuration of a User ACL
  • Configuring an MPLS-based ACL
  • Creating an MPLS-based ACL
  • Configuring an MPLS-based ACL Rule
  • Applying an MPLS-based ACL
  • Verifying the Configuration of an MPLS-based ACL
  • Maintaining an ACL
  • Clearing ACL Statistics
  • Monitoring the ACL Operating Status
  • Configuration Examples for ACLs
  • Example for Configuring a Basic ACL to Manage Device Access Rights
  • Example for Configuring an Advanced ACL to Defend Against Attacks
  • Example for Using Advanced ACLs to Prevent User Hosts on Different Network Segments from Communicating
  • DHCP Configuration
  • Overview of DHCP
  • Configuration Precautions for DHCP
  • Configuring DHCP Relay
  • Configuring DHCP Relay
  • (Optional) Requesting the DHCP Server to Release the Client IP Address
  • (Optional) Configuring Option 82 Field Insertion
  • (Optional) Configuring CAR for Whitelisted DHCP Sessions
  • Verifying the Configuration of DHCP Relay
  • Configuring a DHCP Server
  • Configuring IP Address Assignment
  • (Optional) Configuring IP Address Management
  • (Optional) Configuring Address Pool Attributes
  • (Optional) Configuring DHCP Server Dual-Device Hot Backup
  • (Optional) Configuring Parameters for DHCP User Access Restriction
  • (Optional) Configuring a Server to Force a Client to Renew the IP Address
  • Verifying the Configuration of a DHCP Server
  • Configuring DHCP-PNP
  • Configuring a DHCP Client
  • Maintaining a DHCP Client
  • Monitoring the Operating Status of a DHCP Client
  • Clearing Statistics on a DHCP Client
  • DHCP Server Maintenance
  • Monitoring the DHCP Server Operating Status
  • Clearing DHCP Server Statistics
  • DHCP Relay Maintenance
  • Monitoring the DHCP Relay Operating Status
  • Clearing DHCP Relay Statistics
  • Recording Exchange Messages with a DHCP Relay Client
  • Configuration Examples for DHCP
  • Example for Configuring DHCP Relay
  • Example for Configuring a DHCP Server for Clients on the Same Network Segment
  • Example for Configuring a DHCP Server to Assign IP Addresses to Users with the Same MAC Address in Different VLANs for Login
  • Example for Configuring DHCP Server Dual-Device Hot Backup
  • Example for Configuring DHCP Relay in an EVPN Active-Active Scenario
  • DHCPv6 Configuration
  • Overview of DHCPv6
  • Configuration Precautions for DHCPv6
  • Configuring DHCPv6 Relay
  • Enable DHCPv6
  • Configuring DHCPv6 Relay Forwarding
  • (Optional) Configuring DHCPv6 PD Relay Functions
  • (Optional) Configuring DHCPv6 Relay Dual-Device Hot Standby
  • (Optional) Configuring DHCPv6 Relay Options
  • (Optional) Configuring IPsec on a DHCPv6 Relay Agent
  • (Optional) Configuring CAR for Whitelisted DHCPv6 Sessions
  • Verifying the Configuration of DHCPv6 Relay
  • Maintaining DHCPv6 Relay
  • Monitoring the DHCPv6 Relay Operating Status
  • Clearing DHCPv6 Relay Statistics
  • Configuration Examples for DHCPv6
  • Example for Configuring DHCPv6 Relay
  • Example for Configuring DHCPv6 Relay Dual-Device Hot Standby
  • DNS Configuration
  • Overview of DNS
  • Configuration Precautions for DNS
  • Configuring DNS Client
  • Maintaining DNS
  • Clearing Dynamic DNS Entries
  • Monitoring the DNS Running Status
  • Configuration Examples for DNS
  • Example for Configuring Static DNS
  • Example for Configuring Dynamic DNS Client
  • IPv6 DNS Configuration
  • Overview of IPv6 DNS
  • Configuration Precautions for IPv6 DNS
  • Configuring IPv6 DNS Client
  • Maintaining IPv6 DNS
  • Clearing IPv6 DNS Entries
  • Monitoring the IPv6 DNS Operating Status
  • Configuration Examples for IPv6 DNS
  • Example for Configuring IPv6 DNS
  • MTU Configuration
  • Configuration Precautions for MTU
  • Interface MTU Setting
  • MPLS MTU Setting
  • Configure L2VPN MTU Negotiation
  • Setting the MTU Value for NAT64 Services
  • Configuring Parameters for the Path MTU Test
  • Configuring an MPLS MTU on an Interface
  • Configuring Path MTU Auto Discovery
  • Configuring the MTU for an Ethernet Interface
  • IPv4 Basic Configuration
  • Overview of IPv4
  • Configuration Precautions for IPv4 Basic
  • Configuring IP Addresses on an Interface
  • Configuring IP Address Unnumbered on an Interface
  • Configuring the Primary IP Address for a Numbered Interface
  • Configuring an Unnumbered Interface to Borrow an IP Address from Another Interface
  • Verifying the Configuration of IP Address Unnumbered
  • Configuring IPv4 Protocol Stack Security
  • Controlling the Processing of IP Packets Carrying Route Options
  • Controlling ICMP Packets
  • Setting the Timeout Period for the Reassembly Queue
  • Configuring IP Source Address Check
  • Verifying the Configuration of IPv4 Protocol Stack Security
  • Configuring TCP
  • Configuring TCP Timers
  • Specifying the Size of a TCP Sliding Window
  • Setting the MSS Value for a TCP Connection
  • Verifying the TCP Configuration
  • Disabling the IP Address Conflict Detection Function and Configuring the Preemption Function
  • Configuring the Policy for Sending and Receiving Host Packets
  • (Optional) Enabling an Interface to Receive and Forward Directed Broadcast Packets from the Directly Connected Network Segment
  • Configuring Forced IPv4 Packet Fragmentation
  • Enabling the Sending of FibMiss Packets to the Interface Board's CPU
  • Configuring Fast ICMP Reply
  • Configuring Fast Refreshing of Routes with Single Next Hops
  • (Optional) Enabling Hardware Copy
  • Configuring the IP Address of the Inbound Interface for Forwarding Packets as the Source Address of an ICMP Time Exceeded Message Forcibly
  • Maintaining IPv4
  • Monitoring the IPv4 Operating Status
  • Clearing IPv4 Statistics
  • Configuration Examples for IPv4
  • Example for Configuring Primary and Secondary IP Addresses for an Interface
  • Example for Configuring IP Address Unnumbered on an Interface
  • Example for Configuring Address Overlapping
  • Load Balancing Configuration
  • Overview of Load Balancing
  • Configuration Precautions for Load Balancing
  • Configuring Load Balancing Mode
  • Adjusting the Algorithm of Load Balancing
  • Configuring Hash Factors (VLL or IP Forwarding Scenarios)
  • Configuring Hash Factors (VPLS or Bridged Forwarding Scenarios)
  • Configuring Hash Factors (P nodes in MPLS Scenarios)
  • Configuring Hash Factors (Ingress PE in VLL Scenario)
  • Configuring Hash Factors (L2/L3VPN Over L2VPN Scenarios)
  • Configuring Hash-arithmetic
  • Configuring Load Balancing Based on Inner Information of Tunnel Packets
  • Disabling a Device from Using Tunnel Information as a Hash Factor During Hash Calculation for GTP Packets in an ESQM Scenario
  • Configuring Load Balancing Based on the Inner IP Header of GTP Packets
  • Configuring Dynamic Load Balancing
  • Enabling ECMP Load Balancing Consistency
  • Configuring Load Balancing Conditions
  • Configuring Unicast Route Load Balancing
  • Configuring Multicast Route Load Balancing
  • Configuring Eth-Trunk Load Balancing
  • Configuring Tunnel Load Balancing
  • Configuring Load Balancing for Redirected Traffic
  • Configuring UCMP
  • Load Balancing Configuration Examples
  • Example for Configuring Interface-specific UCMP for IP Packet Forwarding
  • Example for Configuring Global UCMP for IP Packet Forwarding
  • BGP Route Load Balancing in an RR Scenario
  • Solution to the Low Equal-Cost Route Specification on the Remote Device Without Interrupting Services
  • ACL6 Configuration
  • Overview of ACL6s
  • Configuration Precautions for ACL6
  • Configuring an Interface-based ACL6
  • (Optional) Creating a Validity Period for an ACL6 Rule
  • Creating an Interface-based ACL6
  • Configuring an Interface-based ACL6 Rule
  • Verifying the Configuration of Interface-based ACL6
  • Configuring a Basic ACL6
  • (Optional) Creating a Validity Period for an ACL6 Rule
  • Creating a Basic ACL6
  • Configuring a Basic ACL6 Rule
  • Applying a Basic ACL6
  • Verifying the Configuration of a Basic ACL6
  • Configuring an Advanced ACL6
  • (Optional) Creating a Validity Period for an ACL6 Rule
  • Creating an Advanced ACL6
  • (Optional) Configuring an ACL IPv6 Address Pool
  • Configuring an Advanced ACL6 Rule
  • Applying an Advanced ACL6
  • Verifying the Configuration of an Advanced ACL6
  • Configuring a User ACL6
  • (Optional) Creating a Validity Period for an ACL6 Rule
  • Creating a User ACL6
  • Configuring a User ACL6 Rule
  • Applying a User ACL6
  • Verifying the Configuration of a User ACL6
  • Maintaining an ACL6
  • Clearing ACL6 Statistics
  • Monitoring the ACL6 Operating Status
  • IPv6 Basic Configuration
  • Overview of IPv6
  • Configuration Precautions for IPv6 Basic
  • Configuring IPv6 Addresses for Interfaces
  • Enabling IPv6
  • Configuring a Link-local Address for an Interface
  • Configuring a Global Unicast Address for an Interface
  • Configuring an IPv6 Anycast Address for an Interface
  • Verifying the Configuration of IPv6 Addresses
  • Configuring an IPv6 Address Selection Policy Table
  • Disabling the IPv6 Address Conflict Detection Function and Configuring the Preemption Function
  • Configuring ICMPv6 Message Control
  • Configuring a Device to Permit IPv6 Packets Whose First Fragment Carries an Incomplete Header
  • Configuring a Filtering Policy for an IPv6 Extension Header
  • Configuring a Proper Reassembly Timeout Period for IPv6 Fragments
  • Configuring the IPv6 Address of the Inbound Interface for Forwarding Packets as the Source Address of an ICMPv6 Time Exceeded Message Forcibly
  • Configuring PMTUs
  • Configuring a Static PMTU
  • Setting the Aging Time of Dynamic PMTU Entries
  • Verifying the Configuration of PMTUs
  • Configuring TCP6
  • Configuring TCP6 Timers
  • Specifying the Size of a TCP6 Sliding Window
  • Setting the MSS Value for a TCP6 Connection
  • Verifying the TCP6 Configuration
  • Maintaining IPv6
  • Clearing IPv6 Statistics
  • Monitoring the IPv6 Operating Status
  • Configuration Examples for IPv6
  • Example for Configuring IPv6 Addresses for Interfaces
  • Example for Configuring an IPv6 Address Selection Policy Table
  • ND Configuration
  • Overview of ND
  • Configuration Precautions for ND
  • Configuring IPv6 Neighbor Discovery
  • Configuring Static Neighbors
  • (Optional) Setting the Aging Time for Neighbor Entries in the Stale State
  • (Optional) Setting the Neighbor Reachability Detection Interval
  • (Optional) Configuring the Maximum Number of Dynamic ND Entries
  • (Optional) Configuring Strict Prefix Learning for Dynamic Neighbor Entries
  • (Optional) Configuring Probe Parameters for ND Entries in the PROBE State
  • (Optional) Configuring Generation of Neighbor Entries Upon Receipt of NA Messages
  • (Optional) Configuring an Interval for Recording ND Logs and Sending ND Traps
  • (Optional) Configuring Manually Triggered Dual-Device ND Hot Backup
  • (Optional) Configuring Attack Detection for ND Packets with a Fixed Source MAC Address
  • (Optional) Configuring MAC Address Check for ND
  • (Optional) Configuring ND Fast Reply
  • (Optional) Disabling ND-MAC Association
  • Verifying the Configuration of IPv6 Neighbor Discovery
  • Configuring Duplicate Address Detection
  • Setting the Number of Duplicate Address Detection Attempts
  • Setting the Duplicate Address Detection Interval
  • Setting a Timeout Period for DAD Messages
  • Disabling DAD from Continuing Detection in an Address Conflict Scenario
  • Configuring a Limit on the Rate at Which NS Messages Are Sent for DAD to Continue Detection in an Address Conflict Scenario
  • Configuring a Threshold for DAD to Consider an Address Available in an Address Conflict Self-Recovery Scenario
  • Verifying the Configuration of Duplicate Address Detection
  • Configuring RA
  • Enabling RA Message Sending
  • Configuring Parameters Carried in RA Messages
  • (Optional) Setting the RA Message Advertisement Interval
  • (Optional) Configuring the Default Router Priority and Route Information
  • Verifying the Configuration of RA
  • Configuring IPv6 SEND
  • Configuring a CGA IPv6 Address
  • Enabling IPv6 SEND
  • Verifying the Configuration of IPv6 SEND
  • Configuring Rate Limiting on ND Messages
  • Configuring a Rate Limit for Sending ND Messages
  • Configuring a Rate Limit for Receiving ND Messages
  • Configuring Proxy ND
  • Configuring Routed Proxy ND
  • Configuring Any Proxy ND
  • Configuring Intra-VLAN Proxy ND
  • Configuring Inter-VLAN Proxy ND
  • Configuring Local Proxy ND
  • Configuring NS Multicast Suppression on an EVPN MPLS
  • Maintaining ND
  • Clearing ND Statistics
  • Monitoring the ND Operating Status
  • Configuration Examples for ND
  • Example for Configuring IPv6 Neighbor Discovery
  • Example for Configuring IPv6 SEND
  • Example for Configuring Routed Proxy ND
  • Example for Configuring Any Proxy ND
  • Example for Configuring Intra-VLAN Proxy ND
  • Example for Configuring Inter-VLAN Proxy ND in a VLAN Aggregation Scenario
  • Example for Configuring Local Proxy ND
  • Example for Configuring Inter-VLAN Proxy ND on an L2VPN+L3VPN IP RAN
  • Example for Configuring NS Multicast Suppression on an EVPN MPLS Network
  • IP Routing
  • About This Document
  • Basic IP Routing Configuration
  • Overview of Basic IP Routing
  • Configuration Precautions for Basic IP Routing
  • Configuring the Router ID
  • Configuring IPv4 Multi-Topology
  • Configuring IPv6 Multi-Topology
  • Configuring IPv4 FRR
  • Configuring IPv6 FRR
  • Configuring Route Recursion to the Default Route
  • Configuring Association Between Direct Routes and a VRRP Group
  • Configuring a Dynamic Routing Protocol to Import Direct Routes
  • Verifying the Configuration of Association Between Direct Routes and a VRRP Group
  • Configuring an IPv6 Direct Route to Respond to L3VE Interface Status Changes After a Delay
  • Configuring the Association Between the IPv6 Direct Route and PW Status
  • Configuring the Advertisement of IPv4 ARP Vlink Direct Routes on the Public Network
  • Configuring the Advertisement of IPv6 NDP Vlink Direct Routes on the Public Network
  • Configuring Route or Tunnel Recursion Suppression in Case of Flapping
  • Maintaining IP Routes
  • Displaying the Routing Table
  • Clearing Routing Table Statistics
  • Configuring Thresholds for the Number of IPv4 Route Prefixes
  • Configuring Thresholds for the Number of IPv6 Route Prefixes
  • Configuration Examples for IP Routing Basis
  • Example for Configuring Public Network IPv4 FRR
  • Example for Configuring Public Network IPv6 FRR
  • Example for Importing IPv4 ARP Vlink Direct Routes to BGP
  • Example for Importing IPv6 NDP Vlink Direct Routes to BGP4+
  • IPv4 Static Route Configuration
  • Overview of IPv4 Static Routes
  • Configuration Precautions for IPv4 Static Route
  • Configuring IPv4 Static Routes
  • Creating IPv4 Static Routes
  • (Optional) Setting the Default Priority for IPv4 Static Routes
  • (Optional) Configuring Iterative Depth-based Static Route Selection
  • (Optional) Configuring a Device to Iterate Static Routes to ARP Vlink Routes
  • (Optional) Enabling a Device to Recurse Static Routes to SRv6 Routes
  • (Optional) Preventing an IPv4 Static Route from Being Selected If the BFD Session Associated with It Is in the AdminDown State
  • Verifying the IPv4 Static Route Configuration
  • Configuring IPv4 Floating Static Routes
  • Configuring Association between LDP and Static Routes
  • Configuring IPv4 Static Route Detection
  • Configuring Dynamic BFD for IPv4 Static Routes
  • Configuring Static BFD for IPv4 Static Routes
  • Configuring NQA for IPv4 Static Routes
  • Associating EFM with IPv4 Static Routes
  • Configuring FRR for IPv4 Static Routes
  • Configuration Examples for IPv4 Static Routes
  • Example for Configuring IPv4 Static Routes
  • Example for Configuring IPv4 Floating Static Routes
  • Example for Configuring Dynamic BFD for IPv4 Static Routes
  • Example for Configuring Static BFD for IPv4 Static Routes
  • Example for Associating EFM with IPv4 Static Routes
  • Example for Configuring FRR for IPv4 Static Routes on the Public Network
  • Example for Configuring Association between LDP and Static Routes
  • IPv6 Static Route Configuration
  • Overview of IPv6 Static Routes
  • Configuration Precautions for IPv6 Static Route
  • Configuring IPv6 Static Routes
  • Creating IPv6 Static Routes
  • (Optional) Setting the Default Priority for IPv6 Static Routes
  • (Optional) Enabling a Device to Recurse IPv6 Static Routes to ARP Vlink Direct Routes
  • (Optional) Enabling a Device to Recurse IPv6 Static Routes to SRv6 Routes
  • (Optional) Preventing an IPv6 Static Route from Being Selected If the BFD Session Associated with It Is in the AdminDown State
  • Verifying the IPv6 Static Route Configuration
  • Configuring IPv6 Floating Static Routes
  • Configuring IPv6 Static Route Detection
  • Configuring Dynamic BFD for IPv6 Static Routes
  • Configuring Static BFD for IPv6 Static Routes
  • Configuring NQA for IPv6 Static Routes
  • Configuring FRR for IPv6 Static Routes
  • Configuration Examples for IPv6 Static Routes
  • Example for Configuring IPv6 Static Routes
  • Example for Configuring IPv6 Floating Static Routes
  • Example for Configuring Dynamic BFD for IPv6 Static Routes
  • Example for Configuring Static BFD for IPv6 Static Routes
  • Example for Configuring FRR for IPv6 Static Routes on the Public Network
  • OSPF Configuration
  • Overview of OSPF
  • Configuration Precautions for OSPF
  • Configuring Basic OSPF Functions
  • Enabling OSPF
  • Configuring an Interface to Fill in a DD Packet with the Interface MTU
  • (Optional) Creating OSPF Virtual Links
  • (Optional) Configuring the router to Comply with Route Selection Rules Defined in a Standard Protocol
  • (Optional) Setting the OSPF Priority
  • (Optional) Restricting the Flooding of OSPF Update LSAs
  • (Optional) Configuring the Maximum Number of Packet Retransmission Attempts
  • (Optional) Setting an Interval at Which an LSA Packet Is Retransmitted to the Neighboring router
  • Verifying the Basic OSPF Configuration
  • Configuring OSPF on the NBMA or P2MP Network
  • Configuring Network Types for OSPF Interfaces
  • Configuring NBMA Network Attributes
  • Configuring P2MP Network Attributes
  • Verifying the Configuration of OSPF on the NBMA or P2MP Network
  • Adjusting OSPF Route Selection
  • Setting the Interface Cost
  • Configuring Equal-Cost Routes
  • Setting the convergence priority for OSPF routes
  • Configuring a Stub Router
  • Suppressing an Interface from Receiving and Sending OSPF Packets
  • Configuring an OSPF Interface to Automatically Adjust the Link Cost
  • Configuring a Fallback Cost for an Eth-Trunk Interface
  • Verifying the Configuration of OSPF Route Selection
  • Controlling OSPF Routing Information
  • Configuring OSPF to Import External Routes
  • Configuring OSPF to Import a Default Route
  • Configuring Route Summarization
  • Configuring OSPF to Filter LSAs in an Area
  • Configuring OSPF to Filter LSAs to Be Sent
  • Configuring OSPF to Filter Received Routes
  • Configuring OSPF to Filter the Routes to Be Advertised
  • (Optional) Configuring OSPF to Discard Specified LSAs
  • Configuring the Maximum Number of External Routes Supported by the OSPF LSDB
  • Verifying the Configuration of OSPF Routing Information Control
  • Adjusting the OSPF Network Convergence Speed
  • Setting the Interval at Which Hello Packets Are Sent
  • Setting the Delay for Transmitting LSAs on an Interface
  • Setting the Dead Time of an OSPF Neighbor
  • Configuring OSPF Sham Hello
  • Configuring Smart-discover
  • Setting the Interval at Which LSAs Are Updated
  • Setting the Interval at Which LSAs Are Received
  • Setting the Interval for the SPF Calculation
  • Configuring the Function to Suppress the Advertisement of Interface Addresses
  • Configuring the Route Calculation Delay Function to Suppress Frequent LSA Flapping
  • Disabling Active/Standby Board Switching Triggered by Abnormal OSPF Aging
  • Disabling OSPF LSA Aging Management
  • Setting a Period During Which OSPF Keeps the Maximum Cost in Local LSAs
  • Configuring Secure Synchronization
  • Verifying the Configuration of the OSPF Network Convergence Speed
  • Configuring OSPF Delay Advertisement
  • Configuring OSPF Neighbor Relationship Flapping Suppression
  • Disabling OSPF Interface Flapping Suppression
  • Disabling Routing Loop Detection for Routes Imported to OSPF
  • Configuring OSPF Flush LSA Source Tracing
  • Configuring an OSPF Hostname
  • Configuring an OSPF Stub Area
  • Configuring an NSSA
  • Configuring OSPF Local MT
  • Configuring an OSPF Sham Link
  • Configuring BFD for OSPF
  • Configuring BFD for OSPF in a Specified Process
  • Configuring BFD for OSPF on a Specified Interface
  • Verifying the Configuration of BFD for OSPF
  • Configuring OSPF IP FRR
  • Enabling OSPF IP FRR
  • (Optional) Binding IP FRR and BFD
  • (Optional) Disabling OSPF IP FRR on an Interface
  • Verifying the Configuration of OSPF IP FRR
  • Configuring OSPF GR Helper
  • Improving OSPF Network Security
  • Configuring Area Authentication
  • Configuring Interface Authentication
  • Verifying the Configuration of OSPF Network Security
  • Configuring the Network Management Function of OSPF
  • Configuring Whitelist Session-CAR for OSPF
  • Configuring Micro-Segment CAR for OSPF
  • Maintaining OSPF
  • Clearing OSPF Statistics
  • Resetting OSPF
  • Disabling OSPF Memory Overload Control
  • Disabling OSPF CPU Overload Control
  • Configuring OSPF Multi-Area Adjacency
