HCIA Datacom
HCIA Datacom
Communication has always been with us ever since the origin of human society. Communication has been playing an
increasingly important role especially since human society entered the information era in the 1970s or 1980s.
The communication mentioned in this course refers to the communication implemented through a data communication
network. This course describes the concepts related to communication and a data communication network, information
transfer process, network devices and their functions, network types, and typical networking. In addition, this course
briefly introduces the concepts related to network engineering and network engineers.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
Understand the concepts related to communication and a data communication network.
Be able to describe the information transfer process.
Differentiate network devices of different types and understand their basic functions.
Understand different network types and topology types.
Understand the concepts related to network engineering and network engineers.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei Device Icons
General General switch Core switch Aggregation switch Access Stacked switches Firewall General NMS AP Base station
router switch
General server Cluster FTP server Authentication PN user Enterprise network user Enterprise Business trip AC Wi-Fi signals
server
Internet Network cloud 1 Network cloud IP phone PC Pad Mobile phone Laptop
2
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Communication and Networks
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network communication Data communication network
Data
Router
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network communication Data communication network
Packet Packet
Data Data Data Data
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network communication Data communication network
Common Terms
Term Description
Data payload Information conveyed
Packet Data unit switched and transmitted on the network
Header Information segment added before the data payload
Tail Information segment added after the data payload
Encapsulation Process of adding a header and a tail to a data payload to form a new packet
Decapsulation Process of removing the header and tail from a packet to obtain the data payload
Gateway Network device that provides functions such as protocol conversion, route selection, and data exchange
Router Network device that selects a forwarding path for packets
Terminal device End device of a data communication system, used as a sender or receiver of data
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network communication Data communication network
• Function:
To implement data communication
...
... ...
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network communication Data communication network
Switches
Switch: a device closest to end users, used to access the network and switch data frames
Network access of terminals (such as PCs and servers)
Layer 2 switching
Switch
Broadcast domain
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network communication Data communication network
Routers
Router: a network-layer device that forwards data packets on the Internet. Based on the destination address in a received packet, a router selects a
path to send the packet to the next router or destination. The last router on the path is responsible for sending the packet to the destination host.
Implementing communication between networks of
the same type or different types
Isolating broadcast domains
Maintaining the routing table and running
Router
routing protocols
Selecting routes and forwarding IP packets
Implementing WAN access and network
address translation
Connecting Layer 2 networks established through switches Broadcast domain A Broadcast domain B
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network communication Data communication network
Firewalls
Firewall: a network security device used to ensure secure communication between two networks. It monitors, restricts, and modifies data flows
passing through it to shield information, structure, and running status of internal networks from the public network.
Isolating networks of different security levels Untrust zone
Implementing access control (using security policies)
between networks of different security levels Internet
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network communication Data communication network
Wireless devices
Internet Internet
AC
Fat AP Fit AP
WLAN (Wi-Fi)
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Communication and Networks
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Types Network Topologies
MAN
A MAN is a computer communication network established within a city.
Typical MANs include broadband MANs, education MANs, and municipal or provincial e-government private lines.
WAN
A WAN generally covers a large geographical area ranging from tens of square kilometers to thousands of square kilometers. It can connect networks of multiple cities or even
networks of countries (as an international large-scale network) and provide long-distance communication.
The Internet is a typical WAN.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Types Network Topologies
Internet
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Types Network Topologies
Network Topologies
A network topology is a structured layout presented using transmission media (such as twisted pairs and optical fibers) to interconnect various
devices (such as computer terminals, routers, and switches).
...
...
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Types Network Topologies
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Communication and Networks
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Engineering
Network engineering
Network engineering refers to planning and designing feasible solutions based on network application requirements and computer network system standards, specifications, and
technologies under the guidance of information system engineering methods and complete organizations, as well as integrating computer network hardware devices, software, and
technologies to form a cost-effective network system that meets user requirements.
Application
...
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Engineer
Network engineer
Network engineers are technology professionals who master professional network technologies, have professional skills, professionalism, and project implementation experience in the
network engineering field, and are able to fully communicate with customers or other project stakeholders onsite. In addition, they can develop implementation solutions and project plans
(recognized by project stakeholders) based on customer requirements and environment factors, fully mobilize resources of all parties to ensure timely and high-quality project
implementation, and provide training for stakeholders and deliver engineering documents after the project is implemented.
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Engineers' Technology Development Path
Protocol mechanisms
Detailed working process of the Spanning Tree Protocol (STP)
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei Certification Injects Vitality into Talent Development for
Enterprises
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei Certification Portfolio
Huawei certification covers all ICT fields and is committed to providing a leading talent cultivation architecture and certification standards, cultivating ICT professionals
in the digital era, and building a healthy ICT talent ecosystem.
Intelligent Enterprise
Big Data AI IoT
Video Surveillance Communication
Platform and Service Certification Huawei Certified ICT Expert
GaussDB Kunpeng
Application Developer
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei Datacom Certification Portfolio
HCIE-Datacom
Aiming to cultivate network experts with solid theoretical
HCIE foundation and deployment capabilities for cross-field solutions
HCIP
HCIA-Datacom
HCIA
Aiming to cultivate network engineers with
basic datacom theories and skills
HCIP-Datacom
Aiming to cultivate senior network engineers for cross-field
solution planning and design or single-field planning and deployment
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Single) Which of the following type of network topology has the highest reliability? ( )
A. Star network topology
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
This section describes the concepts of network communication and data communication network. The basic function of a
data communication network is to implement network communication.
This section also introduces various network devices, the differences between LAN, MAN and WAN, and various network
topologies. In actual networking, multiple topologies are combined according to the requirements of multiple parties.
This section also describes network engineering and network engineers and introduces Huawei datacom certification
system.
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
In the digital era, various information is presented as data in our life. What is data? How is data transmitted?
In this course, we will use the network reference model to understand the "life" of data.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
Understand the data definition and transmission process.
Understand the concepts and advantages of the network reference model.
Understand common standard protocols.
Understand the data encapsulation and decapsulation processes.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Applications and Data
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Origin of the Story - Applications
Applications are used to meet various requirements of people, such as web page access, online gaming, and online video
playback.
Information is generated along with applications. Texts, pictures, and videos are all information presentation modes.
Application
Information
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Application Implementation - Data
Data generation
In the computer field, data is the carrier of all kinds of information.
Data transmission
Data generated by most applications needs to be transmitted between devices.
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Applications and Data
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSI Reference Model
5. Session Layer Establishes, manages, and terminates sessions between communicating parties.
Establishes, maintains, and cancels an end-to-end data transmission process; controls transmission speeds
4. Transport Layer and adjusts data sequences.
3. Network Layer Defines logical addresses and transfers data from sources to destinations.
2. Data Link Layer Encapsulates packets into frames, transmits frames in P2P or P2MP mode, and implements error checking.
1. Physical Layer Transmits bitstreams over transmission media and defines electrical and physical specifications.
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
TCP/IP Reference Model
The OSI protocol stack is complex, and the TCP and IP protocols are widely used in the industry. Therefore, the TCP/IP
reference model becomes the mainstream reference model of the Internet.
Application Layer
Session Layer
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Common TCP/IP Protocols
The TCP/IP protocol stack defines a series of standard protocols.
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Common Protocol Standardization Organizations
Internet Engineering Task Force (IETF)
IETF is a voluntary organization responsible for developing and promoting Internet protocols (especially protocols that constitute the TCP/IP protocol suite), and
releasing new or replacing old protocol standards through RFCs.
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Application Layer
• The application layer provides interfaces for application software so that applications can use network services. The application layer protocol
designates transport layer protocols and ports.
• PDUs transmitted at the network layer are called data.
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
FTP client: provides commands for local users to operate files on a FTP server: a device that runs the FTP service. It provides the
remote server. A user can install an FTP client program on a PC and set access and operation functions for remote clients, allowing users
up a connection with an FTP server to operate files on the server. to access the FTP server through the FTP client program and
access files on the server.
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Telnet server
Telnet client
SW Firewall
were entered on the console of the server.
...
Server
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Network
HTTP client HTTP server
Visits www.huawei.com.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Transport Layer
A transport layer protocol receives data from an application layer protocol, encapsulates the data with the corresponding transport
layer protocol header, and helps establish an end-to-end (port-to-port) connection.
PDUs transmitted at the transport layer are called segments.
Application Layer
Transport layer protocols:
Transport Layer TCP: a connection-oriented reliable protocol defined
(Segment) by IETF in RFC 793.
UDP: a simple connectionless protocol defined by
Network Layer
IETF in RFC 768.
Data Link Layer
Physical Layer
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
TCP port 1024 TCP port 1231 TCP port 80 TCP port 23
House number: 1.1.1.1 (IP address) House number: 2.2.2.2 (IP address)
Network
• Generally, the source port used by a client is randomly allocated, and the destination port is specified by the application of a server.
• The system generally selects a source port number that is greater than 1023 and is not being used.
• The destination port number is the listening port of the application (service) enabled on the server. For example, the default port number for HTTP is 80.
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
PC1 PC2
1.1.1.1:1024 2.2.2.2:23
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
PC1 PC2
1.1.1.1:1024 2.2.2.2:23
1 A TCP connection is
2
3 established.
4
5
6 …… IP header TCP header
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
PC1 PC2
Data to be sent
2 seq=101 win=3
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Network Layer
The transport layer is responsible for establishing connections between processes on hosts, and the network layer is responsible for
transmitting data from one host to another.
PDUs transmitted at the network layer are called packets.
Application Layer
Transport Layer
• The network layer is also called the Internet layer.
It sends packets from source hosts to destination hosts.
Network Layer
• Functions of the network layer:
(Packet)
Provides logical addresses for network devices.
Routes and forwards data packets.
Data Link Layer Common network layer protocols include IPv4, IPv6, ICMP, and IGMP.
Physical Layer
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
PC1 G0/0/1
PC2
The PC encapsulates the IP header (envelope).
The key information is about source and destination IP
addresses. Network A
Routing table of Router 1 • The network layer header of a packet sent by a source device carries the
network layer addresses of the source and destination devices.
Outbound • Each network device (such as a router) that has the routing function maintains
Network
Interface a routing table (like a map of the network device).
• After receiving a packet, the network device reads the network layer
Network A G0/0/1 destination address of the packet, searches the routing table for the
Envelope: IP packet header matching entry of the destination address, and forwards the packet according
Sender: source IP address … … to the instruction of the matching entry.
Receiver: destination IP address
… …
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Application Layer
Transport Layer
The data link layer is located between the network layer and the physical layer.
Network Layer • The data link layer provides intra-segment communication for the network
layer.
Data Link Layer • The functions of the data link layer include framing, physical addressing,
(Frame) and error control.
• Common data link layer protocols include Ethernet, PPPoE, and PPP.
Physical Layer
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Switch A
I have a MAC address when I
leave the factory. Name: Host A
Switch B
MAC address/Ethernet address/physical address:
Host A Host B
Host A
Network A
Host C Host D • A media access control (MAC) address uniquely identifies a NIC on a network. Each
• Ethernet is a broadcast multiple access protocol that works at the data link NIC requires and has a unique MAC address.
layer protocol. • MAC addresses are used to locate specific physical devices in an IP network
• The network interfaces of PCs comply with the Ethernet standard. segment.
• Generally, a broadcast domain corresponds to an IP network segment. • A device that works at the data link layer, such as an Ethernet switch, maintains a
MAC address table to guide data frame forwarding.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
ARP
Address Resolution Protocol (ARP):
Discovers the MAC address associated with a given IP address.
ARP request
Destination IP address: 192.168.1.2
Destination MAC address: ?
Host A Host B
192.168.1.1/24 192.168.1.2/24
3C-52-82-49-7E-9D ARP reply 48-A4-72-1C-8F-4F
Source IP address: 192.168.1.2
Source MAC address: 48-A4-72-1C-8F-4F
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Host 1 Host 2
Host 1 checks cached ARP entries.
3 GE 0/0/1 GE 0/0/2
Step 2:
Host 2 sends an ARP reply. • Host 1 sends an ARP request to discover the MAC address of
2
Eth_II ARP Request FCS Host 2.
• The destination MAC address in the ARP request is 0 because
the destination MAC address is unknown.
Host 1 adds an ARP entry.
Destination MAC address: Operation type: ARP request
FF-FF-FF-FF-FF-FF MAC address of the sender: MAC 1
Source MAC address: IP address of the sender: IP 1 Step 3:
MAC 1 Destination MAC address: 00-00-00-00-00-00 • The ARP request message is a broadcast data frame. After
Destination IP address: IP 2 receiving the ARP request message, the switch floods it.
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Physical Layer
After data arrives at the physical layer, the physical layer converts a digital signal into an optical signal, an electrical signal, or an electromagnetic
wave signal based on the physical media.
PDUs transmitted at the physical layer are called bitstreams.
Application Layer
Transport Layer
Network Layer
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transport Network Physical
Application Layer Data Link Layer
Layer Layer Layer
Data transmission through twisted pairs Data transmission through optical fibers
1 2
3 4
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Applications and Data
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Data Encapsulation on the Sender
Data
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Data Decapsulation on the Receiver
0 1 1 0 0 1 0 1 0 1 ...
Transmission Media
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
Both the OSI reference model and the TCP/IP reference model adopt the layered design concept.
Clear division of functions and boundaries between layers facilitates the development, design, and troubleshooting of each
component.
Interfaces can be provided to enable communication between hardware and software on various networks, improving
compatibility.
Data generation and transmission require collaboration between modules. Meanwhile, each module must fulfill its own
responsibilities.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. What are the benefits of the layered model?
2. What are the common protocols at the application layer, transport layer, network layer, and data link layer?
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
The Versatile Routing Platform (VRP) is a universal operating system (OS) platform for Huawei datacom products. It is
based on IP and adopts a component-based architecture. It provides rich features and functions, including application-
based tailorable and extensible functions, greatly improving the running efficiency of the devices that use this OS. To
efficiently manage such devices, you must be familiar with VRP and VRP-based configuration.
This course describes the basic concepts, common commands, and command line interface (CLI) of VRP.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
Understand VRP basics.
Learn how to use CLI.
Master basic CLI commands.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. VRP Overview
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
What Is VRP?
VRP is a universal OS platform for Huawei datacom products. It serves as the
software core engine of Huawei's full series of routers from low-end to core
Security ones, Ethernet switches, service gateways, and so on.
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Development of the VRP
VRP1
Centralized design
Applicable to low-end and
mid-range devices
VRP2 Low performance
Some NE series routers
AR series routers
VRP5 VRP8
Distributed platform
Support for various features
Support for core routers Multi-process
Component-based design
Applicable to various Component-based design
Support for multi-CPU
Huawei products
2000-2004 High performance and multi-chassis
2004-Now 2009-Now
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
File System
The file system manages files and directories in storage media, allowing users to view, create, rename, and delete directories and copy, move,
rename, and delete files.
Mastering the basic operations of the file system is crucial for network engineers to efficiently manage the configuration files and VRP system files of
devices.
The system software is a must for device startup and A configuration file stores configuration commands, enabling a
operation, providing support, management, and services for a device to start with the configurations in the file. The common
device. The common file name extension is .cc. System Software Configuration File file name extensions are .cfg, zip, and .dat.
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Storage Media
Storage media include SDRAM, flash memory, NVRAM, SD card, and USB.
NVRAM
NVRAM is nonvolatile random access memory. It is
used to store log buffer files. Logs will be written
into the flash memory after the timer expires or the
buffer is full.
Flash
SD Card
The flash memory is nonvolatile and can avoid data loss in
case of power-off. It is used to store system software, The SD card can avoid data loss data in case of power-off.
configuration files, and so on. Patch files and PAF files are The SD card has a large storage capacity and is generally
uploaded by maintenance personnel and generally stored in installed on a main control board. It is used to store system
the flash memory or SD card. files, configuration files, log files, and so on.
SDRAM USB
SDRAM is synchronous dynamic random access memory, which Storage The USB is considered an interface. It is used to connect to
is equivalent to a computer's memory. It stores the system Media a large-capacity storage medium for device upgrade and
running information and parameters. data transmission.
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Device Initialization Process
After a device is powered on, it runs the BootROM software to initialize the hardware and display hardware parameters. Then, it runs the system
software and reads the configuration file from the default storage path to perform initialization.
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Device Management
There are two commonly used device management modes: CLI and web system.
To use a device management mode, you must first log in to a device through a login mode supported by this device management mode.
• The web system provides a graphical user interface (GUI) • The CLI requires users to use commands provided by a
for easy device management and maintenance. This method, device to manage and maintain the device. This mode
however, can be used to manage and maintain only some, implements refined device management but requires users
not all, device functions. to be familiar with the commands.
• The web system supports the HTTP and HTTPS login modes. • The CLI supports the console port, Telnet, and SSH login
modes.
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VRP User Interfaces
When a user logs in to a device through a CLI-supported mode, the system allocates a user interface to manage and monitor the current session
between the user terminal and device.
Such a user interface can be a console user interface or virtual type terminal (VTY) user interface.
• A console user interface is used to manage and monitor • The VTY user interface is used to manage and monitor users
users who log in to a device through the console port. who log in to a device by means of VTY.
• The serial port of a user terminal can be directly • After a Telnet or STelnet connection is established between a
connected to the console port of a device for local access. user terminal and a device, a VTY channel is established to
implement remote access to the device.
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VRP User Levels
VRP provides basic permission control functions. It defines the levels of commands that each level of users can execute to restrict the
operations of users at different levels.
User Level Command Level Name Available Command
Network diagnosis commands (such as ping and tracert), commands for accessing external devices
0 0 Visit level
from the local device (such as Telnet client commands), and some display commands
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Login to the Web System
Take the web system for a Huawei AR router as an example. Start a browser on a
PC, enter https://192.168.1.1 in the address bar, and press Enter. Then, the web
system login page is displayed.
192.168.1.1
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
CLI - Local Login (1)
Console cable
COM port
PC
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
CLI - Local Login (2)
PuTTY is a connection software for login through Telnet, SSH, serial
interfaces, and so on.
In local login, the terminal is connected to the console port of the Huawei
device through a serial port. Therefore, set Connection type to Serial. Set
Serial line based on the actually used port on the terminal. Set Speed to
9600.
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
CLI - Remote Login
Remote login means that you log in to a device that can function as a remote login
server, allowing you to centrally manage and maintain network devices. Remote login
methods include Telnet and SSH.
If you use the SSH login mode, set Connection type to SSH, enter the IP address of
the remote login server, and use the default port number 22.
If you use the Telnet login mode, set Connection type to Telnet, enter the IP
address of the remote login server, and use the default port number 23.
192.168.10.1
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
CLI
After a login succeeds, the command line interface (CLI) is displayed.
The CLI is a common tool for engineers to interact with network devices.
Console cable
COM port
PC
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. VRP Basics
▫ Case Analysis
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Command Structure
CLI commands follow a unified structure. After a command is entered on the CLI, the CLI parses the command and executes it to implement the function of the command,
such as query, configuration, or management.
Parameter List
Command Word
• Command word: specifies the operation to be executed in a command, such as display (device status query) or reboot (device restart).
• Keyword: a special character string that is used to further restrict a command. It is an extension of a command and can also be used to express the command composition logic.
• Parameter list: is composed of parameter names and values to further restrict the command function. It can contain one or more pairs of parameter names and values.
Example 1: Example 2:
display ip interface GE0/0/0: displays interface information. reboot: restarts a device.
Command word: display Command word: reboot
Keyword: ip Each operation command must start with a command word, and the
Parameter name: interface command word is selected from the standard command word list.
Parameter value: GE0/0/0
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Command Views (1)
A device provides various configuration and query commands. To facilitate the use of these commands, VRP registers the commands in different views according to their
functions.
Interface views:
GigabitEthernet interface view
Ethernet interface view • User view: In this view, you can check the running status and
Serial interface view
statistics of a device.
...
• System view: In this view, you can set system parameters
and enter the configuration views of other commands.
Protocol views:
OSPF view OSPF area view • Other views: In other views, such as the interface view and
User view System view
IS-IS view protocol view, you can set interface parameters and
BGP view
protocol parameters.
...
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Command Views (2)
View name View prompt [Huawei-GigabitEthernet0/0/1]
Interface view
<Huawei> [Huawei]
system-view
User view System view
[Huawei-ospf-1]
quit
Protocol view
return
Command examples:
<Huawei>system-view #This command is used to enter the system view from the user view. The user view is the first view that is displayed after you log in to a
device.
[Huawei]interface GigabitEthernet 0/0/1 #This command is used to enter the interface view from the system view.
[Huawei-GigabitEthernet0/0/1]ip address 192.168.1.1 24 #This command is used to set an IP address.
[Huawei-GigabitEthernet0/0/1]quit #This command is used to return to the previous view.
[Huawei]ospf 1 #This command is used to enter the protocol view from the system view.
[Huawei-ospf-1]area 0 #This command is used to enter the OSPF area view from the OSPF view.
[Huawei-ospf-1-area-0.0.0.0]return #This command is used to return to the user view.
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Editing a Command (1)
The CLI of a device provides basic command editing functions. Common editing functions are as follows:
1. Command editing through function keys
Backspace: deletes the character before the cursor and moves the cursor to the left. When the cursor reaches the beginning of the command, an alarm is generated.
Left cursor key ← or Ctrl+B: moves the cursor one character to the left. When the cursor reaches the beginning of the command, an alarm is generated.
Right cursor key → or Ctrl+F: moves the cursor one character to the right. When the cursor reaches the end of the command, an alarm is generated.
2. Incomplete keyword input
A device allows the input of incomplete keywords. Specifically, if an entered character string can match a unique keyword, you do not need to enter the remaining characters of the
keyword.
<Huawei>d cu
<Huawei>di cu
For example, the display current-configuration command
<Huawei>dis cu
<Huawei>d c is identified when you enter d cu, di cu, or dis cu. However,
^ the command cannot be identified if you enter d c or dis c
Error:Ambiguous command found at '^' position.
because the character string d c or dis c matches more
<Huawei>dis c
^ than one command.
Error:Ambiguous command found at '^' position.
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Editing a Command (2)
3. Command editing through the Tab key
If an entered character string matches a unique keyword, the system automatically supplements the keyword after you press Tab. If the keyword is complete, it remains unchanged even if
you press Tab repeatedly.
If an entered character string matches more than one keyword, you can press Tab repeatedly. The system will then circularly display the keywords beginning with the entered character
string to help you find the desired keyword.
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Using Command Line Online Help
You can use command line online help to obtain real-time help without memorizing a large number of complex commands.
The online help can be classified into full help and partial help. To obtain the online help, enter a question mark (?) when using a command.
<Huawei> ?
User view commands:
<Huawei> d?
arp-ping ARP-ping
debugging <Group> debugging command group
autosave <Group> autosave command group
delete Delete a file
backup Backup information
dialer Dialer
cd Change current directory
dir List files on a filesystem
clear Clear
display Display information
clock Specify the system clock
...
