Configuration Guide - Device Management (V200R001C01 - 01) PDF
Configuration Guide - Device Management (V200R001C01 - 01) PDF
Configuration Guide - Device Management (V200R001C01 - 01) PDF
V200R001C01
Issue 01
Date 2012-01-06
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: [email protected]
Intended Audience
This document provides the basic concepts, configuration procedures, and configuration
examples in different application scenarios of the device management feature supported by the
AR2200-S.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description
&<1-n> The parameter before the & sign can be repeated 1 to n times.
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Contents
3 Mirroring Configuration............................................................................................................49
3.1 Introduction to Mirroring..................................................................................................................................50
3.2 Mirroring Features Supported by the AR2200-S.............................................................................................50
3.3 Configuring Local Port Mirroring....................................................................................................................52
3.3.1 Establishing the Configuration Task.......................................................................................................52
3.3.2 Configuring a Local Observing Interface................................................................................................53
3.3.3 Configuring a Local Mirrored Interface..................................................................................................53
3.3.4 Checking the Configuration.....................................................................................................................54
3.4 Configuring Local Flow Mirroring...................................................................................................................55
3.4.1 Establishing the Configuration Task.......................................................................................................55
3.4.2 Configuring a Local Observing Interface................................................................................................55
3.4.3 Configuring Complex Traffic Classification...........................................................................................56
3.4.4 Creating a Local Traffic Behavior...........................................................................................................56
3.4.5 Configuring a Traffic Policy....................................................................................................................57
3.4.6 Checking the Configuration.....................................................................................................................57
3.5 Configuring Packet Capture Using Mirroring..................................................................................................58
3.6 Configuration Examples...................................................................................................................................61
4 Hardware Management..............................................................................................................68
4.1 Introduction to Hardware Management............................................................................................................69
4.2 Hardware Management Supported by the AR2200-S......................................................................................69
4.3 Powering On and Off the Board.......................................................................................................................69
4.3.1 Establishing the Configuration Task.......................................................................................................69
4.3.2 Powering Off a Board..............................................................................................................................70
4.3.3 Powering On a Board..............................................................................................................................70
4.3.4 Checking the Configuration.....................................................................................................................70
4.4 Backing Up Electronic Labels..........................................................................................................................71
4.4.1 Establishing the Configuration Task.......................................................................................................71
4.4.2 Backing Up Electronic Labels.................................................................................................................71
4.5 Setting Fan Speed.............................................................................................................................................72
4.5.1 Establishing the Configuration Task.......................................................................................................72
4.5.2 Setting Fan Speed....................................................................................................................................73
4.5.3 Checking the Configuration.....................................................................................................................73
4.6 Resetting the LPU.............................................................................................................................................73
4.6.1 Establishing the Configuration Task.......................................................................................................74
4.6.2 Resetting the LPU....................................................................................................................................74
4.6.3 Checking the Configuration.....................................................................................................................74
5 Auto-Config..................................................................................................................................76
5.1 Auto-Config Overview.....................................................................................................................................77
5.2 Auto-Config Features Supported by the AR2200-S.........................................................................................77
5.3 Deploying Unconfigured Routers ....................................................................................................................82
5.3.1 Establishing the Configuration Task.......................................................................................................82
5.3.2 Configuring the DHCP Server.................................................................................................................84
5.3.3 Configuring the FTP/TFTP Server..........................................................................................................86
5.3.4 Checking the Configuration.....................................................................................................................87
5.4 Configuration Examples...................................................................................................................................88
5.4.1 Example for Configuring the Auto-Config Function..............................................................................88
This chapter describes the functions and applications of the display commands and how to use
them to view the running status of the device.
CAUTION
The display diagnostic-information command cannot be simultaneously run on multiple
terminals connected to the AR2200-S. If this occurs, the AR2200-S CPU usage rises and the
network performs less efficiently.
display current-configuration Displays the parameters that take effect currently on the
AR2200-S.
Procedure
l Run:
display device [ slot slot-id ]
Procedure
l Run:
display version [ slot slot-id ]
Procedure
Step 1 Run:
display power
----End
Procedure
l Run:
display temperature { all | slot slot-id }
Procedure
l Run:
display fan
Procedure
Step 1 Run:
display cpu-usage [ slot slot-id ]
----End
Procedure
l Run:
display memory-usage [ slot slot-id ]
– If slot slot-id is specified, the memory usage of the LPU in this slot is displayed.
– If slot slot-id is not specified, the memory usage of the active main control board is
displayed.
----End
Context
There are two ways to display interface status:
Procedure
l Run the following command in any view:
display interface interface-type interface-number
Using the display this interface command in the interface view is equivalent to using
the display interface interface-type interface-numbercommand in any view.
4. Run the display this command to display interface configurations.
----End
Procedure
Step 1 Run:
display elabel [ slot-id ] [ brief ]
This command can be used in any view. The slot-id parameter can be specified to view label
information about the board in a specified slot.
If the brief parameter is specified, the electronic label of an optical module is not displayed.
Step 2 Run:
display elabel backplane
----End
Procedure
l Run:
display diagnostic-information
CAUTION
When this command is being executed, system performance will be degraded, for example,
the CPU usage increases. Therefore, do not use this command when the system is operating
normally.
----End
Procedure
l Run:
display health
----End
Context
Only the work mode of the interface cards with configurable work modes can be displayed.
The work mode of these interface cards can be changed: 2E1/T1-M, 1E1/T1-M, 2E1/T1-F, 1E1/
T1-F, 4G.SHDSL, and 1CPOS-155M.
Procedure
Step 1 Run:
display workmode
----End
This chapter describes how to configure the information center to control the output of logs,
alarms, and debugging messages.
Information Classification
The information center receives and processes information of the following types:
l Logs
l Debugging information
l Alarms
When information filtering based on severity levels is enabled, only the information whose
severity level threshold is less than or equal to the configured value is output.
For example, if the severity level value is configured to 6, only information with a severity level
ranging from 0 to 6 is output.
Information Output
channel direction
0
Console Console
1
Logs Monitor Remote terminal
Loghost Loghost
Traps 2
Trapbuffer Trap buffer
3
Logbuffer Log buffer
4
Debugs
5 SNMP agent SNMP agent
6 channel6
For details of the association relationship between default channels and output directions, see
Table 2-2.
Table 2-2 Association relationship between default channels and output directions
4 Logbuffer Log buffer Outputs logs to the log buffer. The router
assigns a specified area to be the log buffer
for recording logs.
In the case of multiple log hosts, logs can be output through one channel or several channels.
For example, some logs can be output to a log host through Channel 2 (loghost) and some logs
can be output to another log host through Channel 6. For easy management, the name of Channel
6 can be changed.
Format of Logs
Syslog is a sub-function of the information center. It outputs information to a log host through
port 514.
Figure 2-2 shows the format of logs.
TIMESTAMP Time to send out the Available formats for the timestamp are as follows:
information l boot: The timestamp in this format indicates a
relative time.
l date: The timestamp in this format indicates the
system time. Timestamps in logs, alarms and
debugging information are in this format by
default.
l short-date: Unlike the date format, timestamps
in the short-date format do not indicate the year.
l format-date: The timestamp in this format is
another format of the system time.
l none: indicates that the information does not
contain any timestamp.
There is a space between the timestamp and the
host name.
AAA Module name Indicates the name of the module that outputs
information to the information center.
Format of Alarms
Figure 2-3 shows the format of the output alarms.
TimeStamp Time to send out the Available formats for the timestamp are as follows:
information l boot: The timestamp in this format indicates a
relative time.
l date: The timestamp in this format indicates the
system time. Timestamps in logs, alarms and
debugging information are in this format by
default.
l short-date: Unlike the date format, timestamps
in the short-date format do not indicate the year.
l format-date: The timestamp in this format is
another format of the system time.
l none: indicates that the information does not
contain a timestamp.
There is a space between the timestamp and the
host name.
ModuleName Module name Indicates the name of the module that generates an
alarm.
