You've reached the end of your free preview.
Want to read all 953 pages?
Unformatted text preview: Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&
AR1600&AR2200&AR3200&AR3600 Series
Enterprise Routers CLI-based Typical Configuration
Examples
Issue V2.5 Date 2018-01-05 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2018. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior written
consent of Huawei Technologies Co., Ltd. Trademarks and Permissions
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders. Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China Website: Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd. i Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR
1600&AR2200&AR3200&AR3600 Series Enterprise
Routers
CLI-based Typical Configuration Examples About This Document About This Document
Declaration
This document is applicable to all product versions. The information in this document is
subject to change without notice. Every effort has been made in the preparation of this
document to ensure the accuracy of the contents, but the statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or
implied. Intended Audience
This document provides examples for configuring AR router features in typical usage
scenarios.
This document is intended for:
l Data configuration engineers l Commissioning engineers l Network monitoring engineers l System maintenance engineers Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicates an imminently hazardous situation
which, if not avoided, will result in death or
serious injury.
Indicates a potentially hazardous situation
which, if not avoided, could result in death
or serious injury.
Indicates a potentially hazardous situation
which, if not avoided, may result in minor
or moderate injury. Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd. ii Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR
1600&AR2200&AR3200&AR3600 Series Enterprise
Routers
CLI-based Typical Configuration Examples Symbol About This Document Description
Indicates a potentially hazardous situation
which, if not avoided, could result in
equipment damage, data loss, performance
deterioration, or unanticipated results.
NOTICE is used to address practices not
related to personal injury.
Calls attention to important information,
best practices and tips. NOTE NOTE is used to address information not
related to personal injury, equipment
damage, and environment deterioration. Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention Description Boldface The keywords of a command line are in boldface. Italic Command arguments are in italics. Items (keywords or arguments) in brackets [ ] are optional. { x | y | ... } Optional items are grouped in braces and separated by
vertical bars. One item is selected. [ x | y | ... ] Optional items are grouped in brackets and separated by
vertical bars. One item is selected or no item is selected. { x | y | ... }* Optional items are grouped in braces and separated by
vertical bars. A minimum of one item or a maximum of all
items can be selected. [ x | y | ... ]* Optional items are grouped in brackets and separated by
vertical bars. Several items or no item can be selected. &<1-n> The parameter before the & sign can be repeated 1 to n
times. # A line starting with the # sign is comments. Interface Numbering Conventions
Interface numbers used in this manual are examples. In device configuration, use the existing
interface numbers on devices.
Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd. iii Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR
1600&AR2200&AR3200&AR3600 Series Enterprise
Routers
CLI-based Typical Configuration Examples About This Document Security Conventions
l l Password setting
– When configuring a password, the cipher text is recommended. To ensure device
security, change the password periodically. – When you configure a password in plain text that starts and ends with %@%@, @
%@%, %#%#, or %^%# (the password can be decrypted by the device), the
password is displayed in the same manner as the configured one in the
configuration file. Do not use this setting. – When you configure a password in cipher text, different features cannot use the
same cipher-text password. For example, the cipher-text password set for the AAA
feature cannot be used for other features. Encryption algorithm
Currently, the device uses the following encryption algorithms: 3DES, AES, RSA,
SHA1, SHA2, and MD5. 3DES, RSA and AES are reversible, while SHA1, SHA2, and
MD5 are irreversible. The encryption algorithms DES/3DES/RSA (RSA-1024 or
lower)/MD5 (in digital signature scenarios and password encryption)/SHA1 (in digital
signature scenarios) have a low security, which may bring security risks. If protocols
allowed, using more secure encryption algorithms, such as AES/RSA (RSA-2048 or
higher)/SHA2/HMAC-SHA2, is recommended. The encryption algorithm depends on
actual networking. The irreversible encryption algorithm must be used for the
administrator password, SHA2 is recommended. l Personal data
Some personal data may be obtained or used during operation or fault location of your
purchased products, services, features, so you have an obligation to make privacy
policies and take measures according to the applicable law of the country to protect
personal data. l Issue V2.5 (2018-01-05) The terms mirrored port, port mirroring, traffic mirroring, and mirroring in this manual
are mentioned only to describe the product's function of communication error or failure
detection, and do not involve collection or processing of any personal information or
communication data of users. Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd. iv Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR
1600&AR2200&AR3200&AR3600 Series Enterprise
Routers
CLI-based Typical Configuration Examples Contents Contents
About This Document.....................................................................................................................ii
1 Introduction and Basic Operations............................................................................................ 1
1.1 Deployment.................................................................................................................................................................... 1
