Configuration Guide - Basic Configuration(V100R002C00_05).pdf

download Configuration Guide - Basic Configuration(V100R002C00_05).pdf

of 182

Transcript of Configuration Guide - Basic Configuration(V100R002C00_05).pdf

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    1/182

    Quidway S9300 Terabit Routing Switch

    V100R002C00

    Configuration Guide - Basic Configuration

    Issue 05

    Date 2010-01-08

    Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    2/182

    Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any

    assistance, please contact our local office or company headquarters.

    Huawei Technologies Co., Ltd.

    Address: Huawei Industrial Base

    Bantian, Longgang

    Shenzhen 518129

    People's Republic of China

    Website: http://www.huawei.com

    Email: [email protected]

    Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved.

    No part of this document may be reproduced or transmitted in any form or by any means without prior written

    consent of Huawei Technologies Co., Ltd.

    Trademarks and Permissions

    and other Huawei trademarks are the property of Huawei Technologies Co., Ltd.

    All other trademarks and trade names mentioned in this document are the property of their respective holders.

    Notice

    The purchased products, services and features are stipulated by the contract made between Huawei and the

    customer. All or part of the products, services and features described in this document may not be within the

    purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,

    and recommendations in this document are provided "AS IS" without warranties, guarantees or representations

    of any kind, either express or implied.

    The information in this document is subject to change without notice. Every effort has been made in the

    preparation of this document to ensure accuracy of the contents, but all statements, information, andrecommendations in this document do not constitute the warranty of any kind, express or implied.

    Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    http://www.huawei.com/
  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    3/182

    Contents

    About This Document.....................................................................................................................1

    1 How to Use Interfaces...............................................................................................................1-1

    1.1 Introduction to Interfaces................................................................................................................................1-2

    1.2 Setting Parameters of an Interface...................................................................................................................1-51.2.1 Establishing the Configuration Task......................................................................................................1-5

    1.2.2 Enteringthe Interface View...................................................................................................................1-6

    1.2.3 Viewing All Commands in the Interface View......................................................................................1-6

    1.2.4 Configuring the Description for an Interface.........................................................................................1-7

    1.2.5 Starting and Shutting Down an Interface...............................................................................................1-7

    1.2.6 Exiting from the Interface View.............................................................................................................1-8

    1.2.7 Assigning an IP Address to an Interface................................................................................................1-8

    1.2.8 Further Configuration an Interface.........................................................................................................1-9

    1.2.9 Checking the Configuration.................................................................................................................1-10

    1.3 Configuring the Loopback Interface.............................................................................................................1-10

    1.3.1 Establishing the Configuration Task....................................................................................................1-10

    1.3.2 Configuring IPv4 Parameters of the Loopback Interface.....................................................................1-11

    1.3.3 Checking the Configuration.................................................................................................................1-12

    1.4 Maintaining the Interface..............................................................................................................................1-12

    1.4.1 ClearingStatistics Information on the Interface...................................................................................1-12

    1.4.2 Debugging the Interface.......................................................................................................................1-12

    2 User Login Management...........................................................................................................2-1

    2.1 Overview of User Login..................................................................................................................................2-3

    2.1.1 User Login Modes..................................................................................................................................2-3

    2.1.2 User Interface.........................................................................................................................................2-7

    2.1.3 UserAuthentication................................................................................................................................2-8

    2.2 Logging In to the S9300 Through the Console Interface..............................................................................2-10

    2.2.1 Establishing the Configuration Task....................................................................................................2-10

    2.2.2 Logging In to the S9300 Through the Console Interface.....................................................................2-11

    2.3 Configuring the Console Interface as the User Interface..............................................................................2-14

    2.3.1 Establishing the Configuration Task....................................................................................................2-14

    2.3.2 Setting Parameters of the User Interface..............................................................................................2-15

    2.3.3 Configuring User Authentication.........................................................................................................2-16

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration Contents

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    i

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    4/182

    2.3.4 Setting User Levels..............................................................................................................................2-17

    2.3.5 Checking the Configuration.................................................................................................................2-18

    2.4 Configuring the Telnet Interface...................................................................................................................2-18

    2.4.1 Establishing the Configuration Task....................................................................................................2-19

    2.4.2 (Optional) Setting Parameters of the VTY Interface............................................................................2-19

    2.4.3 Configuring the VTY User Interface to Support the Telnet Service....................................................2-20

    2.4.4 Configuring User Authentication.........................................................................................................2-21

    2.4.5 Setting User Levels..............................................................................................................................2-23

    2.4.6 Checking the Configuration.................................................................................................................2-24

    2.5 Logging In tothe S9300 Locally Through Telnet.........................................................................................2-24

    2.5.1 Establishing the Configuration Task....................................................................................................2-24

    2.5.2 LoggingIn to the S9300 Through Telnet.............................................................................................2-25

    2.5.3 Ending the Telnet Connection Periodically.........................................................................................2-26

    2.5.4 Checking the Configuration.................................................................................................................2-27

    2.6 Logging In to the S9300 Remotely Through Telnet.....................................................................................2-28

    2.6.1 Establishing the Configuration Task....................................................................................................2-28

    2.6.2 LoggingIn to the S9300 Remotely Through Telnet............................................................................2-28

    2.7 Configuring the SSH Interface......................................................................................................................2-29

    2.7.1 Establishing the Configuration Task....................................................................................................2-29

    2.7.2 Creatingan SSH User..........................................................................................................................2-30

    2.7.3 Configuring the VTY User Interface to Support the SSH Protocol.....................................................2-30

    2.7.4 Creatinga Local Key Pair....................................................................................................................2-31

    2.7.5 Configuring the Authentication Mode for the SSH User.....................................................................2-322.7.6 (Optional) Configuring Basic Authentication Information About the SSH User................................2-33

    2.7.7 (Optional) Authorizing SSH Users Through Command Lines............................................................2-34

    2.7.8 Configuring the Type of the Service for the SSH User........................................................................2-34

    2.7.9 (Optional) Configuring the Authorized Directory of the SFTP Service for the SSH User..................2-34

    2.7.10 Deleting an SSH User........................................................................................................................2-35

    2.7.11 Checking the Configuration...............................................................................................................2-35

    2.8 Logging In to the S9300 Through SSH.........................................................................................................2-36

    2.8.1 Establishing the Configuration Task....................................................................................................2-36

    2.8.2 LoggingIn to the S9300 Through SSH................................................................................................2-37

    2.9 Configuring the FTP Interface......................................................................................................................2-37

    2.9.1 Establishing the Configuration Task....................................................................................................2-37

    2.9.2 Configuring User Authentication.........................................................................................................2-38