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interpreting Command Line Error Messages
If a command passes the syntax check, the system executes it. Otherwise, the system reports an error message.
[Huawei] sysname
^
Error:Incomplete command found at ‘^’ position. #A supplement needs to be made at the position pointed by the arrow.
[Huawei] a
^
Error: Ambiguous command found at '^' position. #More than one command matches the keyword at the position pointed by the arrow. In this example, it indicates
that there are multiple keywords starting with a.
[Huawei-GigabitEthernet0/0/0]ospf cost 800000 #The parameter value at the position pointed by the arrow is invalid.
^
Error: Wrong parameter found at '^' position.
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Using Undo Command Lines
If a command begins with the keyword undo, it is an undo command. An undo command is generally used to restore a default configuration, disable a
function, or delete a configuration. For example:
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Using Command Line Shortcut Keys
A device provides command shortcut keys to speed up and simplify command input.
Command shortcut keys are classified into user-defined shortcut keys and system shortcut keys.
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. VRP Basics
▫ Case Analysis
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Common File System Operation Commands (1)
1. Check the current directory.
<Huawei>pwd
<Huawei>dir
<Huawei>more
<Huawei>acd
5. Create a directory.
<Huawei>makdir
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Common File System Operation Commands (2)
6. Delete a directory.
<Huawei>rmdir
7. Copy a file.
<Huawei>copy
8. Move a file.
<Huawei>move
9. Rename a file.
<Huawei>rename
<Huawei>delete
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Common File System Operation Commands (3)
11. Restore a deleted file.
<Huawei>undelete
<Huawei>reset recycle-bin
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Configuration Commands (1)
1. Configure a system name.
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Configuration Commands (2)
3. Configure a command level.
This command configures a level for commands in a specified view. Command levels are classified into visit, monitoring, configuration, and management, which are identified by the
numbers 0, 1, 2, and 3, respectively.
[Huawei]user-interface vty 0 4
[Huawei-ui-vty0-4]set authentication password cipher information
This user-interface vty command displays the virtual type terminal (VTY) user interface view, and the set authentication password command configures the password authentication
mode. The system supports the console user interface and VTY user interface. The console user interface is used for local login, and the VTY user interface is used for remote login. By
default, a device supports a maximum of 15 concurrent VTY-based user accesses.
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Configuration Commands (3)
6. Configure an IP address for an interface.
[Huawei]interface interface-number
[Huawei-interface-number]ip address ip address
This command configures an IP address for a physical or logical interface on a device.
<Huawei>display current-configuration
<Huawei>save
<Huawei>display saved-configuration
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Configuration Commands (4)
10. Clear saved configurations.
<Huawei>reset saved-configuration
This command displays the system software for the current and next startup, backup system software, configuration file, license file, and patch file, as well as
voice file.
During a device upgrade, you can run this command to configure the device to load the specified configuration file for the next startup.
<Huawei>reboot
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. VRP Basics
▪ Case Analysis
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case 1: File Query Commands and Directory Operations
<Huawei>pwd
Requirement description: flash:
• Check information about files and directories in <Huawei>dir
Directory of flash:/
the current directory of a router named RTA. Idx Attr Size(Byte) Date Time(LMT) FileName
0 drw- - Dec 27 2019 02:54:09 dhcp
• Create a directory named test, and then delete 1 -rw- 121,802 May 26 2014 09:20:58 portalpage.zip
2 -rw- 2,263 Dec 27 2019 02:53:59 statemach.efs
the directory. 3 -rw- 828,482 May 26 2014 09:20:58 sslvpn.zip
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case 2: File Operations (1)
<Huawei>rename huawei.txt save.zip
Requirement description: <Huawei>dir
• Rename the huawei.txt file save.zip. Directory of flash:/
Idx Attr Size(Byte) Date Time(LMT) FileName
• Make a copy for the save.zip file and name the 0 drw- - Mar 04 2020 04:39:52 dhcp
1 -rw- 121,802 May 26 2014 09:20:58 portalpage.zip
copy file.txt. 2 -rw- 828,482 Mar 04 2020 04:51:45 save.zip
3 -rw- 2,263 Mar 04 2020 04:39:45 statemach.efs
• Move the file.txt file to the dhcp directory. 4 -rw- 828,482 May 26 2014 09:20:58 sslvpn.zip
• Delete the file.txt file. 1,090,732 KB total (784,464 KB free)
• Restore the deleted file file.txt. <Huawei>copy save.zip file.txt
<Huawei>dir
Directory of flash:/
Idx Attr Size(Byte) Date Time(LMT) FileName
0 drw- - Mar 04 2020 04:39:52 dhcp
1 -rw- 121,802 May 26 2014 09:20:58 portalpage.zip
2 -rw- 828,482 Mar 04 2020 04:51:45 save.zip
3 -rw- 2,263 Mar 04 2020 04:39:45 statemach.efs
4 -rw- 828,482 May 26 2014 09:20:58 sslvpn.zip
5 -rw- 828,482 Mar 04 2020 04:56:05 file.txt
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case 2: File Operations (2)
<Huawei>move file.txt flash:/dhcp/
Requirement description: <Huawei>cd dhcp
• Rename the huawei.txt file save.zip. <Huawei>dir
Directory of flash:/dhcp/
• Copy the save.zip file to the file.txt file. Idx Attr Size(Byte) Date Time(LMT) FileName
0 -rw- 98 Dec 27 2019 02:54:09 dhcp-duid.txt
• Move the file.txt file to the dhcp directory. 1 -rw- 121,802 Dec 27 2019 03:13:50 file.txt
• Delete the file.txt file. 1,090,732 KB total (784,344 KB free)
<Huawei>delete file.txt
• Restore the deleted file file.txt. <Huawei>dir
Directory of flash:/dhcp/
Idx Attr Size(Byte) Date Time(LMT) FileName
0 -rw- 98 Dec 27 2019 02:54:09 dhcp-duid.txt
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case 3: VRP Basic Configuration Commands
As shown in the figure, an engineer needs to configure a router. The requirements are as follows:
Connect the router and PC. Assign the IP addresses shown in the figure to the router and PC.
Allow other employees of the company to use the password huawei123 to remotely log in to the router through the PC. Allow them to view
configurations but disable them from modifying configurations.
Save current configurations and name the configuration file huawei.zip. Configure this file as the configuration file for the next startup.
GE0/0/1
192.168.1.1/24 192.168.1.2/24
AR1 PC1
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Procedure (1)
GE0/0/1
192.168.1.1/24 192.168.1.2/24
AR1 PC1
Configure an interface IP address. Configuring a user level and a user authentication mode.
The password configuration command may vary according to devices. For details, see the
product documentation.
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Procedure (2)
GE0/0/1
192.168.1.1/24 192.168.1.2/24
AR1 PC1
By default, configurations are saved in the vrpcfg.cfg file. You can also create a file for saving the configurations. VRPv5
and VRPv8 have the same command that is used to specify the configuration file for the next startup, but different
directories for saving the file.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Checking Configurations
GE0/0/1
: 192.168.1.1/24 192.168.1.2/24
AR1 PC1
<AR1>display startup
MainBoard:
Startup system software: null
Next startup system software: null
Backup system software for next startup: null
Startup saved-configuration file: flash:/vrpcfg.zip
Next startup saved-configuration file: flash:/huawei.zip
Startup license file: null
Next startup license file: null
Startup patch package: null
Next startup patch package: null
Startup voice-files: null
Next startup voice-files: null
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
More Information
<Huawei>display configuration candidate
This command displays the commands that have been configured but not committed.
Candidate
configuration
database If a series of configurations are completed but not committed, the command configurations are stored in the candidate
<candidate> configuration database.
<Huawei>display current-configuration
VRPv8 This command displays the effective parameter settings.
Running configuration
database After configuration commands are committed, they are saved in the running configuration database.
<running>
VRPv5 has the running and startup configuration databases but does not have the candidate configuration database. Therefore, a command configuration takes effect immediately after the command is executed,
without being committed. However, in VRPv8, the configuration command takes effect only after the command committed.
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. What is the VRP version currently used by Huawei datacom devices?
2. What is the maximum number of users that are allowed to log in to a Huawei device through the console port concurrently?
3. How do I specify the configuration file for next startup if a device has multiple configuration files?
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
VRP is a Huawei proprietary network OS that can run on various hardware platforms. VRP has unified network, user, and
management interfaces. To efficiently manage Huawei devices, you need to be familiar with VRP commands and
configurations.
You also need to understand some common commands and shortcut keys and learn how to use them.
After learning this course, you need to know basic VRP concepts, functions of common commands, and CLI.
Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
Internet Protocol Version 4 (IPv4) is the core protocol suite in the TCP/IP protocol suite. It works at the network layer in
the TCP/IP protocol stack and this layer corresponds to the network layer in the Open System Interconnection
Reference Model (OSI RM).
The network layer provides connectionless data transmission services. A network does not need to establish a
connection before sending data packets. Each IP data packet is sent separately.
This presentation describes the basic concepts of IPv4 addresses, subnetting, network IP address planning, and basic IP
address configuration.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able:
Describe main protocols at the network layer.
Describe the concepts and classification of IPv4 addresses and special IPv4 addresses.
Calculate IP networks and subnets.
Use the IP network address planning method.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Layer Protocols
The network layer is often called the IP layer. Network layer protocols include Internet Control Message Protocol (ICMP) and Internet
Packet Exchange (IPX), in addition to IP.
Application Layer
Transport layer
Physical Layer
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Internet Protocol
IP is short for the Internet Protocol. IP is the name of a protocol file with small content. It defines and describes the format of IP
packets.
The frequently mentioned IP refers to any content related directly or indirectly to the Internet Protocol, instead of the Internet
Protocol itself.
Function Version
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Data Encapsulation
Application Layer Data PDU
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv4 Packet Format
Destination IP Address
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Data Packet Fragmentation
The process of dividing a packet into multiple fragments is called fragmentation.
The sizes of IP packets forwarded on a network may be different. If the size of an IP packet exceeds the maximum size supported by a
data link, the packet needs to be divided into several smaller fragments before being transmitted on the link.
Header Type of
Version Total Length
Length Service
Identification Flags Fragment Offset
Host A Host B
TTL Protocol Header Checksum Data
Source IP Address
Data fragment
Destination IP Address
Options Padding
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Time to Live
The TTL field specifies the number of routers that a packet can pass through.
Once a packet passes through a router, the TTL is reduced by 1. If the TTL value is reduced to 0, a data packet is discarded.
Header Type of
Version Total Length
Length Service TTL = 255 TTL = 254 TTL = 253
Identification Flags Fragment Offset
TTL Protocol Header Checksum
Source IP Address
Host A Host B
Destination IP Address
Options Padding
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Protocol
The Protocol field in the IP packet header identifies a protocol that will continue to process the packet.
This field identifies the protocol used by the data carried in the data packet so that the IP layer of the destination host sends the data
to the process mapped to the Protocol field.
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
What Is an IP Address?
An IP address identifies a node (or an interface on a network device) on a network.
IP addresses are used to forward IP packets on the network.
IP Address
IP 1 IP 5
An IP address identifies a node on a
IP 2 IP 4 network and is used to find the
destination for data.
IP 3
Data
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP address Notation
An IPv4 address is 32 bits long.
It is in dotted decimal notation.
27 26 25 24 23 22 21 20
Power
128 64 32 16 8 4 2 1
Conversion between decimal
and binary systems Bit 1 1 0 0 0 0 0 0
= 128 + 64 = 192
IPv4 address range is 0.0.0.0–255.255.255.255.
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP Address Structure
Network part: identifies a network.
Host part: identifies a host and is used to differentiate hosts on a network.
Network part Host part
• Network mask: is used to distinguish the network part from the host part in an IP address.
192.168.10.1 1 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1 IP address
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP Addressing
Network part (network ID): identifies a network.
Host part: identifies a host and is used to differentiate hosts on a network.
Network part
10.0.1.0/24 10.0.2.0/24
10.0.1.1/24 10.0.2.1/24
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP Address Types
A network range defined by a network ID is called a network segment.
Network address: identifies a network.
Example: 192.168.10.0/24
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IP Address Calculation
Example: What are the network address, broadcast address, and number of available addresses of class B address 172.16.10.1/16?
IP address 1 0 1 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1
Network mask
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
The network address is obtained, with all host bits
set to 0s.
Network address 1 0 1 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 172.16.0.0/16
The broadcast address is obtained, with all host
bits set to 1s.
Broadcast address 1 0 1 0 1 1 0 0 0 0 0 1 0 0 0 0 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 172.16.255.255/16
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
Private IP Addresses
Public IP address: An IP address is assigned by the Internet Assigned Numbers Authority (IANA), and this address allocation mode ensures that each
IP address is unique on the Internet. Such an IP address is a public IP address.
Private IP address: In practice, some networks do not need to connect to the Internet. For example, on a network of a lab in a college, IP addresses
of devices need to avoid conflicting with each other only within the same network. In the IP address space, some IP addresses of class A, B, and C
addresses are reserved for the preceding situations. These IP addresses are called private IP addresses.
Class A: 10.0.0.0–10.255.255.255
Class B: 172.16.0.0–172.31.255.255
Class C: 192.168.0.0–192.168.255.255 192.168.1.0/24
10.0.0.0/8
Implemented using network address
Internet translation (NAT)
10.0.0.0/8 192.168.1.0/24
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
Special IP Addresses
Some IP addresses in the IP address space are of special meanings and functions.
For example:
Loopback address 127.0.0.0/8 It is used to test the software system of a test device.
If a host fails to automatically obtain an IP address, the host can use an IP address in
Link-local address 169.254.0.0/24
this address block for temporary communication.
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Concepts Address Classification Address Calculation Special Addresses IPv4 vs. IPv6
IPv4 IPv6
• Address length: 32 bits • Address length: 128 bits
• Address types: unicast address, broadcast address, and • Address types: unicast address, multicast address, and
multicast address anycast address
• Characteristics: • Characteristics:
▫ IPv4 address depletion ▫ Unlimited number of addresses
▫ Inappropriate packet header design ▫ Simplified packet header
▫ ARP dependency-induced flooding ▫ Automatic IPv6 address allocation
▫ ... ▫ ...
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Why Subnetting?
172.16.1.0
172.16.4.0
172.16.0.0
• A class B address is used for a broadcast domain, wasting • A network number is divided into multiple subnets, and each subnet
addresses. is allocated to a separate broadcast domain.
• The broadcast domain is too large. Once broadcast occurs, an • In this way, the broadcast domain is smaller, and the network
internal network is overloaded. planning is more reasonable.
• IP addresses are properly used.
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Subnetting - Analyzing the Original Network Segment
Example: 192.168.10.0/24
192.168.10.1
IP address 192. 168. 10. 0 0 0 0 0 0 0 1
Default subnet mask
255. 255. 255. 0 0 0 0 0 0 0 0 One class C network:
... 192.168.10.0/24
192.168.10.255
Default subnet mask:
IP address 192. 168. 10. 1 1 1 1 1 1 1 1
255.255.255.0
Default subnet
255. 255. 255. 0 0 0 0 0 0 0 0
mask
Network part Host part
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Subnetting - Taking Bits from the Host Part
Bits can be taken from the host part to create subnets.
Take 1 bit from the host part.
Subnet bits
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Subnetting - Calculating the Subnet Network Address
The network address is obtained, with all host bits set to 0s.
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Subnetting - Calculating the Subnet Broadcast Address
The broadcast address is obtained, with all host bits set to 1s.
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Practice: Computing Subnets (1)
• Question: An existing class C network segment is 192.168.1.0/24. Use
the VLSM to allocate IP addresses to three subnets.
10 hosts
... 30 hosts
• Answer: (Use a network with 10 hosts as an example.)
Step 1: Calculate the number of host bits to be taken.
2n – 2 ≥ 10
n ≥ 4, host bits
...
... Take 4 bits from the host part.
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Practice: Computing Subnets (2)
• Question: An existing class C network segment is 192.168.1.0/24. Use
192.168.1.0/28 the VLSM to allocate IP addresses to three subnets.
10 hosts
...
Subnet 1 192. 168. 1. 0 0 0 0 0 0 0 0 192.168.1.0/28
...
Subnet 2 192 168. 1. 0 0 0 1 0 0 0 0 192.168.1.16/28
10 hosts
192.168.1.16/28 Subnet 3 192. 168. 1. 0 0 1 0 0 0 0 0 192.168.1.32/28
…
Subnet 16 192. 168. 1. 1 1 1 1 0 0 0 0 192.168.1.240/28
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ICMP
The Internet Control Message Protocol (ICMP) is an auxiliary protocol of the IP protocol.
• ICMP is used to transmit error and control information between Ethernet header IP header ICMP message Ethernet tail
3 1 Host Unreachable
Message
Host A 3 2 Protocol Unreachable
3 3 Port Unreachable
5 0 Redirect
8 0 Echo Request
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ICMP Redirection
ICMP Redirect messages are a type of ICMP control message. When a router detects that a host uses a non-optimal route in a specific
scenario, the router sends an ICMP Redirect message to the host, requesting the host to change the route.
Server A Internet
20.0.0.1/24
20.0.0.2/24
RTA RTB
10.0.0.200/24 10.0.0.100/24
3 1
IP address: 10.0.0.1/24
Host A Default gateway: 10.0.0.100
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ICMP Error Detection
ICMP Echo messages are used to check network connectivity between the source and destination and provide other information, such
as the round-trip time.
[RTA]ping 20.0.0.2
Echo Request
PING 20.0.0.2: 56 data bytes, press CTRL_C to break
10.0.0.0/24 20.0.0.0/24 Reply from 20.0.0.2: bytes=56 Sequence=1 ttl=254 time=70 ms
.1 .2 .1 .2 Reply from 20.0.0.2: bytes=56 Sequence=2 ttl=254 time=30 ms
RTA RTB Server A Reply from 20.0.0.2: bytes=56 Sequence=3 ttl=254 time=30 ms
Echo Reply Reply from 20.0.0.2: bytes=56 Sequence=4 ttl=254 time=40 ms
Reply from 20.0.0.2: bytes=56 Sequence=5 ttl=254 time=30 ms
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ICMP Error Report
ICMP defines various error messages for diagnosing network connectivity problems. The source can determine the cause for a data transmission
failure based on the received error messages. For example, after a network device receives a packet, it cannot access the network where the
destination device resides, the network device automatically sends an ICMP Destination Unreachable message to the source.
10.0.0.0/24 20.0.0.0/24 traceroute to 20.0.0.2(20.0.0.2), max hops: 30 ,packet length: 40,press CTRL_C
.1 .2 .1 .2 to break
RTA RTB Server A
1 10.0.0.2 80 ms 10 ms 10 ms
Destination Unreachable message
2 20.0.0.2 30 ms 30 ms 20 ms
Function: Tracert
Tracert checks the reachability of each hop on a forwarding path based on the TTL value carried
in the packet header.
Tracert is an effective method to detect packet loss and delay on a network and helps
administrators discover routing loops on the network.
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Layer Protocols
3. Subnetting
4. ICMP
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic IP Address Configuration Commands
1. Enter the interface view.
You can run this command to enter the view of a specified interface and configure attributes for the interface.
• interface-type interface-number: specifies the type and number of an interface. The interface type and number can be closely next to each other or separated
by a space character.
You can run this command in the interface view to assign an IP address to the interface on the network devices to implement n etwork interconnection.
• ip-address: specifies the IP address of an interface. The value is in dotted decimal notation.
• mask: specifies a subnet mask. The value is in dotted decimal notation.
• mask-length: specifies a mask length. The value is an integer ranging from 0 to 32.
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case:
Configuring an IP address for an Interface
Configure an IP address for a physical interface.
192.168.1.1/24 192.168.1.2/24
[RTA] interface gigabitethernet 0/0/1
GE0/0/1 GE0/0/1
[RTA-GigabitEthernet0/0/1] ip address 192.168.1.1 255.255.255.0
Or,
RTA RTB
Loopback 0 1.1.1.1/32 Loopback 0 [RTA-GigabitEthernet0/0/1] ip address 192.168.1.1 24
2.2.2.2/32
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network IP Address Planning
IP address planning must be considered together with the network structure, routing protocols, traffic planning, and service rules. In
addition, IP address planning should be corresponding to the network hierarchy and performed in a top-bottom way.
In conclusion, IP address planning objectives are to achieve easy management, easy scalability, and high utilization.
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Multiple) Which class does 201.222.5.64 belong? ( )
A. Class A
B. Class B
C. Class C
D. Class D
2. (Multiple) A company is assigned a class C network segment 192.168.20.0/24. One of its departments has 40 hosts. Which of the following subnets
can be allocated? ( )
A. 192.168.20.64/26
B. 192.168.20.64/27
C. 192.168.20.128/26
D. 192.168.20.190/26
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
To connect a PC to the Internet, apply an IP address from the Internet Service Provider (ISP).
This presentation provides an overview of the IP protocol and describes concepts related to IPv4 addresses and
subnetting.
This presentation also describes the planning and basic configuration of IP addresses.
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
There are typically multiple IP subnets on a typical data communication network. Layer 3 devices are required to exchange
data between these IP subnets. These devices have the routing capability and can forward data across subnets.
Routing is the basic element of data communication networks. It is the process of selecting paths on a network along which
packets are sent from a source to a destination.
This course introduces the basic concepts of routing.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
Understand the basic principles of routers.
Know how routers select optimal routes.
Understand the contents of routing tables.
Master advanced routing features.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of IP Routing
▪ Basic Concepts of Routing
▫ Route-based Forwarding
2. Static Routing
3. Dynamic Routing
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Background: Inter-Subnet Communication
M
• An IP address uniquely identifies a node on a network. Each IP
address belongs to a unique subnet, and each subnet may belong to
a different area of the network.
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Routes
Routes are the path information used to guide packet forwarding.
A routing device is a network device that forwards packets to a destination subnet based on routes. The most common routing device is a router.
A routing device maintains an IP routing table that stores routing information.
Router R4
Data R1 R2 R3
N M
Gateway Gateway
Destination-based forwarding
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Routing Information
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IP Routing Table
14.0.0.0/8 Outbound
Destination/Mask Next Hop
Interface
R4
• Routers discover routes using multiple methods.
11.0.0.0/8 2.2.2.2 GE0/0
1.1.1.2/30
13.0.0.0/8 3.3.3.2 GE0/1 • A router selects the optimal route and installs it in its IP routing
14.0.0.0/8 1.1.1.2 GE0/2 table.
…
GE0/2 • The router forwards IP packets based on routes in the IP routing
1.1.1.0/30 1.1.1.1 GE0/2
1.1.1.1/30
1.1.1.1/32 127.0.0.1 GE0/2 table.
GE0/0 GE0/1
2.2.2.1/30 3.3.3.1/30 • Routers manage path information by managing their IP routing
R2
tables.