1.1.1 Example for Using a U Disk to Upgrade Software and Deploy Services................................................................... 1
1.2 Logging In to the Device................................................................................................................................................ 5
1.2.1 Example for Configuring First Login Through the Console Port............................................................................... 5
1.2.2 Example for Configuring Login Through the Console Port After Password Authentication Succeeds..................... 8
1.2.3 Example for Performing Basic Configurations on the Device Through the Console Port..........................................9
1.2.4 Example for Logging In to the Router Using Telnet................................................................................................. 10
1.2.5 Example for Configuring Login Through Asynchronous Serial Port Redirection....................................................11
1.2.6 Example for Logging In to the Router Using STelnet (Password Authentication Mode).........................................13
1.2.7 Example for Configuring Login to the Device Through STelnet (RSA Authentication Mode)............................... 15
1.2.8 Example for Configuring Login Through RADIUS Authentication When the Device Functions as a Client......... 23
1.2.9 Displaying the Device Status.....................................................................................................................................25
1.3 Upgrade........................................................................................................................................................................ 38
1.3.1 Example for Using the BootROM Menu to Upgrade a System Software Package from an FTP Server..................38
1.3.2 Example for Using the BootROM Menu to Upgrade a System Software Package from a TFTP Server................. 41
1.3.3 Example for Using the Router as a TFTP Client to Upgrade the Router.................................................................. 44
1.3.4 Example for Using the Router as an FTP Client to Upgrade the Router...................................................................46
1.3.5 Example for Using the Router as an FTP Server to Upgrade the Router.................................................................. 47
1.4 BootROM Menu Operations........................................................................................................................................ 50
1.4.1 Example for Deleting Console Port and Telnet Passwords Through BootROM.......................................................50
1.4.2 Example for Changing the File Name Through BootROM...................................................................................... 53
1.4.3 Example for Changing the BootROM Password Through BootROM...................................................................... 56
1.5 Device Management..................................................................................................................................................... 58
1.5.1 Example for Outputting Log Information to a Log Host...........................................................................................58
1.5.2 Example for Outputting Log Information to a Log File............................................................................................ 59 2 Internet Access............................................................................................................................. 61
2.1 NAT.............................................................................................................................................................................. 61
2.1.1 Example for Connecting Intranet Users to the Internet in Easy IP Mode................................................................. 61
2.1.2 Example for Connecting Intranet Users to the Internet in NAT Address Pool Mode............................................... 62
2.1.3 Example for Configuring NAT to Enable Users to Access the Internet and Provide the WWW Service Externally
............................................................................................................................................................................................ 63
Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd. v Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR
1600&AR2200&AR3200&AR3600 Series Enterprise
Routers
CLI-based Typical Configuration Examples Contents 2.1.4 Example for Configuring NAT to Connect Intranet Users to the Internet, Provide the Web Server, and Enable
Intranet Users to Access an Internal Web Server Using Domain Names...........................................................................65
2.1.5 Example for Connecting VPN Users to the Internet In NAT Mode.......................................................................... 67
2.1.6 Example for Configuring NAT to Allow the Internal Host and External Host to Access the Internal Server Using
an External IP Address....................................................................................................................................................... 68
2.1.7 Example for Configuring NAT Server and Outbound NAT to Implement Communication Between Public Network
Users and Servers............................................................................................................................................................... 70
2.1.8 Example for Configuring NAT and Redirection to Implement Two Egresses and Provide the Web Service...........71
2.1.9 Configuring Internal Users to Access the External Server with an Overlapping IP Address Through NAT............75
2.1.10 Configuring NAT to Translate Source and Destination IP Addresses Simultaneously...........................................76
2.2 Bandwidth Management...............................................................................................................................................77