  • Enabling OSPF on a Multi-Area Adjacency Interface
  • Configuring a Cost for a Multi-Area Adjacency Interface
  • Configuring an Authentication Mode for a Multi-Area Adjacency Interface
  • Configuring Fast Convergence for a Multi-Area Adjacency Interface
  • Configuring Neighbor Relationship Flapping Suppression on an OSPF Multi-Area Adjacency Interface
  • Disabling an OSPF Multi-Area Adjacency Interface from Creating BFD Sessions
  • Disabling OSPF IP FRR on an OSPF Multi-Area Adjacency Interface
  • Configuring a Fallback Cost for an Eth-Trunk Multi-Area Adjacency Interface
  • Maintaining OSPF on a Multi-Area Adjacency Interface
  • Verifying the Configuration of OSPF Multi-Area Adjacency
  • Configuration Examples for OSPF
  • Example for Configuring Basic OSPF Functions
  • Example for Configuring OSPF Virtual Links
  • Example for Configuring an OSPF Stub Area
  • Example for Configuring an OSPF NSSA
  • Example for Configuring OSPF DR Election
  • Example for Configuring OSPF Load Balancing
  • Example for Configuring OSPF Fast Convergence
  • Example for Configuring OSPF Local MT
  • Example for Configuring OSPF IP FRR
  • Example for Configuring BFD for OSPF
  • Example for Configuring OSPF-BGP Synchronization
  • Example for Configuring Routing Loop Detection for Routes Imported from BGP to OSPF
  • Example for Configuring OSPF Multi-Area Adjacency
  • Example for Configuring an OSPF Sham Link
  • OSPFv3 Configuration
  • OSPFv3 Overview
  • Configuration Precautions for OSPFv3
  • Configuring Basic OSPFv3 Functions
  • Enabling OSPFv3
  • Enabling OSPFv3 on an Interface
  • Creating an OSPFv3 Area
  • (Optional) Configuring the router to Comply with Route Selection Rules Defined in a Standard Protocol
  • (Optional) Configuring the Maximum Number of Packet Retransmission Attempts
  • (Optional) Disabling an Interface from Receiving and Sending OSPFv3 Packets
  • Verifying the Basic OSPFv3 Configuration
  • Configuring OSPFv3 Attributes on Different Types of Networks
  • Configuring the Network Type for an OSPFv3 Interface
  • (Optional) Setting the DR Priority for the OSPFv3 Broadcast or NBMA Interface
  • (Optional) Setting the Polling Interval at Which Hello Packets Are Sent on an NBMA Network
  • (Optional) Disabling MTU Check on DD Packets
  • Verifying the Configuration of OSPFv3 Attributes in Different Types of Networks
  • Adjusting OSPFv3 Route Selection
  • Setting the Link Cost on an OSPFv3 Interface
  • Setting the Maximum Number of Equal-Cost Routes
  • Setting the convergence priority for OSPFv3 routes
  • Configuring an OSPFv3 Interface to Automatically Adjust the Link Cost
  • Verifying the Configuration of OSPFv3 Route Selection
  • Controlling OSPFv3 Routing Information
  • Configuring OSPFv3 to Import External Routes
  • Configuring OSPFv3 to Advertise the Default Route to the OSPFv3 Area
  • Configuring OSPFv3 to Filter Received Routes
  • Configuring OSPFv3 to Filter the Routes to Be Advertised
  • Configuring OSPFv3 to Filter LSAs in an Area
  • (Optional) Configuring OSPFv3 to Discard Specified LSAs
  • Configuring OSPFv3 Route Summarization
  • Verifying the Configuration of OSPFv3 Routing Information Control
  • Disabling DN Bit Setting in OSPFv3 LSAs
  • Disabling DN Bit Checking in OSPFv3 LSAs
  • Configuring OSPFv3 Neighbor Relationship Flapping Suppression
  • Disabling OSPFv3 Interface Flapping Suppression
  • Configuring OSPFv3 Flush LSA Source Tracing
  • Configuring an OSPFv3 Hostname
  • Configuring an OSPFv3 Stub Area
  • Configuring an OSPFv3 NSSA
  • Configuring OSPFv3 IP FRR
  • Enabling OSPFv3 IP FRR
  • (Optional) Binding IP FRR and BFD
  • (Optional) Blocking FRR on an OSPFv3 Interface
  • Verifying the Configuration of OSPFv3 IP FRR
  • Configuring BFD for OSPFv3
  • Configuring BFD Globally
  • Configuring OSPFv3 BFD Parameters
  • (Optional) Preventing an Interface from Dynamically Setting Up a BFD Session
  • (Optional) Configuring BFD for a Specified Interface
  • Verifying the Configuration of BFD for OPSFv3
  • Configuring OSPFv3 Authentication
  • Configuring OSPFv3 IPsec
  • Configuring an IPsec Proposal
  • Configuring an IPsec SA
  • Enabling OSPFv3 IPsec
  • Configuring OSPFv3 Authentication Trailer
  • Configuring OSPFv3 Process Authentication
  • Configuring OSPFv3 Area Authentication
  • Configuring OSPFv3 Interface Authentication
  • Verifying the Configuration of OSPFv3 Authentication
  • Configuring OSPFv3 Fast Convergence
  • Setting the Interval at Which Hello Packets Are Sent
  • Setting the Dead Time of the Neighbor Relationship
  • Configuring OSPFv3 Sham Hello
  • Setting the Interval at Which LSAs Are Updated
  • Setting the Interval at Which LSAs Are Received
  • Disabling OSPFv3 LSA Aging Management
  • Verifying the Configuration of OSPFv3 Fast Convergence
  • Configuring the OSPFv3 GR Helper
  • Improving OSPFv3 Network Stability
  • Setting the Priority of OSPFv3
  • Setting the Delay in Transmitting LSAs on the Interface
  • Setting the Interval at Which LSAs Are Retransmitted Between Adjacent Routers
  • Configuring a Route Calculation Delay to Suppress Frequent LSA Flapping
  • Configuring the SPF Timer
  • Configuring a Stub Router
  • Verifying the Configuration of OSPFv3 Network Stability
  • Configuring the Network Management Function of OSPFv3
  • Whitelist Session-CAR for OSPFv3
  • Configuring Micro-Isolation CAR for OSPFv3
  • Maintaining OSPFv3
  • Clearing OSPFv3 Statistics
  • Resetting OSPFv3
  • Disabling OSPFv3 Memory Overload Control
  • Disabling OSPFv3 CPU Overload Control
  • Configuration Examples for OSPFv3
  • Example for Configuring Basic OSPFv3 Functions
  • Example for Configuring OSPFv3 DR Election
  • Example for Configuring OSPFv3 IP FRR
  • Example for Configuring BFD for OSPFv3
  • Example for Configuring IPSec for OSPFv3
  • Example for Configuring OSPFv3 Route Summarization on an ASBR
  • Example for Configuring OSPFv3 Route Summarization on an ABR
  • Example for Configuring an OSPFv3 NSSA
  • RIP Configuration
  • Overview of RIP
  • Configuration Precautions for RIP
  • Configuring Basic RIP Functions
  • Creating a RIP process
  • Enabling RIP on Specified Network Segments
  • (Optional) Configuring the RIP Version Number
  • (Optional) Configuring a RIP Preference
  • (Optional) Disabling Check on the Source Address of RIP Packets on a P2P Network
  • (Optional) Enabling Check on Zero Fields of RIP-1 Packets
  • Configuring an NBMA Network
  • Verifying the Basic RIP Configuration
  • Preventing Routing Loops
  • Configuring Split Horizon
  • Configuring Poison Reverse
  • Configuring Suppression Timers
  • Verifying the Configuration of Routing Loop Prevention
  • Adjusting RIP Route Selection
  • Disabling RIP-2 Classful Summarization
  • Configuring the Additional Metric on an Interface
  • Setting the Maximum Number of Equal-Cost Routes
  • Verifying the Configuration of RIP Route Selection
  • Controlling RIP Routing Information
  • Configuring RIP to Import External Routes
  • Configuring RIP to Advertise Default Routes
  • Configuring RIP to Filter Received Routes
  • Configuring RIP to Filter the Routes to Be Advertised
  • Disabling RIP from Receiving Host Routes
  • Disabling the Check on RIP Packets with Cost 0
  • Disabling an Interface from Sending Packets
  • Disabling an Interface from Receiving Packets
  • Verifying the Configuration of RIP Routing Information Control
  • Configuring RIP Fast Convergence
  • Configuring RIP-2 Route Summarization
  • Configuring RIP Timers
  • Configuring RIP Triggered Update
  • Setting the Interval at Which Packets Are Sent and the Maximum Number of the Sent Packets
  • Setting the Maximum Length of RIP packets
  • Setting the Maximum Number of RIP Routes
  • Verifying the Configuration of RIP Fast Convergence
  • Configuring Dynamic BFD for RIP
  • Configuring Static BFD for RIP
  • Improving RIP Network Security
  • Configuring an Authentication Mode for RIP-2 Packets
  • Configuring the Check on the Source Address in RIP Packets on the Broadcast Network
  • Configuring GTSM for RIP
  • Verifying the Configuration of RIP Network Security
  • Configuring RIP Network Management
  • Maintaining RIP
  • Clearing RIP
  • Debugging RIP
  • Configuration Examples for RIP
  • Example for Configuring Basic RIP Functions
  • Example for Preventing Routing Loops
  • Example for Configuring RIP to Import External Routes
  • Example for Configuring Dynamic BFD for RIP
  • Example for Configuring Static BFD for RIP
  • RIPng Configuration
  • Overview of RIPng
  • Configuration Precautions for RIPng
  • Configuring Basic RIPng Functions
  • Creating a RIPng process
  • Enabling RIPng on an Interface
  • (Optional) Configuring the RIPng Priority
  • (Optional) Enabling Check on Zero Fields of RIPng Packets
  • Verifying the Basic RIPng Configuration
  • Controlling the Sending and Receiving of RIPng Packets
  • Disabling Receiving of RIPng Packets on an Interface
  • Disabling Sending of RIPng Packets on an Interface
  • Setting the Interval for Sending Update Packets and the Maximum Number of Packets Sent Each Time
  • Verifying the Configuration of Controlling the Sending and Receiving of RIPng Packets
  • Preventing Routing Loops
  • Configuring Split Horizon
  • Configuring Poison Reverse
  • Configuring Suppression Timers
  • Verifying the Configuration of Routing Loop Prevention
  • Adjusting RIPng Route Selection
  • Configuring the Additional Metric on an Interface
  • Setting the Maximum Number of Equal-Cost Routes
  • Verifying the Configuration of RIPng Route Selection
  • Controlling RIPng Routing Information
  • Configuring RIPng to Import External Routes
  • Configuring RIPng to Filter the Received Routes
  • Configuring RIPng to Filter the Routes to be Sent
  • Configuring RIPng to Advertise the Default Routes
  • Configuring RIPng Route Summarization
  • Verifying the Configuration of RIPng Routing Information Control
  • Configuring RIPng Timers
  • Configuring IPsec Authentication for RIPng
  • Configuring IPsec Authentication for a RIPng Process
  • Configuring IPsec Authentication on a RIPng Interface
  • Verifying the Configuration of IPsec Authentication for RIPng
  • Maintaining RIPng
  • Clearing RIPng
  • Debugging RIPng
  • RIPng Configuration Examples
  • Example for Configuring Basic RIPng Functions
  • Example for Configuring Split Horizon
  • IS-IS Configuration
  • Overview of IS-IS
  • Configuration Precautions for IS-IS
  • Configuring Basic IPv4 IS-IS Functions
  • Creating an IPv4 IS-IS Process
  • Configuring an IPv4 IS-IS Interface
  • (Optional) Configuring a Cost for IS-IS Interfaces (IPv4)
  • (Optional) Configuring IS-IS Attributes on Interfaces of Different Network Types (IPv4)
  • (Optional) Enabling LSP Fragment Extension on an IS-IS Device (IPv4)
  • (Optional) Enabling a Device to Encapsulate Only One Interface IP Address in IS-IS LSPs (IPv4)
  • Verifying the Configuration
  • Configuring IPv4 IS-IS Route Selection
  • Configuring IPv4 IS-IS Route Leaking
  • Configuring Rules for Selecting Equal-Cost IPv4 IS-IS Routes
  • Filtering IPv4 IS-IS Routes
  • Configuring an Overload Bit for an IPv4 IS-IS Device
  • Configuring IS-IS to Generate IPv4 Default Routes
  • Configuring an IPv4 IS-IS Interface to Automatically Adjust the Link Cost
  • Verifying the IPv4 IS-IS Route Selection Configuration
  • Configuring IPv4 IS-IS to Interact with Other Routing Protocols
  • Configuring a Preference Value for IPv4 IS-IS
  • Configuring IPv4 IS-IS to Import External Routes
  • Verifying the Configuration
  • Adjusting the IPv4 IS-IS Route Convergence Speed
  • Configuring the Interval for Detecting IS-IS Neighboring Device Failures
  • Setting Flooding Parameters of SNPs and LSPs
  • Setting the SPF Calculation Interval
  • Configuring Convergence Priorities for IPv4 IS-IS Routes
  • Enabling IS-IS Intelligent Convergence
  • Verifying the Configuration
  • Configuring an IS-IS Multi-Instance Process
  • Enabling the Advertisement of IPv4 Delay Information
  • Configuring an IS-IS Process to Advertise IPv4 Packet Loss Rates
  • Configuring Static BFD for IS-IS
  • Configuring Dynamic BFD for IS-IS
  • Configuring BFD Globally
  • Configuring BFD for an IS-IS Process
  • (Optional) Preventing an Interface from Dynamically Establishing a BFD Session
  • (Optional) Configuring BFD on a Specified Interface
  • Verifying the Configuration of Dynamic BFD for IS-IS
  • Configuring IS-IS IPv4 MT to Isolate Multicast Services from Unicast Services
  • Enabling IPv4 MT for an IS-IS Process
  • Enabling MT for IPv4 an IS-IS Interface
  • Verifying the Configuration
  • Configuring IPv4 IS-IS Route Summarization
  • Configuring IS-IS Auto FRR
  • Configuring Basic IPv6 IS-IS Functions
  • Creating an IPv6 IS-IS Process
  • Configuring an IPv6 IS-IS Interface
  • (Optional) Configuring a Cost for IS-IS Interfaces (IPv6)
  • (Optional) Configuring IS-IS Attributes on Interfaces of Different Network Types (IPv6)
  • (Optional) Enabling LSP Fragment Extension on an IS-IS Device (IPv6)
  • Verifying the Configuration
  • Configuring IPv6 IS-IS Route Selection
  • Configuring IPv6 IS-IS Route Leaking
  • Configuring Rules for Selecting Equal-Cost IPv6 IS-IS Routes
  • Filtering IPv6 IS-IS Routes
  • Configuring an Overload Bit for an IPv6 IS-IS Device
  • Configuring IS-IS to Generate IPv6 Default Routes
  • Configuring an IPv6 IS-IS Interface to Automatically Adjust the Link Cost
  • Verifying the Configuration
  • Configuring IPv6 IS-IS to Interact with Other Routing Protocols
  • Configuring a Priority Value for IPv6 IS-IS
  • Configuring IPv6 IS-IS to Import External Routes
  • Verifying the Configuration
  • Adjusting the IPv6 IS-IS Route Convergence Speed
  • Configuring the Interval for Detecting IS-IS Neighboring Device Failures
  • Setting Flooding Parameters of SNPs and LSPs
  • Setting the SPF Calculation Interval
  • Configuring Convergence Priorities for IPv6 IS-IS Routes
  • Configuring Interface Address Advertisement Suppression
  • Verifying the Configuration
  • Enabling the Advertisement of IPv6 Delay Information
  • Configuring an IS-IS Process to Advertise IPv6 Packet Loss Rates
  • Configuring IS-IS Neighbor Relationship Flapping Suppression
  • Disabling IS-IS Interface Flapping Suppression
  • Disabling Routing Loop Detection for Routes Imported to IS-IS
  • Configuring IS-IS Purge LSP Source Tracing
  • Configuring Dynamic BFD for IPv6 IS-IS
  • Configuring BFD Globally
  • Configuring BFD for an IS-IS IPv6 Process
  • (Optional) Preventing an IPv6 Interface from Dynamically Establishing BFD SessionS
  • (Optional) Configuring BFD on a Specified IPv6 Interface
  • Verifying the Configuration
  • Configuring IS-IS IPv6 MT to Isolate Multicast Services from Unicast Services
  • Enabling MT for an IPv6 IS-IS Process
  • Enabling MT for an IPv6 IS-IS Interface
  • Verifying the Configuration
  • Configuring IS-IS MT to Isolate IPv4 Services from IPv6 Services
  • Enabling MT for an IS-IS Process
  • Enabling MT for an IS-IS Interface
  • Verifying the Configuration
  • Configuring IPv6 IS-IS Route Summarization
  • Configuring IPv6 IS-IS Auto FRR
  • Configuring an IS-IS Link Group
  • Configuring IS-IS Local MT
  • Enabling Local MT
  • (Optional) Controlling the Size of the MIGP Routing Table
  • Verifying the Configuration of IS-IS Local MT
  • Improving IS-IS Network Security
  • Configuring IS-IS Authentication
  • Configuring the Optional Checksum
  • Verifying the Configuration of Improving IS-IS Network Security
  • Configuring Whitelist Session-CAR for IS-IS
  • Configuring Micro-Isolation CAR for IS-IS
  • Maintaining IS-IS
  • Resetting IS-IS
  • Suppressing IS-IS
  • Disabling IS-IS Memory Overload Control
  • Disabling IS-IS CPU Overload Control
  • (Optional) Configuring IS-IS to Discard a Specified LSP
  • IS-IS Configuration Examples
  • Example for Configuring Basic IS-IS Functions
  • Example for Configuring IS-IS DIS Election
  • Example for Configuring IS-IS Load Balancing
  • Example for Configuring IS-IS to Interact with BGP
  • Example for Configuring IS-IS Multi-Instance Processes
  • Example for Configuring Static BFD for IS-IS
  • Example for Configuring Dynamic BFD for IS-IS
  • Example for Configuring Dynamic BFD for IPv6 IS-IS
  • Example for Configuring Basic IS-IS IPv6 Functions
  • Example for Configuring IS-IS MT
  • Example for Configuring Routing Loop Detection for Routes Imported from OSPF to IS-IS
  • Example for Configuring IS-IS Auto FRR
  • Example for Configuring IS-IS Route Summarization
  • Example for Configuring Local MT
  • BGP Configuration
  • BGP Overview
  • Configuration Precautions for BGP
  • Configuring Basic BGP Functions
  • Starting a BGP Process
  • Configuring a BGP Peer
  • Configuring BGP to Import Routes
  • Verifying the Basic BGP Configuration
  • Configuring BGP Route Attributes
  • Setting the BGP Priority
  • Setting a PrefVal for BGP Routes
  • Setting the Default Local_Pref Attribute for the Local Device
  • Configuring MED Attributes for BGP Routes
  • Configuring the Next_Hop Attribute
  • Setting the AS_Path Attribute
  • Configuring AIGP Attributes for Routes
  • Configuring Attr_Set Attribute Encapsulation or Parsing
  • Verifying the BGP Route Attribute Configuration
  • Using a Routing Policy to Filter the BGP Routes to Be Advertised
  • Configuring BGP Filters
  • Configuring to Control the Advertisement of BGP Routing Information
  • (Optional) Configuring BGP Soft Resetting
  • Verifying the Configuration
  • Using a Routing Policy to Filter the BGP Routes to Be Received
  • Configuring BGP Filters
  • Controlling the Acceptance of BGP Routing Information
  • (Optional) Configuring BGP Soft Reset
  • Verifying the Configuration
  • Using XPL to Filter the BGP Routes to Be Advertised
  • Using XPL to Filter the BGP Routes to Be Received
  • Configuring BGP Route Summarization
  • Configuring BGP to Generate a Summary Default Route
  • Configuring a BGP Peer Group
  • Creating an IBGP Peer Group
  • Creating a Pure EBGP Peer Group
  • Creating a Mixed EBGP Peer Group
  • Verifying the BGP Peer Group Configuration
  • Configuring a BGP Route Reflector
  • Configuring a Route Reflector and Specifying Clients
  • (Optional) Disabling Route Reflection Between Clients Through the RR
  • (Optional) Setting the Cluster ID of a Route Reflector
  • (Optional) Preventing a Device from Adding BGP Routes to the IP Routing Table
  • (Optional) Enabling an RR to Modify Route Attributes Using an Export Policy
  • Verifying the BGP Route Reflector Configuration
  • Configuring a BGP Confederation
  • Configuring BGP Community Attributes
  • Configuring a Community Attribute-Related Policy
  • Configuring Community Attribute Advertisement
  • Verifying the BGP Community Attribute Configuration
  • Configuring the BGP Large-Community Attribute
  • Configuring a Route-Policy Related to the Large-Community Attribute
  • Advertising the Large-Community Attribute
  • Verifying the Large-Community Configuration
  • Configuring Prefix-based BGP ORF
  • Adjusting the BGP Network Convergence Speed
  • Configuring BGP Keepalive and Hold Timers
  • Configuring a MinRouteAdvertisementIntervalTimer
  • Disabling Fast Reset of EBGP Connections
  • Configuring a BGP ConnectRetry Timer
  • Enabling Slow Peer Detection
  • Verifying the Configuration of the BGP Network Convergence Speed
  • Configuring a Dynamic BGP Peer Group
  • Configuring a BGP Device to Send a Default Route to Its Peer
  • Configuring a Device to Advertise BGP Supernet Unicast Routes to BGP Peers
  • Configuring BGP Load Balancing
  • Configuring BGP LSP Load Balancing
  • Configuring a BGP SR LSP
  • Configuring Path MTU Auto Discovery
  • Configuring BGP Route Recursion to the Default Route
  • Configuring BGP Next Hop Recursion Based on a Route-Policy
  • Configuring AIGP value on a Route-Policy
  • Configuring the POPGO Function
  • Configuring conversion from BGP IPv4 Unicast Routes to Labeled Routes
  • Configuring BFD for BGP
  • Configuring BGP Peer Tracking
  • Configuring BGP Auto FRR
  • Configuring the BGP Next Hop Recursion Change Delayed Response
  • Setting a Specified Peer or Each Peer in a Peer Group as an Independent Update Peer-Group
  • Configuring a Delay in Releasing Obtained Labels in a BGP LSP FRR Switchover Scenario
  • Configuring the Route Server Function
  • Configuring the BGP GR Helper
  • Enabling BGP GR
  • Configuring the Parameter for a BGP GR Session
  • Verifying the BGP GR Helper Configuration
  • Enabling GR for BGP Peers
  • Configuring BGP Best-external
  • Configuring BGP Add-Path
  • Configuring BMP
  • Configuring BGP Route Dampening
  • Configuring Suppression on BGP Peer Flapping
  • Configuring BGP Recursion Suppression in Case of Next Hop Flapping
  • Configuring BGP-LS
  • Configuring the Entropy Label Capability for a BGP LSP
  • Configuring BGP RPD
  • Configuring IBGP Peers to Establish MPLS Local IFNET Tunnels
  • Improving BGP Security
  • Configuring MD5 Authentication
  • Configuring Keychain Authentication
  • Configuring TCP-AO Authentication
  • Configuring BGP GTSM
  • Configuring RPKI
  • Enabling SSL/TLS Authentication for BGP
  • Configuring BGP Extensions
  • Configuring BGP Multi-Instance
  • Maintaining BGP
  • Resetting BGP Connections
  • Clearing BGP Statistics
  • Configuring BGP to Record Peer Status Changes and Event Information
  • Disabling the PAF Restriction for the Feature Indicating Whether the Number of Received BGP Routes Exceeds the Upper Limit