    2.9.3 Checking the Configuration.................................................................................................................2-39

    2.10 Logging In to the S9300 Through FTP.......................................................................................................2-39

    2.10.1 Establishing the Configuration Task..................................................................................................2-39

    2.10.2 Logging In to the S9300 Through FTP..............................................................................................2-40

    2.11 S9300 Logging In to the TFTP Service Through TFTP.............................................................................2-41

    2.11.1 Establishing the Configuration Task..................................................................................................2-41

    2.11.2 Downloading Files Through TFTP....................................................................................................2-42

    Contents

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    ii Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    5/182

    2.11.3 Uploading Files Through TFTP.........................................................................................................2-42

    2.12 Limiting the Access to the TFTP Server.....................................................................................................2-42

    2.12.1 Establishing the Configuration Task..................................................................................................2-43

    2.12.2 Configuring the Basic ACL................................................................................................................2-43

    2.12.3 Configuring the Basic TFTP ACL.....................................................................................................2-44

    2.13 Logging In to the S9300 Through SFTP.....................................................................................................2-44

    2.13.1 Establishing the Configuration Task..................................................................................................2-44

    2.13.2 Logging In to the S9300 Through SFTP............................................................................................2-45

    2.14 Logging In to the S9300 Through STelnet..................................................................................................2-45

    2.14.1 Establishing the Configuration Task..................................................................................................2-45

    2.14.2 Logging In to the S9300 Through STelnet.........................................................................................2-46

    2.15 Configuring the NMS User to Log In to the S9300 Through the VTY Interface.......................................2-47

    2.15.1 Establishing the Configuration Task..................................................................................................2-47

    2.15.2 Configuring the NMS User................................................................................................................2-47

    2.15.3 Configuring the AAA Authentication Mode for the NMS User........................................................2-48

    2.15.4 Checking the Configuration...............................................................................................................2-48

    2.16 Maintaining Telnet......................................................................................................................................2-49

    2.16.1 Debugging Telnet Terminal Services.................................................................................................2-49

    2.17 Configuration Examples..............................................................................................................................2-49

    2.17.1 Example for Configuring the Telnet Terminal Service......................................................................2-49

    2.17.2 Example for Configuring the TFTP Client........................................................................................2-51

    3 How to Use Command Lines...................................................................................................3-1

    3.1 Overview of Command Lines.........................................................................................................................3-2

    3.2 CommandViews.............................................................................................................................................3-2

    3.2.1 Hierarchical Structure of Command Views...........................................................................................3-2

    3.2.2 Common Views......................................................................................................................................3-4

    3.3 Command Levels.............................................................................................................................................3-6

    3.3.1 Introduction to Command Levels...........................................................................................................3-6

    3.3.2 Relations Between Command Levels and User Levels..........................................................................3-7

    3.4 Using the Online Help of Command Lines.....................................................................................................3-8

    3.4.1 Providing the Help for a Complete Command Word.............................................................................3-9

    3.4.2 Providing the Help for an Incomplete Command Word........................................................................3-93.5 Editing Command Lines................................................................................................................................3-10

    3.6 Displaying Features of Command Lines.......................................................................................................3-11

    3.7 History Commands........................................................................................................................................3-11

    3.8 Hotkeys..........................................................................................................................................................3-12

    3.8.1 Classification of Hotkeys.....................................................................................................................3-12

    3.8.2 DefiningHotkeys.................................................................................................................................3-14

    3.8.3 Using Hotkeys......................................................................................................................................3-14

    3.9 ConfigurationExamples................................................................................................................................3-15

    3.9.1 Examplefor Defining Hotkeys............................................................................................................3-15

    3.9.2 Example for Copying a Command by Using Hotkeys.........................................................................3-16

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration Contents

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    iii

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    6/182

    3.9.3 Example for Using the Tab Key...........................................................................................................3-16

    4 Common Operations and Configurations.............................................................................4-1

    4.1 Overview of Common Operations and Configurations...................................................................................4-2

    4.1.1 Introduction to Common Operations......................................................................................................4-24.1.2 Introduction to Common Configurations...............................................................................................4-2

    4.2 Common Operations....................................................................................................................................... 4-2

    4.2.1 Enteringthe System View......................................................................................................................4-2

    4.2.2 Quittinga Command View.................................................................................................................... 4-3

    4.2.3 Switching the Language Mode...............................................................................................................4-3

    4.2.4 Displaying Information About the System Status..................................................................................4-3

    4.2.5 Lockinga Login Interface......................................................................................................................4-5

    4.2.6 SendingInformation from One User Interface to Another User Interface.............................................4-5

    4.2.7 Closing the Connection on a Specified User Interface...........................................................................4-6

    4.2.8 Setting the Header Text..........................................................................................................................4-6

    4.3 Common Configurations.................................................................................................................................4-7

    4.3.1 Setting aSystem Name.......................................................................................................................... 4-7

    4.3.2 Setting the System Time........................................................................................................................ 4-7

    4.4 Switching Levels of Users and Commands.....................................................................................................4-8

    4.4.1 Extending Levels of Commands............................................................................................................4-8

    4.4.2 Extending Levels of Users..................................................................................................................... 4-9

    4.4.3 Setting the Password for Switching Levels of Users............................................................................. 4-9

    4.4.4 Switching the User Level.....................................................................................................................4-10

    5 Configuration of the SSH Server and Client........................................................................5-1

    5.1 Overview of SSH............................................................................................................................................ 5-2

    5.2 Configuring the SSH Server............................................................................................................................5-3

    5.2.1 Establishing the Configuration Task......................................................................................................5-3

    5.2.2 Enabling the STelnet Service.................................................................................................................5-4

    5.2.3 Enabling the SFTP Service.................................................................................................................... 5-4

    5.2.4 (Optional) Enabling the Later Version to Be Compatible with the Earlier Version..............................5-5

    5.2.5 (Optional) Setting the Listening Port Number on the SSH Server........................................................ 5-5

    5.2.6 (Optional) Enabling the S9300 to Send Trap Messages........................................................................ 5-6

    5.2.7 (Optional) Setting the Interval for Updating the Key Pair.....................................................................5-65.2.8 Checking the Configuration...................................................................................................................5-7

    5.3 Configuring the STelnet Client.......................................................................................................................5-7

    5.3.1 Establishing the Configuration Task......................................................................................................5-8

    5.3.2 Enabling the Initial Authentication on the STelnet Client.....................................................................5-8

    5.3.3 Assigning the RSA Public Key to the SSH Server by the STelnet Client.............................................5-9

    5.3.4 Checking the Configuration.................................................................................................................5-10