Applicable Environment
The system logs the operation information about devices in real time. It then outputs logs to the
log buffer, log file, console, terminal, and log host for storage and future reference. In this
manner, when faults occur on devices, users can locate the faults based on the logs.
Pre-configuration Tasks
Before configuring the log output, complete the following tasks:
l Connecting the router to the PC properly
l Ensuring that the route between the router and the log host is reachable
l Configuring an VPN instance
Data Preparation
To configure the log output, you need the following data.
No. Data
1 l Channel number
l Channel name
2 Module name
Context
The information center classifies and outputs information. When it is heavily loaded with
information processing, system performance degrades.
Procedure
Step 1 Run:
system-view
----End
Procedure
Step 1 Run:
system-view
A channel is named.
----End
Context
Binary logs provide the function of filtering specified logs by their IDs. To filter certain logs,
the user can obtain IDs of these logs through log resolution tools and add these IDs to the log
filtering list.
After that, the information center does not send these logs in each output direction.
Procedure
Step 1 Run:
system-view
One or more IDs are added and a space is used to separate these IDs.
NOTE
Currently, only 50 IDs can be shielded. The aggregation of these shielded IDs is called a log ID filtering
list. The log ID filtering list is arranged by ID values.
----End
Context
A data dictionary is used to transform binary logs into text logs. A data dictionary is the
aggregation of log IDs and fixed information required in the log, such as the level, mnemonic
symbol, and format string. The generated data dictionary is downloaded by the external
resolution tool.
Procedure
Step 1 Run:
system-view
Step 2 Run:
info-center create-logbook { file-name | ftp ftp-address user-name user-name
password password [ file-name file-name | port-id port-number ] * }
----End
Procedure
l Configure the channel through which logs are output.
1. Run the following command on the router enabled with the information center:
system-view
The channel through which logs are output to the log buffer is configured.
3. (Optional) Run:
info-center logbuffer [ channel { channel-number | channel-name } | size
buffersize ] *
After the information center is enabled, logs are output to the log buffer through
Channel 4 by default and the log buffer can cache a maximum of 512 logs.
----End
Context
NOTE
The system selects a storage medium in descending order of priority: sd0, sd1, usb0, and usb1. The default
log storage medium is sd0. If sd0 is unavailable, the default log storage medium is sd1. If none of sd0, sd1,
usb0, and usb1 is unavailable, the log files cannot be saved. The log storage path is in the format of storage
medium name:/logfile, for example, usb0:/logfile.
Procedure
Step 1 Send logs to a channel.
1. Run:
system-view
Step 2 Configure the channel through which logs are output to the log file.
1. Run:
info-center logfile channel { channel-number | channel-name }
The channel through which logs are output to the log file is configured.
Step 3 (Optional) Configure the size of the log file output by the information center.
1. Run:
info-center logfile size size
----End
Procedure
Step 1 Configure the logs to be output through the channel.
1. Do as follows on the router configured with the information center, run:
system-view
The channel through which logs are output to the Console is configured.
2. Run:
quit
----End
Procedure
Step 1 Configure the logs to be output through the channel.
1. Run:
system-view
Step 2 Configure the information channel through which logs are output to the terminal.
1. Run:
info-center monitor channel { channel-number | channel-name }
The information channel through which logs are output to the terminal is configured.
2. Run:
quit
----End
Procedure
Step 1 Configure the logs to be output through the channel.
1. Do as follows on the router configured with the information center, run:
system-view
The channel through which logs are output to the log host is configured.
By default, logs are not output to the log host after the information center is enabled.
The system supports the configuration of a maximum of eight log hosts to realize backup
among log hosts.
----End
Prerequisite
The configurations of the information center function are complete.
Procedure
l Run the display channel [ channel-number | channel-name ] command to check the
configuration of a channel.
l Run the display info-center [ statistics ] command to check the information recorded by
an information center.
l Run the display logbuffer command to view the information recorded by a log buffer.
l Run the display info-center filter-id { id } command to check whether the ID of a single
log is added into the filtering list.
l Run the display info-center filter-id command to check whether IDs of all logs are added
into the filtering list.
----End
Example
Run the display channel [ channel-number | channel-name ] command to check the contents of
information channels.
<Huawei> display channel
channel number: 0, channel name: console
MODU_ID NAME ENABLE LOG_LEVEL ENABLE TRAP_LEVEL ENABLE DEBUG_LEVEL
ffff0000 default Y warning Y debugging Y debugging
Run the display info-center command to check the contents of information center.
Information Center: enabled
Log host:
Console:
channel number: 0, channel name: console
Monitor:
channel number: 1, channel name: monitor
SNMP Agent:
channel number: 5, channel name: snmpagent
Log buffer:
enabled
max buffer size: 1024, current buffer size: 512
current messages: 6, channel number: 4, channel name: logbuffer
dropped messages: 0, overwritten messages: 0
Trap buffer:
enabled
max buffer size: 1024, current buffer size: 256
current messages: 0, channel number: 3, channel name: trapbuffer
dropped messages: 0, overwritten messages: 0
Logfile:
channel number: 9, channel name: channel9, language: English
Information timestamp setting:
log - date, trap - date, debug - date
Run the display logbuffer command to view the logs in the log buffer.
<Huawei> display logbuffer
Logging buffer configuration and contents: enabled
Allowed max buffer size: 1024
Actual buffer size: 512
Channel number: 4, Channel name: logcy
Dropped messages: 0
Overwritten messages: 0
Current messages: 1
Run the display info-center filter-id [ id ] command to check whether the log with the ID being
1098649600 is added into the filtering list.
<Huawei> display info-center filter-id 1098649600
ID : 1098649600
Content : LSPM return error to TE when processing tunnel commit event!
(TunnelName=[STRING], ErrorCode=[ULONG])
Filtered Number : 0
Run the display info-center filter-id command to check whether IDs of all logs are added into
the filtering list.
<Huawei> display info-center filter-id
ID: 3221442627
Content: The message was discarded because module batch doesn't begin. (
SourceModuleId=[ULONG], SourceModuleSubId=[ULONG], DestinationModuleId=[ULONG],
DestinationModuleSubId=[ULONG])
Filtered Number: 0
ID: 3491254537
Content: Add the route [STRING] that have other flags besides deleted fl
ag [USHORT]
Filtered Number: 0
Applicable Environment
The device can generate alarms in specific situations to draw attention of the administrators.
Alarms can be output to the alarm buffer, log file, Console, terminal, and Network Management
System (NMS), through which the administrator can easily locate and rectify the fault.
Pre-configuration Tasks
Before enabling alarm output, complete the following tasks:
Data Preparation
To configure alarm output, you need the following data.
No. Data
1 l Channel number
l Channel name
2 Module name
Context
Classifying and outputting a large amount of information degrades system performance.
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the router configured with the information center.
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the router configured with the information center:
Procedure
Step 1 Configure the alarms to be output through the channel.
1. Run:
system-view
The channel through which alarms are output to the alarm buffer is configured.
After the information center is enabled, alarms default to be output through Channel 3 to
the alarm buffer and the alarm buffer can contain 256 pieces of information.
----End
Context
Do as follows on the router configured with the information center:
Procedure
Step 1 Send logs to the channel.
1. Run:
system-view
For the alarm information, the state is on and the allowed information level is
debugging.
For the debugging information, the state is off.
Step 2 Configure the channel through which alarms are output to the log file.
1. Run:
info-center logfile channel { channel-number | channel-name }
The channel through which alarms are output to the log file is configured.
By default, alarms are output through Channel 9 to the log file after the information center
is enabled.
Step 3 (Optional) Configure the size of the log file output by the information center.
1. Run:
info-center logfile size size
----End
Context
Do as follows on the router configured with the information center:
Procedure
Step 1 Configure the alarms to be output through the channel.
1. Run:
system-view
The channel through which alarms are output to the Console is configured.
By default, alarms are output to the Console through Channel 0.
2. Run:
quit
----End
Context
Do as follows on the router configured with the information center:
Procedure
Step 1 Configure the alarms to be output through the channel.
1. Run:
system-view
The channel through which alarms are output to the VTY terminal is configured.