  • Configuring a Mode in Which BGP Path Attributes Are Processed
  • Setting a Priority That Determines the Disconnection Order of a BGP Peer Relationship If Memory Overload Occurs
  • Enabling BGP to Discard New Routes If a Memory Exception Occurs
  • Configuring Whitelist Session-CAR for BGP
  • Configuring Micro-Isolation CAR for BGP
  • BGP Route Selection Rules
  • Route Processing on the BGP router
  • BGP Route Selection Rules
  • BGP Routing Table
  • Route Attributes
  • BGP Next_Hop
  • PrefVal
  • Local_Pref
  • Route Type
  • AIGP
  • AS_Path
  • Origin
  • MED
  • Peer Type
  • IGP Cost
  • Cluster_List
  • Originator_ID
  • Router ID
  • Peer IP Address
  • (Optional) Configuring BGP to Ignore the Reachability of the Next Hops of Received BGP VPNv4 Routes
  • Configuration Examples for BGP
  • Example for Configuring Basic BGP Functions
  • Example for Configuring BGP to Interact with an IGP
  • Example for Configuring the MED Attribute to Control Route Selection
  • Example for Configuring an AS_Path Filter
  • Example for Configuring BGP RRs
  • Example for Configuring a BGP Confederation
  • Example for Configuring the BGP Community Attribute
  • Example for Configuring Prefix-based BGP ORF
  • Example for Configuring BGP Route Dampening
  • Example for Configuring BGP Default Route Advertisement
  • Example for Configuring BGP Load Balancing
  • Example for Configuring BGP Next Hop Recursion Based on a Routing Policy
  • Example for Configuring Routing Policies to Control BGP Route Advertisement and Acceptance
  • Example for Configuring BFD for BGP
  • Example for Configuring BGP Auto FRR
  • Example for Configuring BGP Add-Path
  • Example for Configuring BGP Keychain Authentication
  • Example for Configuring BGP-LS
  • Example for Configuring BGP RPD
  • Example for Configuring Dynamic BGP Peer Groups
  • Example for Configuring BGP Multi-Instance
  • Example for Configuring a BGP SR LSP
  • Example for Configuring a BGP Virtual Link
  • Example for Configuring BGP Routing Loop Detection
  • BGP4+ Configuration
  • Overview of BGP4+
  • Configuration Precautions for BGP4+
  • Configuring Basic BGP4+ Functions
  • Starting a BGP Process
  • Configuring IPv6 Peers
  • (Optional) Configuring the Local Interface for a BGP4+ Connection
  • Verifying the Basic BGP4+ Configuration
  • Configuring a BGP4+ Peer Group
  • Controlling Route Import
  • Configuring BGP4+ to Import Routes
  • Configuring BGP4+ to Import Default Routes
  • Verifying the Configuration of Route Import
  • Controlling Route Advertisement
  • Configuring BGP4+ Route Summarization
  • Configuring BGP4+ to Advertise Default Routes to Peers or peer groups
  • Enabling a BGP4+ Device to Add the Community Attribute to Routes to Be Advertised
  • Enabling a BGP4+ Device to Add the Large-Community Attribute to Routes to Be Advertised
  • Setting the Interval at Which Update Packets Are Sent
  • Verifying the Configuration of Route Advertisement
  • Controlling BGP4+ Route Selection
  • Setting the BGP4+ Priority
  • Setting the Preferred Value for BGP4+ Routes
  • Setting the Default Local_Pref Attribute for the Local Device
  • Setting the MED Attribute
  • Setting the Next_Hop Attribute
  • Setting the AS_Path Attribute
  • Configuring AIGP Attributes for Routes
  • Verifying the Configuration of BGP4+ Route Attributes
  • Configuring BGP4+ Routing Policies
  • Configuring Related BGP4+ Access Lists
  • Configuring a Route-Policy
  • Configuring a Policy for Advertising BGP4+ Routes
  • Configuring a Policy for Receiving BGP4+ Routes
  • Configuring BGP4+ Soft Reset
  • Verifying the Configuration
  • Configuring BGP4+ XPL
  • Using XPL to Filter the BGP4+ Routes to Be Advertised
  • Using XPL to Filter the BGP4+ Routes to Be Received
  • Configuring BGP4+ Route Recursion to the Default Route
  • Configuring BGP to Generate Locator Routes
  • Configuring BGP4+ Load Balancing
  • Configuring BGP4+ to Generate a Summary Default Route
  • Configuring BGP4+ Connection Parameters
  • Configuring Timers for BGP4+ Peers
  • Enabling Fast Reset of EBGP Connections
  • Configuring a BGP4+ ConnectRetry Timer
  • Verifying the Configuration of BGP4+ Connection Parameters
  • Configuring BGP4+ RRs
  • Configuring an RR and Specifying Its Clients
  • (Optional) Disabling Route Reflection Between Clients Through the RR
  • (Optional) Configuring a Cluster ID for RRs
  • (Optional) Preventing BGP4+ from Adding Routes to the IP Routing Table
  • (Optional) Enabling an RR to Modify Route Attributes Using an Export Policy
  • Verifying the Configuration of BGP4+ RRs
  • Configuring a BGP4+ Confederation
  • Configuring BGP4+ Community Attributes
  • Configuring a Community Attribute-Related Policy
  • Configuring Community Attribute Advertisement
  • Verifying the Configuration
  • Configuring BFD for BGP4+
  • Configuring BGP4+ Auto FRR
  • Setting a Specified Peer or Each Peer in a Peer Group as an Independent Update Peer-Group
  • Configuring the Route Server Function
  • Configuring BGP-LS (IPv6)
  • Configuring the BGP4+ GR Helper
  • Enabling BGP4+ GR
  • Configuring BGP4+ GR Session Parameters
  • Verifying the Configuration of BGP4+ GR Helper
  • Enabling GR for BGP4+ Peers
  • Configuring BGP4+ Route Dampening
  • Configuring Suppression on BGP4+ Peer Flapping
  • Configuring BGP4+ Recursion Suppression in Case of Next Hop Flapping
  • Configuring BMP
  • Configuring BGP4+ Security
  • Configuring BGP4+ Authentication
  • Configuring BGP4+ GTSM
  • Configuring RPKI
  • Configuring BGP4+ 6PE
  • Configuring the IPv4/IPv6 Dual Stack
  • Configuring an LDP LSP on an IPv4 Network
  • Establishing a 6PE Peer Relationship Between PEs
  • (Optional) Enabling 6PE Routes Sharing the Explicit Null Label
  • Configuring Route Exchange Between a PE and a CE
  • Verifying the Configuration of BGP4+ 6PE
  • Enabling the Device to Recurse BGP IPv6 Unicast Routes to Tunnels
  • Maintaining BGP4+
  • Resetting BGP4+ Connections
  • Clearing BGP4+ Statistics
  • Configuring a Mode in Which BGP4+ Path Attributes Are Processed
  • Setting a Priority That Determines the Disconnection Order of a BGP4+ Peer Relationship If Memory Overload Occurs
  • Enabling BGP4+ to Discard New Routes in the Case of a Memory Exception
  • Configuring Whitelist Session-CAR for BGP4+
  • Configuration Examples for BGP4+
  • Example for Configuring Basic BGP4+ Functions
  • Example for Configuring BGP4+ Route Reflection
  • Example for Configuring BFD for BGP4+
  • Example for Configuring BGP4+ 6PE
  • Routing Policy Configuration
  • Overview of Routing Policies
  • Configuration Precautions for Routing Policy
  • Configuring an IP Prefix List
  • Configuring an IPv4 Prefix List
  • Configuring an IPv6 Prefix List
  • Checking the Configuration
  • Configuring an ACL
  • Configuring an AS_Path Filter
  • Configuring a Community Filter
  • Configuring a Large-Community Filter
  • Configuring an Extcommunity Filter
  • Configuring an RD Filter
  • Configuring a Route-Policy
  • Creating a Route-Policy
  • (Optional) Configuring an if-match Clause
  • (Optional) Configuring an apply Clause
  • (Optional) Further Matching Routes Against a Specified Node
  • Applying a Route-Policy
  • Verifying the Route-Policy Configuration
  • Applying Filters to Received Routes
  • Configuring RIP to Filter the Received Routes
  • Configuring OSPF to Filter the Received Routes
  • Configuring IS-IS to Filter the Received Routes
  • Verifying the Configuration of Applying Filters to Received Routes
  • Applying Filters to Routes to Be Advertised
  • Configuring RIP to Filter the Routes to Be Advertised
  • Configuring OSPF to Filter the Routes to Be Advertised
  • Configuring IS-IS to Filter the Routes to Be Advertised
  • Verifying the Configuration of Applying Filters to the Advertised Routes
  • Applying Filters to Imported Routes
  • Configuring RIP to Import External Routes
  • Configuring OSPF to Import External Routes
  • Configuring IS-IS to Import External Routes
  • Verifying the Configuration of Applying Filters to the Imported Routes
  • Configuration Examples for Routing Policies
  • Example for Filtering the Received Routes and Those to Be Advertised
  • Example for Applying a Route-Policy to Imported Routes
  • Example for Applying Route-Policies
  • Example for Configuring a Basic or Advanced VPN-Target Extended Community Filter
  • XPL Configuration
  • Overview of XPL
  • Configuration Precautions for XPL
  • Configuring a Global Variable Set
  • Configuring a Route Attribute Set
  • Configuring an IPv4 Prefix Set
  • Configuring an IPv6 Prefix Set
  • Configuring an AS_Path Set
  • Configuring a Community Set
  • Configuring Large-Community Sets
  • Configuring an RD Set
  • Configuring a Route Target Set
  • Configuring an SoO Set
  • Verifying the Route Attribute Set Configuration
  • Configuring a Route-Filter
  • Applying Route-Filters
  • Configuration Examples for XPL
  • Example for Using XPL to Filter the Routes to Be Received and Advertised (Paragraph-by-Paragraph Editing)
  • Example for Using XPL to Filter the Routes to Be Received and Advertised (Line-by-Line Editing)
  • XPL Paragraph Editing Clauses
  • Common Clauses
  • Condition Clauses
  • Action Clauses
  • Route Monitoring Group Configuration
  • Overview of Route Monitoring Groups
  • Configuration Precautions for Route Monitoring Group
  • Configuring a Route Monitoring Group
  • Configuration Examples for Route Monitoring Groups
  • Example for Configuring Association Between a Route Monitoring Group and a Dual-Device Hot Backup Module
  • IP Multicast
  • About This Document
  • IP Multicast Basic Configuration
  • IPv4 Multicast-related Concepts
  • Multicast Service Deployment on an IPv4 Network
  • IPv6 Multicast-related Concepts
  • Multicast Service Deployment on an IPv6 Network
  • IGMP Configuration
  • Overview of IGMP
  • Configuration Precautions for IGMP
  • Configuring Basic IGMP Functions
  • Enabling Multicast Routing
  • Enabling IGMP
  • (Optional) Setting an IGMP Version
  • (Optional) Configuring IGMP Querier Control Parameters
  • (Optional) Configuring the Router-Alert Option for IGMP Messages
  • Verifying the Basic IGMP Configuration
  • Configuring IGMP Policy Control
  • Configuring the maximum number of IGMP entries on an interface
  • Setting the Range of Multicast Groups that an Interface Can Join
  • Configuring Source Address-based IGMP Message Filtering
  • Configuring the Rate at Which IGMP Packets Are Sent to the CPU
  • Verifying the IGMP Policy Control Configuration
  • Configuring IGMP Static-Group Join
  • Configuring IGMP Prompt-Leave
  • Configuring IGMP SSM Mapping
  • Enabling SSM Mapping
  • Configuring Static SSM Mapping
  • Configuring DNS-based SSM Mapping
  • Verifying the IGMP SSM Mapping Configuration
  • Configuring IGMP On-Demand
  • Configuring IGMP IPsec
  • Configuring an IGMP over GRE Tunnel
  • IGMP Dual-Device Backup Configuration
  • Configuring IGMP Dual-Device Hot Backup in an E-Trunk Scenario
  • Configuring a Dual-Device Backup Platform
  • Enabling Remote Backup for IGMP
  • Verifying the Configuration of IGMP Dual-Device Hot Backup
  • Configuring IGMP Dual-Device Hot Backup in a VRRP Active-Active Scenario (Binding a Multicast Service Interface to a Common VRRP Group)
  • Configuring IGMP Dual-Device Hot Backup in a VRRP Master/Backup Scenario (Binding a Multicast Service Interface to a Common VRRP Group)
  • Configuring a Dual-Device Backup Platform
  • Enabling Remote Backup for IGMP
  • Verifying the Configuration of IGMP Dual-Device Hot Backup
  • Configuring IGMP Dual-Device Hot Backup in a VRRP Active-Active Scenario (Binding a Multicast Service Interface to an mVRRP Group)
  • Configuring IGMP Dual-Device Hot Backup in a VRRP Master/Backup Scenario (Binding a Multicast Service Interface to an mVRRP Backup Group)
  • Configuring a Dual-Device Backup Platform
  • Enabling Remote Backup for IGMP
  • Verifying the Configuration of IGMP Dual-Device Hot Backup
  • Maintaining IGMP
  • Deleting IGMP Group Information
  • Deleting Statistics About IGMP Messages
  • Monitoring the Operating Status of IGMP
  • Configuration Examples for IGMP
  • Example for Configuring Basic IGMP Functions
  • Example for Configuring IGMP SSM Mapping
  • Example for Configuring DNS-based SSM Mapping
  • Example for Configuring Dual-Device IGMP Hot Backup
  • Example for Configuring IGMP over L2TP
  • PIM Configuration
  • Overview of PIM
  • Configuration Precautions for PIM
  • Configuring PIM-DM
  • Enabling PIM-DM
  • (Optional) Disabling State-Refresh
  • (Optional) Modifying State-Refresh control parameters
  • (Optional) Modifying Graft Control Parameters
  • (Optional) Configuring a Limit on the Number of PIM Entries
  • Verifying the PIM-DM Configuration
  • Configuring PIM-SM
  • Enabling Multicast Routing
  • Enabling PIM-SM
  • Configuring a Static RP
  • Configuring a BSR RP
  • (Optional) Configuring a Limit on the Number of PIM-SM Entries
  • (Optional) Setting a Multicast Source Address Range
  • (Optional) Adjusting Source Registration Parameters
  • (Optional) Configuring SPT Switchover Conditions
  • Verifying the PIM-SM Configuration
  • Configuring a BSR Boundary
  • Adjusting BSR RP Parameters
  • Adjusting C-RP Parameters
  • Setting a Valid C-RP Address Range
  • Adjusting C-BSR Parameters
  • Setting a Valid BSR Address Range
  • Configuring a BSR Administrative Domain
  • Verifying the Configuration of BSR RP Parameters
  • Configuring PIM-SSM
  • Enabling Multicast Routing
  • Enabling PIM-SM
  • Setting an SSM Group Address Range
  • (Optional) Configuring a Limit on the Number of PIM Entries
  • (Optional) Setting a Multicast Source Address Range
  • Verifying the PIM-SSM Configuration
  • Adjusting Other PIM Parameters
  • Adjusting the Lifetime of a Source
  • Specifying the Source Address for Sending Register Messages
  • Disabling PIM Join/Prune Message Packaging
  • Adjusting Neighbor Parameters
  • Adjusting DR Parameters
  • Adjusting Forwarding Parameters
  • Enabling a QinQ/Dot1q VLAN Tag Termination Sub-interface to Forward Single-Tagged PIM Messages
  • Adjusting Assert Parameters
  • Verifying the Configuration of PIM Neighbor, DR, Forwarding, or Assert Parameters
  • Configuring PIM Anycast-RP
  • Configuring Global Anycast-RP
  • Configuring a Local Address for an Anycast-RP
  • Configuring an Anycast-RP Peer
  • Verifying the Configuration of the PIM Anycast-Rendezvous Point (RP)
  • Configuring BFD for IPv4 PIM
  • Enabling PIM BFD
  • (Optional) Adjusting BFD Parameters
  • Verifying the Configuration of BFD for IPv4 PIM
  • Configuring PIM Silent
  • Configuring Multicast Services over P2MP TE Tunnel
  • Directing Multicast Traffic into a P2MP TE Tunnel
  • Directing Multicast Traffic out of a P2MP TE Tunnel
  • Verifying the Configuration of Multicast over P2MP TE Tunnels
  • Configuring PIM over L2TP
  • Configuring PIM over PPPoE
  • Configuring PIM FRR
  • Configuring Multicast Source Cloning-based PIM FRR
  • Configuring IPv4 PIM IPsec
  • Configuring Whitelist Session-CAR for PIM
  • Maintaining PIM
  • Checking Statistics About Outbound Interfaces in IPv4 PIM-SM Entries
  • Deleting Statistics About PIM Control Messages
  • Deleting PIM Status Information from IPv4 PIM Routing Entries
  • Monitoring the Running Status of PIM
  • Configuration Examples for PIM
  • Example for Configuring Basic PIM-DM Functions
  • Example for Configuring PIM-SM Intra-domain Multicast
  • Example for Configuring a PIM-SM BSR Administrative Domain
  • Example for Configuring PIM-SM Security
  • Example for Configuring the SPT Switchover in a PIM-SM Domain
  • Example for Configuring PIM-SSM Multicast
  • Example for Configuring PIM Anycast-RP
  • Example for Configuring Multicast over P2MP TE Tunnels
  • Example for Configuring PIM over GRE
  • Example for Configuring IPv4 PIM IPsec
  • Example for Configuring PIM FRR
  • Example for Configuring PIM FRR on a Ring Network
  • Example for Configuring Multicast Source Cloning-based PIM FRR in a Rosen MVPN Scenario
  • MSDP Configuration
  • Overview of MSDP
  • Configuration Precautions for MSDP
  • Configuring PIM-SM Inter-domain Multicast
  • Configuring Intra-AS MSDP Peers
  • Configuring Inter-AS MSDP Peers for BGP Peers
  • Configuring Inter-AS Static RPF Peers
  • Adding Inter-AS MSDP Peers to the Same Mesh Group
  • Verifying the Configuration of PIM-SM Inter-domain Multicast
  • Configuring Anycast-RP
  • Configuring an RP Address on a Loopback Interface
  • Configuring a Loopback Interface as an RP
  • Configuring MSDP Peers on RPs
  • Specifying a Logical RP Address for SA Messages
  • Verifying the RP Configuration in a PIM-SM Domain
  • Controlling MSDP Peer Connections
  • Ending an MSDP Peer Connection
  • Adjusting the Interval for Retrying to Set Up an MSDP Peer Connection
  • Configuring MSDP Peer Authentication
  • Adjusting the Keepalive Time and Entry Holdtime of an MSDP Peer Relationship
  • Verifying the Configuration of MSDP Peer Relationship Control Parameters
  • Adjusting the Parameters of SA Messages
  • Configuring an SA Cache
  • Configuring Filtering Policies for SA Messages
  • Controlling the Sending of SA Request Messages
  • Encapsulating a Multicast Data Packet into an SA Message
  • (Optional) Setting the TTL Threshold for Forwarding an SA Message Containing a Multicast Data Packet
  • (Optional) Setting a Hold Timer for Entries in the SA Cache
  • Verifying the Configuration of SA Message Parameters
  • Maintaining MSDP
  • Deleting Statistics About MSDP Peers
  • Deleting (S, G) Information from an SA Cache
  • Monitoring the Running Status of MSDP
  • Configuration Examples for MSDP
  • Example for Configuring PIM-SM Inter-domain Multicast
  • Example for Configuring Inter-AS Multicast by Using Static RPF Peers
  • Example for Configuring Anycast-RP
  • MBGP Configuration
  • Overview of MBGP
  • Configuration Precautions for MBGP
  • Configuring an MBGP Peer
  • Configuring MBGP to Import Local Routes
  • Controlling MBGP Route Advertisement
  • Summarizing Local MBGP Routes
  • Configuring MBGP to Advertise Default Routes to Peers
  • Configuring MBGP to Advertise the Community Attribute
  • Verifying the Configuration of MBGP Route Advertisement
  • Controlling MBGP Route Selection
  • Configuring Preferences for MBGP Routes
  • Setting a Preferred Value for Routes Learned from an MBGP Peer
  • Setting the Local_Pref Attribute for MBGP Routes
  • Setting the MED Attribute for MBGP Routes
  • Setting the Next_Hop Attribute
  • Setting the AS_Path Attribute
  • Verifying the MBGP Route Attribute Configuration
  • Configuring MBGP Routing Policies
  • Configuring a Route-policy
  • Configuring a Policy for Receiving MBGP Routes
  • Configuring a Policy for Advertising MBGP Routes
  • Configuring MBGP Soft Resetting
  • Verifying the Configuration of Policies for Route Exchanges Between MBGP Peers
  • Configuring MBGP Load Balancing
  • Configuring MBGP Route Dampening
  • Configuring MBGP RRs
  • Maintaining MBGP
  • Resetting MBGP Connections
  • Deleting MBGP Statistics
  • Configuration Examples for MBGP
  • Example for Configuring Basic MBGP Functions
  • Example for Separating Unicast Traffic from Multicast Traffic
  • IPv4 Multicast Routing Management Configuration
  • Overview of IPv4 Multicast Routing Management
  • Configuration Precautions for IP Multicast Routing Management
  • Configuring RPF Routes
  • Configuring Multicast Static Routes
  • Configuring Multicast Load Splitting
  • Configuring Longest Match for Multicast Route Selection
  • Verifying the RPF Route Configuration
  • Configuring Multicast Multi-Topologies
  • Enabling Multicast Services to Run in a Multicast Topology Instance
  • Enabling Multicast Services to Run in a Unicast Topology Instance
  • Verifying the Configuration of Running Multicast Services in a Multicast Multi-topology Instance
  • Controlling Multicast Forwarding Range
  • Adjusting the Minimum TTL Value for Multicast Forwarding
  • Configuring the Multicast Forwarding Boundary
  • Enabling the Function to Iterate Original Next Hops of Multicast Routes to MIGP Shortcuts
  • Disabling Soft Forwarding for Multicast Packets
  • Configuring the Maximum Number of Invalid IPv4 Multicast Protocol Packets that a Device Can Store
  • (Optional) Configuring Trunk Load Balancing Functions for Layer 3 Multicast
  • (Optional) Adjusting the Hold-Up Period for Trunk Member Interfaces to Forward Multicast Traffic
  • Maintaining IP Multicast Routing Management
  • Monitoring the Running Status of IP Multicast Routing Management
  • Monitoring the Status of Multicast Routing
  • Checking Statistics About Downstream Layer 3 IPv4 Multicast Packets
  • Configuration Examples for IP Multicast Routing Management
  • Example for Configuring Multicast Static Routes to Change RPF Routes
  • Example for Configuring Multicast Static Routes to Connect RPF Routes
  • Example for Configuring Multicast Load Splitting
  • Rosen MVPN Configuration
  • Overview of IPv4 Multicast VPNs
  • Configuration Precautions for Rosen MVPN
  • Configuring an MD VPN
  • (Optional) Enabling IP Multicast VPN
  • Enabling IP Multicast Routing
  • Configuring a Share-Group and Binding it to an MTI
  • Configuring an MTI
  • (Optional) Configuring a Switch-MDT
  • Verifying the MD VPN Configuration
  • Configuring BGP A-D Multicast VPN
  • Configuring MVPN Extranet
  • Maintaining an IPv4 Multicast VPN
  • Deleting IPv4 Multicast VPN Statistics
  • Monitoring the Running Status of an IPv4 Multicast VPN