    5.4 Configuring the SFTP Client.........................................................................................................................5-10

    5.4.1 Establishing the Configuration Task....................................................................................................5-10

    5.4.2 Enabling the Initial Authentication on the SFTP Client......................................................................5-12

    5.4.3 Assigning the RSA Public Key to the SSH Server by the SFTP Client...............................................5-12

    Contents

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    iv Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    7/182

    5.4.4 (Optional) Managing Directories.........................................................................................................5-13

    5.4.5 (Optional) Managing Files...................................................................................................................5-13

    5.4.6 (Optional) Displaying Command Help on the SFTP Client................................................................5-14

    5.4.7 Checking the Configuration.................................................................................................................5-15

    5.5 Maintaining SSH...........................................................................................................................................5-15

    5.5.1 Debugging the SSH Terminal Service.................................................................................................5-15

    5.6 ConfigurationExamples................................................................................................................................5-16

    5.6.1 Examplefor Configuring the SSH Server to Support the Access from Another Port.........................5-16

    5.6.2 Examplefor Connecting the STelnet Client and the SSH Server........................................................5-22

    5.6.3 Example for Connecting the SFTP Clinet and the SSH Server...........................................................5-29

    6 Configuration of the FTP Server and Client.........................................................................6-1

    6.1 Overview of FTP.............................................................................................................................................6-2

    6.2 Configuring the S9300 as the FTP Server.......................................................................................................6-2

    6.2.1 Establishing the Configuration Task......................................................................................................6-2

    6.2.2 Enabling the FTP Server........................................................................................................................6-3

    6.2.3 (Optional) Setting the Timeout Interval for Disconnecting the FTP Server and the Client...................6-3

    6.2.4 Setting the Local User Name and Password..........................................................................................6-3

    6.2.5 Setting the Type of the Service and Directory for the FTP Login User.................................................6-4

    6.2.6 Checking the Configuration...................................................................................................................6-4

    6.3 Configuring the S9300 as the FTP Client.......................................................................................................6-5

    6.3.1 Establishing the Configuration Task......................................................................................................6-5

    6.3.2 LoggingIn to the FTP Server.................................................................................................................6-6

    6.3.3 Setting the Type and Mode for Transmitting Files................................................................................6-66.3.4 Displaying the Online Help About FTP Commands..............................................................................6-7

    6.3.5 Uploading or Downloading Files...........................................................................................................6-7

    6.3.6 Managing Directories.............................................................................................................................6-8

    6.3.7 Managing Files.......................................................................................................................................6-8

    6.3.8 Changing the Login User.......................................................................................................................6-9

    6.3.9 Ending an FTP Connection....................................................................................................................6-9

    6.3.10 Checking the Configuration...............................................................................................................6-10

    6.4 Maintaining FTP...........................................................................................................................................6-10

    6.4.1 Debugging the FTP Server...................................................................................................................6-10

    6.5 ConfigurationExamples................................................................................................................................6-11

    6.5.1 Examplefor Configuring the FTP Server............................................................................................6-11

    6.5.2 Example for Configuring the FTP Client.............................................................................................6-13

    6.5.3 Example for Configuring an ACL of the FTP Server..........................................................................6-15

    7 File System Management..........................................................................................................7-1

    7.1 Overview of the File System...........................................................................................................................7-2

    7.1.1 Basic Concepts of the File System.........................................................................................................7-2

    7.1.2 Storage Device.......................................................................................................................................7-2

    7.1.3 File..........................................................................................................................................................7-2

    7.1.4 Directory.................................................................................................................................................7-2

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration Contents

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    v

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    8/182

    7.2 Managing a Storage Device............................................................................................................................ 7-2

    7.2.1 Establishing the Configuration Task......................................................................................................7-2

    7.2.2 (Optional) Formatting a Storage Device................................................................................................7-3

    7.3 Managing a File...............................................................................................................................................7-3

    7.3.1 Establishing the Configuration Task......................................................................................................7-4

    7.3.2 (Optional) Displaying the Status of the File System..............................................................................7-4

    7.3.3 (Optional) Changing the Prompt Mode of the File System................................................................... 7-5

    7.3.4 (Optional) Displaying the Contents of a File.........................................................................................7-5

    7.3.5 (Optional) Copying a File...................................................................................................................... 7-5

    7.3.6 (Optional) Moving a File........................................................................................................................7-6

    7.3.7 (Optional) Renaming a File....................................................................................................................7-6

    7.3.8 (Optional) Deleting a File...................................................................................................................... 7-6

    7.3.9 (Optional) Deleting a File from the Recycle Bin...................................................................................7-7

    7.3.10 (Optional) Restoring a Deleted File.....................................................................................................7-7

    7.3.11 (Optional) Executing a Batch File........................................................................................................7-7

    7.4 Managing a Directory......................................................................................................................................7-8

    7.4.1 Establishing the Configuration Task......................................................................................................7-8

    7.4.2 (Optional) Displaying the Current Working Directory..........................................................................7-9

    7.4.3 (Optional) Creating a Directory............................................................................................................. 7-9

    7.4.4 (Optional) Deleting a Directory............................................................................................................. 7-9

    7.4.5 (Optional) Changing the Working Directory.........................................................................................7-9

    7.5 Maintaining the File System.........................................................................................................................7-10

    7.6 Configuration Examples................................................................................................................................7-107.6.1 Examplefor Copying Files..................................................................................................................7-10

    8 Management of Configuration Files......................................................................................8-1

    8.1 Overview of the Configuration File................................................................................................................8-2

    8.1.1 Configuration File..................................................................................................................................8-2

    8.1.2 Current Configurations...........................................................................................................................8-2

    8.2 Displaying the Current Configurations and the Configurations Saved to a Configuration File..................... 8-2

    8.2.1 Displaying All Current Configurations..................................................................................................8-3

    8.2.2 Displaying the Current Configurations in the Current View................................................................. 8-3

    8.2.3 Displaying the Configurations Saved in a Configuration File...............................................................8-38.2.4 Displaying the System Software Used in the Startup of the S9300.......................................................8-4

    8.3 Saving the Current Configurations..................................................................................................................8-4

    8.4 Deleting a Configuration File..........................................................................................................................8-5

    8.5 Loading a Configuration File..........................................................................................................................8-5

    8.6 Comparing the Current Configurations with the Configuration File..............................................................8-6

    Contents

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    vi Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    9/182

    Figures

    Figure 2-1Networking diagram of the S9300 acting as the Telnet server...........................................................2-5

    Figure 2-2Networking diagram of the S9300 acting as the Telnet client............................................................2-6

