V200R001
Huawei
BOM31010868
Manual Version T2-080168-20011213-C-1.5
About This Manual
Contents
Bracket, e.g. Enter , Tab , Backspace , or a
Format Description Key
Key 1 + Key
Key 1, Key
Action Description
Symbol
Huawei
Security Configuration SC
II. IKE features
Configuration of IKE
Creating IKE Security Policy
IKE Configuration Task List
Select Encryption Algorithm
Select Authentication Algorithm
No IKE security policy is created by default
Select DH Group ID
Set Pre-shared Key
Select Hashing Algorithm
Show IKE SA parameter Quidway# show crypto ike sa
Set Lifetime of IKE Association SA
Show IKE security policy Quidway# show crypto ike policy
Networking requirements
III. Configuration procedure
II. Networking diagram
Problem 1 Invalid user ID information
VPN Configuration VPN
Table of Contents
VPN Overview
VPN features
Classification of IP VPN
According to operation mode
III. According to service purpose
II. According to the layer where the tunnel is
IV. According to networking model
Brief Introduction to L2TP Protocol
Configuration of L2TP
Overview of Vpdn
Brief induction to Vpdn
Tunnel and session
2 L2TP Protocol
III. Method to realize Vpdn
III. Two typical L2TP tunnel modes
II. Control message and data message
Call setup flow of L2TP channel is shown in the following
IV. Call setup flow of L2TP tunnel
Figure VPN-2-3Call setup flow of L2TP channel
Features of L2TP protocol
Configuring at LAC Side
Configuring L2TP
1 L2TP Configuration Task List
II. Create Vpdn group
Disable Vpdn to run by default
Disable Vpdn running by default
Configuring at LNS Side
IV. Set the connection request to originate L2TP channel
Table VPN-2-4L2TP attribute table
No vpdn group group-number
III. Create/delete virtual interface template
Accept dialin l2tp virtual-template virtual
No accept dialin
Set local name of channel
Optional configuration
III. Force local end to perform Chap authentication
LCP does not renegotiate by default
Local end does not perform Chap authentication by default
IV. LNS forces LCP to renegotiate
Set domain name delimiter and search sequence
Disable hiding AV pairs by default
VII. Enable/disable hiding AV pairs
VIII. Force to disconnect tunnel
Monitoring and Maintenance of L2TP
Show l2tp session command domain
Typical Configuration of L2TP
NAS-Initialized VPN
Networking requirement
III. Configuration procedure
Client-Initialized VPN
Figure VPN-2-5Networking diagram of Client-Initialized VPN
Single User Interconnects Headquarters via Router
Chapter
Fault Diagnosis of L2TP
Brief introduction to the protocol
Configuration of GRE
Brief Introduction to GRE Protocol
Figure VPN-3-2Format of transmission message in the tunnel
II. Applicable range
GRE Configuration Task List
Configuring GRE
Creating Virtual Tunnel Interface
Setting the Source Address of Tunnel Interface
Setting the Destination Address of Tunnel Interface
Setting the Encapsulation Mode of Tunnel Interface Message
Setting the Network Address of Tunnel Interface
Setting the Identification Key Word of Tunnel Interface
Setting Tunnel Interface to Check with Check Sum
Show interface tunnel tunnel-number
Monitoring and Maintenance of GRE
Disable tunnel interface to check with check sum by default
Figure VPN-3-6Networking diagram of GRE application
Typical Configuration of GRE
Chapter
Troubleshooting GRE
Reliability Configuration LC
Configuration of Hsrp
Configuration of Backup Center
Backup Center Overview
Configuration of Backup Center
Configuring the Backup Center
Configuration Task List
Backup logic-channel logic-channel
No backup delay
Backup state-up interval-time
Configuring Routes for Main and Backup Interfaces
Backup state-down number
Typical Configuration of Backup Center
Monitoring and Maintaining of Backup Center
An example of Backup Between Interfaces
An Example of Multiple Backup Interfaces
Chapter
Chapter
Hsrp Overview
Configuration of Hsrp
Starting Hsrp Function
Configuring Hsrp
Setting Router’s Preemption Mode in Hsrp Standby Group
Setting Router’s Priority in Hsrp Hot Standby Group
Setting Hsrp Authorization Word
Standby group-number preempt
Table LC-2-4Set Hsrp authorization word