  • Controlling the Generation of Logs
  • Configuration Examples for an IPv4 Multicast VPN
  • Example for Configuring Single-AS MD VPNs
  • Example for Configuring Multicast VPN in MDT-SAFI A-D Mode
  • Example for Configuring MVPN Extranet in the Remote Route Leaking Scenario Where a Source VPN Instance Needs to Be Configured on a Receiver PE
  • Example for Configuring MVPN Extranet in the Local Route leaking Scenario Where the Source and Receiver VPN Instances Reside on the Same PE
  • Example for Configuring MVPN Extranet in the Local Route leaking Scenario Where the Multicast Source Belongs to the Public Network Instance
  • NG MVPN Configuration
  • Overview of NG MVPN
  • Feature Requirements for NG MVPN
  • Configuring an Intra-AS NG MVPN
  • Configuring BGP MVPN Peers
  • Configuring a P2MP LSP to Carry Multicast Traffic
  • Configuring PIM
  • (Optional) Configuring IGMP
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • (Optional) Configuring NG MVPN ORF
  • Verifying the Intra-AS NG MVPN Configuration
  • Configuring Intra-AS Segmented NG MVPN
  • Configuring Route Reflection on an ABR
  • Establishing BGP MVPN Peer Relationships
  • Configuring P2MP Tunnels to Carry Multicast Traffic
  • Configuring the Support for Segmented Tunnels in an AS
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • Configuring PIM
  • (Optional) Configuring IGMP
  • Verifying the Configuration of Intra-AS Segmented NG MVPN
  • Configuring an Inter-AS or Inter-Area NG MVPN
  • Configuring Inter-AS NG MVPN Option B
  • Configuring Global MPLS LDP Functions and Enabling MPLS LDP on Interfaces
  • Configuring an Automatic mLDP P2MP Tunnel
  • Configuring a Static RP
  • Configuring MP-IBGP Between a PE and an ASBR in the Same AS
  • Configuring MP-EBGP Between ASBRs in Different ASs
  • Configuring BGP MVPN Peers
  • (Optional) Configuring Intra-AS MSDP Peers
  • Configuring a P2MP LSP to Carry Multicast Traffic
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • Configuring PIM
  • Configuring Route Exchange Between PEs and CEs
  • Configuring Inter-AS NG MVPN Option C
  • Configuring Global MPLS LDP Functions and Enabling MPLS LDP on Interfaces
  • Configuring an Automatic mLDP P2MP Tunnel
  • Configuring a Static RP
  • Configuring MP-IBGP Between a PE and an ASBR in the Same AS
  • Configuring MP-EBGP for PEs and ASBRs in Different ASs
  • Configuring a Routing Policy to Control Label Distribution on ASBRs
  • Configuring BGP MVPN Peers
  • Configuring a P2MP LSP to Carry Multicast Traffic
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • Configuring PIM
  • Configuring Route Exchange Between PEs and CEs
  • Configuring NG MVPN Option B in an Inter-AS Seamless MPLS Scenario
  • Configuring Global MPLS LDP Functions and Enabling MPLS LDP on Interfaces
  • Configuring an Automatic mLDP P2MP Tunnel
  • Configuring a Static RP
  • Configuring MP-IBGP Among PEs, ABRs, and ASBRs in the Same AS
  • Configuring MP-EBGP Between ASBRs in Different ASs
  • Configuring a Routing Policy to Control Label Distribution on ASBRs
  • Configuring Route Reflection on an ABR
  • Configuring BGP MVPN Peers
  • Configuring a P2MP LSP to Carry Multicast Traffic
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • Configuring NG MVPN Option C in Inter-AS Seamless MPLS Scenarios
  • Configuring Global MPLS LDP Functions and Enabling MPLS LDP on Interfaces
  • Configuring an Automatic mLDP P2MP Tunnel
  • Configuring a Static RP
  • Configuring MP-IBGP Among PEs, ABRs, and ASBRs in the Same AS
  • Configuring MP-EBGP for PEs and ASBRs in Different ASs
  • Configuring a Routing Policy to Control Label Distribution
  • Configuring Route Reflection on an ABR
  • Configuring BGP MVPN Peers
  • Configuring a P2MP LSP to Carry Multicast Traffic
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • Configuring PIM
  • Configuring Inter-Area Seamless NG MVPN
  • Configuring an Automatic mLDP P2MP Tunnel
  • Configuring a Static RP
  • Configuring Route Reflection on an ABR
  • Configuring BGP MVPN Peers
  • Configuring a P2MP LSP to Carry Multicast Traffic
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • Configuring PIM
  • Configuring Route Exchange Between PEs and CEs
  • Configuring NG MVPN Extranet
  • Configuring UMH Route Selection Rules
  • Configuring Dual-Root 1+1 Protection
  • Configuration Examples for NG MVPN
  • Example for Configuring an Intra-AS NG MVPN to Carry Multicast Traffic over an mLDP P2MP LSP
  • Example for Configuring Intra-AS NG MVPN over an mLDP P2MP Tunnel Passing Through Ps
  • Example for Configuring an Intra-AS NG MVPN with an RSVP-TE P2MP LSP
  • Example for Configuring Dual-Root 1+1 Protection for RSVP-TE P2MP LSPs
  • Example for Configuring Dual-Root 1+1 Protection for mLDP P2MP LSPs
  • Example for Configuring an NG MVPN (PIM-SM MDT Setup Across the Public Network) with (*, G) Join to Carry Multicast Traffic over an mLDP P2MP LSP
  • Example for Configuring an NG MVPN (PIM-SM MDT Setup Across the Public Network) with (*, G) Join to Carry Multicast Traffic over an RSVP-TE P2MP LSP
  • Example for Configuring an NG MVPN (PIM-SM MDT Setup Not Across the Public Network) with (*, G) Join to Carry Multicast Traffic over an mLDP P2MP LSP
  • Example for Configuring an NG MVPN (PIM-SM RPT Setup Not Across the Public Network) with (*, G) Join to Carry Multicast Traffic over an RSVP-TE P2MP LSP
  • Example for Configuring an Intra-AS NG MVPN with Segmented Tunnels
  • Example for Configuring Intra-AS Segmented Tunnel Transport (Through mLDP and RSVP-TE P2MP Tunnel Stitching)
  • Example for Configuring Intra-AS Segmented Tunnel Transport (Through mLDP P2MP Tunnel Stitching)
  • Example for Configuring Intra-AS Segmented Tunnel Transport (Through RSVP-TE P2MP Tunnel Stitching)
  • Example for Configuring Dual-Root 1+1 Protection for Intra-AS Segmented Tunnels
  • Example for Configuring an Inter-AS NG MVPN Option B
  • Example for Configuring an Inter-AS NG MVPN in Option C
  • Example for Configuring an Inter-AS Seamless MPLS NG MVPN Option B
  • Example for Configuring an Inter-AS Seamless MPLS NG MVPN Option C
  • Example for Configuring an Inter-Area Seamless MPLS NG MVPN
  • Example for Configuring an Inter-area NG MVPN
  • Example for Configuring NG MVPN Extranet in the Remote Route Leaking Scenario Where a Source VPN Instance Needs to Be Configured on a Receiver PE
  • Example for Configuring NG MVPN Extranet in the Remote Route Leaking Scenario (BAS Multicast)
  • Example for Configuring NG MVPN Extranet in the Local Cross Scenario Where the Source and Receiver VPN Instances Reside on the Same PE
  • Example for Enabling the Highest IP Address to Be Selected as the UMH on an NG MVPN
  • mLDP In-Band MVPN Configuration
  • Overview of mLDP In-Band MVPN
  • Configuration Precautions for mLDP In-Band MVPN
  • Configuring mLDP In-Band MVPN
  • Configuring Multicast Traffic Transmission over P2MP Tunnels
  • Configuring PIM
  • (Optional) Configuring IGMP
  • Verifying the Configuration
  • Configuration Examples
  • Example for Configuring mLDP In-Band MVPN
  • Example for Configuring mLDP In-Band MVPN Dual-Root 1+1 Protection
  • BIER Configuration
  • Overview of BIER
  • Configuration Precautions for BIER
  • Configuring NG MVPN over BIER
  • Configuring BIER on the Public Network
  • Enabling BIER for an IGP
  • Configuring BGP MVPN Peer Relationships
  • Configuring a BIER Tunnel to Carry Multicast Traffic
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • Configuring PIM
  • (Optional) Configuring IGMP
  • Verifying the NG MVPN over BIER Configuration
  • Configuring a Mode for BIER-MPLS to Process and Adjust TTLs
  • Configuration Examples for NG MVPN over BIER
  • Example for Configuring NG MVPN over BIER
  • Example for Configuring NG MVPN over BIER Dual-Root 1+1 Protection
  • MLD Configuration
  • Overview of MLD
  • Configuration Precautions for MLD
  • Configuring Basic MLD Functions
  • Enabling IPv6 Multicast Routing
  • Enabling IPv6 PIM-SM
  • Enabling MLD
  • (Optional) Setting an MLD Version
  • (Optional) Configuring an Interface to Statically Join an MLD Group
  • (Optional) Setting the Range of MLD Groups that an Interface Can Join
  • Verifying the Basic MLD Configuration
  • Configuring MLD SSM Mapping
  • Enabling SSM Mapping
  • Configuring Static SSM Mapping
  • Verifying the MLD SSM Mapping Configuration
  • Configuring a Policy for Processing MLD Message
  • Configuring the router to Deny MLD Messages Without the Router-Alert Option
  • Configuring the router to Send MLD Messages Without the Router-Alert Option
  • Setting the Maximum Number of MLD Group Members That an Interface Can Maintain
  • Configuring Source Address-based MLD Message Filtering
  • Verifying the Configuration of the Policy for Processing MLD Packets
  • Configuring an MLD Querier
  • Configuring MLD On-demand
  • Configuring MLD IPsec
  • Maintaining MLD
  • Deleting MLD Group Information
  • Deleting Statistics About MLD Messages
  • Monitoring the Operating Status of MLD
  • Configuration Examples for MLD
  • Example for Configuring Basic MLD Functions
  • Example for Configuring MLD SSM Mapping
  • IPv6 PIM Configuration
  • Overview of IPv6 PIM
  • Configuration Precautions for IPv6 PIM
  • Configuring IPv6 PIM-SM
  • Enabling IPv6 Multicast Routing
  • Enabling IPv6 PIM-SM
  • Configuring an Embedded-RP
  • Configuring a Static RP
  • Configuring a BSR RP
  • (Optional) Setting a Multicast Source Address Range
  • (Optional) Adjusting Source Registration Parameters
  • (Optional) Configuring SPT Switchover Conditions
  • (Optional) Configuring a Limit on the Number of PIM-SM Entries
  • Verifying the IPv6 PIM-SM Configuration
  • Configuring a BSR Boundary (IPv6)
  • Adjusting BSR RP Parameters (IPv6)
  • Adjusting C-RP Parameters
  • Setting the Range of Valid C-RP Addresses
  • Adjusting C-BSR Parameters
  • Setting a Valid BSR Address Range
  • Verifying the Dynamic RP Parameter Configuration
  • Configuring IPv6 PIM-SSM
  • Enabling IPv6 Multicast Routing
  • Enabling IPv6 PIM-SM
  • Setting an SSM Group Address Range
  • (Optional) Limiting the Range of Multicast Source Addresses
  • (Optional) Configuring a Limit on the Number of PIM Entries
  • Verifying the IPv6 PIM-SSM Configuration
  • Adjusting Other IPv6 PIM Parameters
  • Adjusting the Lifetime of a Source
  • Specifying the Source Address for Sending Register Messages (IPv6)
  • Disabling IPv6 PIM Join/Prune Message Packaging
  • Adjusting Neighbor Parameters
  • Adjusting DR Parameters
  • Adjusting Forwarding Parameters
  • Enabling a QinQ/Dot1q VLAN Tag Termination Sub-interface to Forward Single-Tagged IPv6 PIM Messages
  • Adjusting Assert Parameters
  • Verifying the Configuration of Other IPv6 PIM Parameters
  • Configuring PIM Anycast-RP (IPv6)
  • Configuring the Global Anycast-RP
  • Setting a Local Address for the Anycast-RP
  • Configuring an Anycast-RP Peer
  • Verifying the PIM Anycast-RP Configuration
  • Configuring BFD for IPv6 PIM
  • Enabling BFD for IPv6 PIM
  • (Optional) Adjusting BFD Parameters
  • Verifying the Configuration of BFD for IPv6 PIM
  • Configuring IPv6 PIM Silent
  • Configuring IPv6 PIM over L2TP
  • Configuring IPv6 PIM IPsec
  • Configuring Whitelist Session-CAR for IPv6 PIM
  • Maintaining IPv6 PIM
  • Checking Statistics About Outbound Interfaces in IPv6 PIM-SM Entries
  • Deleting Statistics About IPv6 PIM Control Messages
  • Deleting PIM Status Information from IPv6 PIM Routing Entries
  • Monitoring the Running Status of IPv6 PIM
  • Configuration Examples for IPv6 PIM
  • Example for Configuring IPv6 PIM-SM Intra-domain Multicast
  • Example for Configuring IPv6 PIM-SM Security
  • Example for Configuring PIM Anycast-RP (IPv6)
  • Example for Configuring BFD for IPv6 PIM
  • IPv6 Multicast Routing Management Configuration
  • Overview of IPv6 Multicast Routing Management
  • Configuration Precautions for IPv6 Multicast Routing Management
  • Configuring IPv6 Multicast Load Splitting
  • Controlling the IPv6 Multicast Forwarding Range
  • Setting a Minimum TTL Value for IPv6 Multicast Packets
  • Configuring an IPv6 Multicast Forwarding Boundary
  • Configuring IPv6 Multicast Multi-Topologies
  • Enabling IPv6 Multicast Services to Run in a Multicast Topology Instance
  • Enabling IPv6 Multicast Services to Run in a Unicast Topology Instance
  • Verifying the Configuration of Running IPv6 Multicast Services in a Multicast Multi-topology Instance
  • Disabling Soft Forwarding for IPv6 Multicast Packets
  • Configuring the Maximum Number of Invalid IPv6 Multicast Protocol Packets that a Device Can Store
  • Monitoring the Running Status of IPv6 Multicast Forwarding Routing
  • Configuration Examples for IPv6 Multicast Routing Management
  • Example for Configuring IPv6 Multicast Load Splitting
  • IPv6 NG MVPN Configuration
  • Overview of IPv6 NG MVPN
  • Configuration Precautions for IPv6 NG MVPN
  • Configuring an Intra-AS IPv6 NG MVPN
  • Configuring BGP MVPN Peers
  • Configuring a P2MP LSP to Carry Multicast Traffic
  • Configuring IPv6 PIM
  • (Optional) Configuring MLD
  • (Optional) Configuring Switching Between I-PMSI and S-PMSI Tunnels
  • Verifying the Configuration of an Intra-AS NG MVPN
  • Configuring UMH Route Selection Rules
  • Configuring Dual-Root 1+1 Protection
  • Configuration Examples for IPv6 NG MVPN
  • Example for Configuring an Intra-AS IPv6 NG MVPN with an mLDP P2MP LSP
  • Example for Configuring Inter-AS IPv6 NG MVPN Option B
  • Example for Configuring Inter-AS IPv6 NG MVPN Option C
  • Example for Configuring Dual-Root 1+1 Protection for RSVP-TE P2MP Tunnels
  • Example for Configuring Dual-Root 1+1 Protection for mLDP P2MP Tunnels
  • Example for Configuring IPv6 NG MVPN Option B in an Inter-AS Seamless MPLS Scenario
  • Example for Configuring IPv6 NG MVPN Option C in an Inter-AS Seamless MPLS Scenario
  • Example for Enabling the Highest IP Address to Be Selected as the UMH on an IPv6 NG MVPN
  • BIERv6 Configuration
  • Overview of BIERv6
  • Configuration Precautions for BIERv6
  • Configuring BIERv6
  • Configuring Basic BIERv6 Functions
  • Enabling IS-ISv6 for BIERv6
  • (Optional) Configuring Inter-AS Static Traversal
  • Verifying the Configuration
  • Configuring MVPNv4 over BIERv6
  • Configuring BGP MVPN Peer Relationships
  • (Optional) Configuring Multicast Traffic Forwarding over a BIERv6 I-PMSI Tunnel
  • (Optional) Enabling the BIERv6 S-PMSI Tunnel Function and Configuring Switching Criteria
  • Configuring PIM
  • (Optional) Configuring IGMP
  • (Optional) Configuring Dual-Root 1+1 Protection
  • Verifying the Configuration
  • Configuring MVPNv6 over BIERv6
  • Configuring BGP MVPN Peer Relationships
  • (Optional) Configuring Multicast Traffic Forwarding over a BIERv6 I-PMSI Tunnel
  • (Optional) Enabling the BIERv6 S-PMSI Tunnel Function and Configuring Switching Criteria
  • Configuring PIM
  • (Optional) Configuring MLD
  • (Optional) Configuring Dual-Root 1+1 Protection
  • (Optional) Configuring UMH Route Selection Rules
  • Verifying the Configuration
  • Configuration Examples
  • Example for Configuring MVPNv4 over BIERv6 on an L3VPNv4 over SRv6 Network
  • Example for Configuring MVPNv6 over BIERv6 on an L3VPNv6 over SRv6 Network
  • Example for Configuring MVPNv4 over BIERv6 on an EVPN L3VPNv4 over SRv6 Network
  • Example for Configuring MVPNv6 over BIERv6 on an EVPN L3VPNv6 over SRv6 Network
  • Example for Configuring MVPNv4 over BIERv6 Dual-Root 1+1 Protection
  • Example for Configuring MVPNv6 over BIERv6 Dual-Root 1+1 Protection
  • IPv4 User-Side Multicast Configuration
  • Overview of IPv4 User-Side Multicast
  • Configuration Precautions for IPv4 User-Side Multicast
  • Configuring IPv4 User-Side Multicast
  • Configuring IPv4 User-Side Multicast for a VPN
  • Configuring IPv4 User-side Multicast CAC
  • Configuring IPv4 Static Multicast
  • Maintaining IPv4 User-Side Multicast
  • Verifying the IPv4 User-Side Multicast Configuration
  • Deleting Join Information of Multicast Groups
  • Deleting Statistics About IGMP Messages on BAS Interfaces
  • Configuration Examples for User-Side Multicast
  • Example for Configuring User-Side Multicast for PPPoE Access Users
  • Example for Configuring User-Side Multicast for IPoE Access Users
  • Example for Configuring IPv4 User-Side Multicast for a VPN
  • Example for Configuring BAS Multicast for Layer 3 Leased Line Access Users
  • Example for Configuring User-side Multicast CAC for PPPoE Access Users
  • Example for Configuring User-side Multicast CAC for IPoE Access Users
  • Example for Configuring Static Multicast for PPPoE Access Users
  • Example for Configuring Static Multicast for IPoE Access Users
  • IPv6 User-Side Multicast Configuration
  • Overview of IPv6 User-Side Multicast
  • Configuration Precautions for IPv6 User-Side Multicast
  • Configuring IPv6 User-Side Multicast
  • Configuring IPv6 Static Multicast
  • Maintaining IPv6 User-Side Multicast
  • Verifying the IPv6 User-Side Multicast Configuration
  • Deleting Join Information of Multicast Groups
  • Deleting Statistics About MLD Messages on BAS Interfaces
  • Configuration Examples for IPv6 User-Side Multicast
  • Example for Configuring IPv6 User-Side Multicast for PPPoE Access Users
  • Example for Configuring IPv6 User-Side Multicast for IPoE Access Users
  • Example for Configuring IPv6 Static Multicast for PPPoE Access Users
  • Example for Configuring IPv6 Static Multicast for IPoE Access Users
  • Controllable Multicast Configuration
  • Introduction
  • Multicast Control Overview
  • Multicast Control Features Supported by the NetEngine 8000 F
  • Configuration Precautions for Controllable Multicast
  • Configuring Multicast Control
  • Configuring a Multicast List
  • Configuring a Multicast Profile
  • Applying the Multicast Profile in a Domain
  • Enabling Controllable Multicast on the BAS Interface
  • Setting the Maximum Number of Multicast Lists that a User Is Allowed to Access at a Time
  • Configuring Multicast Replication
  • Verifying the Controllable Multicast Configuration
  • Configuration Examples for Controllable Multicast
  • Example for Configuring Multicast Control
  • Multicast NAT Configuration
  • Overview of Multicast NAT
  • Configuration Precautions for Multicast NAT
  • Configuring Multicast NAT
  • Enabling Multicast NAT Globally
  • Creating a Multicast NAT Instance
  • Configuring Traffic Policies
  • Applying a Traffic Policy on an Inbound Interface
  • Configuring Multicast NAT on an Outbound Interface
  • Binding Output Multicast Streams to a Multicast Instance
  • (Optional) Disabling TTL Decrease
  • Verifying the Multicast NAT Configuration
  • Configuring Clean Switching of Multicast Streams in Multicast Groups
  • Enabling Multicast NAT Globally
  • Creating a Multicast NAT Instance
  • Creating a Multicast NAT Instance Group
  • Configuring Traffic Policies
  • Applying a Traffic Policy on an Inbound Interface
  • Configuring Multicast NAT on an Outbound Interface
  • Creating a Multicast NAT Outbound Group
  • Binding a Multicast NAT Outbound Group to a Multicast NAT Instance Group
  • Verifying the Multicast NAT Configuration
  • Configuration Examples for Multicast NAT
  • Example for Translating One Input Multicast Stream into Two Output Multicast Streams
  • Example for Configuring Clean Switching of Multicast Streams
  • Example for Configuring Clean Switching of Multicast Streams in Multicast Groups
  • Layer 2 Multicast Configuration
  • Configuration Precautions for Layer 2 Multicast
  • Configuring IGMP Snooping
  • Configuring Basic IGMP Snooping Functions
  • (Optional) Setting the Aging Time for Router Ports
  • (Optional) Configuring Rapid Group Member Information Update
  • (Optional) Configuring Prompt Response to Layer 2 Network Topology Changes
  • (Optional) Setting the Aging Time for Entries Triggered by Multicast Traffic
  • (Optional) Configuring a Multicast Group Security Policy
  • (Optional) Configuring Rapid Multicast Data Forwarding on a Backup Device
  • Verifying the IGMP Snooping Configuration
  • Configuring Static Layer 2 Multicast
  • Configuring Static Router Ports
  • Configuring Static Member Ports
  • Verifying the Static Layer 2 Multicast Configuration
  • Configuring Layer 2 SSM Mapping
  • (Optional) Configuring an SSM Group Address Range
  • Configuring SSM Mapping
  • Verifying the Layer 2 SSM Mapping Configuration
  • Configuring IGMP Snooping Proxy
  • Configuring the Querier Function
  • Configuring Uniform Report/Leave Message Transmission
  • (Optional) Configuring IGMP Snooping Proxy-Enabled Devices to Transparently Transmit Protocol Packets
  • Verifying the IGMP Snooping Proxy Configuration
  • Configuring a Multicast VLAN for Specified User VLANs
  • Associating a Multicast VLAN with Specified User VLANs
  • Adding Interfaces to VLANs
  • Verifying the Configuration of Associating a Multicast VLAN with Specified User VLANs
  • Configuring Layer 2 Multicast Entry Limit
  • Configuring Layer 2 Multicast Entry Limit in a VLAN Scenario
  • Configuring Layer 2 Multicast Entry Limit in a VSI Scenario
  • Verifying the Layer 2 Multicast Entry Limit Configuration
  • Configuring Layer 2 Multicast CAC
  • Configuring Global Layer 2 Multicast CAC
  • Configuring Layer 2 Multicast CAC in a VSI Scenario
  • Verifying the Layer 2 Multicast CAC Configuration
  • Configuring the Maximum Number of Invalid Layer 2 Multicast Protocol Packets Allowed on a Multicast Device
  • Configuring Fast Restoration for Layer 2 Multicast Services on PWs