    Figure 2-3Networking diagram of the S9300 acting as the cascading Telnet server..........................................2-6

    Figure 2-4Numbering of user interfaces on the S9300.......................................................................................2-8

    Figure 2-5Logging in to the S9300 through the console interface....................................................................2-10

    Figure 2-6Setting up a new connection.............................................................................................................2-11

    Figure 2-7Setting the connection port...............................................................................................................2-12

    Figure 2-8Setting communication parameters for the port................................................................................2-13

    Figure 2-9Selecting a terminal type..................................................................................................................2-14

    Figure 2-10Logging in to the locally through Telnet.................................................................. .....................2-25

    Figure 2-11Logging in to the S9300 remotely through Telnet.........................................................................2-28

    Figure 2-12Establishing a local SSH connection between the PC and the S9300............................................2-36

    Figure 2-13Setting up an FTP connection between the PC and the S9300.......................................................2-39

    Figure 2-14Setting up a connection between the S9300 and the TFTP server.................................................2-41Figure 2-15Networking diagram of the remote login of the Ethernet user.......................................................2-49

    Figure 2-16Networking diagram for configuring TFTP...................................................................................2-52

    Figure 3-1Hierarchical structure of command views..........................................................................................3-2

    Figure 3-2Authority of users at four levels.........................................................................................................3-8

    Figure 5-1Establishing a local SSH connection between the PC and the S9300................................................5-2

    Figure 5-2Networking diagram for configuring the SSH server to support the access from another port.......5-17

    Figure 5-3Networking diagram of connecting the STelnet client and the SSH server.....................................5-23

    Figure 5-4Networking diagram for connecting the SFTP client and the SSH server.......................................5-29

    Figure 6-1Networking diagram of the S9300 functioning as the FTP server...................................................6-11

    Figure 6-2Networking diagram of the S9300 functioning as the FTP client....................................................6-13

    Figure 6-3Networking diagram for configuring an ACL of the FTP server.....................................................6-15

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration Figures

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    vii

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    10/182

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    11/182

    Tables

    Table 1-1Description of management interfaces.................................................................................................1-2

    Table 1-2Numbers of management interfaces.....................................................................................................1-2

    Table 1-3Rules for numbering service interfaces................................................................................................1-3

    Table 2-1User login modes..................................................................................................................................2-3

    Table 2-2Types of user interfaces....................................................................................................................... 2-7

    Table 2-3Types of login users.............................................................................................................................2-8

    Table 2-4Authentication modes of login users..................................................................................................2-10

    Table 2-5Communication parameters...............................................................................................................2-13

    Table 3-1Types of command views.....................................................................................................................3-3

    Table 3-2Levels of login users............................................................................................................................ 3-8

    Table 3-3Matching relations of error messages and error causes......................................................................3-10

    Table 3-4Accessing history commands.............................................................................................................3-12

    Table 3-5System hotkeys...................................................................................................................................3-13

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration Tables

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    ix

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    12/182

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    13/182

    About This Document

    Purpose

    This document describes features of theS9300 based on configuration procedures and examples.

    This document covers the following topics:l Feature description

    l Data preparation

    l Pre-configuration tasks

    l Configuration procedures

    l Checking the configuration

    l Configuration examples

    This document guides you through the configuration and the applicable environment of basic

    features of the S9300.

    Related Versions

    The following table lists the product versions related to this document.

    Product Name Version

    S9300 V100R002C00

    Intended Audience

    This document is intended for:

    l Policy planning engineers

    l Installation and commissioning engineers

    l NM configuration engineers

    l Technical support engineers

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration About This Document

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    14/182

    Organization

    This document is organized as follows.

    Chapter Description

    1 How to Use Interfaces Describes how to use the interface of the device.

    2 User Login Management Describes user interface management and user login.

    3 How to Use Command

    Lines

    Describes how to use command lines.

    4 Common Operations and

    Configurations

    Describes common operations and configurations.

    5 Configuration of the SSH

    Server and Client

    Describes how to configure the SSH server and client and

    provides examples.

    6 Configuration of the FTP

    Server and Client

    Describes how to configure the FTP server and client and

    provides examples.

    7 File System Management Describes the basic knowledge about the file system,

    including the methods of managing files, directories, and

    storage devices.

    8 Management of

    Configuration Files

    Describes how to view, save, and load configuration files.

    Conventions

    Symbol Conventions

    The symbols that may be found in this document are defined as follows.

    Symbol Description

    DANGER

    Indicates a hazard with a high level of risk, which if notavoided, will result in death or serious injury.

    WARNING

    Indicates a hazard with a medium or low level of risk, which

    if not avoided, could result in minor or moderate injury.

    CAUTION

    Indicates a potentially hazardous situation, which if not

    avoided, could result in equipment damage, data loss,

    performance degradation, or unexpected results.

    TIP Indicates a tip that may help you solve a problem or save

    time.

    About This Document

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    2 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    15/182

    Symbol Description

    NOTE Provides additional information to emphasize or supplement

    important points of the main text.

    General Conventions

    The general conventions that may be found in this document are defined as follows.

    Convention Description

    Times New Roman Normal paragraphs are in Times New Roman.

    Boldface Names of files, directories, folders, and users are in

    boldface. For example, log in as user root.

    Italic Book titles are in italics.

    Courier New Examples of information displayed on the screen are in

    Courier New.

    Command Conventions

    The command conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface The keywords of a command line are in boldface.

    Italic Command arguments are in italics.

    [ ] Items (keywords or arguments) in brackets [ ] are optional.

    { x | y | ... } Optional items are grouped in braces and separated by

    vertical bars. One item is selected.

    [ x | y | ... ] Optional items are grouped in brackets and separated by

    vertical bars. One item is selected or no item is selected.

    { x | y | ... }* Optional items are grouped in braces and separated by

    vertical bars. A minimum of one item or a maximum of all

    items can be selected.

    [ x | y | ... ]* Optional items are grouped in brackets and separated by

    vertical bars. Several items or no item can be selected.

    & The parameter before the & sign can be repeated 1 to n times.

    # A line starting with the # sign is comments.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration About This Document

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    3

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    16/182

    GUI Conventions

    The GUI conventions that may be found in this document are defined as follows.

    Convention Description

    Boldface Buttons, menus, parameters, tabs, window, and dialog titles

    are in boldface. For example, click OK.

    > Multi-level menus are in boldfaceand separated by the ">"

    signs. For example, choose File> Create> Folder.

    Keyboard Operations

    The keyboard operations that may be found in this document are defined as follows.

    Format Description

    Key Press the key. For example, press Enterand press Tab.