----End
Context
Do as follows on the router configured with the information center:
Procedure
Step 1 Configure the alarms to be output through the channel.
1. Run:
system-view
The channel through which alarms are output to the SNMP agent is configured.
By default, alarms are output to the SNMP agent through Channel 5.
2. Run:
snmp-agent
----End
Prerequisite
The configurations of the alarm output function are complete.
Procedure
l Run the display channel [ channel-number | channel-name ] command to check the
configuration of a channel.
l Run the display info-center [ statistics ] command to check the information recorded by
the information center.
l Run the display trapbuffer [ size value ] command to check the information recorded by
the alarm buffer.
----End
Example
Run the display channel command to show channels.
<Huawei> display channel
channel number: 0, channel name: console
MODU_ID NAME ENABLE LOG_LEVEL ENABLE TRAP_LEVEL ENABLE DEBUG_LEVEL
ffff0000 default Y warning Y debugging Y debugging
Run the display info-center command to show the data recorded by info-center.
<Huawei> display info-center
Information Center: enabled
Log host:
Console:
channel number: 0, channel name: console
Monitor:
channel number: 1, channel name: monitor
SNMP Agent:
channel number: 5, channel name: snmpagent
Log buffer:
enabled
max buffer size: 1024, current buffer size: 512
current messages: 6, channel number: 4, channel name: logbuffer
dropped messages: 0, overwritten messages: 0
Trap buffer:
enabled
max buffer size: 1024, current buffer size: 256
current messages: 0, channel number: 3, channel name: trapbuffer
dropped messages: 0, overwritten messages: 0
Logfile:
channel number: 9, channel name: channel9, language: English
Information timestamp setting:
log - date, trap - date, debug - date
Run the display trapbuffer command. If alarms in the alarm buffer are displayed, it means that
the configuration is successful.
<Huawei> display trapbuffer
Trapping buffer configuration and contents: enabled
Allowed max buffer size: 1024
Actual buffer size: 256
Channel number: 3, Channel name: trapbuffer
Dropped messages: 0
Overwritten messages: 713
Current messages: 1
Context
CAUTION
Debugging degrades system performance. Therefore, after debugging, run the undo debugging
all command to disable debugging immediately. When the CPU usage is close to 100%,
debugging ARP may cause boards to reset. So, confirm the action before you use the command.
Applicable Environment
When faults occur on a device, you can enable the information center to output debugging
information for easy faults location and analysis.
Pre-configuration Tasks
Before enabling the output of debugging information, complete the following tasks:
l Connecting the router and the PC correctly
l Configuring routes between the router and the log host
Data Preparation
To enable the output of debugging information, you need the following data.
No. Data
1 l Channel number
l Channel name
2 Module name
Context
Classifying and outputting a large amount of information degrades system performance.
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the router configured with the information center.
Procedure
Step 1 Run:
system-view
----End
Context
Do as follows on the router configured with the information center:
Procedure
Step 1 Configure debugging information to be output through the channel.
1. Run:
system-view
The channel through which debugging information is output to the log file is configured.
Step 3 (Optional) Configure the size of the log file output by the information center.
1. Run:
info-center logfile size size
By default, the debugging information is not saved in the log file. If you want the debugging
information to be saved in the log file, run the info-center source default channel 9
debug state on level severity command to add records to the information channel.
----End
Context
Do as follows on the router configured with the information center:
Procedure
Step 1 Configure debugging information to be output through the channel.
1. Run:
system-view
Step 2 Configure the channel through which debugging information is output to the console.
1. Run:
info-center console channel { channel-number | channel-name }
The channel through which debugging information is output to the console is configured.
2. Run:
quit
----End
Context
Do as follows on the router configured with the information center:
Procedure
Step 1 Configure debugging information to be output through the channel.
1. Run:
system-view
The channel through which debugging information is output to the terminal is configured.
2. Run:
quit
----End
Procedure
Step 1 Configure debugging information to be output through the channel.
1. Run:
system-view
The channel through which debugging information is output to the log host is configured.
By default, debugging information is not output to the log host after the information center
is enabled.
The system supports the configuration of a maximum of eight log hosts to realize backup
among log hosts.
----End
Prerequisite
The configurations of the debugging information function are complete.
Procedure
l Run the display channel [ channel-number | channel-name ] command to check the
configuration of a channel.
l Run the display info-center [ statistics ] command to check the information recorded by
an information center.
----End
Example
Run the display channel command. For example:
<Huawei> display channel 0
channel number: 0, channel name: console
MODU_ID NAME ENABLE LOG_LEVEL ENABLE TRAP_LEVEL ENABLE DEBUG_LEVEL
ffff0000 default Y warning Y debugging Y debugging
416e0000 ARP Y warning Y debugging Y debugging
Context
CAUTION
Statistics about the information center cannot be restored after being cleared. So, confirm the
action before you use the command.
Procedure
l To clear statistics about the information center, run the reset info-center statistics
command in the user view.
l To clear statistics about the log buffer, run the reset logbuffer command in the user view.
l To clear statistics about the alarm buffer, run the reset trapbuffer command in the user
view.
----End
Networking Requirements
As shown in Figure 2-4, Router A is required to transport logs to a File Transfer Protocol (FTP)
server. Maintenance engineers can easily obtain the operating status of Router A and locate any
faults occurring on it.
NOTE
The system selects a storage medium in descending order of priority: sd0, sd1, usb0, and usb1. The default
log storage medium is sd0. If sd0 is unavailable, the default log storage medium is sd1. If none of sd0, sd1,
usb0, and usb1 is unavailable, the log files cannot be saved. The log storage path is in the format of storage
medium name:/logfile, for example, usb0:/logfile.
10.2.1.1/16
GE1/0/0 IP network
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the information center.
2. Configure the contents of the logs to be output.
3. Configure the channel through which logs are output.
4. Configure logs to be output to the FTP server.
Data Preparation
To complete the configuration, you need the following data:
l IP address of each interface
l Information channel number
l Module enabled to output logs
l Severity levels of logs
l Language in which logs are output
l IP address of the FTP server
l User name and password of the FTP server
Procedure
Step 1 Configure the routing protocol to make the router and the FTP server reachable. (The detailed
procedure is not mentioned here.)
Step 2 Configure the user name and password that are used on the FTP server. (The configuration details
are not provided here.)
Step 3 Enable the information center:
<Huawei> system-view
[Huawei] sysname RouterA
[RouterA] info-center enable
<RouterA>
# View the received logs on the FTP server. (The display is omitted here.)
----End
Configuration Files
#
sysname RouterA
#
info-center source IP channel 9 log level warning
#
interface GigabitEthernet1/0/0
ip address 10.2.1.1 255.255.0.0
#
ip route-static 10.1.0.0 255.255.0.0 10.2.1.2
#
return
Networking Requirements
As shown in Figure 2-5, logs of multiple types and severity levels must be output to different
log hosts through information channels.
Router sends the logs (with a severity level as notification) generated on the Forwarding
Information Base (FIB) module and the IP module to the log host Server 1. Server 3 functions
as a backup router of Server 1.
Router sends the logs (with a severity level as warning) generated on the Point-to-Point Protocol
(PPP) module and the AAA module to the log host Server 1. Server 4 functions as a backup
router of Server 2.
Both the Router s and the log hosts need to be configured.
GE1/0/0
172.16.0.1/24
Router
Server 4 Server 2
10.2.1.2/24 10.2.1.1/24
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the information center.
2. Name the tunnel.
3. Specify the module enabled to output logs.
4. Configure the channel for outputting logs.
5. Configure the source interface that sends logs.
6. Configure the log host.
Data Preparation
To complete the configuration, you need the following data:
l IP address of the log host
l Information channel number
l Name of the channel through which logs are output
l Module enabled to output logs
l Information severity level
l Language in which the log is output
Procedure
Step 1 Configure routing protocols to make the router and log server routable. (The detailed procedure
is not mentioned here.)
Step 2 Configure the channel for outputting logs.
