AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR3600 CLI-based Typical Configuration Exa - Huawei

AR100&AR120&AR150&AR160&AR200&AR1200&AR1600&AR2200&AR3200&AR3600 CLI-based Typical Configuration Exa

This preview shows page 1 out of 953 pages.

You've reached the end of your free preview.

Want to read all 953 pages?

Unformatted text preview: Huawei AR100&AR120&AR150&AR160&AR200&AR1200& AR1600&AR2200&AR3200&AR3600 Series Enterprise Routers CLI-based Typical Configuration Examples Issue V2.5 Date 2018-01-05 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Huawei Technologies Co., Ltd. Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China Website: Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. i Huawei AR100&AR120&AR150&AR160&AR200&AR1200&AR 1600&AR2200&AR3200&AR3600 Series Enterprise Routers CLI-based Typical Configuration Examples About This Document About This Document Declaration This document is applicable to all product versions. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure the accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Intended Audience This document provides examples for configuring AR router features in typical usage scenarios. This document is intended for: l Data configuration engineers l Commissioning engineers l Network monitoring engineers l System maintenance engineers Symbol Conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicates an imminently hazardous situation which, if not avoided, will result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, could result in death or serious injury. Indicates a potentially hazardous situation which, if not avoided, may result in minor or moderate injury. Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. ii Huawei AR100&AR120&AR150&AR160&AR200&AR1200&AR 1600&AR2200&AR3200&AR3600 Series Enterprise Routers CLI-based Typical Configuration Examples Symbol About This Document Description Indicates a potentially hazardous situation which, if not avoided, could result in equipment damage, data loss, performance deterioration, or unanticipated results. NOTICE is used to address practices not related to personal injury. Calls attention to important information, best practices and tips. NOTE NOTE is used to address information not related to personal injury, equipment damage, and environment deterioration. Command Conventions The command conventions that may be found in this document are defined as follows. Convention Description Boldface The keywords of a command line are in boldface. Italic Command arguments are in italics. Items (keywords or arguments) in brackets [ ] are optional. { x | y | ... } Optional items are grouped in braces and separated by vertical bars. One item is selected. [ x | y | ... ] Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected. { x | y | ... }* Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected. [ x | y | ... ]* Optional items are grouped in brackets and separated by vertical bars. Several items or no item can be selected. &<1-n> The parameter before the & sign can be repeated 1 to n times. # A line starting with the # sign is comments. Interface Numbering Conventions Interface numbers used in this manual are examples. In device configuration, use the existing interface numbers on devices. Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iii Huawei AR100&AR120&AR150&AR160&AR200&AR1200&AR 1600&AR2200&AR3200&AR3600 Series Enterprise Routers CLI-based Typical Configuration Examples About This Document Security Conventions l l Password setting – When configuring a password, the cipher text is recommended. To ensure device security, change the password periodically. – When you configure a password in plain text that starts and ends with %@%@, @ %@%, %#%#, or %^%# (the password can be decrypted by the device), the password is displayed in the same manner as the configured one in the configuration file. Do not use this setting. – When you configure a password in cipher text, different features cannot use the same cipher-text password. For example, the cipher-text password set for the AAA feature cannot be used for other features. Encryption algorithm Currently, the device uses the following encryption algorithms: 3DES, AES, RSA, SHA1, SHA2, and MD5. 3DES, RSA and AES are reversible, while SHA1, SHA2, and MD5 are irreversible. The encryption algorithms DES/3DES/RSA (RSA-1024 or lower)/MD5 (in digital signature scenarios and password encryption)/SHA1 (in digital signature scenarios) have a low security, which may bring security risks. If protocols allowed, using more secure encryption algorithms, such as AES/RSA (RSA-2048 or higher)/SHA2/HMAC-SHA2, is recommended. The encryption algorithm depends on actual networking. The irreversible encryption algorithm must be used for the administrator password, SHA2 is recommended. l Personal data Some personal data may be obtained or used during operation or fault location of your purchased products, services, features, so you have an obligation to make privacy policies and take measures according to the applicable law of the country to protect personal data. l Issue V2.5 (2018-01-05) The terms mirrored port, port mirroring, traffic mirroring, and mirroring in this manual are mentioned only to describe the product's function of communication error or failure detection, and do not involve collection or processing of any personal information or communication data of users. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. iv Huawei AR100&AR120&AR150&AR160&AR200&AR1200&AR 1600&AR2200&AR3200&AR3600 Series Enterprise Routers CLI-based Typical Configuration Examples Contents Contents About This Document.....................................................................................................................ii 1 Introduction and Basic Operations............................................................................................ 1 1.1 Deployment.................................................................................................................................................................... 1 1.1.1 Example for Using a U Disk to Upgrade Software and Deploy Services................................................................... 