    Key 1+Key 2 Press the keys concurrently. For example, pressing Ctrl+Alt

    +Ameans the three keys should be pressed concurrently.

    Key 1, Key 2 Press the keys in turn. For example, pressing Alt, Ameans

    the two keys should be pressed in turn.

    Mouse Operations

    The mouse operations that may be found in this document are defined as follows.

    Action Description

    Click Select and release the primary mouse button without moving

    the pointer.

    Double-click Press the primary mouse button twice continuously and

    quickly without moving the pointer.

    Drag Press and hold the primary mouse button and move the

    pointer to a certain position.

    Update History

    Updates between document issues are cumulative. Therefore, the latest document issue contains

    all updates made in previous issues.

    Updates in Issue 05 (2010-01-08)

    Based on issue 04 (2009-11-10), the document is updated as follows:

    About This Document

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    4 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    17/182

    The following contents are updated:

    l The descriptions about the user level and the command level are updated.

    Updates in Issue 04 (2009-11-10)

    Based on issue 03 (2009-09-30), the document is updated as follows:

    The following contents are updated:

    l Some names of reference document are updated.

    Updates in Issue 03 (2009-09-30)

    Based on issue 02 (2009-08-15), the document is updated as follows:

    The following contents are deleted:

    l 8.4 Deleting a Configuration File: The system supports hot swap.

    Updates in Issue 02 (2009-08-15)

    Based on issue 01 (2009-07-29), the document is updated as follows:

    The following information is added:

    Managing User Login: 2.12 Limiting the Access to the TFTP Server.

    Updates in Issue 01 (2009-07-29)

    Initial commercial release.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration About This Document

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    5

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    18/182

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    19/182

    1How to Use InterfacesAbout This Chapter

    This chapter describes how to use interfaces of the device.

    1.1 Introduction to Interfaces

    This section describes the concepts of interfaces.

    1.2 Setting Parameters of an Interface

    This section describes how to set parameters of an interface.

    1.3 Configuring the Loopback Interface

    This section describes how to configure the loopback interface.

    1.4 Maintaining the Interface

    This section describes how to maintain the interface.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 1 How to Use Interfaces

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-1

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    20/182

    1.1 Introduction to Interfaces

    This section describes the concepts of interfaces.

    The interfaces are provided by the S9300 to receive and send data.

    Interfaces are classified into management interfaces and service interfaces based on their

    functions; interfaces are classified into physical interfaces and logical interfaces based on their

    physical forms.

    NOTE

    A physical interface is sometimes called a port. Both physical interfaces and logical interfaces are called

    interfaces in this document.

    Management Interface

    Management interfaces are used for managing and configuring the device. That is, you can log

    in to the S9300 through a management interface to configure and manage the S9300.

    Management interfaces do not transmit services.

    The S9300 provides the following management interfaces:

    l Console interfaces

    l Ethernet interfaces

    Table 1-1Description of management interfaces

    Name Usage

    Console interface It is connected to the COM port of a configuration terminal and used

    to set up a on-site configuration environment.

    Ethernet interface The Ethernet interface is connected to the network interface of the

    configuration terminal or the network management workstation. The

    configuration environment thus can be established on site or remotely.

    The S9300s provide three models: S9303, S9306, and S9312. Console and Ethernet interfacesare configured on the main control board.

    The rules for numbering management interfaces are as follows:

    Table 1-2Numbers of management interfaces

    Name Number

    Console interface It is a user interface that is numbered console 0.

    Ethernet interface It is numbered Ethernet 0/0/0.

    1 How to Use Interfaces

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    1-2 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    21/182

    Classification of Service Interfaces

    Service interfaces are used to transmit services. They are classified into 1-Gbit/s interfaces and

    10-Gbit/s interfaces according to the rates of the interfaces; they are classified into electrical

    interfaces and optical interfaces according to their electrical properties.

    On the S9300, all the service interfaces are located on the Line Processing Units (LPUs).

    The rules for numbering service interfaces are as follows:

    The interfaces of the S9300 are numbered in the rule of slot number/sub-card number/interface

    sequence number.

    l Slot number: indicates the number of the slot where the LPU is located.

    l Sub-card number: indicates the number of a sub-card. The value is 0 or 1.

    l Interface sequence number: indicates the sequence numbers of the interfaces that are

    located on an LPU.

    Table 1-3Rules for numbering service interfaces

    RowNo. oftheInterface

    Figure Showing Interface Numbering Description

    1 0 1 2...

    An LPU has two rows of

    interfaces, which are numbered

    from top to bottom and then from

    left to right. The leftmost interfacein the upper row is numbered 0.

    20

    1

    2

    3

    4

    5

    ...

    ...

    ...

    The LPU has two rows of

    interfaces with the upper-left

    interface numbered 0. The other

    interfaces are numbered in

    ascending order from up to bottom,

    and then from left to right.

    For example:

    If an LPU is installed in slot 3 of the S9300, the fifth interface on the LPU from bottom to up

    and from left to right is numbered GE 3/0/4.

    Physical Interfaces

    Physical interfaces exist on the S9300.

    Physical interfaces include management interfaces and service interfaces.

    The S9300 supports the following physical interfaces:

    l Console interfaces

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 1 How to Use Interfaces

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-3

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    22/182

    l Eth interface

    l Fast Ethernet interfaces

    l Gigabit Ethernet interfaces

    l

    10-Gigabit Ethernet interfaces

    Physical interfaces are located on the main control board and LPU of the S9300.

    Logical Interfaces

    Logical interfaces do not exist and are set up through configurations.

    The S9300 supports the following logical interfaces:

    l Eth-Trunks

    An Eth-Trunk comprises only Ethernet links.

    The Eth-Trunk technology has the following advantages:

    Increased bandwidth: The bandwidth of an Eth-Trunk is the total bandwidth of all

    member interfaces.

    Improved reliability: When a link fails, traffic is automatically switched to other

    available links. This ensures the reliability of the connection.

    For details about the configuration, see the chapter "Configuring the Eth-Trunk" in the

    Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet.

    l Loopback interfaces

    A loopback interface is a virtual interface. The TCP/IP protocol suite defines that the IP

    address 127.0.0.0 is a loopback address. When the system starts, it automatically creates

    an interface using the loopback address 127.0.0.1 to receive all data packets sent to the

    local host. Some applications such as mutual access between Virtual Private Networks

    (VPNs), however, need to be configured with a local interface with a specified IP address

    when the configuration of a physical interface is not affected. In this case, the IP address

    of the local interface is 32-bit mask, which saves IP addresses; the IP address can be

    advertised by routing protocols.