# Enable the information center.
<Huawei> system-view
[Huawei] info-center enable
# Configure the module enabled to output logs and the severity levels of logs allowed to be
output.
[Huawei] info-center source fib channel loghost log level notifications
[Huawei] info-center source ip channel loghost log level notifications
[Huawei] info-center source ppp channel loghost1 log level warnings
[Huawei] info-center source aaa channel loghost1 log level warnings
# Specify Server 1 as the log server and Server 3 as the backup log server to receive the logs
from the FIB module and the IP module. The logs are output in English, by Local2.
[Huawei] info-center loghost 10.1.1.1 channel loghost facility local2 language
english
[Huawei] info-center loghost 10.1.1.2 channel loghost facility local2 language
english
# Specify Server 2 as the log server and Server 4 as the backup log server to receive the logs
from the PPP module and the AAA module. The logs are output by Local4.
[Huawei] info-center loghost 10.2.1.1 channel loghost1 facility local4 language
english
[Huawei] info-center loghost 10.2.1.2 channel loghost1 facility local4 language
english
A log server is used to collect logs of the device when the storage memory of the router is not
large enough to record them.
Log servers can be installed with a Unix or Linux operating system or with the log software of
a third party.
If installed with a Unix or Linux operating system, logs enabled with Syslog can be collected
by the host.
If the host has a Linux operating system, choose from the following options:
----End
Configuration Files
#
info-center channel 6 name loghost1
info-center source FIB channel 2 log level notification
info-center source IP channel 2 log level notification
info-center source PPP channel 6 log level warning
info-center source AAA channel 6 log level warning
info-center loghost source GigabitEthernet1/0/0
info-center loghost 10.1.1.1 facility local2
Networking Requirements
As shown in Figure 2-6, binary logs generated on Router A are sent to the log host in real time.
Users or maintenance personnel can analyze the log through log analysis tools and locate the
fault.
Figure 2-6 Example for Configuring Binary Logs to be sent to the Log Host
GE1/0/0
10.1.1.1/24
RouterA Loghost
10.1.1.6/24
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the information center on the router.
2. Add the ID of the log to be filtered.
3. Configure binary logs to be sent to the log host.
Data Preparation
To complete the configuration, you need to perform the following data:
l ID of the log to be filtered
l IP address of the FTP server
l User name and password used for logging into the FTP server
l IP address of the log host
Procedure
Step 1 Configure routes between Router A and Loghost. (The detailed procedure is not mentioned here.)
----End
Configuration Files
#
interface GigabitEthernet1/0/0
ip address 10.1.1.1 255.255.255.0
#
info-center filter-id 1077514264
info-center loghost 10.1.1.6 binary
#
return
Networking Requirements
As shown in Figure 2-7, alarms are required to be output first to the SNMP agent and then to
the NM Station through SNMP Agent.
GE1/0/0
NM Station Agent
10.1.1.1/24 10.1.1.2/24
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the information center on the router.
2. Specify the module enabled to output logs and configure the channel through which the
alarm is output.
3. Enable the outputting alarm to the SNMP agent.
4. Enable transmitting alarms to the NM Station through SNMP.
Data Preparation
To complete the configuration, you need the following data:
l Information channel number
l Module enabled to output alarms
l Severities of alarms
Procedure
Step 1 Enable the information center.
<Huawei> system-view
[Huawei] info-center enable
Step 2 Specify the module enabled to output alarms and configure the channel used to output alarms.
# Specify the module enabled to output alarms and configure the channel used to output alarms.
[Huawei] info-center source ip channel channel7 trap level informational state on
NOTE
By default, alarms are output through the SNMP agent and information about all modules is displayed.
# View the alarms output through the channel selected by SNMP agent.
[Huawei] display channel 7
channel number: 7, channel name: channel7
MODU_ID NAME ENABLE LOG_LEVEL ENABLE TRAP_LEVEL ENABLE DEBUG_LEVEL
ffff0000 default Y debugging Y debugging N debugging
c16a0000 IP Y debugging Y informational N debugging
Total number is 1
Total number is 1
----End
Configuration Files
#
info-center source IP channel 7 trap level informational
info-center snmp channel 7
#
interface GigabitEthernet1/0/0
ip address 10.1.1.2 255.255.255.0
#
snmp-agent
snmp-agent local-engineid 000007DB7F00000100003598
snmp-agent sys-info version v2c
snmp-agent target-host trap-hostname nms address 10.1.1.1 udp-port 162 trap-
paramsname trapnms
snmp-agent target-host trap-paramsname trapnms v2C securityname public
snmp-agent trap enable
#
return
Networking Requirements
As shown in Figure 2-8, it is required to output the debugging information of the Address
Resolution Protocol (ARP) module to the console.
Router PC
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the information center.
2. Set the logs to be output to the console and the information module.
3. Configure the channel through which the debugging information is output.
4. Enable the terminal monitor function and display the debugging information.
Data Preparation
To complete the configuration, you need the following data:
l Information channel number
l Module enabled to output the logs
l Information severity level
Procedure
Step 1 Enable the information center.
<Huawei> system-view
Info: Current terminal monitor is on.
[Huawei] info-center enable
Info: Current terminal debugging is on.
Step 2 Allow the debugging on the ARP module to be output to the Console with the severity level of
the information as debugging.
[Huawei] info-center source arp channel console debug level debugging
[Huawei] info-center console channel console
[Huawei] quit
Step 3 Enable the terminal monitor function to display the debugging information.
<Huawei> terminal monitor
<Huawei> terminal debugging
----End
Configuration Files
#
info-center source ARP channel 0
#
return
3 Mirroring Configuration
This document describes the mirroring configuration procedures and provides configuration
examples.
Definition
Mirroring is a function that copies the packets on the mirrored interface (source interface) to the
observing interface (destination interface). When the observing interface is connected to a
monitoring device, you can use the monitoring device to analyze the packets copied to the
observing interface for network monitoring and fault troubleshooting.
Terms
Mirroring is classified into port mirroring and flow mirroring. Port mirroring and flow mirroring
involve the following interfaces:
l Observing interface
An observing interface is connected to a monitoring device and is used to export the traffic
copied from the mirrored interface.
l Mirrored interface
A mirrored interface is the interface to be observed. In port mirroring, all the packets passing
through the mirrored interface are copied to the observing interface. In flow mirroring, all
the packets matching the traffic classifier rules are copied to the observing interface.
Mirrored
interface
Router
Mirrored Observing
interface interface
Interface
Packet flows Monitoring
Copied packet flows device
Flow mirrored
interface
Router
Interface
Traffic classification match Monitoring device
Packet flows
Mirrored flows
Copied packet flows
In local port mirroring, the AR2200-S supports inter-board mirroring. That is, the observing
interface and mirrored interface can be on different LPUs of a router.
In local flow mirroring, when a WAN-side interface is used as a mirrored interface, the AR2200-
S supports inter-board mirroring. When a LAN-side interface is used as a mirrored interface,
the AR2200-S does not support inter-board mirroring.
NOTE
Applicable Environment
An intranet has high requirements for information security and privacy protection. You can
configure mirroring on an interface to monitor incoming and outgoing data packets. The
management server that has the monitoring software installed can capture these packets for
analysis and fault location.
To monitor and analyze all the packets passing through the mirrored interface that is located on
the same AR2200-S as the observing interface, configure local port mirroring on the AR2200-
S.
Pre-configuration Tasks
Ensuring that the link layer protocol status of interfaces is Up
Data Preparation
To configure local port mirroring, you need the following data.
No. Data
Context
After an interface is configured as the observing interface, other configurations are not
recommended on the interface. Otherwise, the following situations may occur:
l If other service traffic exists on the observing interface in addition to mirrored packets, the
packet source cannot be differentiated.
l If congestion occurs on the observing interface, mirrored packets may be discarded because
the priority of mirrored is low.