2.2.1 Example for Preventing P2P Software Download.................................................................................................... 77
2.2.2 Example for Configuring Traffic Shaping to Limit the Rate of Packets Based on Internal IP Addresses................78 3 Building a LAN............................................................................................................................ 81
3.1 Example for Configuring Layer 3 Link Aggregation to Improve the Link Bandwidth and Reliability.......................81
3.2 Example for Configuring VLAN Assignment..............................................................................................................83
3.3 Example for Configuring Sub-interfaces to Implement Inter-VLAN Communication................................................85
3.4 Example for Configuring a VLANIF Interface to Implement Inter-VLAN Communication...................................... 86
3.5 Example for Configuring GVRP to Implement Automatic VLAN Registration......................................................... 88
3.6 Example for Configuring Transparent Bridging to Implement Communication on the Same Network Segment.......89
3.7 Example for Configuring Transparent Bridging to Implement Communication on Different Network Segments..... 91
3.8 Example for Configuring a Transparent Bridge to Transmit QinQ Packets.................................................................92
3.9 Example for Configuring the UDP Helper to Enable Inter-Network Users to Access Each Other Using Host Names
............................................................................................................................................................................................ 94
3.10 Example for Configuring the Proxy ARP to Implement Remote Communication of Routers on the Same Subnet
............................................................................................................................................................................................ 95 4 Using Dedicated Lines to Implement WAN Interconnection............................................ 97
4.1 Example for Configuring Port Isolation....................................................................................................................... 98
4.2 Example for Configuring a POS Interface................................................................................................................. 100
4.3 Example for Configuring a CPOS Interface...............................................................................................................101
4.4 Example for Configuring an ATM Interface.............................................................................................................. 103
4.5 Examplefor Configuring an AR to Communicate with a Cisco Router Using SynchronousSerial Interfaces...........104
4.5.1 Overview................................................................................................................................................................. 104
4.5.2 Precautions...............................................................................................................................................................104
4.5.3 Networking Requirements....................................................................................................................................... 104
4.5.4 Configuration Procedure..........................................................................................................................................105
4.5.4.1 Configuring the AR.............................................................................................................................................. 105
4.5.4.2 Configuring the Cisco Router...............................................................................................................................105
4.5.5 Verification.............................................................................................................................................................. 106
4.5.6 Exception Handling................................................................................................................................................. 107
4.6 Example for Connecting a Bank Outlet to a Tier 2 Branch Through an E1 Link (E1 Mode)....................................107
4.7 Example for Connecting a Bank Outlet to a Tier 2 Branch Through an E1 Link (CE1 Mode)................................. 109
4.8 Example for Configuring an Enterprise to Use a 3G Link to Access the Internet (Through a WCDMA Network). 110
Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd. vi Huawei
AR100&AR120&AR150&AR160&AR200&AR1200&AR
1600&AR2200&AR3200&AR3600 Series Enterprise
Routers
CLI-based Typical Configuration Examples Contents 4.9 Example for Configuring an Enterprise to Use a 3G Link to Access the Internet (Through a CDMA2000 Network)
.......................................................................................................................................................................................... 112
4.10 Example for Configuring an Enterprise to Connect to the Internet Through LTE Links......................................... 114
4.11 Example for Configuring IPoA to Connect a LAN to the Internet...........................................................................116
4.12 Example for Configuring IPoEoA to Connect a LAN to the Internet...................................................................... 117
4.13 Example for Configuring PPPoEoA to Connect Users to the Internet Using PPP...................................................118
4.14 Example for Configuring PPPoA to Connect Users to the Internet Using PPP....................................................... 121
4.15 Example for Configuring PPPoFR to Implement LAN Interconnections................................................................ 122
4.16 Example for Configuring an FR Network to Connect LANs Using IP Protocols....................................................124
4.17 Example for Configuring PPP Bidirectional CHAP Authentication..........
View
Full Document
- Spring '18
- Shathi