    The status of the loopback interface is always Up; therefore, the IP address of the loopback

    interface can be used as the router ID, the label switching router (LSR) ID, or the tunnel.

    For details, see 1.3 Configuring the Loopback Interface.

    l Null interfaces

    Null interfaces are similar to null devices supported by certain operating systems. Any data

    packets sent to this interface are discarded. Null interfaces are mainly used for routeselection and policy-based routing (PBR). For example, if no route is matched during route

    selection, the packet is sent to the null interface.

    l Tunnel interfaces

    A tunnel interface is a logical interface. It can be used as the backup interface of other

    interfaces and used to set up Generic Routing Encapsulation (GRE) tunnels or

    Multiprotocol Label Switching (MPLS) Traffic Engineering (TE) tunnels.

    For details about the configuration, see the chapter "Configuring the Tunnel Interface" in

    the Quidway S9300 Terabit Routing Switch Configuration Guide - VPN.

    l sub-interface

    The sub-interface supports multiple logical interfaces or network interconnections on aphysical port. That is, several logical interfaces are associated with a physical port and use

    1 How to Use Interfaces

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    1-4 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    23/182

    the same parameter values. The link-layer parameters and network-layer parameters of the

    logical interfaces are different.For the configuration of sub-interfaces, see "Configuring the

    sub-interface" in the Quidway S9300 Terabit Routing Switch Configuration Guide -

    Ethernet.

    l VLANIF interfacesWhen the S9300 needs to communicate with devices at the network layer, you can create

    a logical interface of the Virtual Local Area Network (VLAN) on the S9300, namely, a

    VLANIF interface. You can assign IP addresses to VLANIF interfaces because VLANIF

    interfaces work at the network layer. The S9300 then communicates with devices at the

    network layer through VLANIF interfaces.

    For details about the configuration, see the chapter "Configuring the VLANIF Interface"

    in the Quidway S9300 Terabit Routing Switch Configuration Guide - Ethernet.

    1.2 Setting Parameters of an Interface

    This section describes how to set parameters of an interface.

    1.2.1 Establishing the Configuration Task

    1.2.2 Entering the Interface View

    1.2.3 Viewing All Commands in the Interface View

    1.2.4 Configuring the Description for an Interface

    1.2.5 Startingand Shutting Down an Interface

    1.2.6 Exiting from the Interface View

    1.2.7 Assigning an IP Address to an Interface

    1.2.8 Further Configuration an Interface

    1.2.9 Checking the Configuration

    1.2.1 Establishing the Configuration Task

    Applicable Environment

    To facilitate the configuration and maintenance of an interface, the S9300 provides interface

    views. The commands related to the interface are valid only in the interface views.

    Pre-configuration Tasks

    Before setting parameters of an interface, complete the following task:

    Installing the LPU on the S9300

    Data Preparation

    To set parameters of an interface, you need the following data.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 1 How to Use Interfaces

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-5

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    24/182

    No. Data

    1 Type and number of the interface to be configured

    2 Description of the interface

    1.2.2 Entering the Interface View

    Context

    Do as follows on the S9300.

    Procedure

    Step 1 Run:system-view

    The system view is displayed.

    Step 2 Run:interfaceinterface-type interface-number

    The view of a specified interface is displayed.

    interface-typespecifies the type of the interface and interface-numberspecifies the number of

    the interface.

    ----End

    1.2.3 Viewing All Commands in the Interface View

    Context

    Do as follows on the S9300.

    Procedure

    Step 1 Run:system-view

    The system view is displayed.

    Step 2 Run:interfaceinterface-typeinterface number

    The view of a specified interface is displayed.

    Step 3 Run:?

    All the commands in the view of the specified interface are displayed.

    ----End

    1 How to Use Interfaces

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    1-6 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    25/182

    1.2.4 Configuring the Description for an Interface

    Context

    Do as follows on the S9300.

    Procedure

    Step 1 Run:

    system-view

    The system view is displayed.

    Step 2 Run:

    interfaceinterface-type interface-number

    The view of a specified interface is displayed.

    Step 3 Run:

    descriptiondescription

    The description is configured for the interface.

    The description configured for an interface on the S9300 helps you identify and memorize the

    usage of the interface, which facilitates the management.

    ----End

    1.2.5 Starting and Shutting Down an Interface

    Procedure

    l Shutting down the interface

    Do as follows on the S9300.

    1. Run:

    system-view

    The system view is displayed.

    2. Run:

    interfaceinterface-type interface-number

    The view of a specified interface is displayed.

    3. Run:

    shutdown

    The interface is shut down.

    NOTE

    By default, an interface is enabled.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 1 How to Use Interfaces

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-7

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    26/182

    CAUTION

    When a physical interface is idle and is not connected to a cable, shut down this interface

    by using the shutdowncommand to protect the interface against interference.

    l Starting an interface

    Do as follows on the S9300.

    1. Run:

    system-view

    The system view is displayed.

    2. Run:

    interfaceinterface-type interface-number

    The view of a specified interface is displayed.

    3. Run:

    undo shutdown

    The interface is started.

    ----End

    1.2.6 Exiting from the Interface View

    ContextDo as follows on the S9300.

    Procedure

    l Run the quitcommand in the interface view to exit form the interface view.

    l Run the returncommand in the interface view to return the user view from the interface

    view.

    ----End

    1.2.7 Assigning an IP Address to an Interface

    Context

    You need to assign IP addresses to the following interfaces on the S9300:

    l Ethernet interfaces on the main control board

    The interfaces work at the network layer, and do not need to be assigned with IP addresses

    through VLANIF interfaces.

    l VLANIF interfaces

    You can assign IP addresses to the VLANIF interfaces that are bound to Layer 2 physicalinterfaces.

    1 How to Use Interfaces

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    1-8 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    27/182

    Procedure

    l Assigning an IP address to the Ethernet interface

    Do as follows on the S9300.

    1. Run:system-view

    The system view is displayed.

    2. Run:

    interface Ethernet 0/0/0

    The interface view is displayed.

    3. Run:

    ip addressip-address { mask| mask-length}

    An IP address is assigned to the Ethernet interface.

    l Assigning an IP address to the VLANIF interface

    Do as follows on the S9300.

    1. Run:

    system-view

    The system view is displayed.

    2. Run:

    vlanvlan-id

    The VLAN view is displayed.

    3. Run:

    port gigabitethernetinterface-number

    The Layer 2 GE interface is added to the VLAN.

    4. Run:

    quit

    Return to the system view.

    5. Run:

    interface vlanifvlan-id

    The VLANIF interface view is displayed.

    6. Run:

    ip address ip-address { mask| mask-length}

    An IP address is assigned to the interface.