  • Configuring Layer 2 Multicast Instances
  • Configuring Layer 2 Multicast Instances for VLAN or VSI Users
  • Verifying the Layer 2 Multicast Instance Configuration
  • Configuring MLD Snooping
  • Configuring Basic MLD Snooping Functions
  • (Optional) Setting the Aging Time for Router Interfaces
  • (Optional) Configuring Static Interfaces
  • (Optional) Configuring Rapid Group Member Information Update
  • (Optional) Setting the Aging Time for Entries Triggered by Multicast Traffic
  • (Optional) Configuring MLD Snooping Policies
  • (Optional) Configuring Prompt Response to Layer 2 Network Topology Changes
  • (Optional) Configuring the System to Retain the Tag Carried in an MLD Report Message
  • Verifying the Configuration
  • Configuring MLD Snooping Proxy
  • Configuring the Querier Function
  • Configuring Unified Transmission of Report/Done Messages
  • (Optional) Configuring MLD Snooping Proxy-Enabled Devices to Transparently Transmit Protocol Messages
  • Verifying the MLD Snooping Proxy Configuration
  • Configuring IPv6 SSM Mapping
  • Setting the Maximum Number of Invalid IPv6 Layer 2 Multicast Protocol Packets That Can Be Stored
  • Maintaining Static Layer 2 Multicast
  • Clearing Dynamic Port Information from Outbound Port Statistics
  • Clearing IGMP Snooping Statistics
  • Monitoring the Running Status of IGMP Snooping
  • Checking Layer 2 Multicast Forwarding Entries
  • Deleting Multicast Entries on QinQ or Dot1q Termination Sub-interfaces
  • Clearing MLD Snooping Entries
  • Clearing MLD Snooping Statistics
  • Monitoring the Running Status of MLD Snooping
  • Configuring Alarm Thresholds for Layer 2 Multicast
  • Checking Statistics About Downstream Layer 2 IPv4 Multicast Packets
  • Configuration Examples for Layer 2 Multicast
  • Example for Configuring IGMP Snooping for a VLAN
  • Example for Configuring IGMP Snooping for a VSI
  • Example for Adding an Interface to a Multicast Group Statically
  • Example for Configuring Layer 2 Multicast SSM Mapping
  • Example for Configuring Multicast Functions in Daisy-Chain Networking
  • Example for Associating a Multicast VLAN with Specified User VLANs
  • Example for Configuring Layer 2 Multicast Entry Limit in a VLAN Scenario
  • Example for Configuring the Layer 2 Multicast Entry Limit in a VSI Scenario
  • Example for Configuring Layer 2 Multicast CAC for a VSI
  • Example for Configuring a Backup Device to Forward Multicast Data Flows Through a Backup Link
  • Example for Configuring a Layer 2 Multicast Instance for VLAN Users
  • Example for Configuring a Layer 2 Multicast Instance for VSI Users
  • Example for Configuring the System to Retain the Original Tag and Add Another Tag to an MLD Report Message in L2VPN Access to L3VPN Scenarios
  • Example for Configuring MLD Based on QinQ Termination
  • MPLS
  • About This Document
  • MPLS Common Configurations
  • Overview of MPLS
  • Configuration Precautions for MPLS Common
  • Specifying an MPLS TTL Handling Mode
  • Specifying the TTL mode for MPLS
  • Configuring the Path for ICMP Reply Messages
  • Configuring a Packet Load Balancing Mode
  • Configuring Packet Fragmentation on an MPLS P Node
  • Configuring the TTL and EXP Processing Mode When the Explicit Null Label Is Used
  • Configuring TTL and EXP Processing Modes for MPLS Packets with Label 7
  • Enabling Private-and-Public-Network Separation for MPLS Services
  • Optimizing MPLS
  • Configuring PHP
  • Configuring an MPLS MTU on an Interface
  • Verifying the Configuration of Optimizing MPLS
  • Configuring MPLS Resource Threshold-related Alarms
  • Configuring Alarm Thresholds for LDP LSPs
  • Configuring Alarm Thresholds for Dynamic Labels
  • Configuring Conditions That Trigger LDP Resource Threshold-Reaching Alarms
  • Configuring Alarm Thresholds for other TE Resource
  • Configuring Alarm Thresholds for RSVP LSPs
  • MPLS TE Configuration
  • Overview of MPLS TE
  • Configuration Precautions for MPLS TE
  • Configuring Static CR-LSP
  • Enabling MPLS TE
  • (Optional) Configuring Link Bandwidth
  • Configuring the MPLS TE Tunnel Interface
  • (Optional) Configuring Global Dynamic Bandwidth Pre-Verification
  • Configuring the Ingress of the Static CR-LSP
  • (Optional) Configuring the Transit Node of the Static CR-LSP
  • Configuring the Egress of the Static CR-LSP
  • (Optional) Configuring a Device to Check the Inbound Interface of a Static CR-LSP
  • Verifying the Static CR-LSP Configuration
  • Configuring a Static Bidirectional Co-routed LSP
  • Enabling MPLS TE
  • (Optional) Configuring Link Bandwidth
  • Configuring a Tunnel Interface on the Ingress
  • (Optional) Configuring Global Dynamic BandwidthPre-verification
  • Configuring the Ingress of a Static Bidirectional Co-routed LSP
  • (Optional) Configuring a Transit Node of a Static Bidirectional Co-routed LSP
  • Configuring the Egress of a Static Bidirectional Co-routed CR-LSP
  • Configuring the Tunnel Interface on the Egress
  • Verifying the Configuration of a Static Bidirectional Co-routed LSP
  • Configuring an Associated Bidirectional CR-LSP
  • Configuring CR-LSP Backup
  • Configuring CR-LSP Backup Parameters
  • (Optional) Configuring a Best-effort Path
  • (Optional) Configuring a Traffic Switching Policy for a Hot-Standby CR-LSP
  • (Optional) Configuring a Manual Switching Mechanism for a Primary/Hot-Standby CR-LSP
  • (Optional) Configuring CSPF Fast Switching
  • (Optional) Enabling the Coexistence of Rapid FRR Switching and MPLS TE HSB
  • Verifying the CR-LSP Backup Configuration
  • Configuring Static BFD for CR-LSP
  • Enabling BFD Globally
  • Setting BFD Parameters on the Ingress
  • Setting BFD Parameters on the Egress
  • Verifying the Configuration of Static BFD for CR-LSP
  • Configuring Dynamic BFD for CR-LSP
  • Enabling BFD Globally
  • Enabling the Capability of Dynamically Creating BFD Sessions on the Ingress
  • Enabling the Capability of Passively Creating BFD Sessions on the Egress
  • (Optional) Adjusting BFD Parameters
  • Verifying the Configuration of Dynamic BFD for CR-LSP
  • Configuring an RSVP-TE Tunnel
  • Enabling MPLS TE and RSVP-TE
  • Configuring CSPF
  • Configuring IGP TE (OSPF or IS-IS)
  • (Optional) Configuring TE Attributes for a Link
  • (Optional) Configuring an Explicit Path
  • (Optional) Disabling TE LSP Flapping Suppression
  • Configuring an MPLS TE Tunnel Interface
  • (Optional) Configuring Soft Preemption for RSVP-TE Tunnels
  • (Optional) Configuring Graceful Shutdown
  • Verifying the RSVP-TE Tunnel Configuration
  • Configuring an Automatic RSVP-TE Tunnel
  • Enabling MPLS TE and RSVP-TE
  • (Optional) Configuring CSPF
  • Configuring IGP TE (OSPF or IS-IS)
  • Configuring the Automatic RSVP-TE Tunnel Capability on a PCC
  • Configuring Dynamic BFD For Initiated RSVP-TE LSP
  • Configuring Dynamic BFD for Initiated RSVP-TE Tunnel
  • (Optional) Enabling Traffic Statistics Collection for Automatic Tunnels
  • Verifying the Automatic RSVP-TE Tunnel Configuration
  • Adjusting RSVP Signaling Parameters
  • Configuring the RSVP Hello Extension
  • Configuring an RSVP Timer
  • (Optional) Configuring Reliable RSVP Message Transmission
  • Configuring RSVP-TE Srefresh
  • Enabling RSVP-TE Reservation Confirmation
  • Changing the PSB and RSB Timeout Multiplier
  • Verifying the Configuration of Adjusting RSVP Signaling Parameters
  • Configuring Dynamic BFD for RSVP
  • Enabling BFD Globally
  • Enabling BFD for RSVP
  • (Optional) Adjusting BFD Parameters
  • Verifying the Configuration of Dynamic BFD for RSVP
  • Configuring Self-Ping for RSVP-TE
  • Configuring RSVP Authentication
  • Configuring an RSVP Authentication Mode
  • (Optional) Setting RSVP Authentication Lifetime
  • (Optional) Configuring the Handshake Function
  • (Optional) Configuring the Message Window Function
  • Verifying the RSVP Authentication Configuration
  • Configuring Whitelist Session-CAR for RSVP-TE
  • Configuring an RSVP GR Helper
  • Enabling the RSVP Hello Extension
  • Enabling the RSVP GR Support Capability
  • (Optional) Configuring a Hello Session Between RSVP GR Nodes
  • Verifying the RSVP GR Helper Configuration
  • Configuring the Entropy Label for Tunnels
  • Configuring an LSR to Deeply Parse IP Packets
  • Enabling the Entropy Label Capability on the Egress of an LSP
  • Configuring the Entropy Label for Global Tunnels
  • (Optional) Configuring an Entropy Label Capability for a Tunnel in the Tunnel Interface View
  • Verifying the Configuration of the Entropy Label for Tunnels
  • Configuring PCE+ to Calculate Paths for MPLS TE Tunnels
  • Configuring the Ingress as a PCE Client
  • Specifying a Candidate Server for a PCE Client
  • (Optional) Configuring PCEP Session Authentication
  • (Optional) Configuring Timers for a PCE Client
  • (Optional) Configuring Whitelist Session-CAR for PCEP
  • (Optional) Configuring a PCE Client to Delegate TE LSPs to All PCE Servers
  • (Optional) Enabling a PCE Client to Support the IETF-Compliant Association Object Format
  • (Optional) Enabling PCE Sessions to Support IETF-defined AO and PPAG TLV Encoding Formats
  • Verifying the PCE Configuration
  • Configuring the IP-Prefix Tunnel Function
  • Configuring an IP Prefix List
  • (Optional) Configuring a P2P TE Tunnel Template
  • Using the Automatic Primary Tunnel Function to Establish P2P TE Tunnels in a Batch
  • Verifying the IP-Prefix Tunnel Function Configuration
  • Configuring Dynamic Bandwidth Reservation
  • Adjusting Parameters for Establishing an MPLS TE Tunnel
  • Configuring an MPLS TE Explicit Path
  • Setting Priority Values for an MPLS TE Tunnel
  • Setting the Hop Limit for a CR-LSP
  • Associating CR-LSP Establishment with the Overload Setting
  • Configuring Route and Label Record
  • Setting Switching and Deletion Delays
  • Verifying the Configuration of Establishment of MPLS TE Tunnel
  • Importing Traffic to an MPLS TE Tunnel
  • Configuring the IGP Shortcut
  • Configuring Forwarding Adjacency
  • (Optional) Configuring CBTS
  • Configuring Static BFD for TE
  • Enabling BFD Globally
  • Setting BFD Parameters on the Ingress
  • Setting BFD Parameters on the Egress
  • Verifying the Configuration of Static BFD for TE
  • Configuring MPLS TE Manual FRR
  • Enabling TE FRR
  • Configuring a Bypass Tunnel
  • (Optional) Setting the FRR Switching Delay Time
  • (Optional) Enabling the Coexistence of Rapid FRR Switching and MPLS TE HSB
  • Verifying the MPLS TE Manual FRR Configuration
  • Configuring MPLS TE Auto FRR
  • Enabling TE Auto FRR
  • Enabling MPLS TE FRR and Configuring Attributes for an Automatic Bypass LSP
  • (Optional) Configuring Auto Bypass Tunnel Re-Optimization
  • Verifying the MPLS TE Auto FRR Configuration
  • Configuring MPLS Detour FRR
  • Configuring a Tunnel Protection Group
  • Creating a Tunnel Protection Group
  • (Optional) Configuring the Protection Switching Trigger Mechanism
  • Verifying the Tunnel Protection Group Configuration
  • Configuring an MPLS TE Associated Tunnel Group
  • Configuring Bandwidth Information Flooding for MPLS TE
  • Configuring the Limit Rate of MPLS TE Traffic
  • Configuring Tunnel Re-optimization
  • Configuring Isolated LSP Computation
  • Configuring Automatic Tunnel Bandwidth Adjustment
  • Disabling Automatic Bandwidth Configuration for Physical Interfaces
  • Disabling the Rerouting Function
  • Locking the Tunnel Configuration
  • Configuring P2MP TE Tunnels
  • Enabling P2MP TE Globally
  • (Optional) Disabling P2MP TE on an Interface
  • (Optional) Setting Leaf Switching and Deletion Delays
  • Configuring Leaf Lists
  • Configuring a P2MP TE Tunnel Interface
  • (Optional) Configuring a P2MP Tunnel Template
  • (Optional) Configuring a P2MP TE Tunnel to Support Soft Preemption
  • (Optional) Configuring the Reliability Enhancement Function for a P2MP Tunnel
  • Verifying the P2MP TE Tunnel Configuration
  • Configuring BFD for P2MP TE
  • Configuring P2MP TE FRR
  • Configuring Manual FRR for a Manually Configured P2MP TE Tunnel
  • Configuring FRR for Automatic P2MP TE Tunnels
  • Verifying the P2MP TE FRR Configuration
  • Configuring P2MP TE Auto FRR
  • Enabling P2MP TE Auto FRR
  • Enabling the TE FRR and Configuring the AutoBypass Tunnel Attributes
  • (Optional) Configuring Auto Bypass Tunnel Re-Optimization
  • Verifying the P2MP TE Auto FRR Configuration
  • Configuring DS-TE
  • Configuring a DS-TE Mode
  • Configuring a DS-TE Bandwidth Constraints Model
  • Configuring Link Bandwidth
  • Configuring a Tunnel Interfaces
  • Configuring an RSVP CR-LSP and Specifying Bandwidth Values
  • (Optional) Configuring a TE-Class Mapping Table
  • (Optional) Configuring CBTS
  • Verifying the DS-TE Configuration
  • Maintaining MPLS TE
  • Checking Connectivity of a TE Tunnel
  • Checking a TE Tunnel Using NQA
  • Checking Tunnel Error Information
  • Deleting RSVP-TE Statistics
  • Resetting the RSVP Process
  • Deleting an Automatic Bypass Tunnel and Re-establishing a New One
  • Deleting PCEP Session Statistics
  • Loopback Detection for a Specified Static Bidirectional Co-Routed CR-LSP
  • Enabling the Packet Loss-Free MPLS ECMP Switchback
  • Configuration Examples for MPLS TE
  • Example for Establishing a Static MPLS TE Tunnel
  • Example for Configuring a Static Bidirectional Co-routed CR-LSP
  • Example for Configuring an Associated Bidirectional Static CR-LSP
  • Example for Configuring an RSVP-TE Tunnel
  • Example for Configuring an RSVP-TE over GRE Tunnel
  • Example for Configuring RSVP Authentication
  • Example for Configuring the IP-Prefix Tunnel Function to Automatically Establish MPLS TE Tunnels in a Batch
  • Example for Configuring the Affinity Attribute of an MPLS TE Tunnel
  • Example for Configuring an Inter-area Tunnel
  • Example for Configuring the Threshold for Flooding Bandwidth Information
  • Example for Configuring MPLS TE Manual FRR
  • Example for Configuring MPLS TE Auto FRR
  • Example for Configuring MPLS Detour FRR
  • Example for Configure a Hot-standby CR-LSP
  • Example for Configuring a 1:1 Tunnel Protection Group Consisting of Bidirectional Co-routed CR-LSPs
  • Example for Configuring Isolated LSP Computation
  • Example for Configuring Static BFD for CR-LSP
  • Example for Configuring Dynamic BFD for CR-LSP
  • Example for Configuring Static BFD for TE
  • Example for Configuring BFD for RSVP
  • Example for Configuring a P2MP TE Tunnel
  • Example for Configuring the IETF DS-TE Mode (RDM)
  • Example for Configuring CBTS in an L3VPN over TE Scenario
  • Example for Configuring CBTS in an L3VPN over LDP over TE Scenario
  • Example for Configuring CBTS in a VLL over TE Scenario
  • Example for Configuring CBTS in a VPLS over TE Scenario
  • MPLS LDP Configuration
  • Overview
  • Configuration Precautions for MPLS LDP
  • Configuring a Static LSP
  • Enabling MPLS
  • Configuring the Ingress of a Static LSP
  • Configuring a Transit Node of a Static LSP
  • Configuring the Egress of a Static LSP
  • Verifying the Static LSP Configuration
  • Configuring a Local LDP Session
  • Configuring Global MPLS LDP Functions
  • Globally Enabling MPLS and LDP on an Interface
  • (Optional) Configuring an LSR ID for a Local LDP Session
  • (Optional) Configuring an LDP Transport Address
  • (Optional) Configuring Timers for a Local LDP Session
  • (Optional) Enabling LDP Loop Detection Negotiation
  • Verifying the Local LDP Session Configuration
  • Configuring a Remote LDP Session
  • Configuring Global MPLS LDP Functions
  • Configuring the LDP Remote Peer
  • (Optional) Configuring an LSR ID for a Remote LDP session
  • (Optional) Configuring Timers for a Remote LDP Session
  • (Optional) Enabling LDP Loop Detection Negotiation
  • Verifying the Remote LDP Session Configuration
  • Configuring the Dynamic LDP Advertisement Capability
  • Configuring an LDP LSP
  • Establishing an LDP LSP
  • (Optional) Configuring the PHP Feature
  • (Optional) Configuring an LDP Label Advertisement Mode
  • (Optional) Configuring a Global LDP Label Distribution Control Mode
  • (Optional) Configuring LDP to Automatically Trigger the Request in DoD Mode
  • (Optional) Configuring the MPLS MTU of an Interface
  • (Optional) Configuring the LDP MTU Signaling Protocol
  • (Optional) Configuring the LDP Split Horizon Policy
  • (Optional) Configuring the Inbound LDP Policy
  • (Optional) Configuring the Outbound LDP Policy
  • (Optional) Configuring a Policy for Triggering LSP Establishment
  • (Optional) Configuring a Policy for Triggering the Establishment of Transit LSPs
  • (Optional) Disabling LDP LSP Flapping Suppression
  • (Optional) Disabling a Device from Forwarding Unknown TLVs
  • Verifying the LDP LSP Configuration
  • Configuring LDP Extension for Inter-Area LSP
  • Configuring LDP Extension for Inter-Area LSPs
  • Verifying the Configuration of LDP Extension for Inter-area LSP
  • Configuring the LDP Multi-Instance
  • Enabling the LDP Multi-Instance
  • (Optional) Enabling a Device to Trigger Trap Messages Only for Public LDP Sessions
  • Verifying the Configuration of LDP Multi-Instance
  • Configuring IGP-based LDP Automatic Configuration
  • Configuring Static BFD to Monitor an LDP LSP
  • Enabling BFD Globally
  • Setting BFD Parameters on the Ingress
  • Setting BFD Parameters on the Egress
  • Verifying the Configuration of Static BFD to Monitor an LDP LSP
  • Configuring Dynamic BFD for LDP LSPs
  • Enabling BFD Globally
  • Enabling Dynamic BFD Session Creation over an LDP LSP
  • Configuring a Policy for Triggering Dynamic BFD for LDP LSPs
  • (Optional) Modifying BFD Parameters
  • Verifying the Configuration of Dynamic BFD for LDP LSP
  • Configuring Dynamic BFD to Monitor an LDP Tunnel
  • Enabling an MPLS Device to Dynamically Establish a BFD Session
  • Configuring a Policy for Triggering Dynamic BFD for LDP Tunnel
  • (Optional) Modifying BFD Parameters
  • Verifying the Configuration of Dynamic BFD to Monitor an LDP Tunnel
  • Configuring LDP Bit Error Detection
  • Configuring LDP Auto FRR
  • Enabling LDP Auto FRR
  • (Optional) Configuring LDP Graceful Deletion
  • (Optional) Enabling the Coexistence of ECMP and FRR
  • (Optional) Configuring the Function to Report Remote LDP Session Down Traps Generated Due to RLFA Route Deletion
  • Verifying the LDP Auto FRR Configuration
  • Configuring LDP Session Protection
  • Configuring LDP-IGP Synchronization
  • Enabling LDP-IGP Synchronization
  • (Optional) Blocking LDP-IGP Synchronization on an Interface
  • (Optional) Setting a Value for the Hold-down Timer
  • (Optional) Setting the Hold-max-cost Timer Value
  • (Optional) Setting the Value of the igp-sync-delay Timer
  • (Optional) Configuring LDP Graceful Deletion
  • Verifying LDP-IGP Synchronization Configuration
  • Configuring the LDP GR Helper
  • Enabling LDP GR
  • (Optional) Configuring Timers for the GR Helper
  • Verifying the LDP GR Configuration
  • Configuring the LDP Entropy Label Capability
  • Configuring an LSR to Deeply Parse IP Packets
  • Configuring an LDP Entropy Label on the Ingress of an LSP
  • Enabling the Entropy Label Capability on the Egress of an LSP
  • Verifying the Configuration of the LDP Entropy Label Capability
  • Configuring LDP over TE
  • Configuring Forwarding Adjacency
  • Creating Remote LDP Peers on Both Ends of a TE Tunnel
  • (Optional) Configuring a Policy for Triggering LSP Establishment
  • Verifying the LDP over TE Configuration
  • Configuring LDP Security Features
  • Configuring LDP MD5 Authentication
  • Configuring LDP Keychain Authentication
  • Configuring LDP TCP-AO Authentication
  • Configuring the LDP GTSM
  • Configuring Whitelist Session-CAR for LDP
  • Checking the Configuration
  • Configuring an mLDP P2MP Tunnel
  • Configuring a Manual mLDP P2MP Tunnel
  • Configuring an Automatic mLDP P2MP Tunnel
  • (Optional) Configuring the Reliability Enhancement Function for a P2MP Tunnel
  • (Optional) Enabling the Capability of Establishing a Best-Effort Path for an mLDP P2MP Tunnel
  • (Optional) Configuring a Timer for mLDP P2MP Tunnel Re-optimization
  • Verifying the Configuration of mLDP P2MP LSP
  • Configuring mLDP P2MP FRR Link Protection
  • Enabling mLDP P2MP FRR Link Protection
  • Enabling the Detection of Traffic with New mLDP MBB Incoming Labels
  • (Optional) Setting Timers for mLDP P2MP FRR Link Protection
  • Verifying the Configuration
  • Configuring Dynamic BFD to Monitor an mLDP P2MP Tunnel
  • Enabling Dynamic BFD to Monitor an mLDP P2MP Tunnel
  • (Optional) Adjusting Dynamic BFD Parameters
  • Verifying the Configuration of Dynamic BFD for mLDP P2MP Tunnel
  • Configuring LDP Traffic Statistics Collection
  • Enabling LDP Traffic Statistics Collection
  • Verifying the LDP Traffic Statistics Collection Configuration
  • Configuring mLDP P2MP Traffic Statistics Collection
  • Configuring the Uniform/Pipe Mode for the MPLS Penultimate Hop
  • Maintaining MPLS LDP
  • Configuring LDP Session Flapping Suppression
  • Resetting LDP
  • Checking LSP Connectivity and Reachability
  • Configuration Examples for MPLS LDP
  • Example for Configuring a Static LSP
  • Example for Configuring Local LDP Sessions
  • Example for Configuring a Remote LDP Session
  • Example for Establishing LSPs Through LDP
  • Example for Configuring Transit LSPs Through an IP Prefix List
  • Example for Configuring an Inbound LDP Policy
  • Example for Configuring an Outbound LDP Policy
  • Example for Configuring LDP Extension for Inter-Area LSPs
  • Example for Configuring Static BFD for LDP LSP
  • Example for Configuring Dynamic BFD to Monitor LDP LSPs