Procedure
Step 1 Run:
system-view
NOTE
----End
Context
If you want to configure an Eth-Trunk as a mirrored interface, run the interface eth-trunk trunk-
id command to create an Eth-Trunk first. Pay attention to the following points when you use an
Eth-Trunk as a mirrored interface:
l If an Eth-Trunk is configured as a mirrored interface, its member interfaces cannot be
configured as mirrored interfaces. To configure a member interface as a mirrored interface,
delete it from the Eth-Trunk first.
l If a member interface of an Eth-Trunk is configured as a mirrored interface, the Eth-Trunk
cannot be configured as a mirrored interface. To configure the Eth-Trunk as a mirrored
interface, delete the member interface from it first.
Procedure
Step 1 Run:
system-view
Step 2 Run:
interface interface-type interface-number
Step 3 Run:
port-mirroring to observe-port observe-port-index { both | inbound | outbound }
observe-port-index specifies the observing interface index. The value of this parameter must be
the same as the value set in 3.3.2 Configuring a Local Observing Interface.
NOTE
If the downstream mirroring interface is configured with an ACL, the ACL does not take effect for mirroring
packets. After the mirrored interface is specified, all packets on the interface are mirrored regardless of
whether a traffic policy is configured.
----End
Prerequisite
The configurations of port mirroring are complete.
Procedure
l Run the display observe-port command to check the observing interface in port mirroring.
l Run the display port-mirroring command to check the mirrored interface in port
mirroring.
----End
Applicable Environment
An intranet has high requirements for information security and privacy protection. You can
configure mirroring on an interface to monitor incoming and outgoing data packets. The
management server that has the monitoring software installed can capture these packets for
analysis and fault location.
To monitor and analyze the packets with some characteristics passing through the mirrored
interface that is located on the same AR2200-S as the observing interface, configure local port
mirroring on the AR2200-S.
Pre-configuration Tasks
None.
Data Preparation
To configure local flow mirroring, you need the following data.
No. Data
3 Names of the traffic classifier, traffic behavior, traffic policy, and traffic classification
rules
Context
After an interface is configured as the observing interface, other configurations are not
recommended on the interface. Otherwise, the following situations may occur:
l If other service traffic exists on the observing interface in addition to mirrored packets, the
packet source cannot be differentiated.
l If congestion occurs on the observing interface, mirrored packets may be discarded because
the priority of mirrored is low.
Procedure
Step 1 Run:
system-view
Step 2 Run:
observe-port [ observe-port-index ] interface interface-type interface-number
NOTE
----End
For the configuration procedure, see Configuring Traffic Classification in the Huawei AR2200-
S Series Enterprise Routers Configuration Guide - QoS.
Procedure
Step 1 Run:
system-view
Step 2 Run:
traffic behavior behavior-name
Step 3 Run:
mirroring to observe-port observe-port-index
The flows matching rules are mirrored to the specified observing interface.
observe-port-index specifies the observing interface index. The value of this parameter must be
the same as the value set in 3.4.2 Configuring a Local Observing Interface.
----End
Procedure
Step 1 Create a traffic policy.
1. Run:
system-view
In flow mirroring, when a WAN-side interface is used as a mirrored interface, the AR2200-S supports
inter-board mirroring. When a LAN-side interface is used as a mirrored interface, the AR2200-S does not
support inter-board mirroring.
----End
Prerequisite
The configurations of local flow mirroring are complete.
Procedure
l Run the display observe-port command to check the observing interface in local port
mirroring.
l Run the display port-mirroring command to check the mirrored interface in local port
mirroring.
l Run the display traffic behavior user-defined [ behavior-name ] command to check the
configuration of the traffic behavior.
l Run the display traffic classifier user-defined [ classifier-name ] command to check the
configuration of the traffic classifier.
l Run the display traffic policy user-defined [ policy-name [ classifier classifier-name ] ]
command to check the configuration of the traffic policy.
l Run the display traffic-policy policy-name applied-record command to check the
application of the traffic policy.
----End
Applicable Environment
Local port mirroring or local flow mirroring requires that an observing port needs to be directly
connected to a monitoring device. If the observing port is not directly connected to a mirroring
device, capture packets using mirroring to locate faults so that packets entering the device
interface can be displayed on the terminal or saved to the device.
If mirrored packets are saved to the device, log in to the device through FTP and download the
mirrored packets for analysis.
NOTE
Pre-configuration Tasks
Ensuring that the interface link layer protocol status is Up and the storage memory is sufficient
for mirrored packets
Procedure
Step 1 Run:
system-view
Step 3 Run:
capture-packet interface interface-type interface-number [ acl acl-number ]
destination { file file-name | terminal } * [ car cir cir-value | time-out time out
value | packet-num packet number | packet-len { packet length | total-packet ] *
Rules are defined to capture mirrored packets on the device and display the packet information
on the terminal.
----End
Example
After the configuration is complete, mirrored packets are displayed on the terminal or saved to
the device. If mirrored packets are saved to the device, download the mirrored packets for
analysis. The following shows information about mirrored packets displayed on the terminal:
Info: Captured packets will be showed on terminal.
[Huawei]
Packet: 1
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0a 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 2
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0b 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 3
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0b 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 4
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0a 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 5
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0b 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 6
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0b 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 7
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0a 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 8
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0b 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 9
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0b 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 10
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0a 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 11
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0b 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 12
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0a 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
Packet: 13
-------------------------------------------------------
ff ff ff ff ff ff 00 e0 fc 01 00 08 08 06 00 01
08 00 06 04 00 01 00 e0 fc 01 00 08 02 01 01 03
00 00 00 00 00 00 0b 01 01 01 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00
-------------------------------------------------------
------------------capture report-----------------------
file: NULL
interface: GigabitEthernet1/0/0
acl: 2000
car: 64pps timeout: 60s
packets: 100 (expected) 13 (actual)
length: 128 (expected)
-------------------------------------------------------
Networking Requirements
As shown in Figure 3-3, the R&D department and marketing department are connected to
Ethernet2/0/0 and Ethernet2/0/1 on the Router. The server (that is, the monitoring device) that
has the monitoring software installed is connected to Ethernet2/0/2 on the Router to analyze the
captured packets. To ensure information security, configure local port mirroring on the Router
to monitor all the packets sent by the R&D department and marketing department.
LSWA Eth2/0/0
R&D
department
Eth2/0/2
Router Server
Eth2/0/1
LSWB
Marketing
department
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure Ethernet2/0/2 as a local observing interface.
2. Configure Ethernet2/0/0 and Ethernet2/0/1 as mirrored interfaces.
Data Preparation
To complete the configuration, you need the following data:
l Type and number of the observing interface
l Type and number of the mirrored interface
l Index number of the observing interface, that is, 1
Procedure
Step 1 Configure an observing interface.
# Configure Ethernet2/0/2 on the Router as an observing interface.
<Huawei> system-view
[Huawei] observe-port 1 interface Ethernet 2/0/2
# Configure Ethernet2/0/1 on the Router as the local mirrored interface to monitor the packets
sent by the marketing department.
[Huawei] interface Ethernet 2/0/1
[Huawei-Ethernet2/0/1] port-mirroring to observe-port 1 inbound
[Huawei-Ethernet2/0/1] quit
[Huawei] quit
# View the packet statistics on Ethernet2/0/0, Ethernet2/0/1, and Ethernet2/0/2. The number of
packets on Ethernet2/0/2 equals the sum of the numbers of packets on Ethernet2/0/0 and
Ethernet2/0/1. Alternatively, view all the packets received by Ethernet2/0/0 and Ethernet2/0/1
by using the server. Packets on Ethernet2/0/0 and Ethernet2/0/1 are mirrored by the Router.