2.2.2.2/30 3.3.3.2/30
R1 R3
11.0.0.0/8 13.0.0.0/8
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of IP Routing
▫ Basic Concepts of Routing
▫ Route-based Forwarding
2. Static Routing
3. Dynamic Routing
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
How to Obtain Routing Information
• A router forwards packets based on its IP routing table. To implement route-based packet forwarding, the router needs to obtain routes. The following describes the
common methods of obtaining routes.
GE0/0/0
20.1.1.0/24 30.1.1.0/24
GE0/0/1
10.1.1.0/24
GE0/0/1
Dynamic routing
protocol
GE0/0/2 OSPF
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Direct Routes (1)
Direct Routes
• A direct route is automatically generated by a device and points to a
local directly-connected network.
GE0/0/0 • When a router is the last hop router, IP packets to be forwarded will
10.0.0.2/24
10.0.0.0/24
GE0/0/1
20.1.1.0/24 match a direct route and the router will directly forward the IP packet
RTB 20.1.1.2/24 to the destination host.
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Direct Routes (2)
Direct routes
GE0/0/0 GE0/0/1
10.0.0.2/24 20.1.1.3/24
• Not all the direct routes generated for interfaces are installed in the IP
GE0/0/0 GE0/0/1
RTA 10.0.0.1/24 RTB 20.1.1.2/24 RTC routing table. Only the direct routes of which the physical status and
protocol status of interfaces are up are installed in the IP routing table.
• When GE0/0/0 goes down, the direct route for this interface is not installed in the IP routing
table.
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of IP Routing
▫ Basic Concepts of Routing
▫ Route-based Forwarding
2. Static Routing
3. Dynamic Routing
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Examining the IP Routing Table
<Quidway> display ip routing-table
Route Flags: R - relay, D - download to fib
------------------------------------------------------------------------------------------------------Routing Tables: Public
Destinations : 6 Routes : 6
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Fields in the IP Routing Table
Destination/Mask: indicates the destination network address and mask of a specific route. The subnet address of a destination host or router is obtained through the
AND operation on the destination address and mask. For example, if the destination address is 1.1.1.1 and the mask is 255.255.255.0, the IP address of the subnet to which
the host or router belongs is 1.1.1.0.
Proto (Protocol): indicates the protocol type of the route, that is, the protocol through which a router learns the route.
Pre (Preference): indicates the routing protocol preference of the route. There may be multiple routes to the same destination, which have different next hops and
outbound interfaces. These routes may be discovered by different routing protocols or be manually configured. A router selects the route with the highest preference
(with the lowest preference value) as the optimal route.
Cost: indicates the cost of the route. When multiple routes to the same destination have the same preference, the route with the lowest cost is selected as the optimal
route.
NextHop: indicates the local router’s next-hop address of the route to the destination network. This field specifies the next-hop device to which packets are forwarded.
Interface: indicates the outbound interface of the route. This field specifies the local interface through which the local router forwards packets.
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Preference - Basic Concepts
Comparing Route Preferences • When a router obtains routes to the same destination subnet from
different routing protocols (these routes have the same destination
Routes network address and mask), the router compares the preferences of
these routes and prefers the route with the lowest preference value.
Higher Preference
Preference
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Preference - Comparison Process
Comparing Route Preferences
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Metric - Comparison Process
Metric comparison
Dynamic routing • RTA learns two routes with the same destination address
protocol 20.1.1.2/30
OSPF (10.0.0.0/30) and preference through OSPF. In this case, RTA needs
Cost=10 Cost=10 10.0.0.0/30
20.1.1.1/30 to compare the metrics of the two routes.
Cost=10
RTA • The two routes have different metrics. The OSPF route with the next
30.1.1.1/30 30.1.1.2/30
hop being 30.1.1.2 has a lower metric (with the cost 10), so it is
installed in the IP routing table.
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Preference - Common Default Values
The following table lists the default preference values of common route types:
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Metric - Basic Concepts
Comparing Metrics • When a router discovers multiple routes to the same destination
Routes
network through the same routing protocol, the router selects the
optimal route based on the metrics of these routes if these routes
have the same preference.
Different
Installed in the IP
Destination/mask routing table • The metric of a route indicates the cost of reaching the destination
Same address of the route.
Higher preference
• Common metrics include the hop count, bandwidth, delay, cost, load,
Preference and reliability.
• The route with the lowest metric is installed in the IP routing table.
Same preference
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of IP Routing
▫ Basic Concepts of Routing
▪ Route-based Forwarding
2. Static Routing
3. Dynamic Routing
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Longest Matching
When a router receives an IP packet, it compares the destination IP address of the packet with all routing entries in the local routing table bit by bit
until the longest matching entry is found. This is the longest matching mechanism.
Bit-by-bit matching
Destination IP address
172.16.2.1
172. 16. 00000010 00000001
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example of Longest Matching (1)
Example of Longest Matching
RTA
has the 16-bit mask and the other has the 24-bit mask. According to the
20.1.1.2/30 longest matching rule, the route with the 24-bit mask is preferred to
DATA guide the forwarding of packets destined for 192.168.2.2.
30.1.1.2/30
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example of Longest Matching (2)
Example of Longest Matching
RTA
20.1.1.2/30
• According to the longest matching rule, only the route to 192.168.3.0/24 in
Data
the IP routing table matches the destination IP address 192.168.3.2.
Therefore, this route is used to forward packets destined for 192.168.3.2.
30.1.1.2/30
IP routing table of RTA
Destination/Mask Next Hop
192.168.0.0/16 10.1.1.2
192.168.2.0/24 20.1.1.2
192.168.3.0/24 30.1.1.2 Match
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route-based Forwarding Process
Outbound
Destination/Mask Next Hop
Interface
Destination IP 20.0.1.0/24 20.0.1.2 GE0/0
address:
30.0.1.0/24 30.0.1.1 GE0/1
40.0.1.2
10.0.1.0/24 20.0.1.1 GE0/0
40.0.1.0/24 30.0.1.2 GE0/1
IP routing table of R2
Data
Gateway Gateway
GE0/1 GE0/0 GE0/0 GE0/1 GE0/0 GE0/1
10.0.1.0/24 20.0.1.0/24 30.0.1.0/24 40.0.1.0/24
10.0.1.1 20.0.1.1 20.0.1.2 30.0.1.1 30.0.1.2 40.0.1.1
R1 R2 R3
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary of the IP Routing Table
• When a router obtains routes to the same destination subnet with the same mask from different routing protocols, the router prefers the route with
the lowest preference value of these routing protocols. If these routes are learned from the same routing protocol, the router prefers the route with
the lowest cost. In summary, only the optimal route is installed in the IP routing table.
• When a router receives a packet, it searches its IP routing table for the outbound interface and next hop based on the destination IP address of the
packet. If it finds a matching routing entry, it forwards the packet according to the outbound interface and next hop specified by this entry. Otherwise,
it discards the packet.
• Packets are forwarded hop by hop. Therefore, all the routers along the path from the source to the destination must have routes destined for the
destination. Otherwise, packet loss occurs.
• Data communication is bidirectional. Therefore, both forward and backward routes must be available.
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of IP Routing
2. Static Routing
3. Dynamic Routing
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Application Scenarios of Static Routes
Static Routes • Static routes are manually configured by network administrators, have low
system requirements, and apply to simple, stable, and small networks.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Static Route Configuration
Specify a next-hop IP address for a static route.
[Huawei] ip route-static ip-address { mask | mask-length } nexthop-address
Specify both the outbound interface and next hop for a static route.
[Huawei] ip route-static ip-address { mask | mask-length } interface-type interface-number [ nexthop-address ]
When creating a static route, you can specify both the outbound interface and next hop. Alternatively, you can specify either the outbound interface or next hop,
depending on the interface type:
For a point-to-point interface (such as a serial interface), you must specify the outbound interface.
For a broadcast interface (for example, an Ethernet interface) or a virtual template (VT) interface, you must specify the next hop.
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Example
GE0/0/0 S1/0/0
10.0.0.2/24 20.1.1.3/24
GE0/0/0 S1/0/0 Configure RTA.
RTA 10.0.0.1/24 RTB 20.1.1.2/24 RTC
[RTA] ip route-static 20.1.1.0 255.255.255.0 10.0.0.2
• Packets are forwarded hop by hop. Therefore, all the routers along the path from the
source to the destination must have routes destined for the destination.
• Data communication is bidirectional. Therefore, both forward and backward routes must be
available.
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Default Routes
• Default routes are used only when packets to be forwarded do not match any routing entry in an IP routing table.
• In an IP routing table, a default route is the route to network 0.0.0.0 (with the mask 0.0.0.0), namely, 0.0.0.0/0.
192.168.1.0/24
RTA RTB 192.168.2.0/24
GE0/0/0 GE0/0/0
10.0.0.0/24 192.168.3.0/24
10.0.0.1 .
10.0.0.2 .
192.168.254.0/24
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Application Scenarios of Default Routes
Default routes are typically used at the egress of an enterprise network. For example, you can configure a default route on an egress device to enable
the device to forward IP packets destined for any address on the Internet.
Enterprise
network RTA
1.2.3.0/24 Internet
GE0/0/1 GE0/0/0 1.2.3.254
PC 192.168.1.254 1.2.3.4
192.168.1.100
Gateway: 192.168.1.254
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of IP Routing
2. Static Routing
3. Dynamic Routing
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Overview of Dynamic Routing
Static Routing Dynamic Routing
Static routing • To use static routes on any device, Dynamic routing OSPF • Dynamic routes can be
you must manually configure them. automatically discovered and
• Static routes cannot adapt to link learned.
changes. • Dynamic routes can adapt to
topology changes.
• When the network scale expands, it becomes increasingly complex to manually configure • Dynamic routing protocols automatically discover and generate routes, and update
static routes. In addition, when the network topology changes, static routes cannot adapt routes when the topology changes. These protocols effectively reduce the workload
to these changes in a timely and flexible manner. of network administrators and are widely used on large networks.
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Classification of Dynamic Routing Protocols
Classification by the application scope
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of IP Routing
2. Static Routing
3. Dynamic Routing
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
GE0/0/0 GE0/0/1
10.0.0.2/24 20.1.1.3/24
30.1.2.0/24
GE0/0/0 GE0/0/1
RTA 10.0.0.1/24 RTB 20.1.1.2/24 RTC
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
GE0/0/0 GE0/0/1
10.0.0.2/24 20.1.1.3/24
30.1.2.0/24
GE0/0/0 GE0/0/1
RTA 10.0.0.1/24 RTB 20.1.1.2/24 RTC
Outbound
Destination/Mask Next Hop
Interface
[RTA] ip route-static 30.1.2.0 24 20.1.1.3
Recursion
30.1.2.0/24 20.1.1.3 GE0/0/0
20.1.1.0/24 10.0.0.2 GE0/0/0
[RTA] ip route-static 20.1.1.0 24 10.0.0.2
Configure a route to 20.1.1.3, with the next hop pointing to 10.0.0.2 on the directly connected network.
In this way, RTA can recurse the route with the destination 30.1.2.0/24 to the route with the destination 10.0.0.2.
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
Equal-Cost Route
When there are equal-cost routes in the IP routing table, a router forwards IP packets to be sent to the destination subnet through all valid outbound
interfaces and next hops in the equal-cost routes, achieving load balancing.
RTA's IP routing table If there are multiple routes to the same destination from the
same source, with the same cost, but pointing to different next
Destination/Mask Next Hop hops, the routes are installed in the IP routing table as equal-
20.1.1.2 cost routes. Traffic to be sent to the destination will be
10.0.0.0/30 distributed to these equal-cost routes.
30.1.1.2
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
RTB Therefore, you can configure two static routes with the same
destination address/mask but different preferences and next hops to
implement backup of forwarding paths.
10.1.1.2/30
20.0.0.0/30
• A backup route is known as a floating route, which is used only when
10.1.1.1/30 the primary route is unavailable. That is, a floating route is installed in
10.1.2.1/30 10.1.2.2/30 the IP routing table only when the next hop of the primary route is
RTA RTC
unreachable.
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
RTB RTB
10.1.1.2/30 10.1.1.2/30
20.0.0.0/30 20.0.0.0/30
10.1.1.1/30 10.1.1.1/30
RTA's IP routing table when the primary link is available RTA's IP routing table when the primary link fails
Destination Next Hop Preference Destination Next Hop Preference
20.0.0.0 10.1.1.2 60 20.0.0.0 10.1.2.2 70
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
CIDR
• Classless Inter-Domain Routing (CIDR) uses IP addresses and masks to identify networks and subnets. CIDR replaces the previous addressing architecture of classful
network design (such as classes A, B, and C addresses).
• CIDR is based on variable length subnet mask (VLSM). CIDR uses prefixes of any lengths to divide the address space with continuous IP addresses. Multiple address
segments with continuous prefixes can be summarized into a network, effectively reducing the number of routing entries.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
192.168.2.0/24
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
10.1.1.0/24
10.1.2.0/24
RTA RTB
... • Route summarization is an approach of summarizing routes with the same
12.1.1.2 ...
12.1.1.1 ... prefix into one summary route to minimize the IP routing table size and improve
10.1.10.0/24
device resource usage.
• Route summarization uses CIDR to summarize network segments with the same
prefix into a single one.
[RTA] ip route-static 10.1.0.0 16 12.1.1.2
• The routes before being summarized are known as specific routes, and the
routes created after summarization are known as summarized routes or
On RTA, configure static routes to the directly connected network summary routes.
segments 10.1.1.0/24, 10.1.2.0/24, ..., and 10.1.10.0/24 of RTB, with the
same next hop. Therefore, these routes can be summarized into one
route.
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
192.168.1.0/24 1 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0
192.168.2.0/24 1 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0
192.168.3.0/24 1 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0
Network address Host address
192.168.0.0/22 1 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
• To summarize routes to multiple continuous network segments into one summary route that just includes these network segments, ensure that the mask length of
the summary route is as long as possible.
• The key to achieve this is to convert the destination addresses of specific routes into binary numbers and then find out the identical bits in these binary numbers.
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
10.1.1.0/24
10.1.2.0/24 RTB RTA
... 12.1.1.2 Internet
... 12.1.1.1
...
1 2
10.1.10.0/24
RTB receives traffic destined for Routes are summarized on RTA. Therefore, RTA
10.1.20.0/24 and forwards the traffic to forwards the traffic back to RTB according to the
RTA according to the default route. summary route to 10.1.0.0/16.
Loop
Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
10.1.1.0/24
10.1.2.0/24 RTB RTA
... 12.1.1.2 Internet
...
... 12.1.1.1
10.1.10.0/24
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
20.0.0.2
RTC
172.16.32.0/24
172.16.33.0/24
...
172.16.63.0/24
• To simplify the configuration, an administrator may configure a static summary route on RTA to allow RTA to reach network segments 172.16.1.0/24 to 172.16.31.0/24 of RTB. However,
this summary route also includes the network segments of RTC. As a result, RTA forwards the traffic destined for network segments of RTC to RTB, causing data packet loss. This
problem is caused by inaccurate route summarization. To resolve this problem, the summary route must be as accurate as possible; that is, it just covers all specific routes that are
to be summarized, with no extra route included.
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Route Recursion Equal-Cost Route Floating Route Route Summarization
10.1.1.0/24 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0
10.1.2.0/24 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0
10.1.3.0/24 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0
/22
ip route-static 10.1.1.0 24 12.1.1.2
ip route-static 10.1.2.0 24 12.1.1.2
ip route-static 10.1.1.0 22 12.1.1.2
ip route-static 10.1.3.0 24 12.1.1.2
Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. How does a router select the optimal route?
3. What is the summary route for routes to 10.1.1.0/24, 10.1.3.0/24, and 10.1.9.0/24?
Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
This section presents the basic concepts of routes, how routes instruct routers to forward IP packets, common route
attributes, and default routes (special static routes).
In addition, this section describes advanced routing features including route recursion, floating routes, and equal-cost
routes, which are widely used on live networks.
Page 49 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 50 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
● Static routes are manually configured. If a network topology changes, static routes have
to be manually adjusted, which restricts the large-scale application of static routes on
the live network.
● Dynamic routing protocols are widely used on live networks because of their high
flexibility, high reliability, and easy scalability. The Open Shortest Path First (OSPF)
protocol is a widely used dynamic routing protocol.
● This course describes basic concepts, working mechanism, and basic configurations of
OSPF.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
● On completion of this course, you will be able to:
� Describe the advantages and classification of dynamic routing protocols.
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. OSPF Overview
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Why Are Dynamic Routing Protocol Used?
● Static routes are manually configured and maintained, and the command lines are simple and clear. They
apply to small-scale or stable networks. Static routes have the following disadvantages:
� Unable to adapt to large-scale networks: As the number of devices increases, the configuration workload increases
sharply.
� Unable to dynamically respond to network changes: If the network topology changes, the network cannot
automatically converge, and static routes must be manually modified.
R R2 R R2
1 1
Link fault
R3 R3
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Classification of Dynamic Routing Protocols
By ASs
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Distance-Vector Routing Protocol
● A router running a distance-vector routing protocol periodically floods routes. Through route exchange,
each router learns routes from neighboring routers and installs the routes into its routing table.
● Each router on a network is clear only about where the destination is and how far the destination is, but
unclear about the whole network topology. This is the essence of the distance-vector algorithm.
3.3.3.
3
R1 R2 R3
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Link-State Routing Protocol - LSA Flooding
● Different from a distance-vector routing protocol, a link-state routing protocol advertises link
status information rather than routes in the routing table. Routers that run a link-state routing
protocol establish a neighbor relationship and then exchange Link State Advertisements (LSAs).
LSA LSA
R4
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Link-State Routing Protocol - LSDB Creation
● Each router generates LSAs and adds the received LSAs to its own link state database (LSDB).
Routers learn the whole network topology through the LSDB.
LSA LSA
R4
LSDB
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Link-State Routing Protocol - SPF Calculation
● Each router uses the Shortest Path First (SPF) algorithm and LSDB information to calculate routes. Each
router calculates a loop-free tree with itself as the root and the shortest path. With this tree, a router
determines the optimal path to each corner of a network.
LSDB
Each router calculates a loop-free
tree with itself as the root over the
R2 shortest path.
LSD LSD
B B
2
R1 R3
1 4
R4 4
LSDB
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Link-State Routing Protocol - Routing Table
Generation
● Ultimately, the router installs routes for the calculated preferred paths into its routing
table.
Based on SPF calculation results,
Routing each router installs routes into the
LSDB
table routing table.
R1 R3
R4
Routing
LSDB table
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary of Link-State Routing Protocols
Neighbor LSDB Link status LSDB
relationship setup information
R1 R2 R1 R2
R3 1 2 R3 LSDB
1 2
RIB
Path computation R3 3 RIB: Routing Information Base R3
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to OSPF
● OSPF is a typical link-state routing protocol and one of the widely used IGPs in the industry.
● OSPFv2, as defined in RFC 2328, is designed for IPv4. OSPFv3, as defined in RFC 2740, is designed for IPv6. Unless
otherwise specified, OSPF in this presentation refers to OSPFv2.
● OSPF routers exchange link status information, but not routes. Link status information is key information for OSPF to
perform topology and route calculation.
● An OSPF router collects link status information on a network and stores the information in the LSDB. Routers are aware
of the intra-area network topology and be able to calculate loop-free paths.
● Each OSPF router uses the SPF algorithm to calculate the shortest path to a specific destination. Routers generate
routes based on these paths and install the routes to the routing table.
● OSPF supports the variable length subnet mask (VLSM) mechanism and manual route summarization.
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Application on a Campus Network
Internet Firewall
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Area Router ID Cost Value
● The area is considered as a logical group, and each group is identified by an area ID.
R1 Area 0 R2
R3
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Area Router ID Cost Value
R1 R2
I'm 1.1.1.1.
R3
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Area Router-ID Cost Value
Cost = 10
FE interface GE interface
Cost = 1 Cost = 64
Default cost = 1 Default cost = 1
R1 R2 R3
• Each OSPF interface has a specific cost • In the routing table of R3, the cost of the OSPF route to
because of the particular bandwidth value. 1.1.1.0/24 is 75 (10 + 1 + 64).
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Packet Types
● There are five types of OSPF protocol packets and implement different functions in
interaction between OSPF routers.
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Neighbor LSDB
OSPF Routing table
Table Table
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Neighbor LSDB OSPF Routing
Table Table Table
▫ An LSDB stores LSAs generated by a router itself and received from neighbors. In this example, the LSDB of R1
contains three LSAs.
▫ The Type field indicates an LSA type, and the AdvRouter field indicates the router that sends the LSA.
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Neighbor LSDB OSPF Routing
Table Table Table
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. OSPF Overview
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Relationships Between OSPF Routers
● There are two important concepts about the relationship between OSPF routers:
neighbor relationship and adjacency.
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Process of Establishing an OSPF Adjacency
Relationship
● OSPF adjacency relationship establishment involves four steps: establishing a neighbor relationship, negotiating the
master/slave status, exchanging LSDB information, and synchronizing LSDBs.
R1 R2
1
Establish a bidirectional
neighbor relationship.
2
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Process of Establishing an OSPF Adjacency
- Step 1
Area 1.1.1.1 Area 2.2.2.2
R1 R2
Hello packets
I'm 1.1.1.1. I don't know who's on the link.
Init
R1 (1.1.1.1) is discovered and added
Hello packets to the neighbor list. The status of R1
I'm 2.2.2.2. I found my neighbor 1.1.1.1. in the neighbor table is Init.
2-way
R2 (2.2.2.2) is discovered and
added to the neighbor list.
Hello packets
Because R2 discovered me, I
I'm 1.1.1.1. I found the neighbor 2.2.2.2.
set the status of R2 to 2-way in 2-way
the neighbor table.
Because R1 found me, I
change the status of 1.1.1.1 to
We're neighbors. 2-way in the neighbor table.
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Process of Establishing an OSPF Adjacency
- Steps 2 and 3
Router ID: 1.1.1.1 Router ID: 2.2.2.2
R1 R2
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Process of Establishing an OSPF Adjacency
- Step 4
Router ID: 1.1.1.1 Router ID: 2.2.2.2
R1 R2
LSR
I want to request the complete information about
the xx LSA.
Loading Loading
LSU
This is the complete information about the requested LSA.
LS ACK
Confirms the reception of the LSU and the xx LSA
carried in the LSU.
LSR
I want to request the complete information about
the yyy LSA.
Full Full
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Review of the OSPF Neighbor Table
Router ID: 1.1.1.1 Router ID: 2.2.2.2
R1 R2
GE1/0/0 GE1/0/0
10.1.1.1/30 10.1.1.2/30
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Network Types
● Before learning concepts of the DR and BDR, understand OSPF network types.
● The OSPF network type is a very important interface variable. This variable affects OSPF operations on
interfaces. For example, it determines how to send OSPF packets and whether to elect a DR or BDR.
● The default OSPF network type of an interface depends on the data link layer encapsulation used by the
interface.
● As shown in the figure, OSPF has four network types: broadcast, NBMA, P2MP, and P2P.