  • Example for Configuring Dynamic BFD to Monitor an LDP Tunnel
  • Example for Configuring LDP Auto FRR
  • Example for Configuring LDP Session Protection
  • Example for Configuring LDP over TE
  • Example for Configuring an mLDP P2MP LSP
  • Seamless MPLS Configuration
  • Overview of Seamless MPLS
  • Configuration Precautions for Seamless MPLS
  • Configuring Intra-AS Seamless MPLS
  • Configuring an AGG and a Core ABR as RRs
  • Enabling BGP Peers to Exchange Labeled IPv4 Routes
  • Configuring a BGP LSP
  • (Optional) Configuring the Protection Switching Function
  • (Optional) Configuring the Egress Protection Function
  • Verifying the Configuration of Intra-AS Seamless MPLS
  • Configuring Inter-AS Seamless MPLS
  • Configure an AGG as an RR
  • Enabling BGP Peers to Exchange Labeled IPv4 Routes
  • Configuring a BGP LSP
  • (Optional) Configuring the Mode in Which a BGP Label Inherits the QoS Priority in an Outer Tunnel Label
  • (Optional) Configuring the Protection Switching Function
  • (Optional) Configuring the Egress Protection Function
  • Verifying the Configuration of Inter-AS Seamless MPLS
  • Configuring Inter-AS Seamless MPLS+HVPN
  • Establishing an MP-EBGP Peer Relationship Between Each AGG and MASG
  • Enabling BGP Peers to Exchange Labeled IPv4 Routes
  • Configuring a BGP LSP
  • (Optional) Configuring the Mode in Which a BGP Label Inherits the QoS Priority in an Outer Tunnel Label
  • (Optional) Configuring the Protection Switching Function
  • (Optional) Configuring the Egress Protection Function
  • Verifying the Configuration of Inter-AS Seamless MPLS+HVPN
  • Configuring Dynamic BFD to Monitor a BGP Tunnel
  • Enabling an MPLS Device to Dynamically Establish a BGP BFD Session
  • Configuring a Policy for Dynamically Establishing a BGP BFD Session
  • (Optional) Adjusting BGP BFD Parameters
  • Verifying the Configuration of Dynamic BFD to Monitor a BGP Tunnel
  • Maintaining Seamless MPLS
  • Checking Network Connectivity and Reachability
  • Configuration Examples
  • Example for Configuring Intra-AS Seamless MPLS
  • Example for Configuring Inter-AS Seamless MPLS
  • Example for Configuring Inter-AS Seamless MPLS+HVPN
  • Example for Configuring Dynamic BFD to Monitor a BGP Tunnel
  • GMPLS UNI Configuration
  • Overview of GMPLS UNI
  • Configuration Precautions for GMPLS UNI
  • Configuring a GMPLS UNI Tunnel
  • (Optional) Configuring PCE to Calculate a Path Crossing Both the IP and Optical Layers
  • Configuring a Service Interface
  • Configuring LMP and an LMP Neighbor
  • Configuring a Control Channel
  • Configuring an Explicit Path
  • Configuring a Forward GMPLS UNI Tunnel
  • Configuring a Reverse GMPLS UNI Tunnel
  • Verifying the GMPLS UNI Tunnel Configuration
  • Maintaining GMPLS UNI
  • Disabling a GMPLS UNI Tunnel
  • Resetting a GMPLS UNI Tunnel
  • Configuration Examples for GMPLS UNI Tunnels
  • Configuring an In-Band GMPLS UNI Tunnel
  • Configuring an Out-of-Band GMPLS UNI Tunnel
  • Segment Routing
  • About This Document
  • Segment Routing MPLS Configuration
  • Overview of Segment Routing MPLS
  • Configuration Precautions for Segment Routing MPLS
  • Configuring an IS-IS SR-MPLS BE Tunnel
  • Enabling MPLS
  • Configuring Basic SR-MPLS BE Functions
  • (Optional) Configuring a Policy for Triggering SR-MPLS BE LSP Establishment
  • (Optional) Configuring a Policy to Prioritize SR-MPLS BE Tunnels
  • Verifying the IS-IS SR-MPLS BE Tunnel Configuration
  • Configuring an OSPF SR-MPLS BE Tunnel
  • Enabling MPLS
  • Configuring Basic SR-MPLS BE Functions
  • (Optional) Configuring a Policy for Triggering SR-MPLS BE LSP Establishment
  • (Optional) Configuring a Policy to Prioritize SR-MPLS BE Tunnels
  • Verifying the OSPF SR-MPLS BE Tunnel Configuration
  • Configuring Traffic Steering into SR-MPLS BE Tunnels
  • Configuring IS-IS SR to Communicate with LDP
  • Configuring OSPF SR to Communicate with LDP
  • Upgrading LDP to SR-MPLS BE
  • Configuring BFD for SR-MPLS BE
  • Configuring BFD for SR-MPLS BE (SR and LDP Interworking Scenario)
  • Configuring IS-IS SR-MPLS Flex-Algo
  • Configuring Flex-Algo Link Attributes
  • Configuring FADs
  • Configuring IS-IS Flex-Algo Functions
  • Configuring the Color Extended Community Attribute
  • Configuring the Mapping Between the Color Extended Community Attribute and Flex-Algo
  • Configuring Traffic Steering into a Flex-Algo-based SR-MPLS BE Tunnel
  • Verifying the Configuration
  • Configuring SBFD for SR-MPLS BE Tunnel
  • Configuring an IS-IS SR-MPLS TE Tunnel (Path Computation on the Controller)
  • Enabling MPLS TE
  • Enabling SR Globally
  • Configuring IS-IS SR-MPLS TE and Topology Reporting
  • Configuring an SR-MPLS TE Tunnel Interface
  • Configuring the UCMP Function of the SR-MPLS TE Tunnel
  • (Optional) Configuring SR on a PCC
  • Verifying the IS-IS SR-MPLS TE Tunnel Configuration
  • Configuring an OSPF SR-MPLS TE Tunnel (Path Computation on the Controller)
  • Enabling MPLS TE
  • Globally Enabling the SR Capability
  • Configuring the OSPF SR-MPLS TE Capability and Topology Report Function
  • Configuring an SR-MPLS TE Tunnel Interface
  • Configuring the UCMP Function of the SR-MPLS TE Tunnel
  • (Optional) Configuring SR on a PCC
  • Verifying the OSPF SR-MPLS TE Tunnel Configuration
  • Configuring an IS-IS SR-MPLS TE Tunnel (Explicit Path Used)
  • Enabling MPLS TE
  • Globally Enabling the SR Capability
  • Configuring Basic SR-MPLS TE Functions
  • Configuring an SR-MPLS TE Explicit Path
  • Configuring an SR-MPLS TE Tunnel Interface
  • Configuring the UCMP Function of the SR-MPLS TE Tunnel
  • Verifying the IS-IS SR-MPLS TE Tunnel Configuration
  • Configuring an OSPF SR-MPLS TE Tunnel (Explicit Path Used)
  • Enabling MPLS TE
  • Globally Enabling the SR Capability
  • Configuring Basic SR-MPLS TE Functions
  • Configuring an SR-MPLS TE Explicit Path
  • Configuring an SR-MPLS TE Tunnel Interface
  • Configuring the UCMP Function of the SR-MPLS TE Tunnel
  • Verifying the OSPF SR-MPLS TE Tunnel Configuration
  • Configuring an IS-IS SR-MPLS TE Tunnel (Path Computation on a Forwarder)
  • Enabling MPLS TE
  • Globally Enabling the SR Capability
  • Configuring Basic SR-MPLS TE Functions
  • Enabling the Ingress to Compute a Path
  • Configuring an SR-MPLS TE Tunnel Interface
  • Configuring the UCMP Function of the SR-MPLS TE Tunnel
  • Verifying the IS-IS SR-MPLS TE Tunnel Configuration
  • Configuring an OSPF SR-MPLS TE Tunnel (Path Computation on a Forwarder)
  • Enabling MPLS TE
  • Globally Enabling the SR Capability
  • Configuring Basic SR-MPLS TE Functions
  • Enabling the Ingress to Compute a Path
  • Configuring an SR-MPLS TE Tunnel Interface
  • Configuring the UCMP Function of the SR-MPLS TE Tunnel
  • Verifying the OSPF SR-MPLS TE Tunnel Configuration
  • Configuring BGP SR
  • Configuring an Inter-AS E2E SR-MPLS TE Tunnel (Path Computation on the Controller)
  • Setting a Binding SID
  • Configuring an E2E SR-MPLS TE Tunnel Interface
  • (Optional) Configuring SR on a PCC
  • Verifying the Configuration of an Inter-AS E2E SR-MPLS TE Tunnel
  • Configuring an Inter-AS E2E SR-MPLS TE Tunnel (Explicit Path Used)
  • Setting a Binding SID
  • Configuring an SR-MPLS TE Explicit Path
  • Configuring an E2E SR-MPLS TE Tunnel Interface
  • Verifying the Configuration of an Inter-AS E2E SR-MPLS TE Tunnel
  • Configuring Traffic Steering into SR-MPLS TE Tunnels
  • Configuring SBFD for SR-MPLS TE LSP
  • Configuring SBFD for SR-MPLS TE Tunnel
  • Configuring Static BFD for SR-MPLS TE LSP
  • Configuring Dynamic BFD for SR-MPLS TE LSP
  • Configuring Static BFD for SR-MPLS TE Tunnel
  • Configuring One-Arm BFD for E2E SR-MPLS TE Tunnel
  • Configuring One-Arm BFD for E2E SR-MPLS TE LSP
  • Configuring an SR-MPLS TE Policy (Manual Configuration)
  • Configuring IGP SR
  • Configuring an SR-MPLS TE Policy
  • Configuring a BGP Extended Community
  • Configuring Traffic Steering
  • Verifying the SR-MPLS TE Policy Configuration
  • Configuring an SR-MPLS TE Policy (Dynamic Delivery by a Controller)
  • Configuring IGP SR
  • Configuring BGP Peer Relationships Between the Controller and Forwarder
  • Configuring a BGP Extended Community
  • Configuring Traffic Steering
  • Verifying the SR-MPLS TE Policy Configuration
  • Configuring SBFD for SR-MPLS TE Policy
  • Configuring Hot Standby for SR-MPLS TE Policy
  • Redirecting a Public IPv4 BGP FlowSpec Route to an SR-MPLS TE Policy
  • Redirecting a Public IPv4 BGP FlowSpec Route to an SR-MPLS TE Policy (Manual Configuration)
  • Redirecting a Public IPv4 BGP FlowSpec Route to an SR-MPLS TE Policy (Dynamic Delivery by a Controller)
  • Configuring IS-IS TI-LFA FRR
  • Configuring OSPF TI-LFA FRR
  • Configuring a Device as the Egress of an MPLS-in-UDP Tunnel
  • Configuring an SR-MPLS TTL Processing Mode
  • Maintaining SR-MPLS
  • Configuring SR-MPLS BE Traffic Statistics Collection
  • Configuring SR-MPLS Flex-Algo LSP Traffic Statistics Collection
  • Configuring SR-MPLS TE Policy Traffic Statistics Collection
  • Configuring SR-MPLS TE Policy-related Alarm Thresholds
  • Configuring Examples for SR-MPLS BE
  • Example for Configuring L3VPN over IS-IS SR-MPLS BE
  • Example for Configuring Path Calculation Based on Different Flex-Algos in L3VPN over IS-IS SR-MPLS Flex-Algo LSP Scenarios
  • Example for Configuring Path Calculation Based on Affinity Attributes in L3VPN over IS-IS SR-MPLS Flex-Algo LSP Scenarios
  • Example for Configuring L3VPN over OSPF SR-MPLS BE
  • Example for Configuring EVPN VPLS over SR-MPLS BE (EVPN Instance in BD Mode)
  • Example for Configuring EVPN VPLS over SR-MPLS BE (Common EVPN Instance)
  • Example for Configuring Non-Labeled Public BGP Routes to Recurse to an SR-MPLS BE Tunnel
  • Example for Configuring IS-IS SR to Communicate with LDP
  • Example for Configuring IS-IS Anycast FRR
  • Example for Configuring SBFD to Monitor SR-MPLS BE Tunnels
  • Example for Configuring TI-LFA FRR for an SR-MPLS BE Tunnel
  • Configuring Examples for SR-MPLS TE
  • Example for Configuring L3VPN over SR-MPLS TE
  • Example for Configuring VPLS over SR-MPLS TE
  • Example for Configuring BD EVPN IRB over SR-MPLS TE
  • Example for Configuring EVPN VPLS over SR-MPLS TE (EVPN Instance in BD Mode)
  • Example for Configuring EVPN VPLS over SR-MPLS TE (Common EVPN Instance)
  • Example for Configuring EVPN L3VPNv6 over SR-MPLS TE
  • Example for Configuring the Controller to Run NETCONF to Deliver Configurations to Create an SR-MPLS TE Tunnel
  • Example for Configuring Static BFD for SR-MPLS TE
  • Example for Configuring Dynamic BFD for SR-MPLS TE LSP
  • Example for Configuring TI-LFA FRR for a Loose SR-MPLS TE Tunnel
  • Example for Configuring an E2E SR-MPLS TE Tunnel (Explicit Path Used)
  • Example for Configuring CBTS in an L3VPN over SR-MPLS TE Scenario
  • Example for Configuring CBTS in an L3VPN over LDP over SR-MPLS TE Scenario
  • Example for Configuring DSCP-Based IP Service Recursion to SR-MPLS TE Tunnels
  • Configuration Examples for SR-MPLS TE Policy
  • Example for Configuring L3VPN Routes to Be Recursed to Manually Configured SR-MPLS TE Policies (Color-Based)
  • Example for Configuring L3VPN Routes to Be Recursed to Manually Configured SR-MPLS TE Policies (DSCP-Based)
  • Example for Configuring L3VPN Routes to Be Recursed to Dynamically Delivered SR-MPLS TE Policies (Color-Based)
  • Example for Configuring L3VPNv6 Routes to Be Recursed to Manually Configured SR-MPLS TE Policies
  • Example for Configuring Non-labeled Public BGP Routes to Be Recursed to Manually Configured SR-MPLS TE Policies
  • Example for Configuring BGP4+ 6PE Routes to Be Recursed to Manually Configured SR-MPLS TE Policies
  • Example for Configuring EVPN Route Recursion Based on an SR-MPLS TE Policy
  • Example for Redirecting Public IPv4 BGP FlowSpec Routes to SR-MPLS TE Policies
  • Segment Routing IPv6 Configuration
  • Overview of Segment Routing IPv6
  • Configuration Precautions for Segment Routing IPv6
  • Activating an SRv6 Port License for a Board
  • Enabling the Reduced SRH Function of SRv6
  • Configuring SRv6 BE
  • Configuring L3VPNv4 over SRv6 BE
  • Configuring L3VPNv6 over SRv6 BE
  • Configuring EVPN L3VPN over SRv6 BE
  • Configuring EVPN VPWS over SRv6 BE
  • Configuring EVPN VPLS over SRv6 BE
  • Configuring Public IPv4 over SRv6 BE
  • Configuring Public IPv6 over SRv6 BE
  • Configuring L3VPNv4 HoVPN over SRv6 BE
  • Configuring SRv6 BE Network Slicing
  • Activating a Network Slice License
  • Configuring Network Slice Instances
  • Configuring Network Slice Interfaces
  • Configuring a BGP Extended Community
  • Configuring SRv6 BE Services
  • Configuring Route Forwarding Based on Network Slices
  • Verifying the Configuration
  • Configuring SRv6 Flex-Algo
  • Configuring L3VPNv4 over SRv6 Flex-Algo
  • Configuring EVPN L3VPN over SRv6 Flex-Algo
  • Configuring EVPN VPWS over SRv6 Flex-Algo
  • Configuring EVPN VPLS over SRv6 Flex-Algo
  • Configuring Public IPv4 over SRv6 Flex-Algo
  • Configuring Public IPv6 over SRv6 Flex-Algo
  • Configuring an SRv6 TE Policy (Manual Configuration)
  • Enabling SRv6
  • Configuring SRv6 SIDs
  • Configuring an SRv6 TE Policy
  • Configuring a BGP Extended Community
  • Configuring Traffic Steering
  • Verifying the Configuration
  • Configuring an SRv6 TE Policy (Dynamic Delivery by a Controller)
  • Enabling SRv6
  • Configuring SRv6 SIDs
  • Configuring TE Attributes
  • Configuring IS-IS Topology Advertisement to BGP-LS
  • Configuring BGP Peer Relationships Between the Controller and Forwarder
  • Configuring SRv6 TE Policy Status Advertisement to BGP-LS
  • Configuring a BGP Extended Community
  • Configuring Traffic Steering
  • Verifying the SRv6 TE Policy Configuration
  • Configuring SRv6 TE Policy Network Slicing
  • Activating a Network Slice License
  • Configuring Network Slice Instances
  • Configuring Network Slice Interfaces
  • Configuring a Slice ID for an SRv6 TE Policy
  • Verifying the Configuration
  • Configuring SRv6 TE Policy Services
  • Configuring L3VPNv4 over SRv6 TE Policy
  • Configuring L3VPNv6 over SRv6 TE Policy
  • Configuring EVPN L3VPNv4 over SRv6 TE Policy
  • Configuring EVPN L3VPNv6 over SRv6 TE Policy
  • Configuring EVPN VPWS over SRv6 TE Policy
  • Configuring EVPN VPLS over SRv6 TE Policy
  • Configuring L3VPNv4 HoVPN over SRv6 TE Policy
  • Configuring a Device to Redirect IPv4 Public Network Traffic to an SRv6 TE Policy Through Multi-Field Classification
  • Configuring a Device to Redirect IPv4 VPN Traffic to an SRv6 TE Policy Through Multi-Field Classification
  • Configuring a Device to Redirect IPv6 Public Network Traffic to an SRv6 TE Policy Through Multi-Field Classification
  • Configuring a Device to Redirect IPv6 VPN Traffic to an SRv6 TE Policy Through Multi-Field Classification
  • Configuring Public Network IPv4 over SRv6 TE Policy
  • Configuring Public Network IPv6 over SRv6 TE Policy
  • Redirecting a Public IPv4 BGP FlowSpec Route to an SRv6 TE Policy
  • Redirecting a Public IPv4 BGP FlowSpec Route to an SRv6 TE Policy (Manual Configuration)
  • Redirecting a Public IPv4 BGP FlowSpec Route to an SRv6 TE Policy (Dynamic Delivery by a Controller)
  • Redirecting a BGP IPv6 FlowSpec Route to an SRv6 TE Policy
  • Configuring BGP IPv6 FlowSpec Route Redirection to an SRv6 TE Policy (Manual Configuration)
  • Configuring BGP IPv6 FlowSpec Route Redirection to an SRv6 TE Policy (Dynamic Delivery by a Controller)
  • Configuring an SRv6 TE Policy Attribute Template
  • Creating an SRv6 TE Policy Attribute Template
  • Referencing an SRv6 TE Policy Attribute Template
  • Verifying the Configuration
  • Configuring the Shortcut Function for SRv6 TE Policies
  • Configuring the Shortcut Function for Static SRv6 TE Flow Groups
  • Configuring a TTL Processing Mode for an SRv6 TE Policy
  • Configuring Headend-based Fault Detection for SRv6 TE Policies
  • Configuring SBFD for SRv6 TE Policy
  • Configuring One-Arm BFD for SRv6 TE Policy
  • Configuring HSB for SRv6 TE Policy
  • Configuring IS-IS SRv6 TI-LFA FRR
  • Configuring SRv6 Midpoint Protection
  • Configuring SRv6 Egress Protection
  • Configuring an SRv6 Path MTU
  • Configuring BGP SRv6
  • Configuring OSPFv3 to Advertise a Locator Route
  • Configuring SRv6 SFC
  • Configuring Basic SRv6 SFC Functions
  • Configuring SRv6 SFC Reliability
  • Using Ping/Tracert to Test an SRv6 Network
  • Using Ping to Test the Connectivity of an SRv6 Network
  • Using Tracert to Test the Path Information of an SRv6 Network
  • Maintaining SRv6
  • Configuring SRv6 TE Policy-related Alarm Thresholds
  • Configuring SRv6 TE Policy Traffic Statistics Collection
  • Configuration Examples for SRv6 BE
  • Example for Configuring L3VPNv4 over SRv6 BE
  • Example for Configuring L3VPNv4 over SRv6 BE Flex-Algo
  • Example for Configuring L3VPNv4 over SRv6 BE ECMP
  • Example for Configuring VPN FRR for L3VPNv4 over SRv6 BE
  • Example for Configuring EVPN L3VPNv4 over SRv6 BE
  • Example for Configuring EVPN L3VPNv4 over SRv6 BE Flex-Algo
  • Example for Configuring EVPN L3VPNv4 over SRv6 BE Network Slicing
  • Example for Configuring EVPN L3VPNv6 over SRv6 BE
  • Example for Configuring EVPN L3VPNv6 over SRv6 BE ECMP
  • Example for Configuring VPN FRR for EVPN L3VPNv6 over SRv6 BE
  • Example for Configuring EVPN VPWS over SRv6 BE
  • Example for Configuring EVPN VPWS over SRv6 BE (CE Dual-Homing in Active-Active Mode)
  • Example for Configuring EVPN VPWS over SRv6 BE (CE Dual-Homing in Single-Active Mode)
  • Example for Configuring EVPN VPLS over SRv6 BE
  • Example for Configuring EVPN VPLS over SRv6 BE (CE Dual-Homing)
  • Example for Configuring Inter-AS L3VPNv4 over SRv6 BE
  • Example for Configuring L3VPNv4 HoVPN over SRv6 BE Plus SRv6 BE
  • Example for Configuring Public IPv4 over SRv6 BE
  • Example for Configuring Public IPv6 over SRv6 BE
  • Configuration Examples for SRv6 TE Policy
  • Example for Configuring L3VPNv4 over SRv6 TE Policy (Manual Configuration)
  • Example for Configuring L3VPNv4 over Dynamic SRv6 TE Flow Group
  • Example for Configuring EVPN L3VPNv4 over SRv6 TE Policy (Manual Configuration)
  • Example for Configuring EVPN L3VPNv6 over SRv6 TE Policy (Manual Configuration)
  • Example for Configuring Network Slicing in an EVPN L3VPNv4 over SRv6 TE Policy Scenario (Manual Configuration)
  • Example for Configuring EVPN L3VPNv4 over SRv6 TE Policy (Manual Configuration with SRH Compression)
  • Example for Configuring EVPN VPWS over SRv6 TE Policy (Manual Configuration)
  • Example for Configuring a Dynamic VPWS SS-PW over SRv6 TE Policy (Manual Configuration)
  • Example for Configuring EVPN VPLS over SRv6 TE Policy (Manual Configuration)
  • Example for Configuring L3VPNv4 over SRv6 TE Policy Egress Protection
  • Example for Configuring Inter-AS L3VPNv4 over SRv6 TE Policy
  • Example for Configuring SRv6 TE Policy over GRE
  • Example for Configuring the Shortcut Function for SRv6 TE Policies
  • Example for Configuring the Shortcut Function for Static SRv6 TE Flow Groups
  • Example for Configuring an SRv6 SFC to Carry IPv4 Services (SFF-to-SF Packets Are Forwarded at Layer 3)
  • Example for Configuring an SRv6 SFC to Carry IPv4 Services (SFF-to-SF Packets Are Forwarded at Layer 2)
  • Example for Configuring L3VPNv4 HoVPN over MPLS Plus SRv6 TE Policy
  • Example for Configuring L3VPNv4 over SRv6 TE Policy (Manual Configuration with SRH Compression)
  • Example for Configuring Public IPv4 over SRv6 TE Policy
  • Example for Configuring Public IPv6 over SRv6 TE Policy
  • Example for Configuring a BGP Virtual Link
  • VPN
  • About This Document
  • Tunnel Management Configuration
  • Overview of VPN Tunnel Management
  • Configuration Precautions for VPN Tunnel Management
  • Configuring and Applying a Tunnel Policy
  • Configuring a Tunnel Policy
  • Applying a Tunnel Policy to a VPN
  • Verifying the Configuration
  • Configuring a Tunnel Selector
  • Configuring a Tunnel Selector
  • Applying a Tunnel Selector
  • Checking the Configuration
  • Maintaining VPN Tunnel Management
  • Monitoring the Running Status of a Tunnel
  • Configuration Examples for Tunnel Management
  • Example for Configuring a Tunnel Policy for an L3VPN
  • Example for Configuring a Tunnel Selector in an Inter-AS VPN Option B Scenario with MPLS TE Tunnels
  • GRE Configuration
  • Overview of GRE
  • Configuration Precautions for GRE
  • Configuring a GRE Tunnel
  • Configuring the Interface Bound to GRE
  • Configuring a Tunnel Interface
  • Configuring Routes for the Tunnel
  • (Optional) Configuring a TTL Processing Mode for a GRE Tunnel
  • (Optional) Enabling the Keepalive Function
  • (Optional) Configuring GRE Security Options
  • Verifying the GRE Tunnel Configuration
  • Maintaining GRE
  • Clearing the Statistics of a Tunnel Interface
  • Monitoring the Running Status of GRE
  • Configuration Examples for GRE
  • Example for Configuring a Static Route for GRE
  • Example for Configuring the CE to Access a VPN Through a GRE Tunnel of the Public Network
  • Example for Configuring CEs to Access a VPN Instance Through a GRE Tunnel Traversing VPNs
  • Example for Configuring the Keepalive Function for GRE
  • Example for Configuring a Dynamic Routing Protocol for GRE
  • Example for Configuring a Dynamic Routing Protocol (IPv6 over IPv4) for GRE
  • IPv6 GRE Configuration
  • Overview of IPv6 GREIPv6 Generic Routing Encapsulation (GRE) encapsulates the packets of certain network layer protocols so that the encapsulated packets can be transmitted over the IPv6 network.