<Huawei> display interface Ethernet 2/0/0
Ethernet2/0/0 current state : UP
Description:HUAWEI, AR Series, Ethernet2/0/0 Interface
Switch Port,The Maximum Frame Length is 1628
CRC: 0, Giants: 0
Jabbers: 0, Throttles: 0
Runts: 0, DropEvents: 0
Alignments: 0, Symbols: 0
Ignoreds: 0, Frames: 0
Output: 6816 packets, 477120 bytes
Unicast: 0, Multicast: 6816
Broadcast: 0, Jumbo: 0
Discard: 0, Total Error: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Buffers Purged: 0
Input bandwidth utilization threshold : 100.00%
Output bandwidth utilization threshold: 100.00%
Input bandwidth utilization : 0.01%
Output bandwidth utilization : 0.00%
<Huawei> display interface Ethernet 2/0/1
Ethernet2/0/1 current state : UP
Description:HUAWEI, AR Series, Ethernet2/0/1 Interface
Switch Port,The Maximum Frame Length is 1628
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 10e0-1220-8001
Last physical up time : 2010-10-07 22:24:31 UTC-05:00
Last physical down time : 2010-10-05 22:22:22 UTC-05:00
Current system time: 2010-10-22 15:48:52-05:13
Port Mode: COMMON FIBER
Speed : 100, Loopback: NONE
Duplex: FULL, Negotiation: ENABLE
Mdi : NORMAL
Last 300 seconds input rate 728 bits/sec, 0 packets/sec
Last 300 seconds output rate 32 bits/sec, 0 packets/sec
Input peak rate 13608 bits/sec,Record time: 2008-03-07 22:24:32
Output peak rate 528 bits/sec,Record time: 2008-03-07 22:24:34
CRC: 0, Giants: 0
Jabbers: 0, Throttles: 0
Runts: 0, DropEvents: 0
Alignments: 0, Symbols: 0
Ignoreds: 0, Frames: 0
Output: 6817 packets, 477190 bytes
Unicast: 0, Multicast: 6817
Broadcast: 0, Jumbo: 0
Discard: 0, Total Error: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Buffers Purged: 0
Input bandwidth utilization threshold : 100.00%
Output bandwidth utilization threshold: 100.00%
Input bandwidth utilization : 0.01%
Output bandwidth utilization : 0.00%
<Huawei> display interface Ethernet 2/0/2
Ethernet2/0/2 current state : UP
Description:HUAWEI, AR Series, Ethernet2/0/2 Interface
Switch Port,The Maximum Frame Length is 1628
IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 10e0-1220-8001
Last physical up time : 2010-10-07 22:24:31 UTC-05:00
Last physical down time : 2010-10-05 22:22:22 UTC-05:00
Current system time: 2010-10-22 15:48:52-05:13
Port Mode: COMMON FIBER
Speed : 100, Loopback: NONE
Duplex: FULL, Negotiation: ENABLE
Mdi : NORMAL
Last 300 seconds input rate 728 bits/sec, 0 packets/sec
Last 300 seconds output rate 32 bits/sec, 0 packets/sec
Input peak rate 13608 bits/sec,Record time: 2008-03-07 22:24:32
Output peak rate 528 bits/sec,Record time: 2008-03-07 22:24:34
CRC: 0, Giants: 0
Jabbers: 0, Throttles: 0
Runts: 0, DropEvents: 0
Alignments: 0, Symbols: 0
Ignoreds: 0, Frames: 0
Output: 0 packets, 0 bytes
Unicast: 0, Multicast: 0
Broadcast: 0, Jumbo: 0
Discard: 0, Total Error: 0
Collisions: 0, ExcessiveCollisions: 0
Late Collisions: 0, Deferreds: 0
Buffers Purged: 0
Input bandwidth utilization threshold : 100.00%
Output bandwidth utilization threshold: 100.00%
Input bandwidth utilization : 0.01%
Output bandwidth utilization : 0.00%
----End
Configuration Files
l Configuration file of the Router
#
observe-port 1 interface Ethernet2/0/2
#
interface Ethernet2/0/0
port-mirroring to observe-port 1 inbound
#
interface Ethernet2/0/1
port-mirroring to observe-port 1 inbound
#
return
Networking Requirements
As shown in Figure 3-4, an enterprise's R&D department connects to the Router through
Ethernet2/0/0. A server with the monitoring software installed is connected to Ethernet2/0/1 on
the Router to analyze the captured packets. The enterprise needs to monitor all the IPv4 packets
sent from host 192.168.1.10/24 in the R&D department.
HostA
192.168.1.10/24
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure Ethernet2/0/2 as the observing interface.
2. Create a traffic classifier to match the IPv4 packets with the source IP address
192.168.1.10/24.
3. Create a traffic behavior and bind it to the local flow mirroring action.
4. Create a traffic policy and bind it to the traffic classifier and traffic behavior.
5. Apply the traffic policy to Ethernet2/0/0.
Data Preparation
To complete the configuration, you need the following data:
l Type and number of the observing interface
l Type and number of the mirrored interface
l Observing interface index, 1
l Traffic classifier, c1
l Traffic behavior, b1
l Traffic policy, p1
Procedure
Step 1 Configure the local observing interface.
# Configure Ethernet2/0/1 on the Router as the observing interface.
<Huawei> system-view
[Huawei] observe-port 1 interface Ethernet 2/0/1
# Create IPv4 ACL 2000 on the Router to match the IPv4 packets with destination address
192.168.1.10.
<Huawei> system-view
[Huawei] acl number 2000
[Huawei-acl-basic-2000] rule permit source 192.168.1.10 0
[Huawei-acl-basic-2000] quit
Step 3 Create a traffic behavior named b1 and configure the local flow mirroring action in the traffic
behavior.
[Huawei] traffic behavior b1
[Huawei-behavior-b1] mirroring to observe-port 1
[Huawei-behavior-b1] quit
----End
Configuration Files
l Configuration file of the Router
#
observe-port 1 interface Ethernet
2/0/1
#
acl number 2000
rule 5 permit source 192.168.1.10
0
#
traffic classifier c1 operator
or
if-match acl
2000
#
traffic behavior
b1
mirroring to observe-port
1
#
traffic policy
p1
classifier c1 behavior
b1
#
interface Ethernet2/0/0
traffic-policy p1
inbound
#
return
4 Hardware Management
This chapter describes hardware management on the AR2200-S, including power on and power
off of boards, electronic label backup, and board reset.
Hardware configurations reduce the frequency at which hardware resources are plugged in and
pulled out or installed and uninstalled, which improves the reliability of hardware resources.
Application Environment
Powering on and off boards remotely reduces energy consumption and facilitates board
operations.
NOTE
The AR200-S boards are hot swappable. Therefore, you do not need to remotely power off boards before
hot swapping them.
Pre-configuration Tasks
Powering on the router
Data Preparation
To configure the commands for powering on or powering off the board, you need the following
data.
No. Data
Procedure
l Run the following command in any view:
power off slot slot-id
----End
Procedure
Step 1 Run the following command in any view:
power on slot slot-id
----End
Context
Configuring power-on and power-off of the board is complete.
Procedure
Step 1 Run the display device [ slot slot-id ] command in any view to check the board status.
----End
Result
After boards are powered off, the power status is displayed as PowerOff. After boards are
powered on, the power status is displayed as PowerOn.
Applicable Environment
Electronic labels play an important role in handling network faults and replacing hardware in
batches. Therefore, backing up electronic labels is a must.
l When a fault occurs on the network, you can obtain information on related hardware
conveniently and accurately and improve the efficiency of maintenance tasks by using
electronic labels. For example, you can run queries on the maintenance cases of the
knowledge base, the preparation of spare boards, and the tests of related indexes. In
addition, you can efficiently analyze and trace defects in the hardware by analyzing and
collecting statistics on the electronic labels of the faulty hardware.
l When you need to replace hardware in batches, you can accurately view the distribution of
hardware in the entire network through the electronic labels recorded in the archive systems
of clients' devices. In this manner, you can pre-estimate the impact of hardware replacement
and formulate corresponding policies to make batch hardware replacement more efficient.
Pre-configuration Tasks
Before backing up electronic labels, ensure that the AR2200-S and the FTP server are routable.
Data Preparation
To back up electronic labels, you need the following data.
No. Data
3 (Optional, applicable to backing up the electronic label to the FTP server) Address
of the FTP server, and user name and password
4 (Optional, applicable to backing up the electronic label to the TFTP server) Address
of the TFTP server
Procedure
l Back up electronic labels to the flash memory, SD card, or USB disk
1. Run:
backup elabel filename [ slot-id ]
Electronic labels are backed up to the flash memory, SD card, or USB disk.