Setting Hsrp Timer
Standby group-numberauthentication string
Monitoring the Specified Interface
Table LC-2-6Monitor the specified interface
Using Actual Interface MAC Address
Modifying Virtual MAC Address
An example for single hot standby group configuration
Typical Configurations of Hsrp
Monitoring and Maintaining Hsrp
Show relevant Hsrp information Quidway# show standby
202.38.160.111
An example for setting Hsrp to monitor a specified interface
An example for multiple hot standby groups configuration
Fault Diagnosis and Troubleshooting of Hsrp
QoS Configuration QC
Apply CAR Rules to Packets Which is Matched the ACL
CAR Configuration Example
Configure CAR Rules Based on the MAC Address
Best-effort Service
Three service types of QoS
II.Integrated Service
QoS Overview
Functions of QoS
III. Differentiated Service
Chapter
Traffic Classification and Policing
II. CAR Committed Access Rate
Traffic Classification and Policing
Introduction to Traffic Classification
Introduction to Traffic Policing
Features of Token Bucket
III Complicacy Evaluation
Introduction to CAR
II.Traffic Measuring with Token Bucket
CAR Configuration Task List
CAR Configuration
No CAR rule is specified by default
Specify CAR rules
Table QC-2-3Monitoring and maintenance of CAR
Monitoring and Maintenance of CAR
Apply the CAR Rule on the Interface
Show CAR statistics Quidway# show car interface serial
II.Configuration
CAR Configuration Example
Applying CAR Rules to All Packets
Requirements
Apply CAR Rules to Packets Which is Matched the ACL
III. Configuration
II.Networking diagram
Configure CAR Rules Based on the Priority Level
Configure CAR Rules Based on the MAC Address
Chapter
Congestion and Congestion Management
Congestion Management
About Congestion
Congestion Management Policy
Fifo Queuing
IV. WFQ Weighted Fair Queuing
II. PQ Priority Queuing
III. CQ Custom Queuing
Selecting Congestion Management Policy
No. Advantages Disadvantages Queue
Working Principle of Congestion Management Policy
Fifo
III. CQ
PQ Configuration task list
Configuration of Congestion Management
Configuring PQ
II. Configuring priority queue
Normal low
Priority-list list-number interface type number high medium
Interface adopts Fifo queuing by default
Table QC-3-7Configuration of queue length of priority queue
III. Applying priority queue to the interface
IV. Maintaining and monitoring the priority queue
II. Configuring the custom queue
Configuring CQ
CQ configuration task list
No custom-list list-number interface type number
Operation Command Configure the default custom queue
No custom-list list-number queue queue-number limit
III. Applying custom queue to the interface
Custom-list list-number queue queue-number byte-count
No custom-list list-number queue queue-number byte-count
WFQ configuration task list
Configuring WFQ
II. Configuring the weighted fair queue
III. Maintenance and monitoring of the weighted fair queue
CQ Configuration Example
Configuration Example of Congestion Management
PQ Configuration Example
Figre QC-3-6Networking diagram of CQ Configuration
Versatile Routing Platform
Troubleshooting of Congestion Management
DDR Configuration DC
DDR in Which the Router Calls Back PC
Configuring Synchronous/Asynchronous Serial Port Using DDR
DDR Configuration
Configuration of Modem Management
Introduction to DDR Technology
DDR Configuration
Brief Introduction to Dial Configuration
Figure DC-1-1DDR configuration preparation flow
Preparing DDR Configuration
Configuring Legacy DDR
Configuring DDR
Configuration tasks of Legacy DDR include
II. Configure an interface to send calls
Dialer string dial-string isdn-address
Dialer rotary-group number
Figure DC-1-2Schematic diagram of Dialer Rotary Group
III. Configure an interface to receive calls
Versatile Routing Platform DDR Configuration
IV. Configure an interface to send and receive calls
Set the attribute parameters of Legacy DDR
Table DC-1-13Set the idle time of busy interface
Access-list access-list-numberdeny permit
Table DC-1-16Set access control of the dial interface
Access-list access-list-number deny permit
Permit deny
Introduction to Dialer Profile