1 1.2 Logging In to the Device................................................................................................................................................ 5 1.2.1 Example for Configuring First Login Through the Console Port............................................................................... 5 1.2.2 Example for Configuring Login Through the Console Port After Password Authentication Succeeds..................... 8 1.2.3 Example for Performing Basic Configurations on the Device Through the Console Port..........................................9 1.2.4 Example for Logging In to the Router Using Telnet................................................................................................. 10 1.2.5 Example for Configuring Login Through Asynchronous Serial Port Redirection....................................................11 1.2.6 Example for Logging In to the Router Using STelnet (Password Authentication Mode).........................................13 1.2.7 Example for Configuring Login to the Device Through STelnet (RSA Authentication Mode)............................... 15 1.2.8 Example for Configuring Login Through RADIUS Authentication When the Device Functions as a Client......... 23 1.2.9 Displaying the Device Status.....................................................................................................................................25 1.3 Upgrade........................................................................................................................................................................ 38 1.3.1 Example for Using the BootROM Menu to Upgrade a System Software Package from an FTP Server..................38 1.3.2 Example for Using the BootROM Menu to Upgrade a System Software Package from a TFTP Server................. 41 1.3.3 Example for Using the Router as a TFTP Client to Upgrade the Router.................................................................. 44 1.3.4 Example for Using the Router as an FTP Client to Upgrade the Router...................................................................46 1.3.5 Example for Using the Router as an FTP Server to Upgrade the Router.................................................................. 47 1.4 BootROM Menu Operations........................................................................................................................................ 50 1.4.1 Example for Deleting Console Port and Telnet Passwords Through BootROM.......................................................50 1.4.2 Example for Changing the File Name Through BootROM...................................................................................... 53 1.4.3 Example for Changing the BootROM Password Through BootROM...................................................................... 56 1.5 Device Management..................................................................................................................................................... 58 1.5.1 Example for Outputting Log Information to a Log Host...........................................................................................58 1.5.2 Example for Outputting Log Information to a Log File............................................................................................ 59 2 Internet Access............................................................................................................................. 61 2.1 NAT.............................................................................................................................................................................. 61 2.1.1 Example for Connecting Intranet Users to the Internet in Easy IP Mode................................................................. 61 2.1.2 Example for Connecting Intranet Users to the Internet in NAT Address Pool Mode............................................... 62 2.1.3 Example for Configuring NAT to Enable Users to Access the Internet and Provide the WWW Service Externally ............................................................................................................................................................................................ 63 Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. v Huawei AR100&AR120&AR150&AR160&AR200&AR1200&AR 1600&AR2200&AR3200&AR3600 Series Enterprise Routers CLI-based Typical Configuration Examples Contents 2.1.4 Example for Configuring NAT to Connect Intranet Users to the Internet, Provide the Web Server, and Enable Intranet Users to Access an Internal Web Server Using Domain Names...........................................................................65 2.1.5 Example for Connecting VPN Users to the Internet In NAT Mode.......................................................................... 67 2.1.6 Example for Configuring NAT to Allow the Internal Host and External Host to Access the Internal Server Using an External IP Address....................................................................................................................................................... 68 2.1.7 Example for Configuring NAT Server and Outbound NAT to Implement Communication Between Public Network Users and Servers............................................................................................................................................................... 70 2.1.8 Example for Configuring NAT and Redirection to Implement Two Egresses and Provide the Web Service...........71 2.1.9 Configuring Internal Users to Access the External Server with an Overlapping IP Address Through NAT............75 2.1.10 Configuring NAT to Translate Source and Destination IP Addresses Simultaneously...........................................76 2.2 Bandwidth Management...............................................................................................................................................77 2.2.1 Example for Preventing P2P Software Download.................................................................................................... 