----End
Applicable Environment
When fan speed does not adapt to the current application environment of the device, you can
adjust the fan speed.
Pre-configuration Tasks
Powering on the router
Data Preparation
To set fan speed, you need the following data.
No. Data
Context
Check the upper and lower thresholds of board temperature and current temperature of boards
using the display temperature { all | slot slot-id } command. If the temperature of a board
exceeds the upper threshold, adjust the fan speed on the AR2200-S.
Procedure
Step 1 Run:
system-view
Step 2 Run:
set fan-speed fan slot-id percent percent
By default, fans run in automatic mode. In this mode, the system changes the fan speed when
detecting that the board temperature increases or decreases. The automatic mode reduces noises
and saves energy without affecting normal system running.
You can manually change the fan speed. By default, only users of level 2 and level 3 can run
the set fan-speed command to set the fan speed.
NOTE
If several fans are installed on a fan tray, all fans run at the configured speed after you run the set fan-
speed command.
----End
Context
Adjusting fan speed is complete.
Procedure
l Run the display fan command to check the status, running mode, and speed of the fan.
----End
Applicable Environment
When the LPU fails to be upgraded or fails to work normally, you need to reset the LPU.
Pre-configuration Tasks
Powering on the router
Data Preparation
To reset the LPU, you need the following data.
No. Data
Context
CAUTION
When the LPU works abnormally, try to find and remove the fault rather than resetting the LPU
directly to avoid service interruption.
Procedure
Step 1 Run:
reset slot slot-id
----End
Context
Resetting the LPU is complete.
Procedure
l Run the display device command to check the LPU status.
l Run the display reset-reason [ slot slot-id ] command to check the reason for resetting the
LPU.
----End
5 Auto-Config
This chapter describes the concept, working mechanism, and deployment of Auto-Config.
Auto-Config Functions
When a new or unconfigured router is powered on, a version file, patch file, and configuration
file must be loaded to the router. If routers are located dispersedly, the maintenance personnel
have to manually configure each router, which requires a heavy workload. The Auto-Config
function implements remote device configuration and reduces maintenance costs. The routers
running Auto-Config automatically downloads version file, patch file, and configuration file.
Auto-Config Advantages
Maintenance personnel do not need to manually configure each device. Auto-Config simplifies
network configurations and implements unified management and remote debugging on routers.
NOTE
Intermediate File
The intermediate file arnet.ini is used in the Auto-Config process. The intermediate file records
the mappings between the router's MAC address (or ESN) and system software name, version
number, patch file name, and configuration file name. If the version file, patch file, and
configuration file are stored on the FTP or TFTP server, its system software name extension
must be .cc, the patch file name extension must be .pat, and the configuration file name extension
must be .zip or .cfg. After the router obtains the IP address of the FTP or TFTP server, it
downloads the file arnet.ini from the FTP or TFTP server to search for the names of the required
system software, version number, patch file, and configuration file, and then downloads files
from the FTP or TFTP server.
NOTE
Auto-Config uses Option 67 to obtain the configuration file first. If Option 67 is not configured, Auto-
Config obtains the intermediate file.
Each row in the intermediate file describes a device. The intermediate file contains information about a
maximum of 1000 devices.
NOTE
l When configuring the intermediate file, enter the MAC address and ESN, or either of them. The
configuration file is mandatory, and the version file and patch file are optional. The three files can be
configured in any sequence.
l A MAC address (or an ESN), a system software name, patch file name, and configuration file name
are separated by semicolons. A MAC address is in xxxx-xxxx-xxxx-xxxx or xx-xx-xx-xx format. The
file name is case insensitive and contains only letters, digits, and underscores.
l The system software name and version information must be available in the intermediate file, and
version information in the system software name must be the same as that in the intermediate file.
Version information must be contained in the system software.
Auto-Config Process
Figure 5-1 shows the Auto-Config process.
DHCP Request
packets are sent
periodically
Are No
DHCP Reply
Packets
received?
Yes
Are
DHCP Reply No
packets
valid?
Yes
Parse Option
parameters
Is there
Yes Configure the ACS
ACS Option
information?
No
Is there
Obtain and parse the No Option
information about End
intermediate file the configuration
file?
Yes
Are there
the version file No No Obtain a configuration
name and Is there patch file
version information? file
information?
Yes Is the No
Yes configuration file
Can a obtained?
Does the No patch file be No
device need to be downloaded to Yes
upgraded? the device? Set it as the
configuration file for
Yes Yes next startup
Obtain a version file Obtain a patch file
Start a timer to set the
delay in restarting the
Is the device
version file No Is the patch No
obtained? file obtained?
The timer expires, and
Yes Yes the device is restarted
Set it as the version Set it as the patch file
file for next startup for next startup End
be obtained after 30 days, the process of downloading the configuration file stops and
waits to be handled manually.
l Restarting the router
After the configuration file is downloaded successfully, the router is restarted according to
the setting of Option 146. If no Option 146 is configured, the router is restarted immediately
after the configuration file is downloaded.
Option Parameters
Option Description
l opervalue=0: indicates that no file will be deleted from the file system
when the space is insufficient. opervalue=1: indicates that version
files will be deleted from the file system when the space is insufficient.
By default, no file will be deleted from the file system when the space
is insufficient.
l delaytime: specifies the delay in restarting a device after a
configuration file is downloaded to the device, in seconds. By default,
the delay is 0 seconds.
NOTE
The maximum delay in restarting a device is 1 day. If the configured delay is longer
than 1 day, the actual delay is 1 day.
NOTE
You can use the following methods to configure an FTP or TFTP server:
l To configure a TFTP server, configure Options 6, 15, and 66 and obtain a TFTP server address from
a DNS server.
l To configure a TFTP server, configure Option 150 and obtain the TFTP server address.
l To configure an FTP server, configure Options 141, 142, and 143 and obtain the TFTP user name,
FTP password, and FTP server address.
Applicable Environment
As shown in Figure 5-2, the physical link between the router and DHCP relay agent functions
properly, and there are reachable routes between the DHCP relay agent and servers. The
intermediate file, version file, and configuration file are stored on the FTP/TFTP server. After
the DHCP server and FTP/TFTP server are configured, routers can be configured by using Auto-
Config.
NOTE
Only Layer 3 Ethernet interfaces on the main control board support Auto-Config.
If the received DHCP Reply packet contains Option 43, the auto-configuration server (ACS) is used for
deployment.
FTP/TFTP Server
GE0/0/1
LAN IP network
ACS Server
Pre-configuration Tasks
Before deploying routers, complete the following task:
l Ensuring that physical links between routers and the DHCP server and FTP/TFTP server
work properly
Data Preparation
To deploy routers, you need the following data.
N Data
o.
1 Information about the interface that connects an AR2200-S to the DHCP server
N Data
o.
8 MAC addresses or ESNs of routers, version files (optional), patch files (optional), and
configuration files
Context
After a new AR2200-S or an unconfigured AR2200-S is powered on, the Auto-Config process
starts automatically.
When you connect to the console port of an AR2200-S that does not have a startup configuration
file, the system displays "Warning: Auto-Config is working. Do you want to stop Auto-Config?
[y/n]:"
l To continue Auto-Config, enter n and press Enter.
l To stop Auto-Config, choose y and press Enter.
CAUTION
If you choose n but still perform configurations through the console port, the DHCP,
routing, DNS, and VTY configurations will be lost.
Before powering on the Auto-Config-enabled routers, configure the DHCP server and file server;
otherwise, the routers cannot obtain configuration files.
NOTE
l The DHCP server must be configured with option parameters by referring to 5.2 Auto-Config Features
Supported by the AR2200-S.
l Here, an AR is used to describe how to configure the DHCP server based on a global address pool.
When the AR functions as a DHCP server, configure the DHCP server by referring to Configuring a
DHCP Server Based on a Global Addrss Poolor Configuring a DHCP Server Based on an Interface
Address Pool.
l If routers and the DHCP server are on different network segments, configure a DHCP relay agent by
referring to Configuring a DHCP Relay Agent.