    ----End

    1.2.8 Further Configuration an Interface

    Context

    When you access a network through an interface, you need to further setting multiple parameters

    of the interface based on the networking requirements in addition to performing basicconfigurations on the interface.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 1 How to Use Interfaces

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-9

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    28/182

    Further configurations of an interface include:

    l Configuring the operation mode of an interface

    l Configuring routes

    For the detailed Configuration, please see the other configuration manuals of S9300.

    1.2.9 Checking the Configuration

    Prerequisite

    The configurations of parameters on the interface are complete.

    Procedure

    Step 1 Run the displayinterface[ interface-type[ interface-number] ] [ | { begin| exclude|

    include} regular-expression] command to check the running status of the interface and thestatistics on the interface.

    Step 2 Run the displayinterface briefcommand to check the brief information about the interface

    Step 3 Run the display interface descriptioncommand to check the description of the interface.

    Step 4 Run the display ip interface[ interface-typeinterface-number] commandto check the mainconfigurations of the interface.

    Step 5 Run the display ip interface brief[ interface-typeinterface-number] command to check thebrief state of the interface.

    ----End

    1.3 Configuring the Loopback Interface

    This section describes how to configure the loopback interface.

    1.3.1 Establishing the Configuration Task

    1.3.2 Configuring IPv4 Parameters of the Loopback Interface

    1.3.3 Checking the Configuration

    1.3.1 Establishing the Configuration Task

    Applicable Environment

    Some applications such as mutual access between VPNs need to be configured with a local

    interface with a specified IP address when the configuration of a physical interface is not affected.

    In this case, the IP address of the local interface needs to be advertised by routing protocols.

    Loopback interfaces are used to improve the reliability of the configuration.

    Pre-configuration Tasks

    Before configuring the loopback interface, complete the following task:

    1 How to Use Interfaces

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    1-10 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    29/182

    l Switching on the S9300

    Data Preparation

    To configure the loopback interface, you need the following data.

    No. Data

    1 Number of the loopback interface

    2 IP address of the loopback interface

    1.3.2 Configuring IPv4 Parameters of the Loopback Interface

    Context

    Do as follows on the S9300.

    Procedure

    Step 1 Run:system-view

    The system view is displayed.

    Step 2 Run:interfaceloopbackinterface-number

    A loopback interface is created.

    The value of interface-numberranges from 0 to 1023. A maximum of 1024 loopback interfaces

    can be created.

    Step 3 (Optional) Run:ipbindingvpn-instancevpn-instance-name

    The loopback interface is bound to the VPN instance.

    Step 4 Run:ipaddressip-addressip-address-mask[ sub]

    An IPv4 address is assigned to the loopback interface.

    Step 5 Run:ipverifysource-address

    The loopback interface is configured to check the source IPv4 address.

    NOTE

    You can create or delete a loopback interface. When being created, the loopback interface remains in the

    Up state until you delete it.

    ----End

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 1 How to Use Interfaces

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-11

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    30/182

    1.3.3 Checking the Configuration

    Prerequisite

    The configurations of the loopback interface are complete.

    Procedure

    Step 1 Run the display interface loopback [ loopback-number] [ | { begin| exclude| include}regular-expression] command to check the status of the loopback interface.

    Step 2 Run the display ip interface[ interface-typeinterface-number] command to check the mainconfigurations of the interface.

    ----End

    1.4 Maintaining the Interface

    This section describes how to maintain the interface.

    1.4.1 Clearing Statistics Information on the Interface

    1.4.2 Debugging the Interface

    1.4.1 Clearing Statistics Information on the Interface

    Context

    CAUTION

    The statistics on the interface cannot be restored after you clear them. So, confirm the action

    before you use the command.

    Procedure

    Step 1 Run the resetcountersinterface[ interface-type[ interface-number] ] command in the userview to clear the statistics on the interface.

    ----End

    1.4.2 Debugging the Interface

    1 How to Use Interfaces

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    1-12 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    31/182

    Context

    CAUTION

    Debugging affects the performance of the system. So, after debugging, run the undo debugging

    allcommand to disable it immediately.

    For the description about debugging commands, see the Quidway S9300 Terabit Routing

    Switch Debugging Reference.

    For details about debugging commands on the interface, see the following chapters.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 1 How to Use Interfaces

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    1-13

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    32/182

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    33/182

    2User Login ManagementAbout This Chapter

    This chapter describes how to log in to the S9300 and configure the user interface.

    2.1 Overview of User Login

    This section describes the modes of user login and application scenarios.

    2.2 Logging In to the S9300 Through the Console Interface

    This section describes how to log in to the S9300 through the console interface.

    2.3 Configuring the Console Interface as the User Interface

    This section describes how to configure the console interface as the user interface.

    2.4 Configuring the Telnet Interface

    This section describes how to configure the Telnet interface.

    2.5 Logging In to the S9300 Locally Through Telnet

    This section describes how to log in to the S9300 locally through Telnet.

    2.6 Logging In to the S9300 Remotely Through Telnet

    This section describes how to log in to the S9300 remotely through Telnet.

    2.7 Configuring the SSH Interface

    This section describes how to configure the SSH interface.

    2.8 Logging In to the S9300 Through SSH

    This section describes how to log in to the S9300 through SSH.

    2.9 Configuring the FTP Interface

    This section describes how to configure the FTP interface.

    2.10 Logging In to the S9300 Through FTP

    This section describes how to log in to the S9300 through FTP.

    2.11 S9300 Logging In to the TFTP Service Through TFTP

    This section describes how S9300 logs in to the TFTP service through TFTP.

    2.12 Limiting the Access to the TFTP Server

    This section describes how to limit the access to the client to log in to the TFTP server.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 2 User Login Management

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    2-1

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    34/182

    2.13 Logging In to the S9300 Through SFTP

    This section describes how to log in to the S9300 through SFTP.

    2.14 Logging In to the S9300 Through STelnet

    This section describes how to log in to the S9300 through STelnet.

    2.15 Configuring the NMS User to Log In to the S9300 Through the VTY Interface

    This section describes how to configure the NMS user to log in to the S9300 through the VTY

    interface.

    2.16 Maintaining Telnet

    This section describes how to maintain Telnet.

    2.17 Configuration Examples

    This section provides several configuration examples of Telnet.

    2 User Login Management

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    2-2 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    35/182

    2.1 Overview of User Login

    This section describes the modes of user login and application scenarios.

    2.1.1 User Login Modes

    2.1.2 User Interface

    2.1.3 User Authentication

    2.1.1 User Login Modes

    To configure, monitor, and maintain the local or remote S9300, you need to log in to the

    S9300 to configure:

    l User interface where users can control the S9300

    l Authentication mode that ensures the secure login

    l Terminal services that provide various protocols

    NOTE

    You must log in to the S9300 from the console interface for the first time.

    The S9300 supports the following login modes:

    l Login from the console interface

    l Login through Telnet

    l Login through SSH

    l Login through STelnet

    l Login through SFTP

    l Login through FTP

    l Login through TFTP

    For details, see Table 2-1.

    Table 2-1User login modes

    LoginMode

    Applicable Scenario User Type Description

    2.2

    Logging

    In to the

    S9300

    Through

    the

    Console

    Interface

    l Logging in to the

    S9300 for the first time

    l Local maintenance

    2.3 Configuring the

    Console Interface as

    the User Interface

    You must log in to the

    S9300 for the first time.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 2 User Login Management

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    2-3

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    36/182

    LoginMode

    Applicable Scenario User Type Description

    2.5

    Logging

    In to the

    S9300

    Locally

    Through

    Telnet

    Logging in to the S9300

    locally and remotely

    2.4 Configuring the

    Telnet Interface

    You can log in to the

    S9300 from any host.

    You can configure

    Telnet users and Telnet

    terminal services on the

    S9300 that functions as

    the Telnet server.

    2.8

    Logging

    In to the

    S9300

    Through

    SSH

    Providing local and

    remote login with high

    security

    2.7 Configuring the

    SSH Interface

    You need to use the SSH

    client software when

    you log in to the route

    switching devices such

    as the S9300 from the

    host.You can configure

    Secure Shell (SSH)

    users on the S9300 that

    functions as the server.

    2.10

    Logging

    In to the

    S9300

    Through

    FTP

    Providing flexible and

    reliable file transfer

    channels

    2.9 Configuring the

    FTP Interface

    You need to enable the

    File Transfer Protocol

    (FTP) function and

    configure FTP users on

    the S9300 that functions

    as the FTP server.

    2.11

    S9300

    Logging

    In to the

    TFTP

    Service

    Through

    TFTP

    Providing simple file

    transfer channels

    Trivial File Transfer

    Protocol (TFTP) users

    You do not need to

    configure the user

    interface.

    The S9300 acts as only a

    TFTP client.

    2.13

    Logging

    In to the

    S9300

    Through

    SFTP

    Providing file transfer

    channels with SSH as the

    authentication mode

    2.7 Configuring the

    SSH Interface

    You need to adopt the

    authentication mode of

    SSH users, without

    using the SSH client

    software.

    You must log in to the

    SSH server through this

    mode on the device that

    is configured with 5.4

    Configuring the SFTP

    Client.

    2 User Login Management

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    2-4 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    37/182

    LoginMode

    Applicable Scenario User Type Description

    2.14

    Logging

    In to the

    S9300

    Through

    STelnet

    Login through Telnet

    with SSH as the

    authentication mode

    2.7 Configuring the

    SSH Interface

    You need to adopt the

    authentication mode of

    SSH users, without

    using the SSH client

    software.

    You must log in to the

    SSH server through this

    mode on the device that

    is configured with 5.3

    Configuring the

    STelnet Client.

    You need to manage users and control user authority properly and ensure the security of the

    information transmitted.

    Telnet Terminal Services

    The Telnet protocol is an application layer protocol in the TCP/IP protocol suite. It supports

    remote login and virtual terminal services through the TCP connection. The S9300 provides the

    following Telnet services.

    l Telnet server

    By default, the S9300 functions as the Telnet server. The Telnet client program runs on theuser terminal.

    Figure 2-1Networking diagram of the S9300 acting as the Telnet server

    PC

    Telnet

    ClientTelnet

    Server

    S9300

    Telnet Session

    VLAN1

    Ethernet EthernetL2 Switch

    You can log in to the S9300 on the PC through Telnet to configure and manage the

    S9300. A reachable route must exist between the PC and the S9300.

    NOTE

    To configure the remote S9300, you must set the attributes of the Telnet terminal service, including:

    l Character entry mode

    l No echo at the local end

    l Terminal type of VT100

    Telnetworks normally only when the attributes of the client and server are the same.

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration 2 User Login Management

    Issue 05 (2010-01-08) Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    2-5

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    38/182

    l Telnet client

    The S9300 functions as the Telnet client to initiate a connection, and a router or an

    application server functions as the Telnet server, as shown in Figure 2-2.

    Figure 2-2Networking diagram of the S9300 acting as the Telnet client

    IP network

    S9300

    Telnet

    Client

    Router

    TelnetServer

    Server

    Telnet Sess ion1TelnetServer

    Telnet Sess ion2

    Ethernet

    The S9300 logs in to the router or the application server through Telnet to perform

    configuration and management. A route be reachable must exist between the S9300 and

    the router or the application server.

    l Cascading Telnet server

    As shown in Figure 2-3, the S9300 can function as both the client and the server.

    Figure 2-3Networking diagram of the S9300 acting as the cascading Telnet server

    TelnetClient TelnetServer

    S9300-CS9300-A S9300-BEthernet

    Telnet Session2

    VLAN1 VLAN2

    Ethernet

    Telnet Session1

    S9300-A logs in to S9300-B through Telnet. Then, S9300-B logs in to S9300-C through

    Telnet. In this manner, the three S9300s form a cascading login structure. In this case,

    S9300-A functions as the client of S9300-B and S9300-B functions as the client of

    S9300-C.

    It is required that routes be reachable between S9300-A, S9300-B, and S9300-C.

    TFTP

    Compared with FTP, TFTP is based on UDP. It excludes the interfaces for complicated

    interactions or access and authentication control. Thus, TFTP is applicable to the environment

    without complicated interactions between a client and a server. For example, you can obtain

    memory mapping of the system through TFTP when the system is started.

    The client initiates the TFTP transfer. To download files, the client sends a Write Request (WRQ)to the server. The server then sends data packets to the client. After receiving the data packets,

    2 User Login Management

    Quidway S9300 Terabit Routing Switch

    Configuration Guide - Basic Configuration

    2-6 Huawei Proprietary and Confidential

    Copyright Huawei Technologies Co., Ltd.

    Issue 05 (2010-01-08)

  • 7/26/2019 Configuration Guide - Basic Configuration(V100R002C00_05).pdf

    39/182

    the client sends an ACK packet to the server. To upload files, the client sends a Read Request

    (RRQ) to the server. After the server receives the request, the client sends a data packet to the

    server and waits for an ACK packet from the server.

    TFTP supports the following file types:

    l Binary type: is used to transfer program files.

    l ASCII type: is used to transfer text files.

    NOTE

    Cur