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Network Types (1)
● Generally, the network types of OSPF interfaces at both ends of a link must be the same. Otherwise, the two interfaces
cannot establish a neighbor relationship.
● An OSPF network type can be manually changed on an interface to adapt to different network scenarios. For example,
you can change the BMA network type to P2P.
Serial0/0/0 Serial0/0/0
GE0/0/0
PP PP
RTA P P RTB Ethernet
• P2P indicates that only two network devices can be connected • BMA is also called broadcast. It refers to an environment that
on a link. allows multiple devices to access and supports broadcast.
• A typical example is a PPP link. When an interface uses PPP • A typical example is an Ethernet network. When an interface
encapsulation, the default network type of the OSPF interface uses Ethernet encapsulation, the default network type of the
is P2P. OSPF interface is BMA.
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Network Types (2)
Non-Broadcast Multiple Access (NBMA) Point-to-Multipoint (P2MP)
Frame
F Relay
R
• NBMA refers to an environment that allows multiple • A P2MP network is formed by bundling
network devices to access but does not support endpoints of multiple P2P links.
broadcast. • No link layer protocol is considered as a P2MP
• A typical example is a Frame Relay (FR) network. network by default. This type must be manually
changed from another network type.
• For example, a non-full-mesh NBMA network
can be changed to a P2MP network.
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Background of DR and BDR
● Multi-access (MA) networks are classified into BMA and NBMA networks. Ethernet is a typical broadcast multi-access
network.
● On an MA network, if each OSPF router establishes OSPF adjacencies with all the other routers, excessive OSPF
adjacencies exist on the network, which increases the load on the devices and the number of OSPF packets flooded on
the network.
● Once the network topology changes, LSA flooding on the network may waste bandwidth and device resources.
Ethernet
Adjacency
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
DR and BDR
● To optimize OSPF neighbor relationships on an MA network, the OSPF protocol specifies three types of
OSPF routers: DR, BDR, and DRother.
● Only the DR and BDR can establish adjacencies with other OSPF routers. DRothers do not establish
OSPF adjacencies with one another, and their relationship is in the 2-way state.
● The BDR monitors the status of the DR and takes over the role of the DR if the existing DR fails.
DR BDR
Ethernet
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Domain and Single Area
● An OSPF domain is a network that consists of a series of contiguous
OSPF network devices that use the same policy.
● An OSPF router floods LSAs in the same area. To ensure that all
routers have the same understanding of the network topology, LSDBs
need to be synchronized within an area.
▫ When the network topology changes, LSA flooding and SPF recalculation
on the entire network bring heavy loads.
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Multi-Area OSPF
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Types of OSPF Routers
� Backbone router
Another AS
Area 2
ASBR
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Typical OSPF Single-Area and Multi-Area
Networking
OSPF Area
0
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. OSPF Overview
Wildcard masks are used to specify a range of network addresses. They are commonly used with routing protocols (like OSPF) and access lists.
Wildcard mask of all zeros (0.0.0.0) means that the entire IP address have to match in order for a statement to execute. For example, if we want to match only the IP
address of 192.168.0.1, the command used would be 192.168.0.1 0.0.0.0.
A wildcard mask of all ones (255.255.255.255) means that no bits have to match. This basically means that all addresses will be matched.
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic OSPF Configuration Commands (1)
1. (System view) Create and run an OSPF process.
2. (OSPF view) Create an OSPF area and enter the OSPF area view.
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic OSPF Configuration Commands (2)
4. (Interface view) Set an OSPF interface cost.
The ospf cost command sets a cost for an OSPF interface. By default, OSPF automatically calculates the cost of
an interface based on the interface bandwidth. The cost value is an integer ranging from 1 to 65535.
5. (OSPF view) Set an OSPF bandwidth reference value.
The bandwidth-reference command sets a bandwidth reference value that is used to calculate interface costs. The
value ranges from 1 to 2147483648, in Mbit/s. The default value is 100 Mbit/s.
6. (Interface view) Set the priority of an interface for DR election.
The ospf dr-priority command sets a priority for an interface that participates in DR election. A larger value
indicates a higher priority. The value ranges from 0 to 255.
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Configuration Example
Description:
• There are three routers, R1, R2, and R3. R1 and R3 are connected to networks 1.1.1.1/32 and 3.3.3.3/32
(simulated by Loopback 0), respectively. OSPF needs to be used to implement interworking between the
two networks. Detailed topology was as follows:
Area 0 Area 1
1.1.1.1/32 3.3.3.3/32
GE0/0/0 GE0/0/0 GE0/0/1 GE0/0/1
R1 10.1.12.1/30 10.1.12.2/30 R2 10.1.23.1/30 10.1.23.2/30 R3
• The configuration process consists of three steps: configuring device interfaces, configuring OSPF, and
verifying the result.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Configuration Example - Configuring
Interfaces
Configure Configure Verify the
interfaces. OSPF. result.
Area 0 Area 1
1.1.1.1/32 3.3.3.3/32
GE0/0/0 GE0/0/0 GE0/0/1 GE0/0/1
R1 10.1.12.1/30 10.1.12.2/30 R2 10.1.23.1/30 10.1.23.2/30 R3
• Set IP addresses for R1's, R2's, and R3's interfaces according to the plan.
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Configuration Example - Configuring
OSPF (1)
Configure Configure Verify the
interfaces. OSPF. result.
1.1.1.1/32 3.3.3.3/32
GE0/0/0
R1 10.1.12.1/30 R2 R3
• Planned OSPF parameters: The OSPF process ID is 1. Router IDs of R1, R2, and R3 are 1.1.1.1,
2.2.2.2, and 3.3.3.3 respectively.
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Configuration Example - Configuring
OSPF (2)
Configure Configure Verify the
interfaces. OSPF. result.
1.1.1.1/32 3.3.3.3/32
GE0/0/0 GE0/0/1 GE0/0/1
R1 10.1.12.2/30 R2 10.1.23.1/30 10.1.23.2/30 R3
• When configuring OSPF multi-area, be sure to advertise the route destined for a network segment
that responds to a specified area.
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
OSPF Configuration Example - Verification (1)
Configure Configure Verify the
interfaces. OSPF. result.
Area 0 Area 1
1.1.1.1/32 3.3.3.3/32
R1 R2 R3
<R1>display ip routing-table
------------------------------------------------------------------------------
Destinations : 10 Routes : 10
Route to
3.3.3.3/32 Destination/Mask Proto Pre Cost Flags NextHop Interface
learned using
OSPF 1.1.1.1/32 Direct 0 0 D 127.0.0.1 LoopBack0
B. Two-way
C. Exchange
D. Full
2. (Multiple) In which of the following situation will the establishment of adjacencies between routers be
triggered? ( )
A. Two routers on a point-to-point link
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
● OSPF is a widely used routing protocol on the live network. This presentation describes
basic concepts, application scenarios, and basic configurations of OSPF.
● The router ID, area, OSPF neighbor table, LSDB table, and OSPF routing table are
basic OSPF concepts. Describe the establishment of OSPF neighbor relationships and
adjacencies, which helps you better understand the link-state routing protocol.
● OSPF has more interesting details, such as LSA types, the SPF calculation process,
and the OSPF special area. For more OSPF information, please continue your Huawei
HCIP-Datacom certification courses.
Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
● Data transmission on networks must comply with certain standards. Ethernet protocols
define how data frames are transmitted over an Ethernet network. Understanding
Ethernet protocols is the basis for fully understanding communication at the data link
layer. An Ethernet switch is the main device for implementing data link layer
communication. It is essential to understand how an Ethernet switch works.
● This course describes the concepts related to Ethernet protocols, MAC address types,
and working process and mechanism of Layer 2 switches.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
● On completion of this course, you will be able to:
� Describe the basic concepts of an Ethernet network.
� Get familiar with the structure and generation process of a MAC address table.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Ethernet Protocols
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Protocols
● Ethernet is the most common communication protocol standard used by existing local area networks
(LANs). It defines the cable types and signal processing methods that are used on a LAN.
● An Ethernet network is a broadcast network built based on the carrier sense multiple access/collision
detection (CSMA/CD) mechanism.
Switch B
Host A Host B
Host C Host D
Host C Host D
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Collision Domain
● A collision domain is a set of nodes connected to the same shared medium. All nodes in a collision domain compete for
the same bandwidth. Packets (unicast, multicast, or broadcast) sent by a node can be received by other nodes.
Separating collision domains
Solution: CSMA/CD
Host A Host B
Switch A
Collision
Switch B
Host A Host B
Host A Host B
On a traditional Ethernet network, multiple nodes on the same A switch forwards broadcast packets to all interfaces. Therefore,
medium share a link. The broadcast packets sent by a device can be the nodes connected to all interfaces of the switch belong to the
received by all the other devices. same broadcast domain.
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet NIC
● A network interface card (NIC) is a key component that connects a network device (such as a computer, a
switch, or a router) to an external network.
Computer • Network Port
Packet Bit Stream
▫ A network port is also called a network
TCP/IP
Network NIC interface, interface, or port.
layer
Computer Packet Bit Stream • NIC
▫ Each network port corresponds to a
Switch NIC.
Other NICs that
transfer data to
Frame Bit Stream ▫ A computer or switch forwards data
the local host
NIC through a NIC.
Other NICs on the
local host Frame Bit Stream
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Ethernet Protocols
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Frame Format MAC address Ethernet frame type
6B 6B 2B 46-1500B 4B
Ethernet_II format D.MAC S.MAC Type User data FCS
6B 6B 2B 3B 5B 38-1492B 4B
IEEE 802.3 format D.MAC S.MAC Length LLC SNAP User data FCS
3B 2B
Org
Type
Code
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Frame Format MAC address Ethernet frame type
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Frame Format MAC address Ethernet frame type
Ethernet
Characteristics of IP addresses:
Host 1 Host 2
▫ IP addresses are unique.
▫ IP addresses are changeable.
NIC NIC
MAC1 MAC2 ▫ IP addresses are assigned based on
network topology.
IP1 IP2
Can a network
device have either
IP3 IP4 a MAC address or
Characteristics of MAC addresses:
an IP address?
▫ MAC addresses are unique.
NIC NIC ▫ MAC addresses cannot be changed.
MAC3 MAC4
▫ MAC addresses are assigned based on
Host 3 Host 4 the manufacturer.
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Frame Format MAC address Ethernet frame type
● As typically represented, MAC addresses are recognizable as six groups of two hexadecimal digits,
separated by hyphens, colons, or without a separator.
For example, 00-1E-10-DD-DD-02 or 001E-10DD-DD02
Hexadecimal 00 1E 10 DD DD 02 6-byte
Binary 0000 0000 0001 1110 0001 0000 1101 1101 1101 1101 0000 0010 48-bit
23 22 21 20 23 22 21 20
Conversion Power
between 8 4 2 1 8 4 2 1
hexadecimal and
binary digits
Bit 0 0 0 1 1 1 1 0
=1 = 8+4+2=14=E
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Frame Format MAC address Ethernet frame type
OUI CID
Multicast MAC address XXXXXXX XXXXXXX XXXXXXX XXXXXXX XXXXXXX XXXXXXX 01-80-C2-00-00-01
1 X X X X X
Non-OUI
Broadcast MAC address 11111111 11111111 11111111 11111111 11111111 11111111 FF-FF-FF-FF-FF-FF
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Frame Format MAC address Ethernet frame type
Host A Host B
• A unicast Ethernet frame is also called a unicast
frame.
• The destination MAC address of a unicast frame
is a unicast MAC address. Unicast
Frame
D.MAC:
S.MAC DATA
00-1E-10-DD-DD-02
Host C Host D
0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 0 0 0 0 1 0 0 0 0 1 1 0 1 1 1 0 1 1 1 0 1 1 1 0 1 0 0 0 0 0 0 1 0
00- 1E- 10- DD- DD- 02
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Frame Format MAC address Ethernet frame type
Host A Host B
• A broadcast Ethernet frame ia also called a
broadcast frame.
• The destination MAC address of a broadcast
frame is a broadcast MAC address.
Broadcast
Frame
D.MAC:
S.MAC DATA
FF-FF-FF-FF-FF-FF
Host C Host D
1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
FF- FF- FF- FF- FF- FF
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Ethernet Frame Format MAC address Ethernet frame type
Host A Host B
• A multicast Ethernet frame is also called a
multicast frame.
• The destination MAC address of a multicast
frame is a unicast MAC address.
Multicast
Frame
D.MAC:
S.MAC DATA
01-80-C2-00-00-01
Host C Host D
0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
01- 80- C2- 00- 00- 01
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Ethernet Protocols
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Typical Architecture of a Campus Network
Internet Internet
Egress
layer
Core layer
Aggregation
layer
Access
layer
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Layer 2 Ethernet switch
Internet Internet
Layer 2 Ethernet
Switch
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Working Principles of Switches
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Switch
IP1: 192.168.1.1 IP2: 192.168.1.2
MAC1: 0050-5600-0001 MAC2: 0050-5600-0002
Source MAC address: Destination MAC address: After receiving a frame, the switch learns
the source MAC address of the frame,
MAC1 MAC2
searches the MAC address table for the
Source IP address: Destination IP address: destination MAC address (MAC2: 0050-
IP1 IP2 5600-0002 in this example) of the frame,
and forwards the frame through the
Payload corresponding interface.
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MAC Address Table
● Each switch has a MAC address table that stores the mapping between MAC addresses and
switch interfaces.
Host 1 Host 2
GE 0/0/1 GE 0/0/2
MAC1 GE 0/0/1
MAC2 GE 0/0/2
... ...
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Three Frame Processing Behaviors of a Switch
● A switch processes the frames entering an interface over a transmission medium in three ways:
Switch
Flooding
Port 1 Port 2 Port 3 Port 4
Switch
Forwarding
Port 1 Port 2 Port 3 Port 4
Switch
Discarding
Port 1 Port 2 Port 3 Port 4
Frame
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Flooding
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Forwarding
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Destination MAC: MAC2 MAC1 GE 0/0/1 If the switch finds the destination MAC
address of the frame in the MAC address
MAC2 GE 0/0/2 table and the interface number in the table
is not the number of the interface through
which the frame enters over the
transmission medium, the switch forwards
the unicast frame.
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Discarding
IP2: 192.168.1.2
MAC2: 0050-5600-0002
Host 1
Host 2
Switch 2
MAC address table Frame processing
1 Frame sent by host 1 2 queried by switch 2 3 behavior of the switch
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MAC Address Learning on a Switch (1)
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MAC Address Learning on a Switch (2)
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MAC Address Learning on a Switch (3)
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MAC Address Learning on a Switch (4)
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MAC Address Learning on a Switch (5)
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Ethernet Protocols
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Process of Data Communication Within a
Network Segment
● Scenario description:
� Task: Host 1 wants to access host 2.
� Host: The host is in the initialized state and only knows its own IP address and MAC address (assume that the IP
address of the peer host has been obtained).
Host 1 Host 2
GE 0/0/1 GE 0/0/2
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Data Encapsulation Process
Host 1 Host 2
Ethernet TCP
IP header User data Ethernet tail
header header
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Initialization
Host 1 Host 2
GE 0/0/1 GE 0/0/2
----------------------------------------------------
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Flooding Frames
Host 1 Host 2
GE 0/0/1 GE 0/0/2
ARP Request packet sent by host 1 MAC address table of the switch
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MAC Address Learning
Host 1 Host 2
GE 0/0/1 GE 0/0/2
ARP Request packet sent by host 1 MAC address table of the switch
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Reply of the Target Host
Host 1 Host 2
GE 0/0/1 GE 0/0/2
MAC address table of the switch ARP Reply packet sent by host 2
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Single) A Layer 2 Ethernet switch generates a MAC address table entry based on the ( ) of the packet
received by an interface.
A. Source MAC address
C. Source IP address
D. Destination IP address.
2. (Single) A switch has eight interfaces. A unicast frame enters the switch through one of the eight
interfaces, but the switch cannot find the destination MAC address entry of the frame in the MAC address
table. In this case, which of the following operations is performed by the switch? ( )
A. Discarding
B. Flooding
C. Point-to-point forwarding
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
● This section describes the basic information about the Ethernet protocol, Ethernet
frame formats, MAC address, and working principles of Layer 2 switches. Specifically,
after receiving a frame, a switch learns the source MAC address of the frame and
searches the destination MAC address of the frame in the MAC address table. If the
destination MAC address exists in the table, the switch forwards the frame through the
corresponding interface.
● This course also describes the whole process of data communication within the same
network segment based on the working principles of switches.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
Ethernet technology implements data communication over shared media based on carrier sense multiple access with
collision detection (CSMA/CD). If there are a large number of PCs on the Ethernet, security risks and broadcast storms
may occur, deteriorating network performance and even causing network breakdowns.
The virtual local area network (VLAN) technology is therefore introduced to solve the preceding problem.
This course describes basic VLAN principles, working principles of different Layer 2 interfaces, VLAN applications, data
forwarding principles, and basic VLAN configuration methods.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
▫ Understand the background of the VLAN technology.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. What Is VLAN
2. VLAN Principles
3. VLAN Applications
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Issues Facing a Traditional Ethernet
On a typical switching network,broadcast
Layer 2 broadcast domain
frames or unknown unicast frames sent
by a PC are flooded in the entire
SW4 SW5
broadcast domain.
SW6 SW7
Valid traffic
Junk traffic
(Note: This example assumes that the MAC address entry of PC2 exists in the MAC address tables of SW1, SW3,
and SW7 rather than SW2 and SW5.)
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN
VLAN
(multiple broadcast domains) • The VLAN technology isolates
broadcast domains.
SW4 SW5
• Characteristics:
Broadcast frame
PC2 ▫ Geographically independent.
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. What Is VLAN
2. VLAN Principles
3. VLAN Applications
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
VLAN Implementation
Switch1 Frame Switch2
1 2 3 4 5 5 4 3 2 1
Frame
Switch1 and Switch2 belong to the network of the same enterprise. VLANs are planned for the network, with VLAN 10 for department A and VLAN 20 for department B. Employees in departments A
and B are connected to both Switch1 and Switch2.
Assume that a frame sent from PC1 reaches Switch2 through the link between Switch1 and Switch2. If no processing is implemented, Switch2 can neither identify the VLAN to which the frame
belongs nor determine the local VLAN to which the frame should be sent.
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
VLAN Tag
How does a switch identify the VLAN to which a received frame belongs?
Which VLAN does the received
frame belong to?
VLAN Tag
20
IEEE 802.1Q defines a 4-byte VLAN tag for
Ethernet frames, enabling switches to
identify the VLANs to which received frames
belong.
VLAN 20 VLAN 10
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
VLAN Frame
Original Ethernet frame Length/
Destination MAC address Source MAC address Data FCS
(untagged frame) Type
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
VLAN Implementation
Tagged frame
Switch1 Switch2
Tagged frame
1 2 3 4 5 5 4 3 2 1
The link between Switch1 and Switch2 carries data of multiple VLANs. In this situation, a VLAN-based data tagging method is required to distinguish the
frames of different VLANs.
IEEE 802.1Q, often referred to as Dot1q, defines a system of VLAN tagging for Ethernet frames by inserting an 802.1Q tag into the frame header to
carry VLAN information.
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
• Trunk interface
A trunk interface allows frames that belong to multiple VLANs to pass through and
differentiates the frames using the 802.1Q tag. This type of interface is used to connect a
switch to another switch or a sub-interface on a device, such as a router or firewall.
• Hybrid interface
VLAN10 VLAN20 VLAN10 VLAN20 Similar to a trunk interface, a hybrid interface also allows frames that belong to multiple
VLANs to pass through and differentiates the frames using the 802.1Q tag. You can determine
whether to allow a hybrid interface to carry VLAN tags when sending the frames of one or
Access interface Trunk interface more VLANs.
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Access Interface
Frame receiving Frame sending
10 10 10 20
After receiving an untagged frame: After receiving a tagged frame: If the VLAN ID of the frame is the same as the If the VLAN ID of the frame is different from
The interface permits the frame and adds If the VLAN ID of the frame is the same as the PVID of the interface: the PVID of the interface:
a VLAN tag carrying the PVID of the PVID of the interface, the interface permits the The interface removes the VLAN tag from the The interface discards the frame.
interface. frame. frame and then sends the frame.
If the VLAN ID of the frame is different from the
PVID of the interface, the interface discards the
frame. Untagged frame 10 Tagged frame
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Trunk interface
Frame receiving Frame sending
10 10 10 20
After receiving an untagged frame: After receiving a tagged frame: If the VLAN ID of the frame is the same as the If the VLAN ID of the frame is different from
The interface adds a VLAN tag with the VID being If the VLAN ID of the frame is in the list of VLAN PVID of the interface: the PVID of the interface:
the PVID of the interface to the frame and IDs permitted by the interface, the interface If the VLAN ID of the frame is in the list of VLAN If the VLAN ID of the frame is in the list of VLAN
permits the frame only when the VID is in the list permits the frame. Otherwise, the interface IDs permitted by the interface, the interface IDs permitted by the interface, the interface
of VLAN IDs permitted by the interface. If the VID discards the frame. removes the tag from the frame and sends the sends the frame out without removing the tag of
is not in the list, the interface discards the frame. frame out. Otherwise, the interface discards the the frame. Otherwise, the interface discards the
frame. frame.
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Hybrid Interface
Frame receiving Frame sending
10 10 10 20
After receiving an untagged frame: After receiving a tagged frame: If the VLAN ID of the frame is in the list of If the VLAN ID of the frame is in the list of
The interface adds a VLAN tag with the VID being If the VLAN ID of the frame is in the list of VLAN VLAN IDs permitted by the interface: VLAN IDs permitted by the interface:
the PVID of the interface to the frame and IDs permitted by the interface, the interface If the interface has been configured not to carry If the interface has been configured to carry
permits the frame only when the VID is in the list permits the frame. Otherwise, the interface VLAN tags when sending frames, it removes the VLAN tags when sending frames, it sends the
of VLAN IDs permitted by the interface. If the VID discards the frame. tag from the frame and then sends the frame out. frame out without removing the tag of the frame.
is not in the list, the interface discards the frame.
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Interface 1 Interface 2 1 1 10
PVID 10 PVID 20 Interface 1
PVID 100 VLAN ID 10 VLAN ID 20 VLAN ID 10
100 100 100
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Identification VLAN Assignment VLAN Frame Processing
Summary
Access Interface Trunk Interface Hybrid Interface
Frame receiving Frame receiving Frame receiving
▫ Untagged frame: adds a tag with the VID being the PVID of the ▫ Untagged frame: adds a tag with the VID being the PVID of the ▫ Untagged frame: adds a tag with the VID being the PVID of the
interface and permits the frame. interface and checks whether the VID is in the list of permitted interface and checks whether the VID is in the list of permitted
VLAN IDs. If yes, permits the frame. If not, discards it. VLAN IDs. If yes, permits the frame. If not, discards it.
▫ Tagged frame: checks whether the VID in the tag of the frame is
the same as the PVID of the interface. If they are the same, ▫ Tagged frame: checks whether the VID is in the list of permitted ▫ Tagged frame: checks whether the VID is in the list of permitted
permits the frame; otherwise, discards the frame. VLAN IDs. If yes, permits the frame. If not, discards it. VLAN IDs. If yes, permits the frame. If not, discards it.
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. What Is VLAN
2. VLAN Principles
3. VLAN Applications
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLAN Planning
• VLAN assignment rules • Tips for VLAN assignment
▫ By service: voice, video, and data VLANs VLAN IDs can be randomly assigned within the supported range. To improve VLAN
ID continuity, you can associate VLAN IDs with subnets during VLAN assignment.
▫ By department: e.g. VLANs for engineering, marketing, and financing departments
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment
Applicable scenario:
Internet
▫ There are multiple enterprises in a building. These enterprises share network
resources to reduce costs. Networks of the enterprises connect to different
interfaces of the same Layer 2 switch and access the Internet through the same
egress device.
L3 switch
VLAN assignment:
▫ To isolate the services of different enterprises and ensure service security, assign L2 switch
interfaces connected to the enterprises' networks to different VLANs. In this way,
each enterprise has an independent network, and each VLAN works as a virtual work
group.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MAC Address-based VLAN Assignment
Applicable scenario:
Enterprise
▫ The network administrator of an enterprise assigns PCs in the same network
department to the same VLAN. To improve information security, the
GE 0/0/1
enterprise requires that only employees in the specified department be SW1
allowed to access specific network resources.
GE 0/0/3
VLAN assignment:
▫ To meet the preceding requirement, configure MAC address-based VLAN
assignment on SW1, preventing new PCs connected to the network from
accessing the network resources.
PC1 PC2 PC3 PC4
001e-10dd-dd01 001e-10dd-dd02 001e-10dd-dd03 001e-10dd-dd04
VLAN 10
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. What Is VLAN
2. VLAN Principles
3. VLAN Applications
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
This command creates a VLAN and displays the VLAN view. If the VLAN to be created already exists, this command directly displays the VLAN view.
• The value of vlan-id is an integer ranging from 1 to 4094.
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
In the interface view, set the link type of the interface to access.
In the interface view, configure a default VLAN for the interface and add the interface to the VLAN.
• vlan-id: specifies an ID for the default VLAN. The value is an integer ranging from 1 to 4094.
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
In the interface view, set the link type of the interface to trunk.
In the interface view, configure a default VLAN for the trunk interface.
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
In the interface view, set the link type of the interface to hybrid.
In the interface view, add the hybrid interface to specified VLANs in untagged mode.
In the interface view, add the hybrid interface to specified VLANs in tagged mode.
In the interface view, configure a default VLAN for the hybrid interface.
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
Access interface
Trunk interface
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
Creating VLANs
SW1 SW2
GE 0/0/3 GE 0/0/3
PVID 1 PVID 1 Create VLANs.
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
Configure a trunk interface and specify a list of VLAN IDs permitted by the
PC1 PC2 PC3 PC4
interface.
VLAN 10 VLAN 20 VLAN 10 VLAN 20
[SW1] interface GigabitEthernet 0/0/3
[SW1-GigabitEthernet0/0/3] port link-type trunk
[SW1-GigabitEthernet0/0/3] port trunk pvid vlan 1
[SW1-GigabitEthernet0/0/3] port trunk allow-pass vlan 10 20
Note: The configuration on SW2 is similar to that on SW1.
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
[SW1]display vlan
SW1 SW2 The total number of vlans is : 3
GE 0/0/3 GE 0/0/3 -------------------------------------------------------------------------------
PVID 1 PVID 1 U: Up; D: Down; TG: Tagged; UT: Untagged;
MP: Vlan-mapping; ST: Vlan-stacking;
GE 0/0/1 GE 0/0/2 GE 0/0/1 GE 0/0/2 #: ProtocolTransparent-vlan; *: Management-vlan;
PVID 10 PVID 20 PVID 10 PVID 20
-------------------------------------------------------------------------------
VID Type Ports
-------------------------------------------------------------------------------
1 common UT:GE0/0/3(U) ……
10 common UT:GE0/0/1(U)
TG:GE0/0/3(U)
PC1 PC2 PC3 PC4 20 common UT:GE0/0/2(U)
TG:GE0/0/3(U)
VLAN 10 VLAN 20 VLAN 10 VLAN 20
……
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
Networking requirements:
SW1 SW2
GE 0/0/3 GE 0/0/3 ▫ On the network shown in the left figure, the switches (SW1 and SW2) of
PVID 1 PVID 1
an enterprise are connected to multiple PCs, and PCs in different
GE 0/0/1 GE 0/0/2
PVID 10 PVID 20 GE 0/0/1 departments need to access the server of the enterprise. To ensure
PVID 100
communication security, the enterprise requires that PCs in different
departments cannot directly communicate.
Hybrid interface
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
SW1 configuration:
SW1 SW2
GE 0/0/3 GE 0/0/3
PVID 1 PVID 1 [SW1] vlan batch 10 20 100
[SW1] interface GigabitEthernet 0/0/1
GE 0/0/1 GE 0/0/2
PVID 10 PVID 20 GE 0/0/1 [SW1-GigabitEthernet0/0/1] port link-type hybrid
PVID 100
[SW1-GigabitEthernet0/0/1] port hybrid pvid vlan 10
[SW1-GigabitEthernet0/0/1] port hybrid untagged vlan 10 100
[SW1-GigabitEthernet0/0/1] interface GigabitEthernet 0/0/2
[SW1-GigabitEthernet0/0/2] port link-type hybrid
[SW1-GigabitEthernet0/0/2] port hybrid pvid vlan 20
PC1 PC2 Server
[SW1-GigabitEthernet0/0/2] port hybrid untagged vlan 20 100
VLAN 10 VLAN 20 VLAN 100 [SW1-GigabitEthernet0/0/2] interface GigabitEthernet 0/0/3
[SW1-GigabitEthernet0/0/3] port link-type hybrid
[SW1-GigabitEthernet0/0/3] port hybrid tagged vlan 10 20 100
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
SW2 configuration:
SW1 SW2
GE 0/0/3 GE 0/0/3
PVID 1 PVID 1 [SW2] vlan batch 10 20 100
[SW2] interface GigabitEthernet 0/0/1
GE 0/0/1 GE 0/0/2
PVID 10 PVID 20 GE 0/0/1 [SW2-GigabitEthernet0/0/1] port link-type hybrid
PVID 100
[SW2-GigabitEthernet0/0/1] port hybrid pvid vlan 100
[SW2-GigabitEthernet0/0/1] port hybrid untagged vlan 10 20 100
[SW2-GigabitEthernet0/0/1] interface GigabitEthernet 0/0/3
[SW2-GigabitEthernet0/0/3] port link-type hybrid
[SW2-GigabitEthernet0/0/3] port hybrid tagged vlan 10 20 100
PC1 PC2 Server
VLAN 10 VLAN 20 VLAN 100
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
requirement, only the three PCs can access the enterprise network through SW1.
VLAN 10
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
[SW1] vlan 10
[SW1-vlan10] mac-vlan mac-address 001e-10dd-dd01 [SW1-vlan10] mac-vlan mac-
address 001e-10dd-dd02 [SW1-vlan10] mac-vlan mac-address 001e-10dd-dd03 [SW1-
vlan10] quit
PC1 PC2 PC3
001e-10dd-dd01 001e-10dd-dd02 001e-10dd-dd03
VLAN 10
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Interface-based VLAN Assignment MAC Address-based VLAN Assignment
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Multiple) Which of the following statements about the VLAN technology are incorrect? ( )
A. The VLAN technology can isolate a large collision domain into several small collision domains.
B. The VLAN technology can isolate a large Layer 2 broadcast domain into several small Layer 2 broadcast domains.
2. If the PVID of a trunk interface is 5 and the port trunk allow-pass vlan 2 3 command is run on the interface, which VLANs' frames can
be transmitted through the trunk interface?
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
This course describes the VLAN technology, including the functions, identification, assignment, data exchange, planning,
application, and basic configuration of VLANs.
The VLAN technology can divide a physical LAN into multiple broadcast domains so that network devices in the same VLAN
can directly communicate at Layer 2, while devices in different VLANs cannot.
Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
On an Ethernet switching network, redundant links are used to implement link backup and enhance network reliability. However, the use
of redundant links may produce loops, leading to broadcast storms and an unstable MAC address table. As a result, communication on
the network may deteriorate or even be interrupted. To prevent loops, IEEE introduced the Spanning Tree Protocol (STP).
Devices running STP exchange STP Bridge Protocol Data Units (BPDUs) to discover loops on the network and block appropriate ports.
This enables a ring topology to be trimmed into a loop-free tree topology, preventing infinite looping of packets and ensuring packet
processing capabilities of devices.
IEEE introduced the Rapid Spanning Tree Protocol (RSTP) to improve the network convergence speed.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
Upon completion of this course, you will be able to:
Describe the causes and problems of Layer 2 loops on a campus switching network.
Describe basic concepts and working mechanism of STP.
Distinguish STP from RSTP and describe the improvement of RSTP on STP.
Complete basic STP configurations.
Understand other methods to eliminate Layer 2 loops on the switching network except STP.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. STP Overview
5. STP Advancement
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Technical Background: Redundancy and Loops on a Layer 2
Switching Network
A network without redundancy design Layer 2 loops introduced along with redundancy
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Technical Background: Layer 2 Loops Caused by Human Errors
Case 1 Case 2
Layer 2 SW1
loop
Layer 2
loop
SW2
Incorrect operations: For example, connections of cables between devices are Incorrect manual configurations: For example, the network administrator does
incorrect. not bind the link between SW1 and SW2 to a logical link (aggregation link), causing
Layer 2 loops.
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Issues Caused by Layer 2 Loops
Typical Issue 1: Broadcast Storm Typical Issue 2: MAC Address Flapping
3 GE0/0/2
SW1 SW2 SW1 SW2
3
4 4
2 2
SW3 SW3
BUM frame
BUM frame Source MAC address: 5489-98EE-
1 1 788A
When SW3 receives the BUM frames, it floods the frames. After SW1 and SW2 receive SW1 is used as an example. The MAC address of 5489-98EE-788A is frequently switched
the BUM frames, they flood the frames again. As a result, network resources are between GE0/0/1 and GE0/0/2, causing MAC address flapping.
exhausted and the network is unavailable.
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to STP
STP STP
Port blocked
SW3
BPDUs
SW3
STP
When STP is deployed on a network, switches exchange STP BPDUs and calculate a loop-free topology. Finally, one or more ports on the network are blocked to
eliminate loops.
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
STP Can Dynamically Respond to Network Topology Changes
and Adjust Blocked Ports
2
Link fault
1 3
Blocked port Restored port
SW3 SW3
STP running on a switch continuously monitors the network topology. When the network topology changes, STP can detect the changes and automatically
adjust the network topology.
Therefore, STP can solve the Layer 2 loop problem and provide a solution for network redundancy.
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Q&A: Layer 2 and Layer 3 loops
Layer 3 loop Layer 2 loop
• Common root cause: routing loop • Common root cause: Layer 2 redundancy is deployed on the network, or
• Dynamic routing protocols have certain loop prevention capabilities. cables are incorrectly connected.
• The TTL field in the IP packet header can be used to prevent infinite packet • Specific protocols or mechanisms are required to implement Layer 2 loop
forwarding. prevention.
• The Layer 2 frame header does not contain any information to prevent data
frames from being forwarded infinitely.
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Application of STP on a Campus Network
Internet
Layer 3 network
Layer 2 network
Running environment of STP
... ... ...
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
STP Overview
STP is used on a LAN to prevent loops.
Devices running STP exchange information with one another to discover loops on the network, and block certain ports to
eliminate loops.
After running on a network, STP continuously monitors the network status. When the network topology changes, STP can
detect the change and automatically respond to the change. In this way, the network status can adapt to the new topology,
ensuring network reliability.
With the growth in scale of LANs, STP has become an important protocol for a LAN.
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. STP Overview
5. STP Advancement
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
4096.4c1f-aabc-102a 4096.4c1f-aabc-102b
SW1 SW2 Bridge ID (BID)
• As defined in IEEE 802.1D, a BID consists of a 16-bit bridge priority and a bridge MAC
address.
• Each switch running STP has a unique BID.
• The bridge priority occupies the leftmost 16 bits and the MAC address occupies the
SW3 rightmost 48 bits.
4096.4c1f-aabc-102c • On an STP network, the device with the smallest BID acts as the root bridge.
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
4096.4c1f-aabc-102a 4096.4c1f-aabc-102b
• One of the main functions of STP is to calculate a loop-free STP tree on the entire
SW1 SW2 switching network.
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
Cost = 500
SW1 SW2 Cost
Cost = 500
Cost = 20000 Cost = 20000
• Each STP-enabled port maintains a cost. The cost of a port is used to calculate
the root path cost (RPC), that is, the cost of the path to the root.
• The default cost of a port is related to the rate, working mode, and STP cost
Cost = 20000 Cost = 20000 calculation method used by a switch.
• A higher port bandwidth indicates a smaller cost.
SW3
• You can also run commands to adjust the cost of a port as required.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
The cost has a default value and is associated with the port rate. When the device uses different algorithms, the same port rate corresponds to different cost
values.
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
RPC=500+20000
RPC
Root bridge
Cost=500 Cost=500
SW1 1 SW2 • The cost from a switch port to the root bridge, that is, RPC, is important during
Cost=20000 Cost=20000 STP topology calculation.
• The RPC from a port to the root bridge is the sum of costs of all inbound ports
along the path from the root bridge to the device.
• In this example, the RPC for SW3 to reach the root bridge through GE0/0/1 is
Cost=20000 Cost=20000 equal to the cost of port 1 plus the cost of port 2.
2
SW3
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
SW1 SW2
• BPDU is the basis for STP to work normally.
• STP-enabled switches exchange BPDUs that carry important information.
• There are two types of BPDUs:
Configuration BPDU
Topology Change Notification (TCN) BPDU
• Configuration BPDUs are the key to STP topology calculation. TCN BPDUs are
SW3 triggered only when the network topology changes.
Configuration BPDU
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
Field The core of STP is to calculate a loop-free topology on a switching network. During topology calculation, the comparison of
Protocol Identifier configuration BPDUs is important. The Root Identifier, Root Path Cost, Bridge Identifier, and Port Identifier fields are the main fields
Protocol Version Identifier of a configuration BPDU. STP-enabled switches compare the four fields.
BPDU Type STP selects the optimal configuration BPDU in the following sequence:
Flags 1. Smallest BID of the root bridge
Root Identifier 2. Smallest RPC
Root Path Cost
3. Smallest BID of the network bridge
Bridge Identifier
4. Smallest PID
Port Identifier
Message Age
Max Age
Among the four rules (each rule corresponds to a field in a configuration BPDU), the first rule is used to elect the root bridge on
Hello Time
the network, and the following rules are used to elect the root port and designated port.
Forward Delay
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
BID Root Bridge Cost RPC PID BPDU
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Select Root Bridge Select Root Port Select Designated Port Block Non-designated Port
SW1 SW2
Root bridge
• After STP starts to work on a switching network, each switch sends
configuration BPDUs to the network. The configuration BPDU contains the BID
of a switch.
• The switch with the smallest bridge ID becomes the root bridge.
• Only one root bridge exists on a contiguous STP switching network.
• The role of the root bridge can be preempted.
4096.4c1f-aabc-102c
• To ensure the stability of the switching network, you are advised to plan the
SW3 STP network in advance and set the bridge priority of the switch that is
Configuration BPDU planned as the root bridge to the minimum value 0.
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Select Root Bridge Select Root Port Select Designated Port Block Non-designated Port
4096.4c1f-aabc-102a 4096.4c1f-aabc-102b
Select a Root Port on Each Non-root Bridge
SW1 R SW2
• Each non-root bridge selects a root port from its ports.
• A non-root bridge has only one root port.
• When a non-root-bridge switch has multiple ports connected to the network, the
root port receives the optimal configuration BPDU.
• The root port is located on each non-root bridge and has the shortest distance
R
4096.4c1f-aabc-102c away from the root bridge.
SW3
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Select Root Bridge Select Root Port Select Designated Port Block Non-designated Port
4096.4c1f-aabc-102a 4096.4c1f-aabc-102b
A designated port is elected on each link.
SW1 D R SW2
D D
• After the root port is elected, the non-root bridge uses the optimal BPDU received
on the port to calculate the configuration BPDU and compares the calculated
configuration BPDU with the configuration BPDUs received by all ports except the
root port.
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Select Root Bridge Select Root Port Select Designated Port Block Non-designated Port
R Blocked port
SW3
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz 1: Identify the Root Bridge and Port Roles
SW1 4096.4c1f-aabc-0001
GE0/0/0 GE0/0/1
GE0/0/1 GE0/0/1
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz 2: Identify the Root Bridge and Port Roles in the Following
Topology
SW1 4096.4c1f-aabc-0001
GE0/0/0 GE0/0/1
GE0/0/1 GE0/0/2
GE0/0/2 GE0/0/1
GE0/0/1 GE0/0/2
SW4 4096.4c1f-aabc-0004
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz 3: Identify the Root Bridge and Port Roles in the Following
Topology
GE0/0/1 GE0/0/1
4096.4c1f-aabc-0001 4096.4c1f-aabc-0002
GE0/0/2 GE0/0/2
SW1 SW2
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
STP Port States
Disabled The port cannot send or receive BPDUs or service data frames. That is, the port is Down.
The port is blocked by STP. A blocked port cannot send BPDUs but listens to BPDUs. In addition, the blocked port cannot send or receive service
Blocking
data frames or learn MAC addresses.
STP considers the port in Listening state as the root port or designated port, but the port is still in the STP calculation process. In this case,
Listening
the port can send and receive BPDUs but cannot send or receive service data frames or learn MAC addresses.
A port in Learning state listens to service data frames but cannot forward them. After receiving service data frames, the port learns MAC
Learning
addresses.
A port in Forwarding state can send and receive service data frames and process BPDUs. Only the root port or designated port can enter the
Forwarding
Forwarding state.
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
STP Port State Transition
Disabled or Down
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Topology Change: Root Bridge Fault
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Topology Change: Direct Link Fault
SW1 SW2
A
On a stable network, when SW2 detects that the link of the root port is faulty, the
alternate port of SW2 enters the Forwarding state after twice the value of the
Forward Delay timer (the default value is 15s).
• After SW2 detects a fault on the direct link, it switches the alternate port to the
root port.
A
• If a direct link fails, the alternate port restores to the Forwarding state after 30s.
SW3
4096.4c1f-aabc-102c
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Topology Change: Indirect Link Fault
When the indirect link fails, the alternate port on SW3 restores to the Forwarding state. It takes about 50s to recover from
an indirect link failure.
A R
SW3 SW3
4096.4c1f-aabc-102c 4096.4c1f-aabc-102c
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
The MAC Address Table Is Incorrect Because the Topology
Changes
SW1
MAC address table
00-05-06-07-08-AA GE0/0/1
00-05-06-07-08-BB GE0/0/3
GE0/0/3 GE0/0/1
SW2 A SW3
As shown in the figure, the root port of SW3 is faulty, causing the spanning GE0/0/2 GE0/0/2
tree topology to re-converge. After the spanning tree topology re-converges,
GE0/0/1 GE0/0/3
Host B cannot receive frames sent by Host A. This is because switches
forward data frames based on the MAC address table. By default, the aging
time of MAC address entries is 300s. How is forwarding restored rapidly?
Host A Host B
00-05-06-07-08-AA 00-05-06-07-08-BB
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
The MAC Address Table Is Incorrect Because the Topology
Changes
SW1
MAC address table
00-05-06-07-08-AA GE0/0/3
00-05-06-07-08-BB GE0/0/1
00-05-06-07-08-BB GE0/0/2
1. TCN
GE0/0/3 GE0/0/1
SW2 A SW3
GE0/0/2 GE0/0/2
• TCN BPDUs are generated when the network topology 2. TCA
GE0/0/1 GE0/0/3
changes. 5. TC
• Packet format: protocol identifier, version number,
and type Host A Host B
• Topology change: The TCA and TC bits in the Flags 00-05-06-07-08-AA 00-05-06-07-08-BB
field of configuration BPDUs are used.
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. STP Overview
5. STP Advancement
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic STP Configuration Commands (1)
1. Configure a working mode.
The switch supports three working modes: STP, RSTP, and Multiple Spanning Tree Protocol (MSTP). By default, a switch works in MSTP mode. On a ring network
running only STP, the working mode of a switch is configured as STP; on a ring network running RSTP, the working mode of a switch is configured as RSTP.
Configure the switch as the root bridge. By default, a switch does not function as the root bridge of any spanning tree. After you run this command, the priority
value of the switch is set to 0 and cannot be changed.
Configure the switch as the secondary root bridge. By default, a switch does not function as the secondary root bridge of any spanning tree. After you run
this command, the priority value of the switch is set to 4096 and cannot be changed.
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic STP Configuration Commands (2)
1. (Optional) Configure the STP priority of a switch.
Configure a path cost calculation method. By default, the IEEE 802.1t standard (dot1t) is used to calculate path costs.
All switches on a network must use the same path cost calculation method.
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic STP Configuration Commands (3)
1. (Optional) Configure a priority for a port.
Configure a priority for a port. By default, the priority of a switch port is 128.
Enable STP, RSTP, or MSTP on a switch. By default, STP, RSTP, or MSTP is enabled on a switch.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case 1: Basic STP Configurations
SW1 configuration:
SW2 configuration:
SW3 configuration:
• Deploy STP on the three switches to eliminate Layer 2 loops on the
network. [SW3] stp mode stp
• Configure SW1 as the root bridge and block GE0/0/22 on SW3. [SW3] stp enable
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case 1: Basic STP Configurations
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. STP Overview
5. STP Advancement
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Disadvantages of STP
STP ensures a loop-free network but is slow to converge, leading to service quality deterioration. If the network topology changes frequently, connections on the STP
network are frequently torn down, causing frequent service interruption.
STP does not differentiate between port roles according to their states, making it difficult for less experienced administrators to learn about and deploy this protocol.
Ports in Listening, Learning, and Blocking states are the same for users because none of these ports forwards service traffic.
In terms of port use and configuration, the essential differences between ports lie in the port roles but not port states.
Both root and designated ports can be in Listening state or Forwarding state, so the port roles cannot be differentiated according to their states.
The STP algorithm does not determine topology changes until the timer expires, delaying network convergence.
The STP algorithm requires the root bridge to send configuration BPDUs after the network topology becomes stable, and other devices process and spread the
configuration BPDUs through the entire network. This also delays convergence.
Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
RSTP Overview
RSTP defined in IEEE 802.1w is an enhancement to STP. RSTP optimizes STP in many aspects, provides faster convergence,
and is compatible with STP.
RSTP introduces new port roles. When the root port fails, the switch can enable the alternate port to obtain an alternate
path from the designated bridge to the root bridge. RSTP defines three states for a port based on whether the port
forwards user traffic and learns MAC addresses. In addition, RSTP introduces the edge port. The port connecting a switch
to a terminal is configured as an edge port that enters the Forwarding state immediately after initialization, thus improving
the working efficiency.
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Improvements Made in RSTP
RSTP processes configuration BPDUs differently from STP.
When the topology becomes stable, the mode of sending configuration BPDUs is optimized.
RSTP uses a shorter timeout interval of BPDUs.
RSTP optimizes the method of processing inferior BPDUs.
RSTP changes the configuration BPDU format and uses the Flags field to describe port roles.
RSTP topology change processing: Compared with STP, RSTP is optimized to accelerate the response to topology changes.
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Port Roles in RSTP
RSTP adds port roles to help understand RSTP and simplify RSTP deployment.
D D D D
R R R R
SW2 SW3 SW2 SW3
D A D B A
RSTP defines four port roles: root port, designated port, alternate port, and backup port.
Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Edge Port
An edge port is located at the edge of a region and does not connect to any switching device.
D D
R R E
SW2
SW3
Generally, an edge port is directly connected to a user terminal. The edge port can transition from the Disabled state to the Forwarding state.
Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Port States in RSTP
RSTP deletes two port states defined in STP, reducing the number of port states to three.
If the port does not forward user traffic or learn MAC addresses, it is in Discarding state.
If the port does not forward user traffic but learns MAC addresses, it is in Learning state.
If the port forwards user traffic and learns MAC addresses, it is in Forwarding state.
Page 49 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. STP Overview
5. STP Advancement
Page 50 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Defects of STP/RSTP: All VLANs Share One Spanning Tree
RSTP, an enhancement to STP, allows for fast network topology convergence.
STP and RSTP both have a defect: All VLANs on a LAN share one spanning tree. As a result, inter-VLAN load balancing cannot be performed, and blocked
links cannot transmit any traffic, which may lead to VLAN packet transmission failures.
SW1 SW2
SW3
Data from all VLANs
Blocked port
VLAN 1, 2, 3…
Page 51 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VBST
Huawei provides the VLAN-based Spanning Tree (VBST). VBST constructs a spanning tree in each VLAN so that traffic from
different VLANs is load balanced along different spanning trees.
SW1 SW2
Page 52 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MSTP
To fix the defects, the IEEE released the 802.1s standard that defines the Multiple Spanning Tree Protocol (MSTP) in 2002.
MSTP is compatible with STP and RSTP, and can rapidly converge traffic and provides multiple paths to load balance VLAN traffic.
• MSTP maps VLANs to an MSTI. Multiple VLANs can share one spanning tree. For example:
Data in an even-numbered VLAN • Even-numbered VLANs are mapped to MSTI 1.
SW3 • Odd-numbered VLANs are mapped to MSTI 2.
Data in an odd-numbered VLAN
• Only two spanning trees are maintained on the network.
Blocked port in MSTI 1
Page 53 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MSTP Overview
MSTP divides a switching network into multiple regions, each of which has multiple spanning trees that are independent of each other.
Each spanning tree is called a multiple spanning tree instance (MSTI).
An MSTI is the spanning tree corresponding to a set of VLANs.
Binding multiple VLANs to a single MSTI reduces communication costs and resource usage.
The topology of each MSTI is calculated independently, and traffic can be balanced among MSTIs.
Multiple VLANs with the same topology can be mapped to a single MSTI. The forwarding state of the VLANs for an interface is
determined by the interface state in the MSTI.
Page 54 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Stack and Tree Networking of Campus Networks
Traditional STP Networking iStack Networking
Two aggregation switches form a triangle Layer 2 loop with access switches, so STP Aggregation switches are stacked to form a single logical device, simplifying the network
must be deployed on the network. However, STP blocks ports on the network, causing a topology. In addition, link aggregation is deployed between aggregation switches and
failure to fully utilize link bandwidth. access switches to simplify the network topology to a tree topology, eliminating Layer 2
loops and improving link bandwidth utilization.
Page 55 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Smart Link
FW1 FW2
Page 56 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Single Choice) Which statement about the STP port state is false? ()
A. The blocked port does not listen to or send BPDUs.
B. A port in Learning state learns MAC addresses but does not forward data.
D. If a blocked port does not receive BPDUs within a specified period, the port automatically switches to the Listening state.
Page 57 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
STP prevents loops on a LAN. Devices running STP exchange information with one another to discover loops on the network, and block certain ports to
eliminate loops. With the growth in scale of LANs, STP has become an important protocol for a LAN.
After STP is configured on an Ethernet switching network, the protocol calculates the network topology to implement the following functions:
Loop prevention: The spanning tree protocol blocks redundant links to prevent potential loops on the network.
Link redundancy: If an active link fails and a redundant link exists, the spanning tree protocol activates the redundant link to ensure network connectivity.
STP cannot meet requirements of modern campus networks. However, understanding the working mechanism of STP helps you better understand the
working mechanism and deployment of RSTP and MSTP.
Page 58 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 59 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
By default, a Layer 2 switching network is a broadcast domain, which brings many problems. Virtual local area network
(VLAN) technology isolates such broadcast domains, preventing users in different VLANs from communicating with each
other. However, such users sometimes need to communicate.
This course describes how to implement inter-VLAN communication.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to understand:
Methods of implementing inter-VLAN communication.
How to use routers (physical interfaces or sub-interfaces) to implement inter-VLAN communication.
How to use Layer 3 switches to implement inter-VLAN communication.
How Layer 3 packets are forwarded.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Background
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Inter-VLAN Communication (1)
In real-world network deployments, different IP address segments are assigned to different VLANs.
PCs on the same network segment in the same VLAN can directly communicate with each other without the need for Layer 3 forwarding devices. This communication
mode is called Layer 2 communication.
Inter-VLAN communication belongs to Layer 3 communication, which requires Layer 3 devices.
Layer 2 switch
VLAN 10 VLAN 20
192.168.10.0/24 192.168.20.0/24
Layer 3 communication
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Inter-VLAN Communication (2)
Common Layer 3 devices: routers, Layer 3 switches, firewalls, etc.
Inter-VLAN communication is implemented by connecting a Layer 2 switch to a Layer 3 interface of a Layer 3 device. The
communication packets are routed by the Layer 3 device.
3
3
2 Layer 2 interface
Router 2
3 Layer 3 interface 2
Layer 2 switch 2
2
2 2
VLAN 10 VLAN 20
192.168.10.0/24 192.168.20.0/24
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Background
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Using Physical Interfaces Using Sub-interfaces
VLAN 10 VLAN 20
PC1 PC2
192.168.10.2/24 192.168.20.2/24
Default gateway: 192.168.10.254 Default gateway: 192.168.20.254
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Using Physical Interfaces Using Sub-interfaces
PC1 PC2
192.168.10.2/24 192.168.20.2/24
Default gateway: 192.168.10.254 Default gateway: 192.168.20.254
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Using Physical Interfaces Using Sub-interfaces
Sub-Interface Processing
The interface connecting the switch to the router is set to a trunk interface. The router forwards the received packets to the corresponding sub-
interfaces according to the VLAN tags in the packets.
GE 0/0/1 R1 GE 0/0/1.10
R1 GE 0/0/1
GE 0/0/1.20
VLAN 10
SW1
VLAN 20
• Based on the VLAN ID carried in a packet, the device
forwards the packet to the corresponding sub-
Trunk interface (for example, GE 0/0/1.10) for processing.
GE 0/0/1 GE 0/0/24 GE 0/0/2 • Through sub-interfaces, the device can implement
inter-VLAN communication at Layer 3.
Trunk
GE 0/0/24
SW1
192.168.10.2/24 192.168.20.2/24
Default gateway: Default gateway: 192.168.20.254
192.168.10.254
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Using Physical Interfaces Using Sub-interfaces
[R1]interface GigabitEthernet0/0/1.10
[R1-GigabitEthernet0/0/1.10]dot1q termination vid 10
[R1-GigabitEthernet0/0/1.10]ip address 192.168.10.254 24
R1 [R1-GigabitEthernet0/0/1.10]arp broadcast enable
Trunk
GE0/0/24 [R1]interface GigabitEthernet0/0/1.20
[R1-GigabitEthernet0/0/1.20]dot1q termination vid 20
SW1 [R1-GigabitEthernet0/0/1.20]ip address 192.168.20.254 24
[R1-GigabitEthernet0/0/1.20]arp broadcast enable
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Background
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Layer 3 Switch and VLANIF Interfaces
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring VLANIF Interfaces
Basic configurations:
• VLANIF 10 192.168.10.254/24
• VLANIF 20 192.168.20.254/24 [SW1]vlan batch 10 20
[SW1] interface GigabitEthernet 0/0/1
[SW1-GigabitEthernet0/0/1] port link-type access
SW1
[SW1-GigabitEthernet0/0/1] port default vlan 10
GE 0/0/1 GE 0/0/2
[SW1] interface GigabitEthernet 0/0/2
[SW1-GigabitEthernet0/0/2] port link-type access
[SW1-GigabitEthernet0/0/2] port default vlan 20
VLAN 10 VLAN 20
PC1 PC2
192.168.10.2/24 192.168.20.2/24 Configure VLANIF interfaces:
Default gateway: 192.168.10.254 Default gateway: 192.168.20.254
[SW1]interface Vlanif 10
[SW1-Vlanif10]ip address 192.168.10.254 24
• Configuration Requirements
[SW1]interface Vlanif 20
Configure VLANs 10 and 20 for the interfaces connecting to PC1 and PC2, respectively.
[SW1-Vlanif20]ip address 192.168.20.254 24
Configure the Layer 3 switch to allow the two PCs to communicate with each other.
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLANIF Forwarding Process (1)
VLAN 10 VLAN 20
Switching device PC2 is not on its network segment. PC1 then determines that
module
Layer 3 communication is required and sends the traffic destined for
PC2 to its gateway. Data frame sent by PC1: source MAC = MAC1,
1
Access interface destination MAC = MAC2
PC1 PC2
IP: 192.168.10.2/24 IP: 192.168.20.2/24
Default gateway: 192.168.10.254 Default gateway: 192.168.20.254
MAC: MAC1 MAC: MAC3
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLANIF Forwarding Process (2)
2
3. The routing module finds that the destination IP address is 192.168.20.2,
Switching
VLAN 10 VLAN 20 which is not the IP address of its local interface, and determines that
module
this packet needs to be forwarded at Layer 3. By searching the routing
table, the routing module finds a matching route – the direct route
Access interface generated by VLANIF 20 – for this packet.
PC1 PC2
IP: 192.168.10.2/24 IP: 192.168.20.2/24
Default gateway: 192.168.10.254 Default gateway: 192.168.20.254
MAC: MAC1 MAC: MAC3
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VLANIF Forwarding Process (3)
4 5. The switching module searches its MAC address table to determine the
Switching
VLAN 10 VLAN 20 outbound interface of the frame and whether the frame needs to carry a
module
VLAN tag. Data frame sent by the switching module: source MAC = MAC2,
5 destination MAC = MAC3, VLAN tag = None
Access interface
PC1 PC2
IP: 192.168.10.2/24 IP: 192.168.20.2/24
Default gateway: 192.168.10.254 Default gateway: 192.168.20.254
MAC: MAC1 MAC: MAC3
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Background
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Topology Logical Connection Communication Process
Network Topology
VLAN 10
PC1
IP: 192.168.10.2/24 R1
Default gateway: 192.168.10.254
SW1 SW2 NAT
GE 0/0/1
ISP
GE 0/0/24 GE 0/0/2 GE 0/0/0 1.2.3.4
Server
2.3.4.5
VLAN 20
• VLANIF 10: 192.168.10.254 24
PC2
IP: 192.168.20.2/24 • VLANIF 20: 192.168.20.254 24
Default gateway: 192.168.20.254
• VLANIF 30: 192.168.30.1 24
This topology is used as an example to describe the communication process from PC1 in VLAN 10 to the server (2.3.4.5) on the Internet.
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Topology Logical Connection Communication Process
Logical Connection
Logical Connection
Routing
• Configure a default route on SW2 to
VLANIF 10 VLANIF 20 VLANIF 30 module allow intranet users to access the
Internet.
SW2 Switching R1
module NAT
VLAN 30
Internet
Access interface
Trunk interface
VLAN 10 VLAN 20 SW1
• On R1, configure static routes to the user network
Trunk segments of VLAN 10 and VLAN 20.
GE 0/0/1 GE 0/0/24 GE 0/0/2 • To enable intranet PCs using private IP addresses
to access the Internet, configure Network Address
and Port Translation (NAPT) on R1.
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Topology Logical Connection Communication Process
VLANIF 30
IP: 192.168.30.1/24
IP: 192.168.10.2/24 MAC: MAC2
Default gateway: 192.168.10.254
MAC: MAC1 R1
SW1 SW2 NAT
GE 0/0/1 GE 0/0/1
ISP
GE 0/0/24 GE 0/0/2 GE 0/0/0 1.2.3.4
VLAN 10 192.168.30.2 Server
MAC: MAC3 2.3.4.5
Source MAC: MAC1
PC Processing Destination MAC: MAC2
Before sending a packet to 2.3.4.5, the PC VLAN tag: None
sends the packet to its gateway after
determining that the destination IP address Source IP: 192.168.10.2
is not on its network segment. Destination IP: 2.3.4.5
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Topology Logical Connection Communication Process
VLANIF 30
IP: 192.168.30.1/24
IP: 192.168.10.2/24 MAC: MAC2
Default gateway: 192.168.10.254
MAC: MAC1 R1
SW1 SW2 NAT
GE 0/0/1 GE 0/0/1
ISP
GE 0/0/24 GE 0/0/2 GE 0/0/0 1.2.3.4
VLAN 10 192.168.30.2 Server
MAC: MAC3 2.3.4.5
MAC Address VLAN Interface
MAC1 10 GE 0/0/1
Source MAC: MAC1
MAC2 10 GE 0/0/24
Destination MAC: MAC2
SW1 Processing VLAN tag: 10
After receiving the frame, SW1 searches the MAC address Source IP: 192.168.10.2
table for the destination MAC address and forwards the frame. Destination IP: 2.3.4.5
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Topology Logical Connection Communication Process
VLANIF 30
IP: 192.168.30.1/24
IP: 192.168.10.2/24 MAC: MAC2
Default gateway: 192.168.10.254
MAC: MAC1 R1
SW1 SW2 NAT
GE 0/0/1 GE 0/0/1
ISP
GE 0/0/24 GE 0/0/2 GE 0/0/0 1.2.3.4
VLAN 10 192.168.30.2 Server
Operational data of a routing MAC: MAC3 2.3.4.5
Destination Network Next Hop Outbound Interface
table.
0.0.0.0/0 192.168.30.2 Vlanif30
SW2 Processing
After SW2 receives the frame, it finds that the destination MAC address is the MAC address of its VLANIF 10 and sends the
frame to the routing module, which then searches the routing table for a route matching the destination IP address 2.3.4.5.
After finding that the matching route is a default route, the outbound interface is VLANIF 30, and the next hop is 192.168.30.2,
SW2 searches its ARP table to obtain the MAC address corresponding to 192.168.30.2.
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Topology Logical Connection Communication Process
VLANIF 30
IP: 192.168.30.1/24
IP: 192.168.10.2/24 MAC: MAC2
Default gateway: 192.168.10.254
MAC: MAC1 R1
SW1 SW2 NAT
GE 0/0/1 GE 0/0/1
ISP
GE 0/0/24 GE 0/0/2 GE 0/0/0 1.2.3.4
VLAN 10 192.168.30.2 Server
MAC: MAC3 2.3.4.5
ARP entry Destination Network MAC Outbound Interface
192.168.30.2 MAC3 GE 0/0/2 Source MAC: MAC2
Destination MAC: MAC3
SW2 Processing
VLAN tag: None
After finding the MAC address corresponding to 192.168.30.2, SW2 replaces the source MAC
address of the packet with the MAC address of VLANIF 30, and forwards the packet to the Source IP: 192.168.10.2
switching module. The switching module searches the MAC address table for the outbound
interface and determines whether the packet carries a VLAN tag.
Destination IP: 2.3.4.5
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Topology Logical Connection Communication Process
VLANIF 30
IP: 192.168.30.1/24
IP: 192.168.10.2/24 MAC: MAC2
Default gateway: 192.168.10.254
MAC: MAC1 R1
SW1 SW2 NAT
GE 0/0/1 GE 0/0/1
ISP
GE 0/0/24 GE 0/0/2 GE 0/0/0 1.2.3.4
VLAN 10 192.168.30.2 Server
MAC: MAC3 2.3.4.5
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. When a sub-interface is used to implement inter-VLAN communication, how does the switch interface connected to the router need to
be configured?
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
This course describes three methods of implementing inter-VLAN communication: through physical interfaces, sub-
interfaces, and VLANIF interfaces.
It also elaborates the Layer 3 communication process, and device processing mechanism and packet header changes
during the communication.
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
More Information
Comparison between Layer 2 and Layer 3 interfaces
After a Layer 3 interface receives a data frame, if the destination MAC address of the data frame is the same as the
After a Layer 2 interface receives a data frame, it searches its MAC address table for the
local MAC address, it decapsulates the data frame and looks up the destination IP address of the data packet in the
destination MAC address of the frame. If a matching MAC address entry is found, it forwards the
routing table. If a matching route is found, it forwards the data frame according to the instruction of the route. If no
frame according to the entry. If no matching MAC address entry is found, it floods the frame.
matching route is found, it discards the packet.
Layer 3 interfaces isolate broadcast domains. They directly terminate received broadcast frames instead of flooding
Layer 2 interfaces do not isolate broadcast domains. They flood received broadcast frames.
them.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
• As services develop and the campus network scale expands, users have increasingly
demanding requirements on network bandwidth and reliability. Traditional solutions
improve network bandwidth by upgrading devices and implement high reliability by
deploying redundant links and using the Spanning Tree Protocol (STP), leading to low
flexibility, time-consuming troubleshooting, and complex configuration.
• This chapter describes how to use Eth-Trunk, intelligent stack (iStack), and cluster
switch system (CSS) technologies to improve network bandwidth and reliability.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
▫ Understand the functions of link aggregation.
▫ Understand the link aggregation negotiation process in Link Aggregation Control Protocol
(LACP) mode.
▫ Understand the common applications and networking of link aggregation and stacking
technologies.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Reliability Requirements
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Reliability
• Network reliability refers to the capability of ensuring nonstop network services when a
single point or multiple points of failure occur on a device or link.
• Network reliability can be implemented at the card, device, and link levels.
Highly reliable network
iStack
Link Link
Network A aggregation aggregation Network B
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Card Reliability (1)
• A modular switch consists of a chassis, power modules, fan modules, main
processing units (MPUs), switch fabric units (SFUs), and line processing units
MPU (LPUs).
• Chassis: provides slots for various cards and modules to implement inter-card
LPU
communication.
LPU • MPU: responsible for the control plane and management plane of the entire
system.
• SFU: responsible for the data plane of the entire system. The data plane
Mounting
provides high-speed non-blocking data channels for data switching between
bracket
service modules.
Power module
• LPU: provides data forwarding functions on a physical device and provides
Front view of the
S12700E-8 chassis optical and electrical interfaces of different rates.
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Card Reliability (2)
The failure of a single
MPU does not affect the • For example, the S12700E-8 provides eight
normal operation of the
control platform. LPU slots, four SFU slots, two MPU slots,
MPU
six power module slots, and four fan
LPU If some SFUs
are faulty, the
module slots.
data plane can
still forward • A modular switch can be configured with
SFU data properly.
multiple MPUs and SFUs to ensure device
reliability. If an SFU or MPU in a single slot
LPU
is faulty, the switch can still run properly.
If the LPU is
faulty, the • After an LPU of a modular switch is
interfaces on the
LPU are affected. damaged, interfaces on the LPU cannot
forward data.
Front view of the
S12700E-8 chassis
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Device Reliability
No backup Master/Backup mode
R Root port
Network Network
A Alternative port
If the aggregation
switch is faulty, traffic
from the downstream When the root
Aggregation switch cannot be Aggregation
port fails, the
switch forwarded. switch
alternative port
continues to
R A
forward packets.
Access Access STP
switch switch
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Link Reliability
STP STP
To improve link
Aggregation Aggregation reliability, a new link
switch switch will be added. This
link is blocked by
STP and functions as
a backup link.
Access Access
switch switch
• To ensure link reliability, deploy multiple physical links between devices. To prevent loops, configure STP to
ensure that traffic is forwarded on only one link, and other links function as backup links.
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Reliability Requirements
▫ Manual Mode
▫ LACP Mode
▫ Configuration Example
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Increasing Link Bandwidth
• When multiple links exist between devices, traffic is forwarded on only one link due to
STP. In this case, the inter-device link bandwidth remains unchanged.
F Interface that
forwards traffic
B Interface blocked due to STP
SW1 SW2
F F
STP
root F B
bridge F B
F B
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Eth-Trunk
• Ethernet link aggregation, also called Eth-Trunk, bundles multiple physical links into a
logical link to increase link bandwidth, without having to upgrade hardware.
SW1 SW2
F F
F F
F F
F F
Eth-Trunk
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of Eth-Trunk
• A link aggregation group (LAG) is a logical link formed by bundling
several links. Each LAG has one logical interface, known as an LAG
interface or Eth-Trunk interface.
Eth-Trunk interface
SW1 • Member interface and member link: Physical interfaces that constitute
S S U U an Eth-Trunk interface are called member interfaces, and the link
corresponding to a member interface is known as a member link.
Member
• Active interface and active link: An active interface is also called a
link
Member selected interface and is a member interface that participates in data
interface forwarding. The link corresponding to an active interface is called an
active link.
LAG
• Inactive interface and inactive link: An inactive interface is also called
an unselected interface and is a member interface that does not
S S U U participate in data forwarding. A link corresponding to an inactive
SW2 interface is referred to as an inactive link.
Eth-Trunk interface
• Link aggregation mode: Based on whether the Link Aggregation
Control Protocol (LACP) is enabled, link aggregation can be classified
into manual mode and LACP mode.
S Active interface • Other concepts: upper and lower thresholds for the number of active
U Inactive interface interfaces
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Reliability Requirements
▪ Manual Mode
▫ LACP Mode
▫ Configuration Example
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Manual Mode
S Active interface
SW1 SW2
S S
S S
S S
S S
Eth-Trunk
• Manual mode: An Eth-Trunk is manually created, and its member interfaces are manually configured. LACP is not used
for negotiation between the two systems.
• In most cases, all links are active links. In this mode, all active links forward data and evenly share traffic. If an active link
is faulty, the LAG automatically evenly shares traffic among the remaining active links.
• If one of the devices at both ends of an LAG does not support LACP, you can use the manual mode.
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Defects of the Manual Mode (1)
S Active interface
SW1 SW2
S S
Eth-Trunk
Eth-Trunk
interface
interface
S S
S S
S
Eth-Trunk in
manual mode
SW3
• To ensure that the Eth-Trunk works properly, ensure that the peer interfaces of all member interfaces in the Eth-Trunk
meet the following requirements:
▫ The peer interfaces reside on the same device.
▫ The peer interfaces are added to the same Eth-Trunk.
• In manual mode, devices do not exchange packets. Therefore, the configuration needs to be manually confirmed.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Defects of the Manual Mode (2)
S Active interface
F Faulty interface
SW1 SW2
S S
S S
S S
S F
Eth-Trunk
Interface in Up state
but failing to forward
packets
• In manual mode, the device can determine whether the peer interface is working properly based only on
the physical layer status.
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Reliability Requirements
▫ Manual Mode
▪ LACP Mode
▫ Configuration Example
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
LACPDU
LACPDU
SW1 SW2
S S
Eth-Trunk in LACP mode
Eth-Trunk
Eth-Trunk
interface
interface
S S
S S
S S
LACPDU
Device priority
MAC address
Interface priority
Interface number
...
• LACP mode: A link aggregation mode that uses the LACP protocol. Devices exchange Link Aggregation Control Protocol
Data Units (LACPDUs) to ensure that the peer interfaces are member interfaces that belong to the same Eth-Trunk and
are on the same device.
• An LACPDU contains the device priority, MAC address, interface priority, and interface number.
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
System Priority
• In LACP mode, the number of active interfaces selected by devices at both ends must be consistent;
otherwise, the Eth-Trunk cannot be set up. In this case, configure one end as the Actor. Then the other end
selects active interfaces according to the Actor.
• The Actor is determined based on the LACP system priority. A smaller value indicates a higher priority.
SW1 Eth-Trunk in LACP mode SW2
S S
Eth-Trunk
Eth-Trunk
interface
interface
S S
S S
S S
LACPDU
S Active interface Device priority By default, the LACP system priority is 32768. A
smaller value indicates a higher priority.
LACPDU MAC address
Generally, the default value is used. When the
Interface priority
priorities are the same, LACP selects the Actor
Interface number by comparing the MAC addresses. A smaller
... MAC address indicates a higher priority.
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
Interface Priority
• After the Actor is selected, both devices select active interfaces based on the interface priorities of the
Actor. A smaller LACP interface priority value indicates a higher priority.
Eth-Trunk
interface
interface
S S
S S
S S
LACPDU
By default, the LACP interface priority of an
S Active interface Device priority interface is 32768. A smaller value indicates a
MAC address higher priority. Generally, the default value is
LACPDU
Interface priority used. When the priorities are the same, LACP
Interface number selects active interfaces based on interface
numbers. A smaller interface number indicates a
...
higher priority.
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number Active Link
Load Balancing
Introduction of Active Interfaces Election
Eth-Trunk
interface
interface
2 2
3 3
4 4
Active interface
Inactive interface
Active link
Inactive link
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number Active Link
Load Balancing
Introduction of Active Interfaces Election
Eth-Trunk
Eth-Trunk
interface
interface
2 2
3 3
4 4
Active interface
Inactive interface
Active link
Inactive link
Faulty link
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
Active interface
Inactive interface
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
2 2
3 3
• SW1 notifies the peer end of the elected active interfaces
4 4 through LACPDUs.
LACPDU
Active interface
Inactive interface
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
LACPDU
Active interface
Inactive interface
Active link
Inactive link
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
Load Balancing
Per-packet load balancing Per-flow load balancing
S Active interface S Active interface
When an Eth-Trunk is used to forward data, there are Load balancing based on flows is recommended for an
multiple physical links between devices at both ends of the Eth-Trunk. In this mode, a flow is load balanced to the
Eth-Trunk. If data frames are forwarded on different links, same link. This ensures that frames of the same flow are
data frames may arrive at the peer end in a different order transmitted over the same physical link and implements
in which they were transmitted, resulting in out-of-order load balancing among physical links in an Eth-Trunk.
packets.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Packet Maximum Number of Active Link
Load Balancing
Introduction Active Interfaces Election
S S S S
S S S S
Same source and destination S S Same source and S S
MAC addresses but different destination MAC addresses
source and destination IP Eth-Trunk but different source and Eth-Trunk
addresses destination IP addresses
Source and destination Source and destination
IP address mode MAC address mode
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Reliability Requirements
▫ Manual Mode
▫ LACP Mode
▫ Configuration Example
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Typical Application Scenario (1)
Between switches Between the switch and server
Core switch
Network
Eth-Trunk
Aggregation
switch Access
switch
Eth-Trunk Eth-Trunk
Access Server
switch
To ensure the bandwidth and reliability of links between To improve the access bandwidth and reliability of the
switches, deploy multiple physical links between switches server, bind two or more physical NICs into a NIC group and
and add them to an Eth-Trunk. establish an Eth-Trunk with the switch.
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Typical Application Scenario (2)
Between a switch and stack Heartbeat link of firewalls in hot standby mode
Stacking cable
Aggregation
switch
Eth-Trunk
Eth-Trunk
Access
switch
Hot standby
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Reliability Requirements
▫ Manual Mode
▫ LACP Mode
▪ Configuration Example
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (1)
1. Create an Eth-Trunk.
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (2)
4. Add an interface to the Eth-Trunk (Eth-Trunk view).
By default, interfaces at different rates are not allowed to join the same Eth-Trunk, and only interfaces at the same
rate can be added to the same Eth-Trunk.
6. Configure the LACP system priority.
A smaller priority value indicates a higher LACP system priority. By default, the LACP priority is 32768.
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (3)
7. Configure the LACP interface priority.
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring an Eth-Trunk in
Manual Mode
SW1 configuration:
Eth-Trunk [SW1] interface eth-trunk 1
GE0/0/1 GE0/0/1 [SW1-Eth-Trunk1] trunkport gigabitethernet 0/0/1 to 0/0/2
GE0/0/2 GE0/0/2 [SW1-Eth-Trunk1] port link-type trunk
[SW1-Eth-Trunk1] port trunk allow-pass vlan 10 20
SW1 SW2
• Requirement description:
SW2 configuration:
▫ SW1 and SW2 are connected to the networks of VLAN 10 and
VLAN 20. [SW2] interface eth-trunk 1
[SW2-Eth-Trunk1] trunkport gigabitethernet 0/0/1 to 0/0/2
▫ SW1 and SW2 are connected through two Ethernet links. To [SW2-Eth-Trunk1] port link-type trunk
[SW2-Eth-Trunk1] port trunk allow-pass vlan 10 20
provide link redundancy and enhance transmission reliability,
configure an Eth-Trunk in manual mode between SW1 and
SW2.
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring an Eth-Trunk in
LACP Mode (1)
▫ SW1 and SW2 are connected through three Ethernet links. To [SW1-Eth-Trunk1] quit
provide link redundancy and enhance transmission reliability, [SW1] lacp priority 30000
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring an Eth-Trunk in
LACP Mode (2)
▫ SW1 and SW2 are connected to the networks of VLAN 10 and [SW2-Eth-Trunk1] port link-type trunk
VLAN 20. [SW2-Eth-Trunk1] port trunk allow-pass vlan 10 20
[SW2-Eth-Trunk1] quit
▫ SW1 and SW2 are connected through three Ethernet links. To
provide link redundancy and enhance transmission reliability,
configure an Eth-Trunk in LACP mode between SW1 and
SW2, manually adjust the priority to configure SW1 as the
Actor, and set the maximum number of active interfaces to 2.
The other link functions as the backup link.
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Network Reliability Requirements
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to iStack and CSS
iStack CSS
Equivalent to
Equivalent to Link
Link aggregation aggregation
• iStack: Multiple iStack-capable switches are connected using stacking cables to form a logical switch that participates in
data forwarding.
• Cluster switch system (CSS): Two CSS-capable switches are bundled into one logical switch.
• A CSS consists of only two switches. Generally, modular switches support CSS, and fixed switches support iStack.
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Advantages of iStack and CSS
Eth-Trunk
• One logical device simplifies O&M
and facilitates management.
• If a physical device fails, the other
device can take over the
forwarding and control functions,
CSS preventing single points of failure.
Equivalent to
• Many-to-one virtualization: Switches can be virtualized into one logical switch (CSS) that has a unified control plane for unified management.
• Unified forwarding plane: Physical switches in a CSS use a unified forwarding plane, and share and synchronize forwarding information in real time.
• Inter-device link aggregation: Links between physical switches are aggregated into a single Eth-Trunk interface to interconnect with downstream devices.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Application (1)
Extending the bandwidth and implementing
Extending the port quantity
redundancy backup
iStack link Eth-Trunk
iStack link
Aggregation
layer
Access
layer
iStack
Access
layer
iStack
• When the port density of a switch cannot meet the access • To increase the uplink bandwidth, add new switches to set up an
requirements, add new switches to set up an iStack to increase the iStack and add multiple physical links of the member switches to
number of ports. an Eth-Trunk. This increases the uplink bandwidth, implements
inter-device backup and inter-device link redundancy, and
improves reliability.
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Application (2)
CSS link Eth-Trunk
MSTP+VRRP
CSS
Aggregation
layer
Access layer
• Two devices form a CSS and are virtualized into a single logical device. This simplified network does not
require Multiple Spanning Tree Protocol (MSTP) or Virtual Router Redundancy Protocol (VRRP), so
network configuration is much simpler. Additionally, inter-device link aggregation speeds up network
convergence and improves network reliability.
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Recommended Architecture
Network
Aggregation layer
• Aggregation switches set up an iStack and use Eth-Trunks to
iStack
connect to uplink and downlink devices, building a highly
reliable loop-free network.
Access layer
• Access devices that are geographically close to each other (such
as access switches in a building) are virtualized into one logical
device using iStack. This adds interfaces and simplifies
iStack iStack management.
• An Eth-Trunk is used to connect to the aggregation layer. The
logical network architecture is simple, and STP and VRRP are
not required. This networking offers high reliability, high uplink
bandwidth, and fast convergence.
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. What are the differences between per-packet load balancing and per-flow load balancing?
Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
• Link aggregation can be used to improve link reliability, utilization, and bandwidth. Link
aggregation can be classified into static and LACP aggregation based on the
aggregation mode.
• LACP uses packet negotiation to implement backup for active links. When a link fails,
the backup link is elected as the active link to forward packets.
• To ensure the sequence in which packets arrive, link aggregation uses per-flow load
balancing.
• iStack and CSS simplify network management and network structure, and improve
network reliability.
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
Rapid network development brings challenges to network security and quality of service (QoS).
Access control lists (ACLs) are closely related to network security and QoS.
By accurately identifying packet flows on a network and working with other technologies, ACLs
can control network access behaviors, prevent network attacks, and improve network bandwidth
utilization, thereby ensuring network environment security and QoS reliability.
This course describes the basic principles and functions of ACLs, types and characteristics of
ACLs, basic composition of ACLs, ACL rule ID matching order, usage of wildcards, and ACL
configurations.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
▫ Describe the basic principles and functions of ACLs.
▫ Describe the basic composition of ACLs and ACL rule ID matching order.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. ACL Overview
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Background: A Tool Is Required to Filter Traffic
VLAN 20
Denied traffic
President office at
Permitted traffic
192.168.3.0/24
To ensure financial data security, an enterprise prohibits the R&D department's access to the financial
department server but allows the president office's access to the financial department server.
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Overview
An ACL is a set of sequential rules composed of permit or deny statements.
An ACL matches and distinguishes packets.
ACL Application
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. ACL Overview
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
ACL Composition
An ACL consists of several permit or deny statements. Each statement is a rule of the ACL, and
permit or deny in each statement is the action corresponding to the rule.
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Rule ID
acl number 2000 Rule ID and Step
Rule ID
• Rule ID
rule 5 deny source 10.1.1.1 0 Each rule in an ACL has an ID.
rule 10 deny source 10.1.1.2 0 • Step
rule 15 permit source 10.1.1.0 0.0.0.255 A step is an increment between neighboring rule IDs
automatically allocated by the system. The default
Step = 5
step is 5. Setting a step facilitates rule insertion
between existing rules of an ACL.
How do I add a rule? • Rule ID allocation
If a rule is added to an empty ACL but no ID is
rule 11 deny source 10.1.1.3 0
manually specified for the rule, the system allocates a
step value (5 for example) as the ID of the rule. If an
acl number 2000 ACL contains rules with manually specified IDs and a
rule 5 deny source 10.1.1.1 0 rule with no manually specified ID is added, the
rule 10 deny source 10.1.1.2 0 system allocates to this rule an ID that is greater than
rule 11 deny source 10.1.1.3 0 the largest rule ID in the ACL and is the smallest
rule 15 permit source 10.1.1.0 0.0.0.255 integer multiple of the step value.
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Wildcard (1)
Wildcard
acl number 2000 Wildcard
• A wildcard is a 32-bit number that indicates which bits
in an IP address need to be strictly matched and
rule 5 deny source 10.1.1.1 0 which bits do not need to be matched.
rule 10 deny source 10.1.1.2 0 • A wildcard is usually expressed in dotted decimal
rule 15 permit source 10.1.1.0 0.0.0.255 notation, as a network mask is expressed. However,
their meanings are different.
• Matching rule
0: matching; 1: random allocation
192.168.1.1 1 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1
192.168.1.0/24
network segment
0.0.0.255 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Wildcard (2)
A wildcard can be used to match odd IP addresses in the network segment 192.168.1.0/24, such as
192.168.1.1, 192.168.1.3, and 192.168.1.5.
Strict matching Random allocation Strict matching
192.168.1 5
Special Wildcard
192.168.1 0 0 0 0 0 1 0 1 • Exactly match the IP address 192.168.1.1.
… 192.168.1.1 0.0.0.0 = 192.168.1.1 0
Wildcard
• Match All IP addresses.
0.0.0. 1 1 1 1 1 1 1 0 0.0.0.0 255.255.255 = any
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Defines rules based on source and destination IPv4 addresses, IPv4 protocol types, ICMP types, TCP
Advanced ACL 3000 to 3999
source/destination port numbers, UDP source/destination port numbers, and effective time ranges.
Defines rules based on information in Ethernet frame headers of packets, such as source and destination MAC
Layer 2 ACL 4000 to 4999
addresses and Layer 2 protocol types.
User-defined ACL 5000 to 5999 Defines rules based on packet headers, offsets, character string masks, and user-defined character strings.
Defines rules based on source IPv4 addresses or user control list (UCL) groups, destination IPv4 addresses or
User ACL 6000 to 6999 destination UCL groups, IPv4 protocol types, ICMP types, TCP source/destination port numbers, and UDP
source/destination port numbers.
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Does the No
ACL contain
rules?
Yes
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Data packet
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
ACL Composition ACL Classification ACL Matching Rules
Is the ACL
applied to the No
Route the data Is a matching No
Data packet interface's packet.
inbound route entry
direction? available?
No
Yes
Yes
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. ACL Overview
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Configuration Commands of Basic ACLs
1. Create a basic ACL.
[Huawei-acl-basic-2000] rule [ rule-id ] { deny | permit } [ source { source-address source-wildcard | any } | time-
range time-name ]
In the basic ACL view, you can run this command to configure a rule for the basic ACL.
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case: Use a Basic ACL to Filter Data Traffic
1. Configure IP addresses and routes on the router.
192.168.1.0/24 Router 2. Create a basic ACL on the router to prevent the network
GE 0/0/1 GE 0/0/2 Server segment 192.168.1.0/24 from accessing the network where
10.1.1.1/24 the server resides.
filters out the data packets whose source IP [Router-GigabitEthernet0/0/1] traffic-filter inbound acl 2000
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Configuration Commands of Advanced
ACLs (1)
1. Create an advanced ACL.
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Configuration Commands of Advanced
ACLs (2)
2. Configure a rule for the advanced ACL.
You can configure advanced ACL rules according to the protocol types of IP packets. The parameters vary according
to the protocol types.
In the advanced ACL view, you can run this command to configure a rule for the advanced ACL.
In the advanced ACL view, you can run this command to configure a rule for the advanced ACL.
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case: Use Advanced ACLs to Prevent User Hosts on
Different Network Segments from Communicating (1)
Requirements:
• The departments of a company are connected through the 3. Create ACL 3002 and configure rules for the ACL to deny packets
router. To facilitate network management, the administrator from the marketing department to the R&D department.
allocates IP addresses of different network segments to the
R&D and marketing departments.
[Router] acl 3002
• The company requires that the router prevent the user
hosts on different network segments from communicating [Router-acl-adv-3002] rule deny ip source 10.1.2.0 0.0.0.255
to ensure information security. destination 10.1.1.0 0.0.0.255
[Router-acl-adv-3002] quit
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case: Use Advanced ACLs to Prevent User Hosts on
Different Network Segments from Communicating (2)
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Single) Which one of the following rules is a valid basic ACL rule? ( )
A. rule permit ip
B. rule deny ip
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
ACL is a widely used network technology. Its principle is as follows: packets are
matched against configured ACL rules and actions are taken on the packets as
configured in the ACL rules. The matching rules and actions are configured based on
network requirements. Due to the variety of matching rules and actions, ACLs can
implement a lot of functions.
ACLs are often used with other technologies, such as firewall, routing policy, QoS, and
traffic filtering.
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
● User management is one of the most basic security management requirements for
any network.
● This course describes the basic concepts, implementation, basic configurations, and typical
application scenarios of AAA.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
● Upon completion of this course, you will be able to:
▫ Understand the fundamentals of AAA.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. AAA Overview
2. AAA Configuration
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of AAA
● Authentication, authorization, and accounting (AAA) provides a management mechanism for network
security.
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Common AAA Architecture
● A common AAA architecture includes the user, network access server (NAS), and AAA server.
Use
• The NAS collects and manages user access
r
requests in a centralized manner.
• Multiple domains are created on the NAS to manage
User 1@Domain 1 users. Different domains can be associated with
different AAA schemes, which include the
IP Network IP Network authentication scheme, authorization scheme, and
accounting scheme.
NA • When receiving a user access request, the NAS
User 2@Domain 2 AAA
S Server determines the domain to which the user belongs
based on the username and performs user
management and control based on the AAA
Common AAA architecture
User 3@Domain 3 schemes configured for the domain.
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Authentication
● AAA supports the following authentication modes: non-authentication, local authentication, and remote
authentication.
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Authorization
● AAA supports the following authorization modes: non-authorization, local authorization, and remote
authorization.
● Authorization information includes the user group, VLAN ID, and ACL number.
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Accouting
● The accounting function monitors the network behavior and network resource utilization of
authorized users.
Accounting-Start response
User 2@Domain 2 NAS AAA Server
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AAA Implementation Protocol - RADIUS
● Of the protocols that are used to implement AAA, RADIUS is the most commonly used.
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Common AAA Application Scenarios
Local Authentication and Authorization for
AAA for Internet Access Users Through RADIUS
Administrative Users
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. AAA Overview
2. AAA Configuration
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AAA Configuration (1)
1. Enter the AAA view.
[Huawei] aaa
Set the authentication mode to local authentication. By default, the authentication mode is local authentication.
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AAA Configuration (2)
3. Create a domain and bind an authentication scheme to the domain.
4. Create a user.
Create a local user and configure a password for the local user.
• If the username contains a delimiter "@", the character before "@" is the username and the character after "@"
is the domain name.
• If the value does not contain "@", the entire character string represents the username and the domain name is
the default one.
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AAA Configuration (3)
5. Configure a user access type.
[Huawei-aaa] local-user user-name service-type { { terminal | telnet | ftp | ssh | snmp | http } | ppp | none }
Configure the access type of the local user. By default, all access types are disabled for a local user.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AAA Configuration Examples
● After a user password and a user level are configured on R1, host A can use the configured
username and password to remotely log in to R1.
Host A R1
GE 0/0/0
10.1.1.1/24
[R1]aaa
[R1]user-interface vty 0 4
[R1-ui-vty0-4]authentication-mode aaa
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Verification (1)
● In AAA, each domain is associated with an authentication scheme, an authorization scheme,
and an accounting scheme. In this example, the default domain is used.
[R1]display domain name default_admin
Domain-name: default_admin
Domain-state: Active
Authentication-scheme-name: default
Accounting-scheme-name: default
Authorization-scheme-name: -
Service-scheme-name: -
RADIUS-server-template: -
HWTACACS-server-template: -
User-group: -
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Verification (2)
● After the user properly logs in and logs out, you can view the user record.
-------------------------------------------------------------------
User ID: 1
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. What authentication, authorization, and accounting modes are supported by AAA?
2. When a new common user is configured with local authentication but is not associated with a
user-defined domain, which domain does the user belong to?
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
● AAA improves enterprise network security and prevents unauthorized users from logging in to
enterprise networks by authenticating the identities of enterprise employees and external users,
authorizing accessible resources, and monitoring Internet access behavior.
▫ Authentication: determines which users can access the network.
● Of the protocols that are used to implement AAA, RADIUS is the most commonly used.
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
With the development of the Internet and the increase of network applications, limited
public IPv4 addresses have become the bottleneck of network development. To solve
this problem, Network Address Translation (NAT) was introduced.
NAT enables hosts on an internal network to access an external network. It not only
helps alleviate IPv4 address shortage but also improves the security of the internal
network as NAT prevents devices on the external network from directly communicating
with hosts on the internal network that uses private addresses.
This course describes the motivation behind NAT, and implementations and application
scenarios of different types of NAT.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
▫ Understand the motivation behind NAT.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. NAT Overview
2. Static NAT
3. Dynamic NAT
5. NAT Server
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Motivation Behind NAT
As the number of Internet users increases, public IPv4 addresses become scarcer.
What's worse, uneven allocation of these addresses has resulted in a severe shortage of available public
IPv4 addresses in some areas.
To overcome public IPv4 address shortage, it is necessary to use transition technologies.
0
Internet users Public IPv4 addresses
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Private IP Addresses
Public IP addresses: managed and allocated by a dedicated organization and can be used for direct communication on
the Internet
Private IP addresses: can be used by organizations or individuals randomly on internal networks, but cannot be used for
direct communication on the Internet
▫ Class B: 172.16.0.0–172.31.255.255
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NAT Implementation
NAT: translates IP addresses in IP data packets. It is widely used on live networks and is usually deployed on network
egress devices, such as routers or firewalls.
Typical NAT application scenario: Private addresses are used on private networks (enterprises or homes), and NAT is
deployed on egress devices. For traffic from an internal network to an external network, NAT translates the source
addresses of the data packets into specific public addresses. For traffic from an external network to an internal network,
NAT translates the destination address of the data packets.
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. NAT Overview
2. Static NAT
3. Dynamic NAT
5. NAT Server
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Static NAT Implementation
Static NAT: A private IP address is mapped to a fixed public IP address.