Procedure
Step 1 Run:
system-view
Step 2 Run:
dhcp enable
DHCP is enabled.
Step 3 Run:
interface interface-type interface-number
Step 4 Run:
ip address ip address { mask | mask-length }
Step 5 Run:
dhcp select global
The interface is configured to use a global address pool. Users going online through this interface
can obtain IP addresses from the global address pool.
Step 6 Run:
quit
Step 7 Run:
ip pool ip-pool-name
Step 8 Run:
network ip-address [ mask { mask | mask-length } ]
Step 9 Run:
gateway-list ip-address &<1-8>
The IP address of the egress gateway is configured for the DHCP client.
Step 10 Run:
option code { ascii ascii-string | hex hex-string | ip-address ip-address &<1-8> }
If Option 67 is not configured, the process of obtaining the intermediate file is started.
NOTE
----End
Context
NOTE
l On an FTP server, the IP address must be the same as that contained in Option 143 configured on the
DHCP server. On a TFTP server, the IP address must be the same as that contained in Option 150 or
Option 6, 15, and 66 configured on the DHCP server.
Procedure
Step 1 Run:
system-view
NOTE
After the DHCP client obtains configuration files from the FTP server, run the undo ftp server command
to disable the FTP server immediately to ensure FTP server security.
Step 3 (Optional) Configure the authentication information, authorization mode, and working directory
for FTP users.
1. For TACACS authentication users:
l Run:
set default ftp-directory directory
Step 4 Run:
interface interface-type interface-number
Step 5 Run:
ip address ip address { mask | mask-length }
NOTE
The IP address of the FTP server must be the same as that contained in Option 143 configured on the DHCP
server.
The configuration file is obtained using Option 67 in the Auto-Config process. If Option 67 is not
configured, the process of obtaining the intermediate file is started.
The intermediate file is configured based on the MAC addresses or ESNs of routers, version
files, patch files, and configuration files. For details about the format of the intermediate file,
see 5.2 Auto-Config Features Supported by the AR2200-S.
Step 7 Save the intermediate file, version file, patch file, and configuration file to the working directory
on the FTP server.
----End
Prerequisite
The configurations of the DHCP server and FTP/TFTP server are complete.
Procedure
Step 1 Five minutes after routers are powered on, check address allocation on the DHCP server to check
whether the routers are connected to the DHCP server.
NOTE
If the routers are connected to the DHCP server, log in to the routers using Telnet but do not configure the
routers.
Step 2 Five minutes after the routers obtain IP addresses, check the log about file downloading from
the FTP/TFTP server, or log in to the routers to check whether correct version files, patch files,
and configuration files have been downloaded and check the running status of Auto-Config by
using the display autoconfig-status command.
NOTE
Do not save a configuration file to a router to be configured immediately after the configuration file is
downloaded; otherwise, only a temporary configuration file is saved because the configurations have not
taken effect.
Step 3 After correct files are downloaded to the routers, the routers are restarted according to the setting
of Option 146. You can run the display autoconfig activating-config { delay | remanent-
time } command to check whether the configuration takes effect.
----End
Networking Requirements
When a new router or a non-configured router accesses the network, the configuration file,
version file, and patch file are required to be configured. To reduce the maintenance cost, the
router uses the Auto-Config function to automatically load the configuration file, version file,
and patch file. The router then can be managed remotely.
As shown in Figure 5-3, the AR2200-S connects to the DHCP server through GE0/0/1 and
supports the Auto-Config function. The AR2200-S can automatically load the configuration file,
version file, and patch file stored on the FTP server after the FTP server and DHCP server are
configured.
HostA
Eth1/0/0 Eth1/0/0
192.168.2.6/24 192.168.1.6/24
GE0/0/1
Router
HostB DHCP Server FTP Server
HostC
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the DHCP server so that a router can obtain IP addresses and option parameters.
2. Configure an intermediate file.
3. Configure the IP address of the FTP server.
4. Save the intermediate file, version file, patch file, and configuration file to the working
directory on the FTP server.
NOTE
This example describes how to configure the Auto-Config function on an AR2200-S. Option 67 is specified
to carry the configuration file when the DHCP server is configured.
Data Preparation
To complete the configuration, you need the following data:
l GE0/0/1 used to connect the AR2200-S to the DHCP server
l DHCP server information:
– Downlink interface Eth1/0/0 connected to the router
– IP address: 192.168.2.6/24
– Address pool: 192.168.2.0/24
– Option 67 (configuration file): auto_V200R002C00B002.cfg
– Option 141 (FTP user name): user
– Option 142 (FTP password): huawei
– Option 143 (FTP server address): 192.168.1.6
– Option 145 (non-configuration file):
vrpfile=auto_V200R002C00B001.cc;vrpver=V200R002C00B001;patchfile=auto_V2
00R002C00B002.pat;
l Egress gateway's IP address 192.168.2.6 and MAC address 0018-82C5-AA89
l FTP server's IP address: 192.168.1.6/24
Procedure
Step 1 Configure the DHCP server.
<DHCP Server> system-view
[DHCP Server] dhcp enable
[DHCP Server] interface ethernet 1/0/0
[DHCP Server-Ethernet1/0/0] ip address 192.168.2.6 255.255.255.0
[DHCP Server-Ethernet1/0/0] dhcp select global
[DHCP Server-Ethernet1/0/0] quit
[DHCP Server] ip pool auto-config
[DHCP Server] network 192.168.2.0 mask 255.255.255.0
[DHCP Server] gateway-list 192.168.2.6
[DHCP Server] option 67 ascii auto_V200R002C00B002.cfg
[DHCP Server] option 141 ascii user
[DHCP Server] option 142 ascii huawei
[DHCP Server] option 143 ip-address 192.168.1.6
[DHCP Server] option 145 ascii
vrpfile=auto_V200R002C00B001.cc;vrpver=V200R002C00B001;patchfile=auto_V200R002C00B
002.pat;
Set the IP address of the FTP server to 192.168.1.6, configure the authorization mode and
working directory for FTP users, and save the version file, patch file, and configuration file to
the working directory on the FTP server. For details, see the configuration file.
Five minutes after the router is powered on, run the display ip pool name auto-config command
on the DHCP server to check address allocation of the auto-config address pool.
<DHCP Server> display ip pool name auto-config
Pool-name : auto-config
Pool-No : 0
Lease : 1 Days 0 Hours 0 Minutes
Domain-name : -
Option-code : 67
Option-subcode : --
Option-type : ascii
Option-value : auto_V200R002C00B002.cfg
Option-code : 141
Option-subcode : --
Option-type : ascii
Option-value : user
Option-code : 142
Option-subcode : --
Option-type : ascii
Option-value : huawei
Option-code : 143
Option-subcode : --
Option-type : ip-
address
Option-value : 192.168.1.6
Option-code : 145
Option-subcode : --
Option-type : ascii
Option-value : vrpfile=auto_V200R002C00B001.cc;vrpver=V200R002C00B001;patchf
ile=auto_V200R002C00B002.pat;
DNS-server0 : -
NBNS-server0 : -
Netbios-type : -
Position : Local Status : Unlocked
Gateway-0 : 192.168.2.6
Mask : 255.255.255.0
VPN instance : --
-----------------------------------------------------------------------------
Start End Total Used Idle(Expired) Conflict Disable
-----------------------------------------------------------------------------
192.168.2.1 192.168.2.254 253 1 252 0 0 0
-----------------------------------------------------------------------------
Five minutes after the router obtains the IP address, run the display autoconfig-status command
to check whether correct version files, patch files, and configuration files have been downloaded
and check the running status of Auto-Config.
<AR2200-S> display autoconfig-status
Running: Yes
Stop : No
Reason : --
Suspend: Yes
Reason : The unknown reason cause getting
fil
----End
Configuration Files
Configuration file of the DHCP server
#
dhcp enable
#
ip pool auto-config
gateway-list 192.168.2.6