  • Configuration Precautions for IPv6 GRE
  • Configuring an IPv6 GRE Tunnel
  • Configuring the Interface Bound to GRE
  • Configuring a Tunnel Interface
  • Configuring Tunnel Routes
  • Verifying the IPv6 GRE Tunnel Configuration
  • Configuration Examples for IPv6 GRE
  • Example for Configuring IPv6 GRE Static Routes
  • DSVPN Configuration
  • DSVPN Overview
  • Configuration Precautions for DSVPN
  • Configuring DSVPN
  • Configuring mGRE
  • Configuring Routes
  • Configuring NHRP
  • (Optional) Configuring an IPsec Profile
  • Verifying the DSVPN Configuration
  • Configuration Examples for DSVPN
  • Example for Configuring DSVPN in Non-Shortcut Mode (Static Route)
  • Example for Configuring DSVPN in Non-Shortcut Mode (OSPF)
  • Example for Configuring DSVPN in Non-Shortcut Mode (BGP)
  • Example for Configuring DSVPN in Shortcut Mode (OSPF)
  • Example for Configuring DSVPN in Shortcut Mode (BGP)
  • Example for Configuring Inter-NAT DSVPN
  • Example for Configuring Dual-Hub DSVPN (Active/Standby Protection for Hubs)
  • Example for Configuring DSVPN over IPsec
  • Example for Configuring MCE DSVPN over IPsec
  • L2TPv3 Configuration
  • Overview of L2TPv3
  • Configuration Precautions for L2TPv3
  • Configuring Basic L2TPv3 over IPv6 Functions
  • Configuring Basic L2TPv3 over IPv4 Functions
  • Configuring an L2TPv3 Local Switching Connection
  • Maintaining L2TPv3
  • Performing an L2TPv3 Tunnel Injection Test
  • Clearing L2TPv3 Packet Statistics
  • Configuration Examples for L2TPv3
  • Example for Configuring an L2TPv3 Tunnel to Carry Services
  • Example for Configuring an L2TPv3 Over IPv4 PW Tunnel to Carry Services
  • Example for Configuring an L2TPv3 Connection in Local Switching Mode to Carry Services
  • BGP/MPLS IP VPN Configuration
  • Overview of BGP/MPLS IP VPN
  • Configuration Precautions for BGP MPLS IP VPN
  • Activating L3VPN Interface Licenses on a Board
  • Configuring a Basic BGP/MPLS IP VPN
  • Configuring a VPN Instance
  • Binding Interfaces to a VPN Instance
  • (Optional) Configuring a Router ID for a BGP-VPN Instance IPv4 Address Family
  • Establishing MP-IBGP Peer Relationships Between PEs
  • Configuring Route Exchange Between PEs and CEs
  • (Optional) Configuring One-Label-per-Next-Hop Label Distribution
  • Verifying the Configuration
  • Configuring Route Reflection to Optimize the VPN Backbone Layer
  • Configuring a Client PE to Establish an MP-IBGP Peer Relationship with an RR
  • Configuring an RR to Establish MP-IBGP Peer Relationships with All Client PEs
  • Configuring Route Reflection for BGP VPNv4 Routes
  • Verifying the Configuration of Route Reflection to Optimize the VPN Backbone Layer
  • Configuring Hub & Spoke
  • Configuring a VPN Instance
  • Binding an Interface to a VPN Instance
  • Configuring Route Exchange Between a Hub-PE and a Spoke-PE
  • Configuring Route Exchange Between a PE and a CE
  • Verifying the Hub and Spoke Configuration
  • Configuring a Tunnel Policy for the Backbone Network of a BGP/MPLS IP VPN
  • Configuring a Tunnel Policy
  • Applying a Tunnel Policy to a VPN
  • Verifying the Tunnel Policy Configuration
  • Configuring Inter-AS VPN Option B (Basic Networking)
  • Configuring MP-IBGP Between a PE and an ASBR in the Same AS
  • Configuring MP-EBGP Between ASBRs in Different ASs
  • Configuring ASBRs Not to Filter VPNv4 Routes Based on VPN Targets
  • (Optional) Using a Routing Policy to Control VPNv4 Routes on ASBRs
  • Configuring Route Exchange Between a CE and a PE
  • Verifying the Configuration of Inter-AS VPN Option B (Basic Networking)
  • Configuring Inter-AS VPN Option B (ASBR Also Functioning as a PE)
  • Configuring MP-IBGP Between a PE and an ASBR in the Same AS
  • Configuring MP-EBGP Between ASBRs in Different ASs
  • Configuring ASBRs Not to Filter VPNv4 Routes Based on VPN Targets
  • (Optional) Using a Routing Policy to Control VPNv4 Routes on ASBRs
  • (Optional) Configuring One-Label-per-Next-Hop Label Distribution on an ASBR
  • Configuring a VPN Instance on an ASBR
  • Configuring Route Exchange Between a CE and an ASBR
  • Configuring Route Exchange Between a CE and a PE
  • Verifying the Configuration of Inter-AS VPN Option B (ASBR Also Functioning as a PE)
  • Configuring Inter-AS VPN Option B (ASBR Also Functioning as an RR)
  • Configuring MP-IBGP Between a PE and an ASBR in the Same AS
  • Configuring MP-EBGP Between ASBRs in Different ASs
  • Configuring ASBRs Not to Filter VPNv4 Routes Based on VPN Targets
  • (Optional) Using a Routing Policy to Control VPNv4 Routes on ASBRs
  • (Optional) Configuring One-Label-per-Next-Hop Label Distribution on an ASBR
  • Configuring BGP IPv4 VPN Route Reflection on an ASBR
  • Verifying the Configuration of Inter-AS VPN Option B (ASBR Also Functioning as an RR)
  • Configuring Inter-AS VPN Option B (Spanning More Than Two ASs)
  • Configuring MP-IBGP Between a PE and an ASBR in the Same AS
  • Configuring MP-EBGP Between ASBRs in Different ASs
  • Configuring MP-IBGP Between ASBRs in the Same AS
  • Configuring ASBRs Not to Filter VPNv4 Routes Based on VPN Targets
  • (Optional) Configuring One-Label-per-Next-Hop Label Distribution on an ASBR
  • (Optional) Using a Routing Policy to Control VPNv4 Routes on ASBRs
  • Verifying the Configuration of Inter-AS VPN Option B (Spanning More Than Two ASs)
  • Configuring Inter-AS VPN Option C (Solution 1)
  • Enabling the Exchange of Labeled IPv4 Routes
  • Configuring a Routing Policy to Control Label Distribution
  • Establishing an MP-EBGP Peer Relationship Between PEs
  • Configuring Route Exchange Between a CE and a PE
  • Verifying the Configuration of Inter-AS VPN Option C (Solution 1)
  • Configuring Inter-AS VPN Option C (Solution 2)
  • Establishing an EBGP Peer Relationship Between ASBRs
  • Advertising the Routes of a PE in the Local AS to the Remote PE
  • Enabling the Capability of Exchanging Labeled IPv4 Routes
  • Establishing an LDP LSP for the Labeled BGP Routes of the Public Network
  • Establishing an MP-EBGP Peer Relationship Between PEs
  • Configuring Route Exchange Between a CE and a PE
  • Verifying the Configuration of Inter-AS VPN Option C in an Independent Labeled Address Family (Solution 2)
  • Configuring Inter-AS VPN Option C in an Independent Labeled Address Family (Solution 1)
  • Enabling the Exchange of Labeled IPv4 Routes
  • Establishing an MP-EBGP Peer Relationship Between PEs
  • Configuring Route Exchange Between a CE and a PE
  • Verifying the Configuration of Inter-AS VPN Option C in an Independent Labeled Address Family (Solution 1)
  • Configuring Inter-AS VPN Option C in an Independent Labeled Address Family (Solution 2)
  • Establishing an EBGP Peer Relationship Between ASBRs
  • Advertising the Routes of a PE in the Local AS to the Remote PE
  • Configuring a BGP Peer to Be Added to a Labeled Address Family
  • Establishing an LDP LSP for the Labeled BGP Routes of the Public Network
  • Importing Labeled Routes to a Public Network's Unicast Routing Table
  • Establishing an MP-EBGP Peer Relationship Between PEs
  • Configuring Route Exchange Between a CE and a PE
  • Verifying the Inter-AS VPN Option C Configuration
  • Configuring the Carrier's Carrier (Solution 1)
  • Configuring the Level 1 Carrier CE to Access the Level 1 Carrier PE (Using LDP Multi-Instance)
  • Configuring a Level 2 Carrier CE to Access a Level 2 Carrier PE
  • Configuring the External Route Exchange Between Level 2 Carrier PEs
  • Verifying the Configuration
  • Configuring the Carrier's Carrier (Solution 2 + BGP Label Distribution)
  • Configuring the Level 1 Carrier CE to Access the Level 1 Carrier PE (Using the BGP Labeled Route Solution)
  • Configuring a Level 2 Carrier CE to Access a Level 2 Carrier PE
  • Configuring External Route Exchanges Between Level 2 Carrier PEs
  • Verifying the Configuration
  • Configuring the Carrier's Carrier (Solution 2 + LDP Label Distribution for BGP)
  • Configuring a Level 1 Carrier CE to Access Level 1 Carrier PEs
  • Configuring a Level 2 Carrier CE to Access a Level 2 Carrier PE
  • Configuring External Route Exchanges Between Level 2 Carrier PEs
  • Importing BGP routes to the IGP Routing Table
  • Configuring LDP to Distribute Labels for the Labeled BGP Routes of the Public Network
  • Verifying the Configuration
  • Configuring the Carrier's Carrier in an Independent Label Address Family (BGP Label Distribution Solution)
  • Configuring a Level 1 Carrier CE to Access Level 1 Carrier PEs
  • Configuring a Level 2 Carrier CE to Access a Level 2 Carrier PE
  • Configuring External Route Exchanges Between Level 2 Carrier's PEs
  • Verifying the Configuration of Carrier's Carrier in an Independent Labeled Address Family (Solution 1)
  • Configuring the Carrier's Carrier in an Independent Label Address Family (LDP Label Distribution for BGP)
  • Configuring a Level 1 Carrier CE to Access Level 1 Carrier PEs
  • Configuring the Level 2 Carrier's Clients to Access the Level 2 Carrier's PE
  • Configuring External Route Exchanges Between Level 2 Carrier PEs
  • Importing BGP routes to the IGP Routing Table
  • Configuring LDP to Distribute Labels for the Labeled BGP Routes of the Public Network
  • Verifying the Configuration of Carrier's Carrier in an Independent Labeled Address Family (Solution 2)
  • Configuring Route Recursion to Remotely Leaked VPN Routes
  • Configuring a Device to Be Able to Recurse Non-labeled Public BGP Routes to LSPs
  • Configuring an MCE
  • Configuring a Routing Protocol on an MCE
  • Configuring a Routing Protocol on the PE Connected to an MCE
  • Verifying the MCE Configuration
  • Configuring an HVPN
  • Configuring an HoVPN
  • Configuring an H-VPN
  • (Optional) Configuring Route Regeneration
  • Verifying the HVPN Configuration
  • Configuring Load Balancing Among IPv4 VPN Routes on the Backbone Network
  • Configuring IPv4 Route Import Between Instances
  • Configuring Route Import Between VPN and Public Network Instances
  • Configuring Route Import Between VPN Instances
  • Verifying the Configuration of IPv4 Route Import Between Instances
  • Configuring VPN FRR
  • Configuring VPN ORF
  • Configuring Private Network IP FRR
  • Configuring IP+VPNv4 Hybrid FRR
  • Configuring VPN MPLS/VPN SRv6 Dual-Stack Tunnels
  • Configuring VPNv4 FRR
  • Maintaining BGP/MPLS IP VPN
  • Collecting Statistics about L3VPN Traffic
  • Checking L3VPN Traffic
  • Clearing L3VPN Traffic
  • Monitoring the Running Status of a BGP/MPLS IP VPN
  • Checking Network Connectivity and Reachability
  • Clearing BGP Statistics of the VPN Instance IPv4 Address Family
  • Checking Queue Rate Statistics in a VPN Instance
  • Resetting BGP Connections
  • Configuration Examples for BGP/MPLS IP VPN
  • Example for Configuring BGP/MPLS IP VPN
  • Example for Configuring BGP AS Number Substitution
  • Example for Configuring the BGP SoO Attribute
  • Example for Configuring CE Dual-Homing with EBGP Running Between the PEs and CE
  • Example for Configuring Two RRs for the Optimization of the VPN Backbone Layer
  • Example for Configuring an RR for the Optimization of the VPN Access Layer
  • Example for Configuring Hub and Spoke (Dual Links Between a Hub-PE and a Hub-CE)
  • Example 1 for Configuring Hub and Spoke (Single Link Between a Hub-PE and a Hub-CE)
  • Example 2 for Configuring Hub and Spoke (Single Link Between a Hub-PE and a Hub-CE)
  • Example 3 for Configuring Hub and Spoke (Single Link Between a Hub-PE and a Hub-CE)
  • Example for Configuring Extranet VPN
  • Example for Configuring Route Import Between VPN and Public Network
  • Example for Configuring L3VPN over SR-MPLS TE
  • Example for Configuring Load Balancing Among Tunnels to Which Remotely Leaked VPN Routes Recurse
  • Example for Configuring Inter-AS VPN Option B in Basic Networking
  • Example for Configuring Inter-AS VPN Option B with an RR in an AS
  • Example for Configuring Inter-AS VPN Option B with an ASBR Filtering VPNv4 Routes
  • Example for Configuring Inter-AS VPN Option B with a P Between ASBRs
  • Example for Configuring Inter-AS VPN Option B with ASBRs Functioning as PEs
  • Example for Configuring Inter-AS VPN Option B with an ASBR Functioning as an RR
  • Example for Configuring Inter-AS VPN Option B with the VPN Spanning Multiple ASs
  • Example for Configuring Inter-AS VPN Option C (Solution 1)
  • Example for Configuring Inter-AS VPN Option C (Solution 2)
  • Example for Configuring Inter-AS VPN Option C in an Independent Labeled Address Family (Solution 1)
  • Example for Configuring Inter-AS VPN Option C in an Independent Labeled Address Family (Solution 2)
  • Example for Configuring Carrier's Carrier Solution 1 (LDP Multi-Instance)
  • Example for Configuring Carrier's Carrier Solution 2 (BGP Label Distribution)
  • Example for Configuring Carrier's Carrier Solution 2 (LDP Label Distribution for BGP)
  • Example for Configuring the Carrier's Carrier in an Independent Label Address Family (BGP Label Distribution Solution)
  • Example for Configuring the Carrier's Carrier in an Independent Label Address Family (LDP Label Distribution for BGP)
  • Example for Configuring an MCE
  • Example for Configuring VPN FRR
  • Example for Configuring VPN ORF
  • Example for Configuring Private Network IP FRR
  • Example for Configuring IP+VPNv4 Hybrid FRR
  • Example for Configuring BFD for Static VPN Routes
  • BGP/MPLS IPv6 VPN Configuration
  • Overview of BGP/MPLS IPv6 VPN
  • Configuration Precautions for BGP/MPLS IPv6 VPN
  • Activating L3VPN Interface Licenses for a CM Board
  • Configuring a Basic BGP/MPLS IPv6 VPN
  • Configuring a VPN Instance
  • Binding Interfaces to a VPN Instance
  • (Optional) Setting a Router ID for a BGP VPN Instance IPv6 Address Family
  • Establishing MP-IBGP Peer Relationships Between PEs
  • Configuring Route Exchange Between PEs and CEs
  • Verifying the Configuration of Basic BGP/MPLS IPv6 VPN
  • Configuring 6VPE
  • Configuring a VPN Instance
  • Binding Interfaces to a VPN Instance
  • (Optional) Setting a Router ID for a BGP VPN Instance
  • Establishing MP-IBGP Peer Relationships Between PEs
  • Configuring BGP VPN Peer Relationships Between PEs and CEs
  • Verifying the Configuration
  • Configuring Route Reflection for BGP VPNv6 Routes
  • Configuring a Client PE to Establish an MP-IBGP Peer Relationship with the RR
  • Configuring an RR to Establish MP-IBGP Peer Relationships with All Client PEs
  • Establishing Route Reflection for BGP VPNv6 Routes
  • Verifying the Configuration of Route Reflection for BGP VPNv6 Routes
  • Configuring IPv6 Hub and Spoke (IPv6)
  • Configuring a VPN Instance
  • Configuring Routing Attributes for a VPN Instance
  • Binding an Interface to a VPN Instance
  • Configuring Route Exchange Between a Hub-PE and a Spoke-PE
  • Configuring Route Exchange Between a PE and a CE
  • Verifying the Configuration of Hub and Spoke (IPv6)
  • Configuring a Tunnel Policy for the Backbone Network of a BGP/MPLS IPv6 VPN
  • Configuring a Tunnel Policy
  • Applying a Tunnel Policy to an IPv6 VPN
  • Verifying the Configuration of a Tunnel Policy for the Backbone Network of a BGP/MPLS IPv6 VPN
  • Configuring Inter-AS IPv6 VPN Option A
  • Configuring Inter-AS IPv6 VPN Option B
  • Configuring MP-IBGP Between a PE and an ASBR in the Same AS
  • Configuring MP-EBGP Between ASBRs in Different ASs
  • Controlling the Learning and Advertising of VPN Routes on ASBR
  • (Optional) Configuring One-Label-per-Next-Hop Label Distribution on an ASBR
  • Configuring Route Exchange Between a CE and a PE
  • Verifying the Configuration of Inter-AS IPv6 VPN Option B
  • Configuring Inter-AS IPv6 VPN-Option C (Solution 1)
  • Enabling Exchange of the IPv4 Routes with Labels
  • Configuring a Route-Policy to Control Label Distribution
  • Establishing the MP-EBGP Peer Between PEs
  • Configuring Route Exchange Between the PE and CE
  • Verifying the Configuration of Inter-AS IPv6 VPN-Option C (Solution 1)
  • Configuring Inter-AS IPv6 VPN-Option C (Solution 2)
  • Establishing an EBGP Peer Relationship Between ASBRs
  • Advertising the Routes of a PE in the Local AS to the Remote PE
  • Enabling the Capability of Exchanging Labeled IPv4 Routes
  • Establishing an LDP LSP for the Labeled BGP Routes of the Public Network
  • Establishing an MP-EBGP Peer Relationship Between PEs
  • Configuring Route Exchange Between PEs and CEs
  • Verifying the Configuration of Inter-AS IPv6 VPN Option C (Solution 2)
  • Configuring Carrier's Carrier
  • Configuring Level 1 Carrier CE to Access the Level 1 Carrier PE (Intra-AS)
  • Configuring Level 1 Carrier CE to Access Level 1 Carrier PE (Inter-AS)
  • Configuring the Level 2 Carrier's Customer to Access the Level 2 Carrier PE
  • Configuring External Route Exchanges Between Level 2 Carrier PEs
  • Verifying the Configuration of Carrier's Carrier
  • Configuring an MCE (IPv6)
  • Configuring a Routing Protocol on an MCE
  • Configuring a Routing Protocol on the PE Connected to the MCE
  • Verifying the MCE (IPv6) Configuration
  • Configuring Load Balancing Among IPv6 VPN Routes on the Backbone Network
  • Configuring IPv6 Route Import Between Instances
  • Configuring IPv6 Route Import Between VPN and Public Network Instances
  • Configuring IPv6 Route Import Between VPN Instances
  • Verifying the Configuration of IPv6 Route Import Between Instances
  • Configuring VPNv6 FRR
  • Configuring Private Network IPv6 FRR
  • Configuring IPv6+VPNv6 Hybrid FRR
  • Configuring VPN GR Helper (IPv6)
  • Configuring IGP GR Helper on the Backbone Network
  • Configuring MPLS GR Helper on the Backbone Network
  • Configuring GR Helper of the Routing Protocol Between PEs and CEs
  • Configuring BGP GR Helper for MP-BGP
  • Verifying the VPN GR Helper Configuration
  • Configuring IPv6 Route Recursion to Remotely Leaked VPN Routes
  • Maintaining BGP/MPLS IPv6 VPN
  • Monitoring the Running Status of a BGP/MPLS IPv6 VPN
  • Checking Network Connectivity and Reachability
  • Checking Route Statistics of a VPN Instance IPv6 Address Family
  • Clearing BGP Statistics of a VPN Instance IPv6 Address Family
  • Checking Queue Rate Statistics in a VPN Instance
  • Resetting BGP Connections
  • Configuration Examples for BGP/MPLS IPv6 VPN
  • Example for Configuring a Basic BGP/MPLS IPv6 VPN
  • Example for Configuring Hub and Spoke (IPv6)
  • Example for Configuring BGP4+ AS Number Substitution
  • Example for Configuring Load Balancing Among IPv6 VPN Routes
  • Example for Configuring Load Balancing Among Tunnels to Which Remotely Leaked IPv6 VPN Routes Recurse
  • Example for Configuring Inter-AS IPv6 VPN Option A
  • Example for Configuring Inter-AS IPv6 VPN Option B
  • Example for Configuring Inter-AS IPv6 VPN Option C (Solution 1)
  • Example for Configuring Inter-AS IPv6 VPN Option C (Solution 2)
  • Example for Configuring Carrier's Carrier in the Same AS
  • Example for Configuring the Carrier's Carrier (Inter-AS)
  • Example for Configuring an MCE (IPv6)
  • Example for Configuring VPNv6 FRR
  • Example for Configuring Private Network IPv6 FRR
  • Example for Configuring Hybrid FRR for IPv6 and VPNv6 Routes
  • Example for Configuring an RR on an IPv6 VPN
  • Example for Configuring 6VPE
  • Example for Configuring Basic VPN Dual-Stack Access
  • VPWS Configuration
  • Overview of VPWS
  • Configuration Precautions for VPWS
  • Configuring CCC VPWS
  • Creating a Local CCC Connection
  • Creating a Remote CCC Connection
  • Verifying the CCC VPWS Configuration
  • Configuring LDP VPWS
  • (Optional) Configuring Flow Label-based Load Balancing
  • (Optional) Configuring a PW Template
  • Configuring a VPWS PW
  • Configuring VPWS IP Interworking
  • (Optional) Configuring a Secondary VPWS PW
  • (Optional) Configuring the Revertive Switchover
  • Verifying the LDP VPWS Configuration
  • Configuring BGP VPWS
  • Configuring a Local BGP VPWS Connection
  • Configuring a Remote BGP VPWS Connection
  • Verifying the BGP VPWS Configuration
  • Configuring SVC VPWS
  • (Optional) Configuring Flow Label-based Load Balancing
  • (Optional) Configuring a PW Template
  • Configuring a VPWS PW
  • Configuring VPWS IP Interworking
  • (Optional) Configuring a Secondary PW
  • (Optional) Disabling the PW Source Interface Check Function
  • Verifying the SVC VPWS Configuration
  • Configuring Inter-AS VPWS
  • Configuring Inter-AS LDP VPWS Option A
  • Configuring Inter-AS LDP VPWS Option C
  • Configuring Inter-AS BGP VPWS Option A
  • Configuring Inter-AS BGP VPWS Option C
  • Verifying the Inter-AS VPWS Configuration
  • Configuring VPWS Switching
  • Configuring PW Redundancy
  • Configuring the Master/Slave Mode of PW Redundancy
  • Configuring the Independent PW Redundancy Mode
  • Configuring PW Status Negotiation
  • Binding Service PWs to an mPW
  • Configuring BFD for VPWS PW
  • (Optional) Configuring a switching delay for the PW switching
  • Verifying the PW Redundancy Configuration
  • Configuring Mutual Protection Between an LDP VC and a CCC VC
  • Configuring BGP VPWS FRR
  • Configuring Primary and Secondary PWs
  • (Optional) Configuring BFD for PW
  • (Optional) Configuring Fast Fault Notification
  • Verifying the BGP VPWS FRR Configuration
  • Configuring Static PW FRR
  • Configuring Primary and Secondary SVC PWs
  • Configuring Dynamic BFD for SVC PW
  • (Optional) Configuring a Revertive Switching Policy
  • Verifying the Static PW FRR Configuration
  • Configuring BFD for VPWS PW
  • Configuring PW APS
  • Configuring a PW Protection Group
  • Configuring a PW APS Instance and Bind a PW Protection Group to the PW APS Instance
  • Configuring PW OAM to Detect Public Network Link Faults
  • (Optional) Configuring PW APS Parameters
  • Verifying the PW APS Configuration
  • Configuring E-PW APS
  • Configuring a PW Protection Group
  • Configuring a PW APS Instance and Bind a PW Protection Group to the PW APS Instance
  • Configuring PW OAM to Detect Public Network Link Faults
  • (Optional) Configuring PW APS Parameters
  • Configuring AC Dual-Homing Protection
  • Checking the Configurations
  • Configuring MS-PW Redundancy When a PE Is Single-Homed to an SPE