77 2.2.2 Example for Configuring Traffic Shaping to Limit the Rate of Packets Based on Internal IP Addresses................78 3 Building a LAN............................................................................................................................ 81 3.1 Example for Configuring Layer 3 Link Aggregation to Improve the Link Bandwidth and Reliability.......................81 3.2 Example for Configuring VLAN Assignment..............................................................................................................83 3.3 Example for Configuring Sub-interfaces to Implement Inter-VLAN Communication................................................85 3.4 Example for Configuring a VLANIF Interface to Implement Inter-VLAN Communication...................................... 86 3.5 Example for Configuring GVRP to Implement Automatic VLAN Registration......................................................... 88 3.6 Example for Configuring Transparent Bridging to Implement Communication on the Same Network Segment.......89 3.7 Example for Configuring Transparent Bridging to Implement Communication on Different Network Segments..... 91 3.8 Example for Configuring a Transparent Bridge to Transmit QinQ Packets.................................................................92 3.9 Example for Configuring the UDP Helper to Enable Inter-Network Users to Access Each Other Using Host Names ............................................................................................................................................................................................ 94 3.10 Example for Configuring the Proxy ARP to Implement Remote Communication of Routers on the Same Subnet ............................................................................................................................................................................................ 95 4 Using Dedicated Lines to Implement WAN Interconnection............................................ 97 4.1 Example for Configuring Port Isolation....................................................................................................................... 98 4.2 Example for Configuring a POS Interface................................................................................................................. 100 4.3 Example for Configuring a CPOS Interface...............................................................................................................101 4.4 Example for Configuring an ATM Interface.............................................................................................................. 103 4.5 Examplefor Configuring an AR to Communicate with a Cisco Router Using SynchronousSerial Interfaces...........104 4.5.1 Overview................................................................................................................................................................. 104 4.5.2 Precautions...............................................................................................................................................................104 4.5.3 Networking Requirements....................................................................................................................................... 104 4.5.4 Configuration Procedure..........................................................................................................................................105 4.5.4.1 Configuring the AR.............................................................................................................................................. 105 4.5.4.2 Configuring the Cisco Router...............................................................................................................................105 4.5.5 Verification.............................................................................................................................................................. 106 4.5.6 Exception Handling................................................................................................................................................. 107 4.6 Example for Connecting a Bank Outlet to a Tier 2 Branch Through an E1 Link (E1 Mode)....................................107 4.7 Example for Connecting a Bank Outlet to a Tier 2 Branch Through an E1 Link (CE1 Mode)................................. 109 4.8 Example for Configuring an Enterprise to Use a 3G Link to Access the Internet (Through a WCDMA Network). 110 Issue V2.5 (2018-01-05) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. vi Huawei AR100&AR120&AR150&AR160&AR200&AR1200&AR 1600&AR2200&AR3200&AR3600 Series Enterprise Routers CLI-based Typical Configuration Examples Contents 4.9 Example for Configuring an Enterprise to Use a 3G Link to Access the Internet (Through a CDMA2000 Network) .......................................................................................................................................................................................... 112 4.10 Example for Configuring an Enterprise to Connect to the Internet Through LTE Links......................................... 114 4.11 Example for Configuring IPoA to Connect a LAN to the Internet...........................................................................116 4.12 Example for Configuring IPoEoA to Connect a LAN to the Internet...................................................................... 117 4.13 Example for Configuring PPPoEoA to Connect Users to the Internet Using PPP...................................................118 4.14 Example for Configuring PPPoA to Connect Users to the Internet Using PPP....................................................... 121 4.15 Example for Configuring PPPoFR to Implement LAN Interconnections................................................................ 122 4.16 Example for Configuring an FR Network to Connect LANs Using IP Protocols....................................................124 4.17 Example for Configuring PPP Bidirectional CHAP Authentication..........
View Full Document

  • Spring '18
  • Shathi

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture