NetEngine 8000 M14K, M14, M8K, M8, M4, 8000E M14 M8, 8100 M14 M8 V800R022C00SPC600 Configuration Guide 02 System Management
NetEngine 8000 M14K, M14, M8K, M8, M4, 8000E M14 M8, 8100 M14 M8 V800R022C00SPC600 Configuration Guide 02 System Management
Configuration Guide
Issue 01
Date 2022-10-31
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: [email protected]
Contents
1 Configuration............................................................................................................................1
1.1 System Management............................................................................................................................................................. 1
1.1.1 VS Configuration.................................................................................................................................................................. 1
1.1.1.1 Overview of VSs................................................................................................................................................................ 1
1.1.1.2 Understanding VSs........................................................................................................................................................... 1
1.1.1.3 Functions Supported by VSs......................................................................................................................................... 3
1.1.1.4 Licensing Requirements for VSs.................................................................................................................................. 9
1.1.1.5 Default Settings for a VS............................................................................................................................................... 9
1.1.1.6 Creating and Starting a VS......................................................................................................................................... 10
1.1.1.6.1 Understanding VS Creation and Startup............................................................................................................ 10
1.1.1.6.2 Creating and Starting a VS...................................................................................................................................... 11
1.1.1.6.3 (Optional) Loading MAC Addresses Allocated to VSs................................................................................... 11
1.1.1.6.4 Configuring Physical Resources for a VS............................................................................................................ 12
1.1.1.6.5 (Optional) Configuring Logical Resources for a VS........................................................................................ 13
1.1.1.6.6 Verifying the Configuration.....................................................................................................................................14
1.1.1.7 Logging In to and Managing a VS........................................................................................................................... 14
1.1.1.7.1 (Optional) Disabling the Command Prompt of a Service VS from Containing the Admin-VS Host
Name................................................................................................................................................................................................ 14
1.1.1.7.2 Switching to a VS and Configuring a Management User for the VS....................................................... 15
1.1.1.7.3 (Optional) Enabling Login Authentication After Switching from the Admin-VS to a Service VS
............................................................................................................................................................................................................ 15
1.1.1.7.4 Verifying the Configuration.....................................................................................................................................16
1.1.1.8 Example for Configuring VSs..................................................................................................................................... 16
1.1.1.9 Maintaining a VS............................................................................................................................................................ 18
1.1.1.9.1 Saving VS Configurations.........................................................................................................................................18
1.1.1.9.2 Restarting a VS............................................................................................................................................................ 18
1.1.1.9.3 Shutting Down a VS.................................................................................................................................................. 19
1.1.1.9.4 Deleting a VS............................................................................................................................................................... 20
1.1.2 LAD Configuration............................................................................................................................................................ 20
1.1.2.1 LAD Description.............................................................................................................................................................. 20
1.1.2.1.1 Overview of LAD......................................................................................................................................................... 20
1.1.2.1.2 Understanding LAD....................................................................................................................................................21
1.1.2.1.3 Application Scenarios for LAD................................................................................................................................26
1.1.2.1.4 Terminology for LAD................................................................................................................................................. 29
1.1.18.2.9 Configuring the Alarm Threshold for the CPU Usage of a Board.........................................................621
1.1.18.2.10 Configuring the Alarm Threshold for the Usage of a Single CPU on a Board...............................622
1.1.18.2.11 Configuring Alarm Thresholds for Board Performance.......................................................................... 622
1.1.18.2.12 Configuring the Threshold of Memory Usage...........................................................................................623
1.1.18.2.13 Configuring the Threshold of CPU Usage................................................................................................... 624
1.1.18.2.14 Configuring the Multi-level Alarm Boolean Output............................................................................... 624
1.1.18.2.15 Configuring a Port Bandwidth Allocation Mode...................................................................................... 625
1.1.18.2.16 Disable the Function to Use the OFL Button to Power On and Off a Board.................................626
1.1.18.2.17 (Optional) Disabling the Multi-Process Mode of the FEI Component............................................. 627
1.1.18.2.18 Configuring Device Anti-Theft........................................................................................................................ 627
1.1.18.2.19 Configuration Examples for Device Management................................................................................... 628
1.1.19 Information Management Configuration.............................................................................................................629
1.1.19.1 Overview of Information Management............................................................................................................ 629
1.1.19.2 Understanding IM..................................................................................................................................................... 630
1.1.19.2.1 IM Fundamentals................................................................................................................................................... 630
1.1.19.2.2 Information Classification................................................................................................................................... 630
1.1.19.2.3 Information Severity............................................................................................................................................. 632
1.1.19.2.4 Information Format.............................................................................................................................................. 633
1.1.19.2.5 Information Filtering............................................................................................................................................ 635
1.1.19.2.6 Information Suppression..................................................................................................................................... 635
1.1.19.2.7 Information Output...............................................................................................................................................636
1.1.19.3 Configuration Precautions for Information management.......................................................................... 640
1.1.19.4 Default Settings for IM............................................................................................................................................640
1.1.19.5 Configuring Log Output.......................................................................................................................................... 641
1.1.19.5.1 Enabling IM.............................................................................................................................................................. 641
1.1.19.5.2 Configuring the Device to Output Logs to the Log Buffer......................................................................642
1.1.19.5.3 Configuring the Device to Output Logs to a Log File............................................................................... 643
1.1.19.5.4 Configuring the Device to Output Logs to a Log Host.............................................................................644
1.1.19.5.5 Configuring the Device to Output Logs to the Console........................................................................... 645
1.1.19.5.6 Configuring the Device to Output Logs to a Terminal............................................................................. 645
1.1.19.5.7 Verifying the Configuration................................................................................................................................ 646
1.1.19.5.8 Example for Configuring the Device to Output Logs to a Log File...................................................... 646
1.1.19.5.9 Example for Configuring the Device to Output Logs to a Log Host....................................................648
1.1.19.5.10 Example for Configuring the Device to Output SSL-Encrypted Logs to Log Hosts...................... 651
1.1.19.6 Configuring Trap Output........................................................................................................................................ 654
1.1.19.6.1 Enabling IM.............................................................................................................................................................. 654
1.1.19.6.2 Configuring the Device to Output Traps to the Trap Buffer................................................................... 655
1.1.19.6.3 Configuring the Device to Output Traps to an SNMP Agent................................................................. 655
1.1.19.6.4 Configuring the Device to Output Traps to a Log File..............................................................................656
1.1.19.6.5 Configuring the Device to Output Traps to a Log Host........................................................................... 657
1.1.19.6.6 Configuring the Device to Output Traps to the Console..........................................................................658
1.1.19.6.7 Configuring the Device to Output Traps to a Terminal............................................................................ 659
Figures
Tables
Table 1-34 Requirements of wireless standards for the accuracy of frequency and time
synchronization............................................................................................................................................................. 207
Table 1-35 Feature requirements........................................................................................................................... 209
Table 1-36 Default multicast destination MAC addresses for different delay measurement
mechanisms.................................................................................................................................................................... 234
Table 1-37 Multicast destination IP addresses used for UDP encapsulation in different delay
measurement mechanisms....................................................................................................................................... 235
Table 1-38 Default multicast destination MAC addresses for different delay measurement
mechanisms.................................................................................................................................................................... 255
Table 1-39 Multicast destination IP addresses used for UDP encapsulation in different delay
measurement mechanisms....................................................................................................................................... 256
Table 1-40 Mapping between default multicast destination IP addresses and delay measurement
mechanisms.................................................................................................................................................................... 305
Table 1-41 Feature requirements........................................................................................................................... 320
Table 1-42 Feature requirements........................................................................................................................... 343
Table 1-43 Feature requirements........................................................................................................................... 368
Table 1-44 SNMP operations................................................................................................................................... 420
Table 1-45 Types of information managed by the MIB................................................................................. 424
Table 1-46 Comparison of security in different SNMP versions..................................................................427
Table 1-47 Feature requirements........................................................................................................................... 431
Table 1-48 PDU types.................................................................................................................................................436
Table 1-49 Error status.............................................................................................................................................. 436
Table 1-50 Generic trap types................................................................................................................................. 437
Table 1-51 Configuring a source interface for the SNMP agent to receive and respond to NMS
request packets..............................................................................................................................................................441
Table 1-52 Configuring the SNMP proxy to receive and respond to requests from the CCU........... 442
Table 1-53 Configuring a source interface for the SNMP agent to receive and respond to NMS
request packets..............................................................................................................................................................451
Table 1-54 Configuring the SNMP proxy to receive and respond to requests from the CCU........... 452
Table 1-55 Configuring a source interface for the SNMP agent to receive and respond to NMS
request packets..............................................................................................................................................................467
Table 1-56 SNMP proxy configuration tasks...................................................................................................... 488
Table 1-57 Configuring the SNMP proxy to receive and respond to requests from the CCU........... 492
Table 1-58 Comparison between SNMP and NETCONF................................................................................ 497
Table 1-59 Main elements in the basic network architecture of NETCONF........................................... 498
Table 1-60 NETCONF protocol framework......................................................................................................... 501
Table 1-61 Element description.............................................................................................................................. 502
Table 1-62 NETCONF-defined configuration databases................................................................................ 503
Table 1-63 Fields in a NETCONF message.......................................................................................................... 506
Table 1-64 Description of each field in a response message....................................................................... 509
Table 1-65 Subtree filter components.................................................................................................................. 510
Table 1-66 Element descriptions............................................................................................................................ 544
Table 1-67 Element descriptions............................................................................................................................ 546
Table 1-68 Feature requirements........................................................................................................................... 558
Table 1-69 Configuration in different authentication modes...................................................................... 562
Table 1-70 Creating a local user in the AAA view with the same name as the SSH user................. 563
Table 1-71 Configuring the local RSA, DSA, SM2, or ECC key for the SSH user....................................563
Table 1-72 Binding a PKI realm to the SSH user.............................................................................................. 566
Table 1-73 NETCONF parameters.......................................................................................................................... 567
Table 1-74 Description of IETF-NACM components........................................................................................ 579
Table 1-75 Operations performed for different authorized contents........................................................584
Table 1-76 A user's operation permissions......................................................................................................... 586
Table 1-77 BootLoader main menu...................................................................................................................... 596
Table 1-78 Ethernet submenu................................................................................................................................. 599
Table 1-79 Feature requirements........................................................................................................................... 608
Table 1-80 Information classification................................................................................................................... 631
Table 1-81 Description of information severity.................................................................................................632
Table 1-82 Information format description........................................................................................................ 633
Table 1-83 Default information output channels.............................................................................................637
Table 1-84 Log files..................................................................................................................................................... 639
Table 1-85 Default settings for IM........................................................................................................................ 640
Table 1-86 Clearing statistics...................................................................................................................................667
Table 1-87 Monitoring IM.........................................................................................................................................667
Table 1-88 Checking Security Log Files................................................................................................................668
Table 1-89 Definition of alarm severities............................................................................................................ 670
Table 1-90 Default settings for FM....................................................................................................................... 672
Table 1-91 Clearing alarms...................................................................................................................................... 677
Table 1-92 Monitoring alarms................................................................................................................................ 677
Table 1-93 Feature requirements........................................................................................................................... 679
Table 1-94 Default settings for PM....................................................................................................................... 681
Table 1-95 Format of a statistics file.................................................................................................................... 686
Table 1-96 Feature requirements........................................................................................................................... 694
Table 1-97 Patch states............................................................................................................................................. 708
Table 1-98 Operations related to software package maintenance............................................................ 718
Table 1-99 Feature requirements........................................................................................................................... 727
Table 1-100 Rules for enabling DCN on interfaces by default.................................................................... 731
Table 1-101 Feature requirements........................................................................................................................ 771
Table 1-102 Basic CUSP concepts.......................................................................................................................... 776
Table 1-103 CUSP reliability solutions..................................................................................................................781
Table 1-104 KPI examples........................................................................................................................................ 785
Table 1-105 Format of the KPI file header......................................................................................................... 788
Table 1-106 Format of the KPI packet header.................................................................................................. 788
Table 1-107 Format of the KPI data packet....................................................................................................... 789
Table 1-108 Post-parsing data modes..................................................................................................................790
1 Configuration
1.1.1 VS Configuration
Definition
Virtual system (VS) technology virtualizes a physical device into multiple logical
devices, known as VSs. Each VS processes services as an independent physical
device.
Purpose
● VS technology enables a single physical device to function as multiple
network nodes on a logical topology, maximizing resource utilization and
reducing the network operating expense (OPEX).
● Different VSs can have different services deployed to isolate services and
faults, thereby improving network security and reliability.
VS Technology
VS technology uses system software to replicate processes on a physical device,
implementing virtualization of the control plane, management plane, and
forwarding plane. Each created VS functions as an independent device.
● Virtualization of the control plane: Each VS runs its own control protocol
process. As such, a process error in one VS does not affect processes in other
VSs.
VS Classification
Virtualized logical devices are called VSs. According to their permissions, VSs are
classified into two types: Admin-VS and service VS, as shown in Figure 1-1. All VSs
on a device share the device's physical and logical resources.
The Admin-VS is the default VS. After an administrator logs in to a physical device,
the administrator enters the Admin-VS. Each physical device has an Admin-VS that
remains in running state. The Admin-VS cannot be created, deleted, or shut down.
A service VS is also called a non-Admin-VS. An administrator can create service
VSs, delete service VSs, and allocate resources to service VSs only in the Admin-VS.
VS Attributes
VSs have two administrator roles: physical system (PS) administrator and VS
administrator.
● PS administrator: Only the Admin-VS has a PS administrator, who has the
highest permission and can create service VSs, delete service VSs, and allocate
resources to service VSs. A PS administrator can also access a service VS.
● VS administrator: A VS administrator can manage only the local VS; that is, it
can only check and configure services in the local VS. A VS administrator
cannot perform operations that affect the entire physical device, such as
resetting cards and backing up electronic labels.
MAC address of a VS: After a VS is created, the system automatically assigns it a
MAC address, which cannot be modified.
File system of a VS: Each VS has an independent file system that stores its own
configuration file and log files. A VS administrator can perform operations only on
the local file system. Operations in one VS do not affect other VSs, ensuring
security.
VS Communication
VSs cannot communicate with each other directly, but do so through the
connected and configured physical interfaces between them.
ARP Supported -
DHCPv4 Supported -
DHCPv6 Supported -
DNS Supported -
DNSv6 Supported -
ACL Supported -
ACL6 Supported -
ND Supported -
MTU Supported -
OSPF Supported -
OSPFv3 Supported -
BGP Supported -
BGP4+ Supported -
IS-IS Supported -
IS-ISv6 Supported -
RIP Supported -
RIPng Supported -
XPL Supported -
MLD Supported -
PIM Supported -
MSDP Supported -
BIER Supported -
BIERv6 Supported -
MBGP Supported -
NG MVPN Supported -
Controllable Supported -
multicast
MPLS TE Supported -
NAT Supported -
NAT64 Supported -
MAP Supported -
Congestion Supported -
management and
congestion
avoidance
QPPB Supported -
HQoS Supported -
GRE Supported -
DSVPN Supported -
EVPN Supported -
PBB-EVPN Supported -
Tunnel Supported -
VPWS Supported -
VPLS Supported -
URPF Supported -
PKI Supported -
Keychain Supported -
FIPS Supported -
GTSM Supported -
LDM Supported -
IPsec Supported -
MPAC Supported -
SOC Supported -
Mirroring Supported -
Transmission Supported -
alarm
customization and
suppression
BFDv6 Supported -
VRRP Supported -
VRRP6 Supported -
LPT Supported -
EFM Supported -
CFM Supported -
Y.1731 Supported -
Dual-device Supported -
backup
DCN Supported -
Information Supported -
management
SAID Supported -
NetStream Supported -
iFIT Supported -
TWAMP Supported -
IP FPM Supported -
sFlow Supported -
EMDI Supported -
IP traffic Supported -
monitoring
ESQM Supported -
Intelligent Supported -
monitoring
VLAN Supported -
GVRP Supported -
STP/RSTP/MSTP Supported -
RRPP Supported -
QinQ Supported -
EVC Supported -
Maximum CPU usage weight (cpu 10 for the Admin-VS and 5 for a
weight) service VS
Physical Resources
The only physical resources on a device that can be allocated are interfaces on
LPUs. Currently, only the port mode is supported, meaning that any interface on
an LPU can be allocated to any VS, and each interface can be allocated to only
one VS.
Interface resource allocation has the following characteristics:
● By default, all interfaces on an LPU belong to the Admin-VS.
● After an interface is allocated to a service VS, original configurations on the
interface are deleted.
Logical Resources
Allocatable logical resources include multicast IPv4 routing entries (m4route),
multicast IPv6 routing entries (m6route), unicast IPv4 routing entries (u4route),
unicast IPv6 routing entries (u6route), VPN instances (vpn-instance), and
maximum CPU usage weight (cpu weight).
Procedure
Step 1 Enter the system view.
system-view
By default, the active and standby MPUs of a service VS are the same as those of
the Admin-VS. You can re-specify the active and standby MPUs for a service VS by
specifying the slot parameter.
Step 4 (Optional) Configure an interface allocation mode and a resource template for the
VS.
port-mode port-mode [ resource-template template-name ]
NOTE
The interface allocation mode that has been configured for a VS cannot be deleted.
NOTE
----End
Context
In VS scenarios, each VS requires an independent MAC address. By default,
multiple MAC addresses have been loaded to the main control board of a device
before delivery. If a message is displayed indicating that the MAC addresses are
insufficient when you create VSs, you can load the .txt file in the user view to re-
allocate MAC addresses to the VSs.
The .txt file to be loaded must meet the following requirements:
mac address num indicates the number of MAC addresses to be loaded, and
mac address start indicates the start MAC address to be loaded.
NOTE
If the value of mac address num is greater than the maximum number of MAC
addresses supported by the device, the maximum number of MAC addresses
supported by the device takes effect.
● The .txt file must be uploaded to the root directory of the device's CF card.
Otherwise, the loading fails.
Procedure
Step 1 Load the MAC addresses allocated to VSs.
sysmac load sysmac-file chassis [ chassisid ]
NOTE
After the configuration is complete, restart the device for the configuration to take effect.
WARNING
This is a high-risk operation, which will change the system MAC address of the
device. Before performing this operation, plan the MAC addresses properly.
----End
Context
Physical resources for a VS mainly refer to interface resources.
Procedure
Step 1 Enter the system view.
system-view
NOTE
Interfaces on an LPU can be allocated to multiple VSs, but an interface can be allocated to
only one VS.
----End
Context
You can use either of the following methods to configure logical resources for a
VS:
● Directly configure logical resources in the VS.
● Configure a logical resource template and bind it to the VS.
Procedure
● Directly configure logical resources in a VS.
a. Enter the system view.
system-view
b. Enter the admin view.
admin
c. Enter the VS view.
virtual-system vs-name
d. Adjust logical resources for the VS. You can adjust one or more resource
values according to your service requirements.
resource u4route upper-limit resource-limit
resource u6route upper-limit resource-limit
resource m4route upper-limit resource-limit
resource m6route upper-limit resource-limit
resource vpn-instance upper-limit resource-limit
resource cpu weight resValue
e. Commit the configuration.
commit
● Configure a logical resource template and bind it to a VS.
a. Enter the system view.
system-view
b. Enter the admin view.
admin
c. Configure a logical resource template.
resource-template template-name
d. Adjust logical resources for the VS. You can adjust one or more resource
values according to your service requirements.
resource u4route upper-limit resource-limit
resource u6route upper-limit resource-limit
resource m4route upper-limit resource-limit
resource m6route upper-limit resource-limit
resource vpn-instance upper-limit resource-limit
resource cpu weight resValue
e. Exit the resource template view.
quit
f. Enter the admin view.
admin
NOTE
Skip this step if a logical resource template has been specified for the VS in the
port-mode port-mode [ resource-template template-name ] command.
i. Commit the configuration.
commit
----End
Procedure
● Run the display virtual-system [ name vs-name ] [ verbose ] command to
check basic information about a VS, such as the VS name and slot resources.
● Run the display virtual-system configuration state command to check the
configuration status of a VS.
● Run the display virtual-system [ name vs-name ] resource command to
check resource information of a VS.
● Run the display virtual-system resource-template command to check
resource template information of a VS.
----End
Context
When a user switches from the Admin-VS to a service VS, the command prompt of
the service VS consists of the host names of both the Admin-VS and service VS. In
some cases, such a command prompt will be so long that it affects user
operations. If so, you can disable the command prompt of a service VS from
containing the host name of the Admin-VS.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Disable the command prompt of the service VS from containing the host name of
the Admin-VS.
combined-sysname disable
----End
Context
For easy user operations, you can run a command in the Admin-VS to directly
switch to a service VS. After this command is run, you can perform operations on
this service VS without switching between login windows.
Procedure
Step 1 Switch to the VS managed by the current user.
switch virtual-system vs-name
NOTE
This command is supported only in the Admin-VS. That is, only switching from the Admin-
VS to a service VS is supported, whereas switching between service VSs is not supported.
After you run this command to switch to a service VS, you can run the quit command in
the service VS view to return to the Admin-VS.
Step 2 Configure the IP address of the VS's interface connected to a terminal to ensure
reachable routes between the VS and terminal.
Step 3 Configure a management user for the VS. For details, see "CLI-based Device Login
Configuration" in Basic Configuration.
----End
Context
After you switch from the Admin-VS to a service VS, you can determine whether
to enable authentication for login based on security requirements.
Procedure
Step 1 Switch to the VS managed by the current user.
switch virtual-system vs-name
NOTE
This command is supported only in the Admin-VS. That is, only switching from the Admin-
VS to a service VS is supported, whereas switching between service VSs is not supported.
After you run this command to switch to a service VS, you can run the quit command in
the service VS view to return to the Admin-VS.
Step 3 Enable authentication for login after switching from the Admin-VS to a service VS.
virtual-system switch-authentication enable
After this function is enabled, you need to enter the username and password after
switching from the Admin-VS to a service VS.
NOTE
Before enabling authentication for login after switching from the Admin-VS to a service VS,
ensure that the service VS has been configured with AAA local or remote users. Otherwise,
the authentication fails and the service VS cannot be logged in.
----End
Procedure
● Run the display virtual-system [ name vs-name ] [ verbose ] command to
check basic information about a VS, such as the VS name and slot resources.
● Run the display virtual-system configuration state command to check the
configuration status of a VS.
----End
Networking Requirements
On the physical device DeviceA, different VSs need to be created to isolate services
from each other, as shown in Figure 1-2. Interface 1 on DeviceA needs to be
allocated to VS1, interface 2 to VS2, and interface 3 to VS3.
Configuration Roadmap
The configuration roadmap is as follows:
1. Create VS1, VS2, and VS3.
2. Configure physical resources for the VSs.
3. Switch to the VSs.
Procedure
Step 1 Create and start VSs.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] admin
[*DeviceA-admin] virtual-system VS1
[*DeviceA-admin-vs:VS1] port-mode port
[*DeviceA-admin-vs:VS1] description VS1
[*DeviceA-admin-vs:VS1] quit
[*DeviceA-admin] virtual-system VS2
[*DeviceA-admin-vs:VS2] port-mode port
[*DeviceA-admin-vs:VS2] description VS2
[*DeviceA-admin-vs:VS2] quit
[*DeviceA-admin] virtual-system VS3
[*DeviceA-admin-vs:VS3] port-mode port
[*DeviceA-admin-vs:VS3] description VS3
[*DeviceA-admin-vs:VS3] quit
[*DeviceA-admin] quit
[*DeviceA] commit
NOTE
VS1 functions as an independent device. For details about how to configure it, see the
related manual.
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
admin
virtual-system VS1
description VS1
port-mode port
assign interface GigabitEthernet0/1/1
virtual-system VS2
description VS2
port-mode port
assign interface GigabitEthernet0/1/1
virtual-system VS3
description VS3
port-mode port
assign interface GigabitEthernet0/1/1
#
return
1.1.1.9 Maintaining a VS
Context
A VS has an independent configuration file, just as a common physical device
does. After services are configured, save the configuration to prevent configuration
loss when a VS is restarted or shut down.
Procedure
Step 1 Save configurations of all VSs.
save all virtual-systems
NOTE
This command is supported only in the Admin-VS. It is not supported in a service VS.
----End
1.1.1.9.2 Restarting a VS
Context
You can restart a VS without affecting other VSs. In the Admin-VS, you can restart
any service VS; but in a service VS, you can only restart this service VS.
Procedure
● Restart a service VS in the Admin-VS.
reset virtual-system VsName
NOTE
● This command is supported only in the Admin-VS and can be used to restart only
service VSs.
● While a VS is restarting, all interfaces of the VS switch to the down state, and all
its services are interrupted.
● Before restarting a VS, you must save its configuration; otherwise, the
configuration may be lost.
● Restart a service VS in the service VS.
reset
----End
Context
To diagnose faults or terminate services in a VS, you can run the shutdown
command to shut down the VS without affecting other VSs.
Procedure
Step 1 Enter the system view.
system-view
NOTE
----End
1.1.1.9.4 Deleting a VS
Context
You can delete a service VS in the Admin-VS. The Admin-VS cannot be deleted.
After a service VS is deleted, all services in this service VS are interrupted, and the
physical and logical resources allocated to it are reclaimed by the Admin-VS.
NOTICE
After a service VS is deleted, all services in this service VS are interrupted and
cannot be restored. Therefore, exercise caution when you delete a service VS.
Procedure
Step 1 Enter the system view.
system-view
----End
Definition
Link Automatic Discovery (LAD) is a Huawei proprietary protocol that discovers
neighbors at the link layer. LAD allows a device to issue link discovery requests as
triggered by the NMS or command lines. After the device receives link discovery
replies, the device generates neighbor information and saves it in the local MIB.
The NMS can then query neighbor information in the MIB and generate the
topology of the entire network.
Purpose
Large-scale networks demand increased NMS capabilities, such as obtaining the
topology status of connected devices automatically and detecting configuration
conflicts between devices. Currently, most NMSs use an automated discovery
function to trace changes in the network topology but can only analyze the
network-layer topology. Network-layer topology information notifies you of basic
events like the addition or deletion of devices, but gives you no information about
the interfaces used by one device to connect to other devices or the location or
network operation mode of a device.
LAD is developed to resolve these problems. LAD can identify the interfaces on a
network device and provide detailed information about connections between
devices. LAD can also display paths between clients, switches, routers, application
servers, and network servers. The detailed information provided by LAD can help
efficiently locate network faults.
Benefits
LAD helps network administrators promptly obtain detailed network topology and
changes in the topology and monitor the network status in real time, improving
security and stability for network communication.
Basic Concepts
Tag 4 bytes 2-byte Ethernet Type field and 2-byte VLAN field
included
● When low-speed interfaces are used on links, LAD packets are encapsulated
into PPP frames. Figure 1-5 shows the LAD packet format on low-speed
interfaces.
The Information field is the same in all the three LAD packet formats, meaning
that the LAD data units are irrelevant to the link type. Figure 1-6 shows the
format of the LAD data unit.
● Link Reply packets: link discovery replies in response to the Link Detect
packets sent by remote devices. Link Reply packets carry the Send Link Info
SubTLV (the same as that in the received Link Detect packets) and Recv Link
Info SubTLV. Figure 1-8 shows the format of the Link Reply packet data unit.
Implementation
Background
To monitor the network status in real-time and to obtain detailed network
topology and changes in the topology, network administrators usually deploy the
Link Layer Discovery Protocol (LLDP) on live networks. LLDP, however, has limited
applications due to the following characteristics:
● LLDP uniquely identifies a device by its IP address. IP addresses are expressed
in dotted decimal notation and therefore are not easy to maintain or manage,
when compared with NE IDs that are expressed in decimal integers.
● LLDP is not supported on Ethernet sub-interfaces, Eth-Trunk interfaces, or
low-speed interfaces, and therefore cannot discover neighbors for these types
of interfaces.
● LLDP-enabled devices periodically broadcast LLDP packets, consuming many
system resources and even affecting the transmission of user services.
Link Automatic Discovery (LAD) addresses the preceding problems and is more
flexible:
● LAD uniquely identifies a device by an NE ID in decimal integers, which are
easier to maintain and manage.
● LAD can discover neighbors for various types of interfaces and therefore are
more widely used than LLDP.
● LAD is triggered by an NMS or command lines and therefore can be
implemented as you need.
Implementation
The following example uses the networking in Figure 1-9 to illustrate how LAD is
implemented.
Benefits
After network administrators deploy LAD on devices, they can obtain information
about all links connected to the devices. LAD helps extend the network
management scale. Network administrators can obtain detailed network topology
information and topology changes.
Networking Description
In single-neighbor networking, devices are directly connected, and each device
interface connects only to one neighbor. In Figure 1-10, DeviceA and DeviceB are
directly connected, and each interface on DeviceA and DeviceB connects only to
one neighbor.
Feature Deployment
After enabling Link Automatic Discovery (LAD) on DeviceA, administrators can use
the NMS to obtain Layer 2 configurations of DeviceA and DeviceB, get a detailed
network topology, and determine whether a configuration conflict exists. LAD
helps improve security and stability for network communication.
Networking Description
In multi-neighbor networking, devices are connected over an unknown network,
and each device interface connects to one or more neighbors. In Figure 1-11,
DeviceA, DeviceB, and DeviceC are connected over a Layer 2 virtual private
network (L2VPN). Devices on the L2VPN may have Link Automatic Discovery
(LAD) disabled or may not need to be managed by the NMS, but they can still
transparently transmit LAD packets. DeviceA has two neighbors, DeviceB and
DeviceC.
Feature Deployment
After enabling Link Automatic Discovery (LAD) on DeviceA, administrators can use
the NMS to obtain Layer 2 configurations of DeviceA, DeviceB, and DeviceC, get a
detailed network topology, and determine whether a configuration conflict exists.
LAD helps ensure security and stability for network communication.
Networking Description
On the network shown in Figure 1-12, an Eth-Trunk that comprises aggregated
links exists between DeviceA and DeviceB. Each aggregated link interface connects
directly to only one neighbor, as if it were connected in single-neighbor
networking.
Feature Deployment
After enabling Link Automatic Discovery (LAD) on DeviceA, administrators can use
the NMS to obtain Layer 2 configurations of DeviceA and DeviceB, get a detailed
network topology, and determine whether a configuration conflict exists. LAD
helps ensure security and stability for network communication.
Terms
Term Definition
Definition
Link Automatic Discovery (LAD) is a Huawei proprietary protocol that discovers
neighbors at the link layer. LAD allows a device to issue link discovery requests as
triggered by the NMS or command lines. After the device receives link discovery
replies, the device generates neighbor information and saves it in the local MIB.
The NMS can then query neighbor information in the MIB and generate the
topology of the entire network.
Purpose
Large-scale networks demand increased NMS capabilities, such as obtaining the
topology status of connected devices automatically and detecting configuration
conflicts between devices. Currently, most NMSs use an automated discovery
function to trace changes in the network topology but can only analyze the
network-layer topology. Network-layer topology information notifies you of basic
events like the addition or deletion of devices, but gives you no information about
the interfaces used by one device to connect to other devices or the location or
network operation mode of a device.
LAD is developed to resolve these problems. LAD can identify the interfaces on a
network device and provide detailed information about connections between
devices. LAD can also display paths between clients, switches, routers, application
servers, and network servers. The detailed information provided by LAD can help
efficiently locate network faults.
Benefits
LAD helps network administrators promptly obtain detailed network topology and
changes in the topology and monitor the network status in real time, improving
security and stability for network communication.
Feature Requirements
None
Usage Scenario
LAD discovers physical and logical links when devices are connected directly or
over a Layer 2 network. The information provided by LAD helps network
administrators promptly obtain detailed network topology and changes in the
topology and monitor the network status in real time, ensuring security and
stability for network communication. On the network shown in Figure 1-13,
before the NMS collects the topology of Device A and Device B, enable LAD on
Device A and Device B so that Device A can send LAD packets to Device B and
Device B can respond with LAD packets. After Device A receives LAD packets, it
generates neighbor information and saves it in the local MIB, helping the NMS
obtain the network topology.
Pre-configuration Tasks
Before configuring LAD, configure reachable routes between devices and the NMS
and configure NETCONF parameters.
The LAD function is enabled globally on the device.
Procedure
● Enable LAD on Device A and Device B.
a. Run system-view
The system view is displayed.
b. Run interface { interface-name | interface-type interface-number }
The view of an interface on which LAD is to be enabled is displayed.
c. (Optional) Run link-detect enable
LAD is enabled on the interface.
d. Run commit
The configuration is committed.
● Enable Device A to send LAD packets to Device B.
a. Run link detect { { interface { interface-name | { interface-type
interface-number } } } | all }
Device A is enabled to send LAD packets to Device B.
----End
Run the display link neighbor all command to view neighbor information of all
interfaces.
Context
NOTICE
Procedure
Step 1 Run the clear link neighbor [ interface interface-type interface-number | slot
slot-id ] { sub-interface | all } command in the user view to delete LAD neighbor
information.
----End
Procedure
Step 1 Run the clear link-detect alarm all command in the user view to delete LAD
alarms in the trap buffer.
----End
Networking Requirements
Large-scale networks demand increased NMS capabilities, with increasing device
types and complex configurations. LAD flexibly discovers neighbors at the data
link layer and provides Layer 2 device information for the NMS.
On the network shown in Figure 1-14, Device A and Device B have reachable
links, and Device A has a reachable route to the NMS. However, the NMS can only
analyze the Layer 3 network topology, not Layer 2 network topology or
configuration conflicts. To allow the NMS to obtain the Layer 2 configurations of
Device A and Device B, or detect configuration conflicts between Device A and
Device B and identify the cause for network failures, configure LAD on both
Device A and Device B.
NOTE
Then enable Device A to send LAD Link Detect packets to Device B. After Device A
receives Link Reply packets from Device B, Device A obtains Device B's
information. The NMS can exchange NETCONF packets with Device A to obtain
the network topology between Device A and Device B.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
● Types and numbers of the interfaces connecting Device A and Device B
● IP addresses of GE 0/1/1 on Device A and Device B
Procedure
Step 1 Assign an IP address to each interface.
Configure OSPF on Device A and Device B so that they are reachable at the
network layer. For configuration details, see Configuration Files in this section.
# Configure Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] link-detect enable
[*DeviceA] commit
[~DeviceA] interface gigabitethernet0/1/1
[~DeviceA-GigabitEthernet0/1/1] link-detect enable
[*DeviceA-GigabitEthernet0/1/1] commit
[~DeviceA-GigabitEthernet0/1/1] quit
[~DeviceA] quit
# Configure Device B.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceB
[*HUAWEI] commit
[~DeviceB] link-detect enable
[*DeviceB] commit
[~DeviceB] interface gigabitethernet0/1/1
[~DeviceB-GigabitEthernet0/1/1] link-detect enable
[*DeviceB-GigabitEthernet0/1/1] commit
----End
Configuration Files
● Device A configuration file
#
sysname Device A
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.10.10.1 255.255.255.0
#
ospf 1
area 0.0.0.0
network 10.10.10.0 0.0.0.255
#
return
Definition
The Link Layer Discovery Protocol (LLDP), a Layer 2 discovery protocol defined in
IEEE 802.1ab, provides a standard link-layer discovery method that encapsulates
information about the capabilities, management address, device ID, and interface
ID of a local device into LLDP packets and sends the packets to neighboring
devices. These neighboring devices save the information received in a standard
management information base (MIB) to help the network management system
(NMS) query and determine the link communication status.
Purpose
Diversified network devices are deployed on a network, and configurations of
these devices are complicated. Therefore, NMSs must be able to meet increasing
requirements for network management capabilities, such as the capability to
automatically obtain the topology status of connected devices and the capability
to detect configuration conflicts between devices. A majority of NMSs use an
automated discovery function to trace changes in the network topology, but most
can only analyze the network layer topology. Network layer topology information
notifies you of basic events, such as the addition or deletion of devices, but gives
you no information about the interfaces to connect a device to other devices. The
NMSs can identify neither the device location nor the network operation mode.
Benefits
Deploying LLDP improves NMS capabilities. LLDP supplies the NMS with detailed
information about network topology and topology changes, and it detects
inappropriate configurations existing on the network. The information provided by
LLDP helps administrators monitor network status in real time to keep the
network secure and stable.
LLDP Frames
LLDP frames are Ethernet frames encapsulated with LLDP data units (LLDPDUs).
LLDP frames support two encapsulation modes: Ethernet II and Subnetwork
Access Protocol (SNAP). Currently, the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M supports the Ethernet II encapsulation mode.
Field Description
Field Description
Source MAC address A MAC address for an interface or a bridge MAC address
for a device (Use the MAC address for an interface if
there is one; otherwise, use the bridge MAC address for a
device).
LLDPDU
An LLDPDU is a data unit encapsulated in the data field in an LLDP frame.
A device encapsulates local device information in type-length-value (TLV) format
and combines several TLVs into an LLDPDU for transmission. You can combine
various TLVs to form an LLDPDU as required. TLVs allow a device to advertise its
own status and learn the status of neighboring devices.
Figure 1-16 shows the LLDPDU format.
Each LLDPDU carries a maximum of 28 types of TLVs, and that each LLDPDU
starts with the Chassis ID TLV, Port ID TLV, and Time to Live TLV, and ends with the
End of LLDPDU TLV. These four TLVs are mandatory. Additional TLVs are selected
as needed.
TLV
A TLV is the smallest unit of an LLDPDU. It gives type, length, and other
information for a device object. For example, a device ID is carried in the Chassis
ID TLV, an interface ID in the Port ID TLV, and a network management address in
the Management Address TLV.
LLDPDUs can carry basic TLVs, TLVs defined by IEEE 802.1, TLVs defined by IEEE
802.3, and Data Center Bridging Capabilities Exchange Protocol (DCBX) TLVs.
● Basic TLVs: are the basis for network device management.
Management 8 Management No
Address TLV address.
● Organizationally specific TLVs: include TLVs defined by IEEE 802.1 and those
defined by IEEE 802.3. They are used to enhance network device
management. Use these TLVs as needed.
a. TLVs defined by IEEE 802.1
● TLV type: a 7–bit long field. Each value uniquely identifies a TLV type. For
example, value 0 indicates the end of LLDPDU TLV, and value 1 indicates a
Chassis ID TLV.
● TLV information string length: a 9–bit long field indicating the length of a TLV
string.
● TLV information string: a string that contains TLV information. This field
contains a maximum of 511 bytes.
When TLV Type is 127, it indicates that the TLV is an organization-defined TLV. In
this case, the TLV structure is shown in Figure 1-18.
The system searches for the management IP address in the following sequence: IP address
of the loopback interface, IP address of the management network interface, and IP address
of the VLANIF interface. Among the IP addresses of the same type, the system selects the
smallest one as the management address.pac
LLDP Fundamentals
Implementation
LLDP must be used together with MIBs. LLDP requires that each device interface
be provided with four MIBs. An LLDP local system MIB that stores status
information of a local device and an LLDP remote system MIB that stores status
information of neighboring devices are the most important. The status
information includes the device ID, interface ID, system name, system description,
interface description, device capability, and network management address.
LLDP requires that each device interface be provided with an LLDP agent to
manage LLDP operations. The LLDP agent performs the following functions:
● Maintains information in the LLDP local system MIB.
● Sends LLDP packets to notify neighboring devices of local device status.
● Identifies and processes LLDP packets sent by neighboring devices and
maintains information in the LLDP remote system MIB.
● Sends LLDP alarms to the NMS when detecting changes in information stored
in the LLDP local or remote MIB.
The NMS collects and analyzes topology information stored in LLDP local and
remote system MIBs on all managed devices and determines the network
topology. The information helps rapidly detect and rectify network faults.
Working Mechanism
LLDP working modes
NOTE
When the LLDP working mode changes on an interface, the interface initializes the LLDP
state machines. To prevent repeatedly initializations caused by frequent working mode
changes, the NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M supports an initial
delay on the interface. When the working mode changes on the interface, the interface
initializes the LLDP state machines after a configured delay interval elapses.
Networking Description
In single neighbor networking, no interfaces between devices or interfaces
between devices and media endpoints (MEs) are directly connected to
intermediate devices. Each device interface is connected only to one remote
neighboring device. In the single neighbor networking shown in Figure 1-20,
Device B is directly connected to Device A and the ME, and each interface of
Device A and Device B is connected only to a single remote neighboring device.
Feature Deployment
After LLDP is configured on Device A and Device B, an administrator can use the
NMS to obtain Layer 2 configuration information about these devices, collect
detailed network topology information, and determine whether a configuration
conflict exists. LLDP helps make network communications more secure and stable.
Networking Description
In multi-neighbor networking, each interface is connected to multiple remote
neighboring devices. In the multi-neighbor networking shown in Figure 1-21, the
network connected to Device A, Device B, and Device C is unknown. Devices on
this unknown network may have LLDP disabled or may not need to be managed
by the NMS, but they can still transparently transmit LLDP packets. Interfaces on
Device A, Device B, and Device C are connected to multiple remote neighboring
devices.
Feature Deployment
After LLDP is configured on Device A, Device B, and Device C, an administrator can
use the NMS to obtain Layer 2 configuration information about these devices,
collect detailed network topology information, and determine whether a
configuration conflict exists. LLDP helps make network communications more
secure and stable.
Networking Description
In Figure 1-22, aggregated links exist between interfaces on Device A and Device
B. Each aggregated link interface is connected directly to another aggregated link
interface in the same way in single neighbor networking.
Feature Deployment
After LLDP is configured on Device A and Device B, an administrator can use the
NMS to obtain Layer 2 configuration information about these devices, collect
detailed network topology information, and determine whether a configuration
conflict exists. LLDP helps make network communications more secure and stable.
Terms
Term Description
VM virtual machine
Background
Diversified network devices are deployed on a network, and configurations of
these devices are complicated. Therefore, NMSs must be able to meet increasing
requirements for network management capabilities, such as the capability to
automatically obtain the topology status of connected devices and the capability
to detect configuration conflicts between devices. A majority of NMSs use an
automated discovery function to trace changes in the network topology, but most
can only analyze the network layer topology. Network layer topology information
notifies you of basic events, such as the addition or deletion of devices, but gives
you no information about the interfaces to connect a device to other devices. The
NMSs can identify neither the device location nor the network operation mode.
LLDP is developed to resolve these problems. LLDP can identify interfaces on a
network device and provide detailed information about connections between
devices. LLDP can also display information about paths between clients, switches,
routers, application servers, and network servers, which helps you efficiently locate
network faults.
LLDP Implementation
Figure 1-23 shows how LLDP is implemented.
1. Device A encapsulates its status information into an LLDP packet and sends
the packet to the neighboring device Device B.
2. Device B parses the LLDP packet received and saves information about Device
A to its LLDP remote system MIB, allowing the NMS to collect topology
information.
3. Device B encapsulates its status information into an LLDP packet and sends
the packet to the neighboring device Device A. Device A parses the LLDP
packet received and saves information about Device B to its LLDP remote
system MIB, allowing the NMS to collect topology information.
4. By exchanging SNMP packets with Device A and Device B, the NMS collects
information about Device A and Device B from their LLDP local system MIBs
and LLDP remote system MIBs, and analyzes the status information to
determine network topology.
Benefits
Deploying LLDP improves NMS capabilities. LLDP supplies the NMS with detailed
information about network topology and topology changes, and it detects
inappropriate configurations existing on the network. The information provided by
LLDP helps administrators monitor network status in real time to keep the
network secure and stable.
Feature Requirements
Usage Scenario
LLDP is used to obtain neighbor information and discover network topology. As
shown in Figure 1-24, if the NMS needs to collect topology information about
Device A and Device B, you can enable LLDP for Device A and Device B. Device A
and Device B send packets encapsulated with status information to each other,
allowing the NMS to obtain the topology information.
Pre-configuration Tasks
Before configuring LLDP, complete the following tasks:
● Configuring reachable routes between devices and the NMS and configuring
SNMP parameters
● Configuring an IP address for LLDP management on a device
Enabling LLDP
When LLDP is enabled on a device, the device sends LLDP packets carrying its
status information to its LLDP-capable neighbors and obtains their status
information by receiving LLDP packets from them.
Context
LLDP can be enabled globally or on an interface. The relationships are as follows:
● LLDP is disabled on all interfaces after LLDP is disabled globally.
● An interface can send and receive LLDP packets only when LLDP is enabled
globally and on the interface.
● The command to enable or disable LLDP on an interface is invalid when LLDP
is disabled globally.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run lldp enable
LLDP is enabled globally.
Step 3 Run interface interface-type interface-number
The interface view is displayed.
Step 4 (Optional) Run lldp admin-status { tx | rx | txrx }
The LLDP working mode is configured for the interface.
Step 5 (Optional) Perform the following steps to enable LLDP on a sub-interface:
1. Run the interface interface-type interface-number command to create a sub-
interface.
2. Run the vlan-type dot1q vlan-id command to associate the sub-interface
with a VLAN.
3. Run the lldp enable command in the sub-interface view to enable LLDP on
the sub-interface.
NOTE
● To enable LLDP on some interfaces and disable LLDP on other interfaces on a device,
enable LLDP globally on the device and run the undo lldp enable command on the
interfaces that do not need LLDP.
● For Eth-Trunk interfaces, LLDP can be configured only on Eth-Trunk member interfaces.
Enabling or disabling LLDP on an Eth-Trunk member interface does not affect other
member interfaces.
● Interfaces that support LLDP must be physical interfaces. Logical interfaces such as
VLANIF and Eth-Trunk interfaces do not support LLDP.
● Interfaces do not support LLDP packets carrying the VLAN tag. If LLDP is used and the
peer device is a non-Huawei router, configure the peer device not to carry the VLAN tag
in sent LLDP packets.
● Before enabling LLDP on a sub-interface, you need to enable LLDP on the corresponding
main interface. To enable LLDP on an Eth-Trunk sub-interface, you only need to enable
LLDP on all member interfaces of the Eth-Trunk.
----End
The device searches IP addresses of the following interfaces in sequence for the LLDP
management IP address: loopback interface, management network interface, and
VLANIF interface. For the same type of interfaces, the device selects the smallest IP
address as the LLDP management IP address.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run lldp management-address ip-address
The LLDP management IP address is configured.
Step 3 Run commit
The configuration is committed.
----End
Background
TLVs that can be encapsulated into an LLDPDU include basic TLVs, TLVs defined by
IEEE 802.1, TLVs defined by IEEE 802.3, as well as DDP TLVs (private).
● Basic TLVs implement basic LLDP functions. In addition to optional
management-address, port-description, system-capability, system-
description, and system-name TLVs, basic TLVs also include four mandatory
TLVs that must be encapsulated into LLDPDUs to be advertised. For details,
see NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M Feature
Description > System Management > LLDP.
● TLVs defined by IEEE 802.1, TLVs defined by IEEE 802.3 are optional TLVs used
to enhance the LLDP function. You can decide whether to encapsulate these
TLVs into LLDPDUs to be advertised based on their functions and your actual
requirements. For details, see NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M Feature Description > System Management > LLDP.
NOTE
When configuring a device to advertise basic TLVs, TLVs defined by IEEE 802.1, and TLVs
defined by IEEE 802.3:
● If you specify the all parameter, all optional TLVs of the same type will be advertised.
● If you do not specify the all parameter, only one optional TLV of the same type can be
configured and advertised at a time. You can configure the device repeatedly to
advertise multiple optional TLVs of different types.
Procedure
Step 1 Run system-view
NOTE
To configure an interface to advertise DDP TLVs, run the ddp enable command so that the
packets sent from the interface carry authentication information.
----End
Background Information
LLDP parameters include: interval for sending LLDP packets, delay for sending
LLDP packets, time multiplier of device information held in neighbors, delay for
initializing LLDP on interfaces, and number of LLDP packets being sent in quick
succession to neighbors. Values of these parameters should be appropriate. You
can adjust these parameters based on the load of a network. Table 1-12 describes
the usage scenarios of LLDP parameters.
message- Sets the interval for ● The longer the interval, the
transmission sending LLDP lower the frequency of LLDP
interval packets to adjust the packets being exchanged. This
frequency of saves system resources.
network topology However, if the interval for
discovery. sending LLDP packets is too
long, the device cannot notify
neighbors of its status in a
timely manner, reducing
network topology discovery
efficiency.
● The shorter the interval, the
higher the frequency of the
local status information being
sent to neighbors. This ensures
prompt network topology
discovery. However, if the
interval is too short, LLDP
packets are exchanged too
frequently, increasing the
system load and wasting
resources.
restart-delay Sets the delay for ● The longer the delay, the lower
initializing LLDP on the frequency of network
interfaces to avoid topology changes on a device.
network flapping However, if the delay for
caused by frequent initializing LLDP on interfaces is
LLDP status changes too long, the device cannot
on interfaces. trace changes of neighbor
status. As a result, the device
cannot detect network
topology of neighbors in a
timely manner.
● The shorter the delay, the
higher the frequency of
network topology changes on a
device. This ensures prompt
network topology discovery.
However, if the delay is too
short, the device refreshes
status information about
neighbors frequently, increasing
the system load and wasting
resources.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run lldp message-transmission interval interval
The global interval for a device to send LLDP packets is configured.
It is recommended that you use the default interval for sending LLDP packets.
Step 3 Run lldp message-transmission delay delay
The delay for sending LLDP packets is configured.
It is recommended that you use the default delay for sending LLDP packets unless
otherwise noted.
The parameters interval and delay for sending LLDP packets affect each other.
Take the value of delay into consideration when adjusting the value of interval.
● Increasing the value of interval is not restricted by the value of delay. interval
can be any number from 5 to 32768.
● Decreasing the value of interval is not restricted by the value of delay. The
target value of interval must be greater than or equal to four times the value
of delay. Otherwise, the value of delay must be adjusted to be less than or
equal to a quarter of the target value of interval.
Step 4 Run lldp message-transmission hold-multiplier hold-multiplier
Time multiplier of device information held in neighbors is configured.
It is recommended that you use the default time multiplier of device information
held in neighbors unless otherwise noted.
NOTE
● You can increase the value of hold-multiplier to prolong the time that device
information is held in neighbors.
● The value of hold-multiplier ranges from 2 to 10. The configuration does not take effect
if the value of hold-multiplierxinterval is greater than 65535.
It is recommended that you use the default delay for initializing LLDP unless
otherwise noted.
To help neighbors quickly obtain information about a local device, the local device
sends a number of LLDP packets to neighbors when the local device detects a new
neighbor (that is, when the device receives an LLDP packet from a transmitting
device for which it has no information), or when LLDP is enabled for the device
that previously had LLDP disabled, or the interface connected to a neighbor goes
Up.
----End
Prerequisites
All configurations of basic LLDP functions are complete.
Procedure
● Run the display lldp local [ interface interface-type interface-number ]
command to check local LLDP status information about all interfaces or a
specified interface.
● Run the display lldp neighbor [ interface interface-type interface-number ]
command to check LLDP status information about neighbors connected to all
interfaces or the neighbor connected to a specified interface.
If the peer interface is a POS interface, its encapsulation protocol must be PPP
or HDLC so that LLDP can discover it.
● Run the display lldp neighbor brief command to check the summary LLDP
status information about a neighbor.
If the peer interface is a POS interface, its encapsulation protocol must be PPP
or HDLC so that LLDP can discover it.
Usage Scenario
After the LLDP alarm function is configured on a device, the device sends alarms
to the NMS when information about neighbors changes.
To avoid network flapping caused by frequent LLDP alarms being sent to the
NMS, configure a delay for the device to send alarms.
Pre-configuration Tasks
Before configuring the LLDP alarm function, complete the following task:
● Configure reachable routes between devices and the NMS, and SNMP
parameters.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run snmp-agent trap enable feature-name lldp [ trap-name
lldpremtableschange ]
The LLDP alarm function is enabled.
After the LLDP alarm function is enabled for a device, the device sends alarms to
the NMS when one of the following events occurs.
● The LLDP 1.0.8802.1.1.2.0.0.1 lldpRemTablesChange alarm will be
generated when the status information about an LLDP neighbor changes.
The LLDP alarm function takes effect globally to control the capability to send
LLDP alarms on all interfaces on a device.
NOTE
The network topology changes frequently when the networking is first formed. After the
LLDP alarm function is enabled for a device, the device will frequently send alarms to the
NMS. This increases the load on the system and wastes resources. It is recommended that
you disable the LLDP alarm function when the networking is first formed.
----End
Background Information
The delay for sending LLDP alarms should be appropriate. You can adjust this
parameter based on the load of a network.
● The longer the delay, the lower the frequency of network topology changes
on a device. However, if the delay for sending LLDP alarms is too long, the
NMS cannot trace changes of the neighbor status. As a result, the NMS
cannot refresh network topology for a device in a timely manner.
● The shorter the delay, the higher the frequency of network topology changes
on a device. This helps the NMS refresh network topology on the device in a
timely manner. However, if the delay is too short, the NMS refreshes status
information about neighbors frequently. This causes flapping of network
topology on a device, increases the load on the system, and wastes resources.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run lldp enable
The LLDP function is enabled globally.
Step 3 Run lldp trap-interval interval
A delay for sending LLDP alarms is configured.
It is recommended that you use the default delay for sending LLDP alarms unless
otherwise noted.
----End
Prerequisites
All configurations for the LLDP alarm function are complete.
Procedure
● Run the display snmp-agent trap feature-name lldp all command to check
all trap messages about the LLDP module.
----End
Context
NOTICE
Statistics cannot be restored after being cleared. Therefore, exercise caution when
you run the following commands.
Procedure
● Run the reset lldp statistics [ interface interface-type interface-number ]
command in the user view to clear statistics about LLDP packets.
----End
Context
In routine maintenance, you can run the following commands in any view to
check the LLDP status.
Procedure
● Run the display lldp statistics [ interface interface-type interface-number ]
command to check statistics about LLDP packets transmitted by all interfaces
or a specified interface.
----End
Networking Requirements
As shown in Figure 1-25, there are reachable links between DeviceA, DeviceB, and
DeviceC. DeviceA and DeviceC have reachable routes to the NMS. Before the LLDP
function is configured, DeviceA cannot obtain status information about DeviceB
and DeviceC, and the NMS cannot obtain topology information between DeviceA,
DeviceB, and DeviceC by exchanging SNMP packets with them.
After the LLDP function is configured, devices can obtain status information about
neighbors by exchanging LLDP packets between them. The NMS can search for
DeviceA, DeviceB, and DeviceC based on their LLDP management addresses to
obtain topology information between them.
NOTE
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
● LLDP management addresses of DeviceA, DeviceB, and DeviceC (10.10.10.1,
10.10.10.2, and 10.10.10.3, respectively)
● Interval for sending LLDP packets (60s), delay for sending LLDP packets (9s),
and delay for sending LLDP alarms (10s)
Procedure
Step 1 Configure IP addresses and route protocols for interfaces on DeviceA, DeviceB, and
DeviceC, as shown in Figure 1-25. For details, see Configuration Files.
Step 2 Enable the LLDP function for DeviceA, DeviceB, and DeviceC globally.
# Configure DeviceA.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] lldp enable
[*DeviceA] commit
# Configure DeviceB.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceB
[*HUAWEI] commit
[~DeviceB] lldp enable
[*DeviceB] commit
# Configure DeviceC.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceC
[*HUAWEI] commit
[~DeviceC] lldp enable
[*DeviceC] commit
Step 3 Configure LLDP management addresses for DeviceA, DeviceB, and DeviceC.
# Configure 10.10.10.1 as the LLDP management address of DeviceA.
[~DeviceA] lldp management-address 10.10.10.1
[*DeviceA] commit
[*DeviceB] commit
Step 4 Configure LLDP parameters for DeviceA, DeviceB, and DeviceC. These parameters
include the interval and delay for a device to send LLDP packets.
# Configure an interval and a delay for DeviceA to send LLDP packets.
[~DeviceA] lldp message-transmission interval 60
[*DeviceA] lldp message-transmission delay 9
[*DeviceA] commit
# Configure an interval and a delay for DeviceB and DeviceC to send LLDP
packets.
For details, see the configuration of DeviceA.
Step 5 Enable the LLDP alarm function for DeviceA, DeviceB, and DeviceC. Configure an
appropriate delay for a device to send LLDP alarms.
# Configure DeviceA.
[~DeviceA] snmp-agent trap enable feature-name lldp
[*DeviceA] lldp trap-interval 10
[*DeviceA] commit
System configuration
--------------------------------------------------------------------------
LLDP Status :enabled (default is disabled)
LLDP Message Tx Interval :60 (default is 30s)
LLDP Message Tx Hold Multiplier :4 (default is 4)
LLDP Refresh Delay :2 (default is 2s)
LLDP Tx Delay :9 (default is 2s)
LLDP Notification Interval :10 (default is 5s)
LLDP Notification Enable :enabled (default is disabled)
Management Address :ipv4: 10.10.10.1
LLDP Fast Message Count :4 (default is 4)
Port information:
--------------------------------------------------------------------------
Interface Gigabitethernet 0/1/1:
LLDP Enable Status :txAndRx (default is disabled)
Total Neighbors :2
Neighbor index :1
Chassis type :macAddress
Chassis ID :00e0-fc11-1220
Port ID type :interfaceName
Port ID :Gigabitethernet 0/1/1
Port description :--
System name :DeviceB
System description :Huawei Versatile Routing Platform Software
VRP (R) software, Version 8.220 (NetEngine 8000 M14 V800R022C00SPC600)
Copyright (C) 2012-2015 Huawei Technologies Co., Ltd.
HUAWEI NetEngine 8000 M14
Neighbor index :2
Chassis type :macAddress
Chassis ID :00e0-fc33-0013
# Check whether the LLDP function is enabled and whether LLDP management
addresses are configured for DeviceB and DeviceC.
For details, see the procedures for DeviceA.
----End
Configuration Files
● DeviceA configuration file
#
sysname DeviceA
#
lldp enable
lldp message-transmission interval 60
lldp message-transmission delay 9
lldp restart-delay 3
lldp fast-count 3
#
interface GigabitEthernet0/1/1
ip address 10.10.10.1 255.255.255.0
#
lldp management-address 10.10.10.1
#
return
● DeviceB configuration file
#
sysname DeviceB
#
lldp enable
lldp message-transmission interval 60
lldp message-transmission delay 9
lldp restart-delay 3
lldp fast-count 3
#
interface GigabitEthernet0/1/1
ip address 10.10.10.2 255.255.255.0
#
lldp management-address 10.10.10.2
#
return
● Configuration file of DeviceC
#
sysname DeviceC
#
lldp enable
lldp message-transmission interval 60
lldp message-transmission delay 9
lldp restart-delay 3
lldp fast-count 3
#
interface GigabitEthernet0/1/1
ip address 10.10.10.3 255.255.255.0
#
lldp management-address 10.10.10.3
#
return
Definition
Network Time Protocol (NTP) is an application layer protocol in the TCP/IP
protocol suite. It is used to synchronize clocks between a series of distributed time
servers and clients.
Purpose
NTP is used to synchronize the time of all clock devices on a network. If time is
not synchronized on a network, time errors may occur because devices run their
own clocks. NTP synchronizes the time on all devices, enabling them to provide
various applications based on consistent time.
NTP is mainly used in the following scenarios where the clocks of all network
devices must be consistent:
● Network management: Synchronized time is used as a reference when a
network management system (NMS) analyzes the logs and debugging
information collected from different devices.
● Charging system: Synchronized time is required to ensure the accuracy and
trustworthiness of charging information.
● Several systems interworking on the same complex event: The systems must
use the same clock for reference to ensure proper sequencing of operations.
● Incremental backup between the backup server and client: Synchronized time
ensures integrity of the backup data which can be used for production system
recovery.
Overview
Table 1-13 lists the operating modes of NTP.
Client/ The client synchronizes In this mode, the server and client run at
Server its clock with the clock a high stratum level on the
mode on the server. synchronization subnet. In this mode, the
IP address of the server needs to be
obtained in advance.
Peer The symmetric active In this mode, the host runs at a relatively
mode peer and symmetric low stratum level on the synchronization
passive peer can subnet.
synchronize with each
other. The peer with a
lower stratum level
(larger stratum value) is
synchronized with the
peer with a higher
stratum level (smaller
stratum value).
Client/Server Mode
Figure 1-28 shows the packet exchange process in client/server mode. The client
synchronizes its clock with the clock on the server. The server provides
synchronization information for the client but does not alter its own clock. In
client/server mode, the server is also called a unicast server to distinguish it from
the broadcast server, multicast server, and manycast server in other modes.
Peer Mode
Figure 1-29 shows the packet exchange process in peer mode.
Broadcast Mode
Figure 1-30 shows the packet exchange process in broadcast mode. In this mode,
servers typically run high-speed broadcast media over the network. They provide
synchronization information to all clients, but do not alter their own clocks.
Multicast Mode
Figure 1-31 shows the packet exchange process in multicast mode. In this mode,
servers typically run high-speed broadcast media over the network. They provide
synchronization information to all clients, but do not alter their own clocks.
Manycast Mode
Figure 1-32 shows the packet exchange process in manycast mode. In this mode,
servers provide synchronization information to all clients and do not alter their
own clocks.
Reference 64 bits Local time at which the local clock was last set
Timestamp or corrected. Value 0 indicates that the local
clock is never synchronized.
Feature Requirements
For security purposes, you are not advised to NetEngin NetEngine 8000
use the weak security algorithm or weak e 8000 M M14/NetEngine
security protocol provided by this feature. By 8000 M14K/
default, the device provides the weak security NetEngine 8000
algorithm or protocol feature package M4/NetEngine
WEAKEA. If it is required, run the install 8000 M8/
feature-software WEAKEA command to NetEngine 8000
install the weak security algorithm or protocol M8K/NetEngine
feature package WEAKEA. 8000E M14/
NetEngine 8000E
M8/NetEngine
8100 M14/
NetEngine 8100
M8
Maximum synchronization 1s
distance
Listening interface of the NTP By default, the system does not listen to any
server interface and therefore does not respond to
any NTP client request.
Context
An NTP master clock can be configured on the server (which can be a unicast
server, broadcast server, multicast server, manycast server, or symmetric passive
peer) to provide the reference time for other devices. In addition, an interface that
listens for external NTP packets needs to be specified. Otherwise, the server fails
to respond to client requests.
An NTP master clock does not need to be configured when the local server has
been synchronized with an NTP master clock at a higher stratum. When this is the
case, if the NTP master clock at a higher stratum fails, the local server cannot
provide the reference time for lower-level clients. To resolve this problem, you are
advised to configure an NTP master clock on the local server and set its clock
stratum to that of the upper-level server plus 1.
Procedure
Step 1 Enter the system view.
system-view
Configure the local clock as the NTP master clock to provide the reference time for
other devices. The value of stratum must be smaller than the stratum value of a
client. Otherwise, the client cannot synchronize with the clock on the server.
By default, an NTP IPv4 server does not listen to any interface. If the ntp-
service server source-interface all enable command is run, the device
functions as an NTP IPv4 server and listens to all interfaces.
By default, an NTP IPv6 server does not listen to any interface. If the ntp-
service ipv6 server source-interface all enable command is run, the device
functions as an NTP IPv6 server and listens to all interfaces.
Step 4 (Optional) Change the port number for receiving NTP messages.
ntp-service port porNum
----End
Follow-up Procedure
For details about how to enable the NTP authentication function, see 1.1.4.6.2
Enabling NTP Authentication. Before configuring the working mode, ensure that
the authentication function has been configured.
Context
If the server clock changes or multiple NTP servers are available, you need to set
the clock synchronization parameters on the client clock. Such parameters include
the interval and the maximum synchronization distance threshold for
synchronizing the client clock. The client clock synchronizes with the clock source
based on the configured clock synchronization parameters.
Procedure
Step 1 Enter the system view.
system-view
By default, the clock synchronization interval is not configured on the client. The
value ranges from 180 to 600, in seconds.
Step 3 (Optional) Configure the maximum synchronization distance.
ntp-service max-distance max-distance-value
By default, the offset threshold for clock synchronization is not configured on the
client.
NOTE
If the time offset between the clock source and the client is greater than the offset
threshold, the client does not synchronize with the clock source.
----End
Context
When the client/server mode is used, you need to perform the following
configurations on the client:
Procedure
Step 1 Enter the system view.
system-view
Step 2 (Optional) Specify the source interface for sending NTP packets.
ntp-service [ ipv6 ] source-interface { interface-name | interface_type interface_num } [ vpn-instance
vpnName ]
The IP address of the NTP server is a host address and cannot be a broadcast
address, a multicast address, or the IP address of the reference clock.
If the source-interface parameter is specified, the configured server IP address
must be the same as the IP address of the source interface. Otherwise, clock
synchronization fails.
If the source interface for sending NTP packets has been configured on the server
and the source-interface parameter has been specified, the source-interface
configuration is preferred.
Step 4 Commit the configuration.
commit
----End
Context
When the peer mode is used, you need to perform the following configurations on
the symmetric active peer:
Procedure
Step 1 Enter the system view.
system-view
Step 2 (Optional) Specify the source interface for sending NTP packets.
ntp-service [ ipv6 ] source-interface { interface-name | interface_type interface_num } [ vpn-instance
vpnName ]
Step 3 Perform any of the following steps to specify the symmetric passive peer:
ntp-service unicast-peer { ipv4Addr [ version number | port port-number | authentication-keyid key-id |
source-interface { interface-name | interface-type interface-number } | vpn-instance vpn-instance-name |
preference | maxpoll max-number | minpoll min-number | preempt ] * | ipv6 ipv6Addr [ authentication-
keyid key-id | port port-number | source-interface { interface-name | interface-type interface-number } |
vpn-instance vpn-instance-name | preference | maxpoll max-number | minpoll min-number | preempt ] * }
The IP address of the symmetric passive peer is a host address and cannot be a
broadcast address, a multicast address, or the IP address of the reference clock.
If the source interface for sending NTP packets has been configured on the
symmetric passive peer and the source-interface parameter has been specified,
the source-interface configuration is preferred.
----End
Context
When the broadcast mode is used, you need to perform the following
configurations on both the broadcast server and client.
Procedure
● Configure an NTP broadcast server.
a. Enter the system view.
system-view
After the configuration is complete, the local device functions as the NTP
broadcast server periodically sending clock synchronization packets to the
broadcast address 255.255.255.255 from a specified interface.
e. Commit the configuration.
commit
b. Enter the view of the interface used for receiving NTP broadcast packets.
interface interface-type interface-number
After the configuration is complete, the local device functions as the NTP
broadcast client listening for the NTP broadcast packets sent from the
server and synchronizing the local clock with the server.
d. Commit the configuration.
commit
----End
Context
When the multicast mode is used, you need to perform the following
configurations on both the multicast server and client.
Procedure
● Configure an NTP multicast server.
a. Enter the system view.
system-view
After the configuration is complete, the local device functions as the NTP
multicast server periodically sending clock synchronization packets to the
configured destination multicast address from a specified interface.
e. Commit the configuration.
commit
b. Enter the view of the interface used for receiving NTP multicast packets.
interface interface-type interface-number
After the configuration is complete, the local device functions as the NTP
multicast client listening for the NTP multicast packets sent from the
server and synchronizing the local clock with the server.
d. Commit the configuration.
commit
----End
Context
When the manycast mode is used, you need to perform the following
configurations on both the manycast server and client.
Procedure
● Configure an NTP manycast server.
a. Enter the system view.
system-view
----End
Context
After NTP-related commands are configured on a device, it automatically disables
the NTP server function to prevent external devices from synchronizing their clocks
with the device's clock. In addition, the device generates the ntp [ ipv6 ] server
disable configuration in its configuration file. To use the device as an NTP server,
enable the NTP server function on the device.
Procedure
Step 1 Enter the system view.
system-view
----End
Prerequisites
All the basic NTP functions have been configured.
Procedure
● Run the display ntp-service sessions command to check the NTP session
status.
● Run the display ntp-service status command to check the status of the NTP
service.
● Run the display ntp-service trace command to check the tracing path
between the local device and the reference clock source.
● Run the display ntp-service bd-status command to check the status of the
clock system on the involved board of the local device.
----End
Networking Requirements
As shown in Figure 1-34, three devices are in the LAN.
● DeviceA sets its local clock as a stratum 2 NTP master clock.
● DeviceB sets DeviceA as its NTP server. That is, DeviceB functions as an NTP
client.
● DeviceC sets DeviceB as its symmetric passive peer. That is, DeviceC functions
as the symmetric active peer.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure DeviceA as the local master clock so that DeviceB sends request
packets to DeviceA for clock synchronization.
2. Configure DeviceC and DeviceB as peers so that DeviceC sends request
packets to DeviceB for clock synchronization.
Procedure
Step 1 Assign an IP address to each device and ensure that the devices are routable.
Step 2 Configure the NTP client/server mode.
# Configure DeviceA to use its local clock as a stratum 2 NTP master clock.
<DeviceA> system-view
[~DeviceA] ntp-service refclock-master 2
[*DeviceA] commit
----End
# Check the NTP status of DeviceC. The command output shows that the clock
status is synchronized, indicating that clock synchronization is complete. The
stratum of DeviceC is 4, one stratum lower than DeviceB.
[~DeviceC] display ntp-service status
clock status: synchronized
clock stratum: 4
reference clock ID: 10.0.1.32
nominal frequency: 64.0029 Hz
actual frequency: 64.0029 Hz
clock precision: 2^7
clock offset: 0.0000 ms
root delay: 124.98 ms
root dispersion: 0.15 ms
peer dispersion: 10.96 ms
reference time: 06:55:50.784 UTC Feb 7 2020(C7B7ACF6.C8D002E2)
synchronization state: clock synchronized
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
ntp-service refclock-master 2
ntp-service server source-interface GigabitEthernet0/1/1
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.31 255.255.255.0
#
return
● DeviceB
#
sysname DeviceB
#
ntp-service server source-interface GigabitEthernet0/1/1
ntp-service unicast-server 10.0.1.31
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.32 255.255.255.0
#
return
● DeviceC
#
sysname DeviceC
#
ntp-service unicast-peer 10.0.1.32
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.33 255.255.255.0
#
return
Networking Requirements
On the network shown in Figure 1-35:
● DeviceA and DeviceB are on the same network segment.
● DeviceA functions as the NTP multicast server and sends NTP multicast
packets through interface 1. Its local clock is a stratum 2 NTP master clock.
● DeviceB listens for NTP multicast messages on interface 1.
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Assign an IP address to each device and ensure that the devices are routable.
# Configure DeviceA as an NTP multicast server that sends NTP multicast packets
from interface 1.
[~DeviceA] interface gigabitethernet 0/1/1
[~DeviceA-GigabitEthernet0/1/1] ntp-service multicast-server
[*DeviceA] quit
[*DeviceA] commit
Step 3 Configure DeviceB as an NTP multicast client that resides on the same network
segment as the NTP multicast server.
# Configure DeviceB as an NTP multicast client that listens for NTP multicast
packets on interface 1.
<DeviceB> system-view
[~DeviceB] interface gigabitethernet 0/1/1
[~DeviceB-GigabitEthernet0/1/1] ntp-service multicast-client
[*DeviceB] quit
[*DeviceB] commit
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
ntp-service refclock-master 2
ntp-service server source-interface GigabitEthernet0/1/1
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.31 255.255.255.0
ntp-service multicast-server
#
return
● DeviceB
#
sysname DeviceB
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.32 255.255.255.0
ntp-service multicast-client
#
return
Networking Requirements
On the network shown in Figure 1-36:
● DeviceC and DeviceD are on the same network segment, and DeviceA is on a
different network segment. DeviceB is connected to the two network
segments.
● DeviceC is an NTP manycast server that sends anycast packets through
interface 1. The local clock of DeviceC is a stratum 2 NTP master clock.
● DeviceD and DeviceA function as manycast clients and send packets through
their interface 1.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure DeviceC as an NTP manycast server.
2. Configure DeviceA and DeviceD as NTP manycast clients.
Procedure
Step 1 Assign an IP address to each device and ensure that the devices are routable.
Step 2 Configure an NTP manycast server.
# Configure the local clock on DeviceC as a stratum 2 NTP master clock.
<DeviceC> system-view
[~DeviceC] undo ntp-service server disable
[*DeviceC] ntp-service refclock-master 2
[*DeviceC] commit
[*DeviceD] quit
[*DeviceD] commit
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.1.1.11 255.255.255.0
ntp-service manycast-client
#
return
● DeviceB
#
sysname DeviceB
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.1.1.2 255.255.255.0
#
interface GigabitEthernet0/1/2
undo shutdown
ip address 10.0.1.2 255.255.255.0
#
return
● DeviceC
#
sysname DeviceC
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.31 255.255.255.0
ntp-service manycast-server
#
ntp-service server source-interface GigabitEthernet0/1/1
#
return
● DeviceD
#
sysname DeviceD
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.32 255.255.255.0
ntp-service manycast-client
#
return
NTP Authentication
NTP authentication can be enabled on networks requiring high security. Different
keys can be used in different NTP operating modes.
Access Authority
Access authority is a simple measure taken to protect devices. You can configure
access authority on a device to protect its local clock.
NTP access control is implemented based on an access control list (ACL). NTP
supports up to five levels of access authority. An ACL rule may be specified for
each level of access authority. If an NTP access request matches an ACL rule, the
device requesting access is given access authority corresponding to that level.
When an NTP access request reaches the local end, access authority is matched
against the following access permissions in sequence. Peer has the maximum
access permission.
1. Peer: This indicates that a time request may be made and a control query
may be performed on the local clock. The local clock can also be synchronized
to a remote server.
2. Server: This indicates that a time request may be made and a control query
may be performed on the local clock. The local clock cannot be synchronized
to a remote server.
3. Synchronization: This indicates that time requests are made only on the local
clock.
4. Query: This indicates that control queries are performed only on the local
clock.
5. Limited: When the rate of NTP packets exceeds the upper limit, incoming NTP
packets are discarded. If the Kiss-of-Death (KOD) function is enabled, a kiss
code is sent.
KOD
The KOD function can be enabled on the server to perform access control. This is
useful if the volume of packets received from clients may overload a server's
loadbearing capabilities within a specified period. KOD is a modern access control
technology implemented in NTPv4 and is used by the server to provide
information, such as status reports and access control, to the client.
A KOD packet is a special type of NTP packet. In a KOD packet, the stratum field
is 0. KOD packets support two types of kiss codes: DENY and RATE.
With the KOD function enabled on a server, the server sends kiss code DENY or
RATE to the client based on configuration.
● When receiving the kiss code DENY, the client terminates all connections to
the server, and stops sending packets to the server.
● When receiving the kiss code RATE, the client immediately reduces its polling
interval to the server. The client will continue to reduce the interval if it
receives subsequent RATE kiss codes.
After the KOD function is enabled, the corresponding ACL rule needs to be
configured. When the ACL rule is configured as deny, the server sends the kiss
code DENY. When the ACL rule is configured as permit and the number of NTP
packets received reaches the configured upper limit, the server sends the RATE kiss
code.
Context
NTP authentication can be enabled on networks requiring high security. With
password authentication configured between the client and server sides, a client
synchronize its clocks only with the authenticated server.
When configuring the NTP authentication function, comply with the following
rules:
Procedure
Step 1 Enter the system view.
system-view
MD5 is a weak security algorithm and is not recommended. You are advised to use
other security algorithms for NTP key authentication. To configure the MD5
algorithm, run the undo crypto weak-algorithm disable command to enable the
weak security algorithm function first.
The system automatically verifies the strength of an entered key. Only the key that
meets the strength requirements can be configured. To disable key strength check,
run the ntp-service authentication-password complexity-check disable
command.
NOTICE
Disabling the key strength check function causes security risks. Therefore, you are
advised not to run this command.
NOTE
● A device that attempts to synchronize its clock must declare its key as reliable.
● When the client synchronizes to an authenticated server, the authentication key must be
declared as reliable only on the client side.
----End
Context
When an NTP access request reaches the local end, access authority is matched
against the following access permissions in sequence: peer, server, synchronization,
query, and limited, and peer has the maximum access permission.
Procedure
Step 1 Enter the system view.
system-view
Determine the device to be configured based on the site requirements. For details,
see Table 1-17.
----End
Context
KOD cannot be used in broadcast or multicast mode.
Procedure
Step 1 Enter the system view.
system-view
Step 4 (Optional) Configure the minimum and average intervals for receiving NTP
packets.
ntp-service discard { min-interval min-interval-val | avg-interval avg-interval-val } *
The value is expressed in the Nth power of 2 seconds. By default, the minimum
interval for sending NTP packets is 1 (2 to the power of 1s = 2s), and the average
interval is 5 (2 to the power of 5s = 32s).
----End
Context
If a host on a LAN does not need to synchronize its clock with a specified server,
you can disable a specified interface from receiving NTP packets.
Procedure
Step 1 Enter the system view.
system-view
----End
Procedure
● Run the display ntp-service status command to check the status of the NTP
service.
● Run the display ntp-service sessions verbose command to check the NTP
session status.
----End
1.1.4.6.7 Example for Configuring the NTP Client/Server Mode with Authentication
Networking Requirements
On the network shown in Figure 1-37:
● DeviceA functions as an NTP server and its local clock functions as a stratum
2 NTP master clock.
● DeviceB functions as an NTP client to synchronize its clock to DeviceA.
● DeviceC and DeviceD function as NTP clients and use DeviceB as their NTP
server.
● NTP authentication needs to be enabled on all devices.
Precautions
● Before specifying the NTP server address and the authentication key to be
sent to the NTP server, you must enable NTP authentication on an NTP client.
Otherwise, clock synchronization is directly implemented without NTP
authentication.
● The authentication keys on the NTP client and server must be the same and
the authentication key must be declared. Otherwise, NTP authentication will
fail.
● Enable NTP authentication on both the server and client.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure DeviceA as an NTP server to provide the master clock.
2. Configure DeviceB as an NTP client to synchronize its clock to DeviceA.
3. Configure DeviceC and DeviceD as NTP clients to synchronize their clocks to
DeviceB.
4. Configure NTP authentication on DeviceA, DeviceB, DeviceC, and DeviceD.
Procedure
Step 1 Assign an IP address to each device and ensure that the devices are routable.
Step 2 On DeviceA, configure the NTP master clock, specify a listening interface, and
enable NTP authentication.
# Configure DeviceA to use its local clock as a stratum 2 NTP master clock.
<DeviceA> system-view
[~DeviceA] ntp-service refclock-master 2
[*DeviceA] commit
NOTE
The authentication keys configured on the server and the client must be the same.
Step 3 On DeviceB, enable NTP authentication, specify a listening interface, and specify
an NTP server.
# Enable NTP authentication on DeviceB, configure an authentication key, and
declare the authentication key as reliable.
<DeviceB> system-view
[~DeviceB] ntp-service authentication enable
[*DeviceB] ntp-service authentication-keyid 42 authentication-mode hmac-sha256 ********
[*DeviceB] ntp-service trusted authentication-keyid 42
[*DeviceB] commit
# Specify DeviceA as the NTP server of DeviceB, and configure DeviceB to use the
configured authentication key.
[~DeviceB] ntp-service unicast-server 2.2.2.2 authentication-keyid 42
[*DeviceB] commit
Step 4 On DeviceC, enable NTP authentication and specify its NTP server.
<DeviceC> system-view
[~DeviceC] ntp-service authentication enable
[*DeviceC] ntp-service authentication-keyid 42 authentication-mode hmac-sha256 ********
[*DeviceC] ntp-service trusted authentication-keyid 42
[*DeviceC] ntp-service unicast-server 10.0.0.1 authentication-keyid 42
[*DeviceC] commit
Step 5 On DeviceD, enable NTP authentication and specify its NTP server.
<DeviceD> system-view
[~DeviceD] ntp-service authentication enable
[*DeviceD] ntp-service authentication-keyid 42 authentication-mode hmac-sha256 ********
[*DeviceD] ntp-service trusted authentication-keyid 42
[*DeviceD] ntp-service unicast-server 10.0.0.1 authentication-keyid 42
[*DeviceD] commit
----End
# Check the NTP status of DeviceC. The command output shows that the clock
status is synchronized, indicating that clock synchronization is complete. The
stratum of DeviceC is 4, one stratum lower than DeviceB.
[~DeviceC] display ntp-service status
clock status: synchronized
clock stratum: 4
reference clock ID: 10.0.0.1
nominal frequency: 60.0002 Hz
actual frequency: 60.0002 Hz
clock precision: 2^18
clock offset: 3.8128 ms
root delay: 31.26 ms
root dispersion: 74.20 ms
peer dispersion: 34.30 ms
reference time: 11:55:56.833 UTC Feb 2 2020(C7B15BCC.D5604189)
synchronization state: clock synchronized
# Check the NTP status of DeviceD. The command output shows that the clock
status is synchronized, indicating that clock synchronization is complete. The
stratum of DeviceD is 4, one stratum lower than DeviceB.
[~DeviceD] display ntp-service status
clock status: synchronized
clock stratum: 4
reference clock ID: 10.0.0.1
nominal frequency: 60.0002 Hz
actual frequency: 60.0002 Hz
clock precision: 2^18
clock offset: 3.8128 ms
root delay: 31.26 ms
root dispersion: 74.20 ms
peer dispersion: 34.30 ms
reference time: 11:55:56.833 UTC Feb 2 2020(C7B15BCC.D5604189)
synchronization state: clock synchronized
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
ntp-service authentication-keyid 42 authentication-mode hmac-sha256 cipher %+%#JA!v6M22=Gg\
{>U.lx%#)c%yY}0*"/`5mi><QS)L%+%#
ntp-service refclock-master 2
ntp-service authentication enable
ntp-service server source-interface GigabitEthernet0/1/1
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 2.2.2.2 255.255.255.0
#
ospf 1
area 0.0.0.0
network 2.2.2.0 0.0.0.255
#
return
● DeviceB
#
sysname DeviceB
#
ntp-service authentication-keyid 42 authentication-mode hmac-sha256 cipher %+%#>hD8))_H-
XZVut2u3!_0lq3,+Ph=:OE}pX;T2M'9%+%#
ntp-service trusted authentication-keyid 42
ntp-service unicast-server 2.2.2.2 authentication-keyid 42
ntp-service authentication enable
ntp-service server source-interface GigabitEthernet0/1/1
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.0.1 255.255.255.0
#
interface GigabitEthernet0/1/2
undo shutdown
ip address 10.1.1.11 255.255.255.0
#
ospf 1
area 0.0.0.0
network 10.1.1.0 0.0.0.255
network 10.0.0.0 0.0.0.255
#
return
● DeviceC
#
sysname DeviceC
#
ntp-service authentication-keyid 42 authentication-mode hmac-sha256 cipher %+
%#m:fVJfk*r&3x"1J`21^K`Y;LH;B+g(t2<ZX^}Q_~%+%#
ntp-service trusted authentication-keyid 42
ntp-service unicast-server 10.0.0.1 authentication-keyid 42
ntp-service authentication enable
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.0.2 255.255.255.0
#
ospf 1
area 0.0.0.0
network 10.0.0.0 0.0.0.255
#
return
● DeviceD
#
sysname DeviceD
#
ntp-service authentication-keyid 42 authentication-mode hmac-sha256 cipher %+%#$
\`_6BKWy1]kdR@=c;O@UX!)Vor5iYi|zIYEG_v5%+%#
ntp-service trusted authentication-keyid 42
ntp-service unicast-server 10.0.0.1 authentication-keyid 42
ntp-service authentication enable
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.0.3 255.255.255.0
#
ospf 1
area 0.0.0.0
network 10.0.0.0 0.0.0.255
#
return
1.1.4.6.8 Example for Configuring the NTP Broadcast Mode with Authentication
Networking Requirements
On the network shown in Figure 1-38:
Precautions
Before configuring an authentication key on the client or server, ensure that the
key already exists.
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Assign an IP address to each device and ensure that the devices are routable.
Step 2 Configure DeviceA as an NTP broadcast server.
# Configure the local clock on DeviceA as a stratum 3 NTP master clock.
<DeviceA> system-view
[~DeviceA] ntp-service refclock-master 3
[*DeviceA] commit
# Configure DeviceA as an NTP broadcast server that sends NTP broadcast packets
from interface 1, and configure an authentication key with key ID being 16.
[~DeviceA] interface gigabitethernet 0/1/1
[~DeviceA-GigabitEthernet0/1/1] ntp-service broadcast-server authentication-keyid 16
[*DeviceA-GigabitEthernet0/1/1] quit
[*DeviceA] commit
Step 3 Configure DeviceB as an NTP broadcast client that resides on the same network
segment as the NTP broadcast server.
# Enable NTP authentication.
<DeviceB> system-view
[~DeviceB] ntp-service authentication enable
[*DeviceB] ntp-service authentication-keyid 16 authentication-mode hmac-sha256 ********
[*DeviceB] ntp-service trusted authentication-keyid 16
[*DeviceB] commit
# Configure DeviceB as an NTP broadcast client that listens for NTP broadcast
packets on interface 1.
[~DeviceB] interface gigabitethernet 0/1/1
[*DeviceB-GigabitEthernet0/1/1] ntp-service broadcast-client
[*DeviceB-GigabitEthernet0/1/1] quit
[*DeviceB] commit
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
ntp-service authentication-keyid 16 authentication-mode hmac-sha256 cipher %+%#>hD8))_H-
XZVut2u3!_0lq3,+Ph=:OE}pX;T2M'9%+%#
ntp-service refclock-master 3
ntp-service authentication enable
ntp-service server source-interface GigabitEthernet0/1/1
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.31 255.255.255.0
ntp-service broadcast-server authentication-keyid 16
#
return
● DeviceB
#
sysname DeviceB
#
ntp-service authentication-keyid 16 authentication-mode hmac-sha256 cipher %+
%#m:fVJfk*r&3x"1J`21^K`Y;LH;B+g(t2<ZX^}Q_~%+%#
ntp-service trusted authentication-keyid 16
ntp-service authentication enable
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.1.32 255.255.255.0
ntp-service broadcast-client
#
return
Networking Requirements
On the network shown in Figure 1-39:
● DeviceA functions as an NTP unicast server, and its local clock functions as a
stratum 2 NTP master clock.
● DeviceB functions as an NTP unicast client that synchronizes its clock to
DeviceA.
● DeviceC and DeviceD function as NTP clients and use DeviceB as their NTP
server.
● NTP authentication is enabled.
● KOD is enabled on DeviceA so that DeviceA can perform access control when
the volume of packets received overloads its loadbearing capabilities.
Precautions
● Before configuring a key on the client or server, ensure that the key already
exists.
● The authentication key must be reliable on both the client and server.
Authentication must be enabled on the client.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure DeviceA as an NTP server to provide the master clock.
2. Configure DeviceB as an NTP client to synchronize its clock to DeviceA.
3. Configure DeviceC and DeviceD as NTP clients to synchronize their clocks to
DeviceB.
4. Enable NTP authentication on all devices.
NOTE
● Before specifying the NTP server address and the authentication key to be sent to the
NTP server, you must enable NTP authentication on an NTP client. Otherwise, clock
synchronization is directly implemented without NTP authentication.
● You must completely configure the client and server to ensure successful authentication.
Procedure
Step 1 Assign an IP address to each device and ensure that the devices are routable.
Step 2 On DeviceA, configure the NTP master clock, specify a listening interface, and
enable NTP authentication.
# Configure the local clock on DeviceA as a stratum 2 NTP master clock.
<DeviceA> system-view
[~DeviceA] ntp-service refclock-master 2
[*DeviceA] commit
# Configure the minimum and average intervals for receiving NTP packets.
[~DeviceA] ntp-service discard min-interval 4 avg-interval 4
[*DeviceA] commit
# Enable KOD.
[~DeviceA] ntp-service kod-enable
[*DeviceA] commit
Step 3 On DeviceB, configure the NTP master clock, specify a listening interface, and
enable NTP authentication.
# Specify DeviceA as the NTP server of DeviceB, and configure DeviceB to use the
configured authentication key.
[~DeviceB] ntp-service unicast-server 2.2.2.2 authentication-keyid 42
[*DeviceB] commit
----End
# Check the NTP status of DeviceC. The command output shows that the clock
status is synchronized, indicating that clock synchronization is complete. The
stratum of DeviceC is 4, one stratum lower than DeviceB.
[~DeviceC] display ntp-service status
clock status: synchronized
clock stratum: 4
reference clock ID: 10.0.0.1
nominal frequency: 60.0002 Hz
actual frequency: 60.0002 Hz
clock precision: 2^18
clock offset: 3.8128 ms
root delay: 31.26 ms
root dispersion: 74.20 ms
peer dispersion: 34.30 ms
reference time: 11:55:56.833 UTC Feb 2 2020(C7B15BCC.D5604189)
synchronization state: spike (clock will be set in 1010 secs)
# Check the NTP status of DeviceD. The command output shows that the clock
status is synchronized, indicating that clock synchronization is complete. The
stratum of DeviceD is 4, one stratum lower than DeviceB.
[~DeviceD] display ntp-service status
clock status: synchronized
clock stratum: 4
reference clock ID: 10.0.0.1
nominal frequency: 60.0002 Hz
actual frequency: 60.0002 Hz
clock precision: 2^18
clock offset: 3.8128 ms
root delay: 31.26 ms
root dispersion: 74.20 ms
peer dispersion: 34.30 ms
reference time: 11:55:56.833 UTC Feb 2 2020(C7B15BCC.D5604189)
synchronization state: spike (clock will be set in 1010 secs)
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 2.2.2.2 255.255.255.0
#
ospf 1
area 0.0.0.0
network 2.2.2.0 0.0.0.255
#
ntp-service authentication-keyid 42 authentication-mode hmac-sha256 cipher %+%#JA!v6M22=Gg\
{>U.lx%#)c%yY}0*"/`5mi><QS)L%+%#
ntp-service refclock-master 2
ntp-service access limited 2000
ntp-service authentication enable
ntp-service kod-enable
ntp-service discard min-interval 4 avg-interval 4
ntp-service server source-interface GigabitEthernet0/1/1
#
acl 2000
rule 2000 permit source 10.1.1.11 0
#
return
● DeviceB
#
sysname DeviceB
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.0.1 255.255.255.0
#
interface GigabitEthernet0/1/2
undo shutdown
ip address 10.0.1.1 255.255.255.0
#
ospf 1
area 0.0.0.0
network 10.0.1.0 0.0.0.255
network 10.0.0.0 0.0.0.255
#
ntp-service authentication-keyid 42 authentication-mode hmac-sha256 cipher %+%#>hD8))_H-
XZVut2u3!_0lq3,+Ph=:OE}pX;T2M'9%+%#
ntp-service trusted authentication-keyid 42
ntp-service unicast-server 2.2.2.2 authentication-keyid 42
ntp-service authentication enable
ntp-service server source-interface GigabitEthernet0/1/1
#
return
● DeviceC
#
sysname DeviceC
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.0.2 255.255.255.0
#
ospf 1
area 0.0.0.0
network 10.0.0.0 0.0.0.255
#
ntp-service authentication-keyid 42 authentication-mode hmac-sha256 cipher %+
%#m:fVJfk*r&3x"1J`21^K`Y;LH;B+g(t2<ZX^}Q_~%+%#
ntp-service trusted authentication-keyid 42
ntp-service authentication enable
ntp-service unicast-server 10.0.0.1 authentication-keyid 42
#
return
● DeviceD
#
sysname DeviceD
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.0.0.3 255.255.255.0
#
ospf 1
area 0.0.0.0
network 10.0.0.0 0.0.0.255
#
ntp-service authentication-keyid 42 authentication-mode hmac-sha256 cipher %+%#$
\`_6BKWy1]kdR@=c;O@UX!)Vor5iYi|zIYEG_v5%+%#
ntp-service trusted authentication-keyid 42
ntp-service authentication enable
ntp-service unicast-server 10.0.0.1 authentication-keyid 42
#
return
Check the tracing path from the local display ntp-service trace
device to the reference IPv4 clock
source.
NOTICE
NTP statistics cannot be restored after they are cleared. Exercise caution when
running reset commands.
Operation Command
Clear statistics about all the NTP reset ntp-service statistics packet
packets sent and received on the local [ ipv6 ]
device.
Clear statistics about the NTP packets reset ntp-service statistics packet
sent and received on a specified [ ipv6 ] interface { interface-name |
interface. interface-type interface-number | all }
Clear statistics about a specified peer. reset ntp-service statistics packet
peer [ [ ip-address [ vpn-instance
vpn-instance-name ] ] | ipv6 [ ipv6-
address [ vpn-instance vpn-instance-
name ] ] ]
Fault Symptom
The NTP server does not respond to external access requests. As a result, the NTP
client fails to synchronize its clocks with the NTP server.
Possible Causes
1. No listening interface is configured on the NTP server.
2. The server IP address specified on the NTP client is not the IP address of the
source interface for sending NTP packets.
Procedure
Step 1 Check the NTP configurations on the client and server.
display current-configuration interface [ interface-type [ interface-number ] | interface-name ] [ include-
default ]
By default, an NTP IPv4 server does not listen to any interface. If the ntp-
service server source-interface all enable command is run, the device
functions as an NTP IPv4 server and listens to all interfaces.
● Configure a listening interface for an IPv6 NTP server.
ntp-service ipv6 server source-address ipv6Addr [ vpn-instance vpnName ]
By default, an NTP IPv6 server does not listen to any interface. If the ntp-
service ipv6 server source-interface all enable command is run, the device
functions as an NTP IPv6 server and listens to all interfaces.
Step 3 Commit the configuration.
commit
----End
Fault Symptom
The NTP authentication function does not take effect. Clock synchronization can
be performed even when the server or client is invalid (for example, the keys on
the server and client are inconsistent).
Possible Causes
NTP authentication is not configured before basic NTP functions are configured.
Procedure
Step 1 Clear configurations of the basic NTP functions.
Step 2 Enable NTP authentication.
Step 3 Configure basic NTP functions.
----End
Definition
The open programmability system (OPS) is an open platform that provides
representational state transfer (RESTful) application programming interfaces
Purpose
Conventional network devices provide only limited functions and predefined
services. As networks develop, the static and inflexible service provisioning mode
cannot meet the requirements for diversified and differentiated services. Some
customers require devices with specific openness so that they can develop their
own functions and deploy proprietary management policies to implement
automatic management and maintenance, lowering management costs.
To meet the preceding requirements, Huawei offers the OPS. The OPS, an open
platform with programmability, allows users and third-party developers to develop
and deploy network management policies using open RESTful APIs. Through
programmability, the OPS implements rapid service expansion, automatic function
deployment, and intelligent device management, helping reduce network
operation and maintenance costs and simplify network operations.
Benefits
● The OPS supports user-defined configurations and applications, enhancing the
flexibility in service deployment and network device management.
● The OPS supports various third-party applications, improving network
utilization.
● The OPS allows users to develop private services.
● The OPS achieves flexible application deployment.
Security
The OPS provides the following security measures:
● API security
Only authorized users can operate the OPS. Authentication and authorization
are implemented based on roles and permissions.
● Operation security
Resources are isolated by module in the OPS and their usage can be
monitored.
● Program security
Third-party resources are used to manage programs.
● Important information security
OPS APIs use a secure communication protocol to prevent information
leakage during transmission. However, local data and operation security needs
to be assured by users.
interwork with the modules in the management, control, and data planes of the
system, expanding the overall device functionality.
Feature Requirements
RESTful API requests and responses can use NetEngin NetEngine 8000
only the ASCII character set. If a request or e 8000 M M14/NetEngine
response contains non-ASCII characters, the 8000 M14K/
request or response may fail to be parsed. NetEngine 8000
M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8/NetEngine
8100 M14/
NetEngine 8100
M8
Context
To test whether a Python script runs normally, or if you do not want to bind a
Python script to a trigger condition but want to run this script, manually trigger
the execution of this script using a command.
Procedure
Step 1 Upload a Python script file to the device.
For details about how to upload a file to the device, see File System Management.
In the script, you can define the management actions to be performed using
commands. You can also use OPS APIs to define management actions to be
performed. For details, see 1.1.5.5.2 Compiling OPS API-based Scripts.
Step 2 Install the script file in the user view.
ops install file scrFile [ destination directory ]
If you do not specify destination directory in the command, the script is installed
in cfcard:/$_user/ by default. If this parameter is specified, the script is installed in
cfcard:/$_user/directory/.
NOTE
If the specified directory does not exist, the system automatically creates the directory. A
maximum of seven levels of subdirectories can be created under cfcard:/$_user/.
----End
Context
If you want a device to run a few commands automatically in a specific condition
to implement a function, bind the commands to a command assistant.
NOTE
● Ensure that the specified commands are correct and complete. The system does not
provide help information or check the correctness of the commands bound to a
command assistant.
● Because command assistants are executed in the background, you are advised not to
bind interactive or jump commands, such as telnet and stelnet, to a command
assistant.
● When executing an interactive command that requires a Y/N choice, the system
automatically selects Y. When executing an interactive command that requires input of a
character string, the system waits for the input and proceeds to run the next command
when the wait period expires.
● The system switches to the user view by default to run the specified commands. If a
command must be executed in the system view, run the execute priority command
system-view command first. Otherwise, the command configuration does not take
effect.
● A command assistant cannot be configured based on both commands and batch files.
Procedure
Step 1 Enter the system view.
system-view
You can run the command multiple times to specify multiple commands to run.
Step 7 Commit the configuration.
commit
----End
Context
If you want a device to run a few commands automatically in a specific condition
to implement a function, write the commands one by one to a batch file with the
file name extension *.bat. Then, load the batch file and bind it to a command
assistant. When the device runs the command assistant, it executes the commands
in the batch file in sequence.
NOTE
● A command assistant can be configured with only one batch file, and cannot be configured
based on both commands and batch files.
● Ensure that the specified batch file is correct and complete. The system does not check the
correctness of content in the batch file.
● Because command assistants are executed in the background, you are advised not to bind
interactive or jump commands, such as telnet and stelnet, to a command assistant.
● The system switches to the user view by default to run commands in the batch file. If a
command must be executed in the system view, run the system-view command to enter the
system view. Otherwise, the command configuration does not take effect.
Procedure
Step 1 Upload a batch file to the device.
For details about how to upload a file to the device, see File System Management
Configuration.
If you do not specify destination directory in the command, the batch file is
installed in cfcard:/$_user/ by default. If this parameter is specified, the batch file
is installed in cfcard:/$_user/directory/.
If the specified directory does not exist, the system automatically creates the
directory. A maximum of seven levels of subdirectories can be created under
cfcard:/$_user/.
Step 8 Specify the batch file that the command assistant runs.
execute priority batch-file file-name
----End
Procedure
● Run the display ops assistant method [ name assistant-name ] command to
check information about the maintenance assistant.
● Run the display ops script [ dir-or-file-name ] command to check the
directory to which the script is installed.
----End
Networking Requirements
As shown in Figure 1-41, the remote server is an SFTP server. DeviceA and the
SFTP server have reachable routes to each other. To reduce maintenance
workload, configure DeviceA to automatically collect daily health information.
Configuration Roadmap
The configuration roadmap is as follows:
1. Create a command assistant and set a timer as the trigger condition for the
assistant, so that the assistant performs a health check periodically.
2. Specify the commands that the command assistant runs to collect health
information.
Procedure
Step 1 Configure a command assistant.
# Create a command assistant and configure it to run at 01:00 a.m. every day.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] ops
[~DeviceA-ops] assistant collect_health
[*DeviceA-ops-assistant-collect_health] condition timer cron 0 1 * * * *
[*DeviceA-ops-assistant-collect_health] commit
# Specify the commands that the command assistant runs to collect information,
such as the hardware status, route status, and interface link status, configure the
device to save the collected information to a file.
[~DeviceA-ops-assistant-collect_health] execute 1 command display device > health.txt
[*DeviceA-ops-assistant-collect_health] execute 1.5 command display health >> health.txt
[*DeviceA-ops-assistant-collect_health] execute 2 command display ip routing-table >> health.txt
[*DeviceA-ops-assistant-collect_health] execute 2.5 command display lldp neighbor brief >> health.txt
[*DeviceA-ops-assistant-collect_health] commit
[~DeviceA-ops-assistant-collect_health] return
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
ops
assistant collect_health
execute 1 command display device > health.txt
execute 1.5 command display health >> health.txt
execute 2 command display ip routing-table >> health.txt
execute 2.5 command display lldp neighbor brief >> health.txt
condition timer cron 0 1 * * * *
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.1.1.1 24
#
Context
In a script assistant, trigger conditions and tasks must be defined using the Python
ops_condition() and ops_execute() functions, respectively. A script assistant can be
triggered by command line, timer, and route change events.
Procedure
Step 1 Upload a Python script file to the device.
For details about how to upload a file to the device, see File System Management.
If you do not specify destination directory in the command, the script is installed
in cfcard:/$_user/ by default. If this parameter is specified, the script is installed in
cfcard:/$_user/directory/.
NOTE
If the specified directory does not exist, the system automatically creates the directory. A
maximum of seven levels of subdirectories can be created under cfcard:/$_user/.
Intermediate data generated during Python script running is lost after the Python
is shut down. You can configure the Python script's running variable as an
environment variable so that data can be saved and used by other users.
A script assistant is enabled by default after being created. When the trigger
condition specified in a Python script is met, the tasks specified in the script will be
automatically executed.
----End
Context
In an OPS script file, you can define operations on YANG model nodes to manage
services through OPS APIs.
The OPS API is a RESTful open and programmable interface. The following table
lists the operations supported by the OPS, RESTCONF, and NETCONF.
Zero Touch Provisioning (ZTP) can invoke OPS scripts to implement automatic
service deployment when a device starts without any configuration file.
You can compile Python scripts that are manually run and scripts defined in the
ops_execute() function of the script assistant based on the following procedure
and specifications.
Procedure
Step 1 Run the import ops statement to invoke the OPSConnection(object) function to
establish a connection to the OPS interface.
Step 2 Compile the OPS script.
import ops # Imports the OPS module. This is a fixed format.
import string # Fixed format.
uri = "/restconf/data/huawei-aaa:aaa/domains" # XPath based on the RESTCONF packet
header and YANG model of the service module. For the create, delete, get, and set operations, the
parameter in the path is fixed to data.
uri = "/restconf/operations/huawei-cfg:set-startup " # XPath based on the RESTCONF packet header
and YANG model of the service module. For RPC operations, the parameter in the path is fixed to
operations.
host = "localhost" # Fixed format.
req_data = None # Service body. Enter the data to be added in XML
format. If no data is added, enter None.
opos_conn = ops.OPSConnection(host) # Interface function that triggers OPS
connection establishment.
ret, _, rsp_data = ops_conn.create/delete/get/set(uri, req_data, timeout = time-value) # Triggers various
operations. The timeout parameter specifies an OPS request timeout period. If the OPS request timeout
period is reached, the OPS request is canceled, and a timeout error is returned. This parameter is optional.
Its value is an integer ranging from 0 to 4294967295, in seconds. The default value is 0, indicating that
there is no timeout period for OPS requests.
----End
Procedure
● Run the display ops assistant method command to check current
information about maintenance assistants.
----End
1.1.5.5.4 Example for Configuring a Script Assistant for Automatic Health Check
Networking Requirements
As shown in Figure 1-42, the remote server is an SFTP server. DeviceA and the
SFTP server have reachable routes to each other. To reduce maintenance
workload, configure DeviceA to automatically collect daily health information.
Configuration Roadmap
The configuration roadmap is as follows:
1. Compile, upload, and install a Python script on DeviceA.
2. Create a script assistant.
Procedure
Step 1 Compile a Python script.
In the Python script, set the trigger condition as the timer and the task as
executing commands to collect device information (including hardware status,
route status, and interface link status) and to send the collected information to
the SFTP server. The Python script is as follows:
# Define the function of the trigger condition.
def ops_condition(_ops):
_ops.timer.cron("con1","0 1 * * * *") # Set the timer event.
_ops.correlate("con1")
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
ops
script-assistant python health.py
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.1.1.1 24
#
URI Functions
URI Functions
URI Functions
URI Functions
Context
The OPS allows you to run the scripts you compile. You can stop a script that is
running or waiting to run.
NOTICE
When you stop a script, subsequent operations specified in the script will not be
performed. Exercise caution when you perform this operation.
Procedure
Step 1 (Optional) View information about running OPS tasks to obtain the ID of the task
to be stopped.
display ops process method
----End
Context
If a maintenance assistant is no longer needed, you can stop it.
NOTICE
Procedure
Step 1 Enter the system view.
system-view
To restart the script assistant, run the undo shutdown script-assistant script-
name command.
Step 4 Commit the configuration.
commit
----End
Context
You can disable the maintenance assistant function when you do not need the
functions provided by assistants.
NOTICE
Disabling the maintenance assistant function interrupts all the assistants. Exercise
caution when you perform this operation.
Procedure
Step 1 Enter the system view.
system-view
----End
Context
The MTP function of maintenance assistants is used to monitor connectivity of
various protocols. When a protocol connectivity is interrupted, the maintenance
assistant script is run to collect onsite information for maintainability
improvement.
If you do not need the MTP function provided by a maintenance assistant, you can
disable the function.
Procedure
Step 1 Enter the system view.
system-view
----End
Context
You can uninstall unwanted scripts or batch files to release storage space on a
device. If an installed script or batch file needs to be updated, uninstall it first and
then reinstall it after the modification.
NOTE
● If a file name is specified, the ops uninstall file command uninstalls the specified file. If
a directory is specified, the ops uninstall file command uninstalls all files in the
directory and its subdirectories.
● The ops uninstall file command cannot uninstall a script that has been bound to an
assistant. To uninstall such a script, unbind it from the assistant first.
● If the script bound to an assistant calls other scripts, the called scripts may be
uninstalled when the ops uninstall file command is run. Therefore, you are advised to
use only one script to implement required functions.
Procedure
Step 1 Uninstall a script or batch file.
ops uninstall file file-name-or-dir
----End
Definition
System time refers to the current time on a device and is an important parameter
for device running.
Purpose
System time recorded in device logs and alarms enables administrators to identify
when specific events occurred. In addition, a correctly configured system time
ensures the accuracy and consistency of device collaboration when multiple
devices interwork on a network.
Feature Requirements
Date The configured time cannot be earlier than the NetEngin NetEngin
and kernel compilation time. e 8000 M e 8000
time M14/
mana NetEngin
geme e 8000
nt M14K/
NetEngin
e 8000
M4/
NetEngin
e 8000
M8/
NetEngin
e 8000
M8K/
NetEngin
e 8000E
M14/
NetEngin
e 8000E
M8/
NetEngin
e 8100
M14/
NetEngin
e 8100
M8
Context
System time is the current time that a device keeps track of and is recorded in
timestamps of sent packets. Users in different regions can configure the system
clock according to the following conventions:
System time = Coordinated Universal Time (UTC) + Time zone offset + Daylight
saving time (DST) offset
The system time needs to be set correctly so that a device can coordinate properly
with other devices. However, on networks that contain multiple devices, setting or
adjusting the system time manually involves a heavy workload and may
compromise the clock accuracy. To ensure that all devices enabled with clock
synchronization can obtain the same time, you can configure the Network Time
Protocol (NTP) feature. This allows devices to synchronize their clocks so that they
can provide diverse applications based on consistent time.
Procedure
Step 1 Configure the time zone.
clock timezone time-zone-name { add | minus } offset
add: adds the specified time zone offset on the basis of the UTC time. The default
system time (UTC time) plus the time zone offset (offset) is the time in the time
zone specified by time-zone-name.
minus: subtracts the time zone offset (offset) from the UTC time. The remainder
obtained by subtracting the time zone offset (offset) from the default system time
(UTC time) is the time in the time zone specified by time-zone-name.
After a time zone is configured, the device adds timestamps to the local log in the
format of original system time ± offset. An example is Apr 27 2020
22:36:09+08:00.
If the configuration contains the keyword utc, the configured time is the UTC
time. If the configuration does not contain the keyword utc and a time zone has
been configured, the configured time is the system time.
If the configuration does not contain the keyword utc and no time zone has been
configured, the system saves the configured time (UTC time) based on time zone
0. In this case, the configured time is the system time. If a time zone is configured
later, the current time plus the time zone offset is the system time.
or
clock daylight-saving-time dstname repeating start-time { { first | second | third | fourth | last }
startweekday startmonth end-time { first | second | third | fourth | last } endweekday endmonth } offset
[ startyear [ endyear ] ]
During configuration of periodic DST, the start time and end time can be
configured in four modes: date+date, week+week, date+week, and week+date. For
configuration details, see the clock daylight-saving-time command.
NOTE
If the current time is the DST time, you can set a time zone using the clock timezone time-
zone-name { add | minus } offset command. However, the time zone name displayed in the
display clock command output remains as the DST time zone name, which can be
displayed as the configured time zone name only after the DST ends.
----End
Follow-up Procedure
To automatically synchronize time from the NTP server, see "NTP Configuration"
in Configuration Guide > System Management Configuration.
NOTE
Definition
Synchronization is classified into the following types:
● Clock Synchronization
Clock synchronization maintains a strict relationship between signal
frequencies or between signal phases. Signals are transmitted at the same
average rate within the valid time. In this manner, all devices on a network
run at the same rate.
On a digital communication network, a sender places a pulse signal in a
specific timeslot for transmission. A receiver needs to extract this pulse signal
from this specific timeslot to ensure that the sender and receiver
communicate properly. A prerequisite of successful communication between
the sender and receiver is clock synchronization between them. Clock
synchronization enables the clocks on the sender and receiver to be
synchronized.
● Time Synchronization
Generally, the word "time" indicates either a moment or a time interval. A
moment is a transient in a period, whereas a time interval is the interval
between two transients. Time synchronization is achieved by adjusting the
internal clocks and moments of devices based on received time signals. The
working principle of time synchronization is similar to that of clock
synchronization. When a time is adjusted, both the frequency and phase of a
clock are adjusted. The phase of this clock is represented by a moment in the
form of year, month, day, hour, minute, second, millisecond, microsecond, and
nanosecond. Time synchronization enables devices to receive discontinuous
time reference information and to adjust their times to synchronize times.
The figure shows the difference between time synchronization and clock
synchronization. In time synchronization (also known as phase synchronization),
watches A and B always keep the same time. In clock synchronization, watches A
and B keep different times, but the time difference between the two watches is a
constant value, for example, 6 hours.
Purpose
On a digital communication network, clock synchronization is implemented to
limit the frequency or phase difference between network elements (NEs) within
an allowable range. Information is encoded into digital pulse signals using pulse
code modulation (PCM) and transmitted on a digital communication network. If
two digital switching devices have different clock frequencies, or if interference
corrupts the digital bit streams during transmission, phase drift or jitter occurs.
Consequently, code-element loss or duplication may occur in the buffer of the
involved digital switching device, resulting in slip of transmitted bit streams. In
addition, if the clock frequency or phase difference exceeds an allowable range, bit
errors or jitter may occur, degrading the network transmission performance.
Basic Concepts
Clock Source
A device that provides clock signals for another device is called a clock source. A
device may have multiple clock sources, which are classified as follows:
You are advised to configure the automatic clock source selection mode. In this mode, the
system dynamically selects an optimal clock source based on clock source quality.
If a manually specified clock source becomes invalid, the system automatically switches to
track the clock source selected in automatic clock source selection mode. After the
manually specified clock source recovers, the system does not switch back to the manual
clock source selection mode. If the conditions for manual clock source selection are not
met, automatic clock source selection takes effect. If a forcibly specified clock source
becomes invalid, the system clock enters the holdover state. If the conditions are not met,
the system clock enters the free-run state.
SSM
The International Telecommunication Union-Telecommunication Standardization
Sector (ITU-T) defined the SSM to identify the quality level of a synchronization
source on synchronous digital hierarchy (SDH) networks. As stipulated by the ITU-
T, the four spare bits in one of the five Sa bytes in a 2 Mbit/s bit stream are used
to carry the SSM value. The use of the SSM value in clock source selection
improves synchronization network performance, prevents timing loops, achieves
synchronization on networks with different structures, and enhances
synchronization network reliability.
The SSM levels in ascending order are as follows:
1. UNK: The quality of the clock source is unknown.
2. DNU: Do not use (DNU) the clock source for synchronization.
3. SEC: The clock source is an SDH equipment clock (SEC).
4. SSU-B: The clock source is a G.812 local node clock (LNC).
5. SSU-A: The clock source is a G.812 transit node clock (TNC).
6. PRC: The clock source is a G.811 primary reference clock (PRC).
Extended SSM
The extended SSM function enables clock IDs to participate in automatic clock
source selection. This function prevents clock loops.
When the extended SSM function is enabled, the device does not allow clock IDs
to participate in automatic clock source selection in either of the following cases:
● The clock ID of a clock source is the same as the clock ID configured on the
device.
● The clock ID of a clock source is 0.
Enhanced SSM
The enhanced SSM function adds four SSM levels to the original SSM levels. After
enhanced SSM is enabled, the system controls clock source selection based on
enhanced-SSM levels and collects statistics on the number of high-precision
devices and the number of common-precision devices on clock transmission links.
The four new SSM levels in ascending order are as follows:
1. eSEC: The clock source is a G.8262.1 enhanced synchronous equipment clock
(eSEC).
2. ePRC: The clock source is a G.811.1 enhanced primary reference clock (ePRC).
3. PRTC: The clock source is a G.8272 primary reference time clock (PRTC).
4. ePRTC: The clock source is a G.8272.1 enhanced primary reference time clock
(ePRTC).
There are two synchronization modes for digital communication networks: pseudo
synchronization and master-slave synchronization.
Pseudo Synchronization
In pseudo synchronization mode, each switching site has its own clock with very
high accuracy and stability, and these clocks are independent of each other. There
are very small differences in terms of clock frequency and phase among these
clocks, they do not affect service transmission and can be ignored. Therefore, clock
synchronization is not carried out among the switching sites. This is the reason
that the mode is called pseudo synchronization.
Pseudo synchronization is typically applicable to digital communication networks
between countries. Generally, countries use caesium clocks in scenarios of pseudo
synchronization.
Master-Slave Synchronization
In master-slave synchronization mode, a master clock of high accuracy is set on a
network and traced by every site. Each sub-site traces its upper-stratum clock. In
this way, clock synchronization is maintained among all the NEs.
Master-slave synchronization is classified as direct or hierarchical master-slave
synchronization.
Figure 1-43 illustrates direct master-slave synchronization. In this mode, all slave
clocks synchronize with the primary reference clock. Direct master-slave
synchronization is applicable to simple networks.
● Acquiring
A slave clock traces the clock source provided by an upper-stratum clock. The
clock source may be provided either by the master clock or by the upper-
stratum clock.
● Holdover
After losing connections to all the reference clocks, a slave clock enters the
holdover state. In this case, the slave clock uses the last frequency stored
before it loses the connections as the reference clock frequency. In addition,
the slave clock provides the clock signals that conform to the original
reference clock to ensure that there is only a slight difference between the
frequency of the provided clock signals and that of the original reference
clock in a period of time.
Because the inherent frequency of the oscillator is prone to drifts, the slave
clock in the holdover state may lose accuracy over a prolonged period of time.
The accuracy of a clock in the holdover state is second only to that of the
clock in the acquiring state.
● Free-run
After losing connections to all external reference clocks, a slave clock loses
the clock reference memory or retains the holdover state for an excessively
long time. As a result, the oscillator in the slave clock starts working in the
free-run state.
When a clock board is powered on, the default SSM levels of all the reference
sources are "Unknown". SSM levels are sorted in descending order of
preference: PRC, SSU-A, SSU-B, SEC, Unknown, and DNU. If the SSM level of a
clock source is DNU and the SSM level is used in clock source selection, this
clock source is not selected during protection switching.
The SSM level of output signals of a clock is determined by the traced clock
source. Specifically, when a clock works in the tracing state, the SSM level of
output signals of this clock and that of the traced clock source are the same.
When a clock does not work in the tracing state, the SSM level of output
signals of this clock is SEC.
For a line clock source, the SSM value can be extracted from an LPU and
reported to the main control board. The main control board then sends the
SSM value of the line clock source to the clock board. Alternatively, the main
control board forcibly configures the SSM level of the line clock source.
For the BITS clock source of the clock module, if the signals are 2.048 Mbit/s,
the SSM value can be extracted by the clock module from the signals; if the
signals are 2.048 MHz, the SSM level can be set manually.
NOTE
A router can only select an SSM value listed in Table 1-29. For values not listed, the router
processes them as DNU.
None
Definition
Synchronization is classified into the following types:
● Clock Synchronization
Clock synchronization maintains a strict relationship between signal
frequencies or between signal phases. Signals are transmitted at the same
average rate within the valid time. In this manner, all devices on a network
run at the same rate.
On a digital communication network, a sender places a pulse signal in a
specific timeslot for transmission. A receiver needs to extract this pulse signal
from this specific timeslot to ensure that the sender and receiver
communicate properly. A prerequisite of successful communication between
the sender and receiver is clock synchronization between them. Clock
synchronization enables the clocks on the sender and receiver to be
synchronized.
● Time Synchronization
Generally, the word "time" indicates either a moment or a time interval. A
moment is a transient in a period, whereas a time interval is the interval
between two transients. Time synchronization is achieved by adjusting the
internal clocks and moments of devices based on received time signals. The
working principle of time synchronization is similar to that of clock
synchronization. When a time is adjusted, both the frequency and phase of a
clock are adjusted. The phase of this clock is represented by a moment in the
form of year, month, day, hour, minute, second, millisecond, microsecond, and
The figure shows the difference between time synchronization and clock
synchronization. In time synchronization (also known as phase synchronization),
watches A and B always keep the same time. In clock synchronization, watches A
and B keep different times, but the time difference between the two watches is a
constant value, for example, 6 hours.
Purpose
On a digital communication network, clock synchronization is implemented to
limit the frequency or phase difference between network elements (NEs) within
an allowable range. Information is encoded into digital pulse signals using pulse
code modulation (PCM) and transmitted on a digital communication network. If
two digital switching devices have different clock frequencies, or if interference
corrupts the digital bit streams during transmission, phase drift or jitter occurs.
Consequently, code-element loss or duplication may occur in the buffer of the
involved digital switching device, resulting in slip of transmitted bit streams. In
addition, if the clock frequency or phase difference exceeds an allowable range, bit
errors or jitter may occur, degrading the network transmission performance.
Feature Requirements
When the 2M ring does not trace the source, NetEngin NetEngine 8000
the output action ("clock bits { bits0 | bits1 | e 8000 M M14/NetEngine
bits2 } lti-action-2mbps { send-dnu | send- 8000 M14K/
ais }") of the BITS port is valid only when the NetEngine 8000
BITS signal type is set to 2mbps. M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8
The BP51-E 24x1GE subcard does not support NetEngin NetEngine 8000
synchronous Ethernet. e 8000 M M8
Involved subcard: ME0D0EFGFE7H.
Frequency synchronization deployment is
affected.
You are advised to use synchronous Ethernet
subcards instead.
The MPUP main control board does not meet NetEngin NetEngine 8000
the performance requirements of the G.8273.2 e 8000 M M8
standard.
Plan services properly.
The P51-E 24x1GE subcard does not support NetEngin NetEngine 8000
synchronous Ethernet. e 8000 M M8
Subcards involved: CR5D0EFGFE70/
CR5DL2XEFG7E.
Frequency synchronization deployment is
affected. It is recommended that synchronous
Ethernet subcards be used as substitutes.
Usage Scenario
If the status or quality of clock sources on a clock synchronization network does
not remain stable, configure the automatic clock source selection mode to ensure
that the NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M selects an
optimal clock source.
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M supports three
clock source selection modes: automatic clock source selection, manual clock
source selection, and forcible clock source selection. In automatic clock source
selection mode, the NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M
uses the automatic clock source selection algorithm to determine a clock source to
be traced. The reference factors for automatic clock source selection include
priorities, synchronous status message (SSM) levels, and clock IDs of clock sources.
The automatic clock source selection algorithm uses one or more of the reference
factors, depending on the actual configurations.
Pre-configuration Tasks
None
Context
Before configuring clock synchronization on the NetEngine 8100 M, NetEngine
8000E M, NetEngine 8000 M, configure a clock source. The NetEngine 8100 M,
NetEngine 8000E M, NetEngine 8000 M supports BITS, PTP, and line clock sources.
Perform one of the following configurations based on the clock source to be used
on a clock synchronization network:
The actual number of BITS interfaces varies with the hardware configuration. You
need to set them based on the actual situation. Similar details are omitted in the
rest of the document.
Procedure
● Configure a BITS clock source.
a. Run system-view
The system view is displayed.
b. Run clock bits-type bits0 { 2mhz | 2mbps } [ slot slotid ] slot slotid
A signal type is configured for the BITS clock source.
c. Run clock source bits0 synchronization enable [ slot slotid ]
Clock synchronization is enabled for the BITS clock source.
d. Run clock source bits0 priority priority-value [ slot slotid ]
A priority is configured for the BITS clock source. A smaller value
indicates a higher priority.
e. (Optional) Run clock sa-bit { sa4 | sa5 | sa6 | sa7 | sa8 } source bits0
[ slot slotid ]
The timeslot from which the BITS clock source extracts SSM levels is
configured.
f. (Optional) Run clock source bits0 ssm { prc | ssua | ssub | sec | dnu |
unk | prtc | eprtc | esec | eprc }
An SSM level is configured for the BITS clock source.
If the signal type of the BITS clock source is 2mhz, the BITS clock source
cannot directly extract SSM level information from clock signals. If you
have configured SSM levels to participate in clock source selection, run
this command to manually configure an SSM level for the clock source.
g. (Optional) Run clock source bits0 clock-id clockid-value
A clock ID is configured for the BITS clock source.
If you have enabled the extended SSM function, configure a clock ID for
the BITS clock source.
h. (Optional) Run clock bits output-threshold { prc | ssua | ssub | sec |
dnu }
A threshold is configured for the SSM level of clock signals sent by the
BITS clock source.
If the SSM level of the clock signals output by the BITS port is lower than
the set threshold, the BITS port stops outputting clock signals.
i. Run commit
The configuration is committed.
● Configure a PTP clock source.
a. Run system-view
The system view is displayed.
b. Run ptp device-type { oc | bc | e2etc | p2ptc | e2etcoc | p2ptcoc |
tcandbc }
A clock mode is configured for the 1588v2 device.
c. Run ptp enable
PTP is enabled.
d. Run interface interface-type interface-number
The interface view is displayed.
e. Run ptp enable
PTP is enabled on the specified interface.
f. Run quit
Return to the system view.
g. Run clock source ptp priority priority-value
A priority is configured for the PTP clock source.
A smaller value indicates a higher priority.
h. Run clock source ptp synchronization enable
Clock synchronization is enabled for the PTP clock source.
i. (Optional) Run clock source ptp ssm { dnu | prc | sec | ssua | ssub | unk
| prtc | eprtc | esec | eprc }
An SSM level is configured for the PTP clock source.
If you have configured SSM levels to participate in clock source selection,
run this command to manually configure an SSM level for the PTP clock
source.
j. (Optional) Run clock source ptp clock-id clockid-value
A clock ID is configured for the PTP clock source.
k. Run commit
The configuration is committed.
● Configure a line clock source.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
NOTE
A bundle group ID is configured for the line clock source, and the line
clock source is added to the bundle group.
This command can be run to prevent a clock loop when two or more
clock links exist between two devices.
h. Run commit
----End
Context
When the NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M works in
automatic clock source selection mode, the configurable parameters include:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run clock freq-deviation-detect enable
Frequency deviation detection is enabled.
When frequency deviation detection is enabled, frequency deviation detection
results serve as reference factors for automatic clock source selection and may
affect the final clock source selection.
Step 3 Run clock board-freq-switch enable
Frequency deviation-triggered clock source switching is enabled.
After this function is enabled, if the system detects that the frequency deviation of
the clock source is abnormal, it notifies the interface board where the clock source
resides, triggering the interface board to select the optimal clock source for use.
Step 4 Run interface interface-type interface-number
Step 5 Run clock freq-deviation recover
Frequency deviation status recovery is enabled for clock sources.
A clock source can participate in reference clock source selection only when its
frequency deviation status is normal.
NOTE
the SSM level that the NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M
transfers to this downstream device.
● Revertive mode: If the optimal clock source is faulty, the NetEngine 8100 M,
NetEngine 8000E M, NetEngine 8000 M uses the clock source selection
algorithm to select the second optimal clock source. If the optimal clock
source is restored, the NetEngine 8100 M, NetEngine 8000E M, NetEngine
8000 M automatically retraces it.
● Non-revertive mode: If the optimal clock source is faulty, the NetEngine 8100
M, NetEngine 8000E M, NetEngine 8000 M uses the clock source selection
algorithm to select the second optimal clock source. If the optimal clock
source is restored, the NetEngine 8100 M, NetEngine 8000E M, NetEngine
8000 M continues to trace the second optimal clock source. If there is no the
second optimal clock source to select, the NetEngine 8100 M, NetEngine
8000E M, NetEngine 8000 M select the optimal clock source.
When clock source signals are lost, the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M reports status changes only after a holdoff time to instruct the
clock source selection algorithm to reselect a clock source. This processing
mechanism prevents the clock source selection algorithm from frequently
reselecting a clock source when clock source signals are lost for a short time.
A WTR time is configured for a status change after the clock source is restored.
You can configure an appropriate WTR time to minimize the impact of frequent
clock source status changes on clock source selection.
----End
Configuring the Automatic Clock Source Selection Mode and Reference Factors
Context
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M supports three
clock source selection modes: automatic clock source selection, manual clock
source selection, and forcible clock source selection. By default, the NetEngine
8100 M, NetEngine 8000E M, NetEngine 8000 M works in automatic clock source
selection mode.
In automatic clock source selection mode, three reference factors may affect the
final clock source selection. The three reference factors are priorities, synchronous
status message (SSM) levels, and clock IDs of clock sources.
● By default, the automatic clock source selection algorithm selects a clock
source based on priorities of clock sources.
● If you have configured SSM levels to participate in clock source selection, the
automatic clock source selection algorithm selects a clock source based on
priorities and SSM levels of clock sources.
● If the extended SSM function is enabled, clock IDs of clock sources also
participate in clock source selection. The participation of clock IDs prevents
clock loops.
Procedure
Step 1 Run system-view
The clock source selection mode is restored to automatic clock source selection.
Then you can run this command to restore the clock source selection mode from
manual or forcible clock source selection to automatic clock source selection.
The extended SSM function is enabled so that clock IDs participate in automatic
clock source selection.
----End
Prerequisites
After configuring the automatic clock source selection mode, verify the
configuration.
Procedure
Step 1 Run the display clock config command to check clock source selection
configurations.
Step 2 Run the display clock source command to check information about all clock
sources, including the traced clock source.
----End
Usage Scenario
By default, the NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M uses
the automatic clock source selection algorithm to determine a clock source to be
traced for system or 2M phase-locked loop (PLL) clocks. You can also manually or
forcibly specify a clock source to be traced based on the quality level of clock
sources.
Pre-configuration Tasks
None
Context
Before configuring clock synchronization on the NetEngine 8100 M, NetEngine
8000E M, NetEngine 8000 M, configure a clock source. The NetEngine 8100 M,
NetEngine 8000E M, NetEngine 8000 M supports BITS, PTP, and line clock sources.
Perform one of the following configurations based on the clock source to be used
on a clock synchronization network:
The actual number of BITS interfaces varies with the hardware configuration. You
need to set them based on the actual situation. Similar details are omitted in the
following.
Procedure
● Configure a BITS clock source.
a. Run system-view
The timeslot from which the BITS clock source extracts SSM levels is
configured.
d. (Optional) Run clock source bits0 ssm { prc | ssua | ssub | sec | dnu |
unk | prtc | eprtc | esec | eprc }
An SSM level is configured for the BITS clock source.
If the signal type of the BITS clock source is 2mhz, the BITS clock source
cannot extract SSM levels from clock signals. If you have configured SSM
levels to participate in clock source selection, run this command to
manually configure an SSM level for the BITS clock source.
e. (Optional) Run clock bits output-threshold { prc | ssua | ssub | sec |
dnu }
A threshold is configured for the SSM level of clock signals sent by the
BITS clock source.
If the SSM level of the clock signals output by the BITS port is lower than
the set threshold, the BITS port stops outputting clock signals.
f. Run commit
The configuration is committed.
● Configure a PTP clock source.
a. Run system-view
The system view is displayed.
b. Run ptp device-type { oc | bc | e2etc | p2ptc | e2etcoc | p2ptcoc |
tcandbc }
A clock mode is configured for the 1588v2 device.
c. Run ptp enable
PTP is enabled.
d. Run interface interface-type interface-number
The interface view is displayed.
e. Run ptp enable
PTP is enabled on the interface.
f. Run quit
Return to the system view.
g. Run clock source ptp synchronization enable
Clock synchronization is enabled for the PTP clock source.
h. Run clock source ptp priority priority-value
A priority is configured for the PTP clock source.
A smaller value indicates a higher priority.
i. (Optional) Run clock source ptp ssm { dnu | prc | sec | ssua | ssub | unk
| prtc | eprtc | esec | eprc }
An SSM level is configured for the PTP clock source.
j. (Optional) Run clock source ptp clock-id clockid-value
A clock ID is configured for the PTP clock source.
k. Run commit
The configuration is committed.
● Configure a line clock source.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
NOTE
Context
By default, the NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M uses
the automatic clock source selection algorithm to determine a clock source to be
traced. You can also manually or forcibly specify a clock source to be traced based
on the quality level of clock sources.
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M allows you to
manually or forcibly specify a clock source to be traced for system or 2M
synchronous PLL-1/2M synchronous PLL-2 clocks. You can specify only a line clock
source for 2M synchronous PLL-1/2M synchronous PLL-2 clocks.
NOTICE
If the status of a forcibly specified clock source is not normal or its SSM level is
dnu, the system clock works in the hold state.
If the status of a manually specified clock source is neither normal nor holdoff, or
its SSM level is not the highest, this manually specified clock source does not take
effect.
Procedure
Step 1 Run system-view
NOTE
The clock manual source command configuration is not saved in the configuration file.
You can run the display clock config command to check the configurations. If the specified
clock source becomes invalid, the system automatically uses the automatic clock source
selection mode. After the device is restarted, the clock manual source command
configuration is not restored, and the system uses the default automatic clock source
selection mode. After the device is upgraded to this version from an earlier version, the
clock manual source command run in the earlier version no longer takes effect, and the
system uses the default automatic clock source selection mode.
Step 3 Run clock { manual | force } source { ptp | interface interface-type interface-
number }
A clock source is manually or forcibly specified for system clocks.
NOTE
The clock manual source command configuration is not saved in the configuration file.
You can run the display clock config command to check the configurations. If the specified
clock source becomes invalid, the system automatically uses the automatic clock source
selection mode. After the device is restarted, the clock manual source command
configuration is not restored, and the system uses the default automatic clock source
selection mode. After the device is upgraded to this version from an earlier version, the
clock manual source command run in the earlier version no longer takes effect, and the
system uses the default automatic clock source selection mode.
----End
Verifying the Configuration of the Manual or Forcible Clock Source Selection Mode
Prerequisites
After configuring the manual or forcible clock source selection mode, verify the
configuration.
Procedure
Step 1 Run the display clock config command to check clock source selection
configurations.
Step 2 Run the display clock source command to check information about all clock
sources, including the traced clock source.
----End
Context
Perform the following steps on the device:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Configure the function of maintaining clock synchronization as required.
● Run clock bits bits0 lti-action-2mbps { send-dnu | send-ais } [ slot slotid ]
command to configure the output action of the corresponding BITS interface
when the 2M ring does not trace the clock source.
● Run the clock input-threshold { dnu | prc | sec | ssua | ssub } command to
configure the threshold for the input quality level of an external clock source.
● Run the clock oam profile ccsa command to configure the CCSA OAM
function.
Step 3 Run commit
The configuration is committed.
----End
Networking Requirements
Figure 1-48 shows a ring network. On this network, Device A and Device C
connect to one external building integrated timing supply system (BITS) each.
The configuration in this example is performed on Device A, Device B, Device C, and Device
D. Interfaces 1 and 2 in this example represent GE0/1/0 and GE0/2/0, respectively.
Precautions
None
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a clock synchronization mode and enable the devices to select clock
sources based on SSM levels.
2. Configure clock sources.
3. Disable Device A from tracing clock signals from its connected BITS and check
whether devices go to trace clock signals from the BITS connected to Device
C.
Data Preparation
To complete the configuration, plan each router's clock source priority and SSM
level, as listed in Table 1-31.
Table 1-31 Clock source priority and SSM level of each router
router Clock Source in Use Priority
DeviceA BITS0 1
GE0/1/0 2
GE0/2/0 -
DeviceB GE0/1/0 1
GE0/2/0 2
DeviceC BITS0 1
GE0/1/0 -
GE0/2/0 3
DeviceD GE0/1/0 1
GE0/2/0 2
Procedure
Step 1 Enable the devices to select clock sources based on SSM levels.
# Configure Device A.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] clock ssm-control on
[*DeviceA] commit
# Configure other devices by using the same method for configuring Device A.
Step 2 Configure clock sources.
# Configure Device A.
[*DeviceA] clock bits-type bits0 2mbps
[*DeviceA] clock source bits0 synchronization enable
[*DeviceA] clock source bits0 priority 1
[*DeviceA] commit
[~DeviceA] quit
[~DeviceA] interface gigabitethernet 0/1/0
[~DeviceA-GigabitEthernet0/1/0] clock synchronization enable
[*DeviceA-GigabitEthernet0/1/0] clock priority 2
[*DeviceA-GigabitEthernet0/1/0] commit
[~DeviceA-GigabitEthernet0/1/0] quit
[~DeviceA] interface gigabitethernet 0/2/0
[*DeviceA-GigabitEthernet0/2/0] clock synchronization enable
[*DeviceA-GigabitEthernet0/2/0] commit
# Configure Device B.
# Configure Device C.
[*DeviceC] clock bits-type bits0 2mbps
[*DeviceC] clock source bits0 synchronization enable
[*DeviceC] clock source bits0 priority 1
[*DeviceC] commit
[~DeviceC] quit
[~DeviceC] interface gigabitethernet 0/1/0
[*DeviceC-GigabitEthernet0/1/0] clock synchronization enable
[*DeviceC-GigabitEthernet0/1/0] commit
[~DeviceC-GigabitEthernet0/1/0] quit
[~DeviceC] interface gigabitethernet 0/2/0
[*DeviceC-GigabitEthernet0/2/0] clock synchronization enable
[*DeviceC-GigabitEthernet0/2/0] clock priority 3
[*DeviceC-GigabitEthernet0/2/0] commit
Run the display clock source command on Device A, Device B, Device C, and
Device D to check the clock synchronization configurations and clock source
information.
Master board
Source Pri(sys/2m-1/2m-2) In-SSM Out-SSM State Ref-Source
--------------------------------------------------------------------------
bits0/11 1/---/--- ssua -- normal yes
GE0/1/0 2/---/--- dnu ssua normal yes
GE0/2/0 ---/---/--- ssua ssua normal yes
Master board
Source Pri(sys/2m-1/2m-2) In-SSM Out-SSM State Ref-Source
--------------------------------------------------------------------------
GE0/1/0 1/---/--- ssua dnu normal yes
GE0/2/0 2/---/--- dnu ssua normal yes
Master board
Source Pri(sys/2m-1/2m-2) In-SSM Out-SSM State Ref-Source
--------------------------------------------------------------------------
bits0/11 1/---/--- ssub -- normal yes
GE0/1/0 ---/---/--- dnu ssua normal yes
GE0/2/0 3/---/--- ssua dnu normal yes
Master board
Source Pri(sys/2m-1/2m-2) In-SSM Out-SSM State Ref-Source
--------------------------------------------------------------------------
GE0/1/0 1/---/--- ssua dnu normal yes
GE0/2/0 2/---/--- ssua ssua normal yes
----End
Configuration Files
● Configuration file of Device A
#
sysname DeviceA
#
clock ssm-control on
clock bits-type bits0 2mbps
clock source bits0 synchronization enable
clock source bits0 priority 1
#
interface GigabitEthernet0/1/0
clock synchronization enable
clock priority 2
#
interface GigabitEthernet0/2/0
clock synchronization enable
#
return
clock priority 2
#
return
Networking Requirements
As shown in Figure 1-49, this is a clock synchronization network consisting of
both a ring and a chain. Device A, Device B and Device C are on the same ring
clock synchronization network. Device A directly connects the external building
integrated timing supply system (BITS). Device C directly connects Device D that
belongs to the chain clock synchronization network.
In this hybrid network, each device synchronizes the best quality clock signals
from BITS when the BITS clock is normal. When a fault occurs on BITS, all devices
switch to trace the clock signals from the chain clock synchronization network to
which Device D belongs. The extensive SSM function is enabled on the network to
solve the problem of clock loops.
The configuration in this example is performed on Device A, Device B, Device C, and Device
D.
Interfaces 1 through 3 in this example represent GE 0/1/0, GE 0/2/0, GE 0/3/0, respectively.
Precautions
None
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure the mode of clock synchronization, and enable extensive SSM
function.
2. Configure clock sources.
Data Preparation
To complete the configuration, plan each router's clock source priority and clock
ID, as listed in Table 1-32.
DeviceA BITS0 1 1
GE 0/1/0 - 2
GE 0/2/0 3 3
DeviceB GE 0/1/0 1 4
GE 0/2/0 2 5
DeviceC GE 0/1/0 2 8
GE 0/2/0 3 7
GE 0/3/0 - 6
DeviceD GE 0/1/0 1 9
Procedure
Step 1 Enable extensive SSM function.
# Configure DeviceA.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[HUAWEI] commit
[~DeviceA] clock extend-ssm-control on
[*DeviceA] commit
# Configure other devices by using the same method for configuring DeviceA.
Step 2 Configure clock sources.
# Configure DeviceA.
[*DeviceA] clock bits-type bits0 2mbps
[*DeviceA] clock source bits0 priority 1
[*DeviceA] clock source bits0 clock-id 1 slot 11
[*DeviceA] commit
[~DeviceA] quit
[~DeviceA] interface gigabitethernet 0/1/0
[*DeviceA-GigabitEthernet0/1/0] clock synchronization enable
[*DeviceA-GigabitEthernet0/1/0] clock clock-id 2
[*DeviceA-GigabitEthernet0/1/0] commit
[~DeviceA-GigabitEthernet0/1/0] quit
[~DeviceA] interface gigabitethernet 0/2/0
[*DeviceA-GigabitEthernet0/2/0] clock synchronization enable
[*DeviceA-GigabitEthernet0/2/0] clock priority 3
[*DeviceA-GigabitEthernet0/2/0] clock clock-id 3
[*DeviceA-GigabitEthernet0/2/0] commit
# Configure DeviceB.
[~DeviceB] interface gigabitethernet 0/1/0
[*DeviceB-GigabitEthernet0/1/0] clock synchronization enable
[*DeviceB-GigabitEthernet0/1/0] clock priority 1
[*DeviceA-GigabitEthernet0/1/0] clock clock-id 4
[*DeviceB-GigabitEthernet0/1/0] commit
[~DeviceB-GigabitEthernet0/1/0] quit
[~DeviceB] interface gigabitethernet 0/2/0
[*DeviceB-GigabitEthernet0/2/0] clock synchronization enable
[*DeviceB-GigabitEthernet0/2/0] clock priority 2
[*DeviceA-GigabitEthernet0/2/0] clock clock-id 5
[*DeviceB-GigabitEthernet0/2/0] commit
# Configure DeviceC.
[~DeviceC] interface gigabitethernet 0/3/0
# Configure DeviceD.
[~DeviceC] interface gigabitethernet 0/1/0
[*DeviceC-GigabitEthernet0/1/0] clock synchronization enable
[*DeviceC-GigabitEthernet0/1/0] clock priority 1
[*DeviceA-GigabitEthernet0/1/0] clock clock-id 9
[*DeviceC-GigabitEthernet0/1/0] commit
[~DeviceC-GigabitEthernet0/1/0] quit
----End
Configuration Files
● DeviceA configuration file
#
sysname DeviceA
#
clock extend-ssm-control on
clock bits-type bits0 2mbps
clock source bits0 clock-id 1 slot 11
#
interface GigabitEthernet0/1/0
clock synchronization enable
clock clock-id 2
#
interface GigabitEthernet0/2/0
clock synchronization enable
clock priority 3
clock clock-id 3
#
return
sysname DeviceC
#
clock extend-ssm-control on
#
interface GigabitEthernet0/1/0
clock synchronization enable
clock priority 2
clock clock-id 8
#
interface GigabitEthernet0/2/0
clock synchronization enable
clock priority 3
clock clock-id 7
#
interface GigabitEthernet0/3/0
clock synchronization enable
clock clock-id 6
#
return
Description
● Synchronization
On a modern communications network, most telecommunications services
require that the frequency offset or time difference between devices be within
an acceptable range. To meet this requirement, network clock synchronization
must be implemented. Network clock synchronization includes frequency
synchronization and time synchronization.
– Time synchronization
Time synchronization, also called phase synchronization, means that both
the frequency of and the time between signals remain consistent. In this
case, the time offset between signals is always 0.
– Frequency synchronization
Purpose
Data communications networks do not require time or frequency synchronization
and, therefore, routers on such networks do not need to support time or frequency
synchronization. On IP radio access networks (RANs), time or frequency needs to
be synchronized among base transceiver stations (BTSs). Therefore, routers on IP
RANs are required to support time or frequency synchronization.
Frequency synchronization between BTSs on an IP RAN requires that frequencies
between BTSs be synchronized to a certain level of accuracy; otherwise, calls may
be dropped during mobile handoffs. In addition to frequency synchronization,
some wireless standards require time synchronization. Table 1-33 lists the
requirements of wireless standards for the accuracy of frequency and time
synchronization.
Table 1-33 Requirements of wireless standards for the accuracy of frequency and
time synchronization
Wireless Standard Required Frequency Required Time
Synchronization Synchronization
Accuracy Accuracy
1588v2 packets are of the highest priority by default to avoid packet loss and keep
clock precision.
Benefits
This feature brings the following benefits to carriers:
Concepts of G.8275.1
ITU-T defines the precision time protocol telecom profile for phase/time
synchronization with full timing support from the network, known as G.8275.1,
which is a time synchronization protocol.
A physical network can be logically divided into multiple clock domains. Each
clock domain has its own independent synchronous time, with which clocks in the
same domain synchronize.
● Telecom-boundary clock (T-BC): A T-BC has more than one G.8275.1 interface.
One interface of the T-BC synchronizes time signals with an upstream clock,
and the other interfaces distribute the time signals to downstream clocks.
● Telecom transparent clock (T-TC): A T-TC has more than one G.8275.1
interface through which the T-TC forwards G.8275.1 packets, and corrects the
packet transmission delay. A T-TC does not synchronize the time through any
of these G.8275.1 interfaces.
● Telecom time slave clock (T-TSC): A T-TSC can only be the slave clock that
synchronizes the time information of the upstream device.
NOTE
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M can function only as a
T-BC or T-TC.
Concepts of SMPTE-2059-2
SMPTE-2059-2 is an IEEE 1588-based standard that allows time synchronization of
video devices over an IP network.
The SMPTE-2059-2 protocol provides acceptable lock time, jitter, and accuracy.
SMPTE-2059-2 is developed based on IEEE 1588. For details about the principles,
networking, and related concepts of SMPTE-2059-2, see the IEEE 1588 protocol.
Basic Concepts
Clock Domain
A physical network can be logically divided into multiple clock domains. Each
clock domain has a reference time with which all devices in the domain are
synchronized. The reference time in one clock domain is different from and
independent of that in another clock domain.
A device can transparently transmit the time information from multiple clock
domains over a transport network to provide reference times for multiple mobile
carrier networks. The device, however, can join only one clock domain and
synchronize the time with only one reference time.
Clock Nodes
Each node on a time synchronization network is called a clock. 1588v2 defines the
following types of clocks:
● Ordinary clock (OC)
An OC has only one 1588v2 interface. Through this interface the OC
synchronizes the time with an upstream node or distributes the time to
downstream nodes.
● Boundary clock (BC)
A BC has multiple 1588v2 interfaces. The BC uses one of these interfaces to
synchronize the time with an upstream node and uses the other interfaces to
distribute the time to downstream nodes.
Figure 1-51 Positions of the OC, BC, and TC on a time synchronization network
IEEE 1588v2 defines an Announce message that is used to exchange time source
information between clock nodes. Such information includes the precedence of the
grandmaster clock, stratum, time precision, and number of hops to the
grandmaster clock. With this information, clock nodes determine the grandmaster
clock, select the interfaces through which to synchronize the time with the
grandmaster clock, and determine the master-slave relationship between two
clock nodes. After a time source is selected, a spanning tree can be created, which
is a fully connected loop-free topology that has the grandmaster clock as the root.
If a master-slave relationship has been set up between two nodes, the master
node periodically sends an Announce message to the slave node. If the slave node
does not receive an Announce message from the master node within a specified
period, the slave node terminates the current master-slave relationship and finds
another interface with which to establish a new master-slave relationship.
Clock nodes also support packet timing signal fail (PTSF)-triggered source
switching. If the current time source has an offset change (greater than 1.1 μs for
three consecutive seconds) or a signal failure occurs due to the loss of Sync
packets, a clock node automatically switches to another valid time source.
Grandmaster
A time synchronization network is like a spanning tree, on which the grandmaster
clock is the root node. Other nodes synchronize their time with the grandmaster
clock.
Master/Slave
When a pair of nodes performs time synchronization, the upstream node
distributing the reference time is the master node and the downstream node
receiving the reference time is the slave node.
unidirectional delay is half the bidirectional delay. On this basis, the time offset
between the slave and master nodes can be obtained. The slave node then
synchronizes with the master node by correcting its local time according to the
time offset.
However, the delay variation on an existing network and the different delays in
opposite directions on a link result in low time synchronization precision. For
example, the precision in NTP can be as low as 10 ms to 100 ms.
While 1588v2 and NTP have the same principles, they differ in implementation.
NTP runs at the application layer, for example, on the MPU of NetEngine 8100 M,
NetEngine 8000E M, NetEngine 8000 M. The delay measured by NTP, in addition
to the link delay, includes various internal processing delays, such as the internal
congestion queuing, software scheduling, and software processing delays. These
make the packet transmission delay unstable, causing packet transmission delays
in two directions to be asymmetric. As a result, the accuracy of NTP-based time
synchronization is low.
Different from NTP, 1588v2 assumes that the link delay is a constant value (or
changes slowly, and the change between synchronization processes is a trivial
value that can be ignored), and that delays in opposite directions on a link are the
same. In this case, 1588v2 adds timestamps at the points closest to each end of a
link to measure the link delay, achieving the highest possible degree of time
synchronization precision.
1588v2 defines two modes for the delay measurement and time synchronization,
namely, Delay and Peer Delay (PDelay).
Delay Mode
The Delay mode is applied to E2E delay measurement. Figure 1-52 shows the
delay measurement in Delay mode.
NOTE
In Figure 1-52, t-sm and t-ms are delays in opposite directions. In the following example,
the two delay values are the same. If they are different, the asymmetrical delay correction
mechanism can be used to compensate for the asymmetric delay. For details about
asymmetric delay correction, see the following part of this section.
Follow_Up packets are used in two-step mode. Here, the one-step mode is described and
Follow_Up packets are disregarded. The two-step mode is described later in this section.
A master node periodically sends a Sync packet carrying the sending timestamp t1
to the slave node. When the slave node receives the Sync packet, it adds the
timestamp t2 to the packet.
The slave node periodically sends a Delay_Req packet to the master node and
records the sending timestamp t3. When the master node receives the Delay_Req
packet, it adds the timestamp t4 to the packet and returns a Delay_Resp packet to
the slave node.
In this way, the slave node obtains a set of timestamps, namely, t1, t2, t3, and t4.
Essentially, the bidirectional delays are as follows:
The sum of bidirectional delays on the link between the master and slave nodes is
equal to (t4 – t1) – (t3 – t2). The unidirectional delay (Delay) on the link between
the master and slave nodes (assuming that the delays in opposite directions are
symmetric) is equal to [(t4 – t1) – (t3 – t2)]/2.
If the time offset of the slave node relative to the master node is Offset, then:
t2 – t1 = Delay + Offset
t4 – t3 = Delay – Offset
Figure 1-53 shows a scenario in which a BC and an OC are directly connected. TCs can also be deployed
between the BC and OC; however, the TCs must be 1588v2-capable devices in order to ensure the precision
of time synchronization. If TCs are deployed, they only transparently transmit 1588v2 packets and correct
the forwarding delays in these packets.
Stable delay, without variation, between two nodes is key to achieving high precision in 1588v2 time
synchronization. Generally, link delays can meet this requirement. However, because the forwarding delay
varies significantly, the precision of time synchronization cannot be ensured if a forwarding device is
deployed between two nodes that perform time synchronization. The solution to this is to perform
forwarding delay correction on forwarding devices (which must be TCs).
Figure 1-54 shows how the forwarding delay correction is performed on a TC.
The TC modifies the CorrectionField field of a 1588v2 packet on the inbound and outbound interfaces.
Specifically, the TC subtracts the timestamp indicating when the 1588v2 packet was received on the
inbound interface and adds the timestamp indicating when the 1588v2 packet was sent from the outbound
interface. As such, the forwarding delay of the 1588v2 packet on the TC is added to the CorrectionField field.
In this manner, the 1588v2 packet exchanged between the master and slave nodes, when passing through
multiple TCs, carry packet forwarding delays of all TCs in the CorrectionField field. When the slave node is
synchronized with the master node, the value of the CorrectionField field is deducted and the value
obtained is the link delay. This ensures high-precision time synchronization.
The preceding TCs are called E2E TCs. In Delay mode, only E2E TCs are applicable. Figure 1-55 shows how
the BC, OC and E2E TC are connected and how 1588v2 operates.
Figure 1-55 Networking of the BC, OC, and E2E TC and the synchronization
process
PDelay Mode
When performing time synchronization in PDelay mode, the slave node deducts
both the packet forwarding delay and upstream link delay. The time
synchronization in PDelay mode requires that each device obtains its upstream
link delay. This can be achieved by running the peer delay protocol between
adjacent devices. Figure 1-56 shows the time synchronization process.
NOTE
In Figure 1-52, t-sm and t-ms are delays in opposite directions. In the following example,
the two delay values are the same. If they are different, the asymmetrical delay correction
mechanism can be used to compensate for the asymmetric delay. For details about
asymmetric delay correction, see the following part of this section.
Follow_Up packets are used in two-step mode. Here, the one-step mode is described and
Follow_Up packets are disregarded. The two-step mode is described later in this section.
In this way, node 1 obtains a set of timestamps, namely, t1, t2, t3, and t4.
Essentially, the bidirectional delays are as follows:
The sum of bidirectional delays on the link between node 1 and node 2 is equal to
(t4 – t1) – (t3 – t2).
The unidirectional delay on the link between node 1 and node 2 (assuming that
the delays in opposite directions are symmetric) is equal to [(t4 – t1) – (t3 –
t2)]/2.
The delay measurement in PDelay mode does not differentiate between the
master and slave nodes. All nodes send PDelay packets to their adjacent nodes to
calculate adjacent link delay. This calculation process repeats and the packet
transmission delay in one direction is updated accordingly.
In the preceding process, the link delay is calculated and updated in real time, but
time synchronization is not performed. For time synchronization, Sync packets
must be sent from the master node to the slave node. Specifically, the master
node periodically sends a Sync packet to the slave node, which obtains two
timestamps, namely, t1 and t2. After the slave node corrects the delay by
deducting the delay on the link from the master node to the slave node, the
obtained value (t2 – t1 – CorrectionField) is the time offset of the slave node
relative to the master node. Based on the time offset, the slave node synchronizes
its time with the master node. Figure 1-57 shows the networking.
Figure 1-59 shows how the BC, OC and P2P TC are connected and how PDelay
operates.
One-Step/Two-Step
In one-step mode, Sync packets for time synchronization in Delay mode and
PDelay_Resp packets for time synchronization in PDelay mode include a sending
timestamp.
In two-step mode, Sync packets for time synchronization in Delay mode and
PDelay_Resp packets for time synchronization in PDelay mode do not include a
sending timestamp. Instead, their sending time is recorded and then added as a
timestamp in subsequent packets, such as Follow_Up and PDelay_Resp_Follow_Up
packets.
NOTE
For time synchronization protocols, when an HP-GE interface is used to connect to an ultra-
high-precision time server, the two-step mode is supported by default, and the one-step
mode is not supported.
Generally, the values of t-sm and t-ms are the same. If they are different and the
difference remains fixed, you can measure the delay difference using a meter, and
then configure the delay difference. On this basis, 1588v2 calculates the
asymmetry correction value during time synchronization calculation, thereby
achieving precise time synchronization even for links with asymmetric delays.
Packet Encapsulation
1588v2 defines the following packet encapsulation modes:
BITS Interface
1588v2 enables time synchronization between clock nodes, but cannot
synchronize these clock nodes with the Coordinated Universal Time (UTC). To
ensure that the clock nodes are synchronized with the UTC, an external time
source is required. In other words, the grandmaster clock needs to be connected to
an external time source to obtain synchronized time in non-1588v2 mode.
Clock Synchronization
In addition to time synchronization, 1588v2 can be used for clock synchronization.
That is, frequency synchronization can be achieved through 1588v2 packets.
1588v2 time synchronization in Delay or PDelay mode requires the device at one
or both ends of a link to periodically send Sync packets to its peer.
The Sync packet carries a sending timestamp. After receiving the Sync packet, the
peer end adds a receiving timestamp to it. If the link delay is stable, the sending
and receiving timestamps change at the same pace. If the receiving timestamp
changes faster or slower than the sending timestamp, the clock on the receiving
device runs faster or slower than the clock on the sending device. In this case, the
local clock on the receiving device must be adjusted to ensure frequency
synchronization between the two devices.
Offset Introduction
The function of 1588v2 and G.8275.1 requires that the delay on the transmit and
receive paths between the master and slave devices be the same. If the receive
and transmit path delay values are different, a synchronization error is introduced,
which is half of the receive and transmit path delay difference. In the hop-by-hop
synchronization scenario, whether the delay of the receive and transmit paths
between the master and slave devices is the same is determined based on the
lengths of the receive and transmit fibers.
As shown in Figure 1-66, fiber asymmetry does not occur if the transmit and
receive fibers between the master and slave devices are routed through the same
optical cable and the lengths of pigtails are the same. If the transmit and receive
optical fibers between the master and slave devices are routed through optical
cables of different lengths or the lengths of pigtails are different, fiber asymmetry
occurs.
Figure 1-67 Real-time offset monitoring and automatic compensation when GPS
is deployed on the base station side
4. NCE obtains the offset information received by each clock port from each
device in polling mode.
5. NCE determines asymmetric links and offset values on the network based on
the offset information reported by each device.
6. NCE delivers the offset values to the devices at both ends of the asymmetric
links.
1. After the passive port detection function is enabled on the entire network, the
device automatically determines the device with both the slave port and
passive port using the BMC algorithm.
2. If the offset value on the passive port is greater than the threshold, an alarm
is triggered. Otherwise, the clock network is normal and no offset is required.
3. On the device where the passive port resides, select a reference port that
supports 1588 synchronization and connect the reference source to the
reference port.
4. Each device receives the time synchronization information delivered from the
reference port and calculates the offset between the restored time of the
slave port and the time of the reference port.
5. NCE obtains the offset information fed back by each device and determines
the asymmetric links and offset values on the network.
6. NCE delivers the offset values to the devices at both ends of the asymmetric
links.
1. When services are abnormal, select a reference port that supports 1588
synchronization at the end node of the chain and connect the reference
source to the reference port.
2. Each device receives the time synchronization information delivered from the
reference port and calculates the offset between the restored time of the
slave port and the time of the reference port.
3. NCE obtains the offset information fed back by each device and determines
the asymmetric links and offset values on the network.
4. NCE delivers the offset values to the devices at both ends of the asymmetric
links.
Because a master clock has multiple slave clocks, it is recommended that you use
the BITS or IP clock server as the master clock. It is not recommended to use any
device as the master clock because the CPU of the device may be overloaded.
As shown in Figure 1-69, the clock source can send clock signals to gNodeBs
through the 1588v2 clock, WAN clock, synchronous Ethernet clock, or any
combination of clocks.
Scenario description:
Solution description:
Figure 1-70 Networking diagram of the bearer and wireless networks in the same
clock domain
Scenario description:
Solution description:
● Links or devices that do not support 1588v2 can be connected to devices with
GPS or BITS clock interfaces to perform time synchronization.
● Advantage of the solution: The time of all nodes is synchronous on the entire
network.
● Disadvantage of the solution: All nodes on the entire network must support
1588v2.
Figure 1-71 Networking diagram of the bearer and wireless networks in different
clock domains
Scenario description:
● gNodeBs need to synchronize time with each other.
● The bearer and wireless networks are in different time domains.
Solution description:
● The GPS is used as a time source and is connected to the wireless IP clock
server.
● BCs are deployed in the middle of the bearer network to synchronize the time
of the intermediate network.
● TCs are deployed on both ends of the bearer network. TCs only correct the
message transmission delay and send the time to NodeBs, but do not
synchronize the time with the clock server.
● Advantage of the solution: The implementation is simple because the bearer
network does not need to synchronize with the clock server.
● Disadvantage of the solution: Devices on both ends of the bearer network
need to support 1588v2 in TCandBC mode.
Scenario description:
● gNodeBs need to synchronize time with each other.
● The bearer and wireless networks are in the same clock domain.
Solution description:
● The core node supports GPS or BITS clock interfaces.
● Network-wide time synchronization is achieved from the core node in T-BC
mode. All T-BC nodes support path delay measurement to adapt to fast link
switching.
● Network-wide synchronization can be traced to two grand masters.
● Advantage of the solution: The network-wide time is synchronized to ensure
the optimal tracing path.
● Disadvantage of the solution: All nodes on the entire network must support
1588v2 and G.8257.1.
As shown in Figure 1-73, the clock server and the base station transmit TOP-
encapsulated SMPTE-2059-2 packets over a bearer network enabled with QoS
assurance (jitter < 20 ms).
Scenario description:
● gNodeBs only need frequency synchronization.
● The bearer network does not support SMPTE-2059-2 or the use of SyncE to
restore frequency.
Solution description:
● Bearer network devices are connected to the wireless IP clock server, and
SMPTE-2059-2 is used to transmit and restore clock in E2E mode.
● The clock server sends timing messages in the SMPTE-2059-2 format. The
bearer network transparently transmits the timing messages. Upon receipt of
the timing messages, gNodeBs restore clock information.
● SMPTE-2059-2 packets are transparently transmitted over the bearer network
by priority to ensure an E2E jitter of less than 20 ms.
● Advantage of the solution: Devices on the bearer network are not required to
support SMPTE-2059-2, and are therefore easily deployed.
● Disadvantage of the solution: Only frequency synchronization rather than
time synchronization is performed. In practice, an E2E jitter of less than 20 ms
is not ensured.
Terms
Terms Description
Terms Description
IEEE 1588v2, also called Precision Time Protocol (PTP), is defined by the
1588v2 Institute of Electrical and Electronics Engineers (IEEE) as a precision
PTP clock synchronization protocol for networked measurement and
control systems.
BC Boundary Clock
OC Ordinary Clock
TC Transparent Clock
Purpose
Data communications networks do not require time or frequency synchronization
and, therefore, routers on such networks do not need to support time or frequency
synchronization. On IP radio access networks (RANs), time or frequency needs to
be synchronized among base transceiver stations (BTSs). Therefore, routers on IP
RANs are required to support time or frequency synchronization.
Table 1-34 Requirements of wireless standards for the accuracy of frequency and
time synchronization
Feature Requirements
After 1588 is enabled for the first time on a NetEngin NetEngine 8000
CR5D00TBXF70/CR5D00T6XF70 subcard or a e 8000 M M8
single link fault is rectified for a long time, the
time required for locking the 1588 time
becomes longer (about 50 minutes at most).
You can enable the PTP function on the port
again to quickly lock the port.
The slaveonly function and the static 1588v2 NetEngin NetEngine 8000
function are mutually exclusive on an OC, e 8000 M M14/NetEngine
affecting time synchronization. 8000 M14K/
NetEngine 8000
M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8
Context
In scenarios where the standard BMC algorithm is used for clock source selection,
if the default state of a PTP port expected to work in the slave state is set to
master, or the default state of a PTP port expected to work in the master state is
set to slave, the BMC status of the port is determined as passive. In other cases,
configuring the default state of a PTP port does not affect the BMC status of the
port.
After the default state of a PTP port is configured, the passive detection
mechanism can be used to detect whether the corresponding optical fiber link on
the network changes abruptly.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run ptp port-state primary { slave | master }
The default state of the PTP port is configured.
Step 4 Run commit
The configuration is committed.
----End
Usage Scenario
A 1588v2 network has to import BITS time signals before implementing clock
synchronization. The BMC algorithm can be used to select the grandmaster and
determine the master and slave clocks. A dynamic 1588v2 network allows devices
to elect a clock source with the highest priority.
● Typical dynamic 1588v2 network with OC, BC, TC, and TCOC devices
Figure 1-74 shows that a BC and an OC are separately connected to BITSs or
GPSs. The BC and OC use the BMC algorithm to select the OC as the
grandmaster. The grandmaster obtains time signals and sends 1588v2 packets
carrying time information over the bearer network. TCs, including the TCOC,
are core devices on the bearer network. TCs transparently transmit time
information over the bearer network. The TCOC can also implement
frequency synchronization. BCs at the edge of the bearer network send highly
accurate time information carried in 1588v2 packets to wireless access
devices, such as gNodeBs and radio network controllers (RNCs).
Pre-configuration Tasks
● Set physical parameters of interfaces and ensure that the interfaces are
physically Up.
Context
BITSs provide time signals for routers. 1588v2 routers can be configured to import
time signals from BITSs and use the BMC algorithm to select a master clock. The
master clock provides time signals for other devices over a 1588v2 network.
1588v2 routers obtain clock synchronization information from the grandmaster.
Perform the following steps on each router that is connected to a BITS on a
1588v2 network:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Select the type of the input time signal.
The following example shows how to import an external clock source from the
1pps bits1 interface.
clock bits-type bits1 1pps input
The actual number of BITS interfaces and their numbers depend on the hardware
configuration. For details about clock interfaces, see Hardware Description.
Generally, BITS0 provides frequency signals for physical clock synchronization and
corresponds to CLK or CLK/TOD0 on the interface panel; BITS1 provides time
signals and corresponds to TOD or CLK/TOD1 on the interface panel. If there is
only one CLK/TOD interface on a device, the device can provide the BITS0 and
BITS1 interfaces through a one-to-two cable.
Step 3 Configure BITS signals to participate in BMC calculation.
The following example uses BITS1 signals.
ptp clock-source bits1 on
Step 4 (Optional) Configure the correction time for the delay in sending and receiving
time signals from the BITS interface.
Configuration on the BITS1 interface is used as an example.
ptp clock-source bits1 { receive-delay receive-delay-value | send-delay send-delay-value }
----End
Context
A 1588v2 router runs the BMC algorithm to use the following parameters in
sequence to select a master clock:
● priority1
● clock-class
● clock-accuracy
● priority2
For example, the router compares priority1 values of two candidates. If the two
candidates have the same priority1 value, the router compares clock classes of the
two candidates. The process repeats until the router selects a master clock.
Perform the following steps on each router that is connected to a BITS on a
1588v2 network:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Configure the type of the clock source to be traced.
This example uses the local clock and BITS1 signals. The actual number of BITS
interfaces and their numbers depend on the hardware configuration.
ptp clock-source { local time-source time-source-value | bits1 time-source time-source-value }
NOTE
This configuration can be performed only on the grandmaster clock. The time-source-value
parameter is set based on the type of the clock source. For the mapping between the time-
source-value parameter and clock source types, see ptp clock-source in the NetEngine
8100 M, NetEngine 8000E M, NetEngine 8000 M Command Reference.
For the mapping between the clock-accuracy-value parameter and clock precision,
see ptp clock-source in the NetEngine 8100 M, NetEngine 8000E M, NetEngine
8000 M Command Reference.
Step 4 Configure the class of the clock source.
ptp clock-source { local clock-class clock-class-value | bits1 clock-accuracy clock-class-value }
For the mapping between the clock-class-value parameter and the clock source
level, see ptp clock-source in the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M Command Reference.
If the clock-class-value value is less than 128, the device cannot function as a
slave clock.
Step 5 Configure priority1 of the clock source.
ptp clock-source { local priority1 priority1-value | bits1 priority1 priority1-
value }
Step 6 Configure priority2 of the clock source.
ptp clock-source { local priority2 priority2-value | bits1 priority2 priority2-
value }
Step 7 (Optional) Configure the grandmaster clock ID of the clock source.
ptp clock-source bits1 grandmaster-clockid grandmaster-clockid-value
Step 8 (Optional) Configure the stability value of the clock source.
ptp clock-source bits1 offsetscaled-logvariance offsetscaled-logvariance-value
----End
Context
Determine 1588v2 device types based on the 1588v2 network plan before
enabling 1588v2 in the system view on each device.
● 1588v2 clock types
– OC: ordinary clock
– BC: boundary clock
– E2ETC: end-to-end transparent clock
– P2PTC: peer-to-peer transparent clock
– TCandBC: transparent and boundary clock
– E2ETCOC: end-to-end transparent clock and ordinary clock
– P2PTCOC: peer-to-peer transparent and ordinary clock
● Domain
A 1588v2 network may be large in scale and may allow multiple carriers to
lease the 1588v2 network as a bearer network. To transparently transmit
1588v2 packets for specific carriers, the 1588v2 network can be logically
divided into clock domains. Each clock domain has a single clock source, and
all devices in one domain synchronize with the clock source in the domain.
1588v2 devices only accept 1588v2 packets in their own domains.
● Virtual clock ID
A virtual clock ID uniquely identifies a 1588v2 device. It remains even if a
main control board is replaced on the device.
● Slave-only mode for an OC
An OC has only one interface that can be enabled with 1588v2. This means
that an OC can function as either a master clock to advertise clock signals to
downstream devices or as a slave clock to receive upstream clock signals. To
enable an OC to work only as a slave clock on a clock synchronization
network, run the ptp slaveonly command.
● Automatic asymmetry measurement over a 1588v2 ring network by BCs
and TCandBCs
On the ring network shown in Figure 1-76, gNodeB can synchronize its clock
with the global positioning system (GPS) only if the lengths of fiber links
working in opposite directions on each network segment are identical after
being compensated based on manual measurements. In this case, each node
can synchronize its clock with the GPS, irrespective of changes in clock sources
that slave clocks trace. If a fiber link between BC5 and BC6 is faulty and
disconnected, BC6 traces clock signals from BC3. BC6 uses a compensation
value, which has been calculated based on manual measurements during
1588v2 deployment, for the fiber link lengths between BC3 and BC6 to
successfully synchronize with the GPS.
After the faulty fiber link between BC5 and BC6 is restored, assume that the
difference between the lengths of the fiber links that carry traffic in opposite
directions between BC5 and BC6 changes largely. In this case, when BC6
traces clock signals from BC5 in stead of those from BC3, and if BC6 still uses
the previous compensation value, it fails to synchronize with the GPS due to
large time deviation. To address this problem, enable automatic asymmetry
measurement on the NetEngine 8100 M, NetEngine 8000E M, NetEngine
8000 M.
Procedure
● Perform the following steps on each OC:
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
If the device hardware supports ultra-high-precision timestamping, you
can run the ptp uhpc enable command to improve the precision of time
synchronization. To view the capabilities supported by the corresponding
port, run the display ptp interface { interface-name | interface-type
interface-number } command.
NOTE
The devices that implement time synchronization through 1588v2 messages must
reside in the same 1588v2 domain.
f. (Optional) Run ptp source-switch ptsf enable
The packet timing signal fail (PTSF)-triggered source switching function is
enabled.
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source.
Run the ptp ptsf auto-recovery-time time-value command to specify the
PTSF automatic recovery time. When this specified time elapses, the
device automatically switches back to the original clock source. By
default, the PTSF automatic recovery time is 0 minutes. That is, this
function is disabled.
Run the ptp ptsf enhanced-mode command to enable the PTSF
enhanced mode. After the PTSF enhanced mode is enabled, the system
automatically checks whether the clock source fault is rectified. If the
fault is rectified, the system clears the corresponding alarm, and the
recovered clock source re-participates in BMC source selection. By default,
the PTSF enhanced mode is disabled.
g. (Optional) Run ptp virtual-clock-id clock-id-value
A virtual clock ID is set.
h. Run commit
The configuration is committed.
● Perform the following steps on each BC:
a. Run system-view
The system view is displayed.
NOTE
The devices that implement time synchronization through 1588v2 messages must
reside in the same 1588v2 domain.
e. (Optional) Run ptp source-switch ptsf enable
The PTSF-triggered source switching function is enabled.
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source. Run the ptp ptsf auto-recovery-time time-value command to
specify the PTSF automatic recovery time. When this specified time
elapses, the device automatically switches back to the original clock
source.
f. (Optional) Run ptp virtual-clock-id clock-id-value
A virtual clock ID is set.
g. (Optional) Run ptp asymmetry-measure enable
Automatic asymmetry measurement over a 1588v2 ring network is
enabled on the router.
h. (Optional) Run ptp max-steps-removedmax-steps-removed-value
The maximum number of hops for time synchronization is configured.
A clock source is considered unavailable if the value of stepsRemoved in
the Announce packets received by the clock source is greater than or
equal to max-steps-removed-value.
i. Run commit
The configuration is committed.
● Perform the following steps on each TC and TCOC:
a. Run system-view
The system view is displayed.
NOTE
The devices that implement time synchronization through 1588v2 messages must
reside in the same 1588v2 domain.
e. (Optional) Run ptp source-switch ptsf enable
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source. Run the ptp ptsf auto-recovery-time time-value command to
specify the PTSF automatic recovery time. When this specified time
elapses, the device automatically switches back to the original clock
source.
f. (Optional) Run ptp virtual-clock-id clock-id-value
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
If the device hardware supports ultra-high-precision timestamping, you
can run the ptp uhpc enable command to improve the precision of time
synchronization. To view the capabilities supported by the corresponding
port, run the display ptp interface { interface-name | interface-type
interface-number } command.
NOTE
The devices that implement time synchronization through 1588v2 messages must
reside in the same 1588v2 domain.
e. (Optional) Run ptp source-switch ptsf enable
The PTSF-triggered source switching function is enabled.
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source. Run the ptp ptsf auto-recovery-time time-value command to
specify the PTSF automatic recovery time. When this specified time
elapses, the device automatically switches back to the original clock
source.
f. (Optional) Run ptp virtual-clock-id clock-id-value
A virtual clock ID is set.
g. (Optional) Run ptp asymmetry-measure enable
Automatic asymmetry measurement over a 1588v2 ring network is
enabled on the router.
h. Run commit
The configuration is committed.
----End
clock flapping over the 1588v2 network. You can enable the control of the access
to clock sources so that a 1588v2 router selects a clock source within a specified
range.
Context
Perform the following steps on each of OCs, BCs, and TCandBCs:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp acl enable
The control of access to clock sources is enabled.
Step 3 Run ptp acl-permit-clockid clockid-value
An ID of a clock source is set to allow a local 1588v2 router to use the BMC
algorithm to select.
Step 4 Run commit
The configuration is committed.
----End
Prerequisites
A passive interface is determined. The display ptp all command output contains
"passive" in the State field of the Port Info part.
Context
Passive interfaces do not trace or advertise time information. If a device has
multiple master 1588v2 interfaces in the same clock domain, the device selects
the interface with the highest priority as the master clock, and the interface
connected to the master clock is the slave clock. Other local interfaces are passive
interfaces that function as backups for the slave clock. Passive interfaces can send
Delay_Req, Pdelay_Resp, Delay_Resp_Follow_Up, signaling, and management
response messages.
On a dynamic 1588v2 network, a passive interface may change to be a slave clock
or a master clock to participate in time synchronization after a clock source
changes. Monitoring passive interfaces before a clock source changes helps keep
stable time signals on the 1588v2 network.
After the router stably synchronizes time signals with a clock source, the router
can monitor the performance of its passive interface. The router checks the offset
between the master and slave clocks on the passive interface every 300s. If the
offset greater than a configured alarm threshold, the router sends an alarm
named hwPtpPassiveFiberLengthChange to a network management system
(NMS).
Perform the following step on each of BCs and TCandBCs:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp passive-measure enable
The monitoring function is enabled on the passive interface of a 1588v2 router.
Step 3 Run ptp passive-measure alarm-threshold alarm-threshold-value
An alarm threshold of the offset is set.
Step 4 Run commit
The configuration is committed.
----End
Context
Two devices exchange Announce packets to determine the master/slave
relationship. The master device sends Sync packets to notify the slave device of
time signal parameters and uses a delay measurement mechanism to achieve time
signals accuracy.
After 1588v2 is enabled and a device type is specified on a specific 1588v2 router,
enable 1588v2 and configure 1588v2 functions on each interface:
● Delay measurement mechanisms for the OC, BC, and TCandBC
Different delays on links deteriorate the accuracy of 1588v2 time
synchronization. 1588v2 uses the delay measurement mechanism to correct
time signals. A delay measurement process is implemented by sending delay
measurement request packets and delay response packets. Either of the
following parameters can be configured in the ptp delay-mechanism
command to enable a specific delay measurement mechanism:
– delay: enables the delay request-response mechanism, in which
information about the clock and time is calculated based on the delay of
an entire link between the master and slave clocks. Only the slave clock
sends Delay_Req packets to the master clock, and the master clock
replies with Delay_Resp packets. Upon receipt, the slave clock uses
information carried in Delay_Resp packets to correct time signals.
● Both ends of a link must use the same delay measurement mechanism.
● If an E2ETC, an E2ETCOC, a P2PTC, and a P2PTCOC use the default delay
measurement mechanism, their interfaces can directly be enabled with 1588v2.
● Asymmetric delay corrections
Although the delay time for sending packets differs from that for receiving
packets, 1588v2 considers that the opposite paths have the same delay time.
To compensate for the difference between the delay time for sending packets
and the delay time for receiving packets, run the ptp asymmetry-correction
command to set the asymmetry correction value. A 1588v2 device
automatically uses the asymmetry correction value in path delay calculation
complying with the Pdelay or delay measurement mechanism.
● Timestamping modes
1588v2 adds timestamps into packets to record the time when these packets
are sent. 1588v2 uses timestamps to adjust clock signals and implement clock
synchronization. Either of the following parameters can be specified in the
ptp clock-step command to configure a command:
– one-step: A Sync message in Delay mode and a PDelay_Resp message in
PDelay mode are stamped with the time when these messages are sent.
– two-step: A Sync message in Delay mode and a PDelay_Resp message in
PDelay mode only record the time when they are generated, but carry no
timestamps. A Follow_Up message is stamped with the time when the
Sync message was sent, and a PDelay_Resp_Follow_Up message is
stamped with the time when the PDelay_Resp message was sent.
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M supports the
one-step mode by default. The NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M that uses the one-step mode can identify Follow_Up
messages sent by another device that uses the two-step mode.
1588v2 interfaces that support different timestamping modes can
communicate with each other.
Procedure
● Perform the following steps on each OC:
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
NOTE
Two interfaces on both ends of a link must use the same delay measurement
mechanism. A delay measurement mechanism inconsistency causes a
communication failure.
e. Run ptp enable
1588v2 is enabled on the interface.
f. (Optional) Run ptp asymmetry-correction { positive | negative }
correction-value
The asymmetric correction time is set for 1588v2 packets to be sent.
g. (Optional) Run ptp clock-step { one-step | two-step }
The timestamping mode is specified for 1588v2 packets.
h. Run commit
The configuration is committed.
● Perform the following steps on each BC:
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
c. Run interface interface-type interface-number
The interface view is displayed.
d. (Optional) Run ptp delay-mechanism { delay | pdelay }
A delay measurement mechanism is configured for the router.
NOTE
Two interfaces on both ends of a link must use the same delay measurement
mechanism. A delay measurement mechanism inconsistency causes a
communication failure.
e. Run ptp enable
1588v2 is enabled on the interface.
f. (Optional) Run ptp announce-drop enable
The BC is configured to discard Announce packets.
NOTE
NOTE
A BC interface uses the same domain ID as that configured in the system view.
The TC interface on the TCandBC uses another domain ID configured in the
interface view.
f. (Optional) Run ptp delay-mechanism { delay | pdelay }
NOTE
Two interfaces on both ends of a link must use the same delay measurement
mechanism. A delay measurement mechanism inconsistency causes a
communication failure.
g. Run ptp enable
----End
Context
Two devices exchange Announce packets to determine the master/slave
relationship. The master device sends Sync packets to notify the slave device of
time signal parameters and uses a delay measurement mechanism to achieve time
signals accuracy.
● Announce packets
To set the maximum number of Announce packets that a 1588v2 interface
fails to receive consecutively, run the ptp announce receipt-timeout
command. If the 1588v2 interface on a device fails to receive a specified
number of Announce packets, the interface status becomes Master, and the
device stops attempting to synchronize the time with other 1588v2 devices.
The device uses the BMC algorithm to select a clock source and synchronize
the time with the clock source. Increase receipt-timeout to reduce the clock
source switching frequency; reduce receipt-timeout to switch clock sources.
Using the default value is recommended.
● Sync packets
The master interface periodically sends multicast Sync packets.
The time when the Sync packets can be stamped into the Sync packets if the
one-step timestamping mode is used or into Follow_Up packets if the two-
step timestamping mode is used. To specify a timestamping mode, run the
ptp clock-step { one-step | two-step } command.
● Delay or Pdelay packets
A router uses a delay measurement mechanism to send request packets and
receive response packets from its remote router. The router uses timestamps
carried in the packets to correct time signals.
Procedure
● Configure time attributes for Announce packets.
a. Run system-view
The interval at which the interface sends Announce packets is set. The
following formula applies:
The interval at which the interface sends Sync packets is set. The
following formula applies:
Prerequisites
Before configuring a 1588v2 packet encapsulation mode, check the link type used
for 1588v2 packet transmission.
● For the 1588v2 packets transmitted over a Layer 2 link, configure the MAC
encapsulation mode.
● For the 1588v2 packets transmitted over a Layer 3 link, configure the UDP
encapsulation mode.
Context
You can encapsulate 1588v2 messages into Layer 2 and Layer 3 packets and set
the destination address and transmission priority.
Perform the following steps on each 1588v2 device:
Procedure
● Configure the MAC encapsulation mode.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
c. Run ptp mac-egress { destination-mac destination-mac | vlan vlan-id
[ priority priority-value ] }The MAC encapsulation mode is configured for
1588v2 packets to be sent from the interface, and a destination MAC
address is configured.
NOTE
NOTE
A DSCP value is set for the UDP 1588v2 packets to be sent from the
interface.
f. Run ptp udp-egress source-ip source-ip vlan vlan-id [ priority priority ]
1588v2 services require a higher DSCP value and a higher priority value
than other services. A high transmission priority minimizes the delay or
congestion impact on clock signal recovery.
g. Run commit
----End
Procedure
● Run the display ptp all [ state | config ] command to check the 1588v2
operating status and configurations.
Applicable Environment
To manually determine the master/slave relationship between clock nodes within
a network, run the ptp port-state command to set the status of 1588v2 interfaces
on the nodes. Static clock source selection and dynamic BMC selection are two
independent mechanisms. Static clock source selection has a higher priority than
dynamic BMC selection.
NOTE
The 1588v2 status needs to be specified on OC, BC, and TCandBC interfaces. The 1588v2
status is Premaster on TCs interfaces, including those on TCOC and TCandBC devices.
● Typical static 1588v2 network with OC, BC, TC, and TCOC devices
The OC on the 1588v2 network shown in Figure 1-77 functions as the
grandmaster to receive time signals provided by a BITS or GPS and sends
1588v2 packets carrying the time signals over the bearer network. TCs,
including the TCOC, are core devices on the bearer network. TCs transparently
transmit time information over the bearer network. The TCOC can also
implement frequency synchronization. BCs at the edge of the bearer network
send highly accurate time information carried in 1588v2 packets to wireless
access devices, such as gNodeBs and radio network controllers (RNCs).
Pre-configuration Tasks
● Set physical parameters of interfaces and ensure that the interfaces are
physically Up.
Context
BITSs provide time signals for routers. 1588v2 routers can be configured to import
time signals from BITSs and use the BMC algorithm to select a master clock. The
master clock provides time signals for other devices over a 1588v2 network.
1588v2 routers obtain clock synchronization information from the grandmaster.
Procedure
Step 1 Run system-view
The following example shows how to import an external clock source from the
1pps bits1 interface.
clock bits-type bits1 1pps input
The actual number of BITS interfaces and their numbers depend on the hardware
configuration. For details about clock interfaces, see Hardware Description.
Generally, BITS0 provides frequency signals for physical clock synchronization and
corresponds to CLK or CLK/TOD0 on the interface panel; BITS1 provides time
signals and corresponds to TOD or CLK/TOD1 on the interface panel. If there is
only one CLK/TOD interface on a device, the device can provide the BITS0 and
BITS1 interfaces through a one-to-two cable.
Step 4 (Optional) Configure the correction time for the delay in sending and receiving
time signals from the BITS interface.
----End
Context
Determine 1588v2 device types based on the 1588v2 network plan before
enabling 1588v2 in the system view on each device.
● 1588v2 clock types
– OC: ordinary clock
– BC: boundary clock
– E2ETC: end-to-end transparent clock
– P2PTC: peer-to-peer transparent clock
– TCandBC: transparent and boundary clock
– E2ETCOC: end-to-end transparent clock and ordinary clock
– P2PTCOC: peer-to-peer transparent and ordinary clock
● Domain
A 1588v2 network may be large in scale and may allow multiple carriers to
lease the 1588v2 network as a bearer network. To transparently transmit
1588v2 packets for specific carriers, the 1588v2 network can be logically
divided into clock domains. Each clock domain has a single clock source, and
all devices in one domain synchronize with the clock source in the domain.
1588v2 devices only accept 1588v2 packets in their own domains.
● Virtual clock ID
A virtual clock ID uniquely identifies a 1588v2 device. It remains even if a
main control board is replaced on the device.
● Slave-only mode for an OC
An OC has only one interface that can be enabled with 1588v2. This means
that an OC can function as either a master clock to advertise clock signals to
downstream devices or as a slave clock to receive upstream clock signals. To
enable an OC to work only as a slave clock on a clock synchronization
network, run the ptp slaveonly command.
● Automatic asymmetry measurement over a 1588v2 ring network by BCs
and TCandBCs
On the ring network shown in Figure 1-79, gNodeB can synchronize its clock
with the global positioning system (GPS) only if the lengths of fiber links
working in opposite directions on each network segment are identical after
being compensated based on manual measurements. In this case, each node
can synchronize its clock with the GPS, irrespective of changes in clock sources
that slave clocks trace. If a fiber link between BC5 and BC6 is faulty and
disconnected, BC6 traces clock signals from BC3. BC6 uses a compensation
value, which has been calculated based on manual measurements during
1588v2 deployment, for the fiber link lengths between BC3 and BC6 to
successfully synchronize with the GPS.
After the faulty fiber link between BC5 and BC6 is restored, assume that the
difference between the lengths of the fiber links that carry traffic in opposite
directions between BC5 and BC6 changes largely. In this case, when BC6
traces clock signals from BC5 in stead of those from BC3, and if BC6 still uses
the previous compensation value, it fails to synchronize with the GPS due to
large time deviation. To address this problem, enable automatic asymmetry
measurement on the NetEngine 8100 M, NetEngine 8000E M, NetEngine
8000 M.
Procedure
● Perform the following steps on each OC:
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
If the device hardware supports ultra-high-precision timestamping, you
can run the ptp uhpc enable command to improve the precision of time
synchronization. To view the capabilities supported by the corresponding
port, run the display ptp interface { interface-name | interface-type
interface-number } command.
NOTE
The devices that implement time synchronization through 1588v2 messages must
reside in the same 1588v2 domain.
f. (Optional) Run ptp source-switch ptsf enable
The packet timing signal fail (PTSF)-triggered source switching function is
enabled.
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source.
Run the ptp ptsf auto-recovery-time time-value command to specify the
PTSF automatic recovery time. When this specified time elapses, the
device automatically switches back to the original clock source. By
default, the PTSF automatic recovery time is 0 minutes. That is, this
function is disabled.
Run the ptp ptsf enhanced-mode command to enable the PTSF
enhanced mode. After the PTSF enhanced mode is enabled, the system
automatically checks whether the clock source fault is rectified. If the
fault is rectified, the system clears the corresponding alarm, and the
recovered clock source re-participates in BMC source selection. By default,
the PTSF enhanced mode is disabled.
g. (Optional) Run ptp virtual-clock-id clock-id-value
A virtual clock ID is set.
h. Run commit
The configuration is committed.
● Perform the following steps on each BC:
a. Run system-view
The system view is displayed.
NOTE
The devices that implement time synchronization through 1588v2 messages must
reside in the same 1588v2 domain.
e. (Optional) Run ptp source-switch ptsf enable
The PTSF-triggered source switching function is enabled.
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source. Run the ptp ptsf auto-recovery-time time-value command to
specify the PTSF automatic recovery time. When this specified time
elapses, the device automatically switches back to the original clock
source.
f. (Optional) Run ptp virtual-clock-id clock-id-value
A virtual clock ID is set.
g. (Optional) Run ptp asymmetry-measure enable
Automatic asymmetry measurement over a 1588v2 ring network is
enabled on the router.
h. (Optional) Run ptp max-steps-removedmax-steps-removed-value
The maximum number of hops for time synchronization is configured.
A clock source is considered unavailable if the value of stepsRemoved in
the Announce packets received by the clock source is greater than or
equal to max-steps-removed-value.
i. Run commit
The configuration is committed.
● Perform the following steps on each TC and TCOC:
a. Run system-view
The system view is displayed.
NOTE
The devices that implement time synchronization through 1588v2 messages must
reside in the same 1588v2 domain.
e. (Optional) Run ptp source-switch ptsf enable
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source. Run the ptp ptsf auto-recovery-time time-value command to
specify the PTSF automatic recovery time. When this specified time
elapses, the device automatically switches back to the original clock
source.
f. (Optional) Run ptp virtual-clock-id clock-id-value
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
If the device hardware supports ultra-high-precision timestamping, you
can run the ptp uhpc enable command to improve the precision of time
synchronization. To view the capabilities supported by the corresponding
port, run the display ptp interface { interface-name | interface-type
interface-number } command.
NOTE
The devices that implement time synchronization through 1588v2 messages must
reside in the same 1588v2 domain.
e. (Optional) Run ptp source-switch ptsf enable
The PTSF-triggered source switching function is enabled.
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source. Run the ptp ptsf auto-recovery-time time-value command to
specify the PTSF automatic recovery time. When this specified time
elapses, the device automatically switches back to the original clock
source.
f. (Optional) Run ptp virtual-clock-id clock-id-value
A virtual clock ID is set.
g. (Optional) Run ptp asymmetry-measure enable
Automatic asymmetry measurement over a 1588v2 ring network is
enabled on the router.
h. Run commit
The configuration is committed.
----End
Prerequisites
A passive interface is determined. The display ptp all command output contains
"passive" in the State field of the Port Info part.
Context
Passive interfaces do not trace or advertise time information. If a device has
multiple master 1588v2 interfaces in the same clock domain, the device selects
the interface with the highest priority as the master clock, and the interface
connected to the master clock is the slave clock. Other local interfaces are passive
interfaces that function as backups for the slave clock. Passive interfaces can send
Delay_Req, Pdelay_Resp, Delay_Resp_Follow_Up, signaling, and management
response messages.
After the router stably synchronizes time signals with a clock source, the router
can monitor the performance of its passive interface. The router checks the offset
between the master and slave clocks on the passive interface every 300s. If the
offset greater than a configured alarm threshold, the router sends an alarm
named hwPtpPassiveFiberLengthChange to a network management system
(NMS).
Procedure
Step 1 Run system-view
----End
Context
Two devices exchange Announce packets to determine the master/slave
relationship. The master device sends Sync packets to notify the slave device of
time signal parameters and uses a delay measurement mechanism to achieve time
signals accuracy.
After 1588v2 is enabled and a device type is specified on a specific 1588v2 router,
enable 1588v2 and configure 1588v2 functions on each interface:
● Delay measurement mechanisms for the OC, BC, and TCandBC
Different delays on links deteriorate the accuracy of 1588v2 time
synchronization. 1588v2 uses the delay measurement mechanism to correct
time signals. A delay measurement process is implemented by sending delay
measurement request packets and delay response packets. Either of the
following parameters can be configured in the ptp delay-mechanism
command to enable a specific delay measurement mechanism:
– delay: enables the delay request-response mechanism, in which
information about the clock and time is calculated based on the delay of
an entire link between the master and slave clocks. Only the slave clock
sends Delay_Req packets to the master clock, and the master clock
replies with Delay_Resp packets. Upon receipt, the slave clock uses
information carried in Delay_Resp packets to correct time signals.
– pdelay: enables the peer delay mechanism, in which information about
the clock and time is calculated based on the delay time of each link
along the path between the master and slave clocks. In this mode, the
master and slave clocks can send Pdelay_Rep packets to each other and
then correct time signals based on the Pdelay_Resp packets. Upon receipt
of the responses, the slave or master clock uses information carried in
Delay_Resp packets to correct time signals.
The PDelay mechanism helps rapidly correct the difference between the delay
time in opposite directions on the network, on which the master and slave
clocks obtain the delay time in opposite directions.
NOTE
● Both ends of a link must use the same delay measurement mechanism.
● If an E2ETC, an E2ETCOC, a P2PTC, and a P2PTCOC use the default delay
measurement mechanism, their interfaces can directly be enabled with 1588v2.
● Asymmetric delay corrections
Although the delay time for sending packets differs from that for receiving
packets, 1588v2 considers that the opposite paths have the same delay time.
To compensate for the difference between the delay time for sending packets
and the delay time for receiving packets, run the ptp asymmetry-correction
command to set the asymmetry correction value. A 1588v2 device
automatically uses the asymmetry correction value in path delay calculation
complying with the Pdelay or delay measurement mechanism.
● Timestamping modes
1588v2 adds timestamps into packets to record the time when these packets
are sent. 1588v2 uses timestamps to adjust clock signals and implement clock
synchronization. Either of the following parameters can be specified in the
ptp clock-step command to configure a command:
Procedure
● Perform the following steps on each OC:
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
c. Run interface interface-type interface-number
The interface view is displayed.
d. (Optional) Run ptp delay-mechanism { delay | pdelay }
A delay measurement mechanism is configured for the router.
NOTE
Two interfaces on both ends of a link must use the same delay measurement
mechanism. A delay measurement mechanism inconsistency causes a
communication failure.
e. Run ptp enable
1588v2 is enabled on the interface.
f. (Optional) Run ptp asymmetry-correction { positive | negative }
correction-value
The asymmetric correction time is set for 1588v2 packets to be sent.
g. (Optional) Run ptp clock-step { one-step | two-step }
The timestamping mode is specified for 1588v2 packets.
h. Run commit
The configuration is committed.
● Perform the following steps on each BC:
a. Run system-view
The system view is displayed.
b. Run ptp enable
NOTE
Two interfaces on both ends of a link must use the same delay measurement
mechanism. A delay measurement mechanism inconsistency causes a
communication failure.
e. Run ptp enable
1588v2 is enabled on the interface.
f. (Optional) Run ptp announce-drop enable
The BC is configured to discard Announce packets.
NOTE
g. Run commit
The configuration is committed.
● Perform the following steps on each TCOC:
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
c. Run interface interface-type interface-number
The interface view is displayed.
d. Run ptp enable
1588v2 is enabled on the interface.
e. Run ptp tcoc-clock-id clock-source-id port-num port-num
The clock source traced by an interface on the TCOC is configured.
Unlike a TC, a TCOC has an OC interface to implement frequency
synchronization. The TCOC also has TC interfaces to transparently
transmit 1588v2 packets.
To specify a clock source that the OC interface on the TCOC tracks, run
the ptp tcoc-clock-id command. The OC interface can then receive
1588v2 packets to synchronize frequencies with the master clock
interface. If the ptp tcoc-clock-id command is not run on the OC
interface of the TCOC, each TCOC interface functions as a TC interface,
which only transparently transmits 1588v2 packets.
f. Run ptp asymmetry-correction { positive | negative } correction-value
The asymmetric correction time is set for 1588v2 packets to be sent.
g. Run ptp clock-step { one-step | two-step }
The timestamping mode is specified for 1588v2 packets.
h. Run commit
The configuration is committed.
● Perform the following steps on each TCandBC:
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
c. Run interface interface-type interface-number
The interface view is displayed.
d. Run ptp port-type { bc | tc }
The clock type of the interface is set to TC or BC.
e. Run ptp domain domain-value
A domain ID is set in the interface view of a TC interface.
NOTE
A BC interface uses the same domain ID as that configured in the system view.
The TC interface on the TCandBC uses another domain ID configured in the
interface view.
f. (Optional) Run ptp delay-mechanism { delay | pdelay }
A delay measurement mechanism is configured for the router.
NOTE
Two interfaces on both ends of a link must use the same delay measurement
mechanism. A delay measurement mechanism inconsistency causes a
communication failure.
g. Run ptp enable
1588v2 is enabled on the interface.
h. Run ptp enable
1588v2 is enabled on the device.
i. (Optional) Run ptp asymmetry-correction { positive | negative }
correction-value
The asymmetric correction time is set for 1588v2 packets to be sent.
j. (Optional) Run ptp clock-step { one-step | two-step }
The timestamping mode is specified for 1588v2 packets.
k. Run commit
The configuration is committed.
----End
Context
A 1588v2 interface works in a specific state:
● slave: A slave interface only tracks time information of a specific clock source.
Each 1588v2 device has a single slave interface.
● uncalibrated: An uncalibrated interface has detected one or more master
interfaces in the same clock domain. The uncalibrated interface selects a
master interface as a time source to synchronize with. The Uncalibrated state
is a temporary state. There are a few scenarios for the uncalibrated
parameter when static 1588v2 is used.
● passive: A passive interface does not trace or advertise time information.
Passive interfaces can send Delay_Req, Pdelay_Resp, Delay_Resp_Follow_Up,
signaling, and management response messages. If a device has multiple
master 1588v2 interfaces in the same clock domain, the device selects the
interface with the highest priority as the master clock. The interface
connected to the master clock is the slave clock. The unselected master
interfaces enter the Passive state and function as backups for the slave clock.
● master: A master interface only advertises time information.
● premaster: A premaster interface does not trace nor advertise time
information. Premaster interfaces can send Pdelay_Req, Pdelay_Resp,
Delay_Resp_Follow_Up, signaling, and management response messages.
● listening: A listening interface does not trace or advertise time information.
An OC working in slave-only mode changes from the Master state to the
Listening state if the OC fails.
● faulty: A faulty interface does not send 1588v2 packets, except for responses
to some management messages.
● disabled: A disabled interface sends no 1588v2 packets and discards all
received 1588v2 packets, except for management messages. Setting a 1588v2
interface to the Disabled state is equivalent to running the undo ptp enable
command in the interface view to disable 1588v2 on the interface.
● initializing: An initializing interface does not send or receive 1588v2 packets.
After statically specifying the 1588v2 interface status is enabled, all 15882v2
interfaces on a device work in the Initializing state by default.
The status of a TC interface is fixed to be premaster. Therefore, you cannot change
the status of the TC interfaces, including all the PTP interfaces on the E2ETC and
P2PTC devices and TC interfaces on the E2ETCOC, P2PTCOC, and TCandBC devices,
through command lines. Perform the following step on each of the OCs, BC, and
TCandBC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp set-port-state enable
Statically specifying the 15882v interface status is enabled.
NOTE
● Delete the state setting before you perform either of the following operations:
– Change the clock type to E2ETC, P2PTC, E2ETCOC, or P2PTCOC.
– Configure an interface on a TCandBC as a TC interface.
----End
Context
Two devices exchange Announce packets to determine the master/slave
relationship. The master device sends Sync packets to notify the slave device of
time signal parameters and uses a delay measurement mechanism to achieve time
signals accuracy.
● Announce packets
To set the maximum number of Announce packets that a 1588v2 interface
fails to receive consecutively, run the ptp announce receipt-timeout
command. If the 1588v2 interface on a device fails to receive a specified
number of Announce packets, the interface status becomes Master, and the
device stops attempting to synchronize the time with other 1588v2 devices.
The device uses the BMC algorithm to select a clock source and synchronize
the time with the clock source. Increase receipt-timeout to reduce the clock
source switching frequency; reduce receipt-timeout to switch clock sources.
Using the default value is recommended.
● Sync packets
The master interface periodically sends multicast Sync packets.
The time when the Sync packets can be stamped into the Sync packets if the
one-step timestamping mode is used or into Follow_Up packets if the two-
step timestamping mode is used. To specify a timestamping mode, run the
ptp clock-step { one-step | two-step } command.
● Delay or Pdelay packets
A router uses a delay measurement mechanism to send request packets and
receive response packets from its remote router. The router uses timestamps
carried in the packets to correct time signals.
Procedure
● Configure time attributes for Announce packets.
a. Run system-view
Prerequisites
Before configuring a 1588v2 packet encapsulation mode, check the link type used
for 1588v2 packet transmission.
● For the 1588v2 packets transmitted over a Layer 2 link, configure the MAC
encapsulation mode.
● For the 1588v2 packets transmitted over a Layer 3 link, configure the UDP
encapsulation mode.
Context
You can encapsulate 1588v2 messages into Layer 2 and Layer 3 packets and set
the destination address and transmission priority.
Perform the following steps on each 1588v2 device:
Procedure
● Configure the MAC encapsulation mode.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interface view is displayed.
c. Run ptp mac-egress { destination-mac destination-mac | vlan vlan-id
[ priority priority-value ] }The MAC encapsulation mode is configured for
1588v2 packets to be sent from the interface, and a destination MAC
address is configured.
NOTE
NOTE
Procedure
● Run the display ptp all [ state | config ] command to check the 1588v2
operating status and configurations.
● Run the display ptp interface interface-type interface-number command to
check 1588v2 information on a specific 1588v2 interface.
----End
Context
The UTC time is Greenwich Mean Time (GMT) that is displayed on a 1588v2
device, There is a fixed offset between the UTC time and TAI time. The
International Earth Rotation Service (IERS) advertises the offset.
When a 1588v2 device tracks a BITS, the device uses the offset provided by the
BITS by default. If the BITS clock signals are lost, the 1588v2 uses the previous
offset, which may change. An offset change causes inaccurate time signals on the
1588v2 network.
To manually set the offset between the UTC time and TAI time, run the ptp utc-
offset command only on the grandmaster.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp utc-offset utc-offset
An accumulative offset between the UTC and TAI time is set.
Step 3 Run commit
The configuration is committed.
----End
Context
Only an interface supporting 1588 synchronization can be configured as the
reference interface. You can query the synchronization capability of interfaces
using commands.
On a ring network as shown in Figure 1-80, select a reference interface that
supports 1588 synchronization on the device where the passive interface is
located. On a chain network, select a reference interface that supports 1588
synchronization at the end node of the chain.
Procedure
Step 1 Run display clock device-capability
The synchronization capability of interfaces is displayed. The interface whose 1588
attribute is Yes supports 1588 synchronization.
Step 2 Run system-view
The system view is displayed.
Step 3 Run ptp standard-time-port
The reference interface is configured based on the interface type.
Step 4 Run commit
The configuration is committed.
Step 5 Log in to iMaster NCE, and stop the measurement based on the result determined
by iMaster NCE, or select the next device to continue the measurement as
prompted.
----End
Follow-up Procedure
After iMaster NCE obtains the network-wide deviation data and delivers the
compensation value, run the undo command to delete the reference interface
configurations of all devices to prevent interference to normal service running.
Context
The system preferentially uses hop-by-hop 1588v2 time synchronization in In-situ
Flow Information Telemetry (IFIT) delay measurement scenarios. Hop-by-hop
1588v2 time synchronization requires that all devices on the network support
1588v2 in order to achieve delay measurement in the sub-microsecond range. If
some devices on the network do not support 1588v2, you can enable lightweight
and sub-millisecond-level time synchronization on downstream devices to achieve
delay measurement in the sub-millisecond range.
NOTE
This command does not need to be configured in non-IFIT scenarios. Otherwise, the time
synchronization precision is affected.
Lightweight clocks cannot be used in mobile backhaul scenarios, and the clock
synchronization precision cannot meet the performance requirements of base stations.
After lightweight time synchronization is enabled, reported PTSF alarms are cleared, and
new PTSF alarms cannot be reported.
Procedure
Step 1 Run system-view
----End
Context
NOTICE
ACL statistics cannot be restored after being cleared. Exercise caution when
running the reset command.
After you confirm to clear 1588v2 statistics, run the following command.
Procedure
Step 1 Run the reset ptp statistics { all | interface interface-type interface-number }
command in the user view to clear statistics about 1588v2 packets.
----End
Context
You can run the following command in any view to check the 1588v2 operating
status during routine maintenance.
Procedure
● Run the display ptp { all [ config | state ] | interface interface-type
interface-number }command to view the 1588v2 operating status.
----End
Context
Perform the following steps on a device:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run any of the following commands:
● To configure the alarm threshold for the clock class value of a PTP source, run
the ptp alarm-threshold clock-class clock-class-value command.
● To configure the alarm threshold for the absolute time offset of a PTP source,
run the ptp alarm-threshold standard-time-offset time-offset-value
command.
● To configure the alarm threshold of the peak value of the accumulated time
offsets of a PTP source, run the ptp alarm-threshold time-offset-sum time-
offset-sum command.
● To configure an alarm threshold for frequency offset at the physical layer, run
the clock alarm-threshold frequency-offset frequency-offset-value
command.
----End
Example for Configuring the Unicast UDP Encapsulation Mode for 1588v2 Packets
to Implement Network-wide Clock Synchronization
1588v2 is used to transmit frequency signals and time signals from the BITS server,
allowing network-wide clock synchronization on the wireless transport network
and wireless access network. For the gNodeBs that support only UDP
encapsulation, NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 Ms can
send UDP-encapsulated 1588v2 packets to these gNodeBs.
Context
Networking Requirements
On the network shown in Figure 1-81, the transport network transmits wireless
services between gNodeBs, and all transport network nodes support 1588v2. Core
nodes PE1 and PE2 receive time information from the BITS server. gNodeB-2
supports SyncE, instead of 1588v2. Both gNodeB-1 and gNodeB-3 support 1588v2.
PE1 and PE2 dynamically select the grandmaster clock. The grandmaster clock
transmits 1588v2 time signals over the entire network. 1588v2-enabled gNodeBs
and PEs can also achieve time synchronization in addition to frequency
synchronization.
Because all nodes on the transport network support 1588v2, they can be
configured as BCs to transmit clock information. For gNodeB-2 that does not
support 1588v2, frequency information can be transmitted through the clock
signals over an E1 line.
Figure 1-81 Configuring the unicast MAC encapsulation mode for 1588v2 packets
to implement network-wide clock synchronization
NOTE
The configurations in this example are performed on PE1, PE2, CE1, and CE2. HUAWEI
NetEngine 8100 M14/M8, NetEngine 8000 M14K/M14/M8K/M8/M4 & NetEngine 8000E
M14/M8 series can function as PE1, PE2, CE1, and CE2.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
● Delay measurement mechanism of 1588 links: PDelay
● Value of the 1588v2 domain where clock devices reside
● Interval at which Announce messages are sent and the number of times
Announce message receiving times out
● Interval at which Sync messages are sent
● Interval at which PDelay messages are sent
Procedure
Step 1 Assign an IP address to each interface and configure OSPF. The configuration
details are not provided here.
Step 2 Configure PE1 and PE2 to use clock interfaces to import BITS signals.
1. Configure PE1 to import BITS1 signals from BITS-1, participate in dynamic
1588v2 clock source selection, and import 1588v2 time signals.
[*PE1] ptp enable
[*PE1] clock bits-type bits1 1pps input
[*PE1] ptp clock-source bits1 on
[*PE1] ptp clock-source bits1 priority1 2
[*PE1] clock source ptp synchronization enable
[*PE1] clock source ptp priority 1
[*PE1] ptp source-switch ptsf enable
[*PE1] commit
2. Configure PE2 to import BITS1 signals from BITS-2, participate in dynamic
1588v2 clock source selection, and import 1588v2 time signals.
[*PE2] ptp enable
[*PE2] clock bits-type bits1 1pps input
[*PE2] ptp clock-source bits1 on
[*PE2] ptp clock-source bits1 priority1 1
[*PE2] clock source ptp synchronization enable
[*PE2] clock source ptp priority 1
[*PE2] ptp source-switch ptsf enable
[*PE2] commit
[*CE2-GigabitEthernet0/1/1] commit
[~CE2-GigabitEthernet0/1/1] quit
6. Configure gNodeB-3 to receive 1588v2 packets from CE2. The configuration
details are not provided here.
Step 4 Configure CE2 to use WAN clock techniques to transmit clock signals to gNodeB-2.
a. Configure an E1 interface on CE2 as the master clock.
[*CE2] controller e1 0/2/0
[*CE2-E1 0/2/0] clock master
[*CE2-E1 0/2/0] commit
b. Configure the interface that connects gNodeB-2 to CE2 as the slave clock. The
configuration details are not provided here.
Step 5 Configure 1588v2 packet attributes on PE1, PE2, CE1, and CE2.
1. Configure CE1.
[~CE1] interface gigabitethernet 0/2/0
[~CE1-GigabitEthernet0/2/0] ptp announce receipt-timeout 10
[*CE1-GigabitEthernet0/2/0] ptp min-pdelayreq-interval 10
[*CE1-GigabitEthernet0/2/0] commit
[~CE1-GigabitEthernet0/2/0] quit
[~CE1] interface gigabitethernet 0/1/0
[~CE1-GigabitEthernet0/1/0] ptp announce-drop enable
[*CE1-GigabitEthernet0/1/0] commit
2. Configure CE2.
[~CE2] interface gigabitethernet 0/1/0
[~CE2-GigabitEthernet0/1/0] ptp announce receipt-timeout 10
[*CE2-GigabitEthernet0/1/0] ptp min-pdelayreq-interval 10
[*CE2-GigabitEthernet0/1/0] commit
[~CE2-GigabitEthernet0/1/0] quit
[~CE2] interface gigabitethernet 0/1/1
[~CE2-GigabitEthernet0/1/1] ptp announce-drop enable
[*CE2-GigabitEthernet0/1/1] commit
3. Configure PE1.
[~PE1] interface gigabitethernet 0/2/0
[~PE1-GigabitEthernet0/2/0] ptp announce receipt-timeout 10
[*PE1-GigabitEthernet0/2/0] commit
[~PE1-GigabitEthernet0/2/0] quit
[~PE1] interface gigabitethernet 0/1/0
[~PE1-GigabitEthernet0/1/0] ptp announce-interval 8
[*PE1-GigabitEthernet0/1/0] ptp min-pdelayreq-interval 10
[*PE1-GigabitEthernet0/1/0] commit
[~PE1-GigabitEthernet0/1/0] quit
4. Configure PE2.
[~PE2] interface gigabitethernet 0/2/0
[~PE2-GigabitEthernet0/2/0] ptp announce receipt-timeout 10
[*PE2-GigabitEthernet0/2/0] commit
[*PE2-GigabitEthernet0/2/0] quit
[~PE2] interface gigabitethernet 0/1/0
[~PE2-GigabitEthernet0/1/0] ptp announce-interval 8
[*PE2-GigabitEthernet0/1/0] ptp min-pdelayreq-interval 10
[*PE2-GigabitEthernet0/1/0] commit
[~PE2-GigabitEthernet0/1/0] quit
Port info
Name State Delay-mech Ann-timeout Type Domain
------------------------------------------------------------------------
GigabitEthernet0/2/0 slave pdelay 10 BC 1
Time Performance Statistics(ns): Slot X Card X Port X
------------------------------------------------------------------------
Realtime(T2-T1) :534 Pathdelay :0
Max(T2-T1) :887704804
Min(T2-T1) :512
----End
Configuration Files
● CE1 configuration file
#
sysname CE1
#
ptp enable
ptp device-type bc
ptp domain 1
#
interface GigabitEthernet0/2/0
undo shutdown
ip address 172.16.0.2 255.255.255.0
ptp enable
ptp delay-mechanism pdelay
ptp announce receipt-timeout 10
ptp min-pdelayreq-interval 10
ptp udp-egress source-ip 172.16.0.2 destination-ip 172.16.0.1
ptp udp-egress destination-mac 00e0-fc11-1111
#
interface GigabitEthernet0/1/0
undo shutdown
ip address 10.10.0.1 255.255.255.0
ptp enable
ptp delay-mechanism pdelay
ptp min-pdelayreq-interval 10
ptp announce-drop enable
ptp udp-egress source-ip 10.10.0.1 destination-ip 10.10.0.2
ptp udp-egress destination-mac 00e0-fc33-1111
#
ospf 1
area 0.0.0.0
network 172.16.0.0 0.0.0.255
network 10.10.0.0 0.0.0.255
#
Example for Configuring the Multicast MAC Encapsulation Mode for 1588v2
Packets to Implement Network-wide Clock Synchronization
1588v2 is used to transmit frequency signals and time signals from the BITS server,
allowing network-wide clock synchronization on the wireless transport network
and wireless access network. NetEngine 8100 M, NetEngine 8000E M, NetEngine
8000 Ms by default use the multicast MAC encapsulation mode to transmit
1588v2 packets. For gNodeBs that support multicast MAC encapsulation of 1588v2
packets, it is convenient to implement network-wide clock synchronization by
configuring all NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 Ms as
BCs.
Context
Networking Requirements
On the network shown in Figure 1-82, the transport network transmits wireless
services between gNodeBs, and all transport network nodes support 1588v2. Core
nodes PE1 and PE2 receive time information from the BITS server. gNodeB-2
supports SyncE, instead of 1588v2. Both gNodeB-1 and gNodeB-3 support 1588v2.
PE1 and PE2 dynamically select the grandmaster clock. The grandmaster clock
transmits 1588v2 time signals over the entire network. Frequency synchronization
can be achieved between gNodeBs and transport network devices. Time
synchronization can be achieved between 1588v2-capable gNodeBs and transport
network devices.
Because all nodes on the transport network support 1588v2, they can be
configured as BCs to transmit clock information. For gNodeB-2 that does not
support 1588v2, frequency information can be transmitted through the clock
signals over an E1 line.
Figure 1-82 Configuring the multicast MAC encapsulation mode for 1588v2
packets to implement network-wide clock synchronization
NOTE
The configurations in this example are performed on PE1, PE2, CE1, and CE2. HUAWEI
NetEngine 8100 M14/M8, NetEngine 8000 M14K/M14/M8K/M8/M4 & NetEngine 8000E
M14/M8 series can function as PE1, PE2, CE1, and CE2.
gNodeB-1 - 10.10.0.2/24
gNodeB-3 - 172.16.1.2/24
Configuration Roadmap
The configuration roadmap is as follows:
NOTE
Configure devices to use the default multicast MAC encapsulation mode to transmit 1588v2
packets.
Data Preparation
To complete the configuration, you need the following data:
● Delay measurement mechanism of 1588 links: PDelay
● Value of the 1588v2 clock domain where clock devices reside
● Interval at which Announce messages are sent and the number of times
Announce message receiving times out
● Interval at which Sync messages are sent
● Interval at which PDelay messages are sent
Procedure
Step 1 Assign an IP address to each interface and configure OSPF. The configuration
details are not provided here.
Step 2 Configure PE1 and PE2 to use clock interfaces to import BITS signals.
1. Configure PE1 to import clock signals from the external BITS source BITS1,
participate in master clock selection on the 1588v2 network, and import
1588v2 time signals.
[*PE1] ptp enable
[*PE1] clock bits-type bits1 1pps input
[*PE1] ptp clock-source bits1 on
[*PE1] ptp clock-source bits1 priority1 2
[*PE1] ptp source-switch ptsf enable
[*PE1] commit
2. Configure PE2 to import clock signals from the external BITS source BITS2,
participate in master clock selection on the 1588v2 network, and import
1588v2 time signals.
[*PE2] ptp enable
[*PE2] clock bits-type bits1 1pps input
[*PE2] ptp clock-source bits1 on
[*PE2] ptp clock-source bits1 priority1 1
[*PE2] ptp source-switch ptsf enable
[*PE2] commit
Port info
Name State Delay-mech Ann-timeout Type Domain
------------------------------------------------------------------------
GigabitEthernet0/2/0 slave pdelay 10 BC 1
Time Performance Statistics(ns): Slot X Card X Port X
------------------------------------------------------------------------
Realtime(T2-T1) :534 Pathdelay :0
Max(T2-T1) :887704804
Min(T2-T1) :512
----End
Configuration Files
● CE1 configuration file
#
sysname CE1
#
ptp enable
ptp device-type bc
ptp domain 1
#
interface GigabitEthernet0/2/0
undo shutdown
ip address 172.16.0.2 255.255.255.0
ptp enable
ptp delay-mechanism pdelay
#
interface GigabitEthernet0/1/0
undo shutdown
ip address 10.10.0.1 255.255.255.0
ptp enable
ptp delay-mechanism pdelay
#
ospf 1
area 0.0.0.0
network 172.16.0.0 0.0.0.255
network 10.10.0.0 0.0.0.255
#
#
interface GigabitEthernet0/1/0
undo shutdown
ip address 192.168.0.2 255.255.255.0
ptp enable
ptp delay-mechanism pdelay
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 172.16.1.1 255.255.255.0
ptp enable
ptp delay-mechanism pdelay
#
ospf 1
area 0.0.0.0
network 192.168.0.0 0.0.0.255
network 172.16.1.0 0.0.0.255
#
Concepts of G.8275.1
ITU-T defines the precision time protocol telecom profile for phase/time
synchronization with full timing support from the network, known as G.8275.1,
which is a time synchronization protocol.
A physical network can be logically divided into multiple clock domains. Each
clock domain has its own independent synchronous time, with which clocks in the
same domain synchronize.
Each node on a time synchronization network is called a clock. G.8275.1 defines
the following types of clocks:
● Telecom grandmaster (T-GM): A T-GM can only be the master clock that
provides time synchronization.
● Telecom-boundary clock (T-BC): A T-BC has more than one G.8275.1 interface.
One interface of the T-BC synchronizes time signals with an upstream clock,
and the other interfaces distribute the time signals to downstream clocks.
● Telecom transparent clock (T-TC): A T-TC has more than one G.8275.1
interface through which the T-TC forwards G.8275.1 packets, and corrects the
packet transmission delay. A T-TC does not synchronize the time through any
of these G.8275.1 interfaces.
● Telecom time slave clock (T-TSC): A T-TSC can only be the slave clock that
synchronizes the time information of the upstream device.
NOTE
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M can function only as a
T-BC or T-TC.
Feature Requirements
None
Usage Scenario
On the network shown in Figure 1-83, the BITS interface that functions as the T-
GM obtains high-accuracy time information from a global positioning system
(GPS), encapsulates the information into a G.8275.1 packet, and sends the packet
to the bearer network. A bearer network device that functions as the T-BC
transparently transmits the time information to all devices on the bearer network.
BCs send high-accuracy time information carried in the G.8275.1 packet to
wireless access devices, such as a gNodeB.
Pre-configuration Tasks
● Set physical parameters of interfaces and ensure that the interfaces are
physically Up.
Context
For details about configuring a BITS source as the T-GM, see the BITS source
configuration guide.
NOTE
Context
Perform the following steps on each T-BC/T-TC:
Procedure
Step 1 Run system-view
Step 5 (Optional) Run ptp domain domain-value The clock domain where the device
resides is configured.
NOTE
When G.8275.1 is used to perform time synchronization, T-BCs and T-TCs must reside in the
same clock domain.
Step 6 (Optional) Run ptp source-switch ptsf enable The packet timing signal fail
(PTSF)-triggered source switching function is enabled.
After this function is enabled, the device automatically switches to another valid
time source if the current time source has an offset change greater than 1.1 µs for
three consecutive seconds or the signal fails due to the loss of Sync packets. After
the time source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to restore the current time source. If you want to
automatically restore the time source after a certain period of time, run the ptp
ptsf auto-recovery-time command to configure the PTSF auto-recovery time. By
default, the PTSF auto-recovery time is 0 minute, that is, the function is disabled.
The hold-off time for the clock class of the local source is configured on the
device.
An alarm threshold is configured for the time offset (time difference between
the master and slave clocks) on the passive interface of the device.
Step 10 (Optional) Configure the clock source access control function on the T-BC..
1. Run ptp acl enable
The clock source access control function is enabled.
2. Run ptp acl-permit-clockid clockid-value
A clock ID is configured for another T-BC which is allowed to participate in
BMC selection.
Step 11 (Optional) Run ptp max-steps-removed max-steps-removed-value on the T-BC.
The maximum number of hops for time synchronization is configured. A clock
source is considered unavailable if the value of stepsRemoved in the Announce
packets received by the clock source is greater than or equal to the value of max-
steps-removed-value.
Step 12 Run commit
The configuration is committed.
----End
Context
Perform the following steps on each router connected to a BITS source on a G.
8275.1 network:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp clock-source local priority2 priority2-value
The priority2 of the local clock source is configured.
----End
Context
Perform the following operations on the T-BC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Configure the time synchronization alarm function as required.
● To configure the alarm threshold for PTP source input deterioration, run the
ptp alarm-threshold clock-class clock-class-value command.
● To configure the alarm threshold for the PTP source absolute time reference,
run the ptp alarm-threshold standard-time-offset time-offset-value
command.
● To configure the alarm threshold for the peak value of the accumulated PTP
source time offsets, run the ptp alarm-threshold time-offset-sum time-
offset-sum command.
Step 3 Run commit
The configuration is committed.
----End
Context
Perform the following operations on the T-BC and T-TC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
----End
Context
Perform the following operations on the T-BC:
Procedure
● Configure time attributes for Announce packets.
a. Run system-view
The interval at which the interface sends Announce packets is set. The
following formula applies:
The interval at which the interface sends Sync packets is set. The
following formula applies:
The interval at which the interface sends Delay_Req packets is set. The
following formula applies: Interval = 2n x 1/1024s, where n equals to min-
delayreq-interval.
----End
Prerequisites
G.8275.1 packets can be encapsulated only in Layer 2 multicast MAC
encapsulation mode.
NOTE
In G.8275.1 mode, the ptp mac-egress command does not support setting of VLAN
parameters.
Context
Perform the following operations on the T-BC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run ptp mac-egress destination-mac destination-mac
The G.8275.1 packets to be sent from the interface are encapsulated in multicast
MAC encapsulation mode, and a destination multicast MAC address is configured.
Step 4 Run commit
The configuration is committed.
----End
Procedure
● Run the display ptp all [ state | config ] command to view the time
synchronization status and configurations of device operation.
● Run the display ptp interface interface-type interface-number command to
view the time synchronization information on a device interface.
----End
Example for Configuring the Multicast MAC Encapsulation Mode for G.8275.1
Packets to Achieve Network-wide Time Synchronization
Networking Requirements
G.8275.1 can be used as a time synchronization protocol to transmit time signals
of the BITS server on the entire network so that network-wide time
synchronization can be achieved for base stations.
Figure 1-84 Configuring the multicast MAC encapsulation mode for G.8275.1
packets to achieve network-wide time synchronization
NOTE
Configuration Roadmap
The configuration roadmap is as follows:
1. Connect PE1 and PE2 to BITS servers.
2. Configure PE1, PE2, Device1, and Device2 as T-BCs to implement network-
wide time synchronization.
3. Configure synchronous Ethernet to implement frequency synchronization for a
higher synchronization precision.
4. Enable performance monitoring on the passive interfaces of Device1 and
Device2.
5. To prevent reverse synchronization of clock signals, disable Interface 1 on PE1
and PE2 and Interface 2 on Device1 and Device2 from working in the slave
state.
NOTE
Configure devices to use the default multicast MAC encapsulation mode to transmit G.
8275.1 packets.
Data Preparation
N/A
Procedure
Step 1 Configure PE1 and PE2 to import BITS clock signals through their clock interfaces.
The configuration details are not provided here.
Step 2 Configure PE1, PE2, Device1, and Device2 as T-BCs.
1. Configure PE1.
[*PE1] ptp enable
[*PE1] ptp profile g-8275-1 enable
[*PE1] ptp device-type t-bc
[*PE1] commit
[~PE1] interface gigabitethernet 0/1/0
[~PE1-GigabitEthernet0/1/0] ptp enable
[*PE1-GigabitEthernet0/1/0] clock synchronization enable
[*PE1-GigabitEthernet0/1/0] commit
[~PE1-GigabitEthernet0/1/0] quit
2. Configure PE2.
[*PE2] ptp enable
[*PE2] ptp profile g-8275-1 enable
[*PE2] ptp device-type t-bc
[*PE2] commit
[~PE2] interface gigabitethernet 0/1/0
[~PE2-GigabitEthernet0/1/0] ptp enable
[*PE2-GigabitEthernet0/1/0] clock synchronization enable
[*PE2-GigabitEthernet0/1/0] commit
[~PE2-GigabitEthernet0/1/0] quit
3. Configure Device1.
[*Device1] ptp enable
[*Device1] ptp profile g-8275-1 enable
[*Device1] ptp device-type t-bc
[*Device1] ptp passive-measure enable
[*Device1] commit
[~Device1] interface gigabitethernet 0/1/0
[~Device1-GigabitEthernet0/1/0] ptp enable
Step 3 Configure base stations to receive G.8275.1 packets from Device1 and Device2.
The configuration details are not provided here.
Step 4 Verify the configuration.
After completing the configurations, run the display ptp all command to check
the running status of G.8275.1. The following example uses the command output
on Device1. The command output shows that the G.8275.1 interface GE 0/1/0 on
Device1 is working in the Slave state, the grandmaster clock ID is
0a05d7fffe341500, and the parent clock ID is 0a05d7fffe341500. Device1 has
synchronized with the master clock source.
[~Device1] display ptp all
Device config info
------------------------------------------------------------------------------
PTP state :enabled Domain value :24
Slave only :- Device type :T-BC
Set port state :- Local clock ID :0aa1c6fffe699700
Acl :no Virtual clock ID :no
Acr :- Time lock success :yes
Asymmetry measure :disable Passive measure :enable
PTP profile :G.8275.1 V2.0
Send GM WTR :no
BMC run info
------------------------------------------------------------------------------
Grand clock ID :0a05d7fffe341500
Receive number :GigabitEthernet0/1/0
Parent clock ID :0a05d7fffe341500
Parent portnumber :35585
Priority1 :128 Priority2 :128
Step removed :0 Clock accuracy :0xfe
Clock class :6 Time Source :0xa0
UTC Offset :35 UTC Offset Valid :True
Timescale :PTP Time traceable :True
Leap :None Frequency traceable :True
Offset scaled :0xffff Sync uncertain :True
Port info
------------------------------------------------------------------------------
Realtime(T2-T1) :1104 Pathdelay :0
Max(T2-T1) :1110
Min(T2-T1) :1100
Clock source info
Clock Pri Pri2 Accuracy Class TimeSrc Signal Switch Direction In-Status
------------------------------------------------------------------------------
local 128 128 0xFE 248 0xa0 - - - -
bits1/11 128 128 0x20 6 0x20 1pps off in/- normal
bits1/12 128 128 0x20 6 0x20 1pps off in/- normal
----End
Configuration Files
● PE1 configuration file
#
sysname PE1
#
ptp enable
ptp profile g-8275-1 enable
ptp device-type t-bc
#
interface GigabitEthernet0/1/0
undo shutdown
clock synchronization enable
ptp enable
#
return
#
sysname Device1
#
ptp enable
ptp profile g-8275-1 enable
ptp device-type t-bc
ptp passive-measure enable
#
interface GigabitEthernet0/1/0
undo shutdown
ptp notslave disable
clock synchronization enable
clock priority 10
ptp enable
#
interface GigabitEthernet0/1/1
undo shutdown
clock synchronization enable
ptp enable
#
interface GigabitEthernet0/1/2
undo shutdown
ptp notslave disable
clock synchronization enable
clock priority 20
ptp enable
#
return
The SMPTE-2059-2 protocol provides acceptable lock time, jitter, and precision.
Feature Requirements
None
Usage Scenario
The first step of establishing an SMPTE-2059-2 network is to import time signals
from an external BITS clock source. The BMC algorithm can be used to select the
grandmaster clock and master clock from SMPTE-2059-2 devices. Alternatively,
the grandmaster clock and master clock can be manually configured. On a
dynamic SMPTE-2059-2 network, clock source selection is implemented by
comparing priorities to ensure the precision of clock signals to the maximum
extent.
Pre-configuration Tasks
● Set physical parameters of interfaces so that the interfaces are physically Up.
● Run the license active file-name command to activate the clock
synchronization license file on the main control board. If the clock
synchronization license file is not loaded, the ptp enable command is not
allowed to be configured.
Context
A BITS source provides reference time signals. If dynamic best master clock (BMC)
selection is used, multiple SMPTE-2059-2 devices can be configured to import BITS
signals so that all these SMPTE-2059-2 devices can participate in BMC selection
for the determination of the grandmaster clock. The grandmaster clock provides
time signals for the entire SMPTE-2059-2 network, and other network devices use
the SMPTE-2059-2 protocol to obtain clock synchronization information from the
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Select the type of the input time signal.
Importing time signals from the 1PPS BITS1 interface is used as an example.
clock bits-type bits1 1pps input
The actual number of BITS interfaces and their IDs depend on the hardware
configuration. For details about clock interfaces, see Hardware Description.
Generally, BITS0 provides frequency signals for physical clock synchronization and
corresponds to CLK or CLK/TOD0 on the interface panel; BITS1 provides time
signals and corresponds to TOD or CLK/TOD1 on the interface panel. If there is
only one CLK/TOD interface on a device, the device can provide the BITS0 and
BITS1 interfaces through a one-to-two cable.
Step 3 Configure the device to participate in BMC selection using BITS signals.
BITS1 signals are used as an example.
ptp clock-source bits1 on
Step 4 (Optional) Configure the correction time for the delay in sending and receiving
time signals on a BITS interface.
The BITS1 interface is used as an example.
ptp clock-source bits1 { receive-delay receive-delay-value | send-delay send-delay-value }
Context
When an SMPTE-2059-2-enabled router uses the BMCA to dynamically select a
clock source, the router compares the following parameters in sequence: priority1
> clock-class > clock-accuracy > priority2. That is, the router preferentially
compares priority1 of clock sources. The clock source with the largest value of
priority1 is selected as the grandmaster clock. If the priority1 values are the
same, the router then compares clock-class.
Perform the following steps on each router connected to an external BITS source
on an SMPTE-2059-2 network:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Configure the type of the clock source to be traced.
The local clock and BITS1 signals are used as an example. The actual number of
BITS interfaces and their IDs depend on the hardware configuration.
ptp clock-source { local time-source time-source-value | bits1 time-source time-source-value }
NOTE
This command applies only to the grandmaster. The parameter settings vary according to
the type of the clock source. For the mapping between time-source-value and the clock
source type, see ptp clock-source in the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M Command Reference.
For the mapping between clock-class-value and the clock source level, see ptp
clock-source in the NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M
Command Reference.
If the value of clock-class-value is less than 128, the device cannot function as a
slave clock.
Step 5 Run ptp clock-source { local priority1 priority1-value | bits1 priority1 priority1-
value }
The priority1 of the clock source is configured.
Step 6 Run ptp clock-source { local priority2 priority2-value | bits1 priority2 priority2-
value }
The priority2 of the clock source is configured.
Step 7 (Optional) Run ptp clock-source bits1 grandmaster-clockid grandmaster-
clockid-value
----End
Procedure
● Perform the following steps on each OC:
a. Run system-view
SMPTE-2059-2 is enabled.
d. Run ptp device-type oc
NOTE
NOTE
NOTE
NOTE
SMPTE-2059-2 is enabled.
d. Run ptp device-type tcandbc
NOTE
After this function is enabled, if the current clock source has an offset
change of greater than 1.1 µs for three consecutive seconds or
encounters a signal failure due to the loss of Sync packets, the device
automatically switches to another valid clock source. After the clock
source fault is rectified, run the ptp source-switch ptsf recover
command in the interface view to switch back to the original clock
source.
----End
Context
Perform the following steps on an OC, a BC, or a TCandBC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp acl enable
The access control function is enabled for SMPTE-2059-2 clock sources.
Step 3 Run ptp acl-permit-clockid clockid-value
A clock ID is configured for an SMPTE-2059-2 device that is allowed to participate
in local BMC selection.
Step 4 Run commit
The configuration is committed.
----End
Prerequisites
Determining a passive interface: Run the display ptp all command output. If the
value of State in Port info of the command output is passive, the interface is a
passive interface.
Context
A passive interface does not trace or advertise time information. If a device has
multiple master SMPTE-2059-2 interfaces in the same clock domain, the device
selects the interface with the highest priority as the master clock. The interface
connected to the master clock is the slave clock. In this case, other local interfaces
are in the passive state and provide backup for the slave interface. Passive
interfaces can send Pdelay_Req, Pdelay_Resp, delay_Resp_Follow_Up, signaling,
and management response messages.
A passive interface can be selected as a slave clock or a master clock to participate
in time synchronization after a clock source changes. Monitoring the passive
interface before a clock source changes helps keep stable time signals on an
SMPTE-2059-2 network.
After the router stably synchronizes time signals with a clock source, the router
can monitor the performance of its passive interface. The router checks the offset
between the master and slave clocks on the passive interface every 300s. If the
offset is greater than a configured alarm threshold, the router sends an alarm
named hwPtpPassiveFiberLengthChange to NMS.
Perform the following steps on a BC or a TCandBC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp passive-measure enable
The performance monitoring function is enabled for the passive interface on the
SMPTE-2059-2 device.
Step 3 Run ptp passive-measure alarm-threshold alarm-threshold-value
An alarm threshold is configured for the offset of the passive interface on the
SMPTE-2059-2 device.
Step 4 Run commit
The configuration is committed.
----End
Context
During SMPTE-2059-2 clock synchronization, an Announce packet is sent to
determine the master-slave hierarchy, where the upstream node that advertises
the synchronization time is the master device and the downstream node that
receives the synchronization time is called the slave device. The master device
sends Sync packets to the slave device to transmit performance parameters of
time signals. In addition, the delay measurement mechanism can be implemented
to ensure the accuracy of time signals.
Perform the following operations on each SMPTE-2059-2 device:
Procedure
● Perform the following steps on an OC:
a. Run system-view
NOTE
Two SMPTE-2059-2 interfaces on both ends of a link must use the same delay
measurement mechanism. A delay measurement mechanism inconsistency
causes a communication failure.
d. Run ptp udp-egress source-ip source-ip [ destination-ip destination-ip ]
[ dscp dscp ] [ vlan vlan-id [ priority priority-value ] ]
NOTE
Run this command before PTP is enabled on the interface. Otherwise, the IP
address of the management interface is automatically used as the source IP
address of SMPTE-2059-2 packets. To disable the PTP function from the interface,
run the undo ptp udp-egress source-ip command.
e. Run ptp enable
NOTE
Two SMPTE-2059-2 interfaces on both ends of a link must use the same delay
measurement mechanism. A delay measurement mechanism inconsistency
causes a communication failure.
d. Run ptp udp-egress source-ip source-ip [ destination-ip destination-ip ]
[ dscp dscp ] [ vlan vlan-id [ priority priority-value ] ]
NOTE
Run this command before PTP is enabled on the interface. Otherwise, the IP
address of the management interface is automatically used as the source IP
address of SMPTE-2059-2 packets. To disable the PTP function from the interface,
run the undo ptp udp-egress source-ip command.
e. Run ptp enable
NOTE
NOTE
NOTE
Run this command before PTP is enabled on the interface. Otherwise, the IP
address of the management interface is automatically used as the source IP
address of SMPTE-2059-2 packets. To disable the PTP function from the interface,
run the undo ptp udp-egress source-ip command.
d. Run ptp enable
PTP is enabled on the interface.
e. Run ptp tcoc-clock-id clock-source-id port-num port-num
The clock source traced by a specified interface on the TCOC is
configured.
Unlike a TC, a TCOC has an OC interface to implement frequency
synchronization. The TCOC also has TC interfaces to transparently
transmit SMPTE-2059-2 packets.
This command specifies a clock source that the OC interface on the TCOC
tracks, namely, the master clock interface. The OC interface can then
receive SMPTE-2059-2 packets to synchronize frequencies with the
master clock interface. If this command is not run, each TCOC interface
functions as a TC interface, which only transparently transmits
SMPTE-2059-2 packets instead of restoring frequency.
.
f. Run ptp asymmetry-correction { positive | negative } correction-value
NOTE
A BC interface uses the same clock domain ID as that configured in the system
view and therefore does not need to be specifically configured in the interface
view. The clock domain ID of a TC interface needs to be specified in the interface
view.
e. (Optional) Run ptp delay-mechanism { delay | pdelay }
NOTE
Two SMPTE-2059-2 interfaces on both ends of a link must use the same delay
measurement mechanism. A delay measurement mechanism inconsistency
causes a communication failure.
f. Run ptp udp-egress source-ip source-ip [ destination-ip destination-ip ]
[ dscp dscp ] [ vlan vlan-id [ priority priority-value ] ]
NOTE
Run this command before PTP is enabled on the interface. Otherwise, the IP
address of the management interface is automatically used as the source IP
address of SMPTE-2059-2 packets. To disable the PTP function from the interface,
run the undo ptp udp-egress source-ip command.
g. Run ptp enable
NOTE
Context
During SMPTE-2059-2 clock synchronization, an Announce packet is sent to
determine the master-slave hierarchy, where the upstream node that advertises
the synchronization time is the master device and the downstream node that
receives the synchronization time is called the slave device. The master device
sends Sync packets to the slave device to transmit performance parameters of
time signals. In addition, the delay measurement mechanism can be implemented
to ensure the accuracy of time signals.
If the packet sending interval is too small, devices frequently exchange
SMPTE-2059-2 packets, consuming too many bandwidth resources. If the packet
sending interval is too large, the precision of time synchronization cannot be
guaranteed. Given that the time precision is guaranteed, set the packet sending
interval to a large value.
Perform the following operations on an SMPTE-2059-2 device:
Procedure
● Configure time attributes for Announce packets.
a. Run system-view
The system view is displayed.
----End
Prerequisites
Before configuring an SMPTE-2059-2 packet encapsulation mode, check the type
of the link over which SMPTE-2059-2 packets are transmitted.
● For Layer 3 link transmission, select the UDP encapsulation mode.
Context
Select an SMPTE-2059-2 packet encapsulation mode based on networking
environments and specify the source IP address, destination IP address, and
transmission priority for SMPTE-2059-2 packets.
Procedure
● Configure the UDP encapsulation mode.
a. Run system-view
NOTE
Procedure
● Run the display ptp all [ state | config ] command to check the
SMPTE-2059-2 running status and configurations.
● Run the display ptp interface interface-type interface-number command to
check SMPTE-2059-2 information on a specific interface.
----End
1.1.9.1.1 Overview
Figure 1-85 Positions of the T-GM, T-BC, T-TC, and T-TSC on a time
synchronization network
Feature Requirements
None
Usage Scenario
On the network shown in Figure 1-86, the BITS interface that functions as the T-
GM obtains high-accuracy time information from a global positioning system
(GPS), encapsulates the information into a CU-106 packet, and sends the packet
to the bearer network. A bearer network device that functions as the T-BC
transparently transmits the time information to all devices on the bearer network.
BCs send high-accuracy time information carried in the CU-106 packet to wireless
access devices, such as a gNodeB.
Pre-configuration Tasks
● Set physical parameters of interfaces and ensure that the interfaces are
physically Up.
Context
For details about the clock source configuration of the T-GM on a BITS source, see
the associated configuration guide.
Context
Perform the following steps on each router that is connected to a BITS source on
the CU-106 network:
Procedure
Step 1 Run system-view
NOTE
● clockid-value must be the same as that of the external BITS source. Otherwise, if both
the BITS and PTP clock sources are deployed, the computation of the time
synchronization path will be affected.
● If the clock ID of the external BITS source is changed due to factors such as device
replacement, the value of clockid-value must also be changed accordingly.
NOTE
In T-BC mode, the default accuracy value (0xFE) of the local clock source is used.
NOTE
In T-BC mode, the default clock class is 248. If the clock class of a locked clock is less than 135,
the clock class automatically changes to 165 after the clock is out of lock and this clock class
cannot be configured.
----End
Context
Perform the following steps on each T-BC and T-TC:
Procedure
Step 1 Run system-view
Step 2 Run ptp enable
PTP is enabled on the device.
If the device hardware supports ultra-high-precision timestamping, you can run
the ptp uhpc enable command to improve the precision of time synchronization.
To view the capabilities supported by the corresponding port, run the display ptp
interface { interface-name | interface-type interface-number } command.
Step 3 Run ptp profile cu-106 enable
CU-106 is enabled on the device.
Step 4 Run ptp device-type t-bc
The device type is set to T-BC or T-TC.
Step 5 (Optional) Run ptp domain domain-value
The domain where the device resides is configured.
NOTE
All the T-BCs that use CU-106 to perform time synchronization must reside in the same
clock domain.
----End
Context
Perform the following operations on the T-BC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Configure the time synchronization alarm function as required.
● Run the ptp alarm-threshold clock-class clock-class-value command to
configure the alarm threshold for PTP source input deterioration.
● Run the ptp alarm-threshold standard-time-offset time-offset-value
command to configure the alarm threshold for the PTP source absolute time
reference.
● Run the ptp alarm-threshold time-offset-sum time-offset-sum command to
configure the alarm threshold for the peak value of the accumulated PTP
source time offsets.
Step 3 Run commit
The configuration is committed.
----End
Context
Perform the following operations on the T-BC and T-TC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run ptp enable
PTP is enabled on the interface.
Step 4 (Optional) Run ptp local-priority local-priority-value
The local priority of a PTP interface is set.
Step 5 (Optional) Run ptp asymmetry-correction { positive | negative } correction-
value
The asymmetric correction time for sending CU-106 packets on the interface is set.
Step 6 (Optional) Run ptp clock-step { one-step | two-step }
The timestamping mode of the synchronization packets sending by the CU-106
port is set.
Step 7 Run commit
The configuration is committed.
----End
Context
Perform the following operations on the T-BC:
Procedure
● Configure time attributes for Announce packets.
a. Run system-view
The system view is displayed.
b. Run interface interface-type interface-number
The interval at which the interface sends Announce packets is set. The
following formula applies:
The interval at which the interface sends Sync packets is set. The
following formula applies:
The interval at which the interface sends Delay_Req packets is set. The
following formula applies:
----End
Prerequisites
By default, CU-106 packets are encapsulated in MAC encapsulation mode.
Context
Perform the following operations on the T-BC:
Procedure
Step 1 Run system-view
----End
Procedure
● Run the display ptp all [ state | config ] command to view the time
synchronization status and configurations of device operation.
● Run the display ptp interface interface-type interface-number command to
view the time synchronization information on a device interface.
----End
Definition
The 1588 adaptive clock recovery (ACR) algorithm is used to carry out clock
(frequency) synchronization between the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M and clock servers by exchanging 1588v2 messages over a clock
link that is set up by sending Layer 3 unicast packets.
Unlike 1588v2 that achieves frequency synchronization only when all devices on a
network support 1588v2, 1588 ACR is capable of implementing frequency
synchronization on a network with both 1588v2-aware devices and 1588v2-
unaware devices.
After 1588 ACR is enabled on a server, the server provides 1588 ACR frequency
synchronization services for clients.
NOTE
1588 ACR records PDV performance statistics in the CF card. The performance statistics
indicate the delay and jitter information about packets but not information in the packets.
Purpose
All-IP has become the trend for future networks and services. Therefore,
traditional networks based on the Synchronous Digital Hierarchy (SDH) have to
overcome various constraints before migrating to IP packet-switched networks.
Transmitting Time Division Multiplexing (TDM) services over IP networks presents
a major technological challenge. TDM services are classified into two types: voice
services and clock synchronization services. With the development of VoIP,
technologies of transmitting voice services over an IP network have become
mature and have been extensively used. However, development of technologies of
transmitting clock synchronization services over an IP network is still under way.
1588v2 is a software-based technology that carries out time and frequency
synchronization. To achieve higher accuracy, 1588v2 requires that all devices on a
network support 1588v2; if not, frequency synchronization cannot be achieved.
Derived from 1588v2, 1588 ACR implements frequency synchronization with clock
servers on a network with both 1588v2-aware devices and 1588v2-unaware
devices. Therefore, in the situation where only frequency synchronization is
required, 1588 ACR is more applicable than 1588v2.
Benefits
This feature brings the following benefits to operators:
● Frequency synchronization can be achieved on networks with both 1588v2-
aware and 1588v2-unaware devices, reducing the costs of network
construction.
● Operators can provide more services that can meet subscribers' requirements
for frequency synchronization.
1588 ACR sends Layer 3 unicast packets to establish a clock link between a client
and a server to exchange 1588v2 messages. 1588 ACR obtains a clock offset by
comparing timestamps carried in the 1588v2 messages, which enables the client
to synchronize frequencies with the server.
1588 ACR clock synchronization is implemented in two modes: one-way mode and
two-way mode.
● One-way mode
a. The server sends the client 1588v2 messages at t1 and t1' and time-
stamps the messages with t1 and t1'.
b. The client receives the 1588v2 messages at t2 and t2' and time-stamps
the messages with t2 and t2'.
t1 and t1' are the clock time of the server, and t2 and t2' are the clock time of
the client.
By comparing the sending time on the server and the receiving time on the
client, 1588 ACR calculates a frequency offset between the server and client
and then implements frequency synchronization. For example, if the result of
the formula (t2 - t1)/(t2' - t1') is 1, frequencies on the server and client are
the same; if not, the frequency of the client needs to be adjusted so that it is
the same as the frequency of the server.
● Two-way mode
a. The server clock sends a 1588 sync packet carrying a timestamp t1 to the
client server at t1.
b. The client server receives a 1588 sync packet from the server clock at t2.
c. The client clock sends a 1588 delay_req packet to the server clock at t3.
d. The server clock receives the 1588 delay_req packet from the client clock
at t4, and sends a delay_resp packet to the slave clock.
The same calculation method is used in two-way and one-way modes. t1 and t2
are compared with t3 and t4. A group of data with less jitter is used for
calculation. In the same network conditions, the clock signals with less jitter in one
direction can be traced, which is more precise than clock signal tracing in one
direction. The two-way mode has a better frequency recovery accuracy and higher
reliability than the one-way mode. If adequate bandwidth is provided, using clock
synchronization in two-way mode is recommended for frequency synchronization
when deploying 1588 ACR.
A client initiates a negotiation with a server in the server list by sending a request
to the server. After receiving the request, the server replies with an authorization
packet, implementing a 2-way handshake. After the handshake is complete, the
client and server exchange Layer 3 unicast packets to set up a clock link, and then
exchange 1588v2 messages over the link to achieve frequency synchronization.
Duration Mechanism
On a 1588 ACR client, you can configure a duration for Announce, Sync and
delay_resp packets. The duration value is carried in the TLV field of a packet for
negotiating signaling and sent to a server.
Generally, the client sends a packet to renegotiate with the server before the
duration times out so that the server can continue to provide the client with
synchronization services.
If the link connected to the client goes Down or fails, the client cannot renegotiate
with the server. When the duration times out, the server stops sending Sync
packets to the client.
On the preceding network, CSGs support 1588 ACR and function as clients to
initiate requests for Layer 3 unicast connections to the upstream IPCLK server. The
CSGs then exchange 1588v2 messages with the IPCLK server over the connections,
achieving frequency recovery. BITS1 and BITS2 are configured as clock servers for
the CSGs to provide protection.
One CSG sends line clock signals carrying frequency information to gNodeB1
along an E1 link. The other CSG transmits gNodeB2 frequency information either
along a synchronous Ethernet link or by sending 1588v2 messages. In this manner,
both NodeBs connected to the CSGs can achieve frequency synchronization.
Terms
Term Description
Term Description
Abbreviations
Abbreviation Full Spelling
Purpose
All-IP has become the trend for future networks and services. Therefore,
traditional networks based on the Synchronous Digital Hierarchy (SDH) have to
overcome various constraints before migrating to IP packet-switched networks.
Transmitting Time Division Multiplexing (TDM) services over IP networks presents
a major technological challenge. TDM services are classified into two types: voice
services and clock synchronization services. With the development of VoIP,
technologies of transmitting voice services over an IP network have become
mature and have been extensively used. However, development of technologies of
transmitting clock synchronization services over an IP network is still under way.
1588v2 is a software-based technology that carries out time and frequency
synchronization. To achieve higher accuracy, 1588v2 requires that all devices on a
network support 1588v2; if not, frequency synchronization cannot be achieved.
Derived from 1588v2, 1588 ACR implements frequency synchronization with clock
servers on a network with both 1588v2-aware devices and 1588v2-unaware
devices. Therefore, in the situation where only frequency synchronization is
required, 1588 ACR is more applicable than 1588v2.
Definition
The 1588 adaptive clock recovery (ACR) algorithm is used to carry out clock
(frequency) synchronization between the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M and clock servers by exchanging 1588v2 messages over a clock
link that is set up by sending Layer 3 unicast packets.
Unlike 1588v2 that achieves frequency synchronization only when all devices on a
network support 1588v2, 1588 ACR is capable of implementing frequency
synchronization on a network with both 1588v2-aware devices and 1588v2-
unaware devices.
After 1588 ACR is enabled on a server, the server provides 1588 ACR frequency
synchronization services for clients.
NOTE
1588 ACR records PDV performance statistics in the CF card. The performance statistics
indicate the delay and jitter information about packets but not information in the packets.
Feature Requirements
1588v2 ACR has the following requirements for NetEngin NetEngine 8000
the intermediate network: e 8000 M M14/NetEngine
1. The PDV of the intermediate network 8000 M14K/
cannot exceed 16 ms. NetEngine 8000
M4/NetEngine
2. When the intermediate network is a packet 8000 M8/
switched network (PSN), the scenarios defined NetEngine 8000
in G.8261 are supported. The packet loss rate is M8K/NetEngine
less than 0.5%, the highest QoS priority is 8000E M14/
used, the number of hops is less than 10 (10 NetEngine 8000E
NEs), and the long-term traffic is less than M8
80% of the total traffic.
3. If the intermediate network is an SDH
network, the SDH network must support VC-4
encapsulation but not VC-12 or VC-3
encapsulation. ACR packets can only be sent
and received across the SDH network once.
4. If the intermediate network is a microwave
network, the microwave is Packet microwave.
TDM microwave is the same as SDH
microwave. The highest QoS priority is used.
The microwave bandwidth must be greater
than 100 Mbit/s, the number of hops must be
less than or equal to two (three NEs), and the
long-term traffic must be less than 80% of the
total traffic.
The 1588 ACR frequency synchronization
performance is affected. Therefore, you are
advised to plan a 1588 ACR clock
synchronization network.
Applicable Environment
On the IP RAN shown in Figure 1-90, two PEs are connected by a Layer 3 network
deployed with 1588v2-unaware devices. PE1 attached to an NGC is connected to a
BITS. 1588 ACR-capable PE2 initiates a request for negotiation and exchanges
Layer 3 unicast packets with PE1 to set up a connection. If the connection is
successful, PE2 exchanges 1588v2 packets with PE1 over the connection to
implement clock synchronization.
Pre-configuration Tasks
Before configuring 1588 ACR in single-server mode, complete the following tasks:
● Configure static routes or an IGP to ensure IP route reachability among nodes.
● Ensure that the clock server has correctly imported clock signals from a BITS.
Context
ACR, which is an adaptive clock recovery technology, allows a 1588 ACR client to
exchange 1588v2 packets with a clock server on a link where a 1588v2-incapable
device resides. After receiving 1588v2 packets, the client uses clock information
carried in the packets to restore clock information.
The 1588 ACR features supported by the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M are as follows:
● 1588 ACR clock synchronization in single-server scenarios
In a 1588 ACR domain, a client establishes a client/server relationship only
with the remote clock server. The client initiates unicast negotiation requests
and obtains 1588v2 packets for clock restoration. If a clock server becomes
faulty, the client does not automatically initiate a connection request to
another clock server.
● 1588 ACR clock synchronization in dual-server scenarios
In a 1588 ACR domain, a client establishes a client/server relationship with
two remote clock servers. The client initiates unicast negotiation requests and
obtains 1588v2 packets for clock restoration. If the master clock server
becomes faulty, the client automatically initiates a connection request to the
slave clock server.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp-adaptive enable
1588 ACR is enabled.
Step 3 Run ptp-adaptive device-type client
The 1588 ACR clock working mode is set to client.
Step 4 (Optional) Run ptp-adaptive frequency profile
The 1588 ACR-enabled device to totally comply with ITU-T G.8265.1 is configured.
After the ptp-adaptive frequency profile command is run, the default domain
value changes to 4. The domain value range changes to 4-23.
Step 5 (Optional) Run ptp-adaptive domain domain-value
A 1588 ACR domain is configured.
NOTE
The client and clock server, which exchange 1588 ACR packets for clock or time
synchronization, must be in one 1588 ACR clock domain.
client automatically initiates a connection to the other client. The process repeats
until the client is connected to a server.
1588 ACR unicast negotiation is enabled on the router and the frequency recovery
mode is configured.
----End
Context
ACR, which is an adaptive clock recovery technology, allows a 1588 ACR client to
exchange 1588v2 packets with a clock server on a link where a 1588v2-incapable
device resides. After receiving 1588v2 packets, the client uses clock information
carried in the packets to restore clock information.
Procedure
Step 1 Run system-view
The 1588 ACR-enabled device to totally comply with ITU-T G.8265.1 is configured.
After the ptp-adaptive frequency profile command is run, the default domain
value changes to 4. The domain value range changes to 4-23.
NOTE
The client and clock server, which exchange 1588 ACR packets for clock synchronization,
must be in one 1588 ACR clock domain.
The clock server's and client's IP addresses uniquely identify a 1588 ACR
connection, which is set up by exchanging Layer 3 unicast packets between a
client and a clock server during negotiation. Configuring a loopback address as the
server's IP address is recommended, helping the clock server direct packets to the
client.
The VPN instance name carried in 1588v2 packets is specified, which identifies the
VPN instance bound to the server's loopback interface.
----End
Context
Adjustable parameters on a client are as follows:
Procedure
Step 1 Run ptp-adaptive dscp dscp-value
The DSCP value in 1588 ACR packets is set.
Setting a large DSCP value to ensure that 1588v2 packets reach the destination
even if a congestion occurs on a network. This value is adjustable on both the
client and clock server.
Step 2 Run ptp-adaptive { announce-duration | sync-duration | delay-resp-duration }
duration-value
The duration field value is set for each type of 1588 ACR packet.
Step 3 Run ptp-adaptive request sync-interval interval-value
The interval at which an ACR clock server sends Sync packets is set.
Step 4 Run ptp-adaptive request announce-interval announce-interval-value
The interval at which an ACR clock server sends Announce packets is set.
Step 5 Run ptp-adaptive request delay-resp-interval interval-value
The interval at which the 1588 ACR-enabled server sends Delay_Resp packets is
set.
Step 6 Run ptp-adaptive announce receipt-timeout timeout-time
The allowable maximum number of consecutive Announce packets that the client
fails to receive is set.
Step 7 Run commit
The configuration is committed.
----End
Procedure
● When the router functions as a client:
a. Run the display ptp-adaptive all command to check all 1588 ACR
configurations on the client.
b. Run the display ptp-adaptive server [ server-id ] command to check
detailed information about a clock server that is connected to the 1588
ACR enabled client and statistics about packets exchanged between the
client and server.
● When the router functions as a server:
a. Run the display ptp-adaptive all command to check all 1588 ACR
configurations on the server.
b. Run the display ptp-adaptive { all | client [ client-id ] } command to
check detailed information about a clock client that is connected to the
1588 ACR enabled server and statistics about packets exchanged between
the client and server.
----End
Networking Requirements
On the IP RAN shown in Figure 1-91, DeviceA functions as a clock server. DeviceC
functions as a client, and sends a 1588 ACR Layer 3 unicast negotiation request to
the server to achieve clock synchronization.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
● IP address of the server and the IP address of the client
● Interval for sending Sync, Delay_Resp and Announce packets on the server
Procedure
Step 1 Configure DeviceA as a server.
<DeviceA> system-view
[~DeviceA] interface loopback 0
[*DeviceA-Loopback0] ip address 1.1.1.1 32
[*DeviceC-Loopback0] commit
[~DeviceA-Loopback0] quit
[*DeviceA] ptp-adaptive enable
[*DeviceA] ptp-adaptive device-type server
[*DeviceA] ptp-adaptive local-ip 1.1.1.1
[~DeviceA] commit
Step 3 Adjust Layer 3 unicast negotiation parameters on the client and the server.
# Configure the client.
[*DeviceC] ptp-adaptive request sync-interval 4
[*DeviceC] ptp-adaptive request announce-interval 12
[*DeviceC] ptp-adaptive request delay-resp-interval 6
[*DeviceC] commit
Client info
ID Ip Address Clock ID Mode Announce Sync Delay_resp
---------------------------------------------------------------------------
1 0 2.2.2.2 001882fffed48301 one-way 2 -6 none
----End
Configuration Files
● Configuration file of DeviceA
#
sysname DeviceA
#
ptp-adaptive enable
ptp-adaptive device-type server
ptp-adaptive local-ip 1.1.1.1
ptp-adaptive acr unicast-negotiate enable
#
interface Loopback0
ip address 1.1.1.1 255.255.255.255
#
return
Networking Requirements
As shown in Figure 1-92, Device A and Device B function as clock servers that
work in the master/slave mode. As a client, Device C first sends a 1588 ACR Layer
3 unicast negotiation request to Device A that functions as the master clock server
to obtain clock synchronization information. If the link between DeviceC and
DeviceA goes Down, DeviceC sends a Layer 3 unicast negotiation request to
DeviceB to ensure that its clock is synchronized with that of the clock server.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure DeviceA as server 1.
<DeviceA> system-view
[~DeviceA] interface loopback 0
[*DeviceA-Loopback0] ip address 1.1.1.1 32
[*DeviceA-Loopback0] commit
[~DeviceA-Loopback0] quit
[*DeviceA] ptp-adaptive enable
[*DeviceA] ptp-adaptive device-type server
[*DeviceA] ptp-adaptive local-ip 1.1.1.1
[*DeviceA] commit
Step 4 Adjust Layer 3 unicast negotiation parameters on the client and the servers.
# Configure server 2.
[*DeviceB] ptp-adaptive acr unicast-negotiate enable
[*DeviceA] commit
# Check the 1588 ACR configuration on the server. Take the display on DeviceA as
an example.
<DeviceA> display ptp-adaptive all
Device config info
------------------------------------------------------------------------------
Ptp adaptive state :enable Device type :server
Sync mode :frequency Current state :master
Packet dscp :56 Domain value :4
Local ip :1.1.1.1 Profile :frequency
Server board :
VPN :none
Client info
ID Ip Address Clock ID Mode Announce Sync Delay_resp
------------------------------------------------------------------------------
1 500 3.3.3.3 00259efffed1efcf two-way 1 -3 -3
2 489 4.4.4.4 286ed4fffebcdc76 one-way 1 -3 -3
----End
Configuration Files
● Configuration file of DeviceA
#
sysname DeviceA
#
ptp-adaptive enable
ptp-adaptive device-type server
ptp-adaptive local-ip 1.1.1.1
ptp-adaptive acr unicast-negotiate enable
#
interface Loopback0
ip address 1.1.1.1 255.255.255.255
#
return
Definition
1588 Adaptive Time Recovery (1588 ATR) is an adaptive time recovery algorithm
based on PTP. It establishes clock links between routers by sending Layer 3 unicast
packets. Then, PTP packets are exchanged to achieve time synchronization over a
third-party network between devices.
In 1588v2 time synchronization mode, devices on the entire network must support
1588v2 hop by hop. 1588 ATR can be used to implement time synchronization
across devices that do not support 1588v2.
1588 ATR involves the server and client. The server provides 1588 ATR time
synchronization for the client, and the client synchronizes with the server.
When the time server (such as the SSU2000) supports only the 1588v2 unicast
negotiation mode, the client sends a negotiation request to the server, and the
server sends time synchronization packets to the client after the negotiation is
established. The client is configured with the 1588 ATR hop-by-hop mode and
interconnected with the time server to achieve time synchronization in 1588v2
unicast negotiation mode. After that, the client can function as a BC to provide
time synchronization for downstream gNodeBs.
Purpose
1588v2 is a software-based technology used to achieve frequency and time
synchronization and can support hardware assistance to provide greater accuracy.
However, 1588v2 requires support from all devices on the live network.
Benefits
This feature offers the following benefits to carriers:
Features Supported
The 1588 ATR features supported by NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 Ms are as follows:
● An NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M that functions
as a 1588 ATR server can synchronize time information with upstream devices
using the BITS source and transmit time information to downstream devices.
NOTE
An NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M can function only as the
1588 ATR server. The following restrictions apply to network deployment:
● When 1588 ATR is used to implement time synchronization over a third-party network,
reduce the packet delay variation (PDV) and the number of devices on the third-party
network as much as possible in order to ensure time synchronization performance on
clients. For details, see performance specifications for clients.
● The server and client communicate with each other through PTP packets which can be
either Layer 3 IP packets or single-VLAN-tagged packets. The PTP packets cannot carry
two VLAN tags or the MPLS label.
● The outbound interface of PTP packets on the server must support 1588v2.
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M supports the 1588 ATR
client. Network deployment has the following restrictions:
● When the 1588 ATR client in hop-by-hop mode is interconnected with the time source
in 1588v2 unicast negotiation mode, the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M must be directly connected to the time source.
Basic principles: 1588 ATR establishes a clock link between a client and a server by
exchanging Layer 3 unicast packets, and obtains the offset between the client and
server clocks by exchanging PTP packets. In this way, the client clock can be
synchronized with the server clock.
When only one server is configured, the client re-attempts to negotiate with the
server after a negotiation failure. This allows a client to renegotiate with a server
that is only temporarily unavailable in certain situations, such as when the server
fails and then recovers or when the server is restarted.
Duration Mechanism
A 1588 ATR client supports the duration specified in Announce, Sync, and delay
resp packets. The duration can be placed to the TLV field in Signaling packets
before they are sent to the server.
If a client or its link becomes Down, it cannot initiate a re-negotiation. After the
duration collapses, the server does not send synchronization packets to the client
anymore.
Per-hop BC + Server
Servers can synchronize time synchronization with upstream devices and send the
time source information to downstream clients through the server.
Scenario Description
● On an IP RAN, time synchronization is required between gNodeBs.
● Third-party networks (such as microwave and switch networks) do not
support 1588v2 time synchronization.
Solution Description
● Configure 1588 ATR or an external Atom GPS timing module on the client to
implement time synchronization across third-party networks. BCs support the
1588 ATR server function. After synchronizing time with an upstream device, a
BC can function as an ATR server to provide the time synchronization service
for downstream gNodeBs. A client can receive time synchronization
information through the ATOM GPS timing module or implement 1588 ATR
time synchronization through transparent transmission.
Scenario Description
● Time synchronization is required between gNodeBs and the time server.
● The time server (for example, the SSU2000) only supports the 1588v2 unicast
negotiation mode.
● A client first sends a negotiation request to the server, which sends time
synchronization packets back to the client only after the negotiation
relationship is established.
Solution Description
● The client is configured with the 1588 ATR hop-by-hop mode and
interconnected with the time server to achieve time synchronization in 1588v2
unicast negotiation mode. After that, the client can function as a BC to
provide time synchronization for downstream gNodeBs.
Scenario Description
● Time synchronization is required between gNodeBs and the time server.
● Several devices on the network do not support 1588v2 time synchronization.
Solution Description
Server-and-Client Mode
If the time node where the high-precision time source resides and the router close
to base stations belong to different VPNs, the interconnection device between the
two VPNs needs to serve as a client to synchronize time with the time source and
as a server to provide the time service for the router close to base stations.
A device configured with the server-and-client mode is called a T-BC, which
involves two important concepts:
● master-only vport: The master-only vport on a T-BC is always in the master
state and outputs time source information to the downstream device. It is
usually used on an NE where multiple rings intersect. The master-only vport
outputs time information to the lower-layer network. It can also be used on
an NE connected to base stations to provide time information for base
stations.
● vport: The status of the vport on a T-BC is not fixed. It is usually used on an
NE where multiple rings intersect. The NE uses the vport BMCA algorithm to
implement ring network protection.
Terms
Term Definition
Term Definition
ITU-T G. G.8275.2 defines the main protocols of 1588 ATR. Therefore, G.8275.2
8275.2 usually refers to the 1588 ATR feature.
Definition
1588 Adaptive Time Recovery (1588 ATR) is an adaptive time recovery algorithm
based on PTP. It establishes clock links between routers by sending Layer 3 unicast
packets. Then, PTP packets are exchanged to achieve time synchronization over a
third-party network between devices.
In 1588v2 time synchronization mode, devices on the entire network must support
1588v2 hop by hop. 1588 ATR can be used to implement time synchronization
across devices that do not support 1588v2.
1588 ATR involves the server and client. The server provides 1588 ATR time
synchronization for the client, and the client synchronizes with the server.
When the time server (such as the SSU2000) supports only the 1588v2 unicast
negotiation mode, the client sends a negotiation request to the server, and the
server sends time synchronization packets to the client after the negotiation is
established. The client is configured with the 1588 ATR hop-by-hop mode and
interconnected with the time server to achieve time synchronization in 1588v2
unicast negotiation mode. After that, the client can function as a BC to provide
time synchronization for downstream gNodeBs.
Feature Requirements
Routers support the 1588 ATR server function NetEngin NetEngine 8000
and comply with G.8275.2. Network e 8000 M M14/NetEngine
deployment has the following limitations: 8000 M14K/
1. The upstream and downstream paths NetEngine 8000
between the server and client are the same, M4/NetEngine
and the path between the server and client is 8000 M8/
unique. NetEngine 8000
M8K/NetEngine
2. A maximum of three microwave hops (four 8000E M14/
devices) or three L2 switches can be deployed NetEngine 8000E
on the intermediate network. Routers cannot M8
be traversed.
3. The server and client exchange PTP packets.
PTP packets can be Layer 3 IP packets or
packets with a single VLAN tag, but cannot
carry Layer 2 VLAN tags or MPLS tags.
4. The outbound interface for PTP packets on
the server must support the 1588 TC mode.
5. Measures and compensates for the static
asymmetry of the upstream and downstream
delays of the master and slave 1588 packets.
6. If LAG is configured on the transit network,
the optical fibers of LAG member links must be
of the same length. The asymmetric delay is a
fixed value regardless of the change.
7. PTP packets have the highest priority. The
transit network identifies the priority of PTP
packets and schedules them.
The time synchronization performance cannot
be met.
Pre-configuration Tasks
Before configuring 1588 ATR time synchronization, complete the following tasks:
Context
ATR, which is an adaptive clock recovery technology, allows a 1588 ATR client to
exchange 1588v2 packets with a clock server on a link where a 1588v2-incapable
device resides. After receiving 1588v2 packets, the client uses clock information
carried in the packets to restore clock information.
Procedure
Step 1 Run system-view
The 1588 ATR clock working mode of the router is set to client.
The 1588 ATR device is configured to totally comply with ITU-T G.8275.2.
After the ptp-adaptive time profile command is run, the default domain value
changes to 44. The domain value range changes to 44–63.
The ptp-adaptive atr hop-by-hop command is used when the time server
supports only the 1588v2 ATR unicast negotiation mode.
NOTE
The client and server, which exchange 1588 ATR packets for clock synchronization, must be
in one 1588 ATR clock domain.
----End
a 1588 ATR client and use PTP packets to implement time synchronization over a
third-party network.
Context
NOTE
If the router only functions as a client in 1588 ATR client hop-by-hop mode, configuration on
the server side is not involved.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp-adaptive enable
1588 ATR is enabled on the device.
Step 3 Run ptp-adaptive device-type server
The router is configured to function as a 1588 ATR server.
Step 4 Run ptp-adaptive time profile
The 1588 ATR device is configured to support ITU-T G.8275.2.
After the ptp-adaptive time profile command is run, the default value of the
clock domain changes to 44, and the value range changes to 44 to 63.
Step 5 (Optional) Run ptp-adaptive domain domain-value
A 1588 ATR domain is configured for the device.
NOTE
The 1588 ATR client and server must be in the same clock domain.
3. Run commit
The configuration is committed.
4. Run quit
The system view is displayed.
----End
Context
This section describes the configuration of unicast negotiation parameters on a
1588 ATR server only. For details about how to configure unicast negotiation
parameters on a 1588 ATR client, see the configuration manual.
Procedure
Step 1 Run system-view
----End
Context
The system preferentially uses hop-by-hop 1588v2 time synchronization in In-situ
Flow Information Telemetry (IFIT) delay measurement scenarios. Hop-by-hop
1588v2 time synchronization requires that all devices on the network support
1588v2 in order to achieve delay measurement in the sub-microsecond range. If
some devices on the network do not support 1588v2, you can enable lightweight
and sub-millisecond-level time synchronization on downstream devices to achieve
delay measurement in the sub-millisecond range.
NOTE
This command does not need to be configured in non-IFIT scenarios. Otherwise, the time
synchronization precision is affected.
Lightweight clocks cannot be used in mobile backhaul scenarios, and the clock
synchronization precision cannot meet the performance requirements of base stations.
After lightweight time synchronization is enabled, reported PTSF alarms are cleared, and
new PTSF alarms cannot be reported.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp lite-sync sub-ms enable
Lightweight time synchronization is enabled.
Step 3 Run commit
The configuration is committed.
----End
Context
To achieve time synchronization across the VPN, the device needs to serve as both
a client to synchronize time with the time source and a server to provide time
services for the router close to the base station. The device must be configured to
work in server-and-client mode. That is, the device must function as a T-BC.
Procedure
● On both upstream and downstream devices:
a. Run system-view
The system view is displayed.
b. Run ptp enable
1588v2 is enabled on the device.
c. Run ptp device-type bc
The device type is configured as BC.
d. Run ptp clock-source atr enable
1588 ATR time source synchronization is enabled.
● On the upstream device:
a. Run system-view
The system view is displayed.
b. Run ptp-adaptive enable
The local IP address and VPN instance name used by the T-BC port to
initiate Layer 3 unicast negotiation are configured.
g. Run ptp-adaptive vport port-id remote-port-ip remote-ip-address
A list of remote clock servers for unicast negotiation with the specified
virtual port is configured.
h. Enable 1588 ATR on the inbound interface of 1588 ATR packets.
i. Run interface interface-type interface-number
The interface view is displayed.
ii. Run ptp-adaptive atr enable
1588 ATR is enabled on the interface.
iii. Run ip address address-value { mask | mask-length }
An IP address is configured for the interface. This IP address must be
the same as the vport port-ip value.
iv. Run commit
The configuration is committed.
----End
Procedure
● Run the display ptp-adaptive all command to check all configurations of the
1588 ATR module on the server or client in hop-by-hop mode.
● Run the display ptp-adaptive config command to check 1588 ATR related
configurations on the server or client in hop-by-hop mode.
● Run the display ptp-adaptive client [ client-id ] command to check detailed
information and packet statistics about the client from which the 1588 ATR
server receives a negotiation request.
● Run the display ptp-adaptive master-only-vport [ mvport-id ] command to
check configurations of the master-only-vport on the T-BC as well as the
information about the connected client.
● Run the display ptp-adaptive vport [ vport-id ] command to check
configurations of the vport on the T-BC as well as the status information.
----End
Usage Scenario
You can run the reset command to clear statistics about the configured 1588 ATR
function.
Pre-configuration Tasks
The 1588 ATR function has been configured.
Context
NOTICE
Statistics cannot be restored after being cleared. Exercise caution when running
the reset ptp-adaptive statistics command.
After you confirm the statistics need to be cleared, run the following command in
the user view.
Procedure
Step 1 Run reset ptp-adaptive statistics
1588 ATR statistics are cleared.
----End
Networking Requirements
On the IP RAN shown in Figure 1-99, time synchronization needs to be performed
between gNodeBs, but the third-party network (such as a microwave or switch
network) does not support 1588v2. In this case, 1588 ATR can be configured to
allow time synchronization over the third-party network. NetEngine 8100 M,
NetEngine 8000E M, NetEngine 8000 Ms enabled with 1588 ATR can function as a
BC to synchronize time information with upstream devices and as a 1588 ATR
server to synchronize time information with gNodeBs.
Server1 and Server2 are the master and slave clock servers. A client initiates Layer
3 unicast negotiation requests to both Server1 and Server2 using 1588 ATR
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure unicast negotiation on a 1588 ATR client.
2. Configure unicast negotiation on Server1 and Server2.
Data Preparation
To complete the configuration, you need the following data:
● Local server's IP address
● 1588 ATR domain where the servers reside
● Outbound interface for transmitting 1588 ATR packets
● DSCP priority value of 1588 ATR packets
Procedure
Step 1 Configure unicast negotiation on a 1588 ATR client.
For details about how to configure unicast negotiation on a client, see the related
configuration guide.
Step 2 Configure unicast negotiation on Server1 and Server2.
● Configure Server1 as the server.
<Server1> system-view
[~Server1] interface loopback 0
[*Server1-Loopback0] ip address 1.1.1.1 32
[*Server1-Loopback0] commit
[~Server1-Loopback0] quit
[*Server1] ptp-adaptive enable
[*Server1] ptp-adaptive device-type server
Client info
ID Ip Address Clock ID Mode Announce Sync Delay_resp
-------------------------------------------------------------------------------
0 0 3.3.3.3 2cab00fffec65e58 two-way 1 -7 -7
1 1 4.4.4.4 286ed4fffebcdc76 two-way 1 -7 -7
# View 1588 ATR related configurations on the servers. The following example
uses the command output on Server1.
<Server1> display ptp-adaptive config
Device config info
-------------------------------------------------------------------------------
Ptp adaptive state :enable Device type :server
Sync mode :time Current state :master
Packet dscp :60 Domain value :45
Local ip :1.1.1.1 Server board :5
Profile :time
VPN :none
----End
Configuration Files
● Server1 configuration file
#
sysname Server1
#
ptp-adaptive enable
ptp-adaptive device-type server
ptp-adaptive time profile
ptp-adaptive domain 45
ptp-adaptive dscp 60
ptp-adaptive local-ip 1.1.1.1
ptp-adaptive atr unicast-negotiate enable
#
interface gigabitethernet 0/1/0
ptp-adaptive atr enable
#
interface LoopBack0
ip address 1.1.1.1 255.255.255.255
#
return
Networking Requirements
On the IP RAN shown in Figure 1-100, the time server SSU2000 supports only the
1588v2 unicast negotiation mode. To allow the NetEngine 8100 M, NetEngine
8000E M, NetEngine 8000 M to directly connect to the time server, configure the
1588 ATR hop-by-hop mode on the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M to achieve time synchronization in 1588v2 unicast negotiation
mode.
Configuration Roadmap
NOTE
This section describes the configurations only in 1588 ATR client hop-by-hop mode. In
Figure 1-100, BCs perform time synchronization using 1588v2. For detailed configuration,
see 1.1.8.2 1588v2 Configuration.
1. Configure the hop-by-hop mode and enable the unicast negotiation function
on the 1588 ATR client.
2. Configure the unicast negotiation function on the time server. This step can
be skipped if the time server is not a Huawei device.
3. Verify the configuration.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure the hop-by-hop mode and enable the unicast negotiation function on
the 1588 ATR client.
<HUAWEI> system-view
[~HUAWEI] interface loopback 0
[*HUAWEI-Loopback0] ip address 2.2.2.2 32
[*HUAWEI-Loopback0] commit
[~HUAWEI-Loopback0] quit
[*HUAWEI] ptp enable
[*HUAWEI] ptp device-type bc
[*HUAWEI] ptp-adaptive enable
[*HUAWEI] ptp-adaptive device-type client
[*HUAWEI] ptp-adaptive time profile
[*HUAWEI] ptp-adaptive atr hop-by-hop
[*~HUAWEI] ptp-adaptive dscp 60
[*HUAWEI] ptp-adaptive local-ip 2.2.2.2
[*HUAWEI] ptp-adaptive remote-server1-ip 1.1.1.1
[*HUAWEI] clock source ptp synchronization enable
[*HUAWEI] clock source ptp priority 5
[*HUAWEI] ptp-adaptive atr unicast-negotiate enable
[*HUAWEI] ptp clock-source atr enable
[*HUAWEI] commit
[~HUAWEI] interface gigabitethernet 0/2/1
[~HUAWEI-GigabitEthernet0/2/1] ip address 10.1.1.1 255.255.255.0
[~HUAWEI-GigabitEthernet0/2/1] ptp-adaptive atr enable
[*HUAWEI-GigabitEthernet0/2/1] commit
[~HUAWEI-GigabitEthernet0/2/1] quit
Step 2 Configure the unicast negotiation function on the time server. This step can be
skipped if the time server is not a Huawei device.
Step 3 Verify the configuration.
# Display all configurations of the 1588 ATR client.
<HUAWEI> display ptp-adaptive all
Device config info
------------------------------------------------------------------------------
Ptp adaptive state :enable Device type :client
Sync mode :time Current state :slave
Packet dscp :60 Domain value :44
Announce interval :10 Announce duration :300s
Sync interval :3 Sync duration :300s
Delay_resp interval :3 Delay_resp duration:300s
Announce receipt timeout:3 One-way or two-way :two-
way
Local ip :2.2.2.2 Profile :time
Client board :5 Hop_by_hop mode :yes
VPN :none
# Display the configurations associated with the 1588 ATR client function.
<HUAWEI> display ptp-adaptive config
Device config info
------------------------------------------------------------------------------
Ptp adaptive state :enable Device type :client
Sync mode :time Current state :slave
Packet dscp :60 Domain value :44
Announce interval :10 Announce duration :300s
Sync interval :3 Sync duration :300s
Delay_resp interval :3 Delay_resp duration:300s
Announce receipt timeout:3 One-way or two-way :two-way
Local ip :2.2.2.2 Profile :time
Client board :5 Hop_by_hop mode :yes
VPN :none
------------------------------------------------------------------------------
Ip address Asymmetry(ns)
Server1: 1.1.1.1 --
# Display detailed information and packet statistics of the 1588 ATR client.
<HUAWEI> display ptp-adaptive client 0
Client id :0 IP address :2.2.2.2
Clock id :2cab00fffec65e58 Mode :two-way
Announce interval :1 Announce duration :300s
Sync interval :-7 Sync duration :300s
Delay_resp interval :-7 Delay_resp duration :300s
----End
Configuration Files
#
ptp-adaptive enable
ptp-adaptive time profile
ptp-adaptive device-type client
ptp-adaptive atr hop-by-hop
ptp-adaptive dscp 60
ptp-adaptive local-ip 2.2.2.2
ptp-adaptive atr unicast-negotiate enable
ptp-adaptive remote-server1-ip 1.1.1.1
ptp enable
ptp device-type bc
Networking Requirements
On the network shown in Figure 1-101, the NetEngine 8100 M, NetEngine 8000E
M, NetEngine 8000 M can be directly connected to a time server and be
configured to work in 1588 ATR server-and-client mode. The T-BC can be
connected to a base station or a hierarchical node to output time signals to the
downstream device. Some NEs on the intermediate microwave network do not
support clock synchronization, but network devices can properly communicate
with each other.
Configuration Roadmap
The configuration roadmap is as follows:
Enable 1588v2 on a device, set the device type to BC, and enable 1588 ATR time
synchronization.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure 1588v2 and enable 1588 ATR time synchronization on both upstream
and downstream devices.
<HUAWEI> system-view
[~HUAWEI] ptp enable
[*HUAWEI] ptp device-type bc
[*HUAWEI] ptp clock-source atr enable
[*HUAWEI] commit
# Enable 1588 ATR and set the server-and-client mode on T-BC2. The
configuration of T-BCs is similar to that of T-BC1.
Step 3 Configure the master-only-vport information on T-BC1.
[~T-BC1] ip vpn-instance vpn1
[*T-BC1-vpn-instance-vpn1] commit
[~T-BC1-vpn-instance-vpn1] quit
[~T-BC1] ptp-adaptive master-only-vport 1 port-ip 10.1.1.2 vpn-instance vpn1
[*T-BC1] commit
Step 4 Configure the vport of T-BC2 and the list of remote clock servers.
[~T-BC2] ip vpn-instance vpn1
[*T-BC2-vpn-instance-vpn1] commit
[~T-BC2-vpn-instance-vpn1] quit
[~T-BC2] ptp-adaptive vport 1 port-ip 10.1.1.1 vpn-instance vpn1
[*T-BC2] ptp-adaptive vport 1 remote-port-ip 10.1.1.2
[*T-BC2] commit
Step 5 Enable ATR on an interface and configure a local IP address for the interface.
# Configure T-BC1.
[~T-BC1] interface gigabitethernet 0/2/1
[*T-BC1-GigabitEthernet0/2/1] ptp-adaptive atr enable
[*T-BC1-GigabitEthernet0/2/1] ip binding vpn-instance vpn1
[*T-BC1-GigabitEthernet0/2/1] ip address 10.1.1.2 24
[*T-BC1-GigabitEthernet0/2/1] commit
[~T-BC1-GigabitEthernet0/2/1] quit
# Configure T-BC2.
[~T-BC2] interface gigabitethernet 0/2/1
[*T-BC2-GigabitEthernet0/2/1] ptp-adaptive atr enable
[*T-BC2-GigabitEthernet0/2/1] ip binding vpn-instance vpn1
[*T-BC2-GigabitEthernet0/2/1] ip address 10.1.1.1 24
[*T-BC2-GigabitEthernet0/2/1] commit
[~T-BC2-GigabitEthernet0/2/1] quit
Vport list
------------------------------------------------------------------------------
ID Port state Negotiate state
Master-only-vport list
------------------------------------------------------------------------------
ID Ip Address VPN Client number
1 10.1.1.2 vpn1 1
Vport list
------------------------------------------------------------------------------
ID Port state Negotiate state
1 slave Nego success
----End
Configuration Files
T-BC1 configuration file
#
sysname T-BC1
#
ptp-adaptive enable
ptp-adaptive time profile
ptp-adaptive device-type server-and-client
ptp-adaptive atr unicast-negotiate enable
ptp-adaptive master-only-vport 1 port-ip 10.1.1.2
#
ptp enable
ptp device-type bc
Background
As the commercialization of LTE-TDD and LTE-A accelerates, there is a growing
need for time synchronization on base stations. Traditionally, the GPS and PTP
solutions were used on base stations to implement time synchronization.
The GPS solution requires GPS antenna to be deployed on each base station,
leading to high TCO. The PTP solution requires 1588v2 support on network-wide
devices, resulting in huge costs on network reconstruction for network carriers.
Furthermore, GPS antenna can properly receive data from GPS satellites only
when they are placed outdoor and meet installation angle requirements. When it
comes to indoor deployment, long feeders are in place to penetrate walls, and site
selection requires heavy consideration due to high-demanding lightning
protection. These disadvantages lead to high TCO and make GPS antenna
deployment challenging on indoor devices. Another weakness is that most indoor
equipment rooms are leased, which places strict requirements for coaxial cables
penetrating walls and complex application procedure. For example, taking security
factors into consideration, the laws and regulations in Japan specify that radio
frequency (RF) cables are not allowed to be deployed in rooms by penetrating
walls.
To address the preceding challenges, the Atom GPS timing system is introduced to
NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 Ms. Specifically, an Atom
GPS module which is comparable to a lightweight BITS device is inserted to an
NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M to provide GPS access
to the bearer network. Upon receipt of GPS clock signals, the Atom GPS module
converts them into SyncE signals and then sends the SyncE signals to NetEngine
8100 M, NetEngine 8000E M, NetEngine 8000 Ms. Upon receipt of GPS time
signals, the Atom GPS module converts them into 1588v2 signals and then sends
the 1588v2 signals to base stations. This mechanism greatly reduces the TCO for
carriers.
Benefits
This feature offers the following benefits to carriers:
● For newly created time synchronization networks, the Atom GPS timing
system reduces the deployment costs by 80% compared to traditional time
synchronization solutions.
● For the expanded time synchronization networks, the Atom GPS timing
system can reuse the legacy network to protect investment.
Modules
The Atom GPS timing system includes two types of modules: Atom GPS modules
and clock/time processing modules on routers.
Related Modules
Atom GPS timing involves two modules: Atom GPS timing module an clock/time
processing module on the router.
Implementation Principles
Terms
Term Definition
Term Definition
Context
NOTE
● When an Atom GPS module is horizontally inserted into a board, no other optical
modules can be inserted into the interfaces that are horizontally in parallel to the
Atom GPS module. When an Atom GPS module is vertically inserted into a board, no
other optical modules can be inserted into the interfaces that are vertically in parallel
to the Atom GPS module.
Background
As the commercialization of LTE-TDD and LTE-A accelerates, there is a growing
need for time synchronization on base stations. Traditionally, the GPS and PTP
solutions were used on base stations to implement time synchronization.
The GPS solution requires GPS antenna to be deployed on each base station,
leading to high TCO. The PTP solution requires 1588v2 support on network-wide
devices, resulting in huge costs on network reconstruction for network carriers.
Furthermore, GPS antenna can properly receive data from GPS satellites only
when they are placed outdoor and meet installation angle requirements. When it
comes to indoor deployment, long feeders are in place to penetrate walls, and site
selection requires heavy consideration due to high-demanding lightning
protection. These disadvantages lead to high TCO and make GPS antenna
deployment challenging on indoor devices. Another weakness is that most indoor
equipment rooms are leased, which places strict requirements for coaxial cables
penetrating walls and complex application procedure. For example, taking security
factors into consideration, the laws and regulations in Japan specify that radio
frequency (RF) cables are not allowed to be deployed in rooms by penetrating
walls.
To address the preceding challenges, the Atom GPS timing system is introduced to
NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 Ms. Specifically, an Atom
GPS module which is comparable to a lightweight BITS device is inserted to an
NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M to provide GPS access
to the bearer network. Upon receipt of GPS clock signals, the Atom GPS module
converts them into SyncE signals and then sends the SyncE signals to NetEngine
8100 M, NetEngine 8000E M, NetEngine 8000 Ms. Upon receipt of GPS time
signals, the Atom GPS module converts them into 1588v2 signals and then sends
the 1588v2 signals to base stations. This mechanism greatly reduces the TCO for
carriers.
Feature Requirements
The ATOM GPS 1.0/2.0/3.0 module can only be NetEngin NetEngine 8000
inserted into a GE optical interface. e 8000 M M14/NetEngine
When a GE optical interface that has an Atom 8000 M14K/
GPS module installed is replaced with a NetEngine 8000
common optical module, the Atom GPS timing M4/NetEngine
configuration on the GE optical interface is 8000 M8/
cleared. NetEngine 8000
M8K/NetEngine
Time synchronization is affected. 8000E M14/
This restriction requires that the device must NetEngine 8000E
have GE optical interfaces. M8
Usage Scenario
On the IP RAN shown in Figure 1-104, clock synchronization needs to be achieved
between NodeBs. The Atom GPS timing solution can be deployed as follows to
allow clock synchronization: Insert an Atom GPS module into an ASG so that the
Atom GPS module can synchronize clock signals with the GPS and the ASG can
synchronize clock signals with the Atom GPS module. Then, configure the SyncE
function to allow transmission of clock signals to downstream devices and then to
NodeBs. In this manner, network-wide clock synchronization is achieved.
Pre-configuration Tasks
Before configuring the SyncE function, complete the following task:
● Configure the Atom GPS module to properly process GPS clock signals.
Context
NOTE
The SyncE function is enabled on an Atom GPS module by default, with no need for
manual configuration.
Configuring the SyncE Function on the Device Where an Atom GPS Module Houses
To achieve network-wide clock synchronization, the SyncE function needs to be
configured on a device where the Atom GPS module houses so that clock signals
can be transmitted to downstream devices.
Context
Perform the following steps on the device equipped with an AE 905S module:
Procedure
Step 1 Run system-view
The system view is displayed.
NOTE
After SSM control is enabled, to use the enhanced SSM level as the information for clock
source selection, run the clock enhanced-ssm-control {on | off} command to enable
enhanced SSM. For details, see the page Enhanced SSM.
----End
Context
After configuring the SyncE function of the Atom GPS timing system, check the
configurations.
Procedure
● Run the display clock { config | source } command to check clock
synchronization configurations and clock source configurations.
● Run the display smart-clock interface interface-type interface-number
command to check information about the Atom GPS module on a specified
interface.
----End
Usage Scenario
On the IP RAN shown in Figure 1-105, time synchronization needs to be
performed between gNodeBs. The Atom GPS timing solution can be deployed as
follows to allow time synchronization: Insert an Atom GPS module into an ASG so
that the Atom GPS module can synchronize clock signals with the GPS and the
ASG can synchronize clock signals with the Atom GPS module. Then, configure the
time synchronization function to allow transmission of clock signals to other
devices on the bearer network. In this manner, network-wide clock synchronization
is achieved.
Pre-configuration Tasks
Before configuring the time synchronization function, complete the following
tasks:
Context
NOTE
The attributes that can be configured on an Atom GPS module are the clock domain and
priority1 and priority2 of the time source.
● The class of a clock source cannot be specified. The initial class 248 is used by default when
a clock source goes online. After the clock source successfully traces GPS signals, its class
changes to 6 (a device using a class-6 clock source cannot be the secondary devices of other
clocks in the clock domain). After the clock source loses track of GPS signals, its class
changes to 248 again.
● The accuracy of a clock source cannot be specified. The initial value 0xFE is used by default
when a clock source goes online. After the clock source successfully traces GPS signals, its
accuracy changes to 0x21 (specific to 100 ns). After the clock source loses track of GPS
signals, its class changes to 0xFE again.
● The stability of a clock source cannot be configured. The value is 0xFFFF (if T-GM is not
connected to ePRTC).
Perform the following operations on the router where the Atom GPS module
houses:
Procedure
Step 1 Run system-view
----End
Context
Perform the following steps on the BC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp enable
1588v2 is enabled.
Step 3 Run ptp device-type bc
The device type is set to BC.
Step 4 (Optional) Run ptp domain domain-value
A clock domain is configured.
NOTE
Devices in the same clock domain can exchange 1588v2 packets to synchronize time signal.
NOTE
----End
Context
Perform the following operations on the T-BC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp enable
PTP is enabled.
Step 3 Run ptp profile g-8275-1 enable
G.8275.1 is enabled.
Step 4 Run ptp device-type t-bc
The device type is set to T-BC.
Step 5 (Optional) Run ptp domain domain-value
The domain where the device resides is configured.
NOTE
Devices in the same clock domain can exchange G.8275.1 packets to synchronize time
signals.
The asymmetric correction time for sending G.8275.1 packets on the interface is
set.
----End
Context
After configuring the SyncE function of the Atom GPS timing system, check the
configurations.
Procedure
● Run the display ptp all [ state | config ] command to check the time
synchronization status and configurations of the involved device.
● Run the display ptp interface interface-type interface-number command to
check the time synchronization information about the specified interface.
● Run the display smart-clock interface interface-type interface-number
command to check information about the Atom GPS module on the specified
interface.
----End
Context
Perform the following operations on the router where the Atom GPS module
houses:
Procedure
Step 1 Run system-view
----End
Context
After self-healing is enabled on an Atom GPS module, the Atom GPS module is
automatically reset, and the SyncE and 1588v2 functions are disabled from the
involved interface. After the WTR timer is expired, the SyncE and 1588v2 functions
are re-enabled, and services are restored. If self-healing is not enabled, the
involved device remains abnormal and waits for user processing.
Perform the following operations on the router where the Atom GPS module
houses:
Procedure
Step 1 Run system-view
----End
Networking Requirements
On the IP RAN shown in Figure 1-106, the Atom GPS timing solution can be
deployed to implement clock synchronization and time synchronization between
gNodeBs. Based on the Atom GPS timing solution, an Atom GPS module, which is
comparable to a lightweight BITS source, is inserted to an ASG to provide GPS
access for the bearer network. The Atom GPS module can receive clock and time
signals from the GPS satellite and then convert these signals before sending them
to the ASG. The clock signals are converted to SyncE signals and the time signals
to 1588v2 signals. The ASG then transmits converted signals to gNodeBs through
downstream devices. In this manner, network-wide clock synchronization and time
synchronization are achieved.
Configuration Roadmap
NOTE
This section describes Atom GPS timing configuration only on ASGs. For details about how
to configure SyncE to implement clock synchronization for downstream devices of ASGs, see
Clock Synchronization Configuration. For details about how to configure 1588v2 to
implement time synchronization for downstream devices of ASGs, see 1.1.8.2 1588v2
Configuration.
1. Configure SyncE.
2. Configure time synchronization.
Data Preparation
To complete the configuration, you need the following data:
● Information about the optical interface to which the Atom GPS module is
inserted
● Priority of the clock source
● Clock domain
● Interface delay measurement mechanism
Procedure
Step 1 Configure SyncE on ASG1 and ASG2.
ASG1 configuration is similar to ASG2 configuration. ASG1 configuration is used as
an example.
1. Configure SyncE on the Atom GPS module.
NOTE
The SyncE function has been enabled on the Atom GPS module by default, with no
need for manual configuration.
2. Configure SyncE on ASG1 where the Atom GPS module houses.
# Configure clock source selection based on SSM levels.
<ASG1> system-view
[~ASG1] clock ssm-control on
[*ASG1] commit
# Enable SyncE and configure priorities for interfaces.
[~ASG1] interface gigabitethernet 0/1/0
[~ASG1-GigabitEthernet0/1/0] clock synchronization enable
[*ASG1-GigabitEthernet0/1/0] clock priority 1
[*ASG1-GigabitEthernet0/1/0] commit
[~ASG1-GigabitEthernet0/1/0] quit
Master board
Source Pri(sys/2m-1) In-SSM Out-SSM State Ref
--------------------------------------------------------------------------
bits0/ 1/--- sec dnu normal yes
GE0/1/0 2/--- sec sec normal yes
GE0/2/0 3/--- sec sec normal yes
Run the display ptp all command to check whether BITS information has been
successfully input.
<HUAWEI> display ptp all
Device config info
------------------------------------------------------------------------------
PTP state :enabled Domain value :0
Slave only :no Device type :BC
Set port state :no Local clock ID :0aa1c6fffe699700
Acl :no Virtual clock ID :no
Acr :no Time lock success :no
Asymmetry measure :disable Passive measure :disable
Port info
Name State Delay-mech Ann-timeout Type Domain
------------------------------------------------------------------------------
GigabitEthernet0/1/0 slave delay 3 BC 0
----End
Configuration Files
● ASG1 configuration file
#
sysname ASG1
#
clock ssm-control on
#
ptp enable
ptp device-type bc
ptp domain 255
#
interface gigabitEthernet 0/1/0
clock synchronization enable
clock priority 1
smart-clock ptp domain 255
ptp enable
ptp delay-mechanism delay
#
#
return
● ASG2 configuration file
#
sysname ASG2
#
clock ssm-control on
#
ptp enable
ptp device-type bc
ptp domain 255
#
interface gigabitEthernet 0/1/0
clock synchronization enable
clock priority 1
smart-clock ptp domain 255
ptp enable
ptp delay-mechanism delay
#
#
return
of base stations. Two time synchronization solutions are commonly used: one
solution is to directly connect base stations to the Global Positioning System (GPS)
and the other solution is to obtain the Precision Time Protocol (PTP) time from
the network.
If base stations connect directly to the GPS, each base station must pay GPS
deployment costs. Consequently, the total cost of ownership (TCO) increases as
the number of base stations increases. If base stations obtain PTP time from the
network, the entire network must support PTP time synchronization, which results
in high network-wide reconstruction costs.
Using the GPS solution also has additional limitations. For example, the GPS
antenna must be installed outdoors and positioned to receive signals from GPS
satellites. As a result, long feeders must be used to connect to devices that are
deployed indoors, and holes must be drilled through walls in order to route these
feeders indoors. In addition, requirements such as lightning protection must be
considered when selecting antenna sites. These limitations make it difficult and
costly to deploy GPS antennas for indoor devices. Furthermore, rented indoor
equipment rooms may have restrictions in place that prevent or strictly control
through-wall installation of cables, and obtaining permissions for such installation
may be complex. For example, in Japan, it is illegal to connect radio frequency
(RF) cables (such as GPS cables) from outdoor to indoor due to security concerns.
The Atom GPS 3.0 timing system has been developed to overcome the problems.
The Atom GPS 3.0 module can be installed in a device to function as a lightweight
BITS source capable of providing GPS access for the transport network. The Atom
GPS 3.0 module can receive clock and time signals from the GPS. The clock and
time signals are converted into SyncE and 1588v2 signals, respectively, and then
output to the device where the module resides. PTP is used to synchronize the
time to all base stations on the network. This significantly reduces the TCO of
time synchronization for carriers.
Benefits
Atom GPS 3.0 timing offers the following benefits to carriers:
● For a new time synchronization network, Atom GPS 3.0 timing reduces the
overall deployment cost by 80% compared with the traditional solution.
● For capacity expansion of existing networks that support time
synchronization, Atom GPS 3.0 timing reuses existing network resources,
protecting the initial investment of carriers.
Module Overview
The Atom GPS 3.0 timing feature involves two modules: Atom GPS 3.0 timing
module and the built-in clock/time processing module.
Implementation Fundamentals
The Atom GPS 3.0 timing feature provides two major service functions:
● Service function 1: The Atom GPS 3.0 module functions as the SyncE clock
source to implement clock synchronization for devices.
● Service function 2: The Atom GPS 3.0 module functions as the PTP time
source to implement time synchronization for devices.
The Atom GPS 3.0 timing networking shown in Figure 1-108 supports the
following synchronization solutions:
● Atom GPS 3.0 timing solution 1: SyncE frequency synchronization + Atom
GPS 3.0 time synchronization
Terms
Term Definition
Context
NOTE
If base stations connect directly to the GPS, each base station must pay GPS
deployment costs. Consequently, the total cost of ownership (TCO) increases as
the number of base stations increases. If base stations obtain PTP time from the
network, the entire network must support PTP time synchronization, which results
in high network-wide reconstruction costs.
Using the GPS solution also has additional limitations. For example, the GPS
antenna must be installed outdoors and positioned to receive signals from GPS
satellites. As a result, long feeders must be used to connect to devices that are
deployed indoors, and holes must be drilled through walls in order to route these
feeders indoors. In addition, requirements such as lightning protection must be
considered when selecting antenna sites. These limitations make it difficult and
costly to deploy GPS antennas for indoor devices. Furthermore, rented indoor
equipment rooms may have restrictions in place that prevent or strictly control
through-wall installation of cables, and obtaining permissions for such installation
may be complex. For example, in Japan, it is illegal to connect radio frequency
(RF) cables (such as GPS cables) from outdoor to indoor due to security concerns.
The Atom GPS 3.0 timing system has been developed to overcome the problems.
The Atom GPS 3.0 module can be installed in a device to function as a lightweight
BITS source capable of providing GPS access for the transport network. The Atom
GPS 3.0 module can receive clock and time signals from the GPS. The clock and
time signals are converted into SyncE and 1588v2 signals, respectively, and then
output to the device where the module resides. PTP is used to synchronize the
time to all base stations on the network. This significantly reduces the TCO of
time synchronization for carriers.
NOTE
● After the Atom GPS 3.0 module is inserted into a device interface, the interface can be
configured with only the clock feature, rather than other services.
● You can run the port-mode 1ge command to switch a 10GE interface to a 1GE interface
only when the involved interface and the MAC and PHY of the subcard support mode
switching.
Feature Requirements
None
Context
On the IP RAN shown in Figure 1-109, clock synchronization needs to be
performed between NodeBs. In this case, you can deploy the Atom GPS 3.0 timing
solution as follows: Insert the Atom GPS 3.0 module into the access aggregation
node ASG. The Atom GPS 3.0 module synchronizes clock signals from the GPS, and
the ASG synchronizes clock signals from the Atom GPS 3.0 module. You can
deploy the SyncE function so that clock signals are transmitted to downstream
devices, which then transmit the clock signals to NodeBs, achieving network-wide
clock synchronization.
Pre-configuration Tasks
Before configuring the SyncE function, you have completed the following task:
● Configure the Atom GPS 3.0 module to properly receive clock signals from the
GPS.
Context
NOTE
The SyncE function has been enabled on the Atom GPS 3.0 module by default, requiring no
manual configuration.
Configuring the SyncE Function on the Device Where the Atom GPS 3.0 Module
Resides
After the device where the Atom GPS 3.0 module resides synchronizes clock
information from the Atom GPS 3.0 module, the device needs to transmit clock
signals to downstream devices in order to achieve network-wide clock
synchronization. Therefore, the SyncE function needs to be configured on the
device.
Procedure
Step 1 Run the system-view command to enter the system view.
Step 3 Run the clock synchronization enable command to enable clock synchronization
on the interface.
Step 4 Run the clock priority priority-value command to configure a clock source priority
for the interface.
Step 5 Run the quit command to exit the interface view and enter the system view.
Step 6 (Optional) Run the clock ssm-control { on | off } command to enable or disable
SSM control.
NOTE
After SSM control is enabled, if you want to use the enhanced SSM quality level as the
clock source control information, you can run the clock enhanced-ssm-control { on | off }
command to enable the enhanced SSM function. For details, see Enhanced SSM.
Step 7 (Optional) Run the clock run-mode { free | hold | normal } command to
configure a running mode for the EEC.
Step 9 (Optional) Run the clock wtr wtr-time command to configure the WTR time of a
clock source.
Step 11 (Optional) Run the clock max-out-ssm { prc | ssua | ssub | sec | prtc | eprtc |
esec | eprc } command to configure the maximum output SSM level of a clock
source.
----End
Context
After configuring the SyncE function for the Atom GPS 3.0 timing system, run the
following commands to check the configurations:
Procedure
● Run the display clock { config | source } command to check clock
synchronization and clock source configurations.
● Run the display smart-clock interface interface-type interface-number
command to check information about the Atom GPS 3.0 module on the
specified interface.
----End
Context
On the IP RAN shown in Figure 1-110, time synchronization needs to be
performed between gNodeBs. In this case, you can deploy the Atom GPS 3.0
timing solution as follows: Insert the Atom GPS 3.0 module into the access
aggregation node ASG. The Atom GPS 3.0 module synchronizes time signals from
the GPS, and the ASG synchronizes time signals from the Atom GPS 3.0 module. In
addition, the time synchronization function is deployed to transmit time signals to
other devices on the IP RAN, achieving network-wide time synchronization.
Pre-configuration Tasks
Before configuring the time synchronization function, complete the following
tasks:
● Configure physical parameters of an interface and set the physical status of
the interface to up.
● Configure the Atom GPS 3.0 module to properly receive time signals from the
GPS.
Configuring the Time Synchronization Function for the Atom GPS 3.0 Module
This section describes how to configure the time synchronization function on an
Atom GPS 3.0 module so that GPS time signals can be first transmitted to the
device where the Atom GPS 3.0 module resides and then to downstream devices.
Context
NOTE
The Atom GPS 3.0 module supports configuration of only the priority1 and priority2 attributes
of a time source. Other attributes cannot be modified on the Atom GPS 3.0 module.
● The class of a clock source cannot be configured. After the module is powered on, the initial
class 248 is used by default when no other clockClass is defined. Once the clock source
successfully traces GPS signals, its class changes to 6 (Clock devices with clockClass being 6
cannot be the slave device of another clock in this domain.) After the clock source loses
track of GPS signals, its class changes to 248 again.
● The accuracy of a clock source cannot be configured. After the module is powered on, the
initial value 0xFE is used (The time accuracy is unknown.) Once the clock source successfully
traces GPS signals, its accuracy changes to 0x21 (The time accuracy is specific to 100 ns.)
After the clock source loses track of GPS signals, its accuracy changes to 0xFE again.
● The stability of a clock source cannot be configured. The value is always 0xFFFF (The T-GM
is not connected to ePRTC.)
Procedure
Step 1 Run system-view
The feeder delay compensation value is configured for the Atom GPS 3.0 module.
The holding time is configured for the ATOM GPS 3.0 module.
The wait to restore (WTR) time is configured for the ATOM GPS3.0 module.
----End
Configuring 1588v2 on the Device Where the Atom GPS 3.0 Module Resides
After 1588v2 is enabled in the system view, you need to enable 1588v2 in the
interface view.
Procedure
Step 1 Run the system-view command to enter the system view.
Step 2 Run the ptp enable command to enable 1588v2 for the device.
Step 3 (Optional) Run the ptp virtual-clock-id clock-id-value command to configure a
virtual clock ID for the device.
Step 4 (Optional) Run the ptp asymmetry-measure enable command to enable
automatic asymmetry measurement on the 1588v2 ring network.
Step 5 (Optional) Run the ptp set-port-state enable command to enable the function to
statically specify the 1588v2 interface status on the device.
Step 6 Run the interface interface-type interface-number command to enter the
interface view.
Step 7 (Optional) Run the ptp port-state slave command to configure the interface to
work in slave state to trace external time information.
Step 8 Run the ptp enable command to enable IEEE 1588v2 on the interface.
Step 9 (Optional) Run the ptp announce-drop enable command to allow the interface
to discard Announce messages.
NOTE
Announce messages are used to establish the synchronization hierarchy of IEEE 1588v2
clocks. If an interface is configured to discard Announce messages, the device cannot use
this interface to receive clock synchronization information from other devices.
----End
Configuring G.8275.1 on the Device Where the Atom GPS 3.0 Module Resides
To ensure G.8275.1 for time synchronization, you need to globally enable G.8275.1
in the system view, set the device type to T-BC, and configure basic information
such as the domain value and virtual clock ID. After enabling G.8275.1 in the
system view, you need to enable G.8275.1 in the interface view.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp enable
PTP is enabled on the device.
Step 3 Run ptp profile g-8275-1 enable
G.8275.1 is enabled on the device.
----End
Context
After configuring the time synchronization function for the Atom GPS 3.0 timing
system, run the following commands to check the configurations:
Procedure
● Run the display ptp all [ state | config ] command to check the time
synchronization status and configurations of the involved device.
● Run the display ptp interface interface-type interface-number command to
check the time synchronization information about the specified interface.
● Run the display smart-clock interface interface-type interface-number
command to check information about the Atom GPS 3.0 module on the
specified interface.
----End
Procedure
Step 1 Run the system-view command to enter the system view.
Step 2 Run the interface interface-type interface-number command to enter the
interface view.
Step 3 Run the reset smart-clock command to reset the Atom GPS 3.0 module on the
interface.
----End
Context
After self-healing is enabled on the Atom GPS 3.0 module, the device where the
module resides automatically resets the module and disables SyncE and 1588v2
from the involved interface. After the WTR timer expires, re-enable the SyncE and
1588v2 functions on the interface to recover the device. Otherwise, the device
remains in the abnormal state and waits to be processed by users.
Perform the following steps on the device where the Atom GPS 3.0 module
resides:
Procedure
Step 1 Run the system-view command to enter the system view.
Step 2 Run the interface interface-type interface-number command to enter the
interface view.
Step 3 Run the smart-clock recovery enable command to enable self-healing for the
Atom GPS 3.0 module.
Step 4 Run the commit command to commit the configuration.
----End
Networking Requirements
On the IP RAN shown in Figure 1-111, clock synchronization and time
synchronization need to be performed between gNodeBs. In this case, you can
deploy the Atom GPS 3.0 timing solution as follows: Insert the Atom GPS 3.0
module into the access aggregation node ASG. The Atom GPS 3.0 module
functions as a lightweight BITS source to provide GPS access for the transport
network. The Atom GPS 3.0 module can receive clock and time signals from the
GPS. The clock and time signals are converted into SyncE and 1588v2 signals,
respectively, and then output to the ASG. The ASG transmits the clock/time signals
to downstream devices which then transmit the signals to gNodeBs, achieving
network-wide clock and time synchronization.
Configuration Roadmap
NOTE
This section describes only the Atom GPS 3.0 timing configuration of the ASG. For details
about how to configure the SyncE function to implement clock synchronization for
downstream devices of ASGs, see Clock Synchronization Configuration. For details about
how to configure 1588v2 to implement time synchronization for downstream devices of
ASGs, see 1.1.8.2 1588v2 Configuration.
Data Preparation
To complete the configuration, you need the following data:
Procedure
Step 1 Configure the SyncE function on ASG1 and ASG2.
NOTE
The SyncE function has been enabled on the Atom GPS 3.0 module by default, requiring no
manual configuration.
1. Configure the SyncE function on ASG1 where the Atom GPS 3.0 module
resides.
# Configure the device to automatically participate in clock source selection
based on the SSM quality level.
<ASG1> system-view
[~ASG1] clock ssm-control on
[*ASG1] commit
1. Configure the time synchronization function for the Atom GPS 3.0 module.
[~ASG1] interface gigabitethernet 0/1/0
[~ASG1-GigabitEthernet0/1/0] smart-clock cable-delay 60
[*ASG1-GigabitEthernet0/1/0] commit
[~ASG1-GigabitEthernet0/1/0] quit
2. Configure the time synchronization function on ASG1 where the Atom GPS
3.0 module resides.
# Enable 1588v2 globally.
[*ASG1] ptp enable
[*ASG1] commit
# Enable 1588v2 on the involved interface.
[~ASG1] interface gigabitethernet 0/1/0
[*ASG1-GigabitEthernet0/1/0] ptp enable
[*ASG1-GigabitEthernet0/1/0] commit
[~ASG1-GigabitEthernet0/1/0] quit
----End
Configuration Files
● ASG1 configuration file
#
sysname ASG1
#
clock ssm-control on
#
ptp enable
#
interface gigabitEthernet 0/1/0
clock synchronization enable
clock priority 1
smart-clock cable-delay 60
ptp enable
#
#
return
● ASG2 configuration file
#
sysname ASG2
#
clock ssm-control on
#
ptp enable
ptp device-type bc
ptp domain 255
#
Background
As the commercialization of LTE-TDD and LTE-A accelerates, there is a growing
need for time synchronization on base stations. Traditionally, the GNSS (GPS/
GLONASS/Beidou) and PTP solutions were used on base stations to implement
time synchronization.
The GNSS solution requires GNSS antenna to be deployed on each base station,
leading to high TCO. The PTP solution requires 1588v2 support on network-wide
devices, resulting in huge costs on network reconstruction for network carriers.
Furthermore, GNSS antenna can properly receive data from GNSS satellites only
when they are placed outdoor and meet installation angle requirements. When it
comes to indoor deployment, long feeders are in place to penetrate walls, and site
selection requires heavy consideration due to high-demanding lightning
protection. These disadvantages lead to high TCO and make GNSS antenna
deployment challenging on indoor devices. Another weakness is that most indoor
equipment rooms are leased, which places strict requirements for coaxial cables
penetrating walls and complex application procedure. For example, taking security
factors into consideration, the laws and regulations in Japan specify that radio
frequency (RF) cables are not allowed to be deployed in rooms by penetrating
walls.
To address the preceding challenges, the Atom GNSS timing system is introduced
to NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 Ms. Specifically, an
Atom GNSS module which is comparable to a lightweight BITS device is inserted
to an NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M to provide GNSS
access to the bearer network. Upon receipt of GNSS clock signals, the Atom GNSS
module converts them into SyncE signals and then sends the SyncE signals to
NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 Ms. Upon receipt of
GNSS time signals, the Atom GNSS module converts them into 1588v2 signals and
then sends the 1588v2 signals to base stations. This mechanism greatly reduces
the TCO for carriers.
Benefits
This feature offers the following benefits to carriers:
● For newly created time synchronization networks, the Atom GNSS timing
system reduces the deployment costs by 80% compared to traditional time
synchronization solutions.
● For the expanded time synchronization networks, the Atom GNSS timing
system can reuse the legacy network to protect investment.
Modules
The Atom GNSS timing system includes two types of modules: Atom GNSS
modules and clock/time processing modules on routers.
Related Modules
Atom GNSS timing involves two modules: Atom GNSS timing module and clock/
time processing module on the router.
● PTP grandmaster (GM): functions as the SyncE slave to obtain SyncE clock
data.
Implementation Principles
Terms
Term Definition
Term Definition
Context
NOTE
● The Atom GNSS module can be inserted only into a GE optical interface. If the Atom
GNSS module inserted into a GE optical interface is replaced with a common optical
module, all the configurations related to Atom GNSS timing will be deleted.
● When an Atom GNSS module is horizontally inserted into a board, no other optical
modules can be inserted into the interfaces that are horizontally in parallel to the
Atom GNSS module. When an Atom GNSS module is vertically inserted into a board,
no other optical modules can be inserted into the interfaces that are vertically in
parallel to the Atom GNSS module.
Background
As the commercialization of LTE-TDD and LTE-A accelerates, there is a growing
need for time synchronization on base stations. Traditionally, the GNSS (GPS/
GLONASS/Beidou) and PTP solutions were used on base stations to implement
time synchronization.
The GNSS solution requires GNSS antenna to be deployed on each base station,
leading to high TCO. The PTP solution requires 1588v2 support on network-wide
devices, resulting in huge costs on network reconstruction for network carriers.
Furthermore, GNSS antenna can properly receive data from GNSS satellites only
when they are placed outdoor and meet installation angle requirements. When it
comes to indoor deployment, long feeders are in place to penetrate walls, and site
selection requires heavy consideration due to high-demanding lightning
protection. These disadvantages lead to high TCO and make GNSS antenna
deployment challenging on indoor devices. Another weakness is that most indoor
equipment rooms are leased, which places strict requirements for coaxial cables
penetrating walls and complex application procedure. For example, taking security
factors into consideration, the laws and regulations in Japan specify that radio
frequency (RF) cables are not allowed to be deployed in rooms by penetrating
walls.
To address the preceding challenges, the Atom GNSS timing system is introduced
to NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 Ms. Specifically, an
Atom GNSS module which is comparable to a lightweight BITS device is inserted
to an NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M to provide GNSS
access to the bearer network. Upon receipt of GNSS clock signals, the Atom GNSS
module converts them into SyncE signals and then sends the SyncE signals to
NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 Ms. Upon receipt of
GNSS time signals, the Atom GNSS module converts them into 1588v2 signals and
then sends the 1588v2 signals to base stations. This mechanism greatly reduces
the TCO for carriers.
Feature Requirements
None
Usage Scenario
On the IP RAN shown in Figure 1-114, clock synchronization needs to be achieved
between NodeBs. The Atom GNSS timing solution can be deployed as follows to
allow clock synchronization: Insert an Atom GNSS module into an ASG so that the
Atom GNSS module can synchronize clock signals with the GNSS and the ASG can
synchronize clock signals with the Atom GNSS module. Then, configure the SyncE
function to allow transmission of clock signals to downstream devices and then to
NodeBs. In this manner, network-wide clock synchronization is achieved.
Pre-configuration Tasks
Before configuring the SyncE function, complete the following task:
● Configure the Atom GNSS module to properly process GNSS clock signals.
Context
NOTE
The SyncE function is enabled on an Atom GNSS module by default, with no need for
manual configuration.
Configuring the SyncE Function on the Device Where an Atom GNSS Module
Houses
To achieve network-wide clock synchronization, the SyncE function needs to be
configured on the device where the Atom GNSS module houses so that clock
signals can be transmitted to downstream devices.
Context
Perform the following steps on the device equipped with an Atom GNSS module:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run clock synchronization enable
Clock synchronization is enabled for the interface.
Step 4 Run clock priority priority-value
A priority is configured for the clock reference source of the interface.
Step 5 Run quit
Return to the system view.
Step 6 (Optional) Run clock ssm-control { on | off }
The device is configured whether to select a clock source based on SSM levels.
NOTE
After SSM control is enabled, to use the enhanced SSM level as the information for clock
source selection, run the clock enhanced-ssm-control {on | off} command to enable
enhanced SSM. For details, see the page Enhanced SSM.
----End
Context
After configuring the SyncE function of the Atom GNSS timing system, check the
configurations.
Procedure
● Run the display clock { config | source } command to check clock
synchronization configurations and clock source configurations.
● Run the display smart-clock interface interface-type interface-number
command to check information about the Atom GNSS module on a specified
interface.
----End
Usage Scenario
On the IP RAN shown in Figure 1-115, time synchronization needs to be
performed between NodeBs. The Atom GNSS timing solution can be deployed as
follows to allow time synchronization: Insert an Atom GNSS module into an ASG
so that the Atom GNSS module can synchronize clock signals with the GNSS and
the ASG can synchronize clock signals with the Atom GNSS module. Then,
configure the time synchronization function to allow transmission of clock signals
to other devices on the bearer network. In this manner, network-wide clock
synchronization is achieved.
Pre-configuration Tasks
Before configuring the time synchronization function, complete the following
tasks:
● Configure physical parameters of an interface and set the physical status of
the interface to Up.
● Configure the Atom GNSS module to properly process GNSS time signals.
Context
NOTE
The attributes that can be configured on an Atom GNSS module are the clock domain and
priority1 and priority2 of the time source.
● The class of a clock source cannot be specified. The initial class 248 is used by default when
a clock source goes online. After the clock source successfully traces GNSS signals, its class
changes to 6 (a device using a class-6 clock source cannot be the secondary devices of other
clocks in the clock domain). After the clock source loses track of GNSS signals, its class
changes to 248 again.
● The accuracy of a clock source cannot be specified. The initial value 0xFE is used by default
when a clock source goes online. After the clock source successfully traces GNSS signals, its
accuracy changes to 0x21 (specific to 100 ns). After the clock source loses track of GNSS
signals, its class changes to 0xFE again.
● The stability of a clock source cannot be configured. The value is 0xFFFF (if T-GM is not
connected to ePRTC).
Perform the following operations on the router where the Atom GNSS module
houses:
Procedure
Step 1 Run system-view
The mode in which the multi-mode smart clock module on a GE optical interface
works is configured.
The feeder delay compensation value for the smart clock module of a GE optical
interface is configured.
Configure the current leap second value of the multi-mode smart clock module as
well as the direction and date of the next leap second adjustment.
----End
Context
Perform the following steps on the BC.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp enable
1588v2 is enabled.
Step 3 Run ptp device-type bc
The device type is set to BC.
Step 4 (Optional) Run ptp domain domain-value
A clock domain is configured.
NOTE
Devices in the same clock domain can exchange 1588v2 packets to synchronize time signal.
NOTE
----End
Context
Perform the following operations on the T-BC:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ptp enable
PTP is enabled.
Step 3 Run ptp profile g-8275-1 enable
G.8275.1 is enabled.
NOTE
Devices in the same clock domain can exchange G.8275.1 packets to synchronize time
signals.
An alarm threshold is configured for the time offset (time difference between
the master and slave clocks) on the passive interface of a G.8275.1 device.
----End
Context
After configuring the SyncE function of the Atom GNSS timing system, check the
configurations.
Procedure
● Run the display ptp all [ state | config ] command to check the time
synchronization status and configurations of the involved device.
● Run the display ptp interface interface-type interface-number command to
check the time synchronization information about the specified interface.
● Run the display smart-clock interface interface-type interface-number
command to check information about the Atom GNSS module on the
specified interface.
----End
Context
Perform the following operations on the router where the Atom GNSS module
houses:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run reset smart-clock
The Atom GNSS module is reset.
----End
Context
After self-healing is enabled on an Atom GNSS module, the Atom GNSS module is
automatically reset, and the SyncE and 1588v2 functions are disabled from the
involved interface. After the WTR timer is expired, the SyncE and 1588v2 functions
are re-enabled, and services are restored. If self-healing is not enabled, the
involved device remains abnormal and waits for user processing.
Perform the following operations on the router where the Atom GNSS module
houses:
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run smart-clock recovery enable
Self-healing is enabled on the Atom GNSS module.
Step 4 Run commit
The configuration is committed.
----End
Networking Requirements
On the IP RAN shown in Figure 1-116, the Atom GNSS timing solution can be
deployed to implement clock synchronization and time synchronization between
gNodeBs. Based on the Atom GNSS timing solution, an Atom GNSS module, which
is comparable to a lightweight BITS source, is inserted to an ASG to provide GNSS
access for the bearer network. The Atom GNSS module can receive clock and time
signals from the GNSS satellite and then convert these signals before sending
them to the ASG. The clock signals are converted to SyncE signals and the time
signals to 1588v2 signals. The ASG then transmits converted signals to gNodeBs
through downstream devices. In this manner, network-wide clock synchronization
and time synchronization are achieved.
Configuration Roadmap
NOTE
This section describes Atom GNSS timing configuration only on ASGs. For details about how
to configure SyncE to implement clock synchronization for downstream devices of ASGs, see
Clock Synchronization Configuration. For details about how to configure 1588v2 to
implement time synchronization for downstream devices of ASGs, see 1.1.8.2 1588v2
Configuration.
1. Configure SyncE.
2. Configure time synchronization.
Data Preparation
To complete the configuration, you need the following data:
● Information about the optical interface to which the Atom GNSS module is
inserted
Procedure
Step 1 Configure SyncE on ASG1 and ASG2.
ASG1 configuration is similar to ASG2 configuration. ASG1 configuration is used as
an example.
1. Configure SyncE on the Atom GNSS module.
NOTE
The SyncE function has been enabled on the Atom GNSS module by default, with no
need for manual configuration.
2. Configure SyncE on ASG1 where the Atom GNSS module houses.
# Configure clock source selection based on SSM levels.
<ASG1> system-view
[~ASG1] clock ssm-control on
[*ASG1] commit
# Enable SyncE and configure priorities for interfaces.
[~ASG1] interface gigabitethernet 0/1/0
[~ASG1-GigabitEthernet0/1/0] clock synchronization enable
[*ASG1-GigabitEthernet0/1/0] clock priority 1
[*ASG1-GigabitEthernet0/1/0] commit
[~ASG1-GigabitEthernet0/1/0] quit
Master board
Source Pri(sys/2m-1) In-SSM Out-SSM State Ref
--------------------------------------------------------------------------
bits0/ 1/--- sec dnu normal yes
GE0/1/0 2/--- sec sec normal yes
GE0/2/0 3/--- sec sec normal yes
Run the display ptp all command to check whether BITS information has been
successfully input.
<HUAWEI> display ptp all
Device config info
------------------------------------------------------------------------------
PTP state :enabled Domain value :0
Slave only :no Device type :BC
Set port state :no Local clock ID :0aa1c6fffe699700
Acl :no Virtual clock ID :no
Acr :no Time lock success :no
Asymmetry measure :disable Passive measure :disable
Port info
Name State Delay-mech Ann-timeout Type Domain
------------------------------------------------------------------------------
GigabitEthernet0/1/0 slave delay 3 BC 0
----End
Configuration Files
● ASG1 configuration file
#
sysname ASG1
#
clock ssm-control on
#
ptp enable
ptp device-type bc
ptp domain 255
#
interface gigabitEthernet 0/1/0
clock synchronization enable
clock priority 1
smart-clock ptp domain 255
smart clock gnss-model gps glonass
smart-clock cable-delay 60
ptp enable
ptp delay-mechanism delay
#
#
return
● ASG2 configuration file
#
sysname ASG2
#
clock ssm-control on
#
ptp enable
ptp device-type bc
ptp domain 255
#
interface gigabitEthernet 0/1/0
clock synchronization enable
clock priority 1
smart-clock ptp domain 255
smart clock gnss-model gps glonass
smart-clock cable-delay 60
ptp enable
ptp delay-mechanism delay
#
#
smart clock gnss-model gps glonass smart-clock cable-delay 60
return
SNMP operates at the application layer of the IP suite and defines the
transmission of management information between the NMS and devices. SNMP
defines several device management operations that can be performed by the NMS
and allows devices to send alarms to the NMS to notify the NMS of device faults.
SNMP Components
An SNMP managed network consists of the following three components:
● NMS: sends various messages to query managed devices and receives alarms
from these devices.
● Agent: a network-management process on a managed device. An agent
provides the following functions:
– Receives and parses query messages sent from the NMS.
– Reads or writes management variables based on the query type and
generates and sends response messages to the NMS.
– Sends alarms to the NMS when an event occurs. For example, when the
system view is displayed or closed, or if the device is restarted. Protocol
modules on the device define the conditions that result in alarms.
● Managed device: managed by an NMS and generates and reports alarms to
the NMS.
Figure 1-117 shows the relationship between the NMS and agent.
MIB
To uniquely identify managed objects, SNMP organizes them in a hierarchical tree
structure and identifies each through a path originating from the tree root, as
shown in Figure 1-118. The NMS uses the MIB to identify and manage device
objects. Each node on the tree is a managed object.
You can use a standard MIB or define a MIB based on certain standards. Using a
standard MIB reduces the costs on proxy deployment, which leads to reduced costs
on the entire network management system.
SNMP Operations
SNMP uses GET and SET operations to replace a complex command set. The
operations described in Figure 1-119 can implement all functions.
Operation Function
Operation Function
Each managed object must have an agent process. The managed device can be a
common user terminal or a device with the routing function. Management
processes and agent processes use UDP to transmit SNMP messages for
communication.
1.1.15.2.3 MIB
A MIB specifies variables (MIB object identifiers or OIDs) maintained by NEs.
These variables can be queried and set in the management process. A MIB
provides a structure that contains data on all NEs that may be managed on the
network. The SNMP MIB uses a hierarchical tree structure similar to the Domain
Name System (DNS), beginning with a nameless root at the top. Figure 1-123
shows an object naming tree, one part of the MIB.
The three objects at the top of the object naming tree are: ISO, ITU-T (formerly
CCITT), and the sum of ISO and ITU-T. There are four objects under ISO. Of these,
the number 3 identifies an organization. A Department of Defense (DoD) sub-tree,
marked dod (6), is under the identified organization (3). Under dod (6) is internet
(1). If the only objects being considered are Internet objects, you may begin
drawing the sub-tree below the Internet object (the square frames in dotted lines
with shadow marks in the following diagram), and place the identifier {1.3.6.1}
next to the Internet object.
One of the objects under the Internet object is mgmt (2). The object under mgmt
(2) is mib-2 (1) (formerly renamed in the new edition MIB-II defined in 1991).
mib-2 is identified by an OID, {1.3.6.1.2.1} or {Internet(1).2.1}. This kind of
identifier is the OID.
1.1.15.2.4 SMI
Structure of Management Information (SMI) is a set of rules used to name and
define managed objects. It can define the ID, type, access level, and status of
managed objects. At present, there are two SMI versions: SMIv1 and SMIv2.
● INTEGER
● OCTER STRING
● DisplayString
● OBJECT IDENTIFIER
● NULL
● IpAddress
● PhysAddress
● Counter
● Gauge
● TimeTicks
● SEQUENCE
● SEQUENDEOF
1.1.15.2.5 Trap
A managed device sends unsolicited trap messages to notify an NMS that an
urgent and significant event has occurred on the managed device. For example,
the managed device restarts. Figure 1-124 shows the process of transmitting a
trap message.
If the trap triggering conditions defined for the agent's module are met, the agent
sends a trap message to notify the NMS that a significant event has occurred.
Network administrators can promptly handle the event.
The NMS uses port 162 to receive trap messages from the agent. The trap
messages are carried over UDP. After the NMS receives trap messages, it does not
need to acknowledge the messages.
The error code that is defined by users is called the extended error code.
The extended error code applies to more scenarios. Only Huawei workstations can
correctly parse the fault scenario of the current NE based on the agreement with
NEs.
Extended error code can be enabled using either command lines or operations on
the workstation. After extended error code is enabled, SNMP converts the internal
error codes returned from features into different extended error codes and then
sends them to the workstation based on certain rules. If the internal error codes
returned from features are standard error codes, SNMP sends them directly to the
workstation.
If extended error code is disabled, standard error codes and internal error codes
defined by modules are sent directly to the workstation.
The system generates and manages extended error codes based on those
registered on the modules and the module number. The workstation parses
extended error codes according to its agreement with NEs and then displays the
obtained information.
SNMP processes both SNMP IPv4 and SNMP IPv6 messages in the same manner.
NOTE
Context
With SNMP, an NMS runs network management software to manage NEs. If the
NMS and device use different SNMP versions, the NMS cannot manage the device.
To resolve this problem, configure SNMP proxy on a device between the NMS and
device to be managed, as shown in Figure 1-125. In the following description, the
device on which SNMP proxy needs to be configured is referred to as a middle-
point device.
Fundamentals
The principles of SNMP proxy are described as follows:
In Figure 1-126, the middle-point device allows you to manage the network
access, configurations, and system software version of the managed device. The
NE MIB files loaded to the NMS include the MIB tables of both the middle-point
device and managed device. After you configure SNMP proxy on the middle-point
device, the middle-point device automatically forwards SNMP requests from the
NMS to the managed device and forwards SNMP responses from the managed
device to the NMS.
● The process in which an NMS uses a middle-point device to query the MIB
information of a managed device is as follows:
a. The NMS sends an SNMP request that contains the MIB object ID of the
managed device to the middle-point device.
b. Upon receipt, the middle-point device searches its proxy table for a
forwarding entry based on the engine ID.
Feature Requirements
SNMP supports dying gasp traps, but cannot NetEngin NetEngine 8000
receive the NMS's reply to a dying gasp e 8000 M M14/NetEngine
message sent in Inform mode. In addition, 8000 M14K/
SNMP does not support the re-transmission of NetEngine 8000
dying gasp messages in Inform mode. M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8/NetEngine
8100 M14/
NetEngine 8100
M8
The default aging time of the SNMP get-next/ NetEngin NetEngine 8000
get-bulk query cache is 5 seconds. Within the 5 e 8000 M M14/NetEngine
seconds, the data in the cache may have been 8000 M14K/
deleted or the value may have changed in the NetEngine 8000
DB or APP component. However, SNMP cannot M4/NetEngine
detect this situation, the data in the buffer is 8000 M8/
still returned to the NMS. NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8/NetEngine
8100 M14/
NetEngine 8100
M8
For security purposes, you are not advised to NetEngin NetEngine 8000
use the weak security protocol provided by this e 8000 M M14/NetEngine
feature. By default, the device provides the 8000 M14K/
weak protocol feature package WEAKEA. If it is NetEngine 8000
required, run the install feature-software M4/NetEngine
WEAKEA command to install the weak 8000 M8/
protocol feature package WEAKEA. NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8/NetEngine
8100 M14/
NetEngine 8100
M8
The first three operations are sent by the workstation to an agent, and the latter
two operations are sent by an agent to the workstation. For simplification, the first
three operations are described as Get, Get-Next, and Set operations. Figure 1-128
shows the five SNMP packet operations.
NOTE
By default, an agent uses port 161 to receive Get and Set messages, and the workstation
uses port 162 to receive traps.
● Version
The value for this field is determined by subtracting one from the actual
version number. For example, the version field value of an SNMPv1 message
is 0.
● Community
0 Get-Request
1 Get-Next-Request
2 Get-Response
3 Set-Request
4 Trap
Get/Set Header
● Request ID
An integer set by the workstation. It is carried in Get-Request messages sent
by the workstation and in Get-Response messages returned by an agent. The
workstation can send Get messages to multiple agents simultaneously. All Get
messages are transmitted using UDP. A response to the request message sent
first may be the last to arrive. In such cases, Request IDs carried in the Get-
Response messages enable the workstation to identify the returned messages.
● Error status
An agent enters a value in this field of a Get-Response message to specify an
error, as listed in Table 1-49.
● Error index
When a noSuchName, badValue, or readOnly error occurs, the agent sets an
integer in the Response message to specify an offset value for the faulty
variable in the list. By default, the offset value in Get-Request messages is 0.
● Variable binding (variable-bindings)
The variable binding specifies the names and values of one or more variables.
In the Get or Get-Next message, this field is null.
Trap Header
● Enterprise
This field is an object identifier of a network device that sends traps. The
object identifier resides in the sub-tree of the enterprise object {1.3.6.1.4.1} in
the object naming tree.
● Generic trap type
The formal name of this field is generic-trap. Table 1-50 lists the generic trap
types that can be received by SNMP.
To send a type 2, 3, or 5 trap, you must use the first variable in the trap's variable
binding field to identify the interface responding to the trap.
● Specific-code
If an agent sends a type 6 trap, the value in the Specific-code field specifies
an event defined by the agent. If the trap type is not 6, this field value is 0.
● Timestamp
This specifies the duration from when an agent is initializing to when an
event reported by a trap occurs. This value is expressed in 10 ms. For example,
a timestamp of 1908 means that an event occurred 19080 ms after
initialization of the agent.
Prerequisites
Before configuring a device to communicate with an NMS using SNMPv1,
complete the following tasks:
● Configure a routing protocol to ensure that the device and NMS are reachable
to each other.
● Run the install feature-software WEAKEA command in the user view to
install the weak security protocol feature package (WEAKEA).
Context
SNMP needs to be deployed on a network to allow the NMS to manage network
devices.
If the network is secure and has few devices (for example, a campus network or a
small enterprise network), SNMPv1 can be deployed to ensure communication
between the NMS and managed devices.
SNMPv1 has a security risk. Using SNMPv3 is recommended.
After basic SNMP functions are configured, an NMS can perform basic operations
such as Get and Set operations on a managed device, and the managed device
can send alarms to the NMS.
The NMS can communicate with managed devices after basic SNMP functions
have been configured.
Procedure
Step 1 Enter the system view.
system-view
After this command is run, the length of a configured SNMP password must be
longer than or equal to the minimum SNMP password length.
Step 3 (Optional) Start the SNMP agent service.
snmp-agent
Step 4 (Optional) Change the listening port number of the SNMP agent.
snmp-agent udp-port port-number
By default, the listening port number of the SNMP agent is 161. If this command
is not configured, the default listening port number is used.
After SNMPv1 is enabled on the managed device, the device supports both
SNMPv1 and SNMPv3. This means that the device can be monitored and
managed by NMSs running SNMPv1 or SNMPv3.
NOTE
The snmp-agent sys-info version v1 command can be used only after the weak security
protocol feature package is installed.
The community name will be saved in encrypted format in the configuration file.
To facilitate identification of community names, set the alias names for the
communities. The alias names are stored in cleartext in the configuration file.
By default, the device checks complexity of community names. If the check fails,
the community name cannot be configured. You can run the snmp-agent
community complexity-check disable command to disable complexity check for
community names. However, to ensure system security, you are advised to enable
complexity check for community names.
NOTE
The device has the following requirements for community name complexity:
● A community name contains at least eight characters.
● A community name contains at least two types of characters: uppercase characters,
lowercase characters, digits, and special characters, excluding question marks (?) and
spaces.
● After the weak password dictionary maintenance function is enabled, the value of
community-name cannot be the password defined in the weak password dictionary.
(You can run the display security weak-password-dictionary command to view the
password defined in the weak password dictionary.)
After the community name is set, if no MIB view is configured, the NMS that uses
the community name has permission to access objects in the Viewdefault view
(1.3.6.1).
This step is required for the NMS administrator to view contact information and
locations of the device administrator when the NMS manages many devices. This
helps the NMS administrator contact the device administrators for fault location
and rectification.
Step 9 (Optional) Set the maximum size of an SNMP message that can be received or
sent by the device.
snmp-agent packet max-size byte-count
By default, the maximum size of an SNMP message that the device can receive or
send is 12000 bytes.
After the maximum size is set, the device discards any SNMP message that is
larger than the set size.
Step 10 (Optional) Enable the SNMP extended error code function.
snmp-agent extend error-code enable
By default, SNMP sends standard error codes to an NMS. The extended error code
function allows an SNMP device to send extended error codes to the NMS.
Step 11 (Optional) Enable the function to cache SET response packets.
snmp-agent set-cache enable
Table 1-51 Configuring a source interface for the SNMP agent to receive and
respond to NMS request packets
Operation Command Description
NOTE
You are advised not to use all interfaces to receive and respond to NMS request messages.
Specifying a source interface is recommended.
Step 13 (Optional) Configure the SNMP agent to receive and respond to NMS request
packets through a VPN or public network.
snmp-agent protocol [ ipv6 ] { vpn-instance vpn-instance-name | public-net }
system uses the MAC address of the management interface on a device as the
device information of the engine ID.
NOTE
After you disable the SNMP IPv4 or IPv6 listening port using the snmp-agent
protocol server disable command, SNMP no longer processes SNMP packets.
Exercise caution when you disable the SNMP IPv4 or IPv6 listening port.
Step 16 (Optional) Configure the SNMP proxy to receive and respond to requests from the
CCU.
Table 1-52 Configuring the SNMP proxy to receive and respond to requests from
the CCU
----End
Context
To enhance SNMP communication security, restrict the NMSs that are allowed to
access the device and restrict the MIB objects to be managed.
If a device is managed by multiple NMSs that use the same community name,
note the following points:
● If all the NMSs are required to access the objects in the Viewdefault view
(1.3.6.1), skip the following steps.
● If some of the NMSs are required to access the objects in the Viewdefault
view (1.3.6.1), skip steps 7 and 8.
● If all the NMSs are required to manage specified objects on the device, skip
steps 2, 3, and 4.
● If some of the NMSs are required to manage specified objects on the device,
perform all the following steps.
Procedure
Step 1 Enter the system view.
system-view
After the access permissions are configured and the NMS's IP address is specified
in the ACL rule, if the IP address changes (for example, the network management
station changes its location, or IP addresses are re-allocated due to network
adjustment), you need to change the IP address in the ACL. Otherwise, the NMS
cannot access the device.
Step 3 Configure a basic ACL rule.
rule [ rule-id ] [ name rule-name ] { permit | deny }
● If the address of a login user matches an ACL rule in which the specified
action is permit, the user is allowed to log in to the device.
● If the address of a login user matches an ACL rule in which the specified
action is deny, the user is not allowed to log in to the device.
● If the address of a login user is not within the address range specified in the
configured ACL rule, the user is not allowed to log in to the device.
● If the referenced ACL does not contain any rules or does not exist, the login of
users is not subject to the ACL, and any users can log in to the device.
Step 4 Return to the system view.
quit
Step 7 Create a MIB view and specify the MIB objects that can be monitored and
managed by the NMS.
By default, the NMS has the permission to access the Viewdefault view (1.3.6.1).
The value of type can be included or excluded. The included parameter specifies
the MIB objects that the NMS needs to manage. If some MIB objects do not need
to be managed, you can specify the excluded parameter to exclude them.
● read: If the NMS administrator needs the read permission in a specified view,
configure read in this command. For example, a low-level administrator needs
to read certain data.
● write: If the NMS administrator needs the read and write permissions in a
specified view, configure write in this command. For example, a high-level
administrator needs to read and write certain data.
● mib-view: If some of the NMSs that use the community name need to have
permission to access the objects in the Viewdefault view (1.3.6.1), you do not
need to configure mib-view view-name in the command.
● acl: If all the NMSs that use the community name need to manage specified
objects on the device, you do not need to configure acl acl-number in the
command.
● If some of the NMSs that use the community name need to manage specified
objects on the device, configure both mib-view and acl in the command.
----End
Context
The device can be configured to send specified traps to the NMS, which facilitates
fault locating. To enhance the trap transmission security, specify parameters for
sending traps.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Enable the function of sending a specified trap of a feature to the NMS.
snmp-agent trap enable feature-name feature-name trap-name trap-name
NOTE
If the snmp-agent trap enable command has been run to enable the trap functions of all
modules, or the snmp-agent trap enable feature-name command has been run to enable
a specific trap function, note the following points:
● To disable the trap functions of all modules, run the snmp-agent trap disable
command.
● To restore the trap functions of all modules to the default status, run the undo snmp-
agent trap enable or undo snmp-agent trap disable command.
● To disable the trap function for a specified module, run the undo snmp-agent trap
enable feature-name command.
● To delete all the trap function configurations of a feature in a one-click manner, run
the clear configuration snmp-agent trap enable command.
Step 4 Set the source address of traps. Perform one or two of the following operations as
required:
● Set the source interface of traps. The IPv4 address of the source interface is
used as the source IPv4 address of traps.
snmp-agent trap source interface-type interface-number
To ensure device security, you are advised to specify the local loopback
interface as the source interface of traps.
The source interface of traps specified on the device must be the same as that
specified on the NMS. Otherwise, the NMS does not accept the traps sent
from the device.
● Set the source IPv6 address of traps.
snmp-agent trap source ipv6 ipv6-address [ vpn-instance vpn-instance-name ]
To improve network security, configure a specific source port number for traps. In
this case, the user terminal's firewall filters packets based on the port number.
----End
Context
To enhance security, the SNMP blacklist function can be configured to defend
against malicious user attacks and user password cracking.
Procedure
Step 1 Enter the system view.
system-view
commit
----End
Procedure
● Run the display snmp-agent community command to check the configured
community name.
● Run the display snmp-agent sys-info version command to check the
enabled SNMP version.
● Run the display acl acl-number command to check the rules in the specified
ACL.
● Run the display snmp-agent mib-view command to check the MIB view.
● Run the display snmp-agent mib modules command to check information
about a loaded MIB file.
● Run the display snmp-agent sys-info contact command to check the device
administrator's contact information.
● Run the display snmp-agent sys-info location command to check the
location of the device.
● Run the display snmp-agent vacmgroup command to check all the
configured VACM groups.
● Run the display snmp-agent target-host command to check information
about the target host.
----End
SNMPv2c Security
The improvement on the security in SNMPv2 is abandoned in SNMPv2c. SNMPv2c
inherits the message mechanism and community concepts in SNMPv1.
Prerequisites
Before configuring a device to communicate with an NMS using SNMPv2c,
complete the following tasks:
● Configure a routing protocol to ensure that the device and NMS are reachable
to each other.
● Run the install feature-software WEAKEA command in the user view to
install the weak security protocol feature package (WEAKEA).
Context
SNMP needs to be deployed on a network to allow the NMS to manage network
devices.
If the network is of a large scale with many devices and its security requirements
are not strict, or the network is secure (for example, a VPN network) but services
on the network are so busy that traffic congestion may occur, SNMPv2c can be
deployed to ensure communication between the NMS and managed devices.
SNMPv2c has a security risk. Using SNMPv3 is recommended.
After basic SNMP functions are configured, an NMS can perform basic operations
such as Get and Set operations on a managed device, and the managed device
can send alarms to the NMS.
The NMS can communicate with managed devices after basic SNMP functions
have been configured.
Procedure
Step 1 Enter the system view.
system-view
After this command is run, the length of a configured SNMP password must be
longer than or equal to the minimum SNMP password length.
Step 3 (Optional) Start the SNMP agent service.
snmp-agent
By default, the listening port number of the SNMP agent is 161. If this command
is not configured, the default listening port number is used.
Step 5 Configure an SNMP version.
snmp-agent sys-info version v2c
After SNMPv2c is enabled on the managed device, the device supports both
SNMPv2c and SNMPv3. This means that the device can be monitored and
managed by NMSs running SNMPv2c or SNMPv3.
NOTE
The snmp-agent sys-info version v2c command can be used only after the weak security
protocol feature package is installed.
The community name will be saved in encrypted format in the configuration file.
To facilitate identification of community names, set the alias names for the
communities. The alias names are stored in cleartext in the configuration file.
By default, the device checks complexity of community names. If the check fails,
the community name cannot be configured. You can run the snmp-agent
community complexity-check disable command to disable complexity check for
community names. However, to ensure system security, you are advised to enable
complexity check for community names.
NOTE
The device has the following requirements for community name complexity:
● A community name contains at least eight characters.
● A community name contains at least two types of characters: uppercase characters,
lowercase characters, digits, and special characters, excluding question marks (?) and
spaces.
● After the weak password dictionary maintenance function is enabled, the value of
community-name cannot be the password defined in the weak password dictionary.
(You can run the display security weak-password-dictionary command to view the
password defined in the weak password dictionary.)
After the community name is set, if no MIB view is configured, the NMS that uses
the community name has permission to access objects in the Viewdefault view
(1.3.6.1).
● If the NMS administrator needs the read permission in a specified view,
configure read in this command. For example, a low-level administrator needs
to read certain data.
● If the NMS administrator needs the read and write permissions in a specified
view, configure write in this command. For example, a high-level
administrator needs to read and write certain data.
Step 7 Run one of following commands as needed:
● On an IPv4 network, a device can be configured to send alarms in Inform or
trap mode.
NOTE
The differences between alarms in trap and Inform modes are as follows:
– In trap mode, a managed device does not need to receive a response from the
alarm host after sending an alarm.
– In Inform mode, a managed device needs to receive a response from the alarm
host after sending an alarm. If no response is received within the timeout period,
the managed device retransmits the alarm until the number of sent alarms reaches
the maximum number of allowed retransmissions.
The managed device sends the alarm in Inform mode and records an alarm log at
the same time. If the NMS or a link fails, the NMS can synchronize alarms
generated during the fault period after the fault is rectified.
Therefore, the alarm in Inform mode is more reliable than that in trap mode. However,
the Inform mode may cause the device to cache massive alarm messages due to the
retransmission mechanism, consuming a great number of memory resources.
If the network environment is stable, sending alarms in trap mode is recommended. If
device resources are sufficient but the network environment is unstable, sending
alarms in Inform mode is recommended.
The same target host cannot be configured for Inform and trap messages. Otherwise,
the latest configuration overrides the previous configuration.
Configure the device to send alarms in trap mode.
snmp-agent target-host [ host-name host-name ] trap address udp-domain ip-address [ [ udp-
port port-number ] | [ { vpn-instance vpn-instance-name | public-net } ] | [ source { interface-name
| interface-type interface-number } ] ] * params securityname { security-name [ v2c | private-
netmanager | ext-vb | notify-filter-profile profile-name ] * | cipher cipher-name [ v2c | private-
netmanager | ext-vb | notify-filter-profile profile-name ] * }
Configure the device to send alarms in Inform mode.
snmp-agent target-host [ host-name host-name ] inform address udp-domain ip-address [ [ udp-
port server-port ] | [ { vpn-instance vpn-instance-name | public-net } ] | [ source { interface-name |
This step is required for the NMS administrator to view contact information and
locations of the device administrator when the NMS manages many devices. This
helps the NMS administrator contact the device administrators for fault location
and rectification.
Step 9 (Optional) Set the maximum size of an SNMP message that can be received or
sent by the device.
snmp-agent packet max-size byte-count
By default, the maximum size of an SNMP message that the device can receive or
send is 12000 bytes.
After the maximum size is set, the device discards any SNMP message that is
larger than the set size.
Step 10 (Optional) Enable the SNMP extended error code function.
snmp-agent extend error-code enable
By default, SNMP sends standard error codes to an NMS. The extended error code
function allows an SNMP device to send extended error codes to the NMS.
Step 11 (Optional) Enable the function to cache SET response packets.
snmp-agent set-cache enable
Step 12 Configure a source interface for the SNMP agent to receive and respond to NMS
request packets.
Table 1-53 Configuring a source interface for the SNMP agent to receive and
respond to NMS request packets
Operation Command Description
NOTE
You are advised not to use all interfaces to receive and respond to NMS request messages.
Specifying a source interface is recommended.
Step 13 (Optional) Configure the SNMP agent to receive and respond to NMS request
packets through a VPN or public network.
snmp-agent protocol [ ipv6 ] { vpn-instance vpn-instance-name | public-net }
NOTE
After you disable the SNMP IPv4 or IPv6 listening port using the snmp-agent
protocol server disable command, SNMP no longer processes SNMP packets.
Exercise caution when you disable the SNMP IPv4 or IPv6 listening port.
Step 16 (Optional) Configure the SNMP proxy to receive and respond to requests from the
CCU.
Table 1-54 Configuring the SNMP proxy to receive and respond to requests from
the CCU
The default Get-Bulk operation timeout period is 2s. Using the default Get-Bulk
operation timeout period is recommended. If you need to change the Get-Bulk
operation timeout period, ensure that the configured period is less than an NMS's
timeout period.
Step 18 Commit the configuration.
commit
----End
Context
To enhance SNMP communication security, restrict the NMSs that are allowed to
access the device and restrict the MIB objects to be managed.
If a device is managed by multiple NMSs that use the same community name,
note the following points:
● If all the NMSs are required to access the objects in the Viewdefault view
(1.3.6.1), skip the following steps.
● If some of the NMSs are required to access the objects in the Viewdefault
view (1.3.6.1), skip steps 7 and 8.
● If all the NMSs are required to manage specified objects on the device, skip
steps 2, 3, and 4.
● If some of the NMSs are required to manage specified objects on the device,
perform all the following steps.
Procedure
Step 1 Enter the system view.
system-view
After the access permissions are configured and the NMS's IP address is specified
in the ACL rule, if the IP address changes (for example, the network management
station changes its location, or IP addresses are re-allocated due to network
adjustment), you need to change the IP address in the ACL. Otherwise, the NMS
cannot access the device.
Step 3 Configure a basic ACL rule.
rule [ rule-id ] [ name rule-name ] { permit | deny }
● If the address of a login user matches an ACL rule in which the specified
action is permit, the user is allowed to log in to the device.
● If the address of a login user matches an ACL rule in which the specified
action is deny, the user is not allowed to log in to the device.
● If the address of a login user is not within the address range specified in the
configured ACL rule, the user is not allowed to log in to the device.
● If the referenced ACL does not contain any rules or does not exist, the login of
users is not subject to the ACL, and any users can log in to the device.
Step 4 Return to the system view.
quit
Step 7 Create a MIB view and specify the MIB objects that can be monitored and
managed by the NMS.
By default, the NMS has the permission to access the Viewdefault view (1.3.6.1).
The value of type can be included or excluded. The included parameter specifies
the MIB objects that the NMS needs to manage. If some MIB objects do not need
to be managed, you can specify the excluded parameter to exclude them.
● read: If the NMS administrator needs the read permission in a specified view,
configure read in this command. For example, a low-level administrator needs
to read certain data.
● write: If the NMS administrator needs the read and write permissions in a
specified view, configure write in this command. For example, a high-level
administrator needs to read and write certain data.
● mib-view: If some of the NMSs that use the community name need to have
permission to access the objects in the Viewdefault view (1.3.6.1), you do not
need to configure mib-view view-name in the command.
● acl: If all the NMSs that use the community name need to manage specified
objects on the device, you do not need to configure acl acl-number in the
command.
● If some of the NMSs that use the community name need to manage specified
objects on the device, configure both mib-view and acl in the command.
----End
Context
The device can be configured to send specified traps to the NMS, which facilitates
fault locating. To enhance the trap transmission security, specify parameters for
sending traps.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Enable the function of sending a specified trap of a feature to the NMS.
snmp-agent trap enable feature-name feature-name trap-name trap-name
NOTE
If the snmp-agent trap enable command has been run to enable the trap functions of all
modules, or the snmp-agent trap enable feature-name command has been run to enable
a specific trap function, note the following points:
● To disable the trap functions of all modules, run the snmp-agent trap disable
command.
● To restore the trap functions of all modules to the default status, run the undo snmp-
agent trap enable or undo snmp-agent trap disable command.
● To disable the trap function for a specified module, run the undo snmp-agent trap
enable feature-name command.
● To delete all the trap function configurations of a feature in a one-click manner, run
the clear configuration snmp-agent trap enable command.
Step 4 Set the source address of traps. Perform one or two of the following operations as
required:
● Set the source interface of traps. The IPv4 address of the source interface is
used as the source IPv4 address of traps.
snmp-agent trap source interface-type interface-number
To ensure device security, you are advised to specify the local loopback
interface as the source interface of traps.
The source interface of traps specified on the device must be the same as that
specified on the NMS. Otherwise, the NMS cannot receive the traps sent from
the device.
● Set the source IPv6 address of traps.
snmp-agent trap source ipv6 ipv6-address [ vpn-instance vpn-instance-name ]
To improve network security, configure a specific source port number for traps. In
this case, the user terminal's firewall filters packets based on the port number.
----End
Context
The device enabled with the SNMP agent function can generate two types of
notifications: traps and informs. Traps are messages alerting the NMS to a
condition on the network, and informs are traps that require a reply from the
NMS and are resent until a reply is received. Informs are more reliable than traps.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Enable the function of sending a trap of a specified feature to the NMS.
snmp-agent trap enable feature-name feature-name trap-name trap-name
NOTE
If the snmp-agent trap enable command has been run to enable the trap functions of all
modules, or the snmp-agent trap enable feature-name command has been run to enable
three or more trap functions of a module, note the following points:
● To disable the trap functions of all modules, run the snmp-agent trap disable
command.
● To restore the trap functions of all modules to the default status, run the undo snmp-
agent trap enable or undo snmp-agent trap disable command.
● To disable the trap function for a specified module, run the undo snmp-agent trap
enable feature-name command.
Step 4 (Optional) Set the timeout period for waiting for inform Ack messages, number of
times to resend Inform messages, and the maximum pieces of pending Inform
messages (Inform messages need to be acknowledged).
snmp-agent inform { timeout seconds | resend-times times | pending number } *
By default, the timeout period for waiting for an Inform ACK message is 15
seconds, the number of Inform retransmissions is 3, and the maximum number of
unacknowledged Inform messages is 39.
NOTE
If the network is unstable, you need to increase the timeout period. At the same time, you
need to increase the number of times to resend Inform messages and the maximum count
of pending Inform messages.
Step 5 Set the timeout period for waiting for Inform ACK messages and the number of
Inform retransmissions.
snmp-agent inform { timeout seconds | resend-times times } * { host-name target-host-name | address
udp-domain ip-address [ vpn-instance vpn-instance-name ] params securityname { security-name |
cipher security-name } }
If the link between the managed device and the NMS is faulty, the route is
unreachable. The managed device does not send Inform alarms but continues to
record alarm logs. After the link recovers, the NMS obtains alarm logs generated
during the fault period from the managed device.
The alarm logging function logs only informs. By default, the alarm logging
function is disabled.
Step 7 Set the aging time of alarm logs and maximum number of alarm logs allowed to
be stored in the log buffer.
snmp-agent notification-log { global-ageout ageout [ minute minute ] | global-limit limit } *
By default, the aging time of alarm logs is 24 hours. Alarm logs are automatically
deleted after 24 hours.
By default, a maximum of 500 alarm logs can be saved in the log buffer. If the
number of alarm logs exceeds the limit, the earliest alarm log is deleted.
commit
----End
Context
To enhance security, the SNMP blacklist function can be configured to defend
against malicious user attacks and user password cracking.
Procedure
Step 1 Enter the system view.
system-view
----End
Procedure
● Run the display snmp-agent community command to check the configured
community name.
● Run the display snmp-agent sys-info version command to check the
enabled SNMP version.
● Run the display acl acl-number command to check the rules in the specified
ACL.
● Run the display snmp-agent mib-view command to check the MIB view.
● Run the display snmp-agent mib modules command to check information
about a loaded MIB file.
● Run the display snmp-agent sys-info contact command to check the device
administrator's contact information.
● Run the display snmp-agent sys-info location command to check the
location of the device.
● Run the display snmp-agent target-host command to check information
about the target host.
● Run the display snmp-agent inform command to check inform parameters
of all target hosts or a specified target host.
● Run the display snmp-agent notification-log command to check inform logs
stored in the log buffer.
● Run the display snmp-agent vacmgroup command to check all the
configured View-based Access Control Model (VACM) groups.
----End
Networking Requirements
As shown in Figure 1-129, two NMSs (NMS1 and NMS2) and the device are
connected across a public network. According to the network planning, NMS2 can
manage every MIB object on the device, and NMS1 does not manage the device.
On the device, only the modules that are enabled by default are allowed to send
alarms to NMS2. This prevents an excess of unwanted alarms from being sent to
NMS2. Excessive alarms make fault location difficult. Inform messages need to be
used to ensure that alarms are received by NMS2, because alarms sent by the
device have to travel across the public network to reach NMS2.
Contact information of the device administrator needs to be configured on the
device. This helps the NMS administrator contact the device administrator if a
fault occurs.
Precautions
If the network environment is insecure, you are advised to use SNMPv3 for
communication with the NMS.
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the SNMP agent.
2. Configure the device to run SNMPv2c.
3. Configure an ACL to allow NMS2 to manage MIB objects on the device.
4. Configure a source interface for SNMP to receive and respond to NMS request
messages.
5. Configure the device to send Inform messages to NMS2 to ensure alarm
sending reliability.
Procedure
Step 1 Run the install feature-software WEAKEA command in the user view to install
the weak security protocol feature package (WEAKEA).
Step 2 Configure available routes between the device and the NMSs. For detailed
configurations, see Configuration Scripts.
Step 3 Enable the SNMP agent.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] snmp-agent password min-length 9
[*DeviceA] snmp-agent
[*DeviceA] commit
Step 5 Configure a source interface for SNMP to receive and respond to NMS request
messages.
[~DeviceA] snmp-agent protocol source-interface Loopback0
[*DeviceA] commit
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
acl number 2001
rule 5 permit source 1.1.1.2 0
rule 6 deny source 1.1.1.1 0
#
interface GigabitEthernet0/1/1
ip address 1.1.2.1 255.255.255.0
#
interface LoopBack0
ip address 10.1.1.1 255.255.255.0
#
ospf 1
area 0.0.0.0
network 1.1.2.0 0.0.0.255
#
snmp-agent
snmp-agent local-engineid 800007DB0300FDFDFD2211
snmp-agent community write cipher %@%##!!!!!!!!!"!!!!"!!!!*!!!!PR=uJ|5'u%-3Bw@/>NzBr/
k=X0[ALT.K~:,!!!!!2jp5!!!!!!U!!!!%{+lTl_[/Jh<3.<4RvQ/.Z'33]YwPJkB^`J9g":TFqD-'B
$kmL6;vyHwQ74KEFp22!!!!!!!!!!!!!!!%@%# mib-view allexthgmp acl 2001 alias
__CommunityAliasName_01_8357
#
snmp-agent sys-info contact call Operator at 010-12345678
snmp-agent sys-info version v2c
snmp-agent password min-length 9
snmp-agent target-host host-name __targetHost_1_11752 inform address udp-domain 1.1.1.2 params
securityname cipher %+%##!!!!!!!!!"!!!!"!!!!*!!!!PR=uJ|5'u%<OoF8~{B=#QW("E3cky"H*I%E!!!!!2jp5!!!!!!
<!!!!%m9qN;K61!+'7q>-bKZ&qJzJ3nQ\g)WWHkL!!!!!%+%# v2c
#
snmp-agent mib-view excluded allexthgmp huaweiUtility.7
#
snmp-agent notification-log enable
snmp-agent notification-log global-ageout 36
snmp-agent inform timeout 5
snmp-agent inform resend-times 6
snmp-agent inform pending 7
#
#
snmp-agent protocol source-interface LoopBack0
#
snmp-agent trap enable
#
return
SNMPv3 has four models: message processing and control model, local processing
model, user security model, and view-based access control model.
Unlike SNMPv1 and SNMPv2, SNMPv3 can implement access control, identity
authentication, and data encryption using the local processing model and user
security model.
NOTE
Prerequisites
Before configuring a device to communicate with an NMS using SNMPv3 USM
user, configure a routing protocol to ensure that at least one route exists between
the device and NMS.
Context
The NMS manages a device by the following ways:
● Sends requests to the managed device to perform the GetRequest,
GetNextRequest, GetResponse, GetBulk, or SetRequest operation to obtain
data or set values.
● Passively receives alarms (traps or informs) from the managed device to
locate and handle device faults based on the alarm information.
After basic SNMP functions are configured, an NMS can perform basic operations
such as Get and Set operations on a managed device, and the managed device
can send alarms to the NMS.
The NMS can communicate with managed devices after basic SNMP functions
have been configured.
The algorithms indicated by md5, sha, sha2-224, DES56, and 3DES168 in the
snmp-agent usm-user command are weak security algorithms. You are advised to
use other secure algorithms. To configure a weak security algorithm, run the undo
crypto weak-algorithm disable command to enable the weak security algorithm
function first.
Procedure
Step 1 Enter the system view.
system-view
After this command is run, the length of a configured SNMP password must be
longer than or equal to the minimum SNMP password length.
Step 3 (Optional) Start the SNMP agent service.
snmp-agent
By default, the listening port number of the SNMP agent is 161. If this command
is not configured, the default listening port number is used.
Step 5 Configure an SNMP version.
snmp-agent sys-info version v3
If the NMS and network devices are in an insecure environment (for example, the
network is vulnerable to attacks), authentication or privacy can be configured in
the command to enable data authentication or privacy.
The available authentication and privacy modes are as follows:
● No authentication and no privacy: Neither authentication nor privacy or
noauthentication is configured in the command. This mode is applicable to
secure networks managed by a specified administrator.
● Authentication without privacy: Only authentication is configured in the
command. This mode is applicable to secure networks managed by many
administrators who may frequently perform operations on the same device. In
this mode, only the authenticated administrators can access the managed
device.
● Authentication and privacy: Both authentication and privacy are configured
in the command. This mode is applicable to insecure networks managed by
many administrators who may frequently perform operations on the same
device. In this mode, only the authenticated administrators can access the
managed device, and transmitted data is encrypted to guard against
tampering and data leaking.
read-view needs to be configured in the command if the NMS administrator
needs the read permission in a specified view in some cases. For example, a low-
level administrator needs to read certain data.
write-view needs to be configured in the command if the NMS administrator
needs the read and write permissions in a specified view in some cases. For
example, a high-level administrator needs to read and write certain data.
notify-view needs to be configured in the command if you want to filter out
irrelevant alarms and configure the managed device to send only the alarms of
specified MIB objects to the NMS. If the parameter is configured, only the alarms
of the MIB objects specified by notify-view are sent to the NMS.
Step 7 (Optional) Set the engine ID of the local SNMP entity.
snmp-agent local-engineid engineid
NOTE
The differences between alarms in trap and Inform modes are as follows:
– A managed device does not need to receive a response from the alarm host when
sending an alarm in trap mode. Therefore, remote-engineid does not need to be
configured.
– A managed device needs to receive a response from the alarm host when sending
an alarm in Inform mode. Therefore, specify the engine ID of the alarm host on the
managed device. This means that remote-engineid must be the same as the
engine ID of the alarm host that receives the alarm. If the managed device receives
no response from the NMS within a timeout period, it resends the alarm until a
response is returned or the number of sent alarms reaches the maximum number
of allowed retransmissions.
The managed device sends the alarm in Inform mode and records an alarm log at
the same time. If the NMS or a link fails, the NMS can synchronize alarms
generated during the fault period after the fault is rectified.
Therefore, the alarm in Inform mode is more reliable than that in trap mode. However,
the Inform mode may cause the device to cache massive alarm messages due to the
retransmission mechanism, consuming a great number of memory resources.
If the network environment is stable, sending alarms in trap mode is recommended. If
device resources are sufficient but the network environment is unstable, sending
alarms in Inform mode is recommended.
The same target host cannot be configured for Inform and trap messages. Otherwise,
the latest configuration overrides the previous configuration.
Configure the device to send alarms in trap mode.
snmp-agent usm-user v3 user-name group-name [ authentication-mode { md5 | sha | sha2-224 |
sha2-256 | sha2-384 | sha2-512 } password [ privacy-mode { des56 | 3des168 | aes128 | aes192 |
aes256 } password ] ] [ acl { acl-number | acl-name } ]
snmp-agent target-host [ host-name host-name ] trap address udp-domain ip-address [ [ udp-
port port-number ] | [ source interface-type interface-number ] | [ public-net | vpn-instance vpn-
instance-name ] ] * params securityname { security-name [ v3 [ authentication | privacy ] | private-
netmanager | ext-vb | notify-filter-profile profile-name ] * }
Step 9 (Optional) Configure the contact information and location of the device
administrator.
snmp-agent sys-info { contact contact | location location }
This step is required for the NMS administrator to view contact information and
locations of the device administrator when the NMS manages many devices. This
helps the NMS administrator contact the device administrators for fault location
and rectification.
Step 10 (Optional) Set the maximum size of an SNMP message that can be received or
sent by the device.
snmp-agent packet max-size byte-count
By default, the maximum size of an SNMP message that the device can receive or
send is 12000 bytes.
After the maximum size is set, the device discards any SNMP message that is
larger than the set size.
Step 11 Configure a source interface for the SNMP agent to receive and respond to NMS
request packets.
Table 1-55 Configuring a source interface for the SNMP agent to receive and
respond to NMS request packets
Operation Command Description
NOTE
You are advised not to use all interfaces to receive and respond to NMS request messages.
Specifying a source interface is recommended.
By default, SNMP sends standard error codes to an NMS. The extended error code
function allows an SNMP device to send extended error codes to the NMS.
Step 13 (Optional) Enable the function to cache SET response packets.
snmp-agent set-cache enable
The default Get-Bulk operation timeout period is 2s. Using the default Get-Bulk
operation timeout period is recommended. If you need to change the Get-Bulk
operation timeout period, ensure that the configured period is less than an NMS's
timeout period.
Step 15 (Optional) Disable the SNMP IPv4 or IPv6 listening port.
snmp-agent protocol server [ ipv4 | ipv6 ] disable
After you disable the SNMP IPv4 or IPv6 listening port using the snmp-agent
protocol server disable command, SNMP no longer processes SNMP packets.
Exercise caution when you disable the SNMP IPv4 or IPv6 listening port.
Step 16 Commit the configuration.
commit
----End
Context
This section describes how to specify an NMS and manageable MIB objects for
SNMPv3-based communication between the NMS and managed device to
improve communication security.
If a device is managed by multiple NMSs that are in the same SNMPv3 user
group, note the following points:
● If all the NMSs need to have permission to access the objects in the
Viewdefault view, skip the following steps.
● If some of the NMSs need to have permission to access the objects in the
Viewdefault view, skip 7 and Step 8.
● If all the NMSs are required to manage specified objects on the device, skip
steps 2, 3, and 4.
● If some of the NMSs are required to manage specified objects on the device,
perform all the following steps.
Procedure
Step 1 Enter the system view.
system-view
After the access permissions are configured and the NMS's IP address is specified
in the ACL rule, if the IP address changes (for example, the network management
station changes its location, or IP addresses are re-allocated due to network
adjustment), you need to change the IP address in the ACL. Otherwise, the NMS
cannot access the device.
Step 3 Configure a basic ACL rule.
rule [ rule-id ] [ name rule-name ] { permit | deny }
● If the address of a login user matches an ACL rule in which the specified
action is permit, the user is allowed to log in to the device.
● If the address of a login user matches an ACL rule in which the specified
action is deny, the user is not allowed to log in to the device.
● If the address of a login user is not within the address range specified in the
configured ACL rule, the user is not allowed to log in to the device.
● If the referenced ACL does not contain any rules or does not exist, the login of
users is not subject to the ACL, and any users can log in to the device.
Step 7 Create a MIB view and specify the MIB objects that can be monitored and
managed by the NMS.
snmp-agent mib-view type view-name oid-tree
By default, the NMS has the permission to access the Viewdefault view (1.3.6.1).
The value of type can be included or excluded. The included parameter specifies
the MIB objects that the NMS needs to manage. If some MIB objects do not need
to be managed, you can specify the excluded parameter to exclude them.
If the NMS and network devices are in an insecure environment (for example, the
network is vulnerable to attacks), authentication or privacy can be configured in
the command to enable data authentication or privacy.
----End
Context
The device can be configured to send specified traps to the NMS, which facilitates
fault locating. To enhance the trap transmission security, specify parameters for
sending traps.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Enable the function of sending a specified trap of a feature to the NMS.
snmp-agent trap enable feature-name feature-name trap-name trap-name
NOTE
If the snmp-agent trap enable command has been run to enable the trap functions of all
modules, or the snmp-agent trap enable feature-name command has been run to enable
a specific trap function, note the following points:
● To disable the trap functions of all modules, run the snmp-agent trap disable
command.
● To restore the trap functions of all modules to the default status, run the undo snmp-
agent trap enable or undo snmp-agent trap disable command.
● To disable the trap function for a specified module, run the undo snmp-agent trap
enable feature-name command.
● To delete all the trap function configurations of a feature in a one-click manner, run
the clear configuration snmp-agent trap enable command.
Step 4 Set the source address of traps. Perform one or two of the following operations as
required:
● Set the source interface of traps. The IPv4 address of the source interface is
used as the source IPv4 address of traps.
snmp-agent trap source interface-type interface-number
To ensure device security, you are advised to specify the local loopback
interface as the source interface of traps.
The source interface of traps specified on the device must be the same as that
specified on the NMS. Otherwise, the NMS cannot receive the traps sent from
the device.
● Set the source IPv6 address of traps.
snmp-agent trap source ipv6 ipv6-address [ vpn-instance vpn-instance-name ]
To improve network security, configure a specific source port number for traps. In
this case, the user terminal's firewall filters packets based on the port number.
Step 6 Commit the configuration.
commit
----End
Context
The device enabled with the SNMP agent function can generate two types of
notifications: traps and informs. Traps are messages alerting the NMS to a
condition on the network, and informs are traps that require a reply from the
NMS and are resent until a reply is received. Informs are more reliable than traps.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Enable the function of sending a trap of a specified feature to the NMS.
snmp-agent trap enable feature-name feature-name trap-name trap-name
NOTE
If the snmp-agent trap enable command has been run to enable the trap functions of all
modules, or the snmp-agent trap enable feature-name command has been run to enable
three or more trap functions of a module, note the following points:
● To disable the trap functions of all modules, run the snmp-agent trap disable
command.
● To restore the trap functions of all modules to the default status, run the undo snmp-
agent trap enable or undo snmp-agent trap disable command.
● To disable the trap function for a specified module, run the undo snmp-agent trap
enable feature-name command.
Step 4 (Optional) Set the timeout period for waiting for inform Ack messages, number of
times to resend Inform messages, and the maximum pieces of pending Inform
messages (Inform messages need to be acknowledged).
snmp-agent inform { timeout seconds | resend-times times | pending number } *
By default, the timeout period for waiting for an Inform ACK message is 15
seconds, the number of Inform retransmissions is 3, and the maximum number of
unacknowledged Inform messages is 39.
NOTE
If the network is unstable, you need to increase the timeout period. At the same time, you
need to increase the number of times to resend Inform messages and the maximum count
of pending Inform messages.
Step 5 Set the timeout period for waiting for Inform ACK messages and the number of
Inform retransmissions.
snmp-agent inform { timeout seconds | resend-times times } * { host-name target-host-name | address
udp-domain ip-address [ vpn-instance vpn-instance-name ] params securityname { security-name |
cipher security-name } }
If the link between the managed device and the NMS is faulty, the route is
unreachable. The managed device does not send Inform alarms but continues to
record alarm logs. After the link recovers, the NMS obtains alarm logs generated
during the fault period from the managed device.
The alarm logging function logs only informs. By default, the alarm logging
function is disabled.
Step 7 Set the aging time of alarm logs and maximum number of alarm logs allowed to
be stored in the log buffer.
snmp-agent notification-log { global-ageout ageout [ minute minute ] | global-limit limit } *
By default, the aging time of alarm logs is 24 hours. Alarm logs are automatically
deleted after 24 hours.
By default, a maximum of 500 alarm logs can be saved in the log buffer. If the
number of alarm logs exceeds the limit, the earliest alarm log is deleted.
----End
Context
To enhance security, the SNMPv3 blacklist function can be configured to defend
against malicious user attacks and user password cracking.
Procedure
Step 1 Enter the system view.
system-view
Step 5 Configure the locking period for an SNMPv3 user after the user's authentication
failures exceed a specified number of consecutive times.
snmp-agent blacklist user-block reactive reactive-time
By default, the locking period is 5 minutes. After the period of time elapses, the
user is automatically unlocked and can continue to be authenticated.
To unlock users during the locking period, run the snmp-agent activate usm-user
user-name [ remote-engineid remote-engineid ] command.
----End
Procedure
● Run the display snmp-agent usm-user [ engineid engineid | group group-
name | username user-name ] * command to check user information.
● Run the display snmp-agent sys-info version command to check the
enabled SNMP version.
● Run the display acl acl-number command to check the rules in the specified
ACL.
● Run the display snmp-agent mib-view command to check the MIB view.
● Run the display snmp-agent mib modules command to check information
about a loaded MIB file.
● Run the display snmp-agent sys-info contact command to check the device
administrator's contact information.
● Run the display snmp-agent sys-info location command to check the
location of the device.
● Run the display snmp-agent target-host command to check information
about the target host.
● Run the display snmp-agent inform [ host-name host-name | [ address
udp-domain ip-address [ vpn-instance vpn-instance-name ] params
securityname security-name ] ] command to check Inform parameters and
host statistics of all or a specified target host.
● Run the display snmp-agent vacmgroup command to check all the
configured View-based Access Control Model (VACM) groups.
----End
Networking Requirements
As shown in Figure 1-130, two NMSs (NMS1 and NMS2) and the device are
connected across a public network. According to the network planning, NMS2 can
manage every MIB object on the device, and NMS1 does not manage the device.
On the device, only the modules that are enabled by default are allowed to send
alarms to NMS2. This prevents an excess of unwanted alarms from being sent to
NMS2. Excessive alarms make fault location difficult.
The data transmitted between NMS2 and the device needs to be encrypted and
the NMS administrator needs to be authenticated because the data has to travel
across the public network. Contact information of the device administrator needs
to be configured on the device. This helps the NMS administrator to contact the
equipment administrator if a fault occurs.
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Configure available routes between the device and the NMSs. For detailed
configurations, see Configuration Scripts.
Step 4 Configure a source interface for SNMP to receive and respond to NMS request
messages.
[~DeviceA] snmp-agent protocol source-interface Loopback0
[*DeviceA] commit
# Configure a user group and a user. Configure authentication and encryption for
data of the user.
[~DeviceA] snmp-agent group v3 admin privacy write-view iso notify-view iso read-view iso
[*DeviceA] snmp-agent usm-user v3 nms2-admin group admin acl 2001
[*DeviceA] snmp-agent usm-user v3 nms2-admin authentication-mode sha2-256
Please configure the authentication password (8-255)
Enter Password:
Confirm Password:
[*DeviceA] snmp-agent usm-user v3 nms2-admin privacy-mode aes128
Please configure the privacy password (8-255)
Enter Password:
Confirm Password:
[*DeviceA] commit
For details on how to configure NMS2, see the relevant NMS configuration guide.
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
acl number 2001
rule 5 permit source 1.1.1.2 0.0.0.0
rule 6 deny source 1.1.1.1 0.0.0.0
#
interface GigabitEthernet0/1/1
ip address 1.1.2.1 255.255.255.0
#
interface loopback0
ip address 1.1.3.1 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.2.0 0.0.0.255
network 1.1.3.1 0.0.0.0
#
snmp-agent
snmp-agent local-engineid 800007DB03D0C65B951201
#
snmp-agent sys-info contact call Operator at 010-12345678
snmp-agent sys-info version v3
snmp-agent password min-length 10
snmp-agent group v3 admin privacy read-view iso write-view iso notify-view iso
snmp-agent target-host host-name __targetHost_1_27466 trap address udp-domain 1.1.1.2 params
securityname nms2-admin v3 privacy
#
snmp-agent mib-view included iso iso
snmp-agent usm-user v3 nms2-admin
snmp-agent usm-user v3 nms2-admin group admin
snmp-agent usm-user v3 nms2-admin authentication-mode sha2-256 cipher %+%##!!!!!!!!!"!!!!"!!!!*!!!!
PR=uJ|5'u%{Ku|VKwEyE-uN:Pp9K`O+oLF,!!!!!2jp5!!!!!!<!!!!6r!o;)ju=D<fXX.r3a`QWe'gPol7aEif^M'!!!!!%+
%#
snmp-agent usm-user v3 nms2-admin privacy-mode aes128 cipher %+%##!!!!!!!!!"!!!!"!!!!*!!!!PR=uJ|5'u
%B.79IwRIE3(xTzFsYNQ5iH4;X!!!!!2jp5!!!!!!<!!!!A"X3:)AC815G!a6]bVc8-wj'EK9!&V<M0HP!!!!!%+%#
snmp-agent usm-user v3 nms2-admin acl 2001
#
snmp-agent protocol source-interface LoopBack0
#
snmp-agent trap enable
#
return
Application Scenarios
AAA is an authentication, authorization, and accounting technique. Local AAA
users can be configured to log in to a device in multiple modes, such as FTP,
Telnet, or SSH. However, SNMPv3 supports only SNMP user login, which can be
inconvenient for network administrators in unified network device management
scenarios.
To resolve this issue, you can configure SNMP to support AAA users. This allows
AAA users to access the NMS, facilitates network administrators to manage
devices in a unified manner, and achieves task-based authentication on different
MIB nodes. The NMS does not distinguish between AAA user login and SNMP user
login.
Figure 1-131 shows the process of an AAA user logging in to the NMS through
SNMP.
Figure 1-131 Process of an AAA user logging in to the NMS through SNMP
The NMS can communicate with the devices to be managed once basic functions
are configured. To perform refined management, you can refer to the follow-up
configuration procedure.
Pre-configuration Tasks
Before configuring a device to communicate with an NMS using SNMPv3,
configure a routing protocol to ensure that routes between the router and NMS
are reachable.
Procedure
Context
Basic SNMPv3 functions can be configured to allow an NMS to perform basic
monitoring and management operations on managed devices.
Before a local SNMP user is configured on a device to communicate with an NMS,
the user must be added to a user group on the AAA side, and the user group must
be associated with a specific task group. The task group can be configured with
multiple tasks, each of which is mapped to a MIB object that is granted reading
and writing permissions. This achieves task-based MIB object authentication.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Create a task group and enter the task group view.
task-group task-group-name
Step 4 Add a specified task to the task group and grant permissions to the task.
task snmp { debug | execute | read | write } *
Each MIB object is associated with a specific task. This step can be performed to
grant permissions to SNMP MIB objects.
Step 5 Return to the AAA view.
quit
Step 6 Create a user group and enter the user group view.
user-group user-group-name
Step 9 Create a local user and configure a login password for the user.
local-user user-name password [ cipher password | irreversible-cipher irreversible-cipher-password ]
If the AAA user is configured as a local SNMP user, the length of user-name
ranges from 1 to 32 characters.
Step 10 Add the created local user to the specified user group.
local-user user-name user-group user-group-name
One user group can be used by multiple local users. However, each local user can
belong to only one user group.
Step 11 Set the access type of the local user to SNMP.
local-user user-name service-type snmp
snmp-agent
After this command is run, the length of a configured SNMP password must be
longer than or equal to the minimum SNMP password length.
Step 15 (Optional) Change the listening port number of the SNMP agent.
snmp-agent udp-port port-number
By default, the listening port number of the SNMP agent is 161. If this command
is not configured, the default listening port number is used.
Step 16 Configure an SNMP version.
snmp-agent sys-info version v3
The authentication and encryption password configured for an AAA user can be
different from those configured for a local SNMP user. Deleting a local AAA user
will also result in the deletion of the local SNMP user. However, deleting a local
SNMP user does not affect the local AAA user.
The priority of an SNMP USM user is higher than that of a local SNMP user.
Consequently, if an SNMP USM user and a local SNMP user have the same
username but different authentication and encryption passwords, the SNMP USM
user's authentication and encryption passwords are used for login.
By default, the device checks the complexity of the local users' authentication and
encryption passwords. If the check fails, the passwords fail to be configured. To
disable the password complexity check, run the snmp-agent local-user password
complexity-check disable command. However, enabling this function is
recommended as this improves system security.
To improve system security, you are advised to configure different authentication
and encryption passwords for a local SNMP user.
The algorithms indicated by md5, sha, sha2-224, DES56, and 3DES168 in the
snmp-agent local-user command are weak security algorithms. You are advised
to use other secure algorithms. To configure a weak security algorithm, run the
undo crypto weak-algorithm disable command to enable the weak security
algorithm function first.
After the weak password dictionary maintenance function is enabled, the
password configured using the snmp-agent local-user command cannot be the
password defined in the weak password dictionary. (You can run the display
security weak-password-dictionary command to view the password defined in
the weak password dictionary.)
Step 18 (Optional) Configure the SNMP proxy to receive and respond to requests from the
CCU.
● IPv4 network
– Specify the source interface for the SNMP proxy to receive and respond to
requests from the CCU.
snmp-agent proxy protocol source-interface { protocol-interface-type protocol-interface-
number | protocol-interface-name }
– Enable the function that allows all IPv4 addresses on the device to be
used by the SNMP proxy to receive and respond to requests from the
CCU.
snmp-agent proxy protocol source-status all-interface
● IPv6 network
– Configure the source IPv6 address for the SNMP agent to receive and
respond to CCU packets.
snmp-agent proxy protocol ipv6 source-ip ip-address [ vpn-instance vpn-instance-name ]
– Enable the function that allows all IPv6 addresses on the device to be
used by the SNMP proxy to receive and respond to requests from the
CCU.
snmp-agent proxy protocol source-status ipv6 all-interface
Step 19 (Optional) Configure the contact information and location of the device
administrator.
snmp-agent sys-info { contact contact | location location }
This step is required for the NMS administrator to view contact information and
locations of the device administrator when the NMS manages many devices. This
helps the NMS administrator contact the device administrators for fault location
and rectification.
Step 20 (Optional) Set the maximum size of an SNMP message that can be received or
sent by the device.
snmp-agent packet max-size byte-count
By default, the maximum size of an SNMP message that the device can receive or
send is 12000 bytes.
After the maximum size is set, the device discards any SNMP message that is
larger than the set size.
Step 21 (Optional) Run either of the following commands as required to configure the
SNMP agent to receive and respond to NMS request packets:
● Configure a source interface for the SNMP agent to receive and respond to
NMS request packets.
snmp-agent protocol source-interface interface-type interface-number
● Enable the function that allows all interfaces on the device to be used by
SNMP to receive and respond to requests from an NMS.
snmp-agent protocol source-status all-interface
● Configure the isolated source address for the SNMP agent to receive and
respond to NMS request packets.
snmp-agent protocol physic-isolate source-interface protocol-interface-name source-ip ip-address
NOTE
After the interface isolation attribute is set successfully, packets can be sent to the
server only through the specified physical interface, and those sent through other
interfaces are discarded.
● Configure the source IPv6 address for the SNMP agent to receive and respond
to NMS request packets.
● Configure the isolated IPv6 source address for the SNMP agent to receive and
respond to CCU packets.
snmp-agent protocol ipv6 physic-isolate source-interface protocol-interface-name source-ip ip-
address
● Enable the function that allows all IPv6 addresses on the device to be used by
SNMP to receive and respond to requests from an NMS.
snmp-agent protocol source-status ipv6 all-interface
● Configure the SNMP agent to receive and respond to NMS request packets
through a VPN or public network.
– For an IPv4 network, run the snmp-agent protocol { vpn-instance vpn-
instance-name | public-net } command.
– For an IPv6 network, run the snmp-agent protocol ipv6 { vpn-instance
vpn-instance-name | public-net } command.
NOTE
NOTE
After you disable the SNMP IPv4 or IPv6 listening port using the snmp-agent
protocol server disable command, SNMP no longer processes SNMP packets.
Exercise caution when you disable the SNMP IPv4 or IPv6 listening port.
Step 25 Commit the configuration.
commit
----End
Context
Configure the SNMP blacklist function to defense against a malicious user's attack
on other users' passwords and improve security.
Procedure
Step 1 Enter the system view.
system-view
----End
Prerequisites
Basic SNMPv3 functions have been configured.
Context
After configuring basic SNMPv3 functions, check the configurations.
Procedure
● Run the display snmp-agent sys-info version command to check the
enabled SNMP version.
● Run the display snmp-agent sys-info contact command to view the
administrator's contact information.
● Run the display snmp-agent sys-info location command to check the
location of the router.
● Run the display current-configuration | include max-size command to
check the allowable maximum size of an SNMP packet.
● Run the display snmp-agent local-user [ username user-name ] command
to check local SNMP user information.
----End
Networking Requirements
On the network shown in Figure 1-133, two NMSs are connected to DeviceA over
a public network. To meet service requirements, NMS2 is configured to manage all
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure an AAA task group and grant permissions.
2. Configure an AAA user group and associate it with the task group.
3. Configure a local AAA user and set its access service type to SNMP.
4. Enable the SNMP agent.
5. Set the SNMP version of the router to SNMPv3.
6. Configure a source interface for the SNMP agent to receive and respond to
NMS request packets.
7. Configure a local SNMPv3 user.
8. Configure the contact information of the device administrator.
9. Configure NMS2.
Procedure
Step 1 Configure available routes between the router and the NMSs. For detailed
configurations, see Configuration Scripts.
Step 2 Configure an AAA task group and grant permissions.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA-aaa] aaa
[~DeviceA-aaa] task-group tg1
[*DeviceA-aaa-task-group-tg1] task snmp read
[*DeviceA-aaa-task-group-tg1] task snmp write
[*DeviceA-aaa-task-group-tg1] commit
[~DeviceADeviceA-aaa-task-group-tg1] quit
Step 3 Configure an AAA user group and associate it with the task group.
[~DeviceA-aaa] user-group grp1
[*DeviceA-aaa-user-group-grp1] task-group tg1
[*DeviceA-aaa-user-group-grp1] commit
[~DeviceA-aaa-user-group-grp1] quit
Step 4 Configure a local AAA user and set its access service type to SNMP.
[~DeviceA-aaa] local-user nms2-admin password
Please configure the password (8-128)
Enter Password:
Confirm Password:
[*DeviceA-aaa] local-user nms2-admin user-group grp1
[*DeviceA-aaa] local-user nms2-admin service-type snmp
[*DeviceA-aaa] commit
[~DeviceA-aaa] quit
Step 7 Configure a source interface for the SNMP agent to receive and respond to NMS
request packets.
[~DeviceA] snmp-agent protocol source-interface Loopback0
[*DeviceA] commit
For details about NMS configuration, see the corresponding NMS configuration
guide.
----End
Configuration Scripts
● DeviceA
#
sysname DeviceA
#
aaa
local-user nms2-admin password irreversible-cipher $1d$wl_$UbtQ(DLL4u'7$7_6GB8@h'P\<e_Wa!
TzW'enO<Slqi#Spv`54f]V;$
local-user nms2-admin service-type snmp
local-user nms2-admin user-group grp1
#
task-group tg1
task snmp write
#
user-group grp1
task-group tg1
#
interface GigabitEthernet 0/1/0
undo shutdown
ip address 1.1.2.1 255.255.255.0
#
interface loopback0
ip address 1.1.3.1 255.255.255.255
#
ospf 1
area 0.0.0.0
network 1.1.2.0 0.0.0.255
network 1.1.3.1 0.0.0.0
#
snmp-agent
snmp-agent password min-length 10
snmp-agent local-engineid 800007DB03001974593301
#
snmp-agent protocol source-interface Loopback0
#
snmp-agent sys-info contact call Operator at 010-12345678
snmp-agent sys-info version v3
snmp-agent local-user v3 nms2-admin authentication-mode sha2-224 cipher %+%##!!!!!!!!!"!!!!"!!!!*!!!!
Q/C$./\p}NjEHjN:n.RCPbLa:/*9'Qx
FkAJ!!!!!2jp5!!!!!!<!!!!UO"[X^t)qX]BX.Yzz3#'MIB&54%EWXlh[0&!!!!!%+%# privacy-mode aes128 cipher
%+%##!!!!!!!!!"!!!!"!!!!*!!!!Q/C$./\
p}NCL837}@S"Q]/.jXPTgK%c]aJ*!!!!!2jp5!!!!!!<!!!!gS&*AU:]E#F|F1,x2Sa")ogh;CxFQ#Jf.W4!!!!!%+%#
#
return
Figure 1-134 Networking diagram for configuring the device to communicate with
NMS through SNMP proxy
If you want to use the NMS to manage the middle-point device and the managed
device in a unified manner, deploy SNMP proxy on the middle-point device. The
NMS considers the middle-point device and the managed device as a virtual
management unit, which significantly reduces the number of NEs to be managed
by the NMS. The NMS monitors the performance of managed devices in real time,
helping to improve service quality.
If you do not want the middle-point device to communicate with the managed
device based on default parameter settings, configure SNMP proxy using user-
defined parameter settings. After you configure SNMP proxy, the middle-point
device communicates with the managed device based on the user-defined
parameter settings.
Prerequisites
Before configuring a device to communicate with an NMS using SNMP proxy,
complete the following tasks:
● Configure a routing protocol to ensure that there are reachable routes
between the NMS and the middle-point device and between the middle-point
device and the managed device.
Context
This section describes how to use user-defined parameter settings to configure
Simple Network Management Protocol (SNMP) proxy on the middle-point device.
In this type of SNMP proxy configuration, you must configure SNMP on the
managed device.
Procedure
Step 1 Enter the system view.
system-view
After this command is run, the length of a configured SNMP password must be
longer than or equal to the minimum SNMP password length.
Step 3 Configure SNMP proxy on the middle-point device.
Step 4 Configure the SNMP proxy to receive and respond to requests from the CCU.
Table 1-57 Configuring the SNMP proxy to receive and respond to requests from
the CCU
Operation Command Description
----End
Context
● To configure SNMPv1 on the managed device, see 1.1.15.4 Configuring a
Device to Communicate with an NMS Using SNMPv1.
● To configure SNMPv2c on the managed device, see 1.1.15.5 Configuring a
Device to Communicate with an NMS Using SNMPv2c.
● To configure SNMPv3 on the managed device, see 1.1.15.6 Configuring a
Device to Communicate with an NMS Using SNMPv3 USM User.
Procedure
● Verify the SNMP proxy configuration on the middle-point device.
– Run the display snmp-agent proxy community command to check
SNMP proxy community information.
– Run the display snmp-agent proxy rule command to check proxy rules
for SNMP messages.
– Run the display snmp-agent proxy target-host command to check
target host information.
– Run the display snmp-agent usm-user command to check SNMPv3
proxy user information.
– Run the display snmp-agent proxy statistics command to check
statistics about SNMP proxy messages.
● Verify the SNMP configuration on the managed device.
– For SNMPv1, see 1.1.15.4.6 Verifying the Configuration.
– For SNMPv2c, see 1.1.15.5.7 Verifying the Configuration.
– For SNMPv3, see 1.1.15.6.7 Verifying the Configuration.
----End
Networking Requirements
An NMS can manage NEs through SNMP, but management costs increase as the
number of NEs increases.
To reduce management costs, configure a middle-point device as the SNMP proxy,
as shown in Figure 1-135. After the configuration is complete, the NMS considers
the middle-point device and managed device as an independent NE. This reduces
the number of NEs that the NMS needs to manage, thereby reducing
management costs.
Configuration Roadmap
The configuration roadmap is as follows:
● Configure the middle-point device.
a. Configure IP addresses for interfaces that connect the middle-point device
to the NMS and managed device.
b. Configure the middle-point device as an SNMP proxy, enabling it to
access the managed device based on the configured parameters for
management.
● Configure the managed device.
a. Configure an IP address for the interface that connects the managed
device to the middle-point device.
b. Configure SNMP for the managed device to communicate with the NMS.
Procedure
Step 1 Configure an IP address for the interface on the middle-point device.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] vlan 100
[*DeviceA-vlan100] quit
[*DeviceA] interface vlanif 100
[*DeviceA-Vlanif100] ip address 10.1.1.1 24
[*DeviceA-Vlanif100] quit
[*DeviceA] interface gigabitethernet 0/1/1
[*DeviceA-GigabitEthernet0/1/1] port link-type trunk
[*DeviceA-GigabitEthernet0/1/1] port trunk pvid vlan 100
[*DeviceA-GigabitEthernet0/1/1] port trunk allow-pass vlan 100
[*DeviceA-GigabitEthernet0/1/1] quit
[*DeviceA] vlan 200
[*DeviceA-vlan200] quit
[*DeviceA] interface vlanif 200
[*DeviceA-Vlanif200] ip address 192.168.1.1 24
[*DeviceA-Vlanif200] quit
[*DeviceA] interface gigabitethernet 0/1/2
[*DeviceA-GigabitEthernet0/1/2] port link-type trunk
[*DeviceA-GigabitEthernet0/1/2] port trunk pvid vlan 200
[*DeviceA-GigabitEthernet0/1/2] port trunk allow-pass vlan 200
[*DeviceA-GigabitEthernet0/1/2] quit
----End
Configuration Files
DeviceA configuration file
#
sysname DeviceA
#
vlan batch 100 200
#
interface Vlanif100
ip address 10.1.1.1 255.255.255.0
#
interface Vlanif200
ip address 192.168.1.1 255.255.255.0
#
interface GigabitEthernet0/1/1
port link-type trunk
port trunk pvid vlan 100
port trunk allow-pass vlan 100
#
interface GigabitEthernet0/1/2
port link-type trunk
Definition
The Network Configuration Protocol (NETCONF) is an extensible markup
language (XML)-based network configuration and management protocol.
NETCONF uses a simple remote procedure call (RPC) mechanism to implement
communication between a client and a server. NETCONF provides a method for a
network management station (client), which is a central computer that runs
network management software, to remotely manage and monitor devices.
The NMS uses NETCONF to implement local management and perform operations
such as adding, modifying, and deleting configurations of remote devices. This
protocol allows a device to provide a complete and formal application
programming interface (API). Network management applications can use this API
to send and receive complete or partial configuration data sets.
Purpose
As networks become larger and more complex, the Simple Network Management
Protocol (SNMP) can no longer meet the requirements for managing and
configuring networks. This is where NETCONF comes into play.
Table 1-58 lists the differences between SNMP and NETCONF.
Quer SNMP can be used to query NETCONF allows you to directly query
ying one or more records in a the configuration data of the system
table, requiring multiple and supports data filtering.
interactions.
Benefits
● Facilitates configuration data management and interoperability between
different vendors' devices by using XML encoding to define messages and
using the RPC mechanism to modify configuration data.
● Reduces network faults caused by manual configuration errors.
● Improves the efficiency of tool-based upgrades to system software.
● Provides high extensibility, allowing different vendors to define additional
NETCONF operations.
● Improves data security using authentication and authorization mechanisms.
NOTE
This document is written according to device information obtained under lab conditions and
therefore may not cover all scenarios. Due to factors such as version upgrades and
differences in device models, the content provided in this document may differ from the
information on user device interfaces. Such information takes precedence over the content
provided by this document.
A network device must support at least one NETCONF session, which is a logical
connection between a client and a server. The information that a client obtains
from a server can be configuration or status data.
● The client can modify and operate configuration data to implement a user-
expected status of the server.
● The client cannot modify status data, which mainly includes the running
status and statistics of the server.
NOTE
A NETCONF server can send a <hello> element to advertise the capabilities that it supports.
When a Huawei device interconnects with a non-Huawei device:
● If the capabilities contained in a <hello> element sent from the peer are all standard
capabilities, the Huawei device replies with a YANG packet.
After a NETCONF server exchanges <hello> elements with a NETCONF client, the
server waits for <rpc> elements from the client and responds an <rpc-reply>
element for each received <rpc> element. Figure 1-137 shows the capability
interaction between the NETCONF server and client.
Layer BEEP, SSH, The transport layer provides a communication path for
1: and SSL interaction between a NETCONF client and server.
transp NETCONF can be carried over any transport protocol that
ort meets the following basic requirements:
● The transport protocol is connection-oriented and
establishes a persistent connection between the
NETCONF client and server. This connection provides
reliable, sequenced data transmission.
● The transport layer provides user authentication, data
integrity, and security encryption for NETCONF.
● The transport protocol provides a mechanism to
distinguish the session type (client or server) for
NETCONF.
NOTE
Currently, the device supports only SSH as the transport layer
protocol for NETCONF.
Layer <rpc> and The message layer provides a simple RPC request and
2: <rpc-reply> response mechanism independent of transport protocols.
messa The client encapsulates RPC request information in the
ge <rpc> element and sends it to the server through a secure
layer and connection-oriented session. The server encapsulates
RPC reply information (content at the operation and
content layers) in the <rpc-reply> element and sends it to
the client.
In normal cases, the <rpc-reply> element encapsulates
data required by the client or information about a
configuration success. If the client sends an incorrect
request or the server fails to process a request from the
client, the server encapsulates the <rpc-error> element
containing detailed error information in the <rpc-reply>
element and sends the <rpc-reply> element to the client.
The YANG data model is a machine-oriented model interface, which defines data
structures and constraints to provide more flexible and complete data description.
Encoding Format
XML encoding is used in NETCONF, allowing complex hierarchical data to be
expressed in a text format that can be read, saved, and manipulated with both
traditional text tools and XML-specific tools.
The format of the file header used in XML encoding is <?xml version="1.0"
encoding="UTF-8"?>, where:
● <?: indicates the start of an instruction.
● xml: identifies an XML file.
● version="1.0": The XML1.0 standard version is used.
● encoding: indicates the character set encoding format. Only UTF-8 encoding
is supported.
● ?>: indicates the end of an instruction.
Communication Modes
The NETCONF client and server communicate through the RPC mechanism. To
implement the communication, a secure and connection-oriented session must be
established. After receiving an RPC request from the client, the server processes
the request and sends a response message to the client. The RPC request from the
client and the response message from the server are encoded in XML format. The
XML-encoded <rpc> and <rpc-reply> elements provide a request and response
message framework independent of transport layer protocols. Table 1-61 lists
some basic RPC elements.
Element Description
Element Description
Capability Set
NETCONF defines the syntax and semantics of capabilities. The protocol allows
the client and server to notify each other of supported capabilities. The client can
send the operation requests only within the capability range supported by the
server.
Each capability is identified by a unique uniform resource identifier (URI). The URI
format of the capability set defined by NETCONF is as follows:
urn:ietf:params:xml:ns:netconf:capability:{name}:{version}
Configuration Database
A configuration database is a collection of complete configuration parameters for
a device. Table 1-62 describes NETCONF-defined configuration databases.
Configur Description
ation
Database
Configur Description
ation
Database
<startup/ Stores the configuration data loaded during device startup, which is
> similar to the saved configuration file.
To support the <startup/> configuration database, a device must
have the distinct startup capability.
Request Message
Figure 1-138 shows the structure of a complete NETCONF request message.
A NETCONF request message consists of three layers. Table 1-63 describes the
fields in a NETCONF request message.
● Message: The message layer provides a simple and independent mechanism
of transmitting frames for RPC messages. The client encapsulates an RPC
request into an <rpc> element and sends it to the server, which encapsulates
the result of processing this request into the <rpc-reply> element and sends it
to the client.
● Operations: The operations layer defines a set of basic NETCONF operations.
These operations are invoked by RPC methods that are based on XML
encoding parameters.
● Content: The content (managed object) layer defines a configuration data
model. Currently, mainstream configuration data models include the YANG
model.
Field Description
Field Description
Response Message
If a request message is successfully executed, the device returns a successful
response. Otherwise, the device returns a failed response.
● For a successful response, an <rpc-reply> message carrying the <ok> element
is returned.
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="10"
nc-ext:flow-id="33"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/></rpc-reply>
Field Description
Overview
Subtree filtering is a mechanism that allows an application to query particular
data for a <get> or <get-config> operation.
Subtree filtering provides a small set of filters for inclusion, simple content exact-
match, and selection. The NETCONF agent does not need to use any semantics
specific to any particular data model during processing, allowing for simple and
centralized implementation policies.
Namespace If namespaces are used, the filter output will include only
selection elements from the specified namespace.
Content match A content match node is a leaf node that contains simple
node content within a subtree filter.
This node is used to select some or all of its relevant nodes
for filter output and represents an exact-match filter of the
leaf node element content.
Component Description
● Namespace selection
If the XML namespace associated with a specific node in the <filter> element
is the same as that in the underlying data model, the namespace is matched.
<filter type="subtree">
<top xmlns="http://example.com/schema/1.2/config"/>
</filter>
In this example, the <top> element is a selection node. If the node namespace
complies with http://example.com/schema/1.2/config, the node and its
child nodes will be included in the filter for output.
● Containment node
The child element of a containment node can be a node of any type,
including another containment node. For each containment node specified in
the subtree filter, all data model instances that completely match the
specified namespace and element hierarchy, and any attribute-matching
expression are included in the output.
<filter type="subtree">
<top xmlns="http://example.com/schema/1.2/config">
<users/>
</top>
</filter>
In this example, the <top> element is a containment node.
● Content match node
A leaf node that contains simple content is called a content match node. It is
used to select some or all of its sibling nodes for filter output and represents
exact match of the leaf node element content.
<filter type="subtree">
<top xmlns="http://example.com/schema/1.2/config">
<users>
<user>
<name>fred</name>
</user>
</users>
</top>
</filter>
In this example, both the <users> and <user> nodes are containment nodes,
and the <name> node is a content match node. Because the sibling nodes of
the <name> node are not specified, only <user> nodes that comply with
namespace http://example.com/schema/1.2/config, with their element
hierarchies matching the name element and their values being fred, can be
included in the filter output. All sibling nodes of the <name> node are
included in the filter output.
NOTE
The support-filter statement in the YANG model indicates whether filtering based on
node content is supported when a node is being operated.
● For key nodes, filtering based on node content is supported by default.
● For non-key nodes, filtering based on node content is not supported by default. If
the value of the support-filter statement is set to true for a non-key node, filtering
based on node content is supported.
● Selection node
Selection nodes represent a basic data model for an explicit selection of
filters. If any selection node appears in a group of same-level sibling nodes,
the filter selects a specified subtree and suppresses the automatic selection of
the entire sibling node set in the basic data model. In a filtering expression,
an empty tag (such as <foo/>) or an expression with explicit start and end
tags (such as <foo> </ foo>) can be used to specify an empty leaf node. In
this case, all blank characters will be ignored.
<filter type="subtree">
<top xmlns="http://example.com/schema/1.2/config">
<users/>
</top>
</filter>
In this example, the <top> node is a containment node, and the <users> node
is a selection node. The <users> node can be included for filter output only
when the <users> node complies with namespace http://example.com/
schema/1.2/config and is contained in the <top> element in the root
directory of the configuration database.
RPC reply
<rpc-reply message-id="101"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<data>
<!-- ... entire set of data returned ... -->
</data>
</rpc-reply>
● If an empty filter is used, the query result contains no data output, in that no
content match or selection node is specified.
RPC request
<rpc message-id="101"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<get>
<filter type="subtree">
</filter>
</get>
</rpc>
RPC reply
<rpc-reply message-id="101"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<data>
</data>
</rpc-reply>
● Multi-subtree filtering
The following example uses the root, fred, and barney subtree filters.
The root subtree filter contains two containment nodes (<users> and <user>),
one content match node (<name>), and one selection node (<company-
info>). As for subtrees that meet selection criteria, only <company-info> is
selected.
The fred subtree filter contains three containment nodes (<users>, <user>,
and <company-info>), one content match node (<name>), and one selection
node (<id>). As for subtrees that meet the selection criteria, only the <id>
element in <company-info> is selected.
The barney subtree filter contains three containment nodes (<users>, <user>,
and <company-info>), two content match nodes (<name> and <type>), and
one selection node (<dept>). User barney is not of the userbarney type and
does not comply with the subtree filtering rule. Therefore, the entire subtree
of barney (including its parent node <user>) is not selected.
RPC request
<rpc message-id="101"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<get-config>
<source>
<running/>
</source>
<filter type="subtree">
<ifm xmlns="http://example.com/schema/1.2/config">
<users>
<user>
<name>root</name>
<company-info/>
</user>
<user>
<name>fred</name>
<company-info>
<id/>
</company-info>
</user>
<user>
<name>barney</name>
<type>userbarney</type>
<company-info>
<dept/>
</company-info>
</user>
</users>
</ifm>
</filter>
</get-config>
</rpc>
RPC reply
<rpc-reply message-id="101"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<data>
<ifm xmlns="http://example.com/schema/1.2/config">
<users>
<user>
<name>root</name>
<company-info>
<dept>1</dept>
<id>1</id>
</company-info>
</user>
<user>
<name>fred</name>
<company-info>
<id>2</id>
</company-info>
</user>
</users>
</ifm>
</data>
</rpc-reply>
get-config
The <get-config> operation queries all or specified configuration data sets.
● source: specifies a configuration database in which configuration data is
being queried. The value can be <running/>, <candidate/>, or <startup/>.
● filter: specifies a range to be queried in the configuration database. If this
parameter is not specified, all configurations on the device are returned.
The following example shows how to query interface configuration of the IFM
feature in the <running/> database. The queried interface information is contained
in an RPC reply message.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="827">
<get-config>
<source>
<running/>
</source>
<filter type="subtree">
<ifm:ifm xmlns:ifm="urn:huawei:yang:huawei-ifm">
<ifm:interfaces>
<ifm:interface/>
</ifm:interfaces>
</ifm:ifm>
</filter>
</get-config>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<class>main-interface</class>
<type>GigabitEthernet</type>
<number>0/1/1</number>
<admin-status>up</admin-status>
<link-protocol>ethernet</link-protocol>
<statistic-enable>true</statistic-enable>
<mtu>1500</mtu>
<spread-mtu-flag>false</spread-mtu-flag>
<vrf-name>_public_</vrf-name>
</interface>
</interfaces>
</ifm>
</data>
get-data
</task-group>
<task-group>
<name>system-tg</name>
</task-group>
<task-group>
<name>monitor-tg</name>
</task-group>
<task-group>
<name>visit-tg</name>
</task-group>
</task-groups>
</aaa>
</data>
</rpc-reply>
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<get-data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda"
xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">
<datastore>ds:running</datastore>
<xpath-filter xmlns:aaa="urn:huawei:yang:huawei-aaa">/aaa:aaa/aaa:task-groups/aaa:task-group</
xpath-filter>
</get-data>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5">
<data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda">
<aaa xmlns="urn:huawei:yang:huawei-aaa">
<task-groups>
<task-group>
<name>manage-tg</name>
</task-group>
<task-group>
<name>system-tg</name>
</task-group>
<task-group>
<name>monitor-tg</name>
</task-group>
<task-group>
<name>visit-tg</name>
</task-group>
</task-groups>
</aaa>
</data>
</rpc-reply>
get
The <get> operation only retrieves data from the <running/> configuration
database.
If the <get> operation is successful, the NETCONF server returns an <rpc-reply>
element containing a <data> element with the results of the query. If the
operation fails, the server returns an <rpc-reply> element containing an <rpc-
error> element.
NOTE
The following example shows how to query interface configuration of the IFM
feature in the database. The queried interface information is contained in an RPC
reply message.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="831">
<get>
<filter type="subtree">
<ifm:ifm xmlns:ifm="urn:huawei:yang:huawei-ifm">
<ifm:interfaces>
<ifm:interface/>
</ifm:interfaces>
</ifm:ifm>
</filter>
</get>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<index>4</index>
<class>main-interface</class>
<type>GigabitEthernet</type>
<position>0/0/0</position>
<number>0/1/1</number>
<admin-status>up</admin-status>
<link-protocol>ethernet</link-protocol>
<statistic-enable>true</statistic-enable>
<mtu>1500</mtu>
<spread-mtu-flag>false</spread-mtu-flag>
<vrf-name>_public_</vrf-name>
<dynamic>
<oper-status>up</oper-status>
<physical-status>up</physical-status>
<link-status>up</link-status>
<mtu>1500</mtu>
<bandwidth>100000000</bandwidth>
<ipv4-status>up</ipv4-status>
<ipv6-status>down</ipv6-status>
<is-control-flap-damp>false</is-control-flap-damp>
<mac-address>00e0-fc12-3456</mac-address>
<line-protocol-up-time>2019-05-25T02:33:46Z</line-protocol-up-time>
<is-offline>false</is-offline>
<link-quality-grade>good</link-quality-grade>
</dynamic>
<mib-statistics>
<receive-byte>0</receive-byte>
<send-byte>0</send-byte>
<receive-packet>363175</receive-packet>
<send-packet>61660</send-packet>
<receive-unicast-packet>66334</receive-unicast-packet>
<receive-multicast-packet>169727</receive-multicast-packet>
<receive-broad-packet>127122</receive-broad-packet>
<send-unicast-packet>61363</send-unicast-packet>
<send-multicast-packet>0</send-multicast-packet>
<send-broad-packet>299</send-broad-packet>
<receive-error-packet>0</receive-error-packet>
<receive-drop-packet>0</receive-drop-packet>
<send-error-packet>0</send-error-packet>
<send-drop-packet>0</send-drop-packet>
</mib-statistics>
<common-statistics>
<stati-interval>300</stati-interval>
<in-byte-rate>40</in-byte-rate>
<in-bit-rate>320</in-bit-rate>
<in-packet-rate>2</in-packet-rate>
<in-use-rate>0.01%</in-use-rate>
<out-byte-rate>0</out-byte-rate>
<out-bit-rate>0</out-bit-rate>
<out-packet-rate>0</out-packet-rate>
<out-use-rate>0.00%</out-use-rate>
<receive-byte>0</receive-byte>
<send-byte>0</send-byte>
<receive-packet>363183</receive-packet>
<send-packet>61662</send-packet>
<receive-unicast-packet>66334</receive-unicast-packet>
<receive-multicast-packet>169727</receive-multicast-packet>
<receive-broad-packet>127122</receive-broad-packet>
<send-unicast-packet>61363</send-unicast-packet>
<send-multicast-packet>0</send-multicast-packet>
<send-broad-packet>299</send-broad-packet>
<receive-error-packet>0</receive-error-packet>
<receive-drop-packet>0</receive-drop-packet>
<send-error-packet>0</send-error-packet>
<send-drop-packet>0</send-drop-packet>
<send-unicast-bit>0</send-unicast-bit>
<receive-unicast-bit>0</receive-unicast-bit>
<send-multicast-bit>0</send-multicast-bit>
<receive-multicast-bit>0</receive-multicast-bit>
<send-broad-bit>0</send-broad-bit>
<receive-broad-bit>0</receive-broad-bit>
<send-unicast-bit-rate>0</send-unicast-bit-rate>
<receive-unicast-bit-rate>0</receive-unicast-bit-rate>
<send-multicast-bit-rate>0</send-multicast-bit-rate>
<receive-multicast-bit-rate>0</receive-multicast-bit-rate>
<send-broad-bit-rate>0</send-broad-bit-rate>
<receive-broad-bit-rate>0</receive-broad-bit-rate>
<send-unicast-packet-rate>0</send-unicast-packet-rate>
<receive-unicast-packet-rate>0</receive-unicast-packet-rate>
<send-multicast-packet-rate>0</send-multicast-packet-rate>
<receive-multicast-packet-rate>0</receive-multicast-packet-rate>
<send-broadcast-packet-rate>0</send-broadcast-packet-rate>
<receive-broadcast-packet-rate>0</receive-broadcast-packet-rate>
</common-statistics>
</interface>
</ifm>
</data>
edit-config
The <edit-config> operation loads all or some configurations to a specified target
configuration database (<running/> or <candidate/>).
– RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="15"
nc-ext:flow-id="27"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
The following example shows how to delete the configuration of the interface
named LoopBack1023 from the running configuration database.
– RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="844">
<edit-config>
<target>
<running/>
</target>
<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" nc:operation="delete">
<name>LoopBack1023</name>
</interface>
</interfaces>
</ifm>
</config>
</edit-config>
</rpc>
– RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="844"
nc-ext:flow-id="29"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="849"
nc-ext:flow-id="31"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
<running/>
</target>
<config>
<l2vpn xmlns="urn:huawei:yang:huawei-l2vpn">
<instances xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" nc:operation="delete"/>
</l2vpn>
</config>
</edit-config>
</rpc>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="849"
nc-ext:flow-id="31"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
edit-data
The <edit-data> operation can be used to load all or some configuration data to a
specified target configuration database (<ietf-datastores:running/> or <ietf-
datastores:candidate/>). The device authorizes the operation in <edit-data>. After
the authorization succeeds, the device performs corresponding modification.
The <edit-data> operation supports multiple modes for loading configurations. For
example, you can load local and remote files, and edit files online. If a NETCONF
server supports the URL capability, the <url> parameter (which identifies a local
configuration file) can be used to replace the <config> parameter.
Parameters in an RPC message of the <edit-data> operation are described as
follows:
● <config>: indicates a group of hierarchical configuration items defined in the
data model.
The <config> parameter may contain the optional operation attribute, which
is used to specify an operation type for a configuration item. If the operation
attribute is not present, the <merge> operation is performed by default. The
<operation> attribute values are as follows:
– merge: modifies or creates data in the database. This is the default
operation.
– create: adds configuration data to the configuration database only if
such data does not exist. If the configuration data already exists, <rpc-
error> is returned, in which the <error-tag> value is data-exists.
– delete: deletes a specified configuration data record from the
configuration database. If the data exists, it is deleted. If the data does
not exist, <rpc-error> is returned, in which the <error-tag> value is data-
missing.
– remove: removes a specified configuration data record from the
configuration database. If the data exists, it is deleted. If the data does
not exist, a success message is returned.
– replace: replaces configuration data records in the configuration
database. If the data exists, all relevant data is replaced. If the data does
not exist, the data is created. Different from the <copy-config> operation
(which completely replaces the configuration data in the target
The following example shows how to change the description value of the
GigabitEthernet0/1/1 interface in the <ietf-datastores:running/> database to
huawei.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5">
<edit-data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda"
xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">
<datastore>ds:running</datastore>
<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<description>huawei</description>
</interface>
</interfaces>
</ifm>
</config>
</edit-data>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="5"
nc-ext:flow-id="27"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
The following example shows how to delete the configuration of the interface
named LoopBack1023 from the running configuration database.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5">
<edit-data xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda"
xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">
<datastore>ds:running</datastore>
<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" nc:operation="delete">
<name>LoopBack1023</name>
</interface>
</interfaces>
</ifm>
</config>
</edit-data>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="5"
nc-ext:flow-id="28"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
copy-config
The <copy-config> operation replaces the target configuration database with the
source configuration database. The target database is overwritten if it exists, or a
new one is created, if allowed.
● The configuration data in the <candidate/> and <running/> databases can be
saved to a specified URL file.
● The configuration data in the <running/> database can be copied to the
<candidate/> or <startup/> database.
Save the configuration data in the <running/> database to the local abc.xml file:
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<copy-config>
<target>
<url>file:///abc.xml</url>
</target>
<source>
<running/>
</source>
</copy-config>
</rpc>
● RPC reply
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
delete-config
This operation deletes a configuration database. The <running/> configuration
database cannot be deleted.
If the <delete-config> operation is successful, the server sends an <rpc-reply>
element containing an <ok> element. Otherwise, the server sends an <rpc-reply>
element containing an <rpc-error> element.
The following is an example of deleting the <startup/> database.
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<delete-config>
<target>
<startup/>
</target>
</delete-config>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
lock
This operation locks a configuration database of a device, preventing it from being
modified by other users. The locks eliminate errors caused by simultaneous
modifications of the database by NETCONF managers or SNMP or CLI scripts.
If the configuration database is already locked by an authorized user, the <error-
tag> element will be displayed as lock-denied and the <error-info> element will
include <session-id> of the lock owner in the reply message.
The following example shows a successful locking of the <running/> configuration
database.
● RPC request
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
If the NMDA data set is supported, the data set format in the target configuration
database is different, as shown in the following:
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<lock xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">
<target>
<datastore xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda">ds:running</datastore>
</target>
</lock>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<lock>
<target>
<running/>
</target>
</lock>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<rpc-error>
<error-type>protocol</error-type>
<error-tag>lock-denied</error-tag>
<error-severity>error</error-severity>
<error-app-tag>43</error-app-tag>
<error-message>The configuration is locked by other user. [Session ID = 629] </error-message>
<error-info>
<session-id>629</session-id>
<error-paras>
<error-para>629</error-para>
</error-paras>
</error-info>
</rpc-error>
</rpc-reply>
If the NMDA data set is supported, the data set format in the target configuration
database is different, as shown in the following:
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<lock xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">
<target>
<datastore xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda">ds:running</datastore>
</target>
</lock>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<rpc-error>
<error-type>protocol</error-type>
<error-tag>lock-denied</error-tag>
<error-severity>error</error-severity>
<error-app-tag>43</error-app-tag>
<error-message>The configuration is locked by other user. [Session ID = 629] </error-message>
<error-info>
<session-id>629</session-id>
<error-paras>
<error-para>629</error-para>
</error-paras>
</error-info>
</rpc-error>
</rpc-reply>
unlock
This operation cancels the <lock> operation performed by the specified user, rather
than the <lock> operation performed by other users.
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<unlock>
<target>
<running/>
</target>
</unlock>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
If the NMDA data set is supported, the data set format in the target configuration
database is different, as shown in the following:
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<unlock xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">
<target>
<datastore xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda">ds:running</datastore>
</target>
</unlock>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
close-session
This operation terminates a NETCONF session.
After receiving a <close-session> request, the NETCONF server terminates the
current NETCONF session. The server releases all locks and resources associated
with the session. After receiving a <close-session> request, the NETCONF server
ignores all request messages of the session.
The following is an example of terminating the current NETCONF session.
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<close-session/>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
kill-session
The <kill-session> operation forcibly terminates a NETCONF session. Only an
administrator is authorized to perform this operation.
After receiving a <kill-session> request, the NETCONF server stops all operations
that are being performed for the session, releases all the locks and resources
associated with the session, and terminates the session.
If the NETCONF server receives a <kill-session> request when performing the
<commit> operation, it must restore the configuration to the state before the
configuration is committed.
The following is an example of forcibly terminating the NETCONF session with the
session ID of 4.
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<kill-session>
<session-id>4</session-id>
</kill-session>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
Writable-running
This capability indicates that the device supports direct writes to the <running/>
configuration database. Specifically, the device supports <edit-config> and <copy-
config> operations on the <running/> configuration database.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<edit-config>
<target>
<running/>
</target>
<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<mtu>1500</mtu>
</interface>
</interfaces>
</ifm>
</config>
</edit-config>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="101"
nc-ext:flow-id="27"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
Candidate Configuration
This capability indicates that the device supports the <candidate/> configuration
database.
The <candidate/> configuration database holds a complete set of configuration
data that can be manipulated without impacting the device's current
configuration. This configuration database serves as a work place for manipulating
configuration data.
Additions, deletions, and changes can be made to the data in the <candidate/>
configuration database to construct the desired configuration data. The following
operations can be performed at any time:
● <commit>: converts all configuration data in the <candidate/> configuration
database into running configuration data.
If the <commit> operation fails, the content in the <candidate/> configuration
database remains unchanged.
● <discard-changes>: discards uncommitted configuration data in the
<candidate/> configuration database. After this operation is performed, the
configuration data in the <candidate/> configuration database is the same as
that in the <running/> configuration database again.
A device establishes an independent <candidate/> configuration database for each
NETCONF session.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<edit-config>
<target>
<candidate/>
</target>
<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<mtu>1500</mtu>
</interface>
</interfaces>
</ifm>
</config>
</edit-config>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="101">
<ok/>
</rpc-reply>
Confirmed Commit
This capability indicates that the device can confirm configurations. In other
words, the <commit> message delivered in this instance does not directly commit
the configuration and depends on the next <commit> message to trigger
configuration commitment.
confirmed-commit:1.0
The <commit> operation can carry the <confirmed> and <confirm-timeout>
parameters.
● <confirmed>: submits the configuration data in the <candidate/>
configuration database and converts it into the running configuration data on
a device (configuration data in the <running/> configuration database).
● <confirm-timeout>: specifies a timeout period for confirming the <commit>
operation, in seconds. The default value is 600s. After the <commit> operation
is performed, if the confirmation operation is not performed within the
timeout period, the configuration in the <running/> configuration database is
rolled back to the state before the <commit> operation is performed and the
modified data in the <candidate/> configuration database is abandoned.
This capability is valid only when the device supports the candidate configuration
capability. It is mainly used in service trial running and verification scenarios.
The following is an example of submitting the current configuration and setting
the timeout period for confirming the <commit> operation to 120s.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<commit>
<confirmed/>
<confirm-timeout>120</confirm-timeout>
</commit>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="101"
nc-ext:flow-id="29"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
confirmed-commit:1.1
● The <commit> operation can carry the <persist> and <persist-id> parameters.
If a <confirmed-commit> message carries the <persist> parameter, the trial
run operation created using <confirmed-commit> is still effective after the
associated session is terminated. The device allows a message to carry the
<persist-id> parameter to update an existing trial run operation.
The following example shows how to carry the <persist> parameter in a
message for the <commit> operation.
RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="3">
<commit>
<confirmed/>
<persist>123</persist>
</commit>
</rpc>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="3"
nc-ext:flow-id="29"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
The following example shows how to carry the <persist-id> parameter in a
message for the <commit> operation.
RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<commit>
<confirmed/>
<persist-id>123</persist-id>
</commit>
</rpc>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="2"
nc-ext:flow-id="29"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
● The <cancel-commit> operation is supported. The <persist-id> parameter can
be carried to terminate the trial run operation being executed, which is
created using <confirmed-commit> with the <persist> parameter.
RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<cancel-commit>
<persist-id>IQ,d4668</persist-id>
</cancel-commit>
</rpc>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<ok/>
</rpc-reply>
Rollback on Error
This capability allows the device to perform a rollback when an error occurs.
Specifically, "rollback-on-error" can be carried in the <error-option> parameter of
the <edit-config> operation. If an error occurs and the <rpc-error> element is
generated, the server stops performing the <edit-config> operation and restores
the specified configuration to the state before the <edit-config> operation is
performed.
This capability is valid only when the device supports the candidate configuration
capability.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<edit-config>
<target>
<running/>
</target>
<error-option>rollback-on-error</error-option>
<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<mtu>1000</mtu>
</interface>
</interfaces>
</ifm>
</config>
</edit-config>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="101"
nc-ext:flow-id="27"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
Distinct Startup
This capability indicates that the device can perform an independent startup.
Specifically, the device can distinguish the <running/> configuration database from
the <startup/> configuration database.
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<copy-config>
<source>
<running/>
</source>
<target>
<startup/>
</target>
</copy-config>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
XPath Capability
This capability indicates that the device can use XPath expressions in the <filter>
element as query conditions, and the <get> and <get-config> operations can
query specified data through an XPath.
XPath — XML Path Language — uses path expressions for the addressing of parts
of an XML file. The XPath syntax is similar to the file path in the file management
system.
XPath syntax specifications are as follows:
● An XPath can only function as a basic absolute path, and steps are separated
using slashes (/), for example, /acl/aclGroups/aclGroup.
● Only predicates in the [node name='value'] format (for example,
[genre='Computer']) are supported, and there can be multiple predicates in
an AND relationship.
● XPath supports multiple namespaces, which are separated using colons.
If an XPath expression is used as a filter criterion, the value of the type attribute in
the <filter> element is xpath, and the value of the select attribute (which must
exist) is the XPath expression.
<filter type="xpath" xmlns:acl="urn:huawei:yang:huawei-acl" select="/acl:acl/acl:groups/
acl:group[acl:identity='2000']"/>
NOTE
XPath expressions cannot be used as filter criteria for such operations as notifications, full
synchronization, incremental synchronization, or copy-config.
</source>
<filter xmlns:acl="urn:huawei:yang:huawei-acl" type="xpath"
select="/acl:acl/acl:groups/acl:group"/>
</get-config>
</rpc>
– RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="6">
<data>
<acl xmlns="urn:huawei:yang:huawei-acl">
<groups>
<group>
<identity>2000</identity>
<type>basic</type>
<match-order>config</match-order>
<step>5</step>
</group>
</groups>
</acl>
</data>
</rpc-reply>
▪ RPC request
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1">
<get-config>
<source>
<running/>
</source>
<filter type="xpath" xmlns:acl="urn:huawei:yang:huawei-acl"
select="/acl:acl/acl:groups/acl:group[acl:identity='2000']"/>
</get-config>
</rpc>
▪ RPC reply
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1">
<data>
<acl xmlns="urn:huawei:yang:huawei-acl">
<groups>
<group>
<identity>2000</identity>
<type>basic</type>
<match-order>config</match-order>
<step>5</step>
</group>
</groups>
</acl>
</data>
</rpc-reply>
<candidate/>
</source>
<filter type="xpath" select="/t:nacm/t:rule-list/t:group | /t:nacm/t:rule-list/t:rule"
xmlns:t="urn:ietf:params:xml:ns:yang:ietf-netconf-acm"/>
</get-config>
</rpc>
– RPC reply
<rpc-reply message-id="1" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<data>
<nacm xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-acm">
<rule-list>
<name>list1</name>
<group>group1</group>
<rule>
<name>rule11</name>
<module-name>*</module-name>
<access-operations>create read update delete</access-operations>
<action>permit</action>
<rpc-name>commit</rpc-name>
</rule>
<rule>
<name>rule12</name>
<module-name>*</module-name>
<access-operations>read</access-operations>
<action>deny</action>
<rpc-name>edit-config</rpc-name>
</rule>
</rule-list>
<rule-list>
<name>list2</name>
<group>group2</group>
<rule>
<name>rule21</name>
<module-name>*</module-name>
<access-operations>create read update delete</access-operations>
<action>permit</action>
<rpc-name>commit</rpc-name>
</rule>
</rule-list>
</nacm>
</data>
</rpc-reply>
● Use the /* symbol as a filter criterion to query information about all nodes in
the specified XPath (before the * symbol).
The following is an example of querying information about all nodes in the /
nacm XPath of the <candidate/> database.
– RPC request
<rpc message-id="1" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<get-config>
<source>
<candidate/>
</source>
<filter type="xpath" select="/t:nacm/*" xmlns:t="urn:ietf:params:xml:ns:yang:ietf-netconf-
acm"/>
</get-config>
</rpc>
– RPC reply
<rpc-reply message-id="1" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<data>
<nacm xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-acm">
<enable-nacm>false</enable-nacm>
<read-default>deny</read-default>
<write-default>deny</write-default>
<exec-default>deny</exec-default>
<groups>
<group>
<name>group1</name>
<user-name>puneeth1</user-name>
<user-name>puneeth2</user-name>
<user-name>puneeth3</user-name>
</group>
<group>
<name>group2</name>
<user-name>puneeth1</user-name>
<user-name>puneeth2</user-name>
<user-name>puneeth3</user-name>
</group>
</groups>
<rule-list>
<name>list1</name>
<group>group1</group>
<rule>
<name>rule11</name>
<module-name>*</module-name>
<access-operations>create read update delete</access-operations>
<action>permit</action>
<rpc-name>commit</rpc-name>
</rule>
<rule>
<name>rule12</name>
<module-name>*</module-name>
<access-operations>read</access-operations>
<action>deny</action>
<rpc-name>edit-config</rpc-name>
</rule>
</rule-list>
</nacm>
</data>
</rpc-reply>
▪ The left boundary value must be less than or equal to the right
boundary value.
▪ The left and right boundary values are integers ranging from 1 to
1000000000. If the left boundary of the specified query range
exceeds the actual number of data records to be queried, no query
result is displayed.
– The pagination query function supports query based on multiple filter
criteria, meaning that each query can contain more than one filter
criterion.
For example, the following expression contains two filter criteria,
indicating that the LoopBack port data of nodes 1 to 100 is queried.
select="/ifm:ifm/ifm:interfaces/ifm:interface[ifm:type='LoopBack']
[position() >= 1 and position()<= 100]"
– Only the list and leaf-list nodes support the pagination query function,
and no other node can follow the position() parameter.
For example:
select="/ifm:ifm/ifm:interfaces/ifm:interface[position() >= 1 and
position() <= 100] "
In the preceding expression, the node interface is a list node, and the
expression [position() >= 1 and position() <= 100] is not followed by
another node.
– Multiple position() parameters cannot be combined by the OR symbol (|)
to deliver the pagination query operation. To query different services, you
must therefore deliver the pagination query operations separately.
– If a user sends two pagination query requests at a maximum interval of 3
minutes, the entered XPaths are the same (same prefix, namespace, and
node), and the input numbers for the pagination query are consecutive,
the device considers the later query request as part of the first one and
preferentially obtains the data to be queried from the cache. If the input
numbers for pagination query are not consecutive or the interval
between two requests exceeds 3 minutes, the later query operation is
processed as a new request. The queried content is obtained from the
device configuration database.
For example:
▪ The same XPath indicates that the prefixes, namespaces, and nodes
are identical. If one of them is different, the queries are considered to
also be different. For example, the XPath prefixes of the following
two expressions are considered different, meaning that the device
processes them as two independent requests.
select="/t:ifm/t:interfaces/t:interface[t:type='LoopBack'][position() >=
1 and position()<= 100]"
select="/l:ifm/l:interfaces/l:interface[l:type='LoopBack'][position() >=
101 and position()<= 200]"
NOTE
During packet delivery, the greater-than sign (>) and less-than sign (<) in the
position() expression must be represented by the escape characters > and <.
For example, query information about the first and second NACM
authentication user groups in the <running/> configuration database.
– RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="827">
<get-config>
<source>
<running/>
</source>
<filter xmlns:t="urn:ietf:params:xml:ns:yang:ietf-netconf-acm" type="xpath"
select="/t:nacm/t:groups/t:group[position()>=1 and position()<=2]"/>
</get-config>
</rpc>
– RPC reply
<?xml version="1.0" encoding="utf-8"?>
<data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<nacm xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-acm">
<groups>
<group>
<name>1</name>
<user-name>test1</user-name>
<user-name>test2</user-name>
<user-name>test3</user-name>
<user-name>test4</user-name>
</group>
<group>
<name>2</name>
<user-name>test1</user-name>
<user-name>test2</user-name>
<user-name>test3</user-name>
</group>
</groups>
</nacm>
</data>
Validate
This capability indicates that the device can deliver configurations without
considering the configuration sequence. During the delivery, the device checks only
the syntactic validity of configurations rather than the configuration sequence. The
device checks semantic validity when committing the configurations. After
correcting the configuration delivery sequence, the device commits the
configurations to the <running/> configuration database.
Before performing the validate operation, you are advised to lock the <running/>
configuration database to prevent adverse impacts on the validate operation when
other users operate the <running/> configuration database.
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<validate>
<source>
<candidate/>
</source>
</validate>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
If the NMDA data set is supported, the data set format in the source configuration
database is different, as shown in the following:
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<validate xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">
<source>
<datastore xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-nmda">ds:running</datastore>
</source>
</validate>
</rpc>
● RPC reply
<rpc-reply message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
There are two types of validate checks: syntactic and semantic checks.
● Syntactic check: checks RPC packet validity, model matching, data type, value
range, authorization, whether data to be created already exists or data to be
deleted has already been deleted, and whether there is a parent node.
● Semantic check: checks semantic items, such as the dependency between
configurations.
The <source> parameter of the validate operation supports only the <candidate/>
and <running/> configuration databases.
With the validate capability supported, the <edit-config> operation supports the
<test-option> parameter. The value of this parameter is test-then-set, set, or test-
only. If this parameter is not carried in the <edit-config> operation, the system
follows the test-then-set process by default.
● test-then-set: The system checks the delivered configurations for syntactic and
semantics errors. If the check succeeds, the system modifies the configuration.
If the check fails, the system displays a failure message and the failure cause
and does not modify the configuration.
● set: The system checks configurations for syntactic errors. If no errors are
found, the system commits the configurations to the <candidate/>
configuration database. Semantic errors are not checked. However, when
performing the commit or confirmed-commit operation, the system checks
configurations for semantic errors and commits the configurations to the
<running/> configuration database if no errors are found.
● test-only: The system checks configurations only for syntactic and semantic
errors and reports the result without committing the configurations to any
configuration database.
The interface name of the ifm feature in the <running/> database is changed to
text, and syntax and semantic verification examples are provided.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc message-id="2" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<edit-config>
<target>
<running/>
</target>
<test-option>test-then-set</test-option>
<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" nc:operation="merge">
<name>GigabitEthernet0/1/1</name>
<description>text</description>
</interface>
</interfaces>
</ifm>
</config>
</edit-config>
</rpc>
● RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="2"
nc-ext:flow-id="27"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
URL
This capability indicates that the device can modify or copy files in a specified
path. Currently, the <edit-config> and <copy-config> operations are supported.
Password information in URLs is protected. When configuration data is exported,
password information is exported in ciphertext.
● <edit-config>: submits the configuration file in a specified path to
<candidate/> or <running/>.
● <copy-config>: copies data in <candidate/> or <running/> to a file in a
specified path.
Currently, the SFTP, FTP, file, HTTP, and HTTPS protocols are supported.
● The SFTP or FTP protocol is used to query files on an SFTP or FTP server. The
path format is ftp://user name:password@IP address of the SFTP or FTP
server/file directory/file name.
● The file protocol is used to query local files. The path format is file:///file
directory/file name.
● The HTTP or HTTPS protocol is used to search for files on an HTTP or HTTPS
server. The path format is http (or https)://IP address of the HTTP or HTTPS
server (or DNS):port number/file directory/file name.
NOTE
The file name is a string of case-sensitive characters starting with an underscore (_) or a
letter. It supports only underscores, digits, and letters. The dot (.) can be used only in the
file name extension, and only one dot is supported. The file name including a path cannot
contain more than 256 characters.
For the <copy-config> operation, if the file specified in the <url> element does not exist, the
file is directly created. If the file exists, it is overwritten.
When you perform the <edit-config> operation, the file specified in <url> must exist.
The HTTP or HTTPS protocol supports only the <edit-config> operation in a YANG model.
Copy the data in the <running/> configuration database to the local abc.xml file.
● RPC request
<?xml version="1.0" encoding="UTF-8"?>
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<copy-config>
<target>
<url>file:///abc.xml</url>
</target>
<source>
<running/>
</source>
</copy-config>
</rpc>
● RPC reply
<?xml version="1.0" encoding="UTF-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5">
<ok/>
</rpc>
● RPC request
<?xml version="1.0" encoding="UTF-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<edit-config>
<target>
<candidate/>
</target>
<url>http://192.168.1.1:8080/config.xml</url>
</edit-config>
</rpc>
● RPC reply
<?xml version="1.0" encoding="UTF-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<ok/>
</rpc>
Notification Capabilities
Notification 1.0
A device can send alarms and events to a client using the NETCONF notification
capability, thereby allowing the client to promptly detect device configuration or
other changes. You can perform the <create-subscription> operation to subscribe
to device alarms and events. If the <rpc-reply> element returned by the device
contains an <ok> element, the <create-subscription> operation is successful. In this
case, the device will proactively report the generated alarms and events to the
client through NETCONF.
1. Alarms and events can be subscribed to in either of the following modes:
long-term subscription and subscription within a specified period.
– Long-term subscription: After the subscription is successful, if the
<startTime> element is specified in the subscription message, the device
sends historical alarms and events to the NMS and then sends a
<replayComplete> message to notify the NMS that the replay is
complete. If a new alarm or event is generated, the device also sends it to
the NMS. If the <startTime> element is not specified in the subscription
message, the device sends all newly generated alarms and events to the
NMS. After a NETCONF session is terminated, the subscription is
automatically canceled.
– Subscription within a specified period: After the subscription is successful,
the device sends the alarms and events that are generated during the
specified period and that meet the filtering conditions to the NMS.
Because the <startTime> element is specified in the subscription message,
the device sends historical alarms and events to the NMS and then sends
a <replayComplete> message to notify the NMS that the replay is
complete. When the specified <stopTime> has been reached, the
NETCONF module sends a <notificationComplete> message to notify the
NMS that the subscription is terminated.
Historical alarms and events refer to those generated from the <startTime>
specified in the subscription message to when the user performs the
subscription operation. If <stopTime> is not specified, the subscription is a
long-term one. If both <startTime> and <stopTime> are specified, the
subscription is within a specified period. The format of the subscription
message sent by the device to the NMS is as follows:
RPC request (NETCONF subscription)
2. After the subscription is successful, the device encapsulates the alarm or event
information into notification messages and sends them to the NMS.
<notification xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-26T13:51:00Z</eventTime>
<hwCPUUtilizationResume xmlns="urn:huawei:yang:huawei-sem">
<TrapSeverity>0</TrapSeverity>
<ProbableCause>0</ProbableCause>
<EventType>0</EventType>
<PhysicalIndex>0</PhysicalIndex>
<PhysicalName>SimulateStringData</PhysicalName>
<RelativeResource>SimulateStringData</RelativeResource>
<UsageType>0</UsageType>
<SubIndex>0</SubIndex>
<CpuUsage>0</CpuUsage>
<Unit>0</Unit>
<CpuUsageThreshold>0</CpuUsageThreshold>
</hwCPUUtilizationResume>
</notification>
3. After alarms and events are reported to the NMS, the NETCONF module
sends a subscription completion message to the NMS.
– After historical alarms and events are reported to the NMS, the NETCONF
module sends a replayComplete message to the NMS.
<notification xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<eventTime>2016-11-29T11:57:15Z</eventTime>
Notification 2.0
Notification 1.0 cannot meet flexibility requirements. To modify a subscription, you
need to disable the connection and start a new subscription connection.
Notification 2.0 optimized the subscription mechanism. It supports modification,
Create a subscription and allow only alarms meeting the filter criteria to be
reported:
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<establish-subscription xmlns="urn:ietf:params:xml:ns:netconf:notification:2.0">
<filter type="subtree">
<hwCPUUtilizationRisingAlarm xmlns="urn:huawei:yang:huawei-sem" />
<hwCPUUtilizationResume xmlns="urn:huawei:yang:huawei-sem" />
<hwStorageUtilizationRisingAlarm xmlns="urn:huawei:yang:huawei-sem" />
</filter>
</establish-subscription>
</rpc>
● RPC reply
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="101">
<subscription-result xmlns="urn:ietf:params:xml:ns:yang:ietf-subscribed-notifications">ok</
subscription-result>
<identifier xmlns="urn:ietf:params:xml:ns:yang:ietf-subscribed-notifications">1</identifier>
</rpc-reply>
YANG-library
This capability indicates that a device can provide the YANG capabilities that it
supports. Basic information about YANG modules that a server supports can be
viewed on a NETCONF client. The information includes the module name, YANG
model version, namespace, and list of submodules and is saved in the local buffer.
Field description:
● revision: indicates the revision date. It is the same as the module revision
date.
RPC request
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="23">
<get>
<filter type="subtree">
<modules-state xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-library">
<module-set-id></module-set-id>
<module>
<name>ietf-yang-library</name>
<conformance-type>implement</conformance-type>
</module>
<module>
<name>huawei-aaa</name>
</module>
</modules-state>
</filter>
</get>
</rpc>
Information contained in the reply includes the module-set-id value, YANG module
version used, namespace, list of submodules, and revision date. If the reply does
not contain the YANG module version information, YANG1.0 is used by default.
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<data xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<modules-state xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-library">
<module-set-id>2148066159</module-set-id>
<module>
<name>ietf-yang-library</name>
<revision>2016-06-21</revision>
<namespace>urn:ietf:params:xml:ns:yang:ietf-yang-library</namespace>
<conformance-type>implement</conformance-type>
</module>
<module>
<name>huawei-aaa</name>
<revision>2020-03-23</revision>
<namespace>urn:huawei:yang:huawei-aaa</namespace>
<conformance-type>implement</conformance-type>
<deviation>
<name>huawei-aaa-deviations-cx</name>
<revision>2020-03-23</revision>
</deviation>
<submodule>
<name>huawei-aaa-lam</name>
<revision>2020-03-23</revision>
</submodule>
<submodule>
<name>huawei-aaa-type</name>
<revision>2020-03-23</revision>
</submodule>
</module>
</modules-state>
</data>
Sync
This capability enables a device to perform full or incremental data
synchronization. Through data synchronization, the NMS or controller that
manages network devices can have the same configuration data with NEs in real
time.
Full Synchronization
The <sync-full> operation requests a device to implement full data
synchronization. After the NMS connects to an NE for the first time, it
synchronizes all data of the NE to the NMS.
The YANG model defines the capability in the huawei-netconf-sync.yang file.
After the server receives an <rpc> element containing a <sync-full> element, the
server performs a syntax check on the <rpc> element. If the element fails the
syntax check, the server returns an <rpc-reply> element containing an <rpc-error>
element to terminate processing. Otherwise, the server responds with an <rpc-
reply> element, obtains the synchronization data, and encapsulates the data into
XML files (one XML file per feature). The maximum size of each XML file is 300
MB. If the data exceeds 300 MB, it is written into multiple files, which are
compressed into a .zip file and then automatically transferred to a specified
directory using FTP or SFTP.
Full synchronization supports the following functions:
● Cancels a specific full data synchronization operation.
● Uploads a full data synchronization file.
● Queries the file upload progress.
Example of full data synchronization: The server uses FTP to automatically transfer
AAA module configurations in the obtained full synchronization data to the home
directory of the user root (password: root) on the server whose IP address is
10.1.1.1. The data is saved as a file named Multi_App_sync_full.zip.
● RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4">
<sync-full xmlns="urn:huawei:yang:huawei-netconf-sync">
<target>
<user-name>root</user-name>
<password>root</password>
<target-addr>10.1.1.1</target-addr>
<path>/home</path>
</target>
<transfer-protocol>ftp</transfer-protocol>
<transfer-method>auto</transfer-method>
<filename-prefix>Multi_App_sync_full</filename-prefix>
<app-err-operation>stop-on-error</app-err-operation>
<filter>
<aaa xmlns="urn:huawei:yang:huawei-aaa"/>
</filter>
</sync-full>
</rpc>
● RPC reply
The RPC reply message carries a full data synchronization identifier assigned
by the NETCONF server. This message is returned using the <sync-full-id>
parameter.
NOTE
After full synchronization is triggered, the RPC reply message sent by the device carries
the nc-ext attribute.
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns:nc-sync="urn:huawei:yang:huawei-netconf-sync"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="2"
nc-ext:flow-id="32">
<nc-sync:sync-full-id>185</nc-sync:sync-full-id>
</rpc-reply>
The following is an example of uploading the full synchronization file through the
upload-sync-file operation.
● RPC request
<rpc message-id="upload" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<upload-sync-file xmlns="urn:huawei:yang:huawei-netconf-sync">
<sync-full-id>185</sync-full-id>
<result-save-time>1</result-save-time>
</upload-sync-file>
</rpc>
● RPC reply
<?xml version="1.0" encoding="UTF-8"?>
<rpc-reply message-id="upload" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<ok/>
</rpc-reply>
The following is an example of using the <get> operation to query the file upload
progress.
● RPC request
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="query_status185">
<get>
<filter type="subtree">
<synchronization xmlns="urn:huawei:yang:huawei-netconf-sync">
<file-transfer-statuss>
<file-transfer-status>
<sync-full-id>185</sync-full-id>
<status></status>
<progress></progress>
<error-message></error-message>
</file-transfer-status>
</file-transfer-statuss>
</synchronization>
</filter>
</get>
</rpc>
● RPC reply
<?xml version="1.0" encoding="UTF-8"?>
<rpc-reply message-id="query_status12" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<data>
<synchronization xmlns="urn:huawei:yang:huawei-netconf-sync">
<file-transfer-statuss>
<file-transfer-status>
<sync-full-id>12</sync-full-id>
<status>In-Progress</status>
<progress>50</progress>
</file-transfer-status>
</file-transfer-statuss>
</synchronization>
</data>
</rpc-reply>
Incremental Synchronization
The <sync-increment> operation requests a device to synchronize incremental
configuration data. When the configuration changes, the client detects the change
through the configuration change identifier flow-id. Each time the configuration
changes, the value of flow-id increases by 1. If the client needs to obtain the
modified configuration, it synchronizes data incrementally.
If the <sync-increment> operation succeeds, the NETCONF server replies with an
<rpc-reply> element that contains the <data> element. The <data> element
contains the data that was changed between two configuration committing
operations. If the operation fails, the server returns an <rpc-reply> element
containing an <rpc-error> element.
<sync-increment> uses the difference attribute to identify the change operation of
a configuration data instance. The YANG model defines the capability in the
huawei-netconf-metadata.yang file.
The following is an example of an incremental data synchronization operation
that synchronizes IFM module configurations between change points 6 and 7.
● RPC request
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<sync-increment xmlns="urn:huawei:yang:huawei-netconf-sync">
<target>
<flow-id>7</flow-id>
</target>
<source>
<flow-id>6</flow-id>
</source>
<filter type="subtree">
<ifm xmlns="urn:huawei:yang:huawei-ifm"/>
</filter>
</sync-increment>
</rpc>
● RPC reply
<rpc-reply xmlns:nc-md="urn:huawei:yang:huawei-netconf-metadata">
<data xmlns="urn:huawei:yang:huawei-netconf-sync">
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaceName>Vlanif 1</interfaceName>
<ifAm4s>
<ifAm4 nc-md:difference="create">
<ipAddress>10.1.1.1</ipAddress>
<netMask>255.255.255.0</netMask>
<addressType/>
</ifAm4>
</ifAm4s>
</interface>
</interfaces>
</ifm>
</data>
</rpc-reply>
Active Notification
The Active Notification capability enables a device to periodically send keepalive
messages to a client when the device is processing a time-consuming operation.
This prevents a timeout when the client does no receive a response from the
device. When the device processes time-consuming RPC requests, such as <copy-
config> and other operations, the device periodically (at an interval of 20s) sends
a netconf-rpc-keepalive notification message to the client to ensure that the
connection is active.
The YANG model defines the capability in the huawei-ietf-netconf-ext.yang file.
A client needs to subscribe to keepalive notification to receive keepalive messages
when it sends a time-consuming RPC request.
In the following example, the client subscribes to the netconf-rpc-keepalive
notification message and the server reports a keepalive message.
● RPC request
<netconf:rpc netconf:message-id="101" xmlns:netconf="urn:ietf:params:xml:ns:netconf:base:1.0">
<create-subscription xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<filter netconf:type="subtree">
<nc-ext:netconf-rpc-keepalive xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"/>
</filter>
</create-subscription>
</netconf:rpc>
● Notification reporting
<netconf:rpc netconf:message-id="101" xmlns:netconf="urn:ietf:params:xml:ns:netconf:base:1.0">
<create-subscription xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<filter netconf:type="subtree">
<nc-ext:netconf-rpc-keepalive xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"/>
</filter>
</create-subscription>
</netconf:rpc>
Commit-Description
The Commit-Description capability enables a user to specify a description when a
device performs a <commit> operation. The description can be used as a
mnemonic when rolling back configurations.
The description is carried in the description parameter of the commit operation.
The YANG model defines the capability in the huawei-ietf-netconf-ext.yang file.
● RPC request
<?xml version='1.0' encoding='UTF-8'?>
<rpc message-id="101" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<commit>
<description xmlns="urn:huawei:yang:huawei-ietf-netconf-ext">Config interfaces</description>
</commit>
</rpc>
● RPC reply
<?xml version='1.0' encoding='UTF-8'?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="101"
nc-ext:flow-id="31"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
With-defaults
The <with-defaults> capability indicates that a device can process default values
of the model. The <get>, <get-config>, and <copy-config> operations can carry the
<with-defaults> parameter.
The available options of the <with-defaults> parameter are as follows:
● report-all: queries all nodes and does not perform any operation on the
nodes.
– RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4">
<get xmlns:wsss="urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults">
<filter type="subtree">
<system xmlns="urn:huawei:yang:huawei-system"/>
</filter>
<with-defaults xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults">report-all</with-
defaults>
</get>
</rpc>
– RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4">
<data>
<system xmlns="urn:huawei:yang:huawei-system">
<systemInfo>
<lsRole>admin</lsRole>
<authenFlag>false</authenFlag>
</systemInfo>
</system>
</data>
</rpc-reply>
● trim: trims the nodes whose values equal the default ones from the query
results.
– RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="3">
<get xmlns:wsss="urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults">
<filter type="subtree">
<system xmlns="urn:huawei:yang:huawei-system"/>
</filter>
<with-defaults xmlns="urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults">trim</with-
defaults>
</get>
</rpc>
– RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="3">
<data>
<system xmlns="urn:huawei:yang:huawei-system">
<systemInfo>
<lsRole>admin</lsRole>
</systemInfo>
</system>
</data>
</rpc-reply>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext"
xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
message-id="2"
nc-ext:flow-id="31"
nc-ext:flow-id-time="2022-05-11T10:19:30Z">
<ok/>
</rpc-reply>
– The default value of the leaf node ifDf is true. In this example, the value
is true, which is different from the default value (false) defined in the
YANG file. After the <edit-config> operation is performed, <rpc-error> is
returned. error-para includes the incorrect node name and the actual
value.
RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<edit-config xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"
xmlns:wd="urn:ietf:params:xml:ns:netconf:default:1.0">
<target>
<running/>
</target>
<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" nc:operation="merge">
<ifName>GigabitEthernet0/1/1</ifName>
<ifDf wd:default="true">true</ifDf>
</interface>
</interfaces>
</ifm>
</config>
</edit-config>
</rpc>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<rpc-error>
<error-type>application</error-type>
<error-tag>bad-element</error-tag>
<error-severity>error</error-severity>
<error-path xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"
xmlns:ifm="urn:huawei:yang:huawei-ifm">/nc:rpc/nc:edit-config/nc:config/ifm:ifm/
ifm:interfaces/ifm:interface[ifm:ifName='Ethernet0/1/0']/ifm:ifDf</error-path>
<error-message xml:lang="en">ifDf has invalid value true.</error-message>
<error-info xmlns:nc-ext="urn:huawei:yang:huawei-ietf-netconf-ext">
<bad-element>ifDf</bad-element>
<nc-ext:error-info-code>317</nc-ext:error-info-code>
<nc-ext:error-paras>
<nc-ext:error-para>ifDf</nc-ext:error-para>
<nc-ext:error-para>true</nc-ext:error-para>
</nc-ext:error-paras>
</error-info>
</rpc-error>
</rpc-reply>
YANG Push
Based on the NETCONF client/server model, the YANG push capability
encapsulates the data that a user is interested in as notifications periodically or
according to the triggering conditions and sends them to the user.
The configuration and status data on a device can be expressed using the YANG
model. The client can use YANG to dynamically obtain configuration and status
data from the device. The client is expected to dynamically detect configuration or
status data changes or monitor changes of some key data. The YANG push
capability provides a mechanism to periodically report device YANG model data to
the client based on subscription conditions. The device periodically reports data
that is of interest to the user to the specified data receiver according to the
reporting mode, data type, and other information specified in the subscription
request packet.
NOTE
A device can proactively report data that a user is interested in only after the user
subscribes successfully.
The subscription is terminated after a device switchover or restart, or a NETCONF
connection is interrupted. If you need the device to continue to send change information,
you need to create a subscription again.
● Create a dynamic subscription and subscribe to the <running/> database
configuration changes of the system module. The end time is 2020-03-20, and
the subscription interval is 300 seconds. A subscription ID is returned in the
reply message.
RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<establish-subscription xmlns="urn:ietf:params:xml:ns:yang:ietf-subscribed-notifications"
xmlns:yp="urn:ietf:params:xml:ns:yang:ietf-yang-push">
<yp:datastore xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">ds:running</yp:datastore>
<yp:datastore-xpath-filter xmlns:sys="urn:huawei:yang:huawei-system"
xmlns:t="urn:huawei:yang:huawei-acl">/sys:system|/t:acl</yp:datastore-xpath-
filter>
<encoding>encode-xml</encoding>
<yp:periodic>
<yp:period>300000</yp:period>
<yp:anchor-time>2020-03-20T08:00:00Z</yp:anchor-time>
</yp:periodic>
</establish-subscription>
</rpc>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="2">
<id xmlns="urn:ietf:params:xml:ns:yang:ietf-subscribed-notifications">7</id>
</rpc-reply>
RPC reply
● Query all dynamic subscriptions and their information on the current device.
The reply message returns the dynamic subscription created on the device and
its detailed information.
RPC request
<?xml version="1.0" encoding="utf-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4">
<get>
<filter>
<subscriptions xmlns="urn:ietf:params:xml:ns:yang:ietf-subscribed-notifications">
<subscription/>
</subscriptions>
</filter>
</get>
</rpc>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="4">
<data>
<subscriptions xmlns="urn:ietf:params:xml:ns:yang:ietf-subscribed-notifications">
<subscription>
<id>7</id>
<datastore xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-push"
xmlns:ds="urn:ietf:params:xml:ns:yang:ietf-datastores">ds:running</datastore>
<datastore-xpath-filter xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-push"
xmlns:system="urn:huawei:yang:huawei-system">/system:system/
system:systemInfo</datastore-xpath-filter>
<encoding>encode-xml</encoding>
<periodic xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-push">
<period>180000</period>
<anchor-time>2020-03-20T08:00:00Z</anchor-time>
</periodic>
</subscription>
</subscriptions>
</data>
</rpc-reply>
RPC reply
<?xml version="1.0" encoding="utf-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="5">
<ok/>
</rpc-reply>
Feature Requirements
The device can use only SSH as the transport NetEngin NetEngine 8000
protocol of NETCONF. Before using NETCONF e 8000 M M14/NetEngine
to manage network devices, you must 8000 M14K/
configure SSH. NetEngine 8000
M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8/NetEngine
8100 M14/
NetEngine 8100
M8
If the NMS client only notifies the base NetEngin NetEngine 8000
capability in compliance with the standard, the e 8000 M M14/NetEngine
YANG mode is used for interconnection. If the 8000 M14K/
exchange capability is advertised, the Huawei NetEngine 8000
proprietary schema mode is used for M4/NetEngine
interconnection. 8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8/NetEngine
8100 M14/
NetEngine 8100
M8
ncclient functioning as the NETCONF client can establish a NETCONF session with
a device (NETCONF server).
Before performing NETCONF operations, you need to install Python and then
ncclient.
Context
Configuring an SSH user includes the following tasks: creating an SSH user and
configuring the authentication mode for the SSH user. The authentication modes
supported by the device include RSA, password, password-rsa, DSA, password-dsa,
ECC, password-ecc, password-x509v3-rsa, x509v3-rsa, sm2, password-sm2, and all.
● password-rsa: The password authentication and RSA authentication
requirements must be met.
● password-dsa: The password authentication and DSA authentication
requirements must be met.
● password-ecc: The password authentication and ECC authentication
requirements must be met.
● password-x509v3-rsa: The password authentication and X509V3-SSH-RSA
authentication requirements must be met.
● password-sm2: The password authentication and SM2 authentication
requirements must be met.
● all: The requirements of any one of the authentication modes must be met.
The SSH protocol supports SSH1.X (earlier than SSH2.0) and SSH2.0
(recommended). In SSH2.0, the symmetric encryption algorithm using the CBC
mode may encounter plaintext recovery attacks and leak encrypted data.
Therefore, the CBC mode is not recommended for data encryption in SSH2.0.
RSA (1024 bits or less) is an insecure encryption algorithm. You are advised to use
a secure algorithm.
Procedure
Step 1 Enter the system view.
system-view
If no SSH user is configured using the ssh user user-name command, run the ssh
authentication-type default password command to configure password
authentication as the default authentication mode. This facilitates configuration if
multiple users need to use password authentication, because you only need to
configure AAA users.
● The password authentication mode is implemented based on AAA. When the
password, password-rsa, password-x509v3-rsa, password-dsa, password-sm2,
or password-ecc authentication mode is used to log in to the device, you need
to create a local user in the AAA view with the same name as the SSH user.
● If an SSH user is authenticated using the RSA, DSA, SM2, or ECC
authentication mode, both the SSH server and client need to generate the
local RSA, DSA, SM2, or ECC key pair and have each other's public key
configured locally.
Configure the authentication mode based on the preceding configuration. For
details, see Table 1-69.
Table 1-70 Creating a local user in the AAA view with the same name as the SSH
user
Step Command Description
local-user user-name
password [ cipher user- For security purposes,
Configure the local
password | irreversible- change the password
username and password.
cipher irreversible- periodically.
cipher-password ]
Configure a service type local-user user-name
-
for the local user. service-type ssh
Table 1-71 Configuring the local RSA, DSA, SM2, or ECC key for the SSH user
Step Command Description
By default, the
authentication type of
the SSH connection is
AAA.
When the authentication
type is AAA, only the
password authentication
mode can be configured.
If the public key
Configure an authentication mode is
ssh authorization-type
authentication type for used, perform either of
default { aaa | root }
the SSH connection. the following operations:
● Run this command
with the
authentication type
set to root.
● In the AAA view,
create a local user
with the same name
as the SSH user.
● If hex-data is invalid,
the key cannot be
generated after you
run this command.
● If the key specified by
key-name has been
Exit the public key deleted in another
public-key-code end view, the system
editing view.
displays a message
indicating that the
key does not exist and
directly returns to the
system view when
you run this
command.
----End
Context
A NETCONF connection can be established between the client and server using
the well-known port 22 only after NETCONF is enabled on the server.
A device functioning as an SSH server can establish a NETCONF connection with a
client through the following two ports:
● Well-known port 22: Before the SSH server can set up a NETCONF session
with the client through this port, the snetconf server enable command must
be run on the SSH server.
● Well-known port 830: Only the protocol inbound ssh port 830 command
needs to be run on the SSH server (running the snetconf server enable
command is not required).
Procedure
Step 1 Enter the system view.
system-view
● Enable the NETCONF service of the SSH server so that the client can use TCP
port 830 to set up a NETCONF connection with the server.
netconf
protocol inbound ssh [ ipv4 | ipv6 ] port 830
quit
commit
NOTICE
After the NETCONF service of the SSH server is disabled on TCP port 22 or 830, all
clients connecting to port 22 or 830 through NETCONF are disconnected.
----End
Context
If an NMS does not support automatic device discovery, it cannot manage devices
as soon as they go online. To address this problem, you can configure proactive
NETCONF registration. This enables a device to send a NETCONF connection
request to the NMS when the device goes online, allowing the NMS to manage
the device.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Create a callhome template and enter the callhome template view.
callhome callhome-name
Step 4 Configure the interval at which the device sends NETCONF connection requests to
the NMS.
reconnection interval interval
Step 8 Configure the IP address and TCP port number of the NMS that establishes a
NETCONF connection with the device, as well as the device's source IP address and
VPN instance.
peer-ip ip-address port port-number [ [ local-address source-ip ] | [ vpn-instance vpn-instance | public-
net ] ] *
----End
Context
If there are multiple NETCONF YANG models, such as huawei-if-ip.yang and
huawei-ip.yang, you can perform the following operations to switch between the
models as required.
Procedure
Step 1 Enter the system view.
system-view
NOTE
Multiple models cannot take effect at the same time. When one model is activated, the
configurations and query functions of the other models are disabled.
----End
Context
After the preceding configuration is complete, you can log in to the server from
the client using the NMS. This allows you to remotely configure devices.
The NMS can manage devices only after it has established a connection and can
communicate with them.
Before deploying NEs, divide the network into subnets as required. The physical
topology must be easy for routine maintenance in addition to showing the actual
network structure.
NOTE
If the Huawei NMS is used, creating NEs will consume specific upgrade licenses or NE
resource licenses. If there are no remaining NE resources or specific upgrade licenses, the
system displays a message indicating that it cannot create additional NEs. In this case,
apply for NE resources or specific upgrade licenses.
For installation and maintenance of the NMS, see the relevant installation
instruction and usage guidelines.
Context
CLI and NETCONF are two device management models, which have a mapping
relationship. To quickly obtain NETCONF YANG model packets corresponding to
configuration commands, perform the following steps.
Procedure
1. Enter the system view.
system-view
– To abort the CLI-to-XML translation and exit the translation mode, run
the following command:
xml-translate abort
Procedure
● Run the display ssh user-information [ username ] command on the SSH
server to check information about SSH users.
● Run the display ssh server status command on the SSH server to check its
global configuration.
● Run the display ssh server session command on the SSH server to check
information about sessions between the SSH server and the SSH client
(client).
● Run the display netconf capability command to check the capabilities that
the server supports.
● Run the display netconf session command to check information about all
NETCONF sessions.
● Run the display netconfc session [ peer-id peer-id ] command to check
NETCONFC session information.
----End
Networking Requirements
When the NMS is used to centrally manage devices on a network that requires
high security and scalability, you can use NETCONF to ensure communication
between the NMS and the devices.
On the network shown in Figure 1-139, the NMS is deployed on the client that
functions as the SSH client. The server functions as the SSH server, which receives
connection requests from and establishes a connection with the SSH client,
implementing configuration file management using NETCONF. SSH is a secure
application-layer protocol, thereby enhancing the reliability of NETCONF.
Precautions
An SSH user named client001 is used as an example. If password authentication is
used to authenticate the SSH user, the server needs to generate an Elliptic Curves
Cryptography (ECC) key.
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure an IP address for the server interface connecting to the client so
that the Layer 3 route between the client and server is reachable.
2. Configure virtual type terminal (VTY) user interfaces on the server to support
SSH so that SSH users can be managed and monitored with better connection
security.
3. Deploy SSH on the server to improve NETCONF security.
a. Create an SSH user with administrative rights.
b. Create an ECC key pair.
c. Configure an authentication mode for the SSH user.
d. Configure a service type for the SSH user.
4. Enable NETCONF so that the client can log in to the server.
5. Deploy the NMS on the client to implement NMS-based network
management on the client.
6. Log in to the server using the NMS to manage configuration files remotely.
Procedure
Step 1 Configure an IP address for the server interface connecting to the client.
<HUAWEI> system-view
[~HUAWEI] sysname netconf-agent
[*HUAWEI] commit
[~netconf-agent] interface gigabitethernet 0/1/1
[*netconf-agent-GigabitEthernet0/1/1] ip address 10.1.1.1 24
[*netconf-agent-GigabitEthernet0/1/1] quit
[*netconf-agent] commit
NOTE
After SSH is configured, the device automatically disables the Telnet function.
After the ECC key pair is created, run the display ecc local-key-pair public
command to check information about the public key in the ECC key pair.
3. Configure an authentication mode for the SSH user.
[~netconf-agent] ssh user client001 authentication-type password
[*netconf-agent] commit
Step 5 Deploy the NMS on the client and log in to the server through the NMS.
n = m._session.id
print("The session id is %s." % (n))
if __name__ == '__main__':
test_connect(sys.argv[1], sys.argv[2], sys.argv[3], sys.argv[4])
Relevant parameters are as follows:
def huawei_connect():
return manager.connect(host="10.1.1.1",
port=830,
username="client001",
password="YsHsjx_202206",
hostkey_verify = False,
device_params={'name': "huaweiyang"},
allow_agent = False,
look_for_keys = False)
def test_connect():
with huawei_connect() as m:
n = m._session.id
print("The session id is %s." % (n))
if __name__ == '__main__':
test_connect()
b. Navigate to the path where the Python file resides and execute the file:
>python huawei-connect-2.py
----End
----End
# Run the display ssh user-information command to check SSH user information.
[~netconf-agent] display ssh user-information
--------------------------------------------------------------------------------
User Name : client001
Authentication-Type : password
User-public-key-name : -
User-public-key-type : -
Sftp-directory :-
Service-type : snetconf
--------------------------------------------------------------------------------
Total 1, 1 printed
# Run the display ssh server status command to check global configurations of
the SSH server.
[~netconf-agent] display ssh server status
SSH Version : 2.0
SSH authentication timeout (Seconds) : 60
SSH authentication retries (Times) :3
SSH server key generating interval (Hours) : 0
SSH version 1.x compatibility : Enable
SSH server keepalive : Disable
SFTP IPv4 server : Disable
SFTP IPv6 server : Disable
STELNET IPv4 server : Disable
STELNET IPv6 server : Disable
SNETCONF IPv4 server : Enable
SNETCONF IPv6 server : Enable
SNETCONF IPv4 server port(830) : Disable
SNETCONF IPv6 server port(830) : Disable
SSH IPv4 server port : 22
SSH IPv6 server port : 22
ACL name :
ACL number :
ACL6 name :
ACL6 number :
SSH server ip-block : Enable
# Run the display netconf capability command to check the capabilities that the
server supports.
[~netconf-agent] display netconf capability
--------------------------------------------------
Capability
--------------------------------------------------
urn:ietf:params:netconf:base:1.0
urn:ietf:params:netconf:base:1.1
urn:ietf:params:netconf:capability:writable-running:1.0
urn:ietf:params:netconf:capability:candidate:1.0
urn:ietf:params:netconf:capability:confirmed-commit:1.0
urn:ietf:params:netconf:capability:confirmed-commit:1.1
urn:ietf:params:netconf:capability:rollback-on-error:1.0
urn:ietf:params:netconf:capability:validate:1.0
urn:ietf:params:netconf:capability:validate:1.1
urn:ietf:params:netconf:capability:startup:1.0
urn:ietf:params:netconf:capability:url:1.0?scheme=file,ftp,sftp
urn:ietf:params:netconf:capability:xpath:1.0
urn:ietf:params:netconf:capability:notification:1.0
urn:ietf:params:netconf:capability:interleave:1.0
urn:ietf:params:netconf:capability:with-defaults:1.0?basic-mode=report-all&also-supported=report-all-
tagged,trim
urn:ietf:params:netconf:capability:yang-library:1.0?revision=2016-06-21&module-set-id=1903662584
http://www.huawei.com/netconf/capability/sync/1.0
http://www.huawei.com/netconf/capability/sync/1.1
http://www.huawei.com/netconf/capability/sync/1.2
http://www.huawei.com/netconf/capability/sync/1.3
http://www.huawei.com/netconf/capability/exchange/1.0
http://www.huawei.com/netconf/capability/exchange/1.2
http://www.huawei.com/netconf/capability/active/1.0
http://www.huawei.com/netconf/capability/action/1.0
http://www.huawei.com/netconf/capability/discard-commit/1.0
http://www.huawei.com/netconf/capability/execute-cli/1.0
http://www.huawei.com/netconf/capability/update/1.0
http://www.huawei.com/netconf/capability/commit-description/1.0
http://www.huawei.com/netconf/capability/sync-config/1.0
http://www.huawei.com/netconf/capability/sync-config/1.1
http://www.huawei.com/netconf/capability/schema/1.0
--------------------------------------------------
Configuration Scripts
Server
#
sysname netconf-agent
#
aaa
local-user client001 password irreversible-cipher $1d$81&FR0T'4Jo#YvBu
$#xMPY2{x(9PKGM@fU0&PP^BH(*|7W+b1tAM91X+A$
local-user client001 service-type ssh
local-user client001 privilege level 3
#
interface GigabitEthernet0/1/1
ip address 10.1.1.1 255.255.255.255
#
snetconf server enable
ssh user client001
ssh user client001 authentication-type password
ssh user client001 service-type all
#
return
Overview
Huawei NETCONF Access Control Model (HUAWEI-NACM) supports the following
functions:
● Protocol operation authorization: allows user access within specified
NETCONF protocol operations.
Such operations include <edit-config>, <get>, <sync-full>, <sync-inc>, and
<commit>.
● Module authorization: authorizes users to access specific feature modules,
such as Telnet-client, L3VPN, OSPF, Fault-MGR, Device-MGR, and IS-IS.
● Data node authorization: authorizes users to query and modify specific data
nodes,
such as /ifm/interfaces/interface/ifAdminStatus/devm/globalPara/
maxChassisNum.
The rules for protocol operation authorization and data node authorization can be
configured using commands.
NOTE
Implementation
HUAWEI-NACM authorization mechanism is similar to the task authorization
mechanism used to regulate command authorization. HUAWEI-NACM
authorization is designed based on the NETCONF access control model.
Authentication, authorization and accounting (AAA) defines tasks, task groups,
and user groups. The task authorization mechanism uses a three-layer permission
control model. This model organizes commands into tasks, tasks into task groups,
and task groups into user groups.
HUAWEI-NACM authorization is implemented based on the task authorization
mechanism. HUAWEI-NACM authorization subscribes to required authorization
information and stores the obtained information in its local data structures.
NETCONF operations are implemented based on NETCONF sessions established
using SSH. HUAWEI-NACM authorization applies only to SSH users.
● The user and user group are associated. After users are added to a user group,
they have the same permissions.
The operation permissions of a user are defined by the user group to which
the user belongs.
● The user group and task group are associated. A user group consists of
multiple task groups.
● The task group and task are associated.
A task group is a group of tasks. A task can be assigned one or more of the
following permissions when being added to a task group: read, write, and
execute.
Commands for each feature or module belong to a single task. Tasks are pre-
configured and cannot be added, modified, or deleted.
Figure 1-140 and Figure 1-141 show the HUAWEI-NACM authorization
mechanism, which adds NETCONF operation rules and data node rules based on
the task authorization mechanism.
Benefits
HUAWEI-NACM authorization is a mechanism used to manage the permissions for
specific users to perform NETCONF operations and access NETCONF resources so
that these users can only execute or access a pre-configured subset of NETCONF-
defined protocol operations and capability sets.
Overview
IETF-NACM provides simple and easy-to-configure database access control rules. It
helps flexibly manage specific users' permissions to perform NETCONF operations
and access NETCONF resources.
NOTE
Authorization is performed only for the delivered operations (it is not performed for all the
changed nodes in the model tree). For example, when a delete operation is performed for a
parent node, this operation automatically applies to its child nodes without authorization.
In this case, the data of both the parent node and its child nodes is deleted.
Components of IETF-NACM
Table 1-74 describes the components and functions of IETF-NACM.
Name Description
Name Description
Name Description
Implementation
After a NETCONF session is established and a user passes the authentication, the
NETCONF server controls access permissions based on the username, group name,
and NACM authorization rule list. Authorization rules are associated with users
through the user group. The administrator of a user group can manage the
permissions of users in the group.
When a user group and an authorization rule list are traversed, if the username
that is the same as that carried in the request is not found or no rule that matches
the requested operation is detected, the operation performed varies with the
authorized content. For details, see Table 1-75.
Context
After a NETCONF session is established using SSH, all SSH users can use NETCONF
to manage devices, imposing security risks. To resolve this problem, you can
configure NETCONF authorization rules to authorize specific users to perform
NETCONF operations or access NETCONF resources.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Create a task group and enter the task group view.
task-group task-group-name
Step 4 Configure NETCONF authorization rules for protocol operation and data nodes,
and add the task to the task group.
netconf authorization-rule rule-name { { deny { rpc-operation rpc-oper-name | schema-path data-node-
path } } | { permit { rpc-operation rpc-oper-name | schema-path data-node-path access-operation { read
| write | execute }* } } } [ description description-text ]
Step 7 Create a user group and enter the user group view.
user-group user-group-name
----End
Context
NACM authorization is an IETF-defined, more flexible authorization mode. NACM
authorization rules allow you to define NACM authorization rules to control
specific users' permissions to perform NETCONF operations and access NETCONF
resources.
Procedure
Step 1 Enter the system view.
system-view
Step 6 Create an NACM user group and enter the NACM user group view.
group-name group-name
user-name user-name
Step 10 Create a NACM authorization rule list and enter the NACM authorization rule list
view.
rule-list-name list-name
Step 11 Associate the NACM user group with the NACM authentication rule list.
group group-name
Step 12 Configure an NACM authorization rule name in the NACM authorization rule list
view.
rule-name rule-name action { permit | deny }
Step 13 (Optional) Configure a description for the NACM authorization rule list.
description description
By default, the feature module name is an asterisk (*), indicating all features.
Step 15 Configure an NACM authorization rule type.
rule-type { rpc-name rpc-name | notification-name notification-name | path path }
----End
Context
To query NETCONF operation logs, you need to enable NETCONF operation log
query.
Procedure
Step 1 Enter the system view.
system-view
----End
Basic Operations
Step 1 Construct the data to be configured, for example, the interface MTU. The
corresponding XPath is /ifm/interfaces/interface.
CREATE_INTERFACE = '''<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<mtu>1500</mtu>
</interface>
</interfaces>
</ifm>
</config>'''
----End
Example
This example shows how to configure a simple Python script to connect to the
device and implement configuration.
# test_edit_config_running.py
import sys
import logging
from ncclient import manager
from ncclient import operations
log = logging.getLogger(__name__)
CREATE_INTERFACE = '''<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<mtu>1500</mtu>
</interface>
</interfaces>
</ifm>qiant
</config>'''
m.commit()
if __name__ == '__main__':
test_edit_config_running(sys.argv[1], sys.argv[2], sys.argv[3], sys.argv[4])
Basic Operations
Step 1 Construct a filtering condition, for example, ifName, and then query details about
all interfaces. The corresponding XPath is /ifm/interfaces/interface.
If you do not need to filter query results, skip this step.
FILTER = '''<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name/>
</interface>
</interfaces>
</ifm>'''
Step 2 Construct a <get> or <get-config> packet and query current running data.
● Construct a <get> packet.
get_reply = m.get(FILTER)
----End
Example
This example shows how to configure a simple Python script to connect to the
device and implement query.
# test_get.py
import sys
import logging
from ncclient import manager
from ncclient import operations
log = logging.getLogger(__name__)
if __name__ == '__main__':
test_get(sys.argv[1], sys.argv[2], sys.argv[3], sys.argv[4])
1.1.16.9.3 Maintenance
Basic Operations
Step 1 Construct an RPC action message based on the corresponding data model. In this
example, action is set to save configuration. The corresponding XPath is /save/
filename.
ACTION = '''<rpc message-id="{}" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<save xmlns="urn:huawei:yang:huawei-cfg">
<filename>test.cfg</filename>
</save>
</rpc>'''
----End
Example
This example shows how to configure a simple Python program to connect to the
device and implement maintenance.
# test_action.py
import sys
import logging
import time
from ncclient import manager
from ncclient import operations
log = logging.getLogger(__name__)
if __name__ == '__main__':
logging.basicConfig(level=logging.DEBUG)
test_action(sys.argv[1], sys.argv[2], sys.argv[3], sys.argv[4])
Basic Operations
● Construct a notification subscription message.
CREATE_SUBSCRIPTION = '''<?xml version="1.0" encoding="UTF-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="{}">
<create-subscription xmlns="urn:ietf:params:xml:ns:netconf:notification:1.0">
<stream>NETCONF</stream>
</create-subscription>
</rpc>'''
Example
This example shows how to configure a simple Python program to connect to the
device and implement event notification.
# test_notification.py
import sys
import logging
from ncclient import manager
from ncclient import operations
log = logging.getLogger(__name__)
port=port,
username=user,
password=password,
hostkey_verify = False,
device_params={'name': "huaweiyang"},
allow_agent = False,
look_for_keys = False)
#3.Send rpc
result = m._session.send(rpc)
if __name__ == '__main__':
logging.basicConfig(level=logging.DEBUG)
test_notification(sys.argv[1], sys.argv[2], sys.argv[3], sys.argv[4])
Basic Operations
Construct a copy-config message and deliver it.
m.copy_config(source="running", target="file:///1.xml")
Example
This example shows how to configure a simple Python program to connect to the
device and export the configuration.
# test_export_config.py
import sys
from ncclient import manager
with m.locked("running"):
m.copy_config(source="running", target="file:///1.xml")
if __name__ == '__main__':
test_export_config(sys.argv[1], sys.argv[2], sys.argv[3], sys.argv[4])
Basic Operations
Step 1 Construct the data to be configured, for example, the interface MTU. The
corresponding XPath is /ifm/interfaces/interface.
CREATE_INTERFACE = '''<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name></name>
<mtu>1300</mtu>
</interface>
</interfaces>
</ifm>
</config>'''
----End
Example
This example shows how to configure a simple Python program to connect to the
device and validate the configuration.
# test_validate.py
import sys
import logging
from ncclient import manager
from ncclient import operations
log = logging.getLogger(__name__)
CREATE_INTERFACE = '''<config>
<ifm xmlns="urn:huawei:yang:huawei-ifm">
<interfaces>
<interface>
<name>GigabitEthernet0/1/1</name>
<mtu>1300</mtu>
</interface>
</interfaces>
</ifm>
</config>'''
xml_str = rpc_obj.xml
if "<ok/>" in xml_str:
print("%s successful" % snippet_name)
else:
print("Cannot successfully execute: %s" % snippet_name)
#validate check
m.validate(source="candidate")
m.commit()
if __name__ == '__main__':
test_validate(sys.argv[1], sys.argv[2], sys.argv[3], sys.argv[4])
Definition
The BootLoader loads and upgrades system software, and commissions and
checks the system after power-on.
The BootLoader menu contains a series of operational menu options provided by
uBoot, the underlying control software. The uBoot program mainly provides two
functions: system software loading and menu control. During device startup, start
the uBoot program and load the system software through it. The menu control
function is presented by the BootLoader menu to facilitate the loading of system
software.
Purpose
In most cases, you do not need to use the BootLoader menu if the device can be
started normally. However, you can use the BootLoader menu to perform the
following operations:
● Restore or upgrade the system when it stops responding and the CLI cannot
be displayed.
For details about the console port connection mode, see "Logging In to the CLI" in
Configuration Guide - Basic Configurations. If third-party terminal emulation software is
used, set communication parameters correctly. If the parameter settings are incorrect, the
third-party terminal emulation software may enter excess characters when you are using
the BootLoader menu. As a result, BootLoader menu operations will be abnormal.
The actual command output varies depending on the device. The command output
provided in this section is only an example.
Shortcut Keys
You can use the following shortcut keys in any BootLoader menu:
● Ctrl+C: cancels the current setting.
New password:
Confirm password:
Warning: The bootloader password will be written to the
device.
Continue now? Yes(y) or No(n): y
Main Menu
1. Default startup
2. Serial submenu
3. Ethernet submenu
4. Startup parameters submenu
5. List file
6. Password manager submenu
7. Reboot
Item Description
Item Description
List file Access this submenu to view the list of all files in the
flash memory.
Item Description
1.1.17.3 Example for Changing the BootLoader Password During First Login
Networking Requirements
By default, the BootLoader has no password, and you are required to set one upon
the first login. To prevent unauthorized users from accessing the BootLoader
menu, you need to change the password periodically.
As shown in Figure 1-143, the serial port on a PC connects to the console port on
a device, and the network port on the PC connects to the management Ethernet
port on the device. You can log in to the device through the terminal emulation
software to change the BootLoader password.
NOTICE
Procedure
Step 1 Log in to the device through the console port. When the message Press Ctrl+B to
enter BOOT menu is displayed during device startup, press Ctrl+B within 3
seconds to access the BootLoader main menu. Access the password management
submenu, enter the old password, and then enter the new password.
Press Ctrl+B to enter BOOT menu: 3
Info: The password is empty. For security purposes, change the password.
New password:
Confirm password:
Warning: The bootloader password will be written to the
device.
Continue now? Yes(y) or No(n): y
Main Menu
1. Default startup
2. Serial submenu
3. Ethernet submenu
4. Startup parameters submenu
5. List file
6. Password manager submenu
7. Reboot
New password: //Enter a new password. The new password cannot be the same as the old
password.
Confirm password:
Warning: The bootloader password will be written to the
device.
Continue now? Yes(y) or No(n): y
----End
Networking Requirements
The BootLoader menu enables you to upgrade the system software. This is useful
if you cannot access the command line interface (CLI) through the console port or
the system restarts repeatedly.
As shown in Figure 1-144, the serial port on a PC connects to the console port on
a device, and the network port on the PC connects to the management Ethernet
port on the device. You can log in to the device through the terminal emulation
software. The PC is configured as the FTP server, and the system software required
for the upgrade is copied to the FTP working directory.
NOTE
To enhance security, you are advised to select SFTP as the FTP service type.
The actual command outputs vary depending on the device. The command outputs
provided in this section are only examples.
Procedure
Step 1 Restart the device. When the message Press Ctrl+B to enter BOOT menu is
displayed during device startup, press Ctrl+B within 3 seconds to access the
BootLoader main menu.
Press Ctrl+B to enter BOOT menu: 3
Info: The password is empty. For security purposes, change the password.
New password:
Confirm password:
Warning: The bootloader password will be written to the
device.
Continue now? Yes(y) or No(n): y
Main Menu
1. Default startup
2. Serial submenu
3. Ethernet submenu
4. Startup parameters submenu
5. List file
6. Password manager submenu
7. Reboot
Step 2 Set FTP parameters on the device for setting up an SFTP connection with the PC.
Main Menu
1. Default startup
2. Serial submenu
3. Ethernet submenu
4. Startup parameters submenu
5. List file
6. Password manager submenu
7. Reboot
Ethernet submenu
1. Update software
2. Display parameters
3. Modify parameters
0. Return
Step 3 Download the system software required for the upgrade from the server. The
device then starts with the system software.
Ethernet submenu
1. Update software
2. Display parameters
3. Modify parameters
0. Return
Update software
----End
1.1.17.5 Example for Clearing the Console Port Login Password Through the
BootLoader Menu
Networking Requirements
If you attempt to log in to a device through the console port but enter an
incorrect console port login password, the login fails. If you cannot remember the
correct console port login password, you can access the BootLoader menu to clear
it. As shown in Figure 1, a PC is connected to a device through the console port,
and the device is powered on.
NOTE
The actual command outputs vary depending on the device. The command outputs
provided in this section are only examples.
Procedure
Step 1 Restart the device. When the message Press Ctrl+B to enter BOOT menu is
displayed during device startup, press Ctrl+B within 3 seconds to access the
BootLoader main menu.
Press Ctrl+B to enter BOOT menu: 3
Info: The password is empty. For security purposes, change the password.
New password:
Confirm password:
Warning: The bootloader password will be written to the
device.
Continue now? Yes(y) or No(n): y
Main Menu
1. Default startup
2. Serial submenu
3. Ethernet submenu
4. Startup parameters submenu
5. List file
6. Password manager submenu
7. Reboot
Step 2 In the BootLoader main menu, enter 6 to access the password manager submenu.
Main Menu
1. Default startup
2. Serial submenu
3. Ethernet submenu
4. Startup parameters submenu
5. List file
6. Password manager submenu
7. Reboot
Step 3 In the password manager submenu, enter 3 to access the Clear the console login
password menu.
Password manager submenu
Step 4 In the Clear the console login password menu, enter y to continue the device
startup.
Caution: A new console password must be set after the restart.
Continue now? Yes(y) or No(n): y
Password: //Enter the BootLoader password and press Enter to continue device startup.
Step 5 After the device starts, log in to the device and reset the console port login
password.
<HUAWEI> system-view
[~HUAWEI] user-interface console 0
[~HUAWEI-ui-console0] authentication-mode password
[*HUAWEI-ui-console0] set authentication password
Please configure the login password (8-16)
Enter Password:
Confirm Password:
[~HUAWEI-ui-console0] commit
[~HUAWEI-ui-console0] return
----End
Background
The theft of network devices can have severe consequences on network
operations, interrupting service continuity and affecting user experience. Stolen
devices are often sold on the black market and subsequently used illegally. The
device anti-theft function restricts the services of stolen devices upon
unauthorized use, thereby reducing the possibility of device theft.
NOTE
This feature is supported only by the NetEngine 8000 M8, NetEngine 8000 M14, NetEngine
8000E M8, NetEngine 8000E M14.
Definition
● Device anti-theft: By restricting the unauthorized use of stolen devices, the
anti-theft function reduces the possibility of device theft because unusable
devices have little value on the black market.
● The Rivest-Shamir-Adleman (RSA) encryption algorithm, an asymmetric
cryptographic algorithm, is widely used in public key encryption standards and
e-commerce. This algorithm can defend against all known password attacks
and is recommended as the public key data encryption standard by the
International Organization for Standardization (ISO).
After the device anti-theft function is enabled for the main control board of a
device, the function is automatically enabled for the service boards that support
the function.
Benefits
● Device anti-theft offers the following benefits to carriers:
– Reduces device theft and protects device investment.
– Ensures network stability.
● Benefits to users
Ensures service continuity.
Concept
Stable operation of the router depends on the mature network planning and
routine maintenance. In addition, fast detection of potential hazards is necessary.
Maintenance personnel must check alarm information immediately and deal with
faults properly to keep the device in normal operation and reduce the failure rate.
Then the system runs safely, stably, and reliably.
● Power-off operation
You can power on or power off a board using command lines to perform hot
swapping without interrupting services of the board with power on the router.
● Master/slave switchover
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M supports the
backup technology. The main control boards work in 1:1 backup mode, which
is the precondition of the master/slave switchover in the system.
● Device monitoring
In routine maintenance, you can run display commands to view the working
status of the router. This helps maintenance personnel fast locate the fault
during the troubleshooting procedure.
● Device restart
In some special cases, for example, in system upgrade, a router must be
restarted for the configuration to take effect. In addition to being restarted
after being powered off, the NetEngine 8100 M, NetEngine 8000E M,
NetEngine 8000 M can be restarted through command lines.
● Board reset
When a board on the device malfunctions and cannot automatically recover,
it is recommended that the board be reset.
Feature Requirements
Do not insert, remove, power on, power off, or NetEngin NetEngine 8000
reset a board during the upgrade of the board e 8000 M M14/NetEngine
firmware. Otherwise, the board is damaged. In 8000 M14K/
this case, you need to run commands to NetEngine 8000
upgrade the board again or return the board M4/NetEngine
for repair. During a board firmware upgrade, a 8000 M8/
message is displayed when an attempt is made NetEngine 8000
to power on, power off, or reset the board by M8K/NetEngine
running the corresponding command. 8000E M14/
NetEngine 8000E
M8
Usage Scenario
Determine the board to be powered off according to the actual situation.
CAUTION
The router cannot work with a single main control board for a long time. If
the main control board fails, the entire system is broken down. Therefore,
after the slave main control board is powered off, you must finish required
operations and restore the slave main control board immediately.
Pre-configuration Tasks
Before powering off the board, complete the following tasks:
● Check the slot of the board to be powered off.
● Prepare a slave board if the board needs to be replaced.
Procedure
● Power off the main control board.
a. Run the system-view command to enter the system view.
b. (Optional) Run the slave switchover command to perform the master/
slave switchover.
This command is supported only on the Admin-VS.
Before powering off the main control board, you need to run the display
device command to view the status of the main control board. If the
main control board is the master main control board, perform the
master/slave switchover first.
c. Run the quit command to return to the system view.
d. Run the power off slot slot-id command to power off the slave main
control board.
● Power off the interface board.
After preparing a spare interface board, you can power off the interface
board.
a. Run the power off slot slot-id [ card card-id ] command to power off the
interface board
NOTE
If there is no terminal on the deployment site, you can power off the interface board
by pressing the OFL button. The OFL button is in the upper part of the panel of the
interface board. Press and hold the button for six seconds. If the OFL indicator lights, it
indicates that the interface board is powered off.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
The BootROM menu password is set for the main control board based on the slot
ID.
You can run the display device command to view slot information.
NOTE
----End
1.1.18.2.5 (Optional) Configuring the Default Slot Number for the SMB
You can set the default slot number of the SMB for the system restart.
Usage Scenario
If both main boards are available, the system determines which one is to be the
SMB when the router restarts. Set the default slot number of the SMB using the
command mentioned in this section.
Pre-configuration Tasks
By configuring the default slot number for the SMB, complete the following tasks:
Procedure
Step 1 Run system-view
----End
Run the display slave default command to check the default slot number of the
SMB.
Usage Scenario
You can manage online devices by checking information about the device or
resetting a board to ensure that the network works normally.
Pre-configuration Tasks
Before managing online devices, install the router and power it on.
Procedure
Step 1 Run the display version [ slot slot-id ] command to check versions of the router.
You can run the display version [ slot slot-id ] command in any view to check
versions of the router. Versions of the router include:
----End
Procedure
Step 1 Run the display device [ pic-status | slot-id ] command to check basic
information about the router.
In practice, you can run this command in any view to view basic information about
the device. slot-id specifies the slot ID of a module.
● Run the display device slot-id command to view basic information of a board.
● Run the display device pic-status command to check basic information about
the subcards of each LPU on the router.
----End
Context
In VS mode, this chapter applies only to the admin VS.
Procedure
Step 1 Run display elabel [ slotid | backplane | brief ]
The electronic label information is displayed.
You can run this command in the user view to check the electronic label of a
board. slotid specifies the slot ID of the board whose electronic label is to be
displayed.
NOTE
For the slot ID range of the router, see the Hardware Description.
Information in the electronic label of a board includes the type, bar code, BOM
number, description, production date, supplier name, issuing number, Common
Language Equipment Identification (CLEI) code, and sales BOM number of the
board.
Step 2 Run display elabel optical-module { brief | interface ifnum }
The electronic label of an optical module is displayed.
----End
Procedure
Step 1 Run display software info
The software package ID is displayed.
----End
Procedure
● You can view the memory usage in any of the following methods:
– Run the display memory-usage [ slave | slot slot-id ] command to view
the memory utilization statistics.
– Run the display memory-usage threshold [ slave | slot slot-id ]
command to view the memory usage threshold configuration.
NOTE
You can run the set memory-usage threshold threshold-value [ restore restore-
threshold-value ] [ slot slot-id ] command to set the overload threshold and
alarm recovery threshold of memory usage.
----End
Procedure
● You can view the CPU utilization statistics and the CPU usage configuration in
any of the following methods:
– Run the display cpu-usage service [ slave | slot slot-id ] command to
view the CPU usage based on service types.
– Run the display cpu-usage history [ 1hour | 24hour | 72hour ] [ slave |
slot slot-id ] command to view CPU usage statistics within a period.
– Run the display cpu-usage configuration [ slave | slot slot-id ]
command to view the CPU usage configuration of a main control board
or interface board.
NOTE
You can run the set cpu-usage threshold threshold-value [ restore restore-
threshold-value ] [ interval interval-value ] [ slave | slot slot-id ] command to
set the overload threshold and alarm recovery threshold of CPU usage.
----End
Procedure
● Run the monitor process information [ slot slotid | slave ] [ interval
intervalValue ] command to dynamically monitor the usage of system process
resources.
----End
Procedure
Step 1 Run display temperature lpu, display temperature ap-id, display temperature
ipu
The working temperature of each module on the specified board is displayed.
In practice, you can run the display temperature command in any view to check
the current working temperatures of the router. The temperature information
includes the following contents:
● Current temperature status of a board
● Alarm threshold of the board temperature
● Actual temperature of the board
----End
Procedure
Step 1 Run display voltage lpu, display voltage ap-id, display voltage ipu
The voltage status of the specified board is displayed.
In practice, you can run the display voltage command in any view to check the
voltage status of all the boards on the router. The voltage information includes
the following:
● Number of voltage sensors for the boards
● Working voltage sensors for the boards
● Working status of voltage sensors for the boards
● Alarm threshold of the board voltage
● Actual board voltage
● Normal working temperature of the voltage sensors
----End
Context
In VS mode, this chapter applies only to the admin VS.
Procedure
Step 1 Run the display power command to check the status of the power module for the
router.
The displayed information includes the following:
● Slot ID of the power module
● Whether the power module is in position
● Working mode of the power module
● Status of the cable for the power module
----End
Context
In VS mode, only the admin VS supports the following procedure.
Procedure
Step 1 Run the check lcm channel command to check the status of all channels in the
system.
----End
Prerequisites
SNMP and the function of sending traps to the NMS have been correctly
configured on the device. For details, see 1.1.15.6.2 Configuring Basic SNMPv3
Functions.
Context
In actual application scenarios, box-shaped devices at the edge of a network are
prone to power failures due to poor power supply conditions. Through the NMS,
users can find that a device is unreachable after a period of time, but cannot
determine whether the fault is caused by a device fault (power-off) or a network
fault (fiber cut). To resolve this problem, the dying gasp function can be used.
With this function, after a device is powered off, the forwarding component sends
a dying gasp alarm to the NMS during the time (3 ms) where the capacitor
continues to supply power to the main control board.
NOTE
Procedure
Step 1 Run display dying-gasp information
The dying gasp alarm information is displayed, including the IP address of the
NMS server that received the dying gasp alarm, the name of the user who sent
the dying gasp alarm, and the name of the VPN channel through which the SNMP
packet was sent.
----End
Context
NOTICE
Be cautious to use the reboot command because it can break down the entire
network for a short period. In addition, check whether configuration files need be
saved before restarting the device.
Procedure
Step 1 Run reboot
After the reboot command is run, the system checks whether the current
configuration is consistent with the configuration saved in the configuration file. If
the configuration is inconsistent with the configuration saved in the configuration
file, the system prompts you to save the current configuration. The system then
prompts you to confirm whether to save the current configuration in the
configuration file to be activated next time.
----End
Resetting a Board
During device maintenance, you can use a certain command to reset a board.
Before resetting a board, you need to save the configuration file on the board to
ensure that the configuration can automatically recover after the board is reset.
Background Information
When an operating board of the device fails, you are recommended to reset the
board by using the reset slot command.
In VS mode, this chapter applies only to the admin VS.
CAUTION
Procedure
Step 1 Run the reset slot slot-id slot-id [ card card-id ] command in the user view to
reset the faulty board or subcard.
NOTE
● If this command is run to reset a master main control board and no slave main control
board exists, the master main control board is reset with the CPU being powered on. If a
slave main control board exists, this command performs the master-slave main control
board switchover.
● If the board is still abnormal after being reset, contact Huawei technical support
personnel.
----End
Context
If a device is connected to the NMS, you can view board resource usage of the
device. If the device is not connected to the NMS, you can view board resource
usage of the device using a command.
Procedure
Step 1 In the user view, run the display table resources information command to check
the board resource usage.
----End
Procedure
Step 1 Run system-view
The system view is displayed.
----End
Follow-up Procedure
Run the display current-configuration command to check the status and
thresholds of memory usage reliability.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run set cpu-reliability first-recover first-recover-value first-alarm first-alarm-
value second-recover second-recover-value second-alarm second-alarm-value
period period-value [ slave | slot slotId ]
The level-1 and level-2 notification thresholds and their recovery thresholds as
well as the detection period are set for CPU overload.
----End
Follow-up Procedure
Run the display current-configuration command to check the level-1 and level-2
notification thresholds for CPU overload.
Context
The high-temperature working environment reduces the board lifespan. You can
run the display temperature command to view the temperature alarm thresholds
on each board. The alarm levels are minor, major, and fatal. When the board
temperature is higher than a specific threshold, the corresponding level of alarm
occurs. When the temperature is 5°C below the alarm threshold, the alarm is
cleared. After this function is enabled, a board powers off automatically when
temperatures of three or more monitoring nodes on the board are 5°C above the
fatal high temperature alarm threshold.
Procedure
Step 1 Run system-view
----End
Example
Run the display temperature command to check temperature information.
1.1.18.2.8 Configuring the Detection of the Channel Status of the Slave Main
Control Board
This section describes how to enable the master main control board to check or
disable the master main control board from checking whether the slave main
control board is registered within 30 minutes.
Context
When an main control board is damaged, relevant spare parts need to be
replaced. As spare parts of the specified version are usually not delivered, the
received spare parts may be of a VRP V5 version. During the upgrade, the upgrade
process may be long if it involves operations, such as system upgrading, CF card
formatting, and file copy. If the master main control board detects no bootp
packets from the slave main control board, it resets the slave main control board
during the upgrade process. A command is provided to enable or disable the
monitoring function.
NOTE
● After you configure this command, the master main control board will not reset the
slave main control board, if the slave main control board is not registered within 30
minutes.
● After you disable the monitoring function, it can be enabled through the specified
command or by restarting the device.
Procedure
Step 1 Run board-channel-check disable
The master main control board is disabled from checking whether the slave main
control board is registered within 30 minutes.
----End
1.1.18.2.9 Configuring the Alarm Threshold for the CPU Usage of a Board
This section describes how to configure the alarm threshold for the multi-core
CPU usage of a board regardless of service types.
Context
Configuring the alarm threshold for the multi-core CPU usage of a board
regardless of service types helps learn the CPU usage information. When the
multi-core CPU usage is high, measures such as expending board capacity or
adjusting services need to be taken timely to ensure proper service running.
In VS mode, this configuration process is supported only by the admin VS.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run forward alarm cpu-usage multi-core thresholdthreshold-value
The alarm threshold for the average usage across a multi-core CPU of the board
regardless of service types is configured.
Step 3 Optional: Run forward alarm cpu-usage multi-core { log | trap } disable
The function to report alarms or generate logs when the multi-core CPU usage
reaches the threshold regardless of service types is disabled.
Step 4 Run commit
The configuration is committed.
----End
1.1.18.2.10 Configuring the Alarm Threshold for the Usage of a Single CPU on a
Board
This section describes how to configure the alarm threshold for the usage of a
single CPU core on a multi-core CPU-equipped board.
Context
When the usage of a single CPU core on a multi-core CPU-equipped board is too
high, measures must be taken to expand board capacity or adjust services to
ensure proper service running.
In VS mode, this configuration process is supported only by the admin VS.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run forward alarm vcpu-usage multi-core threshold threshold-value
The alarm threshold for the usage of a single CPU core on a multi-core CPU-
equipped board is configured.
Step 3 Optional: Run undo forward alarm vcpu-usage multi-core threshold
The default alarm threshold for the usage of a single CPU core on a multi-core
CPU-equipped board is restored.
Step 4 Run commit
The configuration is committed.
----End
Context
Configuring alarm thresholds for the forwarding performance resource usage,
packet reassembly resource usage, traffic bandwidth on an entire board, and
value-added service bandwidth helps you learn the board performance in time. If
a performance threshold-crossing alarm is generated, take immediate measures to
prevent running services from being affected.
In VS mode, this configuration process is supported only by the admin VS.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run forward-alarm slot slot-id performance usage-rate alarm on onrate off
offrate
An alarm threshold is configured for the forwarding performance resource usage.
Step 3 Run forward-alarm slot slot-id packet reassembly resources usage-rate alarm
on onrate off offrate
Step 4 Run forward-alarm slot slot-id board flow output bandwidth usage-rate alarm
on onrate off offrate
Step 5 Run forward-alarm slot slot-id service channel bandwidth usage-rate alarm on
onrate off offrate
An alarm threshold is configured for the value-added service bandwidth on a
board.
----End
Procedure
Step 1 Run system-view
The overload threshold and alarm recovery threshold of memory usage is set.
By default, the overload threshold value of memory usage is 95, and the alarm
recovery threshold of memory usage is 75.
----End
Result
● Run the display memory-usage [ threshold ] [ slot slot-id ] command to
check memory usage and the overload threshold value of memory usage.
● Run the display memory-monitor information [ all | slot slot-id ] command
to check the memory overloading status of boards.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run monitor cpu-usage [ interval interval-value ] [ slot slot-id | slave ]
The CPU usage is dynamically monitored.
Step 3 Run set cpu-usage threshold threshold [ restore restore-threshold-value ]
[ interval interval-time ] [ slot slot-id ].
The overload threshold and alarm recovery threshold of CPU usage is set.
Step 4 Run set configuration operation cpu-limit { percent-value access-type snmp |
ncf-percent-value access-type netconf }
The rate decreasing threshold is set. When the CPU usage reaches the configured
threshold, the NMS-based data collection operation releases some CPU resources
to other services.
NOTE
----End
Result
● Run the display cpu-usage configuration [ slot slot-id ] command to check
the CPU utilization statistics and CPU usage configuration.
● Run thedisplay cpu-monitor information { slot slot-id | all } command to
check the CPU overloading status of boards.
● Run the reset cpu-usage record [ slot slot-id | all ] command to clear CPU
usage statistics.
Context
When a router is connected to an external alarm device through the ALMO port
on a subcard, you can configure multi-level alarm Boolean output. In this way,
when the router generates an alarm, it outputs the alarm to the alarm device
through the ALMO port on a subcard.
In VS mode, this configuration task is supported only by the admin VS.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run ops
The OPS view is displayed.
Step 3 Run enable
The maintenance assistant function is enabled.
Step 4 Run assistant task-name
A maintenance assistant is created.
Step 5 Set conditions to trigger the maintenance assistant.
● To specify an alarm severity, run the condition alarm level { eq | ge | gt | le |
lt | ne } { critical | major | minor | warning } command.
● To specify a time, run condition timer cron minutes hours days-of-month
months days-of-week [ years ]
Step 6 Run execute priority command command-string
The command to be executed by the maintenance assistant is specified.
For multi-level alarm Boolean output, set command-string to output-alarm slot
slot-id index index-num level compare-operator level-name to enable the
corresponding ALMO port on a subcard to output alarms of a specified severity.
Step 7 Run commit
The configuration is committed.
----End
Context
CR8D00P8CFC1 subcards support the following port bandwidth allocation modes:
● pos-8x622M-mode: 8 valid ports, each with a bandwidth of 622 Mbit/s.
● pos-8x155M-mode: 8 valid ports, each with a bandwidth of 155 Mbit/s.
NOTE
Only the NetEngine 8000 M8, NetEngine 8000 M14, NetEngine 8000E M8, and NetEngine
8000E M14 support this feature.
Procedure
Step 1 Run system-view
----End
1.1.18.2.16 Disable the Function to Use the OFL Button to Power On and Off a
Board
This section describes how to disable the function to use the OFL button to power
on and off a board. After the function is disabled, the OFL button becomes invalid.
Context
In a high-temperature and high-humidity environment, the small circuit card of
the OFL button may be short-circuited and causes the board to reset repeatedly.
After the function to use the OFL button to power on and off the board is
disabled, some faults can be quickly recovered. You can choose to enable or
disable the function.
In VS mode, this configuration process is supported only by the admin VS.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run set offline-check disable
The function to use the OFL button to power on and off a board is disabled.
To enable the function, run the undo set offline-check disable.
Step 3 Run commit
The configuration is committed.
----End
Context
The multi-process mode of the FEI component is enabled by default, which helps
improve the concurrent service processing capability of the device.
Procedure
Step 1 Run the system-view command to enter the system view.
Step 2 Run the undo set fei multi-thread enable command to disable the multi-process
mode of the FEI component.
To re-enable the multi-process mode of the FEI component, run the set fei multi-
thread enable command.
Step 3 Run the commit command to commit the configuration.
----End
Context
Device anti-theft allows users to create a pair of public and private keys using an
NMS for locking or unlocking devices. The public key is loaded to the device for
enabling the anti-theft function, and the private key is used to generate an
authorization file for unlocking the device. This pair of keys function as a lock
attached to the device. The device can only be used with the correct keys. The
anti-theft function effectively prevents devices from being stolen.
NOTE
This feature is supported only by the NetEngine 8000 M8, NetEngine 8000 M14, NetEngine
8000E M8, NetEngine 8000E M14.
Pre-configuration Tasks
Before configuring device anti-theft, complete the following tasks:
● Load the required anti-theft license, anti-theft enabling file, and authorization
file.
The display license resource information anti-theft command displays
license information required for device anti-theft.
● Generate a public key and a private key using an NMS, and send the public
key to the device.
Procedure
Step 1 Run anti-theft install enable file filename
Device anti-theft is enabled.
----End
Networking Requirements
After checking the alarm information, you find that the hardware on the master
main control board fails. Then, power off the master main control board and
check it.
Precautions
The NetEngine 8100 M, NetEngine 8000E M, NetEngine 8000 M cannot work with
a single main control board for a long time. If the main control board fails, the
entire system is broken down. After the slave main control board is powered off,
you must finish required operations and restore the main control board
immediately.
Configuration Roadmap
The configuration roadmap is as follows:
1. Switch the master main control board to the slave main control board.
2. Power off the slave main control board.
Data Preparation
To complete the configuration, you need the slot ID of the master main control
board.
Procedure
Step 1 Perform a master/slave switchover on the router.
<HUAWEI> system-view
[~HUAWEI] slave switchover
Before performing the master and slave switchover, check that user interfaces,
such as console and VTY interfaces, are connected to the two main control boards
of the router. Otherwise, users who use the interfaces connected with the former
master main control board automatically quit the login after the master and slave
switchover.
[*HUAWEI] commit
[~HUAWEI] quit
----End
Configuration Files
None
Definition
The information management (IM) module operates as the information hub of a
device. IM receives logs, traps, debugging messages, and other device-generated
information to implement unified management and flexible output.
Purpose
Immediate and accurate information about device operation facilitates
troubleshooting if an exception or fault occurs on a device. During device
1.1.19.2 Understanding IM
1.1.19.2.1 IM Fundamentals
IM classifies information based on severity levels and sends it to corresponding
destinations through various information channels. As shown in Figure 1-147, IM's
working principles are as follows:
1. IM receives information generated by each module during device operation,
including logs, traps, and debugging messages, and stores this information in
the corresponding log, trap, and debugging queues.
2. IM outputs different types and severities of information to various
information channels, such as the console, monitor, log host, and trap buffer,
based on user settings.
3. IM outputs information to the console, log host, or other destination based on
the association between information channels and destinations.
Information Description
Type
After you set the severity value, the device outputs only the information with a
severity value less than or equal to the set value. For example, if you set the
severity value to 6, the device outputs only information with severity values 0 to 6.
A device can filter logs and traps, but cannot filter security logs.
For example, a module may generate logs in the following order: A(T1) A(T2)
A(T2) B(T3) B(T4) B(T4) C1(T5) C2(T6) A(T7) B(T8) B(T8) B(T8) B(T9) A(T9)
B(T10) C3(T11) A(T11) A(T12) A(T12) A(T13) A(T14) A(T15) A(T16) A(T17)
A(T18) B(T18). Cn represents logs that do not repeat (C1 and C2 are two different
logs), and Tn represents the sequence number. The log information output by the
IM module is as follows:
T1:A
T3(1): last message repeated 2 times
T3:B
T5: last message repeated 2 times
T5:C1
T6:C2
T8:B
T9(1): last message repeated 3 times
T9:A
T10:B
T11:C3
T11:A
T13(2): last message repeated 3 times
T18(2): last message repeated 5 times
T18:B
NOTE
For example, you can set the name of channel 6 to user1 and configure the device
to send information to the log host through this channel (instead of the default
channel 2).
By default, logs, traps, and debugging messages are output through default
channels. Table 1-83 describes the default information output channels.
2 loghost Log host Outputs logs and traps, but not debugging
messages, to a log host. The information is
saved to the log host as files for easy
reference.
You can specify the log host to which log
information is output by configuring the
server IP address, UDP port number,
information recording facility, and information
severity. This information helps you monitor
device operation and diagnose network faults.
In addition, you can configure different source
interfaces for devices that output log
information. This configuration allows the log
host to identify the device from which the
information is output.
9 channel9 Log file Outputs logs and traps, but not debugging
messages, to a storage device, which are
saved as a log file.
You can map channels with output destinations so that a type of information can
be output to the specified destination through the mapping channel. You can
change the names of the channels as well as the mappings between channels and
output destinations as required.
log_SlotID_time.log.z If the size of a current log file reaches the upper limit,
ip the system automatically archives the file and names it
in the format log_SlotID_time.log.zip.
In the file name, SlotID indicates a slot ID and time
indicates when the file was archived and saved.
diag_SlotID_time.log If the size of the current diagnostic log file reaches the
.zip upper limit, the system automatically archives the file
and names it in the format diag_SlotID_time.log.zip.
In the file name, SlotID indicates a slot ID and time
indicates when the file was archived and saved.
pads_SlotID_time.pa If the size of the current O&M log file reaches the upper
ds.zip limit, the system automatically archives the file and
names it in the format pads_SlotID_time.pads.zip.
In the file name, SlotID indicates a slot ID and time
indicates when the file was archived and saved.
Feature Requirements
None
1.1.19.5.1 Enabling IM
Context
The device outputs logs, traps, and debugging messages to the log host and
console only after IM is enabled. By default, the IM function is enabled.
Procedure
Step 1 Enter the system view.
system-view
Step 3 (Optional) Configure the name of the information channel with a specified
number.
info-center channel channel-number name channel-name
By default, the date format is used as the timestamp format for output logs.
Step 7 (Optional) Set the log level.
info-center log-severity bymodule-alias module-name logname severity log-level
The suppression of statistics about consecutive identical logs, whereby only one of
the repeated logs will be recorded, is enabled by default.
NOTE
Consecutive identical logs have the same log ID and parameters, and no other logs exist
between them.
By default, the log retention period function is disabled. Set the log retention
period as required. Expired logs will be aged and deleted. Diagnosis logs and PADS
logs are not involved in retention period management.
----End
Context
To view logs in the log buffer, configure the device to output logs to the log
buffer.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Specify the channel used by the device to output logs to the log buffer.
info-center logbuffer channel { channel-number | channel-name } [ size logbuffersize ]
Step 4 Configure the rule for outputting logs to the specified channel.
info-center source { module-name | default } channel { channel-number | channel-name } log { state
{ off | on } | level severity } *
Step 5 (Optional) Set the maximum number of logs in the log buffer.
info-center logbuffer size buffersize
----End
Context
After a device is configured to output logs to a log file, the logs are saved as a file
on the device. If a fault occurs on a device, you can export and analyze the log file
to locate the fault.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify a channel through which logs are output to a log file.
info-center logfile channel { channel-number | channel-name }
Step 3 Configure the rule for outputting logs to the specified channel.
info-center source { module-name | default } channel { channel-number | channel-name } log { state
{ off | on } | level severity } *
If the size of a log file exceeds the configuration, the system automatically
compresses the log file into a .zip file.
Step 5 (Optional) Set the maximum number of log files that can be saved.
info-center max-logfile-number [ security ] filenumbers
If the number of log files generated on the device exceeds this limit, the system
deletes the earliest log files.
Step 8 (Optional) Configure the device to save information in the log buffer to a log file.
save logfile
Logs are cached in the system memory before being written into log files. When
the buffer is full or if the log saving timer expires, the device immediately writes
the cached logs into log files. If the log buffer is not full or the timer does not
expire, run this command to manually write logs in the memory into information
files.
----End
Follow-up Procedure
After a log file is generated, you can run the display logfile command to view its
content. The format of the log file is log.log.
To delete log files, run the delete filename command in the user view.
Context
After configuring the device to output logs to a log host, you can view logs saved
on the log host to monitor device operation.
Procedure
Step 1 Enter the system view.
system-view
● Configure the device to output logs to a log host with a specified domain
name.
info-center loghost domain domain-name [ { local-time | utc } | channel { channel-number |
channel-name } | { public-net | vpn-instance vpn-instance-name } | facility local-num | level level-
num | port server-port | transport { udp | tcp [ ssl-policy policy-name [ [ security ] | [ verify-dns-
name dns-name ] ] * ] } ] *
Step 3 Configure the rule for outputting logs to the specified channel.
info-center source { module-name | default } channel { channel-number | channel-name } log { state
{ off | on } | level severity } *
Step 4 (Optional) Configure the source interface used by the device to send logs to a log
host.
info-center loghost source { interface-name | interface-type interface-number }
By default, the source interface for a device to send logs to a log host is the actual
interface that sends the logs.
After the source interface is specified, the log host determines the device that
sends messages. In this way, the log host can easily retrieve received messages.
Step 5 (Optional) Configure the source port through which the device sends logs to the
log host.
info-center loghost source-port source-port
----End
Context
After logs are output to the console, you can view logs on the console (the host
from which you can log in to the device through the console interface) to monitor
device operation.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify a channel through which logs are output to the console.
info-center console channel { channel-number | channel-name }
Step 3 Configure the rule for outputting logs to the specified channel.
info-center source { module-name | default } channel { channel-number | channel-name } log { state
{ off | on } | level severity } *
Step 6 Enable the display of logs, traps, and debugging messages on the user terminal.
terminal monitor
----End
Context
After logs are output to a user terminal, you can view logs on the user terminal
(the host from which you log in to the device through VTY or Telnet) to monitor
device operation.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify a channel through which logs are output to a user terminal.
info-center monitor channel { channel-number | channel-name }
Step 3 Configure the rule for outputting logs to the specified channel.
info-center source { module-name | default } channel { channel-number | channel-name } log { state
{ off | on } | level severity } *
Step 6 Enable the display of logs, traps, and debugging messages on the user terminal.
terminal monitor
----End
Procedure
● Run the display info-center [ statistics ] command to check IM statistics.
● Run the display channel [ channel-number | channel-name ] command to
check the information channel.
● Run the display logbuffer command to check information in the log buffer.
● Run the display logfile path [ offset ] * command to check information
recorded in the log file.
● Run the display logfile [ log | diagnose ] list starttime starttime-value
endtime endtime-value command to check the list of log files generated in a
specified period.
● Run the display channel command to check the channel configuration for
information management.
----End
1.1.19.5.8 Example for Configuring the Device to Output Logs to a Log File
Networking Requirements
Information can be saved as files on the device. If a fault occurs on the device, log
files can be exported and used for fault locating. As shown in Figure 1-153, log
information can be saved in the log file of DeviceA. If there are a large number of
log files, you can configure the device to send them to an external server (for
example, an SFTP server) to reduce the storage resource consumption and
implement unified maintenance. DeviceA is connected to the SFTP server through
a network, and there are reachable routes between DeviceA and the SFTP server.
Maintenance personnel can view logs generated on DeviceA on the SFTP server to
query the running status of DeviceA.
NOTE
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Configure a routing protocol to ensure that there are reachable routes between
the device and SFTP server. For details, see configuration files.
Step 2 Configure the SFTP server function and parameters, create an SSH user, and set
the authentication mode to password authentication.
Step 4 Configure a channel and a rule for outputting logs to a log file.
Step 5 Configure the device to transfer the log file to the SFTP server.
# Configure the device to transfer the log file to the SFTP server.
----End
# View the log files received on the SFTP server. The configuration details are not
described here.
Configuration Scripts
#
sysname DeviceA
info-center enable
#
info-center logfile channel channel8
info-center source im channel channel8 log level warning
#
interface GigabitEthernet0/1/1
ip address 10.2.1.1 255.255.0.0
#
ssh client first-time enable
#
return
1.1.19.5.9 Example for Configuring the Device to Output Logs to a Log Host
Networking Requirements
DeviceA generates a large amount of information, but the storage space available
on DeviceA is limited. To avoid any storage-related issues, you can configure
DeviceA to output information to a log host, which will then collect information
about DeviceA. As shown in Figure 1-154, DeviceA is connected to four log hosts
through a network. The network administrator requires different log hosts to
receive logs of different types and severities so that the information generated by
various modules can be monitored in real time.
NOTE
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Configure an IP address and a routing protocol to ensure that there is a reachable
route between Device A and the log host. For details, see configuration files.
Step 3 Configure a channel and rules for outputting logs to a log host.
The log host channel outputs HWTACACS and IM module logs of the notification
level or higher to the log host.
[~DeviceA] info-center source hwtacacs channel loghost log level notification
[*DeviceA] info-center source im channel loghost log level notification
[*DeviceA] commit
The PP4 and AAA modules output logs of the warning level or higher to the log
host through the loghost1 channel.
[~DeviceA] info-center source pp4 channel loghost1 log level warning
[*DeviceA] info-center source aaa channel loghost1 log level warning
[*DeviceA] commit
Step 4 Configure the source interface used to send logs to a log host.
[~DeviceA] info-center loghost source gigabitethernet 0/1/1
[*DeviceA] commit
# Specify Server2 as the log host and Server4 as the backup log host for receiving
logs from PP4 and AAA modules, and Local4 as the log recording tool.
[~DeviceA] info-center loghost 10.2.1.1 channel loghost1 facility local4
[*DeviceA] info-center loghost 10.2.1.2 channel loghost1 facility local4
[*DeviceA] commit
----End
Trap buffer:
enabled,max buffer size 1024, current buffer size 256,
current messages 3, channel number:3, channel name:trapbuffer
dropped messages 0, overwritten messages 0
logfile:
channel number : 9, channel name : logfile, language : English
Information timestamp setting:
log - date, trap - date, debug - date millisecond
Configuration Scripts
#
sysname DeviceA
#
info-center channel 6 name loghost1
info-center source hwtacacs channel 2 log level notification
info-center source im channel 2 log level notification
info-center source pp4 channel 6 log level warning
info-center source aaa channel 6 log level warning
info-center loghost source GigabitEthernet0/1/1
info-center loghost 10.1.1.1 facility local2
info-center loghost 10.1.1.2 facility local2
info-center loghost 10.2.1.1 channel 6 facility local4
info-center loghost 10.2.1.2 channel 6 facility local4
#
interface GigabitEthernet0/1/1
ip address 10.3.1.1 255.255.255.0
#
ip route-static 10.1.1.0 255.255.255.0 172.16.0.2
ip route-static 10.2.1.0 255.255.255.0 172.16.0.2
#
return
Networking Requirements
As shown in Figure 1-155, DeviceA is connected to four log hosts and has
reachable routes to the log hosts. Different log hosts are expected to reliably
receive logs of different types and severities so that the network administrator can
monitor information generated by different modules in real time.
NOTE
Configuration Roadmap
The configuration roadmap is as follows:
1. Configure a client SSL policy to authenticate log hosts and ensure log
transmission security.
Assume that each log host has obtained a certificate from the CA, and the
corresponding trusted CA files 1_cacert_pem_rsa.pem and
1_rootcert_pem_rsa.pem have been uploaded to the security sub-directory
of DeviceA.
2. Enable the IM function.
3. Configure channels and rules for outputting logs to the log hosts.
4. Configure the source interface used to send logs to the log hosts.
5. Configure the log hosts.
Procedure
Step 1 Configure an IP address and a routing protocol to ensure that there is a reachable
route between DeviceA and each log host. For details, see configuration files.
Step 2 Configure a client SSL policy.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] ssl policy syslog_client
[*DeviceA-ssl-policy-syslog_client] trusted-ca load pem-ca 1_cacert_pem_rsa.pem
[*DeviceA-ssl-policy-syslog_client] trusted-ca load pem-ca 1_rootcert_pem_rsa.pem
[*DeviceA-ssl-policy-syslog_client] commit
[~DeviceA-ssl-policy-syslog_client] quit
You can run the display ssl policy command on DeviceA to display detailed
information about the trusted CA file in the command output.
[~DeviceA] display ssl policy
SSL Policy Name: syslog_client
Policy Applicants:
Key-pair Type:
Certificate File Type:
Certificate Type:
Certificate Filename:
Key-file Filename:
CRL File:
Trusted-CA File:
Trusted-CA File 1: Format = PEM, Filename = 1_cacert_pem_rsa.pem
Trusted-CA File 2: Format = PEM, Filename = 1_rootcert_pem_rsa.pem
Step 4 Configure channels and rules for outputting logs to the log hosts.
Configure DeviceA to send notification logs generated by the ARP module to
Server1, and specify Server3 as the backup of Server1. Configure DeviceA to send
warning logs generated by the AAA module to Server2, and specify Server4 as the
backup of Server2.
Step 5 Configure the source interface used to send logs to the log hosts.
[~DeviceA] info-center loghost source gigabitethernet 0/1/1
[*DeviceA] commit
----End
Configuration Scripts
#
sysname DeviceA
#
ssl policy syslog_client
trusted-ca load pem-ca 1_cacert_pem_rsa.pem
trusted-ca load pem-ca 1_rootcert_pem_rsa.pem
#
info-center channel 6 name loghost1
info-center source hwtacacs channel 2 log level notification
info-center source im channel 2 log level notification
info-center source pp4 channel 6 log level warning
info-center source aaa channel 6 log level warning
info-center loghost source GigabitEthernet0/1/1
info-center loghost 10.1.1.1 channel 6 transport tcp ssl-policy syslog_client
info-center loghost 10.1.1.2 channel 6 transport tcp ssl-policy syslog_client
info-center loghost 10.2.1.1 channel 7 transport tcp ssl-policy syslog_client
info-center loghost 10.2.1.2 channel 7 transport tcp ssl-policy syslog_client
#
interface GigabitEthernet0/1/1
ip address 10.3.1.1 255.255.255.0
#
ip route-static 10.1.1.0 255.255.255.0 172.16.0.2
ip route-static 10.2.1.0 255.255.255.0 172.16.0.2
#
return
1.1.19.6.1 Enabling IM
Context
The device outputs logs, traps, and debugging messages to the log host and
console only after IM is enabled. By default, the IM function is enabled.
Procedure
Step 1 Enter the system view.
system-view
Step 3 (Optional) Configure the name of the information channel with a specified
number.
info-center channel channel-number name channel-name
By default, the date format is used as the timestamp format for output traps.
By default, the log retention period function is disabled. Set the log retention
period as required. Expired logs will be aged and deleted.
----End
Context
To view traps in the trap buffer, configure the device to output traps to the trap
buffer.
Procedure
Step 1 Enter the system view.
system-view
Step 3 Specify the channel used by the device to output traps to the trap buffer.
info-center trapbuffer channel { channel-number | channel-name } [ size size ]
Step 5 (Optional) Set the maximum number of traps in the trap buffer.
info-center trapbuffer size size channel { channel-number | channel-name }
----End
Context
After traps are output to the SNMP agent, you can view device information on the
NMS and locate device faults in a timely manner. Before configuring the device to
output traps to an NMS server, configure the device to output traps to an SNMP
agent. In this way, the SNMP agent sends traps to the NMS server.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify the channel used by the device to output traps to an SNMP agent.
info-center snmp channel { channel-number | channel-name }
Step 3 Specify the channel used by the device to output traps to the trap buffer.
info-center trapbuffer channel { channel-number | channel-name } [ size size ]
The SNMP agent can work properly and receive traps only when the SNMP agent
function is enabled.
NOTE
For details on how to configure the SNMP agent, see "SNMP Configuration" in
Configuration Guide > System Management Configuration.
----End
Context
After traps are output to a log file, the log file is saved on the device. If a fault
occurs on the device, you can export and analyze log files to locate the fault.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify the channel through which traps are output to a log file.
info-center logfile channel { channel-number | channel-name }
If the size of a log file exceeds the configuration, the system automatically
compresses the log file into a .zip file.
Step 5 (Optional) Set the maximum number of log files that can be saved.
info-center max-logfile-number [ security ] filenumbers
If the number of log files generated on the device exceeds this limit, the system
deletes the earliest log file.
Step 6 Commit the configuration.
commit
Step 8 (Optional) Configure the device to save information in the trap buffer to a log file.
save logfile
Traps are cached in the system memory before being written into log files. When
the buffer is full or if the timer expires, the device immediately writes the cached
traps into log files. If the buffer is not full or the timer does not expire, run this
command to manually write traps in the memory into information files.
----End
Follow-up Procedure
After a log file is generated, you can run the display logfile command to view its
content. The format of the log file is log.log.
To delete log files, run the delete filename command in the user view.
Context
After configuring the device to output traps to a log host, you can view traps
saved on the log host to monitor device operation.
Procedure
Step 1 Enter the system view.
system-view
● Configure the device to output traps to the log host with the specified domain
name.
info-center loghost domain domain-name [ { local-time | utc } | channel { channel-number |
channel-name } | { public-net | vpn-instance vpn-instance-name } | facility local-num | level level-
num | port server-port | transport { udp | tcp [ ssl-policy policy-name [ [ security ] | [ verify-dns-
name dns-name ] ] * ] } ] *
Step 3 Configure the rule for outputting traps to the specified channel.
info-center source { module-name | default } channel { channel-number | channel-name } trap { state
{ off | on } | level severity } *
Step 4 (Optional) Configure the source interface used by the device to send logs to a log
host.
info-center loghost source { interface-name | interface-type interface-number }
By default, the source interface for a device to send logs to a log host is the actual
interface that sends the logs.
After the source interface is specified, the log host determines the device that
sends messages. In this way, the log host can easily retrieve received messages.
Step 5 (Optional) Configure the source port through which the device sends traps to the
log host.
info-center loghost source-port source-port
----End
Context
After traps are output to the console, you can view traps on the console (host
from which you can log in to the device through the console interface) to monitor
device running.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify a channel through which traps are output to the console.
info-center console channel { channel-number | channel-name }
Step 6 Enable the display of logs, traps, and debugging messages on the user terminal.
terminal monitor
----End
Context
After traps are output to a user terminal, you can view traps on the user terminal
(host from which you log in to the device through VTY or Telnet) to monitor
device running.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify the channel through which traps are output to a user terminal.
info-center monitor channel { channel-number | channel-name }
Step 6 Enable the display of logs, traps, and debugging messages on the user terminal.
terminal monitor
----End
Procedure
● Run the display info-center [ statistics ] command to check IM statistics.
● Run the display channel [ channel-number | channel-name ] command to
check the information channel.
● Run the display trapbuffer [ size buffersize ] command to check trap buffer
information.
● Run the display logfile path [ offset ] * command to check information
recorded in the log file.
● Run the display logfile [ log | diagnose ] list starttime starttime-value
endtime endtime-value command to check the list of log files generated in a
specified period.
● Run the display channel command to check the channel configuration for
information management.
----End
1.1.19.6.9 Example for Configuring the Device to Output Traps to an SNMP Agent
Networking Requirements
As shown in Figure 1-156, DeviceA is connected to the NMS through a network,
and reachable routes exist between DeviceA and the NMS. To enable the NMS to
monitor the traps of DeviceA in real time and locate faults in a timely manner,
configure the device to output traps to the SNMP agent. In this way, the SNMP
agent sends the traps to the NMS.
NOTE
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the IM function.
2. Configure a channel and rule for outputting traps to the SNMP agent.
3. Output traps to the NMS through the SNMP agent.
Procedure
Step 1 Configure reachable routes between the device and NMS. For details, see
configuration files.
Step 2 Enable the IM function.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] info-center enable
Step 3 Configure a channel and rule for outputting traps to the SNMP agent.
# Specify the channel used by the device to output traps to an SNMP agent.
[~DeviceA] info-center snmp channel channel7
[*DeviceA] commit
----End
# Display the information output to the SNMP agent through the channel.
[~DeviceA] display channel 7
channel number:7, channel name:channel7
ModuID Name Enable LogLevel Enable TrapLevel Enable DebugLevel
ffffffff default Y debugging Y debugging N debugging
00000957 IM Y debugging Y informational N debugging
Configuration Scripts
#
sysname DeviceA
#
info-center source im channel 7 trap level informational
info-center snmp channel 7
#
interface GigabitEthernet0/1/1
ip address 10.1.1.2 255.255.255.0
#
snmp-agent
#
snmp-agent sys-info version v2c v3
snmp-agent target-host host-name __targetHost_1_24247 trap address udp-domain 10.1.1.1 params
securityname cipher %+%#-(}fC-|38%RgqpW$+c^UU"AH()$q#K26fL2X5XK7%+%#
#
snmp-agent trap enable
#
return
1.1.19.7.1 Enabling IM
Context
The device outputs logs, traps, and debugging messages to the log host and
console only after IM is enabled. By default, the IM function is enabled.
Procedure
Step 1 Enter the system view.
system-view
Step 3 (Optional) Configure the name of the information channel with a specified
number.
info-center channel channel-number name channel-name
By default, the date format is used as the timestamp format for output debugging
messages.
----End
Context
After debugging messages are output to the console, you can view debugging
messages on the console (host from which you can log in to the device through
the console interface) to monitor device running.
CAUTION
Debugging occupies a device's CPU resources and affects system running. You are
advised to immediately run the undo debugging all command to disable
debugging after this function is performed.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify a channel through which debugging messages are output to the console.
info-center console channel { channel-number | channel-name }
Step 6 Enable the display of logs, traps, and debugging messages on the user terminal.
terminal monitor
----End
Context
After debugging messages are output to a user terminal, you can view debugging
messages on the user terminal (host from which you log in to the device through
VTY or Telnet) to monitor device running.
CAUTION
Debugging occupies a device's CPU resources and affects system running. You are
advised to immediately run the undo debugging all command to disable
debugging after this function is performed.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Specify a channel used by the device to output debugging messages to a user
terminal.
info-center monitor channel { channel-number | channel-name }
Step 6 Enable the display of logs, traps, and debugging messages on the user terminal.
terminal monitor
----End
Procedure
● Run the display info-center [ statistics ] command to check IM statistics.
● Run the display channel [ channel-number | channel-name ] command to
check the information channel.
● Run the display channel command to check the channel configuration for
information management.
----End
Networking Requirements
As shown in Figure 1-157, the PC is connected to DeviceA through the console
port. Users want to view debugging information about the ARP module on
DeviceA on a PC to locate faults.
Configuration Roadmap
The configuration roadmap is as follows:
Procedure
Step 1 Enable the IM function.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] info-center enable
Step 2 Configure a channel and rule for outputting debugging messages to the console.
Step 3 Enable the terminal display function and debugging message display function.
<DeviceA> terminal monitor
<DeviceA> terminal debugging
----End
Configuration Scripts
#
sysname DeviceA
#
info-center source arp channel 0
#
return
Context
Due to the limited detection scope and security inspection capability, a device
cannot identify whether the OS has been compromised. When a security event
occurs, logs need to be analyzed manually, which is slow and inefficient. To
address this issue, you can configure the device to periodically output log files to a
file server. In this way, you can view log information on the file server to monitor
the device running status and quickly diagnose network faults.
NOTE
Procedure
Step 1 Enter the system view.
system-view
Step 2 Configure the device to upload log files to a specified file server.
● Configure the device to upload log files to an IPv4 file server.
info-center file-server ipv4 ipv4-addr [ vpn-instance vpn-instance-name ] transport-type sftp
[ port port-number ] username user-name password pass_word [ path destination-path ] file-type
os
By default, no log file server is configured on the device. Only one file server is
supported.
Step 3 Commit the configuration.
commit
----End
Context
To control the frequency at which an event is reported, you can set a period after
which a generated event is reported.
If an event is repeatedly reported, you can enable delayed event reporting to
prevent a large number of invalid events from being reported.
Procedure
Step 1 Enter the system view.
system-view
----End
1.1.19.10 Maintaining IM
Maintaining IM includes clearing IM statistics and monitoring IM.
Clearing Statistics
To delete statistics and information in the buffer, perform the following operations
in the user view:
CAUTION
Statistics and buffer information cannot be restored after being cleared. Therefore,
exercise caution when performing this operation.
Operation Command
Monitoring IM
During routine maintenance, you can run the following commands in any view to
display the desired device information.
Operation Command
Operation Command
View the list of log files display logfile [ log | diagnose ] list
generated in a specified period. starttime starttime-value endtime endtime-
value
To check whether a specified security log file has been tampered with, run the
following command.
Definition
The fault management (FM) function manages alarms generated by devices in a
centralized manner and provides guaranteed alarm reporting. It monitors the
operating status of devices and networks in real time and records abnormalities,
analyzes the abnormalities, and determines whether to generate and report
alarms. This feature also enables a device to report alarms to notify users of
faults, so that users can take measures to isolate and rectify faults for service
recovery.
Purpose
With the expansion of network scale and increase of network complexity, when a
device module is faulty, a large number of alarms may be generated on one or
more devices. The devices and NMS, however, may not be able to process all
alarms, resulting in loss of alarms during alarm transmission. If the alarms that
users are concerned about are lost, network management will be difficult. To
resolve this issue, a more intelligent and effective FM mechanism is required to
implement the following improvements:
● Fewer alarms generated
To prevent alarm loss and ensure that valuable fault information can be
collected quickly, you can configure alarm severities, alarm suppression, and
delayed alarm reporting on devices before these devices report alarms.
● Guaranteed alarm reporting
The internal reliability mechanism of the devices ensures that alarms are
displayed promptly and reliably to support quick and accurate fault locating
and diagnosis.
1.1.20.2 Understanding FM
FM Fundamentals
FM dynamically manages and reports alarms generated on devices in a centralized
manner. If a device does not run properly, the device generates alarms to notify
the maintenance personnel of the device's operating status, facilitating fault
locating.
The common types of alarms are as follows:
● Active alarm
An alarm indicating occurrence of a fault. For example, the hwFanInvalid
alarm indicates that a fan is faulty.
● Clear alarm
An alarm indicating that a fault is rectified. For example, the
hwFanInvalidResume alarm indicates that a fault on a fan is rectified. Each
active alarm has a corresponding clear alarm.
● Root alarm
An alarm that generates other alarms. For example, if a route becomes
unreachable due to a fault on an interface, the interface fault alarm is a root
alarm.
● Correlative alarm
An alarm generated by a root alarm. For example, if an interface fault causes
the generation of a route unreachability alarm, the route unreachability alarm
is a correlative alarm.
● Intermittent alarm
An alarm that is cleared shortly after being generated (the interval between
the alarm generation and clearance times is less than an intermittent
threshold). Intermittent alarms last for a short period of time.
● Flapping alarm
An alarm that is generated and cleared frequently within a specified period of
time (the number of alarm generation and clearance occurrences exceeds a
flapping threshold). Alarms with the same object and ID are considered
identical.
FM receives alarms generated by devices, saves the alarms based on the default
severities, and records the time when alarms are generated. After the FM function
is configured, you can:
● Adjust the alarm severities on the device and configure filtering rules on the
NMS to filter out unnecessary alarms.
● Enable the delayed alarm reporting function to prevent alarms from being
reported repeatedly. The device reports only alarms that persist after the set
alarm reporting delay expires.
● Enable the device to identify root-cause and correlative alarms based on
alarm correlation and filter out correlative alarms so that the device reports
only root alarms to the NMS, improving the efficiency in locating faults.
Alarm Severity
Alarm information is classified to enable users to roughly determine the alarm
severity and take measures for prompt fault recovery. In this way, alarms of high
severity are handled at a high priority, preventing service interruption.
According to X.733, alarms are classified into four severities, as shown in Table
1-89. A smaller value indicates a higher severity.
3 Minor A fault that does not yet affect services has occurred,
and a rectification measure is required to prevent the
fault from affecting services.
Alarm Suppression
The device supports the alarm suppression function. Alarm suppression can be
classified into two types: jitter suppression and correlation suppression.
● Jitter suppression
Jitter suppression, focusing on analysis of alarm persistence, enables a device
to report only alarms that persist after a set interval expires. This prevents a
large number of invalid alarms from being reported.
Alarm persistence analysis provides a basis for a device to filter out non-
persistent alarms and report only persistent alarms. Figure 1-158 illustrates
principles of alarm persistence analysis.
Feature Requirements
None
1.1.20.5 Configuring FM
1.1.20.5.1 Understanding FM
FM provides the following functions:
1.1.20.5.2 Configuring FM
Procedure
Step 1 Enter the system view.
system-view
– For an NMS user whose host name is host-name, run the following
command in the alarm management view:
undo alarm snmp target-host host-name
To mask multiple alarm items, you can run this command multiple
times.
▪ For an NMS user whose host name is host-name, run the following
command:
snmp target-host host-name mask name mask-name
commit
----End
Networking Requirements
As shown in Figure 1-159, there are reachable routes between the user and
DeviceA. You can configure FM to help the user learn about the alarms generated
on DeviceA in a timely manner and locate faults.
Configuration Roadmap
The configuration roadmap is as follows:
1. Set alarm suppression parameters.
2. Edit and use the alarm masking table.
3. Disable alarm correlation suppression.
Procedure
Step 1 Configure the severity and suppression period of the alarm
hwBgpPeerRouteExceed.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] alarm
[~DeviceA-alarm] alarm-name hwBgpPeerRouteExceed severity critical
[*DeviceA-alarm] suppression alarm-name hwBgpPeerRouteExceed cause-period 5
[*DeviceA-alarm] suppression alarm-name hwBgpPeerRouteExceed clear-period 15
[*DeviceA-alarm] commit
Step 3 Configure the NMS host named target-host1 to use the alarm masking table
named mask1.
[~DeviceA-alarm] quit
[~DeviceA] snmp-agent target-host host-name target_host1 inform address udp-domain 192.168.3.1
params securityname aaa123 v3
[*DeviceA] alarm
[*DeviceA-alarm] snmp target-host target-host1 mask name mask1
[*DeviceA-alarm] commit
Step 4 Disable alarm correlation suppression for the NMS host whose IP address is
192.168.3.1 and username is aaa123.
[~DeviceA-alarm] correlation-analyze enable
[*DeviceA-alarm] undo alarm correlation-suppress enable target-host 192.168.3.1 securityname aaa123
[*DeviceA-alarm] commit
----End
Configuration Scripts
#
sysname DeviceA
#
alarm
correlation-analyze enable
alarm-name hwBgpPeerRouteExceed severity Critical
suppression alarm-name hwBgpPeerRouteExceed cause-period 5
suppression alarm-name hwBgpPeerRouteExceed clear-period 15
snmp target-host target-host1 mask name mask1
undo alarm correlation-suppress enable target-host 192.168.3.1 securityname cipher %+%##!!!!!!!!!"!!!!"!!!!
*!!!!M'QCMk|;n!+ttaFN:B%L)q5F9-.u.Bc4Pd;!!!!!!!!!!!!!!!7!!!!:kiHA*OO]%"x:zHit670|z&=~0qG"G!!!!!!!!!!%+%#
#
mask name mask1
mask severity Minor
mask severity Warning
mask alarm-name hwBgpPeerAddrFamilyRouteThresholdExceed
mask alarm-name hwBgpPeerAddrFamilyRouteExceed
mask alarm-name hwBgpBackwardTransition
mask alarm-name hwBgpPeerAddrFamilyPerRouteThresholdExceed
mask alarm-name hwBgpPeerAddrFamilyPerRouteExceed
mask alarm-name hwBgpRouteLoopDetected
mask alarm-name hwBgpDiscardRecvRoute
mask alarm-name hwRpkiSessionROAExceed
mask alarm-name hwBgpPeerRouteNumThresholdExceed
mask alarm-name hwBgpPeerRouteExceed
mask alarm-name bgpBackwardTransition
mask alarm-name hwBgpVrfRouteNumReachThreshold
mask alarm-name hwBgpDynamicPeerSessionExceed
#
return
1.1.20.6 Maintaining FM
Clearing Alarms
After identifying alarms to be cleared, perform the following operations in the
alarm management view:
CAUTION
After an alarm is cleared, an NMS cannot obtain the alarm information. Cleared
alarms cannot be restored. In addition, the alarm is no longer reported even if the
original fault persists. Therefore, exercise caution when you run this command.
Operation Command
Monitoring Alarms
You can run the following commands in any view to check the alarm information
in routine maintenance.
Operation Command
Definition
The performance management (PM) function periodically collects statistics about
various system performance indicators, helping you query and analyze current or
historical performance statistics.
Purpose
PM provides current and historical system performance data, becoming a key
feature for improving device operation and maintenance (O&M) capabilities. You
can use this data to analyze the system's running status, locate faults, and
perform system configuration.
You can also analyze system performance trends based on collected performance
data. For example, by analyzing the peak and valley values of user traffic during a
specific day, you can predict the network's traffic growth and speed for at least the
next 30 days. More important, system performance data forms the foundation for
network configuration optimization and network expansion.
1.1.21.2 Understanding PM
To implement PM, a device needs to periodically collect performance statistics, so
the statistics collection function must be enabled.
The statistics collection function involves various performance statistics tasks. Each
task can be bound to multiple performance statistics instances, which the device
will monitor and collect from the system when a task is run. Statistics are
calculated once the performance statistics collection interval elapses, and are
periodically saved to statistics files.
● Interface traffic statistics, for example, the number of packets sent and
received on an Ethernet interface
● Protocol traffic statistics, for example, the number of protocol-specific packets
● Device running statistics, for example, CPU usage, memory usage, and
temperature
The device uploads statistics files to a PM server through FTP or SFTP in either of
the following modes:
Using FTP to upload performance statistics files is not secure. Using SFTP is recommended.
In FIPS mode, files cannot be uploaded using FTP.
Feature Requirements
VSs except the admin VS share system memory NetEngin NetEngine 8000
resources. Memory resources cannot be e 8000 M M14/NetEngine
separately allocated to the VSs. 8000 M14K/
NetEngine 8000
M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8/NetEngine
8100 M14/
NetEngine 8100
M8
1.1.21.5 Configuring PM
Prerequisites
Reachable routes have been configured between the device and PM server.
Context
To collect and analyze performance statistics about system services, configure a
performance statistics task and bind the task to one or more instances. In the
performance statistics task, you can configure the performance statistics collection
interval, sampling interval, and parameters for statistics file generation.
Procedure
Step 1 Enter the system view.
system-view
Step 4 Create a performance statistics task and enter the performance statistics task view.
statistics-task task-name
After the task type is changed to mon-statistics, the default settings are restored
for the statistics collection interval, file generation status, threshold alarm status,
file generation interval, automatic file upload status, and other items. In addition,
task attributes cannot be changed, and threshold alarm configurations cannot be
performed.
Step 6 Bind an instance to the performance statistics task.
binding instance-type instance-type { all | instance { vpn-instance-name } &<1-8> }
By default:
● If the performance statistics collection interval is 5 minutes, the default
sampling interval is 1 minute.
● If the performance statistics collection interval is 10 minutes, the default
sampling interval is 2 minutes.
● If the performance statistics collection interval is 15 minutes, the default
sampling interval is 3 minutes.
● If the performance statistics collection interval is 30 minutes, the default
sampling interval is 5 minutes.
● If the performance statistics collection interval is 60 minutes, the default
sampling interval is 5 minutes.
● If the performance statistics collection interval is 1440 minutes, the default
sampling interval is 15 minutes.
Step 10 (Optional) Configure a performance statistics collection interval.
statistics-cycle cycle
By default:
– If a short interval (5, 10, 15, 30, or 60 minutes) is set for collecting
performance statistics, the system generates a performance statistics file
for every four intervals.
– If a long interval (1440 minutes) is set for collecting performance
statistics, the system generates a performance statistics file for every
interval.
After the command is run, the system generates a performance statistics file
at every cycle x interval minutes to automatically save the performance
statistics.
You can run the file-format { text | xml } command to set a format for
performance statistics files.
----End
Context
The system generates performance statistics files based on the collected
performance statistics at a specified interval. To view the performance statistics on
a PM server, upload the performance statistics files to the PM server.
The device uses FTP or SFTP to upload statistics files to a remote PM server in
either of the following modes:
Using FTP to upload performance statistics files is not secure. Therefore, using SFTP is
recommended.
In FIPS mode, files cannot be uploaded in FTP mode.
Procedure
Step 1 Enter the system view.
system-view
Step 4 Configure the parameters of the PM server to which performance statistics files
will be uploaded.
● Configure the protocol, IP address, and port number used for uploading
performance statistics files to the PM server.
protocol { ftp | sftp } ip-address ip-address [ port port-number | { net-manager-vpn | vpn-instance
vpn-instance-name } ] *
By default, the port number of the PM server is 21 (using FTP) or 22 (using
SFTP).
If the IP address of the PM server is a private address, configure net-
manager-vpn to specify a network management VPN for uploading the
performance statistics files, or configure vpn-instance vpn-instance-name to
specify a VPN instance for uploading the performance statistics files.
● Configure a username and password for logging in to the PM server.
username user-name password [ password ]
NOTE
Step 7 Create a request for uploading performance statistics files to a specified PM server.
upload-config request-name server server-name
Step 8 Enable the device to upload performance statistics files to the PM server.
● Automatic mode
a. Enter the performance statistics task view.
statistics-task task-name
● Manual mode
a. View the list of generated statistics files.
----End
Context
By default, statistics files are saved in text format to cfcard:/pmdata. They can also
be saved in xml format. Statistics files are named in the format of
tasknameyyyymmddhhmmindexnum.xxx, where xxx represents either txt or xml
depending on the file type. You can view and parse statistics files to analyze
statistics and learn about a device's running status.
Procedure
Step 1 View the list of generated statistics files.
display pm statistics-file [ task-name ]
393233
393234
393235
393236
393237
393238
393239
393240
393241
393242
393243
393244
393245
393246
393247
393248
393249
393250
393251
393256
393257
393258
393252
393253
393254
393255
Value:
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1410065408,2,1,0,0,0,0,0,0,0,0,0,0
,0,E3,E3,E3,E3
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1410065408,2,1,0,0,0,0,0,0,0,0,0,0
,0,E3,E3,E3,E3
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1410065408,2,1,0,0,0,0,0,0,0,0,0,0
,0,E3,E3,E3,E3
Item Description
----End
Prerequisites
PM has been configured.
Procedure
● Run the display pm brief command to check brief PM information.
● Run the display pm statistics-task [ task-name ] command to check
information about a performance statistics task.
● Run the display pm measure-info [ instance-type instance-type ] command
to check statistics about an instance.
● Run the display pm statistics task-name data-index index [ instance-type
instance-type-name [ measure measure-name | instance { vpn-instance-
name } &<1-8> ] * ] command to view PM statistics.
● Run the display pm statistics-file [ task-name ] command to check the list of
statistics files.
----End
Networking Requirements
To monitor the operating status of interfaces and collect performance statistics,
configure the PM function. This configuration enables a device to periodically
collect performance statistics, save the performance statistics to files, and send the
files to a PM server.
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the data statistics function.
2. Configure basic data statistics functions.
3. Configure the device to upload statistics files to the PM server.
Procedure
Step 1 Enable the data statistics function.
<HUAWEI> system-view
[~HUAWEI] sysname DeviceA
[*HUAWEI] commit
[~DeviceA] pm
[~DeviceA-pm] statistics enable
[*DeviceA-pm] commit
# Set the performance statistics collection interval to 5 minutes and the number
of performance statistics collection intervals to 3.
[~DeviceA-pm-statistics-test] statistics-cycle 5
Warning: All data of the statistics task will be deleted. Continue? [Y/N]:Y
[*DeviceA-pm-statistics-test] record-interval 3
Warning: This operation will cause some data to be lost. Continue? [Y/N]:Y
[*DeviceA-pm-statistics-test] quit
[*DeviceA-pm] quit
[*DeviceA] commit
----End
command output for a performance statistics task named huawei. The command
output shows the performance statistics task name, performance statistics
collection interval, and performance statistics instance type.
<DeviceA> display pm statistics-task test
Task Name : test
Task State : running
Record-file Status : enable
Task Cycle : 5 minutes
Sample Interval : 1 minutes
Instance Type : interface
Record Interval(cycle) : 3
File Format : text
File Name Prefix : test
File Transfer Mode : passive
Current File Name : a120130525150004.txt
393258
393252
393253
393254
393255
Value:
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1410065408,2,1,0,0,0,0,0,0,0,0,0,0
,0,E3,E3,E3,E3
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1410065408,2,1,0,0,0,0,0,0,0,0,0,0
,0,E3,E3,E3,E3
0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1410065408,2,1,0,0,0,0,0,0,0,0,0,0
,0,E3,E3,E3,E3
Configuration Scripts
#
sysname DeviceA
#
pm
statistics enable
pm-server abc
protocol sftp ip-address 192.168.2.1
username user1 password %+%#H2uA')+.Y#eq-BZ~MEKG7r1_@L:n0*]&i@Z\/z7#%+%#
retry 2
path /pmserver
upload-config req1 server abc
statistics-task test
statistics-cycle 5
record-interval 3
binding instance-type interface instance GigabitEthernet0/1/1
measure disable instance-type interface measure in-all-pkts
#
return
1.1.21.6 Maintaining PM
If a large number of performance statistics are collected on a device, you can run
the following reset command in the performance statistics task view to clear the
current or historical performance statistics.
CAUTION
The statistics cannot be restored after being cleared. Exercise caution when
running this command.
Definition
Upgrade maintenance refers to operations performed to upgrade or maintain a
device. It includes upgrading the basic software package, installing and upgrading
a feature software package, installing a patch, and installing a module.
Purpose
If faults or errors occur in the software running on a device, you need to rectify
them by modifying the software. And if the user environment changes, or you
want to add new features or optimize the device performance or functions to
meet new user requirements, you need to partially update the original device
software. Such operations are all implemented through upgrade maintenance.
Upgrade maintenance enables a device to meet users' service requirements,
improve device reliability, optimize device performance, and ensure robust device
operation on the live network.
NOTE
When you install or upgrade a software package, enable log and alarm management
functions to record all installation or upgrade operations. The recorded information helps
you analyze and locate faults if the installation or upgrade fails.
● Software package upgrade: If the current system software cannot meet the
live network or user service requirements, you can upgrade the system
software to a later version using a software package.
A software package upgrade can be performed in either of the following
ways:
– Specifying the software package that takes effect at the next startup: You
can specify the name of a new software package that takes effect at the
next startup. After the device is restarted, the system automatically uses
the new software package to upgrade the device. In this case, services are
interrupted, affecting service forwarding reliability. In this case, services
are interrupted, affecting service forwarding reliability.
"In-service" in the upgrade maintenance sections indicates that the device does not
need to be restarted.
● Basic software package (*.cc): It can be installed only during device startup
and can be upgraded. It cannot be installed or uninstalled on an in-service
device.
● Feature software package (*.ccx): It can be installed, uninstalled, or upgraded
on an in-service device, can be rolled back, and can also be specified to take
effect at the next startup. It enables the rollout and upgrade of new device
features.
● Patch (*.PAT): It can be installed and uninstalled on an in-service device, can
be rolled back, and can also be specified to take effect at the next startup. It
enables rectification of system software defects.
● Module (*.MOD): It can be installed and uninstalled on an in-service device,
can be rolled back, and can also be specified to take effect at the next
startup. It enables enhancement of system software functions.
Integrity Verification
After a software package is released, it is susceptible to modification or tampering
during transmission, download, storage, and installation. To address this
possibility, digital signatures and hash values are used to verify the validity and
integrity of software packages during installation. Ensure that the software
installed on the device is secure and available by verifying the software before
using it.
● The digital signature mechanism ensures the validity and integrity of software
packages to ensure the security and availability of installed software. A digital
signature is packed into a software package before it is released and validated
before the software package is loaded to a device. The software package is
considered complete and trusted, and applications can be installed, only after
the verification succeeds.
● A hash value is a unique short character string consisting of random letters
and digits. When a software package is installed, the device verifies the hash
value. The software package is considered complete and trusted, and
applications can be installed, only after the verification succeeds.
Feature Requirements
Ensure that the root directory of the user has NetEngin NetEngine 8000
sufficient space for storing the system software e 8000 M M14/NetEngine
package, patch package, and MOD package. 8000 M14K/
NetEngine 8000
M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8
The MOD package version must match the NetEngin NetEngine 8000
system software package version. If the MOD e 8000 M M14/NetEngine
package version does not match the system 8000 M14K/
software package version, the MOD package NetEngine 8000
cannot be loaded. M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8
1. The license control items used for port NetEngin NetEngine 8000
activation are not permanently saved. After the e 8000 M M14/NetEngine
device is restarted, the system re-allocates 8000 M4/
license control items based on the port NetEngine 8000
sequence. The license control items contained M8/NetEngine
in the software package are preferentially 8000E M14/
allocated. Then, the license control items with NetEngine 8000E
more available ports are allocated. For M8
example, if one license control item contains
4*10GE resources and the other license control
item contains 2*10GE resources, the former is
preferentially allocated.
2. After the device is reset, the system reclaims
the license resources occupied by the excess
ports. The reclamation rule is the same as that
for the CM commercial mode. The license
resources of the port with a smaller ID are
preferentially activated, and the license
resources of the port with a larger ID are
reclaimed.
When resources are allocated between devices
on the live network, the number of license
resource items may decrease. In this case, after
the device is restarted, the system reclaims the
license resources occupied by the excess ports.
If you have requirements on the activated
ports, release the ports that are not in use
before the device is restarted.
1. The license control items used for port NetEngin NetEngine 8000
activation are not permanently saved. After the e 8000 M M14/NetEngine
device is restarted, the system re-allocates 8000 M4/
license control items based on the port NetEngine 8000
sequence. The license control items contained M8/NetEngine
in the software package are preferentially 8000E M14/
allocated. Then, the license control items with NetEngine 8000E
more available ports are allocated. For M8
example, if one license control item contains
4*10GE resources and the other license control
item contains 2*10GE resources, the former is
preferentially allocated.
2. After the device is reset, the system reclaims
the license resources occupied by the excess
ports. The reclamation rule is the same as that
for the CM commercial mode. The license
resources of the port with a smaller ID are
preferentially activated, and the license
resources of the port with a larger ID are
reclaimed.
1. Use license 2.0. The license file type must be NetEngin NetEngine 8000
*.dat or *.zip. e 8000 M M14/NetEngine
2. The license file cannot be modified. 8000 M14K/
NetEngine 8000
M4/NetEngine
8000 M8/
NetEngine 8000
M8K/NetEngine
8000E M14/
NetEngine 8000E
M8
Check the CPU and Prevent upgrade Run the display health
memory usage of maintenance failures command to check the CPU and
the device. caused by high CPU memory usage. If the CPU and
and memory usage. memory usage is too high,
reduce the usage before
performing upgrade
maintenance operations. It is
recommended that the CPU
usage be less than or equal to
70%, and that the memory
usage be less than or equal to
90%.
Check the working Ensure that the device Run the display device
status of the works properly and command to check the running
device. prevent upgrade and status of the device. If the
maintenance failures Register field value is
caused by operations Unregistered, the board in the
such as hardware corresponding slot is not
unregistration or registered. If the Alarm field
device startup. value is Abnormal, the board in
the corresponding slot runs
abnormally.
Check the Ensure that there is Run the dir [ /all ] [ filename ]
remaining space of sufficient space for command to check the
the storage storing upgrade remaining space in the storage
medium of the maintenance files. medium of the device to be
device to be upgraded. Ensure that there is
upgraded. sufficient space for storing the
software files to be uploaded
and related documents.
Obtain the Device upgrades are For details, see the official
upgrade guide. closely related to installation or upgrade guide
newly released released by Huawei.
versions. Each new
version comes with a
corresponding upgrade
guide, which provides
instructions for
performing an
upgrade.
Obtain the license Purchase and install For details, see License User
permission. licenses if you need Guide.
some service function
modules or capacity-
based capabilities that
are controlled by
licenses.
When the device is restarted, the system automatically installs the specified next-
startup basic software package. Generally, this mode is used when a device is
upgraded.
NOTE
Device upgrades are closely related to newly released versions. Each new version comes
with a corresponding upgrade guide, which provides instructions for performing an
upgrade.
1.1.22.5.2 Specifying the Basic Software Package That Takes Effect at the Next
Startup
Prerequisites
Before specifying the basic software package that takes effect at the next startup,
you have completed the following task:
Context
Upgrading the basic software package version of the device can improve device
performance, add new features, and eliminate defects existing because software in
the current version is not updated in time.
NOTE
● The basic software package on the active main control board must be the same as that
on the standby main control board. Otherwise, an upgrade fails.
● Ensure that the uploaded files are correct by comparing the file sizes and dates.
● Run the dir file-name command to check whether the names of the basic software
packages (*.cc) in the storage media of the active and standby main control boards are
the same as the name of the uploaded basic software package.
Procedure
Step 1 Upload a basic software package to the storage medium on the active main
control board. For details, see "File System Management Configuration" in
Configuration Guide > Basic Configuration.
Step 2 Copy the basic software package to a storage medium on the standby main
control board.
copy source-filename destination-filename
Step 3 (Optional) Enable the version rollback function and set a rollback timeout period
in an upgrade.
time-value
If you do not log in to a device within the timeout period after the device is
restarted, the system automatically rolls back to the source version.
Step 4 Specify the basic software package that takes effect at the next startup.
startup system-software name [ all | slave-board | slot slot-id ]
NOTE
If a feature software package has been installed on a device and the basic software
package needs to be upgraded, delete the existing feature software package before you
specify the basic software package that takes effect at the next startup. For details, see
1.1.22.6.5 Specifying the Feature Software Package That Takes Effect at the Next
Startup.
Step 5 (Optional) Specify the patch that takes effect at the next startup.
startup patch patch-name all
For an upgraded basic software package that has a patch installed before the
upgrade, if it is rolled back to the source version by specifying the basic software
package that takes effect at the next startup, run this command to make the
patch take effect.
----End
Follow-up Procedure
To install and run a new PAF file after the system restarts, you can run the startup
paf { default | file-name } command to specify the PAF file to be used at the next
startup.
After a device is upgraded to a later version and starts running, you can run the
rollback command to roll back the device to the source version within the first 48
hours. The patch and configuration files are also rolled back.
This document describes only key upgrade operations. For details about a device
upgrade and each released version, obtain the corresponding upgrade guide.
Prerequisites
Before configuring in-service installation of a feature software package, you have
completed the following task:
Context
To use a feature that is not provided in the basic software package but in a
feature software package, you can install the feature software package on an in-
service device. In this case, services are not interrupted. If this feature is no longer
needed, uninstall the corresponding feature software package.
NOTE
Ensure that the uploaded files are correct by comparing the file sizes and dates.
Procedure
Step 1 Upload a feature software package to the storage medium on the active main
control board. For details, see "File System Management Configuration" in
Configuration Guide > Basic Configuration.
Step 2 (Optional) Copy the feature software package to a storage medium on the
standby main control board.
copy source-filename destination-filename
----End
Follow-up Procedure
When a feature is no longer needed, you can run the uninstall feature-software
feature-file command to perform in-service uninstallation of the feature software
package.
Prerequisites
Before configuring in-service upgrade of a feature software package, you have
completed the following task:
Context
To optimize the feature software or remove defects in the existing feature version,
you can upgrade the feature software package separately so that the device can
provide new functions.
NOTE
If a feature software package is stored only in the storage medium on the active main
control board, the standby main control board synchronizes this package on the active main
control board during the in-service upgrade of this package.
If feature software packages are stored in storage media on both the active and standby
main control boards and the packages are different, the standby main control board
synchronizes the feature software package on the active main control board during the in-
service upgrade of this package.
Ensure that the uploaded files are correct by comparing the file sizes and dates.
Procedure
Step 1 Upload a feature software package to the storage medium on the active main
control board. For details, see "File System Management Configuration" in
Configuration Guide > Basic Configuration.
Step 2 (Optional) Copy the feature software package to a storage medium on the
standby main control board.
copy source-filename destination-filename
----End
Prerequisites
Before configuring hitless upgrade of a feature software package, you have
completed the following task:
● Prepare for upgrade maintenance.
Context
Currently, during an in-service upgrade of a feature software package, the existing
feature software package is automatically deleted, which may cause service
interruption. If the hitless upgrade function is used, the feature software package
of the source version can be deleted after the feature software package of the
target version is installed. This ensures uninterrupted services and improves device
reliability.
NOTE
Ensure that the uploaded files are correct by comparing the file sizes and dates.
The hitless upgrade function takes effect only for a feature software package that supports
this function. Before an upgrade, ensure that a software package that supports the hitless
upgrade function has been installed on the device.
Procedure
Step 1 Upload a feature software package to the storage medium on the active main
control board. For details, see "File System Management Configuration" in
Configuration Guide > Basic Configuration.
Step 2 Configure the hitless upgrade function for a feature software package.
issu feature-software feature-file
----End
1.1.22.6.5 Specifying the Feature Software Package That Takes Effect at the Next
Startup
Prerequisites
Before specifying the feature software package that takes effect at the next
startup, you have completed the following task:
● Prepare for upgrade maintenance.
Context
If an independent feature software package has been installed on a device and the
basic software package and independent feature software package need to be
upgraded, you can specify the feature software package that takes effect at the
next startup. In this scenario, you need to delete the existing feature software
package that takes effect at the next startup, specify the basic software package
that takes effect at the next startup, and then specify a feature software package
that matches this basic software package.
If only a feature software package needs to be upgraded, you are advised to use
the in-service upgrade mode.
NOTE
The feature software package on the active main control board must be the same as that
on the standby main control board. Otherwise, the feature software package cannot be
upgraded.
Ensure that the uploaded files are correct by comparing the file sizes and dates.
An independent feature software package is one that can be displayed in the Next startup
feature software field of the display startup command output.
Procedure
Step 1 Upload the desired basic software package and matching feature software
package to the active main control board's storage. For details, see "File System
Management Configuration" in Configuration Guide > Basic Configuration.
Step 2 (Optional) Copy the packages to the standby main control board's storage.
copy source-filename destination-filename
NOTE
After the reset feature-software next-startup command is executed, the feature software
package will not be installed upon the next startup. If a feature is not integrated in the
next-startup basic software package, the configuration of this feature will be deleted during
a startup. To prevent configuration loss, run the startup feature-software name command
before you restart the device. If a feature is integrated into the next-startup basic software
package, it is automatically installed.
Step 5 Specify a feature software package that matches the next-startup basic software
package.
startup feature-software name
NOTE
If a feature software package is not needed after you specify the next-startup basic
software package, you do not need to install the feature software package or run the
startup feature-software command. Instead, you can run the reboot command to restart
the device directly.
----End
Patch Classification
Based on the impact of patch effectiveness on running services, patches are
classified into hot patches and cold patches.
● Hot patch (HP): takes effect without affecting or interrupting services. Using
hot patches helps reduce device upgrade costs and prevent upgrade risks.
● Cold patch (CP): takes effect only after a board is reset or a device is
restarted, which adversely affects services.
Based on patch dependency, patches are classified into incremental patches and
non-incremental patches.
● Incremental patch: is dependent on previous patches. An incremental patch
file must contain all patch information that is contained in the previous patch
file. You can install an incremental patch file without uninstalling the existing
patch file.
● Non-incremental patch: A device can have only one non-incremental patch
installed. Before installing another patch on a device that already has a non-
incremental patch, uninstall the existing non-incremental patch.
NOTE
All patches released for products are hot patches and incremental patches. All patches
mentioned in the following sections are such patches, unless otherwise specified.
Patch Status
Each patch has its own state that can be changed only with user intervention.
Table 1-97 describes patch states.
Patch Installation
For basic software, you can install a patch in either of the following modes:
Prerequisites
Before configuring in-service installation and uninstallation of a patch, you have
completed the following task:
Context
While a device is running, you may need to modify the device's system software.
For example, you may need to remove system defects or add new functions based
on service requirements. Configuring in-service installation of a patch helps you
optimize software without interrupting device running.
NOTE
The patch files on the active and standby main control boards must be the same.
Otherwise, the patch operations will fail.
Ensure that the uploaded files are correct by comparing the file sizes and dates.
Procedure
Step 1 Upload a patch file to the storage medium of the active main control board. For
details, see "File System Management Configuration" in Configuration Guide >
Basic Configuration.
Step 2 Copy the patch file to a storage medium on the standby main control board.
copy source-filename destination-filename
NOTE
● During patch installation, the device checks whether the patch version is consistent with
the system software version. If they are not consistent, the device fails to install the
patch.
● For a non-incremental patch file, if a running patch file exists, the device displays a
message indicating a failure to install the patch. In this case, run the patch delete all
command to delete the existing patch file.
● This command can be used to install a hot or cold patch. After installing a cold patch,
you need to restart the device for the patch to take effect. If you run the reset patch-
configure next-startup command to delete the patch file from the device after the cold
patch is installed, you do not need to restart the device.
----End
Follow-up Procedure
If an exception occurs after a patch is installed, run the patch delete all
command to delete the patch file and uninstall the patch.
If a patch has been installed on the active main control board and the space in the
root directory on a newly inserted standby main control board is insufficient, the
patch can be synchronized to the standby board but will be stored in the memory.
In this case, an alarm indicating insufficient disk space is reported. After you clear
the root directory to release sufficient space, run the patch configuration-
synchronize command to synchronize the patch file from the active main control
board to the root directory on the standby one and clear the alarm. You can run
the display alarm active command to query the alarm with the alarm ID of
0xD160004.
1.1.22.7.3 Specifying the Patch File That Takes Effect at the Next Startup
Prerequisites
Before specifying the patch file that takes effect at the next startup, you have
completed the following task:
● Prepare for upgrade maintenance.
Context
While a device is running, you may need to modify the device's system software.
For example, you may need to remove system defects or add new functions based
on service requirements. You can specify the patch file that takes effect at the next
startup to optimize software.
NOTE
The patch files on the active and standby main control boards must be the same.
Otherwise, the patch operations will fail.
Ensure that the uploaded files are correct by comparing the file sizes and dates.
Procedure
Step 1 Upload a patch file to the storage medium of the active main control board. For
details, see "File System Management Configuration" in Configuration Guide >
Basic Configuration.
Step 2 Copy the patch file to a storage medium on the standby main control board.
Step 3 Specify the patch file that takes effect at the next startup.
startup patch patch-name all
----End
Follow-up Procedure
To disable a patch file from taking effect at the next startup, run the reset patch-
configure next-startup command to delete the patch configuration for the next
startup.
If a patch has been installed on the active main control board and the space in the
home directory on a newly inserted standby main control board is insufficient, the
patch can be synchronized to the standby board but will be stored in the memory.
In this case, an alarm indicating insufficient disk space is reported. After you clear
the home directory to release sufficient space, run the patch configuration-
synchronize command to synchronize the patch file from the active main control
board to the home directory on the standby one and clear the alarm. You can run
the display alarm active command to query the alarm with the alarm ID of
0xD160004.
Context
Patch installation or uninstallation may cause high CPU usage, leading to
interruption of other services.
After a CPU overload threshold is configured, if the CPU usage has exceeded this
threshold for more than 500 ms, the system gives up using CPU resources during
patch installation or uninstallation and hibernates for 500 ms. The system
continues to install or uninstall patches when the CPU is scheduled next time.
Procedure
Step 1 Enter the system view.
system-view
----End
Module Installation
For basic software, you can install a module in either of the following modes:
● In-service module installation: You can install a module on an in-service
device, without interrupting services. This mode is usually used.
For details on how to install a module in this mode, see the corresponding
module installation guide that is released with a module file.
● Next-startup module installation: You can specify the module that takes effect
at the next startup. This mode is usually used during a device upgrade.
Prerequisites
Before configuring in-service installation and uninstallation of a module, you have
completed the following task:
● Prepare for upgrade maintenance.
Context
If a desired module does not exist the system, you can perform in-service
installation of the module so that the functions of the module can be used. In this
process, services are not interrupted. You can also perform in-service uninstallation
of a module if you no longer need it.
NOTE
The module files on the active and standby main control boards must be the same.
Otherwise, the module fails to be installed.
Ensure that the uploaded files are correct by comparing the file sizes and dates.
Procedure
Step 1 Upload a module file to the storage medium of the active main control board (the
file must be saved in the $_install_mod directory). For details, see "File System
Management Configuration" in Configuration Guide > Basic Configuration.
Step 2 Copy the module file to a storage medium on the standby main control board.
copy source-filename destination-filename
----End
Follow-up Procedure
If a module is no longer needed, run the uninstall-module { module-name | all }
command to perform in-service uninstallation of the module.
1.1.22.8.3 Specifying the Module That Takes Effect at the Next Startup
Prerequisites
Before specifying the module that takes effect at the next startup, you have
completed the following task:
Context
If a desired module does not exist in the system, you can configure the module to
take effect at the next startup so that the module is installed after the device is
restarted.
NOTE
The module files on the active and standby main control boards must be the same.
Otherwise, the module fails to be installed.
Ensure that the uploaded files are correct by comparing the file sizes and dates.
Procedure
Step 1 Upload a module file to the storage medium of the active main control board (the
file must be saved in the $_install_mod directory). For details, see "File System
Management Configuration" in Configuration Guide > Basic Configuration.
Step 2 Copy the module file to a storage medium on the standby main control board.
copy source-filename destination-filename
Step 3 Specify the module that takes effect at the next startup.
install-module module-name next-startup
----End
Follow-up Procedure
If a module is no longer needed, run the uninstall-module module-name next-
startup command to uninstall the module that takes effect at the next startup.
Context
Software package rollback applies to the following scenarios:
● A device is functioning properly, but the current software package must be
rolled back to the source version to meet service requirements.
● After the system is upgraded, functions or services cannot be used properly,
requiring the current software package to be rolled back to the source
version.
You can roll back a software package in either of the following modes:
● Automatic mode: When a next-startup software package is specified or a
software package is upgraded on an in-service device, the system
automatically creates a rollback point. You can configure the rollback point
for the next startup to roll back the software package.
● Manual mode: You can manually create a rollback point and configure the
rollback point for the next startup to roll back a software package.
After a software package is successfully rolled back, the corresponding basic
software package, feature software package, patch, and module are all rolled back
to the source version.
Procedure
Step 1 Create a rollback point. Use either of the following methods to create a rollback
point.
● Configure the function of automatically creating a rollback point.
a. Configure the function of automatically creating a rollback point.
undo startup checkpoint auto-save disable
If the verification is successful, the rollback point can be used for rollback.
Otherwise, the rollback point cannot be used for rollback.
Step 4 Configure the rollback point for next startup.
restore startup checkpoint checkpoint-name
----End
Context
Earlier software versions generally have more vulnerabilities. Attackers can exploit
the vulnerabilities to penetrate the software system. To significantly reduce this
risk, you can use the function that prevents system software from being rolled
back to an earlier version without authentication or authorization.
You can use the version revocation list (VRL) to prevent the system software from
being rolled back to an insecure earlier version.
The VRL file specifies the system software of an earlier version that has
vulnerabilities. After the VRL file is loaded to the device, the system software
cannot be rolled back to a version in the VRL file.
This mode applies to all software packages, including basic software packages,
feature software packages, patch files, and module files.
Procedure
● Load a VRL file to the system.
software vrl load vrl-name
----End
Prerequisites
Before loading a CRL, you have completed the following task:
● Upload the CRL to the flash path of the device.
Context
If an issued digital signature certificate needs to be revoked due to key disclosure
or other reasons, a third-party tool can be used to mark the certificate invalid and
add the certificate to the CRL. After you load the latest CRL to a device, the device
does not verify the digital signature certificate upon the next startup.
Procedure
Step 1 Load a CRL file to the system.
software crl load crl-name
----End
Context
Electronic warranties are provided for devices to record the service life of products
and related components, better serving users in the information age. You can
activate electronic warranties and check the recorded hardware activation date,
committed hardware service life, and hardware warranty status.
NOTE
To facilitate the maintenance of product service life information during product inventory
management and service processes, an electronic warranty is provided to each live-network
device.
Procedure
Step 1 Enter the system view.
system-view
By default, the alarm function is enabled for electronic warranties. If the alarm
function needs to be disabled, you need to reactivate the electronic warranties
within the service life to clear alarms first.
----End
Procedure
During routine maintenance, check the version number of the basic software
package and delete the software files that are no longer used to ensure the
normal running of the system.
Check the software display version [ slot You can view the current
version. slot-id ] software version to
determine whether the
device needs to be
upgraded or has been
upgraded successfully.
Check the device version display inventory This helps users learn
and the corresponding package about device information
patch information. during device
maintenance.
Definition
The data communication network (DCN) refers to the network on which network
elements (NEs) exchange Operation, Administration and Maintenance (OAM)
information with the network management system (NMS). It is constructed for
communication between managing and managed devices.
Gateway network elements (GNEs) are connected to the NMS using protocols, for
example, the Simple Network Management Protocol (SNMP). GNEs are able to
forward data at the network or application layer. An NMS directly communicates
with a GNE and uses the GNE to deliver management information to non-GNEs.
Purpose
When constructing a large network, hardware engineers must install devices on
site, and software commissioning engineers must configure the devices also on
site. This network construction method requires significant human and material
resources, causing high capital expenditure (CAPEX) and operational expenditure
(OPEX). If a new NE is deployed but the NMS cannot detect the NE, the network
administrator cannot manage or control the NE. Plug-and-play can be used so
that the NMS can automatically detect new NEs and remotely commission the
NEs to reduce CAPEX and OPEX.
The DCN technique offers a mechanism to implement plug-and-play. After an NE
is installed and started, an IP address (NEIP address) mapped to the NEID of the
NE is automatically generated. Each NE adds its NEID and NEIP address to a link
state advertisement (LSA). Then, Open Shortest Path First (OSPF) advertises all
Type-10 LSAs to construct a core routing table that contains mappings between
NEIP addresses and NEIDs on each NE. After detecting a new NE, the GNE reports
the NE to the NMS. The NMS accesses the NE using the IP address of the GNE and
ID of the NE. To commission NEs, the NMS can use the GNE to remotely manage
the NEs on the network.
NOTE
To improve the system security, it is recommended that the NEIP address be changed to the
planned one.
Benefits
The NMS is able to manage NEs using service channels provided by the managed
NEs. No additional devices are required, reducing CAPEX and OPEX.
Basic Concepts
To improve the system security, it is recommended that the NEIP address be changed
to the planned one.
To use a GNE to access a non-GNE, an NMS searches the DCN core routing table
for the destination NEIP address that maps the target NEID. Then, the NMS sends
a UDP packet to the destination NEIP address. Therefore, to implement the DCN
feature, a DCN core routing tables must be available on each device.
DCN Fundamentals
Huawei NEs can use serial interfaces or sub-interfaces numbered 4094 for DCN
communication. Non-Huawei NEs cannot use serial interfaces for DCN
communication. Therefore, to implement DCN communication between Huawei
NEs and non-Huawei NEs, sub-interfaces numbered 4094 must be configured.
Using Serial Interfaces for DCN Communication
The devices on a data communication network (DCN) communicate with each
other using the Point-to-Point Protocol (PPP) through single-hop logical channels.
Therefore, packets transmitted on the DCN are encapsulated into PPP frames and
forwarded through service ports at the data link layer.
As shown in Figure 1-165, the NMS uses a GNE to manage non-GNEs in the
following process:
1. When a device starts with base configuration, DCN is automatically enabled,
and the NEID configuration is generated based on device planning.
2. After the DCN function is enabled, a PPP channel and an OSPF neighbor
relationship are established between devices.
3. OSPF LSAs are sent between OSPF neighbors to learn host routes carrying
NEIP addresses to obtain mappings between NEIP addresses and NEIDs.
4. GNE sends the mappings to NMS, the NMS use a GNE to access non-GNEs.
A core routing table is generated in the following process:
1. After PPP Network Control Protocol (NCP) negotiation is complete, a point-
to-point route is generated without network segment restrictions.
2. An OSPF neighbor relationship is set up, and an OSPF route is generated for
the entire network.
3. NEIDs are advertised using OSPF LSAs, triggering the generation of a core
routing table.
Using Sub-Interfaces Numbered 4094 for DCN Communication
As shown in Figure 1-165, the NMS uses a GNE to manage non-GNEs in the
following process:
1. Each neighbor learns host routes to NEIP addresses through OSPF, as well as
mapping relationships between NEIP addresses and NEIDs.
2. The GNE sends the mapping relationships to the NMS, the NMS use a GNE to
access non-GNEs.
DCN Application
During network deployment, every network element (NE) must be configured
with software and commissioned after hardware installation to ensure that all NEs
can communicate with each other. As a large number of NEs are deployed, on-site
deployment for each NE requires significant manpower and is time-consuming. In
order to reduce the on-site deployment times and the cost of operation and
maintenance, the DCN can be deployed.
In Figure 1-166, to improve reliability, active and standby GNEs can be deployed.
If the active GNE fails, the NMS can gracefully switch this function to the standby
GNE.
1. A DCN VLAN group is configured on the GNE, and the VLAN ID of the Dot1q
termination subinterface is the same as the DCN VLAN ID of the main
interface.
2. The GNE sends DCN negotiation packets to VLANs in the DCN VLAN group.
3. The DCN negotiation packets are sent to different leaf nodes through VLLs.
4. NEs learn the DCN VLAN ID sent by the GNE and establish DCN connections
with the GNE.
Terms
Term Description
Term Description
Context
NOTE
NOTE
To improve the system security, it is recommended that the NEIP address be changed to the
planned one.
The DCN feature allows NMSs to use GNEs to manage NEs. A GNE supports the
automatic NE report function, enabling the GNE to automatically report a new
NE's information to NMSs immediately after the GNE detects the new NE. Then
the NMSs can rapidly be aware of and manage the new NE. In addition, a GNE
can send a trap to its interworking NMSs when the number of NEs connected to
the GNE reaches the alarm threshold. Then the NMSs will generate alarms to
inform users of this information.
Feature Requirements
Security encryption function for GNEs and NEs: NetEngin NetEngine 8000
1. Disable channel encryption from the NE first e 8000 M M14/NetEngine
and then from the GNE. Otherwise, the NE 8000 M14K/
cannot process the packets sent by the GNE. NetEngine 8000
M8/NetEngine
2. If PTN devices and routers in transport mode 8000 M8K/
are not configured in sequence, NEs cannot NetEngine 8000E
process packets from the NMS. M14/NetEngine
3. After channel encryption is disabled from 8000E M8
the NE, the NE cannot parse the encrypted
packets sent from the GNE and discards the
packets until channel encryption is disabled on
the GNE.
Usage Scenario
The construction of a large network requires significant human and material
resources if software commissioning engineers have to configure devices on site,
causing high operational expenditure (OPEX). DCN can reduce the OPEX by
allowing GNEs to manage NEs. DCN enables NMSs to rapidly detect new NEs and
remotely manage the NEs.
The DCN feature allows NMSs to use GNEs to manage NEs. A GNE supports the
automatic NE report function, enabling the GNE to automatically report a new
NE's information to NMSs immediately after the GNE detects the new NE. Then
the NMSs can manage the new NE in time. In addition, a GNE can send a trap to
its interworking NMSs when the number of NEs connected to the GNE reaches the
alarm threshold. Then the NMSs will generate alarms to inform users of this
information.
Pre-configuration Tasks
Before configuring basic DCN functions, complete the following tasks:
● Configure reachable routes between the GNE and NMSs.
● Configure reachable routes between the GNE and NEs.
NOTE
When the GNE is connected to an NE for the first time, the SSH default user account is
used for login.
Procedure
Step 1 Enable DCN Globally.
1. Run system-view
The system view is displayed.
2. Run dcn
The DCN function is enabled globally.
3. Run commit
The configuration is committed.
Step 2 Enable DCN on an interface and specify a DCN VLAN.
By default, DCN is enabled on some interfaces. For details, see .
NOTE
After an interface is switched to a FLEX interface, the DCN status does not change.
The default DCN enabling rule of a subcard with adjustable interface bandwidth is the
same as that of a subcard with only one type of interface bandwidth and is not affected by
the adjustable bandwidth.
In router mode:
In transport mode:
In transport mode, only one DCN VLAN can be configured. And it is conflicted with service
VLAN.
----End
Follow-up Procedure
An NMS's IP address is a public IP address, and a GNE's NE IP address is a Layer 3
VPN address. To implement address conversion, specify the interface that connects
a GNE to an NMS, bind the interface to a DCN VPN instance, and set an IP
address for the interface. After DCN is enabled globally on the GNE, it
automatically generates a DCN VPN instance named __dcn_vpn__. Detailed
operations are as follows:
● Run the interface interface-type interface-number command to display the
interface view.
● Run the ip binding vpn-instance vpn-instance-name command to bind a
DCN VPN instance.
● Run the ip address { mask | mask-length } command to set an interface IP
address.
Usage Scenario
In addition to basic data communication network (DCN) functions, an NE supports
extended DCN functions.
● If a gateway network element (GNE) belongs to multiple processes and areas,
configure DCN with multiple processes and areas so that the GNE can
manage all the NEs in different processes and areas.
● When an NE functions as a GNE and manages RTN NEs, configure the GNE to
work in compatible mode.
● When a large number of NEs are attached to a GNE that resides on more
than one ring network, ring network services may affect each other. To
address this problem, configure DCN packet transparent transmission.
Pre-configuration Tasks
Before configuring extended DCN functions, globally enable DCN.
Background Information
On large-scale DCNs, different NEs are usually deployed in multiple processes and
areas. In this situation, allocate interfaces on the GNE to different processes and
areas and enable the GNE to advertise its NEIP address to these processes and
areas so that the GNE can learn information about the DCN core routing tables of
all the NEs in these processes and areas and manage the NEs.
Procedure
Step 1 Run system-view
A process and an area are specified for DCN serial interfaces or sub-interface
4094.
NOTE
In most cases, the network (OSPF) command adds an interface to the specified process
and area. However, this command does not apply to DCN serial interfaces or sub-interface
4094 because they borrow the same IP address.
The GNE is enabled to advertise its NEIP address to multiple processes and areas.
----End
Background Information
RTNs use microwave links for service transmission, and no cables are required,
which reduces network deployment cost.
A GNE can manage RTNs only when the DCN compatible mode is configured on
the GNE for DCN communication with the RTNs.
Procedure
Step 1 Run system-view
----End
Context
When a large number of NEs are deployed on a DCN network, the network needs
to be divided. After the network division, if a large number of NEs are attached to
a GNE that resides on more than one ring network, ring network services may
affect each other. To address this problem, configure DCN packet transparent
transmission.
Procedure
Step 1 Run system-view
Context
After DCN is enabled on a CPOS or E1 subcard, default DCN E1 channels are
created automatically, DCN is enabled on the serial interfaces formed by E1
channels' timeslots, and DCN tunnels are established. If DCN tunnels are not
required on a CPOS or E1 subcard, disable automatic recovery of corresponding
default DCN interfaces.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run dcn
The DCN function is enabled globally, and the DCN view is displayed.
Step 3 Run auto-restore e1-channel-set disable
Automatic recovery is disabled for the default DCN interfaces formed by E1
channels' timeslots on a CPOS or E1 subcard.
After automatic recovery is disabled:
● If you delete the default DCN E1 channels that were created automatically,
save the configuration, and restart the device, automatic recovery is disabled.
● If you install a new CPOS or E1 subcard, the default DCN E1 channels will not
be created automatically.
Step 4 Run commit
The configuration is committed.
----End
Usage Scenario
DCN communication uses the Huawei proprietary protocol. Therefore, Huawei NEs
cannot communicate with non-Huawei NEs. To implement DCN communication
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run interface interface-type interface-number
The interface view is displayed.
Step 3 Run dcn mode vlan
A sub-interface numbered 4094 is configured.
Step 4 Run commit
The configuration is committed.
----End
Configuring an Authentication Message for the Private TLV That Supports NMS
Automatic NE Management in LLDP Packets
This section describes how to configure an authentication message for the private
TLV that supports NMS automatic NE management in LLDP packets.
Usage Scenario
When NEs use sub-interfaces numbered 4094 for DCN communication, an NE on
which NMS automatic NE management is configured encapsulates an
authentication message in the private TLV that supports NMS automatic NE
management in an LLDP packet before sending the LLDP packet to a downstream
NE. Upon receipt of the LLDP packet, the downstream NE parses the private TLV if
the downstream NE supports NMS automatic NE management. If the
authentication message carried in the LLDP packet is the same as the one
configured locally, NMS automatic NE management takes effect on the
downstream NE. If the authentication message carried in the LLDP packet is
different from the one configured locally, NMS automatic NE management does
not take effect on the downstream NE.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run lldp enable-dcn authentication authentication-string
An authentication message is configured for the private TLV that supports NMS
automatic NE management in LLDP packets.
Step 3 Run commit
The configuration is committed.
----End
Prerequisites
Extended DCN functions have been configured on all NEs.
Procedure
● Run the display dcn brief command to check configurations of the GNE.
● Run the display dcn ne-info command to check information about the DCN
core routing table.
● Run the display dcn interface [ interface-type interface-number ] command
to check DCN configurations and traffic statistics of an interface.
● Run the display dcn mode vlan interface command to view information
about sub-interfaces 4094.
● Run the display dcn element-info command to view details about all NEs
that use sub-interfaces 4094 for DCN communication.
Usage Scenario
You can improve DCN security through the following methods:
● Configure an alarm threshold for the number of NEs connected to the GNE to
prevent the GNE from being overloaded with NEs. When the number of NEs
connected to the GNE reaches the alarm threshold, the GNE will send a trap
to its interworking NMSs.
● Configure Secure Sockets Layer (SSL) authentication and OSPF interface
authentication to improve DCN network security through the encryption and
authentication mechanisms.
● Configure OSPF parameters as required to optimize DCN routes.
● Adjust the forwarding priority of DCN packets as required to improve network
stability.
● Configure an ACL-based DCN policy to be used to filter DCN packets.
Pre-configuration Tasks
Before configuring related functions to improve DCN security, enable DCN
globally.
to the GNE reaches the alarm threshold, the GNE will send a trap to its
interworking NMSs.
Background Information
On a DCN, NMSs use GNEs to manage all common NEs. To prevent a GNE from
being overloaded with NEs, configure an alarm threshold for the number of NEs
connected to the GNE. When the number of NEs connected to the GNE reaches
the alarm threshold, the GNE will send a trap to its interworking NMSs.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run dcn
The DCN view is displayed.
Step 3 Run ne-number alarm threshold threshold
An alarm threshold is configured for the number of NEs connected to the GNE.
Step 4 Run commit
The configuration is committed.
----End
Prerequisites
Before configuring DCN SSL functions, configure an SSL policy and load a digital
certificate.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run dcn
The DCN view is displayed.
Step 3 Run bind ssl-policy ssl-policy-name
An SSL policy is bound to DCN.
NOTE
Load the certificate of the SSL policy to be bound to the NMSs and GNE, so DCN can use the
certificate to implement SSL handshake authentication after the SSL policy is bound to DCN.
A connection mode is specified for the GNE to set up connections with NMSs.
● normal: indicates that SSL encryption is not applied to the TCP connection.
● security: indicates that SSL encryption is applied to the TCP connection.
● both: indicates that both normal and security are supported.
An alarm generation threshold is set for the number of SSL authentication failures
within 60s.
----End
Procedure
Step 1 Run the system-view command to enter the system view.
Step 2 Run the dtls policy policyName command to enter the DTLS policy view.
Step 3 Run the pki-domain pki-domain command to bind a PKI domain to the DTLS
policy.
NOTE
After a PKI domain is bound to a DTLS policy, the policy uses the certificates and CRL in the
PKI domain.
Step 7 Run the set compatible mode command to configure the DCN compatible mode
on the GNE.
Step 8 Run the bind client dtls-policy dtlsPolicyName command to bind a DTLS policy to
the domain.
NOTE
If the default configuration file for an unconfigured device contains the dcn security-mode
enable command, the bind client dtls-policy qx_dtls_client command is automatically
configured in the DCN view when the device starts with no configuration. In this case, you
do not need to run the bind client dtls-policy dtlsPolicyName command to unbind the
DTLS policy.
----End
Procedure
Step 1 Run system-view
– The new password is at least eight characters long and contains at least two of the
following types: upper-case letters, lower-case letters, digits, and special characters,
except the question mark (?) and space.
– For security purposes, you are advised to configure a password in ciphertext mode.
To further improve device security, periodically change the password.
● To configure Message Digest 5 (MD5) or Secure Hash Algorithm (SHA)
authentication, run the dcn ospf authentication-mode { { md5 | hmac-md5
| hmac-sha256 } [ key-id { plain plain-text | [ cipher ] cipher-text } ] }
command.
NOTE
To ensure higher security, you are advised not to use the MD5 algorithm. In this case,
you can run the undo crypto weak-algorithm disable command to enable the weak-
security algorithm function. To avoid security risks, you are advised to use the HMAC-
SHA256 algorithm.
● To configure null authentication, run the dcn ospf authentication-mode null
command. In null authentication mode, OSPF packets are not authenticated.
OSPF interfaces on the same network segment must have the same
authentication mode and password.
----End
Procedure
Step 1 Run system-view
Step 4 Perform one or more of the following operations to configure OSPF functions.
● Run dcn ospf timer hellointerval
An interval at which hello packets are sent is configured.
● Run dcn ospf timer retransmitinterval
An interval at which an LSA packet is retransmitted to the neighboring router
is set.
● Run dcn ospf trans-delayinterval
An LSA transmission delay is set on the interface.
● Run dcn ospf timer deadinterval
The dead interval is set for a neighboring router.
If an interface does not receive Hello packets from an OSPF neighbor within
the specified interval, the interface considers the neighbor Down. This interval
is called an OSPF neighbor dead interval.
● Run dcn ospf timer pollinterval
The interval at which hello packets for polling are sent by an NBMA interface
is set.
----End
Context
Packets have protocol priorities, based on which they are transmitted. On a DCN
network, you can configure a forwarding priority for DCN packets as follows:
Procedure
Step 1 Run system-view
----End
Prerequisites
Before configuring an ACL-based DCN policy, complete either of the following
tasks:
● Create a basic ACL using the acl (basic ACL) command and configure a rule
for the ACL using the rule (basic ACL view) command in the basic ACL view.
● Create an advanced ACL using the acl (advanced ACL) command and
configure a rule for the ACL using the rule (advanced ACL view) command
in the advanced ACL view.
Procedure
Step 1 Run system-view
----End
Disabling Fast DCN Session Restart Triggered by DCN PPPoE Terminate Packets
Disabling fast DCN session restart triggered by DCN PPPoE Terminate packets
prevents such packets from being used to launch an attack, which improves device
reliability.
Background
DCN PPPoE Terminate packets are used to instruct a peer end to fast restart a
DCN session. Due to the lack of an authentication mechanism in DCN, if DCN
PPPoE Terminate packets are used to launch an attack, devices fail to be managed
by the NMS. To address this problem, disable fast DCN session restart triggered by
DCN PPPoE Terminate packets.
Procedure
Step 1 Run system-view
Fast DCN session restart triggered by DCN PPPoE Terminate packets is disabled.
----End
Context
If the DCN channel between a GNE and an NE is not encrypted, the channel is
prone to attacks. To improve security, configure encryption for the channel.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run dcn
The DCN view is displayed.
Step 3 Run dcn encrypt neid neid authkey auth-key dh-algorithm { dh1024 | dh2048 }
*
Encryption is configured for the channel to the NE with a specified NEID.
Step 4 Run commit
The configuration is committed.
----End
Context
If unauthorized QX TCP packets are used to launch a DDoS attack, authorized QX
TCP packets may not reach the QX component in a timely manner, interrupting
the QX TCP connection. To address this issue and ensure that authorized QX TCP
connections are not interrupted, configure the session-CAR function for QX TCP
connections.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run whitelist session-car qx-tcp { cir cir-value | cbs cbs-value | pir pir-value | pbs
pbs-value } *
The whitelist session-CAR parameters for QX TCP connections are configured.
In normal cases, you are advised to use the default values.
Step 3 (Optional) Run whitelist session-car qx-tcp disable
Whitelist session-CAR is disabled for QX TCP connections.
By default, whitelist session-CAR is enabled for QX TCP connections. If this
function encounters an exception or adversely affects other services, disable it. In
normal cases, you are advised to keep this function enabled.
Step 4 Run commit
The configuration is committed.
----End
Result
Run the following command to check the preceding configuration.
Run the display cpu-defend whitelist session-car qx-tcp statistics slot slot-id
command to check statistics about whitelist session-CAR for QX TCP connections
on a specified interface board.
To check such statistics generated within a specific period of time, run the reset
cpu-defend whitelist session-car qx-tcp statistics slot slot-id command to clear
the existing statistics on the specified interface board. Then, after a certain period
of time, run the display cpu-defend whitelist session-car qx-tcp statistics slot
slot-id command.
NOTE
Cleared whitelist session-CAR statistics cannot be restored. Exercise caution when running
the reset command.
Context
If unauthorized QX UDP packets are used to launch a DDoS attack, authorized QX
UDP packets may not reach the QX component in a timely manner, interrupting
the QX UDP connection. To address this issue and ensure that authorized QX UDP
connections are not interrupted, configure the session-CAR function for QX UDP
connections.
Procedure
Step 1 Run system-view
Step 2 Run whitelist session-car qx-udp { cir cir-value | cbs cbs-value | pir pir-value |
pbs pbs-value } *
----End
Result
Run the following command to check the preceding configuration.
Run the display cpu-defend whitelist session-car qx-udp statistics slot slot-id
command to check statistics about whitelist session-CAR for QX UDP connections
on a specified interface board.
To check such statistics generated within a specific period of time, run the reset
cpu-defend whitelist session-car qx-udp statistics slot slot-id command to clear
the existing statistics on the specified interface board. Then, after a certain period
of time, run the display cpu-defend whitelist session-car qx-udp statistics slot
slot-id command.
NOTE
Cleared whitelist session-CAR statistics cannot be restored. Exercise caution when running
the reset command.
Prerequisites
Related functions to improve DCN security have been configured on all NEs.
Procedure
● Run the display this command to check configurations that improve DCN
security.
● Run the display dcn brief command to check configurations of the GNE.
Networking Requirements
As shown in Figure 1-168, the GNE is directly connected to an NMS and two NEs.
A static route is configured for communication between the NMS and GNE. After
the DCN function is configured, the NMS can manage the attached NEs through
the GNE and automatically discover new NEs.
Precautions
Before configuring DCN, note the following:
● An NMS's IP address is a public IP address, and a GNE's NEIP address is a
Layer 3 virtual private network (VPN) address. To implement address
conversion, you must specify a GNE's interface that is connected to an NMS,
bind the GNE's interface to a DCN VPN instance, and set an IP address for the
GNE's interface.
● The binding operation must be performed before you set an IP address for the
interface. Otherwise, this IP address will be deleted when you bind the
interface to the DCN VPN instance.
Configuration Roadmap
The configuration roadmap is as follows:
1. Enable the DCN feature globally.
2. Bind the interface (connecting the GNE to the NMS) to a DCN VPN instance.
Then set an IP address for the interface.
3. Configure a static route for communication between the NMS and GNE.
4. Configure the automatic NE report function on the GNE.
Data Preparation
To complete the configuration, you need the following data:
A DCN VPN instance named __dcn_vpn__ is automatically generated when the DCN
feature is enabled globally on the GNE.
You can run the display ip vpn-instance command on the GNE to view the DCN VPN
instance name.
● IP address of the interface connecting the GNE to the NMS
Procedure
Step 1 Enable the DCN feature globally.
Step 2 Bind the interface (connecting the GNE to the NMS) to DCN VPN instance
__dcn_vpn__. Then, set an IP address for the interface.
[*gne] interface GigabitEthernet 0/1/0
[*gne-GigabitEthernet0/1/0] ip binding vpn-instance __dcn_vpn__
[*gne-GigabitEthernet0/1/0] ip address 172.16.1.2 16
[*gne-GigabitEthernet0/1/0] commit
[~gne-GigabitEthernet0/1/0] quit
Step 3 Configure a static route for communication between the NMS and GNE. For
configuration details, see "Configuration Files" in this section.
----End
Configuration Files
● Configuration file of the GNE
#
ip dcn vpn-instance __dcn_vpn__
#
interface GigabitEthernet0/1/0
undo shutdown
dcn
ip binding vpn-instance __dcn_vpn__
ip address 172.16.1.2 255.255.0.0
#
interface LoopBack2047
description DCN loopback interface
ip binding vpn-instance __dcn_vpn__
ip address 10.1.1.2 255.255.255.0
#
ospf 65534 vpn-instance __dcn_vpn__
description DCN ospf create by default
opaque-capability enable
vpn-instance-capability simple
area 0.0.0.0
network 0.0.0.0 255.255.255.255
#
!The DCN function implements the capability of plug-and-play for this device.
!A NE IP address based on the unique NE ID is automatically generated in VPN
!of DCN. It is recommended that the NE IP address be changed to the planned
!one by running the ne-ip X.X.X.X <MASK> command after the device being online.
dcn
auto-report
ne-ip 10.1.1.2 255.255.255.0
#
return
Networking Requirements
On the network shown in Figure 1-169, a DCN VLAN group is configured on the
GNE, and the GNE sends DCN negotiation packets carrying the IDs of VLANs in
the DCN VLAN group to a third-party network. On the third-party network, DCN
packets carrying different VLAN IDs are forwarded to leaf nodes through different
virtual leased lines (VLLs). The NE devices learn the DCN VLAN packets sent from
the GNE and establish DCN connections with the GNE.
Precautions
This function applies only to the router mode.
If an Ethernet sub-interface is configured as a Dot1q termination sub-interface,
the VLAN ID of the sub-interface can be the same as the DCN VLAN ID of the
main interface.
Configuration Roadmap
The configuration roadmap is as follows:
Data Preparation
To complete the configuration, you need the following data:
● DCN VLAN ID
Procedure
Step 1 Enable the DCN feature globally.
# Enable the DCN feature globally. In this example, a GNE is used. Then, use the
same method to enable DCN feature globally for NE1, NE2, and NE3.
<HUAWEI> system-view
[~HUAWEI] dcn
[~HUAWEI-dcn] quit
# Enable interface-specific DCN. For example, enable DCN on GE0/1/0 of the GNE.
Then, use the same method to enable interface-specific DCN for NE1, NE2, and
NE3.
<HUAWEI> system-view
[~HUAWEI] interface gigabitethernet 0/1/0
[~HUAWEI-GigabitEthernet0/1/0] dcn
----End
Configuration Files
● Configuration file of the GNE
#
interface GigabitEthernet0/1/0
undo shutdown
dcn
dcn vlan 1 to 3
#
interface GigabitEthernet0/1/0.1
vlan-type dot1q 1
#
interface GigabitEthernet0/1/0.2
vlan-type dot1q 2 default
#
interface GigabitEthernet0/1/0.3
vlan-type dot1q 3 default
#
!The DCN function implements the capability of plug-and-play for this device.
!A NE IP address based on the unique NE ID is automatically generated in VPN
!of DCN. It is recommended that the NE IP address be changed to the planned
!one by running the ne-ip X.X.X.X <MASK> command after the device being online.
dcn
auto-report
ne-ip 10.1.1.2 255.255.0.0
#
return
dcn
#
return
Definition
Remote Network Monitoring (RMON) is a widely used standard defined by the
Internet Engineering Task Force (IETF) for monitoring large-scale networks. It
enables network administrators to monitor data traffic on a network segment or
an entire network and is an enhancement of the Management Information Base II
(MIB II) specification.
Purpose
As networks become more and more distributed, the IETF developed RMON to
address the limitations of the Simple Network Management Protocol (SNMP). It
improves the availability of management information, lightens the burden on the
Network Management Station (NMS), and enables network administrators to
monitor multiple network segments.
With RMON, administrators can monitor remote network devices more efficiently
and proactively through SNMP. In addition, RMON provides a highly efficient
solution to monitor sub-networks. It decreases the volume of traffic between the
NMS and agents and facilitates large-size network management.
Benefits
RMON provides an efficient method for monitoring networks and brings the
following benefits:
● Expanded monitoring range: RMON MIBs expand the range of network
management to the data link layer, enabling administrators to monitor
networks more effectively.
● Offline operation: RMON Agent can continuously collect error, performance,
and configuration data even when the administrator is not querying network
statuses. RMON provides a solution for analyzing the traffic in a specific range
without consuming bandwidth resources.
● Data analysis: RMON Agent analyzes network problems and resource
consumption, providing information to diagnose faults and reducing the
overall workload of the NMS.
Background
The widely used SNMP collects network communication statistics using agent
software embedded in managed devices. By sending query signals to the Agent
Management Information Base (MIB) in polling mode, the management software
is able to obtain network management data. Although the MIB counter records
data statistics, it cannot analyze historical data. The NMS software continuously
polls the managed devices for data, which is then used to build an overall picture
of network traffic and traffic changes. This is then used to analyze the overall
network status.
SNMP-based polling has two disadvantages:
● SNMP consumes a significant amount of network resources. Polling involves
generating a large volume of packets on large-scale networks, leading to
network congestion or blocking. Consequently, SNMP is not suitable for
managing large-scale networks or reclaiming abundant data, such as the
routing table.
● SNMP increases the burden on the network administrator. During polling, the
network administrator must manually collect information using the NMS
software. This is labor-intensive, especially if the administrator monitors more
than three network segments.
To address these disadvantages, the IETF developed RMON for monitoring data
traffic on a network segment or across an entire network. It provides more
valuable management information, lightens the NMS workload, and allows the
network administrator to monitor multiple network segments.
● RMON is an enhancement of SNMP, and built based on the SNMP
architecture, making it compatible with the existing SNMP architecture.
RMON consists of two parts: the NMS and the Agent located on each device.
Because of the similarities between RMON and SNMP, an SNMP NMS can be
used as an RMON NMS, and the administrator does not need to learn a new
technology. This means that RMON is easy to implement.
● When an abnormality occurs on the monitored object, the RMON agent sends
trap messages to the NMS using the SNMP mechanism for transmitting trap
messages. Because SNMP typically uses the trap function to notify the
managed device of function and interface statuses, the monitored objects,
triggering conditions, and reported information differ between RMON and
SNMP.
● RMON enables SNMP to monitor remote network devices more efficiently
and proactively. Using RMON, managed devices automatically send trap
messages when a specific monitored value exceeds the alarm threshold.
Therefore, managing devices do not need to obtain MIB variables by
continuous polling and comparison. This implementation reduces the volume
of traffic sent between the managing and managed devices, and allows
administrators to manage large-scale networks more easily and effectively.
Related Concepts
● NMS: A workstation that runs the network management software.
● MIB: A specification that defines and organizes a collection of managed
objects.
● RMON Agent: A remote management process embedded in managed devices.
● Polling: The NMS queries managed devices by sending SNMP packets.
● RMON MIB: Network management medium of RMON. RMON Agent is
embedded in monitored devices that collect data and control the system
within a network segment, as defined by the MIB. The NMS obtains the
management information from the RMON Agent and controls the network
resources. The RMON MIB provides data link layer monitoring and diagnosis
of device faults. To facilitate network monitoring, Huawei has implemented
Functions
Statistics function
Ethernet statistics (corresponding to the statistics group in RMON MIB): The
system continuously collects statistics about traffic on a network segment and the
types of packets, or the number of various error frames and collisions. The
statistics include network collisions, CRC error packets, the number of oversize or
undersize packets, the number of broadcast or multicast packets, and the number
of received bytes or packets.a
Historical sampling function (corresponding to the history group in the RMON
MIB): The system periodically samples network statuses and stores the
information for later queries. The system also periodically samples port traffic
data (specifically, bandwidth usage, the number of error packets, and the total
number of packets).
Alarm function
The function to process an event as recording a log or sending trap messages
(corresponding to the event group in the RMON MIB): The event group controls
the events and notifications, and provides all the events generated by the RMON
Agent. A log is generated or trap messages are sent to the NMS when an event
occurs.
Alarm threshold (corresponding to the alarm group in the RMON MIB): The
system monitors the objects of a specific alarm type. Once an alarm's upper and
lower thresholds are defined, the system samples the values of monitored objects
at a pre-defined interval (a sampled value can be either an absolute value or a
difference in values). If the sampled values reach or exceed the upper threshold, a
rising alarm is generated. Conversely, if the sampled values fall to or below the
lower threshold, a falling alarm is generated. The NMS processes these alarms
based on the definitions of the events. RMON Agent either records the
information as a log or sends trap messages to the NMS.
Feature Requirements
None
Context
Configuring the RMON statistics function helps to collect and record statistics of
an interface.
RMON statistics can be divided into the Ethernet statistics function and historical
sampling function.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Determine the interface on which statistics are collected and enter the interface
view.
interface interface-type interface-number
----End
Context
After the RMON alarm function is configured on a device, the device will generate
a log or an alarm if the sampling value exceeds the alarm threshold.
The RMON alarm function is implemented based on the event table and alarm
table.
● Event table (corresponding to the event group in the RMON MIB): When an
event occurs, the device generates a log or sends a trap message to the NMS.
● Alarm table (corresponding to the alarm group in the RMON MIB): A
specified alarm variable identified by its OID is monitored at a specified
Procedure
Step 1 Enter the system view.
system-view
Step 2 Configure the function of sending trap messages or recording logs for events.
rmon event entry-number [ description string ] { log | trap object | log-trap object | none } [ owner
owner-name ]
The event function is configured. The parameters in the command are described
as follows:
● log: The system only generates a log.
● log-trap: The system generates a log and sends a trap message to the NMS.
● none: The system does not take any action.
● trap: The system only sends a trap message to the NMS.
If the events corresponding to the upper and lower alarm thresholds (event-entry1
and event-entry2) are not configured, no alarm is generated even if the alarm
conditions are satisfied. In this case, the alarm is in the Undercreation state rather
than in the Valid state.
----End
Prerequisites
RMON configuration has been completed.
Procedure
● Run the display rmon statistics [ interface-type interface-number | interface-
name ] command to check RMON statistics.
● Run the display rmon history [ interface-type interface-number | interface-
name ] command to check RMON historical sampling information.
● Run the display rmon event [ entry-number ] command to check the RMON
event processing mode (either recording a log or sending a trap message).
● Run the display rmon eventlog [ entry-number ] command to check details
about RMON logs.
● Run the display rmon alarm [ entry-number ] command to check RMON
alarm configurations.
----End
Networking Requirements
On the network shown in Figure 1-170, the subnet connected to
GigabitEthernet0/1/2 of DeviceA needs to be monitored. This includes:
● Collecting real-time and historical statistics about specific traffic and various
packets.
● Monitoring broadcast and multicast traffic on the subnet and enabling the
alarm function for the total number of broadcast and multicast packets.
When the total number of such packets exceeds the configured threshold, the
system proactively reports alarm information to the NMS.
Configuration Roadmap
The configuration roadmap is as follows:
1. Ensure that there are reachable routes between the device and NMS.
2. Configure SNMP and usernames and ensure that the device can send trap
messages to the NMS.
3. Configure the RMON statistics function and collect traffic statistics on
interfaces.
4. Configure the RMON alarm function so that a trap message is sent to the
NMS when the sampling value exceeds the set threshold.
Procedure
Step 1 Configure reachable routes between the device and NMS. For details, see
Configuration Scripts.
# Configure the historical traffic sampling function to sample the traffic on the
subnet at an interval of 30 seconds and save the 10 most recent historical entries.
[~DeviceA-GigabitEthernet0/1/2] rmon history 1 buckets 10 interval 30 owner userA
[*DeviceA-GigabitEthernet0/1/2] quit
[*DeviceA] commit
# Configure the device to send trap messages to the NMS when RMON event 1
occurs.
[~DeviceA] rmon event 1 description alarmofinterface trap nms2-admin owner userA
[*DeviceA] commit
[*DeviceA] quit
[*DeviceA] commit
----End
Configuration Scripts
#
sysname DeviceA
#
interface GigabitEthernet0/1/1
undo shutdown
ip address 10.2.2.1 255.255.255.0
#
undo shutdown
ip address 10.3.3.1 255.255.255.0
rmon-statistics enable
rmon statistics 1 owner userA
rmon history 1 buckets 10 interval 30 owner userA
#
ip route-static 10.1.1.0 255.255.255.0 10.2.2.2
#
snmp-agent
#
snmp-agent target-host trap address udp-domain 10.1.1.1 params securityname nms2-admin v3 privacy
#
rmon event 1 description alarmofinterface trap nms2-admin owner userA
rmon alarm 1 1.3.6.1.2.1.2.2.1.4.3 5 absolute rising-threshold 1000 1 falling-threshold 100 1 owner userA
#
return
Definition
System of active immunization and diagnosis (SAID) is an intelligent fault
diagnosis system that automatically diagnoses and rectifies severe device or
service faults by simulating human operations in troubleshooting.
Purpose
A network is prone to severe problems if it fails to recover from a service
interruption. At present, device reliability is implemented through various
detection functions. Once a device fault occurs, the device reports an alarm or
requires a reset for fault recovery. However, this mechanism is intended for fault
detection of a single module. When a service interruption occurs, the network may
fail to promptly recover from the fault, adversely affecting services.
The SAID is promoted to address the preceding issues. The SAID achieves
automated device fault diagnosis, fault information collection, and service
recovery, comprehensively improving the self-healing capability and
maintainability of devices.
Benefits
The SAID can automatically detect, diagnose, and rectify device faults, greatly
improving network maintainability and reducing maintenance costs.
Basic Concepts
● SAID node: detects, diagnoses, and rectifies faults on a device's modules in
the SAID. SAID nodes are classified into the following types:
– Module-level SAID node: defends against, detects, diagnoses, and rectifies
faults on a module.
– SAID-level SAID node: detects, diagnoses, and rectifies faults on multiple
modules.
● SAID node state machine: state triggered when a SAID node detects,
diagnoses, and rectifies faults. A SAID node involves seven states: initial,
detecting, diagnosing, invalid-diagnose, recovering, judging, and service
exception states.
● SAID tracing: The SAID collects and stores information generated when a
SAID node detects, diagnoses, and rectifies faults. The information can be
used to locate the root cause of a fault.
SAID
Fault locating in the SAID involves the fault detection, diagnosis, and recovery
phases. The SAID has multiple SAID nodes. Each time valid diagnosis is triggered
(that is, the recovery process has been triggered), the SAID records the diagnosis
process information for fault tracing. The SAID's main processes are described as
follows:
1. Defense startup phase: After the system runs, it instructs modules to deploy
fault defense (for example, periodic logic re-loading and entry
synchronization), starting the entire device's fault defense.
2. Detection phase: A SAID node detects faults and finds prerequisites for
problem occurrence. Fault detection is classified as periodic detection (for
example, periodic traffic decrease detection) or triggered detection (for
example, IS-IS Down detection).
3. Diagnosis phase: Once a SAID node detects a fault, the SAID node diagnoses
the fault and collects various fault entries to locate fault causes (only causes
based on which recovery measures can be taken need to be located).
4. Recovery phase: After recording information, the SAID node starts to rectify
the fault by level. After the recovery action is completed at each level, the
SAID node determines whether services recover (by determining whether the
fault symptom disappears). If the fault persists, the SAID node continues to
perform the recovery action at the next level until the fault is rectified. The
recovery action is gradually performed from a lightweight level to a
heavyweight level.
5. Tracing phase: If the SAID determines the fault and its cause, this fault
diagnosis is a valid diagnosis. The SAID then records the diagnosis process.
After entering the recovery phase, the SAID records the recovery process for
subsequent analysis.
13. If the service does not recover in the judging state and a secondary recovery
action exists, the SAID node enters the recovering state.
14. If the service does not recover in the judging state and no secondary recovery
action exists, the SAID node enters the service exception state.
15. In the service exception state, the SAID node periodically checks whether the
service recovers.
16. If the service recovers in the judging state, the SAID node enters the initial
state.
Background
The failure to ping a directly connected device often occurs on networks, causing
services to be interrupted for a long time and fail to automatically recover. The
ping process involves various IP forwarding phases. A ping failure may be caused
by a hardware entry error, board fault, or subcard fault on the local device or a
fault on an intermediate device or the peer device. Therefore, it is difficult to
locate or demarcate the specific fault.
Definition
The ping service node is a specific SAID service node. This node performs link-
heartbeat loopback detection to detect service faults, diagnoses each ping
forwarding phase to locate or demarcate faults, and takes corresponding recovery
actions.
Principles
For details about the SAID framework and principles, see Basic SAID Functions.
SAID uses IP packets in which the protocol number is 1, indicating ICMP. The ping
service node undergoes four phases (fault detection, fault diagnosis, fault
recovery, and service recovery determination) to implement automatic device
diagnosis, fault information collection, and service recovery.
● Fault detection
The ping service node performs link-heartbeat loopback detection to detect
service faults. The packets used are ICMP detection packets. There are 12
packet templates in total. Each template sends two packets in sequence
within a period of 30s. Therefore, a total of 24 packets are sent by the 12
templates within a period of 30s. After five periods, the system starts to
collect statistics on lost packets and modified packets.
Link-heartbeat loopback detection is classified as packet modification
detection or packet loss detection.
– Packet modification detection checks whether the content of received
heartbeat packets is the same as the content of sent heartbeat packets. If
one of the following conditions is met, a trigger message is sent to
instruct the SAID ping node to perform fault diagnosis:
▪ After each packet sending period ends, the system checks the
protocol status and whether ARP entries exist on the interface and
find that there is no ARP in three consecutive periods.
Background
A large number of forwarding failures occur on the network and cannot recover
automatically. As a result, services are interrupted and cannot be automatically
restored for a long time. A mechanism is required to detect forwarding failures
that cannot recover automatically. After a forwarding entry (such as route
forwarding entry and ARP forwarding entry) failure is detected, proper measures
are taken to rectify the fault quickly.
Definition
The control plane with forwarding plane consistency check (CFC) service node is a
specific service node in the SAID framework. The CFC node selects some typical
routes and compares the outbound interface, MAC address, and label
encapsulation information on the control plane with those on the forwarding
plane. If the information is inconsistent, the system enters the diagnosis state and
performs the consistency check for multiple times. If the comparison result
remains, an alarm is generated.
Principles
The SAID system diagnoses the CFC service node through three phases: flow
selection, check, and troubleshooting. In this case, devices can perform automatic
diagnosis, collect fault information automatically, and generate alarms.
● Flow selection
There are a large number of routes on the live network. The system selects
typical routes for the check.
Routes are selected based on the following priorities. Default route > 32-bit
direct route > Static route > Private routes > Others
The total number of 4000 flows can be selected, and the quota of each type
of flow is limited. The system delivers a flow selection task based on the
standard quota of each type of flow. If the quota of a type of flow is not used
up, the extra quota is used for other types of flows after summarizing the
results.
● Check
After summarizing the flow selection results of interface boards and obtaining
the final flow set to be checked, the main control board broadcasts the flow
selection information to each interface board. The interface boards start to
check the flows.
Data on the control plane is inconsistent with that on the forwarding plane in
the following situations:
a. The forwarding plane has the outbound interface, MAC address, and label
encapsulation information, but the control plane does not.
b. Data on the forwarding plane is incorrect (for example, an entry is
invalid), and no hardware forwarding result is obtained. If the outbound
interface, MAC address, and label encapsulation information can be
obtained, the data compared with that on the control plane. In normal
cases, the data on the forwarding plane is the same as or is a subset of
that on the control plane.
● Troubleshooting
After a fault occurs, the context information related to the fault is collected.
Then, the device enters the diagnosis state and repeatedly checks the
incorrect flow. If an entry error occurs for three consecutive times, the device
enters the recovery state. If no error occurs once, the flow is considered
normal and no further diagnosis is required.
After the fault is diagnosed, you can run commands to restart the interface to
rectify the fault.
After the fault recovery action is performed, the current flow needs to be
checked again after it keeps stable and does not change for 5 minutes. If the
fault persists, an alarm is generated and the context information related to
the fault is collected. If the fault is rectified, the system enters the detection
state again and continues to check the subsequent flows.
After an alarm is generated, the SAID system keeps checking the current flow
until the flow is correct. Then, the alarm is cleared and the system enters the
detection state.
Background
As the manufacturing technique of electronic components evolves towards deep
submicron, the per-unit soft failure rate of storage units in such components has
been increasing. As a result, single event upset (SEU) faults often occur, adversely
affecting services.
Definition
If a subcard encounters an SEU fault, SAID for SEU performs loopbacks on all
interfaces of the subcard. If packet loss or modification occurs during loopback
detection, the subcard is reset for fault rectification.
Principles
The SAID system diagnoses an SEU fault through three phases: fault detection,
loopback detection, and troubleshooting. This enables devices to perform
automatic diagnosis and fault information collection.
● Fault detection
SAID for SEU detects an SEU fault on a logical subcard and starts loopback
detection.
● Loopback detection
Loopback detection is to send ICMP packets from the CPU on the involved
interface board to an interface on the faulty subcard and then loop back the
ICMP packets from the interface to the CPU.
● Troubleshooting
a. If packet loss or modification occurs, SAID for SEU performs either of the
following operations depending on the status of the involved interface:
i. If the interface is physically Up, SAID for SEU resets the subcard.
ii. If the interface is physically Down, SAID for SEU keeps the interface
Down until the fault is rectified.
b. If statistics about the sent and received loopback packets are properly
collected and packet verification is normal, the subcard does not need to
be reset.
Terms
None.
Abbreviation
Abbreviatio Full Spelling
n
Introduction
A network is prone to severe problems if it fails to recover from a service
interruption. At present, device reliability is implemented through various
detection functions. Once a device fault occurs, the device reports an alarm or
requires a reset for fault recovery. However, this mechanism is intended for fault
detection of a single module. When a service interruption occurs, the network may
fail to promptly recover from the fault, adversely affecting services.
The SAID is promoted to address the preceding issues. The SAID achieves
automated device fault diagnosis, fault information collection, and service
recovery, comprehensively improving the self-healing capability and
maintainability of devices.
Basic Concepts
● SAID node: detects, diagnoses, and rectifies faults on a device's modules in
the SAID. SAID nodes are classified into the following types:
– Module-level SAID node: defends against, detects, diagnoses, and rectifies
faults on a module.
– SAID-level SAID node: detects, diagnoses, and rectifies faults on multiple
modules.
● SAID node state machine: state triggered when a SAID node detects,
diagnoses, and rectifies faults. A SAID node involves seven states: initial,
detecting, diagnosing, invalid-diagnose, recovering, judging, and service
exception states.
● SAID tracing: The SAID collects and stores information generated when a
SAID node detects, diagnoses, and rectifies faults. The information can be
used to locate the root cause of a fault.
SAID
Fault locating in the SAID involves the fault detection, diagnosis, and recovery
phases. The SAID has multiple SAID nodes. Each time valid diagnosis is triggered
(that is, the recovery process has been triggered), the SAID records the diagnosis
process information for fault tracing. The SAID's main processes are described as
follows:
1. Defense startup phase: After the system runs, it instructs modules to deploy
fault defense (for example, periodic logic re-loading and entry
synchronization), starting the entire device's fault defense.
2. Detection phase: A SAID node detects faults and finds prerequisites for
problem occurrence. Fault detection is classified as periodic detection (for
example, periodic traffic decrease detection) or triggered detection (for
example, IS-IS Down detection).
3. Diagnosis phase: Once a SAID node detects a fault, the SAID node diagnoses
the fault and collects various fault entries to locate fault causes (only causes
based on which recovery measures can be taken need to be located).
4. Recovery phase: After recording information, the SAID node starts to rectify
the fault by level. After the recovery action is completed at each level, the
SAID node determines whether services recover (by determining whether the
fault symptom disappears). If the fault persists, the SAID node continues to
perform the recovery action at the next level until the fault is rectified. The
recovery action is gradually performed from a lightweight level to a
heavyweight level.
5. Tracing phase: If the SAID determines the fault and its cause, this fault
diagnosis is a valid diagnosis. The SAID then records the diagnosis process.
After entering the recovery phase, the SAID records the recovery process for
subsequent analysis.
Feature Requirements
Context
The diagnosis and recovery durations of a single SAID node must not exceed 10
and 30 minutes, respectively. If either duration is exceeded, the SAID node is
disabled by default. When a SAID node is processing a large number of services,
the processing efficiency of other SAID nodes may be reduced because of
performance insufficiency. To guarantee the processing efficiency, you can run the
set said-node command to disable this node.
If the node is not in the detecting state after being disabled, it automatically
returns to the detecting state upon completion of the operation in the current
phase. When the next SAID task is started to perform detection, the system
detects that the SAID node is disabled and therefore skips it.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run set said-node { all | said-name [ slot slot-id ] } disable
The SAID node is disabled.
In VS mode, this command is supported only by the admin VS.
----End
Prerequisites
Before enabling the CFC node recovery function, ensure that the function to check
the consistency between the control plane and forwarding plane has been
enabled. If the function is disabled, run the undo set said-node cfc disable
command to enable it.
Context
After the CFC node recovery function is enabled, if a fault occurs and the system
enters the diagnosis state, the interface is restarted after a flow is considered
faulty for three consecutive times.
In VS mode, this configuration task is supported only by the admin VS.
Procedure
Step 1 Run system-view
The system view is displayed.
Step 2 Run set said-cfc recovery enable
The CFC node recovery function is enabled.
To disable the control plane and forwarding plane inconsistency recovery function,
run the undo set said-cfc recovery enable command.
Step 3 Run commit
The configuration is committed.
----End
Definition
The protocol-aided diagnosis system (PADS) is an intelligent diagnosis system. It
simulates experts in multiple fields to automatically prevent, discover, diagnose,
and rectify service faults 24/7.
Purpose
PADS is developed based on technical research on future-oriented O&M. Designed
based on common fault modes summarized from thousands of faults reported by
customers, it simulates experts to monitor the status of IP protocol-related
functional modules in real time. PADS aims to enable users to implement complex
Benefits
PADS simplifies O&M, improves O&M efficiency, and reduces O&M costs.
PADS Functions
PADS simulates experts to monitor the service status in real time. It also
proactively detects faults, and automatically diagnoses and rectifies them.
PADS provides the following functions:
● Self-diagnosis and self-recovery in specific fault modes
● Service health checks and self-recovery upon poor check results
The service health checks include:
● Abnormal service status check: Diagnostic logs are generated. The status of
the recent abnormal services can be queried using the CLI.
● Ongoing service status check: Diagnostic information is generated in the PADS
O&M file on the PADS-dedicated flash, which helps restore services.
Implementation
1. The status of each service is saved in real time to the PADS O&M file on the
flash memory, and key information is backed up.
Context
By default, the PADS function is enabled. To disable this function, perform the
following operations.
Procedure
Step 1 Enter the system view.
system-view
Step 2 Choose either of the following methods to disable the PADS function.
● Disable the PADS function globally.
pads disable
NOTE
The command for configuring the PADS function for a specified functional module takes
precedence over the command for configuring the PADS function globally. That is, after the
pads switch command is configured for a specified functional module, the PADS status for
this functional module is not affected by the pads disable or pads enable command
configuration.
----End
Follow-up Procedure
For more information about PADS diagnosis functions, see the Diagnostic
Command Reference.
The CUSP feature is only used to establish a communication channel between Huawei
forwarder and controller in a CU separation scenario.
Definition
Concept Definition
Purpose
Traditional network devices have both built-in forwarding and control planes. The
forwarding plane varies according to the device and is therefore hard to be
opened. In terms of the control plane where forwarding entries are generated,
most devices do not allow a third-party control plane to replace the built-in
control plane. Hardware and software are closely coupled, reducing the upgrade
frequency of network devices but extending the time for the devices to support
new technologies. Nowadays, however, various network technologies continuously
emerge to meet new requirements. Customers are urged to solve existing network
problems with the new network technologies.
Benefits
This feature promotes the standardization and generalization of high-performance
forwarding planes through standard interfaces.
1. After the controller and forwarder are both configured, the controller and
forwarder establish a TCP connection.
2. The controller and forwarder exchange Hello packets carrying version
information over the TCP connection to negotiate a channel with each other.
3. After the negotiation is complete, the controller sends a Features Request
packet to query the attribute information of the forwarder. Upon receipt of
the packet, the forwarder replies with the requested attribute information,
such as the flow table format and buffer size, to the controller. Then, a
control channel is successfully established.
4. The controller and forwarder periodically send Echo Request packets to each
other to detect the connection status. After receiving an Echo Request packet
sent from the initiator, the peer returns an Echo Reply packet. If the initiator
neither receives an Echo_Reply packet nor receives any other valid CUSP
packet after a specified number of attempts, the initiator considers the peer
faulty and tears down the connection. If the initiator does not receive any
Echo_Reply packet but receives another valid CUSP packet, it does not tear
down the connection.
CUSP NSR
The implementation process is as follows:
1. The active control plane backs up the following data in batches and in real
time:
– TCP and CUSP connection information. This backup ensures that the
CUSP connection is not interrupted after an active/standby control plane
switchover.
– Resource information reported by a forwarder. This backup ensures that
resource information is consistent before and after an active/standby
control plane switchover.
– Flow table data delivered by the controller. This backup ensures that flow
table data is consistent before and after an active/standby control plane
switchover.
2. If the active control plane fails or an active/standby control plane switchover
is performed, the standby control plane takes over, and the service process
continues to work based on the data that was backed up before the active
control plane fails and responds to service changes, which ensures service
continuity.
– If resource information changes during an active/standby control plane
switchover, the controller re-collects resource information from the
forwarder after the switchover and completes synchronization and aging.
– If flow table information changes during an active/standby control plane
switchover, the controller uses Experimenter packets to re-deliver all FES
entries to the forwarder after the switchover. The forwarder then
synchronizes and ages flow entry information.
– After an active/standby control plane switchover, the controller and
forwarder continue to send service protocol packets (such as ARP, ICMP,
and OSPF packets) to each other through the control channel.
Terms
Term Definition
Definition
Key performance indicators (KPIs) indicate the performance of a running device at
a specific time. A KPI may be obtained by aggregating multiple levels of KPIs. The
KPI data collected by the main control board and interface boards is saved as an
xxx.dat file and stored into the CF card on the main control board. The KPI parsing
tool parses the file according to a predefined parsing format and converts it into
an Excel file. The Excel file provides relevant fault and service impairment
information, facilitating fault locating.
Purpose
The KPI system records key device KPIs in real time, provides service impairment
information (for example, the fault generation time, service impairment scope/
type, relevant operation, and possible fault cause/location), and supports fast fault
locating.
Benefits
The KPI system helps carriers quickly learn service impairment information and
locate faults, so that they can effectively improve network maintainability and
reduce maintenance costs.
KPI System
Key performance indicators (KPIs) are periodically collected at a specified time,
which slightly increases memory and CPU usage. However, if a large number of
KPIs are to be collected, services may be seriously affected. Therefore, when
memory or CPU usage exceeds 70%, enable the system to collect the KPIs of only
the CP-CAR traffic, message-queue, Memory Usage, and CPU Usage objects
that do not increase the memory or CPU usage.
The KPI system checks whether the receiving buffer area has data every 30
minutes. If the receiving buffer area has data, the system writes the data into a
data file and checks whether the data file size is greater than or equal to 4 MB. If
the data file size is greater than or equal to 4 MB, the system compresses the file
as a package named in the yyyy-mm-dd.hh-mm-ss.dat.zip format. After the
compression is complete, the system deletes the data file.
The KPI system obtains information about the size of the remaining CF card space
each time a file is generated.
● If the remaining CF card space is less than or equal to 50 MB, the KPI system
deletes the oldest packages compressed from data files.
● If the remaining CF card space is greater than 50 MB, the KPI system obtains
data files from the cfcard:/KPISTAT path and computes the total space used
by all the packages compressed from data files. If the space usage is greater
than or equal to 110 MB, the KPI system deletes the oldest packages.
1. The KPI system provides a registration mechanism for service modules. After
the modules register, the system collects service data at the specific collection
time through periodic collection and storage interfaces.
2. When the collection period of a service module expires, the KPI system
invokes the module to collect data. The module converts the collected data
into a desired KPI packet format and saves the data on the main control
board through the interface provided by the KPI system.
3. The KPI parsing tool parses the file based on a predefined format and
converts the file into an Excel one.
KPI Categories
KPIs are categorized as access service, traffic monitoring, system, unexpected
packet loss, resource. The monitoring period can be 1, 5, 10, 15, or 30 minutes. At
present, components (for example, NP and TM), services (for example, QoS), and
boards (for example, main control boards and interface boards) support KPI
collection.
Table 1-104 provides KPI examples.
For details about the header format of the .dat file, see Table 1-105.
● Data file
– Packet header
For details about the packet header format, see Table 1-106.
– Data packet
For details about the packet format, see Table 1-107.
Table 1-108 describes the file format output after the system parses the source
file according to the data formats in Table 1-105, Table 1-106, and Table 1-107.
Reserved 4 0
Reserved 1 -
Collection period 2 -
V -
V -
KPI- - -
Value
KPI 2
KPI...
KPI N
KPI object -
2
KPI -
object...
KPI object -
N
End 0xFFFF
delimiter
NOTE
H 1. K 2 V8 2 0 1 C S C C 2 C T 3 A N 6 %
U 1. P 0 00 0 P y P P 5 P o 0 l A
A 1. I 1 R0 1 U st U U 0 U t 0 w
W 1 L 7 22 7 P e U 8 U al a
E O / C0 - m s 8 s y
I G 4 0S 0 a a s
/ PC 4 g g
2 60 - e e
7 0 2
7
1
4:
4
7:
4
9
+
0
0:
0
0
D L F C Ve D C S M K K K K K T I R T K U
e o il o rsi a h l o P P P P P y n e h P n
vi o e ll on t a o d I- I- I- I- I- p t c r I- it
c p T e e s t u C S o I N e e o e V
e B y c T si l l u b D a r r s a
N a p t i s e a b j m v d h l
a c e D m s C e e a M o u
m k a e s l c l o l e
e I t a t d d
P e s e
s
H 1. K 2 V8 2 0 1 M S M M 2 M T 3 A N 1 %
U 1. P 0 00 0 E y e e 5 e o 0 l A 6
A 1. I 1 R0 1 M st m m 0 m t 0 w
W 1 L 7 22 7 P e o o 8 o al a
E O / C0 - m r r 9 r y
I G 4 0S 0 y y y s
/ PC 4 U U
2 60 - s s
7 0 2 a a
7 g g
1 e e
4:
4
8:
4
9
+
0
0:
0
0
D L F C Ve D C S M K K K K K T I R T K U
e o il o rsi a h l o P P P P P y n e h P n
vi o e ll on t a o d I- I- I- I- I- p t c r I- it
c p T e e s t u C S o I N e e o e V
e B y c T si l l u b D a r r s a
N a p t i s e a b j m v d h l
a c e D m s C e e a M o u
m k a e s l c l o l e
e I t a t d d
P e s e
s
H 1. K 2 V8 2 0 1 C S C C 2 C T 3 A N 6 %
U 1. P 0 00 0 P y P P 5 P o 0 l A
A 1. I 1 R0 1 U st U U 0 U t 0 w
W 1 L 7 22 7 P e U 8 U al a
E O / C0 - m s 8 s y
I G 4 0S 0 a a s
/ PC 4 g g
2 60 - e e
7 0 2
7
1
4:
4
9:
4
9
+
0
0:
0
0
D L F C Ve D C S M K K K K K T I R T K U
e o il o rsi a h l o P P P P P y n e h P n
vi o e ll on t a o d I- I- I- I- I- p t c r I- it
c p T e e s t u C S o I N e e o e V
e B y c T si l l u b D a r r s a
N a p t i s e a b j m v d h l
a c e D m s C e e a M o u
m k a e s l c l o l e
e I t a t d d
P e s e
s
H 1. K 2 V8 2 0 1 M S M M 2 M T 3 A N 1 %
U 1. P 0 00 0 E y e e 5 e o 0 l A 6
A 1. I 1 R0 1 M st m m 0 m t 0 w
W 1 L 7 22 7 P e o o 8 o al a
E O / C0 - m r r 9 r y
I G 4 0S 0 y y y s
/ PC 4 U U
2 60 - s s
7 0 2 a a
7 g g
1 e e
4:
5
0:
4
9
+
0
0:
0
0