  • Configuring Service PWs
  • Verifying the Configuration of MS-PW Redundancy When a PE Is Single-Homed to an SPE
  • Configuring Physical Layer Fault Notification
  • Configuring VPWS Load Balancing
  • Configuring the Function to Collect VPWS PW Traffic Statistics
  • Maintaining VPWS
  • Resetting VPWS PWs
  • Monitoring the Operating Status of a VPWS PW
  • Using Ping to Check PW Connectivity
  • Configuration Examples for VPWS
  • Example for Configuring a Local CCC
  • Example for Configuring Remote CCC Connections
  • Example for Configuring Mutual Protection Between a CCC VC and an LDP VC (Single-Homing 2PE Scenario)
  • Example for Configuring Mutual Protection Between a CCC VC and an LDP VC (Dual-Homing 2PE Scenario)
  • Example for Configuring Mutual Protection Between a CCC VC and an LDP VC (Dual-Homing 3PE Scenario)
  • Example for Configuring a Dynamic VPWS SS-PW Using an LSP
  • Example for Configuring a Dynamic VPWS SS-PW Using a TE Tunnel
  • Example for Configuring a Dynamic VPWS SS-PW over an SRv6 TE Policy
  • Example for Configuring SVC VPWS
  • Example for Configuring Inter-AS LDP VPWS Option A
  • Example for Configuring Inter-AS LDP VPWS Option C
  • Example for Configuring Dynamic VPWS Switching
  • Example for Configuring BFD for VPWS PW
  • Example for Configuring a Local BGP VPWS Connection
  • Example for Configuring a Remote BGP VPWS Connection
  • Example for Configuring Inter-AS BGP VPWS Option A
  • Example for Configuring Inter-AS BGP VPWS Option C
  • Example for Configuring BGP VPWS FRR - Symmetric Access of CEs to PEs
  • Example for Configuring BGP VPWS FRR - Asymmetric Access of CEs to PEs
  • Example for Configuring 3PE PW Redundancy When CEs Are Asymmetrically Connected to PEs on Mobile Bearer Networks
  • Example for Associating E-VRRP with 4PE PW Redundancy
  • Example for Configuring Static PW FRR
  • Example for Configuring E-PW APS for Static SS-PWs
  • Example for Configuring PW APS for Static MS-PWs
  • Example for Configuring E-PW APS for Dynamic SS-PWs
  • Example for Configuring PW APS for Dynamic MS-PWs
  • Example for Configuring MS-PW Redundancy When a PE Is Single-Homed to an SPE Through PWE3
  • IP Hard Pipe Configuration
  • Overview of IP Hard Pipe
  • Configuration Precautions for IP Hard Pipe
  • Configuring IP Hard Pipe
  • Configuring Interface-based Hard Pipe Bandwidth Reservation
  • Configuring a Static Bidirectional Co-Routed CR-LSP as a Public Network CR-LSP over Which an IP Hard Pipe Is Established
  • Configuring a Hard-Pipe VPWS PW
  • Configuring a Hard-Pipe VPLS PW
  • (Optional) Configuring an Alarm Threshold for the Outbound Bandwidth Usage of the Soft Pipe
  • Verifying the IP Hard Pipe Configuration
  • Maintaining IP Hard Pipe
  • Clearing IP Hard Pipe Statistics
  • Clearing Hard Pipe Statistics for a VPLS
  • Configuration Examples for IP Hard Pipe
  • Exampling for Configuring a Hard-Pipe Static SS-PW
  • Exampling for Configuring a Hard-Pipe Static MS-PW
  • Example for Configuring Hard-Pipe Static PWs of a VPLS
  • VPLS Configuration
  • Overview of VPLS
  • Configuration Precautions for VPLS
  • Configuring Proactive Loop Detection upon Interface Up
  • Configuring Static VPLS
  • Creating a VSI and Configuring PWs
  • Binding a VSI to an AC Interface
  • (Optional) Configuring a VSI to Ignore the AC Status
  • (Optional) Configuring VSI PW-based Traffic Suppression
  • (Optional) Disabling the PW Source Interface Check Function
  • Verifying the Static VPLS Configuration
  • Configuring LDP VPLS
  • (Optional) Configuring Flow Label-based Load Balancing
  • Creating a VSI and Configuring LDP Signaling
  • Binding a VSI to an AC Interface
  • (Optional) Configuring a VSI to Ignore the AC Status
  • (Optional) Enabling VPLS LDP Fast Switch
  • (Optional) Configuring BFD for VPLS PW
  • Verifying the LDP VPLS Configuration
  • Configuring BGP VPLS
  • Configuring PEs to Exchange VPLS Information as BGP Peers
  • Configuring a VSI and BGP Signaling
  • (Optional) Configuring Flow Label-based Load Balancing
  • (Optional) Configuring a Huawei Device to Communicate with a Non-Huawei Device
  • Binding an AC Interface to a VSI
  • Verifying the BGP VPLS Configuration
  • Configuring LDP HVPLS
  • Configuring VPLS Between an SPE and a UPE
  • Configuring VPLS Between SPEs
  • (Optional) Changing the MAC Address Update Speed on an HVPLS Network
  • Verifying the LDP HVPLS Configuration
  • Configuring a Local VPLS Connection
  • Configuring Loop Detection of ACs in a VPLS Network
  • Enabling Loop Detection Globally
  • Configuring Loop Detection
  • (Optional) Configuring the VLAN Range for Loop Detection Packets Sent by a Sub-interface for VLAN Tag Termination
  • Verifying the Configuration
  • Configuring VPLS Interworking
  • Configuring Interworking Between LDP VPLS and BGP AD VPLS
  • Configuring Interworking Between LDP VPLS and BGP VPLS
  • Verifying the VPLS Interworking Configuration
  • Configuring Inter-AS VPLS
  • Configuring Inter-AS LDP VPLS Option A
  • Configuring Inter-AS LDP VPLS Option C
  • Configuring Inter-AS BGP VPLS Option A
  • Configuring Inter-AS BGP VPLS in Option B Mode
  • Configuring Inter-AS BGP VPLS Option C
  • Configuring Inter-AS L2VPN Option C (with RRs Deployed)
  • Configuring Inter-AS BGP AD VPLS Option A
  • Configuring Inter-AS BGP AD VPLS Option C
  • Verifying the Inter-AS VPLS Configuration
  • Configuring VPWS Accessing VPLS
  • Configuring Static VPWS Accessing VPLS
  • Configuring Dynamic VPWS Accessing VPLS
  • Verifying the Configuration of VPWS accessing VPLS
  • Configuring VSI-based MAC Address Management
  • Enabling MAC Address Learning
  • Configuring MAC Address Entries
  • Configuring MAC Address Safety
  • Configuring the Function of Clearing the MAC Addresses of Specific PWs
  • Configuring Delayed Resending of a MAC-Withdraw Message
  • Verifying the Configuration of VSI-based MAC Address Management
  • Configuring an L2VPN Monitoring Group
  • Configuring Static BFD to Detect the Connectivity of a VPLS SS-PW
  • Configuring Multicast Fast Switch in a VPLS over TE Scenario
  • Configuring VPLS PW Redundancy
  • Configuring a PW
  • Adding PWs to a PW Protection Group
  • (Optional) Associating the Spoke PW Status with Hub PW Status
  • (Optional) Configuring BFD for PW
  • (Optional) Manually Switching PWs in a PW Protection Group
  • Verifying the VPLS PW Redundancy Configuration
  • Configuring BGP AD VPLS
  • Enabling BGP Peers to Exchange Route Information
  • Creating VSIs and Configuring BGP Signaling
  • Binding a VSI to an AC Interface
  • Verifying the BGP AD VPLS Configuration
  • Configuring Multicast VPLS
  • Configuring a Single-Root mLDP P2MP Tunnel
  • Configuring mLDP P2MP Tunnels with Dual-Root Protection
  • Configuring a Single-Root P2MP TE Tunnel
  • Configuring P2MP TE Tunnels with Dual-Root Protection
  • Verifying the Multicast VPLS Configuration
  • Configuring VPLS Multi-Homing
  • Configuring PEs to Exchange VPLS Information as BGP Peers
  • Creating a VPLS Connection
  • Binding a Multi-homing Site to an AC Interface
  • Verifying the VPLS Multi-Homing Configuration
  • Configuring VPLS E-Tree
  • Configuring OAM Mapping
  • Configuring Public-Network-and-Private-Network Decoupling for VPLS
  • Maintaining VPLS
  • Collecting the Traffic Statistics of a VPLS PW
  • Checking the Traffic Statistics of a VPLS PW
  • Clearing the Traffic Statistics of a VPLS PW
  • Monitoring the Running Status of VPLS
  • Using PW Ping to Check PW Connectivity on a VPLS Network
  • Configuration Examples for VPLS
  • Example for Configuring Static VPLS
  • Example for Configuring LDP VPLS
  • Example for Configuring BGP VPLS
  • Example for Configuring Interworking Between LDP VPLS and BGP VPLS
  • Example for Configuring Inter-AS LDP VPLS Option A
  • Example for Configuring Inter-AS LDP VPLS Option C
  • Example for Configuring Inter-AS BGP VPLS Option A
  • Example for Configuring Inter-AS BGP VPLS in Option B Mode
  • Example for Configuring Inter-AS BGP VPLS in Option B Mode (ASBRs Functioning as PEs)
  • Example for Configuring Inter-AS BGP VPLS Option C
  • Example for Configuring Inter-AS BGP AD VPLS Option A
  • Example for Configuring Inter-AS BGP AD VPLS Option C
  • Example for Configuring LDP VPLS over TE (LDP)
  • Example for Configuring LDP VPLS over SR-MPLS TE
  • Example for Configuring LDP HVPLS
  • Example for Configuring a Local VPLS Connection
  • Example for Configuring Dynamic VPWS Accessing VPLS
  • Example for Configuring Loop Detection on the VPLS Access Side (CE Dual-Homing)
  • Example for Configuring Static VPWS Accessing VPLS
  • Example for Configuring VPLS PW Redundancy in an HVPLS Scenario
  • Example for Configuring BGP AD VPLS
  • Example for Configuring Interworking Between LDP VPLS and BGP AD VPLS in HVPLS Mode
  • Example for Configuring Interworking Between LDP VPLS and BGP AD VPLS in PW Redundancy Mode
  • Example for Configuring a Single-Root mLDP P2MP Tunnel
  • Example for Configuring mLDP P2MP Tunnels with Dual-Root Protection
  • Example for Configuring a Single-Root P2MP TE Tunnel
  • Example for Configuring P2MP TE Tunnels with Dual-root Protection
  • Example for Configuring P2MP TE Tunnels to Carry Services (Dual-node Protection of VPLS Multi-homing)
  • Example for Configuring VPLS Multi-homing
  • Example for Configuring OAM Mapping
  • Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs Through VLANIF Interfaces
  • Example for Configuring ERPS over VPLS in Scenarios Where a CE Is Dual-Homed to PEs Through Ethernet Sub-interfaces
  • Example for Configuring VPLS E-Tree
  • L2VPN Accessing L3VPN Configuration
  • Overview of L2VPN Accessing L3VPN
  • Configuration Precautions for L2VPN Accessing L3VPN
  • Configuring a VPWS to Access the Public Network or an L3VPN
  • Creating VE Interfaces
  • Creating an L2VE Interface
  • Creating an L3VE Interface
  • (Optional) Configuring the MAC Addresses of the L2VE Interface and the L3VE Interface
  • Associating an L2VE Interface with a VPWS
  • (Optional) Configuring PW APS
  • Configuring the Access to the Public Network or L3VPN
  • Verifying the Configuration of a VPWS to Access the Public Network or an L3VPN
  • Configuring a VPLS to Access the Public Network or an L3VPN
  • Creating VE Interfaces
  • Creating an L2VE Interface
  • Creating an L3VE Interface
  • (Optional) Configuring the MAC Addresses of the L2VE interface and the L3VE interface
  • Binding a VSI to the L2VE Interface
  • Configuring the Access to the Public Network or an L3VPN
  • Verifying the Configuration of a VPLS to Access the Public Network or an L3VPN
  • Configuring an L2VPN to Access Multiple L3VPNs Through Sub-interfaces for VLAN Tag Termination
  • Creating VE Interfaces
  • Binding the L2VE to VPWS or VSI
  • Creating the L3VE Sub-interface Terminated by Dot1q
  • Creating the L3VE Sub-interface Terminated by QinQ
  • Verifying the Configuration of an L2VPN to Access Multiple L3VPNs Through Sub-interfaces for VLAN Tag Termination
  • Associating the VPWS PW Status with the VPNv4 Route Status
  • Associating the VPWS PW Status with the VPNv6 Route Status
  • Configuration Examples for L2VPN Accessing L3VPN
  • Example for Configuring a Local CCC to Access an L3VPN
  • Example for Configuring the Access of LDP VPWS to the Public Network
  • Example for Configuring an LDP VPWS on a Global-VE Interface to Connected to a Public Network
  • Example for Configuring VPLS Accessing L3VPN (IP RAN Scenario)
  • Example for Configuring the Access of PW Redundancy in Independent Mode to L3VPN (IP RAN Scenario)
  • Example for Configuring PW APS-protected Static VPWS SS-PW Accessing L3VPN (IP RAN Scenario)
  • Example for Configuring an L2VPN to Access L3VPNs Through Sub-interfaces for QinQ Termination
  • EVPN Configuration
  • Overview of EVPN
  • Configuration Precautions for EVPN
  • Activating EVPN Interface Licenses on a Board
  • Configuring Common EVPN Functions
  • Configuring an EVPN Instance
  • Configuring an EVPN Source Address
  • Binding an Interface to an EVPN Instance
  • Configuring an ESI
  • Establishing a BGP EVPN Peer Relationships
  • (Optional) Configuring the Global Redundancy Mode
  • (Optional) Configuring a BGP EVPN RR
  • (Optional) Setting a Redundancy Mode and DF Priority per ESI Instance
  • (Optional) Associating DF with BFD
  • (Optional) Improving the switching performance of broadcast traffic if the master board fails
  • Verifying the EVPN Configuration
  • Configuring BD-EVPN Functions
  • Configuring an EVPN Instance in BD Mode
  • Configuring an EVPN Source Address
  • Configuring an ESI
  • Configuring a BD and Binding an EVPN Instance to the BD
  • Creating an L3VPN Instance and Binding It to a VBDIF Interface
  • Configuring an EVPN BGP Peer Relationship
  • (Optional) Configuring the Global Redundancy Mode
  • (Optional) Setting a Redundancy Mode and DF Priority per ESI Instance
  • (Optional) Configuring a BGP EVPN RR
  • (Optional) Configuring Proxy ARP
  • Checking the Configurations
  • Configuring EVPN VPLS over SRv6 BE
  • Configuring EVPN VPLS over SRv6 TE Policy
  • Configuring EVPN VPWS over MPLS Functions
  • Configuring EVPN Functions
  • (Optional) Configuring the Global Redundancy Mode
  • Configuring an EVPL Instance
  • Configuring an AC Interface
  • Configuring an MPLS LDP Tunnel
  • (Optional) Configuring a DF Election Mode for EVPN VPWS
  • (Optional) Setting a Redundancy Mode and DF Priority per ESI Instance
  • (Optional) Configuring FRR
  • Verifying the Configuration
  • Configuring EVPN VPWS over SRv6 BE
  • Configuring EVPN VPWS over SRv6 TE Policy
  • Configuring EVPN VPWS over MPLS/EVPN VPWS over SRv6 Dual-Stack Tunnels
  • Configuring an EVPN to Carry Layer 3 Services
  • Configuring an L3VPN Instance
  • Configuring BGP EVPN Peer Relationships
  • Configuring Route Exchange Between a PE and an Access-side Device
  • (Optional) Re-Encapsulating IRB (v6) Routes into the desired Routes
  • Verifying the Configuration of an EVPN to Carry Layer 3 Services
  • Configuring EVPN L3VPN over SRv6 BE
  • Configuring EVPN L3VPNv4 over SRv6 TE Policy
  • Configuring EVPN L3VPNv6 over SRv6 TE Policy
  • Configuring Interworking Between a Common L3VPN and an EVPN L3VPN
  • Configuring Interworking Between a VPLS in PW Redundancy Mode and an Anycast VXLAN in an EVPN Active-Active Scenario
  • Configuring EVPN E-LAN over mLDP P2MP Tunnels
  • Configuring an EVPN Route-Policy
  • Configuring BGP EVPN Soft Reset
  • Configuring VLAN-based DF Election
  • Configuring EVPN Reliability Functions
  • Configuring MAC Duplication Suppression for EVPN
  • Configuring EVPN E-Tree
  • Configuring EVPN ORF
  • Setting a Delay in Releasing an Obtained Label in a BGP EVPN FRR Switchover Scenario
  • Configuring EVPN Route Flapping Suppression
  • Configuring EVPN Recursion Suppression in Case of Next Hop Flapping
  • Configuring EVPN to Advertise UMR Routes
  • Configuring Interworking Between a VLL and a Common EVPN E-LAN
  • Configuring Interworking Between a VLL and an MPLS EVPN E-Line
  • Configuring Interworking Between VPLS and MPLS EVPN E-LAN
  • Configuring Interworking Between VPLS and EVPN VPLS over SRv6
  • Configuring the Co-Existence of VPLS and EVPN VPLS over SRv6
  • Configuring EVPN E-LAN Accessing L3VPN
  • Creating an L2VE Interface
  • Creating an L3VE Interface
  • (Optional) Configuring MAC Addresses for L2VE and L3VE Interfaces
  • Adding an L2VE Interface to a BD
  • Associating an L3VE Interface with a VPN Instance
  • Verifying the Configuration of EVPN E-LAN Accessing L3VPN
  • Configuring EVPN HVPN to Carry Layer 2 Services
  • Configuring Interworking Between MPLS EVPN and Static VXLAN
  • Configuring Interworking Between a VXLAN EVPN and a VPLS
  • Creating VSIs and Configuring PW Connections
  • Configuring a VXLAN EVPN
  • Establishing BGP Peer Relationships
  • Binding EVPN Instances and VSIs to BDs
  • (Optional) Configuring BFD for VPLS PW
  • Verifying the Configuration of Interworking Between a VXLAN EVPN and a VPLS
  • Configuring MPLS EVPN E-LAN Option B
  • Configuring MP-IBGP Between a PE and an ASBR in the Same AS
  • Configuring MP-EBGP Between ASBRs in Different ASs
  • Configuring ASBRs Not to Filter EVPN Routes Based on VPN Targets
  • (Optional) Configuring One-Label-per-Next-Hop Label Distribution on an ASBR
  • (Optional) Configuring the Protection Switching Function
  • (Optional) Configuring BGP-EVPN Route Reflection on an ASBR
  • Verifying the Configuration MPLS EVPN E-LAN Option B
  • Configuring Interworking Between EVPN L3VPN over SRv6 BE and L3VPN over MPLS in Option B Mode
  • Configuring Route Import Across Address Families
  • Configuring a Tunnel Selector
  • (Optional) Enabling ECMP or FRR
  • Verifying the Configuration
  • Configuring an EVPN L3VPN HVPN over MPLS
  • Configuring an EVPN L3VPN HoVPN over MPLS
  • Configuring an EVPN L3VPN H-VPN over MPLS
  • Configuring Interworking Between an EVPN L3VPN HoVPN over MPLS with a Common L3VPN
  • Configuring Interworking Between an L3VPN HoVPN and an EVPN L3VPN over MPLS
  • Verifying the EVPN L3VPN HVPN over MPLS Configuration
  • Configuring EVPN L3VPN HoVPN over SRv6
  • Configuring Interworking Between an L3VPN HoVPN and an EVPN L3VPN over SRv6
  • Configuring IGMP Snooping over EVPN MPLS
  • Configuring IGMP Snooping and Proxy
  • Configuring the Access Side
  • Verifying the Configuration
  • Configuring Interworking Between an EVPN L3VPN over SRv6 and a Common L3VPN over MPLS
  • Configuring a Border Leaf Node to Provide Interworking Between EVPN L3VPN over SRv6 TE Policy and Common L3VPN over MPLS
  • Configuring EVPN VPLS over SRv6 Access to Each BRAS
  • Creating an L2VE Interface
  • Creating an L3VE Interface
  • (Optional) Configuring MAC Addresses for the L2VE and L3VE Interfaces
  • Associating an L2VE Interface with a BD
  • Configuring an L3VE Interface as a BAS Interface
  • Verifying the Configuration of Configuring EVPN VPLS over SRv6 Access to BRASs
  • Configuring EVPN VPWS over MPLS Accessing BRAS (VRRP Determining the Master/Backup Status Not Used)
  • Creating an L2VE Interface
  • Creating an L3VE Interface
  • (Optional) Configuring MAC Addresses for L2VE and L3VE Interfaces
  • Associating an L2VE Interface with an EVPL Instance
  • Configuring an L3VE Interface as a BAS Interface
  • Verifying the Configuration
  • Configuring EVPN VPWS Accessing BRAS (with VRRP Determining the Master/Backup Status)
  • Creating an L2VE Interface
  • Creating an L3VE Interface
  • (Optional) Configuring MAC Addresses for L2VE and L3VE Interfaces
  • Associating an L2VE Interface with an EVPL Instance
  • Associating an EVPL Instance with VRRP
  • Configuring an L3VE Interface as a BAS Interface
  • Verifying the Configuration
  • Configuring EVPN VPWS Accessing L3VPN (with VRRP Determining the Master/Backup Status)
  • Creating an L2VE Interface
  • Creating an L3VE Interface
  • Associating an L2VE Interface with an EVPL Instance
  • Associating an EVPL Instance with VRRP
  • Associating an L3VE Interface with a VPN Instance
  • Verifying the Configuration
  • Configuring the Evolution from VPWS Accessing L3VPN over MPLS to VPWS Accessing EVPN over SRv6
  • Configuring Dual-Stack Protocol-based Evolution
  • Configuring Route Regeneration-based Evolution
  • Verifying the Configuration
  • Configuring DCI Functions
  • Configuring E2E VXLAN EVPN in a DCI scenario with Gateways Deployed
  • Configuring a DCI Scenario with a VLAN Layer 3 Sub-interface Accessing a Common L3VPN
  • Configuring a DCI Scenario with a VXLAN EVPN L3VPN Accessing a Common L3VPN
  • Configuring a DCI Scenario with a VLAN Base Accessing an MPLS EVPN IRB
  • Configuring a DCI Scenario with VXLAN EVPN Accessing MPLS EVPN IRB
  • Verifying the Configuration of DCI Functions
  • Configuring the NFVI Distributed Gateway Function (SR Tunnels)
  • Configuring Route Recursion over SR Tunnels
  • Configuring Route Advertisement on DC-GWs
  • Configuring Route Advertisement on L2GW/L3GWs
  • (Optional) Configuring the Load Balancing Function
  • Verifying the Configurations of the NFVI Distributed Gateway Function
  • Configuring the NFVI Distributed Gateway Function (BGP VPNv4/VPNv6 over E2E SR Tunnels)
  • Configuring Route Recursion over SR Tunnels
  • Configuring Route Advertisement on PEs
  • Configuring Route Advertisement on DC-GWs
  • Configuring Route Advertisement on L2GW/L3GWs
  • Configuring the Load Balancing Function
  • Verifying the Configurations of the NFVI DistributedGateway Function
  • Configuring the NFVI Distributed Gateway Function (BGP EVPN over E2E SR Tunnels)
  • Configuring Route Recursion over SR Tunnels
  • Configuring Route Advertisement on PEs
  • Configuring Route Advertisement on DC-GWs
  • Configuring Route Advertisement on L2GW/L3GWs
  • Configuring the Load Balancing Function
  • Verifying the Configurations of the NFVI DistributedGateway Function
  • Configuring EVPN in Ring Network Access Mode
  • Configuring Ring Network Topology Isolation
  • Configuring Ring Network Access
  • Verifying the Configuration
  • Configuration Examples for EVPN
  • Example for Configuring Eth-Trunk Sub-interfaces to Access a BD EVPN (Dual-Homing Active-Active)
  • Example for Configuring an Eth-Trunk Sub-Interface to Access a BD EVPN (Dual-Homing Single-Active)
  • Example for Configuring a Dual-Homing Single-Active BD EVPN (Active/Standby Status Determined by DF Election)
  • Example for Configuring EVPN VPWS over MPLS (Dual-Homing Active-Active)
  • Example for Configuring EVPN VPWS over MPLS (Dual-Homing Single-Active)
  • Example for Configuring Dual-Homing Single-Active EVPN VPWS over MPLS (Active/Standby Status Determined by the DF Election Result)
  • Example for Setting a Redundancy Mode per ESI Instance
  • Example for Configuring EVPN E-Tree
  • Example for Configuring EVPN ORF
  • Example for Configuring EVPN to Advertise UMRs
  • Example for Configuring a DCI Scenario with an E2E VXLAN EVPN Deployed
  • Example for Configuring a DCI Scenario with a VXLAN EVPN L3VPN Accessing a Common L3VPN