Configuring Dialer Profile
Default interval is 300 seconds
IV. Set the attribute parameters of a dial interface
II. Configuration task list of Dialer Profile
III. Configure a logic dial interface
Bind physical interfaces for a dialer pool
Configuring Callback
Significance of callback
II. Terms and abbreviations
Dialer caller remote-number callback
IV. Configure Isdn calling line identification callback
Or dialer caller remote-number
Interface dialer
User name callback-dialstring telephone-number
Configure PPP callback
Chapter
Table DC-1-28Client end using Legacy DDR to configure PPP
Configure Isdn dedicated line
Configuring DDR Special Functions
Autodial interval is 300 seconds by default
II. Configure autodial
III. Configure cyclic use of dialer map
Name Meaning
Monitoring and Maintenance of DDR
Table DC-1-34Configure cyclic use of dialer map
Network requirements
DDR Typical Configuration Example
Legacy DDR
Chapter
Dialer Profile
Chapter
Point-to-Point DDR
Networking diagram
II. Configuration procedure
Chapter
Chapter
8810063
Point-to-Multipoint DDR
Chapter
Chapter
8810148
Multipoint-to-Multipoint DDR
8810052
III. Configuration procedure
Chapter
Chapter
Chapter
Chapter
DDR Bearing IPX
Chapter
Chapter
Chapter
DDR Bearing IP and IPX at the Same Time
Chapter
Chapter
Chapter
RouterA RouterB BRI0
Flow Control of Dialer Profile MP over Dialer Profile-Case
2.2
661012
Chapter
Channels for Dial-up and Connection to the Remote End Case
Figure DC-1-11Networking diagram of DDR Case
Chapter
Two Serial Ports for Dial-up and Remote Dial Connection Case
One Serial Port for Dial-up and Remote Dial Connection Case
Chapter
DDR for Access Service
Chapter
Chapter
Chapter
Chapter
DDR for Inter-Router Callback
Chapter
DDR in Which the Router Calls Back PC
III. Configuration procedure
DDR for Autodial
DDR Using Dialer Map Cyclically
Solution 1 Logical interface as backup interface
DDR Using Dialer Map as Backup
Chapter
Configuring Synchronous/Asynchronous Serial Port Using DDR
Precautions for DDR Configuration
Configuring Dialer-group
Configuring Network Layer Address
Apply PAP authentication
Configuring PPP In Dialer Profile Configuration Mode
Chapter
II. Apply Chap authentication
Chapter
Configuring PPP In Legacy DDR Configuration Mode
Chapter
II. Apply Chap authentication
Chapter
Configure Dialer-list
Troubleshooting DDR
DDR Fault Diagnosis
Whether modem is normal
III. Check whether dialer-group is configured
IV. Check whether dialer-list is configured correctly
Chapter
DDR Fault Elimination
Information displayed at the calling end
Troubleshooting with DDR Debugging Information
How to acquire DDR debugging information
Information displayed at the call receiving end
DDR link negotiation Down on interface
Modem Management Functions Provided by VRP1.4
Configuration of Modem Management
Modem Script
Function
Key words Description
Timeout seconds
Modem Management Configuration Task List
Configuring Modem Management
Configuring Modem Call-In and Call-Out Authorities
Configuring Modem Script
Specifying the Event to Trigger Modem Script
Configuring Modem Answer Mode
Executing Modem Script Manually
Managing Modem with Modem Script
Typical Configuration of Modem Management
Networking requirements
Direct Dial with Script
Configuration requirements
Router Initialization with Initialization Script
Interactively Connect Cisco Router Through Modem
VoIP Configuration VC
IP Fax Configuration
VoIP Configuration
Iphc Configuration
E1 Voice Configuration
GK Client Configuration
Versatile Routing Platform Table of Contents
VoIP Overview
VoIP Configuration
II. H.323 protocol stack
VoIP Principle
Basic composition
III. a typical telephone call processing by VoIP
IP Voice Implementation over VRP
Switch Router Capacity channel
IP Voice Feature over VRP
Chapter
Configuring Dial-peer
VoIP Configuration Task List
II. VoIP dial-peer configuration
Pots dial-peer configuration
Ip precedence priority-number
Configuring Dial Terminator
Configuring Voice Port
Configuring Abbreviated Dialing
By default, we do not configure the dial terminator
By default, we do not configure the abbreviated dialing
Table VC-1-6Configuring voice-port
By default, please use the shortest number match policy
Configuring Global Number Match Policy
Configuring the Recovery Method of Voice Board
By default, Watchdog is enabled
VoIP Monitoring and Maintenance
KHT
Rcvccactivecall
Channel = Status = Chtransframe
Configuring Router FXS Port for Interconnection
Typical VoIP Configuration Examples
III. Configuration procedures
Shanghai
Chapter
Figure VC-1-7RouterShenzhen FXO works in the Plar mode
LAN
III. Configuration description
VoIP Troubleshooting
Configuring IP Fax
IP Fax Configuration
Task List of IP Fax Configuration
Overview to IP Fax
Gateway does not use ECM mode by default
Checking If Configuring Fax to Use ECM Mode
Configuring Fax Rate
Configuring Fax Local-train Threshold Value
Configuring Fax Train Mode
By default, the fax rate will be determined by voice mode
Mode is local-train mode local by default
Fax protocol t38 ls-redundancy number
Configuring Gateway Carrier Transmit Energy Level
No fax protocol t38 ls-redundancy
Fax protocol t38 hs-redundancy number
By default, rtp protocol is used
Monitoring and Maintenance of IP Fax
By default, T.38 protocol is used
Versatile Routing Platform IP Fax Configuration
Typical Configuration of IP Fax
Chapter
Overview of E1 Voice Configuration
E1 Voice Configuration
Function of E1 Voice
Usage of cE1/PRI Interface
Signaling modes supported
Features of E1 Voice
II. Protocols and standards supported
III. Support single stage dialing and two-stage dialing
Configuration Task List of E1 Voice
E1 Voice Configuration
Configuring Pots dial-peer
IV. Integrated transmission of voice and data
Table VC-3-1Configuration Commands of Pots dial-peer
Configuring VoIP dial-peer
Incoming called-number number
No incoming called-number
Table VC-3-2Configuration Commands of VoIP dial-peer
Configuring the Basic Parameters of E1 Interface
Table VC-3-3Configuration Commands of E1 Interface
Configuring Voice Port E1 Interface
Table VC-3-4Configuration Commands of E1 Voice Port
Configuring E1 Voice R2 Signaling
Configuring DS0 group
By default, the system has not created any DS0 group
II. Configuring Related Parameters of R2 Signaling
Table VC-3-6Configuration Commands of R2 Signaling
Pri-group timeslots timeslots-list
Configuring the Basic Parameters of Isdn PRI Interface
No pri-group
Interface serial serial-no
Maintaining the MFC Channel and Circuit of the Specified TS
Monitoring and Maintenance of E1 Voice
Configuring Voice Port Isdn PRI Interface
II. show Command Related to E1 Voice
Quidway# show voice-port
R2 signalling call statistics
III. debug Commands Related to E1 Voice
Router Connected to PBX through E1 Voice Port
Typical Configuration Examples of E1 Voice
Table VC-3-11debug Commands of E1 Voice
Versatile Routing Platform
Router Connected to PBX in Isdn PRI Mode
Two-stage Dialing Configuration
II. Netwoking diagram
Transmission of Data and Voice Simultaneously
Parameter configuration of Beijing-side router
Fault Diagnosis and Troubleshooting of E1 Voice
Configuration of GK Client
GK Client Configuration
Configuration Task List of GK Client
Configuring One Interface as H.323 Gateway Interface
Configure the GK Server Name and Address
Configuring Gateway Alias
By default, GK Client function is deactivated
Activating or Deactivate GK Client Function
By default, there is not any tech-prefix
Configuring Tech-Prefix
Configuring GK Interworking Mode
Versatile Routing Platform GK Client Configuration
Typical Configuration Examples of GK Client
Be default, the GK interworking mode is cisco mode
Chapter
Fault Diagnosis and Troubleshooting of GK Client
Overview of Iphc
Iphc Configuration
Configuration Task List of Iphc
Iphc Configuration
Enable/disable RTP header compression
No ip rtp compression-connections
Configure the deleting of udpchk field from UDP header
Configure the Cisco-compatible RTP header compression
By default, the udpchk field in UDP packet field is set to
No ip tcp header-compression
Table VC-5-6Monitoring and Maintenance of Iphc
Monitoring and Maintenance of Iphc
Excellent Good Fair Poor
How Are We Doing
Mistake Suggested Correction Line No