Huawei v200r001 user manual Chapter

Page 118

User Manual - Configuration Guide (Volume 3)

Chapter 1

Versatile Routing Platform

DDR Configuration

2)Use Legacy DDR to configure PPP callback

The configurations of Client end are shown in the following table.

1-16

Image 118
Contents Huawei V200R001Manual Version T2-080168-20011213-C-1.5 BOM31010868Contents About This ManualKey 1 + Key Format Description KeyBracket, e.g. Enter , Tab , Backspace , or a Key 1, KeySymbol Action DescriptionSecurity Configuration SC HuaweiConfiguration of IKE II. IKE featuresIKE Configuration Task List Creating IKE Security PolicyNo IKE security policy is created by default Select Authentication AlgorithmSelect Encryption Algorithm Select Hashing Algorithm Set Pre-shared KeySelect DH Group ID Set Lifetime of IKE Association SA Show IKE SA parameter Quidway# show crypto ike saNetworking requirements Show IKE security policy Quidway# show crypto ike policyII. Networking diagram III. Configuration procedureProblem 1 Invalid user ID information VPN Configuration VPN Table of Contents VPN features VPN OverviewAccording to operation mode Classification of IP VPNII. According to the layer where the tunnel is III. According to service purposeIV. According to networking model Overview of Vpdn Configuration of L2TPBrief Introduction to L2TP Protocol Brief induction to VpdnIII. Method to realize Vpdn 2 L2TP ProtocolTunnel and session II. Control message and data message III. Two typical L2TP tunnel modesIV. Call setup flow of L2TP tunnel Call setup flow of L2TP channel is shown in the followingFeatures of L2TP protocol Figure VPN-2-3Call setup flow of L2TP channel1 L2TP Configuration Task List Configuring L2TPConfiguring at LAC Side Disable Vpdn to run by default II. Create Vpdn groupIV. Set the connection request to originate L2TP channel Configuring at LNS SideDisable Vpdn running by default Table VPN-2-4L2TP attribute tableAccept dialin l2tp virtual-template virtual III. Create/delete virtual interface templateNo vpdn group group-number No accept dialinIII. Force local end to perform Chap authentication Optional configurationSet local name of channel IV. LNS forces LCP to renegotiate Local end does not perform Chap authentication by defaultLCP does not renegotiate by default Set domain name delimiter and search sequenceVII. Enable/disable hiding AV pairs Disable hiding AV pairs by defaultMonitoring and Maintenance of L2TP VIII. Force to disconnect tunnelNAS-Initialized VPN Typical Configuration of L2TPShow l2tp session command domain Networking requirementIII. Configuration procedure Figure VPN-2-5Networking diagram of Client-Initialized VPN Client-Initialized VPNSingle User Interconnects Headquarters via Router Chapter Fault Diagnosis of L2TP Brief Introduction to GRE Protocol Configuration of GREBrief introduction to the protocol II. Applicable range Figure VPN-3-2Format of transmission message in the tunnelConfiguring GRE GRE Configuration Task ListSetting the Destination Address of Tunnel Interface Setting the Source Address of Tunnel InterfaceCreating Virtual Tunnel Interface Setting the Identification Key Word of Tunnel Interface Setting the Network Address of Tunnel InterfaceSetting the Encapsulation Mode of Tunnel Interface Message Setting Tunnel Interface to Check with Check SumDisable tunnel interface to check with check sum by default Monitoring and Maintenance of GREShow interface tunnel tunnel-number Typical Configuration of GRE Figure VPN-3-6Networking diagram of GRE applicationChapter Troubleshooting GRE Reliability Configuration LC Configuration of Backup Center Configuration of HsrpConfiguring the Backup Center Configuration of Backup CenterBackup Center Overview Configuration Task ListBackup logic-channel logic-channel No backup delay Backup state-down number Configuring Routes for Main and Backup InterfacesBackup state-up interval-time An example of Backup Between Interfaces Monitoring and Maintaining of Backup CenterTypical Configuration of Backup Center An Example of Multiple Backup InterfacesChapter Chapter Configuration of Hsrp Hsrp OverviewConfiguring Hsrp Starting Hsrp FunctionSetting Hsrp Authorization Word Setting Router’s Priority in Hsrp Hot Standby GroupSetting Router’s Preemption Mode in Hsrp Standby Group Standby group-number preemptStandby group-numberauthentication string Setting Hsrp TimerTable LC-2-4Set Hsrp authorization word Monitoring the Specified InterfaceModifying Virtual MAC Address Using Actual Interface MAC AddressTable LC-2-6Monitor the specified interface Monitoring and Maintaining Hsrp Typical Configurations of HsrpAn example for single hot standby group configuration Show relevant Hsrp information Quidway# show standby202.38.160.111 An example for setting Hsrp to monitor a specified interface An example for multiple hot standby groups configuration Fault Diagnosis and Troubleshooting of Hsrp QoS Configuration QC Configure CAR Rules Based on the MAC Address CAR Configuration ExampleApply CAR Rules to Packets Which is Matched the ACL II.Integrated Service Three service types of QoSBest-effort Service QoS OverviewIII. Differentiated Service Functions of QoSChapter Traffic Classification and Policing II. CAR Committed Access RateTraffic Classification and Policing Introduction to Traffic ClassificationFeatures of Token Bucket Introduction to Traffic PolicingII.Traffic Measuring with Token Bucket Introduction to CARIII Complicacy Evaluation No CAR rule is specified by default CAR ConfigurationCAR Configuration Task List Specify CAR rulesApply the CAR Rule on the Interface Monitoring and Maintenance of CARTable QC-2-3Monitoring and maintenance of CAR Show CAR statistics Quidway# show car interface serialApplying CAR Rules to All Packets CAR Configuration ExampleII.Configuration RequirementsIII. Configuration Apply CAR Rules to Packets Which is Matched the ACLConfigure CAR Rules Based on the MAC Address Configure CAR Rules Based on the Priority LevelII.Networking diagram Chapter About Congestion Congestion ManagementCongestion and Congestion Management Congestion Management PolicyII. PQ Priority Queuing IV. WFQ Weighted Fair QueuingFifo Queuing III. CQ Custom QueuingSelecting Congestion Management Policy Working Principle of Congestion Management Policy No. Advantages Disadvantages QueueFifo III. CQ Configuring PQ Configuration of Congestion ManagementPQ Configuration task list II. Configuring priority queue Priority-list list-number interface type number high medium Normal lowIII. Applying priority queue to the interface Table QC-3-7Configuration of queue length of priority queueInterface adopts Fifo queuing by default IV. Maintaining and monitoring the priority queueCQ configuration task list Configuring CQII. Configuring the custom queue Operation Command Configure the default custom queue No custom-list list-number interface type numberCustom-list list-number queue queue-number byte-count III. Applying custom queue to the interfaceNo custom-list list-number queue queue-number limit No custom-list list-number queue queue-number byte-countII. Configuring the weighted fair queue Configuring WFQWFQ configuration task list III. Maintenance and monitoring of the weighted fair queuePQ Configuration Example Configuration Example of Congestion ManagementCQ Configuration Example Figre QC-3-6Networking diagram of CQ Configuration Versatile Routing Platform Troubleshooting of Congestion Management DDR Configuration DC DDR Configuration Configuring Synchronous/Asynchronous Serial Port Using DDRDDR in Which the Router Calls Back PC Configuration of Modem Management Brief Introduction to Dial Configuration DDR ConfigurationIntroduction to DDR Technology Preparing DDR Configuration Figure DC-1-1DDR configuration preparation flowConfiguration tasks of Legacy DDR include Configuring DDRConfiguring Legacy DDR II. Configure an interface to send callsDialer string dial-string isdn-address Dialer rotary-group number III. Configure an interface to receive calls Figure DC-1-2Schematic diagram of Dialer Rotary GroupIV. Configure an interface to send and receive calls Versatile Routing Platform DDR ConfigurationSet the attribute parameters of Legacy DDR Table DC-1-13Set the idle time of busy interface Access-list access-list-number deny permit Table DC-1-16Set access control of the dial interfaceAccess-list access-list-numberdeny permit Permit denyDefault interval is 300 seconds Configuring Dialer ProfileIntroduction to Dialer Profile III. Configure a logic dial interface II. Configuration task list of Dialer ProfileIV. Set the attribute parameters of a dial interface Significance of callback Configuring CallbackBind physical interfaces for a dialer pool II. Terms and abbreviationsOr dialer caller remote-number IV. Configure Isdn calling line identification callbackDialer caller remote-number callback Interface dialerConfigure PPP callback User name callback-dialstring telephone-numberChapter Table DC-1-28Client end using Legacy DDR to configure PPP Configuring DDR Special Functions Configure Isdn dedicated lineIII. Configure cyclic use of dialer map II. Configure autodialAutodial interval is 300 seconds by default Table DC-1-34Configure cyclic use of dialer map Monitoring and Maintenance of DDRName Meaning Legacy DDR DDR Typical Configuration ExampleNetwork requirements Chapter Dialer Profile Chapter II. Configuration procedure Networking diagramPoint-to-Point DDR Chapter Chapter Point-to-Multipoint DDR 8810063Chapter Chapter 8810052 Multipoint-to-Multipoint DDR8810148 III. Configuration procedure Chapter Chapter Chapter Chapter DDR Bearing IPX Chapter Chapter Chapter DDR Bearing IP and IPX at the Same Time Chapter Chapter Chapter 2.2 Flow Control of Dialer Profile MP over Dialer Profile-CaseRouterA RouterB BRI0 661012Chapter Figure DC-1-11Networking diagram of DDR Case Channels for Dial-up and Connection to the Remote End CaseChapter Two Serial Ports for Dial-up and Remote Dial Connection Case One Serial Port for Dial-up and Remote Dial Connection Case Chapter DDR for Access Service Chapter Chapter Chapter Chapter DDR for Inter-Router Callback Chapter DDR in Which the Router Calls Back PC III. Configuration procedure DDR for Autodial DDR Using Dialer Map Cyclically DDR Using Dialer Map as Backup Solution 1 Logical interface as backup interfaceChapter Configuring Dialer-group Precautions for DDR ConfigurationConfiguring Synchronous/Asynchronous Serial Port Using DDR Configuring Network Layer Address Configuring PPP In Dialer Profile Configuration Mode Apply PAP authenticationChapter II. Apply Chap authentication Chapter Configuring PPP In Legacy DDR Configuration Mode Chapter II. Apply Chap authentication Chapter DDR Fault Diagnosis Troubleshooting DDRConfigure Dialer-list Whether modem is normalIII. Check whether dialer-group is configured IV. Check whether dialer-list is configured correctly Chapter DDR Fault Elimination How to acquire DDR debugging information Troubleshooting with DDR Debugging InformationInformation displayed at the calling end Information displayed at the call receiving end DDR link negotiation Down on interface Modem Script Configuration of Modem ManagementModem Management Functions Provided by VRP1.4 FunctionTimeout seconds Key words DescriptionConfiguring Modem Call-In and Call-Out Authorities Configuring Modem ManagementModem Management Configuration Task List Configuring Modem ScriptExecuting Modem Script Manually Configuring Modem Answer ModeSpecifying the Event to Trigger Modem Script Typical Configuration of Modem Management Managing Modem with Modem ScriptNetworking requirements Router Initialization with Initialization Script Configuration requirementsDirect Dial with Script Interactively Connect Cisco Router Through Modem VoIP Configuration VC VoIP Configuration IP Fax ConfigurationGK Client Configuration E1 Voice ConfigurationIphc Configuration Versatile Routing Platform Table of Contents VoIP Configuration VoIP OverviewBasic composition VoIP PrincipleII. H.323 protocol stack IP Voice Implementation over VRP III. a typical telephone call processing by VoIPIP Voice Feature over VRP Switch Router Capacity channelChapter VoIP Configuration Task List Configuring Dial-peerPots dial-peer configuration II. VoIP dial-peer configurationConfiguring Dial Terminator Ip precedence priority-numberBy default, we do not configure the dial terminator Configuring Abbreviated DialingConfiguring Voice Port By default, we do not configure the abbreviated dialingTable VC-1-6Configuring voice-port Configuring the Recovery Method of Voice Board Configuring Global Number Match PolicyBy default, please use the shortest number match policy VoIP Monitoring and Maintenance By default, Watchdog is enabledKHT Rcvccactivecall Channel = Status = Chtransframe Typical VoIP Configuration Examples Configuring Router FXS Port for InterconnectionIII. Configuration procedures Shanghai Chapter Figure VC-1-7RouterShenzhen FXO works in the Plar mode LAN VoIP Troubleshooting III. Configuration descriptionTask List of IP Fax Configuration IP Fax ConfigurationConfiguring IP Fax Overview to IP FaxConfiguring Fax Rate Checking If Configuring Fax to Use ECM ModeGateway does not use ECM mode by default By default, the fax rate will be determined by voice mode Configuring Fax Train ModeConfiguring Fax Local-train Threshold Value Mode is local-train mode local by defaultNo fax protocol t38 ls-redundancy Configuring Gateway Carrier Transmit Energy LevelFax protocol t38 ls-redundancy number Fax protocol t38 hs-redundancy numberBy default, T.38 protocol is used Monitoring and Maintenance of IP FaxBy default, rtp protocol is used Typical Configuration of IP Fax Versatile Routing Platform IP Fax ConfigurationChapter Function of E1 Voice E1 Voice ConfigurationOverview of E1 Voice Configuration Usage of cE1/PRI InterfaceII. Protocols and standards supported Features of E1 VoiceSignaling modes supported III. Support single stage dialing and two-stage dialingConfiguring Pots dial-peer E1 Voice ConfigurationConfiguration Task List of E1 Voice IV. Integrated transmission of voice and dataIncoming called-number number Configuring VoIP dial-peerTable VC-3-1Configuration Commands of Pots dial-peer No incoming called-numberConfiguring the Basic Parameters of E1 Interface Table VC-3-2Configuration Commands of VoIP dial-peerConfiguring Voice Port E1 Interface Table VC-3-3Configuration Commands of E1 InterfaceConfiguring DS0 group Configuring E1 Voice R2 SignalingTable VC-3-4Configuration Commands of E1 Voice Port II. Configuring Related Parameters of R2 Signaling By default, the system has not created any DS0 groupTable VC-3-6Configuration Commands of R2 Signaling No pri-group Configuring the Basic Parameters of Isdn PRI InterfacePri-group timeslots timeslots-list Interface serial serial-noConfiguring Voice Port Isdn PRI Interface Monitoring and Maintenance of E1 VoiceMaintaining the MFC Channel and Circuit of the Specified TS II. show Command Related to E1 Voice Quidway# show voice-port III. debug Commands Related to E1 Voice R2 signalling call statisticsTable VC-3-11debug Commands of E1 Voice Typical Configuration Examples of E1 VoiceRouter Connected to PBX through E1 Voice Port Versatile Routing Platform Router Connected to PBX in Isdn PRI Mode Two-stage Dialing Configuration II. Netwoking diagram Parameter configuration of Beijing-side router Transmission of Data and Voice SimultaneouslyFault Diagnosis and Troubleshooting of E1 Voice Configuration Task List of GK Client GK Client ConfigurationConfiguration of GK Client Configuring One Interface as H.323 Gateway InterfaceBy default, GK Client function is deactivated Configuring Gateway AliasConfigure the GK Server Name and Address Activating or Deactivate GK Client FunctionConfiguring GK Interworking Mode Configuring Tech-PrefixBy default, there is not any tech-prefix Be default, the GK interworking mode is cisco mode Typical Configuration Examples of GK ClientVersatile Routing Platform GK Client Configuration Chapter Fault Diagnosis and Troubleshooting of GK Client Iphc Configuration Overview of IphcEnable/disable RTP header compression Iphc ConfigurationConfiguration Task List of Iphc No ip rtp compression-connectionsBy default, the udpchk field in UDP packet field is set to Configure the Cisco-compatible RTP header compressionConfigure the deleting of udpchk field from UDP header No ip tcp header-compressionMonitoring and Maintenance of Iphc Table VC-5-6Monitoring and Maintenance of IphcHow Are We Doing Excellent Good Fair PoorMistake Suggested Correction Line No
Related manuals
Manual 13 pages 6.76 Kb