Bidirectional access: When an internal host with a private IP address accesses the Internet, the egress NAT device
translates the private IP address into a public IP address. Similarly, when an external network device sends packets to
access an internal network, the NAT device translates the public address (destination address) carried in the packets
into a private address.
Private network
192.168.1.1/24
122.1.2.1
Internet
192.168.1.254
192.168.1.2/24 NAT NAT mapping table Web server
------------------------------- 200.1.2.3
Private Address Public
Address
192.168.1.1 122.1.2.1
192.168.1.3/24
192.168.1.2 122.1.2.2
192.168.1.3 122.1.2.3
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Static NAT Example
1 Source IP: 192.168.1.1 2 Source IP: 122.1.2.1
Destination IP: 200.1.2.3 Destination IP: 200.1.2.3 The source address 192.168.1.1 is translated into
122.1.2.1 for Internet access.
The destination IP address 122.1.2.1 of the packet
returned from the Internet is translated into
4 Source IP: 200.1.2.3 3 Source IP: 200.1.2.3 192.168.1.1.
Destination IP: 192.168.1.1 Destination IP: 122.1.2.1
192.168.1.1/24
External host
2 Source IP: 202.1.2.3 1 Source IP: 202.1.2.3 202.1.2.3
192.168.1.3/24 Destination IP: 192.168.1.3 Destination IP: 122.1.2.3
When the external host sends a packet to
proactively access 122.1.2.3, the destination
address of the packet is translated into 192.168.1.3
3 Source IP: 192.168.1.3 4 Source IP: 122.1.2.3 by the egress device through NAT.
Destination IP: 202.1.2.3 Destination IP: 202.1.2.3 The source IP address of the packet sent from
192.168.1.3 is translated into 122.1.2.3 by NAT
when the packet passes through the egress device.
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuring Static NAT
1. Method 1: Configure static NAT in the interface view.
global { global-address} is used to configure an external public IP address, and inside {host-address } is used to
configure an internal private IP address.
2. Method 2: Configure static NAT in the system view.
The command format in the system view is the same as that in the interface view. After this configuration, enable
static NAT on a specific interface.
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring Static NAT
Private network
192.168.1.1/24
Internet
192.168.1.254 GE0/0/1
192.168.1.2/24 R1 122.1.2.1 Web server
NAT 200.1.2.3
192.168.1.3/24
• Configure static NAT on R1 to map private addresses of internal hosts to public addresses in one-to-one mode.
[R1]interface GigabitEthernet0/0/1
[R1-GigabitEthernet0/0/1]ip address 122.1.2.1 24
[R1-GigabitEthernet0/0/1]nat static global 122.1.2.1 inside 192.168.1.1
[R1-GigabitEthernet0/0/1]nat static global 122.1.2.2 inside 192.168.1.2
[R1-GigabitEthernet0/0/1]nat static global 122.1.2.3 inside 192.168.1.3
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. NAT Overview
2. Static NAT
3. Dynamic NAT
5. NAT Server
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Dynamic NAT Implementation
Dynamic NAT: A private IP address is mapped to a public IP address from a NAT address pool containing a group of public IP addresses.
Static NAT strictly maps addresses in one-to-one mode. As a result, even if an internal host is offline for a long time or does not send data,
the public address is still occupied by the host.
Dynamic NAT prevents such address wastes. When an internal host accesses an external network, an available IP address in a NAT
address pool is temporarily assigned to the host and marked as In Use. When the host no longer accesses the external network, the
assigned IP address is reclaimed and marked as Not Use.
NAT address pool
--------------------
Private network 122.1.2.1 Not Use
122.1.2.2 Not Use
122.1.2.1
Internet
192.168.1.254
192.168.1.2/24 NAT Web server
200.1.2.3
192.168.1.3/24
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Dynamic NAT Example (1)
Step 1
Selects an unused address in the address
pool as the post-translated address and
1 Source IP: 192.168.1.1 marks the address as In Use.
Destination IP: 200.1.2.3 NAT address pool
--------------------
122.1.2.1 In Use 2 Source IP: 122.1.2.2
Select 122.1.2.2 Not Use Destination IP: 200.1.2.3
192.168.1.1/24 122.1.2.3 Not Use
Internet
192.168.1.2/24 NAT Step 2 Web server
Generates a temporary NAT mapping 200.1.2.3
table.
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Dynamic NAT Example (2)
Searches the NAT mapping table for the
desired private IP address based on the
public IP address and translates the
destination IP address of the IP data
packet into the private address.
4 Source IP: 200.1.2.3
Destination IP: 192.168.1.1 NAT mapping table
----------------------------- 3 Source IP: 200.1.2.3
Private Public Address Destination IP: 122.1.2.2
Address
Match
192.168.1.1 122.1.2.2
192.168.1.1/24 192.168.1.2 122.1.2.1
Internet
192.168.1.2/24 NAT Web server
200.1.2.3
192.168.1.3/24
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuring Dynamic NAT
1. Create an address pool.
Configure a public address range. group-index specifies the address pool ID, and start-address and end-address
specify the start and end addresses of the address pool, respectively.
Configure a basic ACL to match the source address range that requires dynamic NAT.
3. Configure outbound NAT with the address pool in the interface view.
Associate the ACL rule with the address pool for dynamic NAT on the interface. The no-pat parameter specifies that
port translation is not performed.
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring Dynamic NAT
Private network
192.168.1.1/24
Internet
GE0/0/1
192.168.1.2/24 NAT Web server
R1 200.1.2.3
192.168.1.3/24
• Configure dynamic NAT on R1 to dynamically map private addresses of internal hosts to public addresses.
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. NAT Overview
2. Static NAT
3. Dynamic NAT
5. NAT Server
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NAPT Implementation
Dynamic NAT does not translate port numbers. It belongs to No-Port Address Translation (No-PAT). In this mode, the mapping between
public and private addresses is still 1:1, which cannot improve public address utilization.
Network Address and Port Translation (NAPT): translates both IP addresses and port numbers from multiple internal hosts to one public IP
address in an address pool. In this way, 1:n mapping between public and private addresses is implemented, which effectively improves
public address utilization. NAT address pool
Private network --------------------
122.1.2.1
122.1.2.2
192.168.1.1/24 122.1.2.3
122.1.2.1
Internet
192.168.1.25
192.168.1.2/24 4 NAT Web server
200.1.2.3
NAT mapping table
-------------
192.168.1.3/24 Private IP Public IP Address:Port
Address:Port Number Number
192.168.1.1:10321 122.1.2.2:1025
192.168.1.2:17087 122.1.2.2:1026
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NAPT Example (1)
Step 1
1 Source: 192.168.1.1:10321 NAT address
Selects an address from the address
Destination: 200.1.2.3:80 pool and translates both the source
pool IP address and port number. 2 Source: 122.1.2.2:1025
------------- Destination: 200.1.2.3:80
122.1.2.1
Select 122.1.2.2
192.168.1.1/24 122.1.2.3
Internet
192.168.1.2/24 NAT Step 2 Web server
Generates a temporary NAT mapping table, which 200.1.2.3
records:
[Source IP address:port number before translation],
[IP address:port number after translation].
192.168.1.3/24
Mapping table
-------------
Private IP Public IP
Address:Port Number Address:Port Number
192.168.1.1:10321 122.1.2.2:1025
192.168.1.2:17087 122.1.2.2:1026
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NAPT Example (2)
Searches the NAT mapping table for the desired
private IP address and port number based on the
public IP address and port number, and
translates the destination IP address and port
4 Source: 200.1.2.3:80 number of the IP data packet.
Destination: 192.168.1.1:10321
NAT mapping table
-------------
Private IP Public IP Address:Port 3 Source: 200.1.2.3:80
Address:Port Number Number
Destination: 122.1.2.2:1025
192.168.1.1:10321 122.1.2.2:1025 Match
192.168.1.2:17087 122.1.2.2:1026
192.168.1.1/24
Internet
192.168.1.2/24 NAT Web server
200.1.2.3
192.168.1.3/24
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring NAPT
Private network
192.168.1.1/24
GE0/0/1 Internet
192.168.1.254
192.168.1.2/24 NAT Web server
R1 200.1.2.3
192.168.1.3/24
• Configure NAPT on R1 to allow all hosts with private IP addresses on the internal
network to access the public network through 122.1.2.1.
[R1]nat address-group 1 122.1.2.1 122.1.2.1
[R1]acl 2000
[R1-acl-basic-2000]rule 5 permit source 192.168.1.0 0.0.0.255
[R1-acl-basic-2000]quit
[R1]interface GigabitEthernet0/0/1
[R1-GigabitEthernet0/0/1]nat outbound 2000 address-group 1
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Easy IP
Easy IP: translates both IP addresses and transport-layer port numbers. The implementation of Easy IP is the same as
that of NAPT. The difference is that Easy IP does not involve address pools. It uses an interface address as a public
address for NAT.
Easy IP applies to scenarios where public IP addresses are not fixed, such as scenarios where public IP addresses are
dynamically obtained by egress devices on private networks through DHCP or PPPoE dialup.
Private network
192.168.1.1/24
122.1.2.1
Internet
192.168.1.25
192.168.1.2/24 4 NAT Web server
200.1.2.3
NAT mapping table
-------------
Private IP Public IP
192.168.1.3/24 Address:Port Number Address:Port Number
192.168.1.1:10321 122.1.2.1:1025
192.168.1.2:17087 122.1.2.1:1026
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring Easy IP
Private network
192.168.1.1/24
GE0/0/1 Internet
192.168.1.254
192.168.1.2/24 NAT Web server
R1 200.1.2.3
192.168.1.3/24
• Configure Easy IP on R1 to allow all hosts with private IP addresses on the internal network to
access the public network through 122.1.2.1.
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. NAT Overview
2. Static NAT
3. Dynamic NAT
5. NAT Server
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NAT Server
NAT Server: maps an internal server to a public network through a one-to-one mapping between a [public IP
address:port number] and a [private IP address:port number]. This function is used when the internal server needs
to provide services for the public network.
An external host proactively accesses the [public IP address:port number] to communicate with the internal server.
Private network
122.1.2.1
Internet
192.168.1.254
Web server NAT 200.1.2.3
192.168.1.10
NAT mapping table
-----------------------
Private IP Public IP
Address:Port Address:Port
Number Number
192.168.1.10:80 122.1.2.1:80
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NAT Server Example
Searches the NAT mapping table for the
desired private address:port number based on
the public address:port number, and translates
the destination address:port number of the IP
2 Source: 200.1.2.3:47819 data packet to the private address:port number.
Destination: 192.168.1.10:80
NAT mapping table
----------------- 1 Source: 200.1.2.3:47819
Private IP Public IP Destination: 122.1.2.1:80
Address:Port Number Address:Port Number
122.1.2.1
Internet
192.168.1.254
Web server NAT 200.1.2.3
192.168.1.10
4 Source: 122.1.2.1:80
3 Source: 192.168.1.10:80 Destination: 202.1.2.3:47819
Destination: 202.1.2.3:47819 Reversely translates
the source IP
address:port number
based on the NAT
mapping table.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring NAT Server
Private network
122.1.2.1
Internet
192.168.1.254
Web server NAT 200.1.2.3
192.168.1.10
• Configure NAT Server on R1 to map the internal server's IP address 192.168.1.10 and port
number 80 to the public IP address 122.1.2.1 and port number 8080.
[R1]interface GigabitEthernet0/0/1
[R1-GigabitEthernet0/0/1]ip address 122.1.2.1 24
[R1-GigabitEthernet0/0/1]nat server protocol tcp global 122.1.2.1 www inside 192.168.1.10 8080
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. What types of NAT can enable external devices to proactively access an internal server?
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
Using private addresses on private networks and using NAT at the network egress
effectively reduce the number of required public IPv4 addresses. NAT effectively
alleviates the shortage of public IPv4 addresses.
Dynamic NAT, NAPT, and Easy IP provide source address translation for private
network hosts to access the public network.
NAT Server enables internal servers to provide services for public networks.
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
The Internet has become an integral part of our lives, with a wide range of applications
such as file transfer, email sending, online video, web browsing, and online gaming.
Because of the layered network model, common users can use various services
provided by the application layer, without knowing technical details such as
communication technology implementations.
In previous courses, we have learned technologies related to the data link layer,
network layer, and transport layer. This chapter will describe common network services
and applications such as FTP, DHCP, and HTTP.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
Understand FTP fundamentals.
Understand TFTP fundamentals.
Understand DHCP fundamentals.
Understand Telnet fundamentals.
Understand HTTP fundamentals.
Understand DNS fundamentals.
Understand NTP fundamentals.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. File Transfer
▪ FTP
▫ TFTP
2. Telnet
3. DHCP
4. HTTP
5. DNS
6. NTP
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
File Transfer Protocols
File transfer between hosts is an important function of IP networks. Nowadays, people can conveniently transfer files
using web pages and mailboxes.
However, in the early Internet era when the World Wide Web (WWW) did not come into being and operating systems
used command-line interfaces, people transferred files via command-line tools. The most commonly used protocols for
transferring files at that time are File Transfer Protocol (FTP) and Trivial File Transfer Protocol (TFTP).
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of FTP
ASCII mode
Binary mode
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
FTP Transfer Process - Active Mode
• FTP works in two modes: active mode (PORT) and passive mode (PASV).
File transfer
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
FTP Transfer Process - Passive Mode
File transfer
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (Device as FTP Server)
A user accesses a device through FTP.
[Huawei]aaa
[Huawei]local-user user-name password irreversible-cipher password
[Huawei]local-user user-name privilege level level
[Huawei]local-user user-name service-type ftp
[Huawei]local-user user-name ftp-directory directory
The privilege level must be set to level 3 or higher. Otherwise, the FTP connection fails.
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (Device as FTP Client)
1. A VRP device that functions as an FTP client accesses an FTP server.
<FTP Client>ftp 10.1.1.1
Trying 10.1.1.1 ...
Press CTRL+K to abort
Connected to 10.1.1.1.
220 FTP service ready.
User(10.1.1.1:(none)):ftp
331 Password required for ftp.
Enter password:
230 User logged in.
2. Common commands used when the VRP device functions as an FTP client.
ascii Set the file transfer type to ASCII, and it is the default type
binary Set the file transfer type to support the binary image
ls List the contents of the current or remote directory
passive Set the toggle passive mode, the default is on
get Download the remote file to the local host
put Upload a local file to the remote host
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Example
Configurations on the FTP server:
<Huawei> system-view
[Huawei] sysname FTP_Server
[FTP_Server] ftp server enable
[FTP_Server] aaa
[FTP_Server-aaa] local-user admin1234 password irreversible-cipher
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. File Transfer
▫ FTP
▪ TFTP
2. Telnet
3. DHCP
4. HTTP
5. DNS
6. NTP
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of TFTP
Compared with FTP, TFTP is designed to transfer small files and is easier to implement.
Using UDP (port 69) for transmission
Authentication not required
You can only request a file from or upload a file to the server, but cannot view the file directory on the
server.
TFTP
UDP
IP
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
TFTP Transfer Example
Upload a File Download a File
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (Device as TFTP Client)
1. Download a file (VRP device functioning as a TFTP client).
You do not need to log in to the TFTP server, and only need to enter the IP address of the TFTP server and the
corresponding command.
You do not need to log in to the TFTP server, and only need to enter the IP address of the TFTP server and the
corresponding command.
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. File Transfer
2. Telnet
3. DHCP
4. HTTP
5. DNS
6. NTP
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Application Scenario of Telnet
To facilitate device management using commands, you can use Telnet to manage devices.
Device management through Telnet is different from that using the console port. In Telnet-based device management
mode, no dedicated cable is required to directly connect to the console port of the Telnet server, as long as the Telnet
server’s IP address is reachable and Telnet clients can communicate with the Telnet server’s TCP port 23.
The device that can be managed through Telnet is called the Telnet server, and the device connecting to the Telnet
server is called the Telnet client. Many network devices can act as both the Telnet server and Telnet client.
Telnet server
TCP connection
AP Router
IP network
Switch Firewall
Telnet client
...
Server
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
VTY User Interface
When a user logs in to a device using the console port or Telnet, the system allocates a user interface to manage and
monitor the current session between the device and the user. A series of parameters can be set in each user interface
view to specify the authentication mode and user privilege level after login. After a user logs in to a device, user
operations that can be performed depend on the configured parameters.
The user interface type of Telnet is virtual type terminal (VTY) user interface.
User interface
Authentication mode: local
VTY 0 User privilege: Level 15
1 Establish a Telnet connection VTY 1
VTY 2 3 Authenticate the Telnet
connection using the VTY
VTY 3
IP network configuration.
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (1)
1. Enable the Telnet server function.
The Telnet server function is enabled on the device (disabled by default). To disable this function, run the
undo telnet server enable command.
2. Enter the user view.
The VTY user interface view is displayed. VTY user interfaces may vary according to device models.
By default, the VTY user interface supports Secure Shell (SSH) and Telnet.
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (2)
4. Configure the authentication mode and the authentication password in password authentication mode.
By default, no default authentication mode is available. You need to manually configure an authentication mode.
The set authentication password cipher command implementation varies according to VRP versions. In some
versions, you need to press Enter and then enter the password. In other versions, you can directly enter the
password after the command.
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Example (1)
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Example (2)
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. File Transfer
2. Telnet
3. DHCP
4. HTTP
5. DNS
6. NTP
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Issues Faced by Manual Network Parameter
Configuration (1)
Too Many Hard-to-Understand Parameters Huge Workload
Address configuration
Mask . . . Address configuration Network
administrator
Gateway . . .
• Common users are not familiar with network parameters and • Network administrators centrally configure network parameters,
misconfiguration often occurs, resulting in network access failure. with heavy workloads and repetitive tasks.
Random IP address configuration may cause IP address conflicts. • Network administrators need to plan and allocate IP addresses
to users in advance.
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Issues Faced by Manual Network Parameter
Configuration (2)
Low Utilization Poor Flexibility
Offline user
Office A Office B
• On an enterprise network, each user uses a fixed IP address. As a • Wireless local area networks (WLANs) allow for flexible station
result, the IP address utilization is low, and some IP addresses (STA) access locations. When a STA moves from one wireless
may remain unused for a long time. coverage area to another, the IP address of the STA may need to
be reconfigured.
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of DHCP
DHCP Working Principle
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
DHCP Advantages
Unified Management IP Address Lease
DHCP client
DHCP client
Pool-No 1 IP:192.168.1.10
DNS-server 10.1.1.2 | Gateway 10.1.2.1 Network mask:24
Network 10.1.2.0 | Mask 255.255.255.0 Gateway:192.168.1.1
Total Used DNS: 114.114.114.114
252 2 Lease: 8 hour
• IP addresses are obtained from the address pool on the DHCP server. The • DHCP defines the lease time to improve IP address utilization.
DHCP server records and maintain the usage status of IP addresses for
unified IP address assignment and management.
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
DHCP Working Principle
Layer 2
broadcast
domain
DHCP client DHCP Discover (broadcast): used to discover the DHCP server
DHCP server on the current network.
Sent by the DHCP client DHCP Offer (unicast): carries the IP address
assigned to the client. Pool-No 1
Total Address 255
Question: Why does a DHCP client need to send a DHCP Request packet to the DHCP server to notify its use
of a particular IP address after receiving a DHCP Offer packet?
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
DHCP Lease Renewal
Layer 2
broadcast
domain
If the DHCP client fails to receive a response from the original DHCP server at 50% of the lease (known
as T1), the DHCP client waits until 87.5% of the lease (known as T2) has passed. At T2, the client enters
the rebinding state, and broadcasts a DHCP Request packet, to which any DHCP server can respond.
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (1)
1. Enable DHCP.
2. Enable the interface to use the interface address pool to provide the DHCP server function.
4. Configure the range of IP addresses that cannot be automatically assigned to clients from the interface address
pool.
5. Configure the lease of IP addresses in the interface address pool of the DHCP server.
[Huawei-Gigabitthernet0/0/0]dhcp server lease { day day [ hour hour [ minute minute ] ] | unlimited }
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Commands (2)
6. Create a global address pool.
7. Specify the range of IP addresses that can be assigned dynamically in the global address pool.
[Huawei-ip-pool-2]gateway-list ip-address
9. Specify the DNS server IP address that the DHCP server delivers to DHCP clients.
[Huawei-ip-pool-2]dns-list ip-address
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
DHCP Interface Address Pool Configuration
Requirement:
Layer 2
GE0/0/0
broadcast • Configure a router as the DHCP server, configure the subnet to
domain 10.1.1.1/24
which GE0/0/0 belongs as the address pool of DHCP clients,
DHCP client DHCP server
set the IP address of GE0/0/0 to that of the DNS server, and
set the lease to three days.
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
DHCP Global Address Pool Configuration
Requirement:
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. File Transfer
2. Telnet
3. DHCP
4. HTTP
5. DNS
6. NTP
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Web Page Access Using a Browser
The browser sends an HTTP request to the server
to obtain page resources.
www.huawei.com
• When you enter a uniform resource locator (URL) in a browser, the browser can obtain data from a web server and
display the content on the page.
• Hypertext Transfer Protocol (HTTP): an application layer protocol for communication between a client browser or
another program and a web server
• HTTP adopts the typical C/S architecture, and uses TCP for transmission.
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Background
WWW
The WWW is comprised of the web servers and clients all over the world.
• In the early days of the Internet, World Wide Web (WWW) was proposed to share documents.
• The WWW consists of three parts: Hypertext Markup Language (HTML) for displaying document content in a browser, HTTP for transmitting
documents on the network, and URLs for specifying document locations on the network.
• WWW was actually the name of a client application for browsing HTML documents, and now represents a collection of technologies (HTML
+ HTTP + URL) and is commonly known as the Web.
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transfer Example (1)
HTTP request
HTTP response
Internet
Web client Web server
www.servs_app.com/web/index.html
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Transfer Example (2)
HTTP request
HTTP response
Internet
Web client Web server
Web Server
Host:www.servs_app.com
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. File Transfer
2. Telnet
3. DHCP
4. HTTP
5. DNS
6. NTP
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Birth of DNS
When you enter a domain name in your browser to access a website, the domain name is resolved to an IP address.
The browser actually communicates with this IP address.
The protocol used for resolving domain names to IP addresses is Domain Name System (DNS).
Each node on the network has a unique IP address, and nodes can communicate with one another through IP
addresses. However, if all nodes communicate through IP addresses, it is difficult to remember so many IP addresses.
Therefore, DNS is proposed to map IP addresses to alphanumeric character strings (domain names).
Internet
www.huawei.com 1.2.3.4
1 Domain name
resolution HTTP
Source IP: 192.168.1.1
Destination IP: 1.2.3.4
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
DNS Components
Domain name: a sequence of characters to identify hosts. In most cases, the URL entered in the browser
when you visit a website is the domain name of the website.
DNS server: maintains the mappings between domain names and IP addresses and responds to requests
from the DNS resolver. Domain name info
Row 1
Internet
Row 2
DNS client DNS server
DNS request Row 3
DNS query: domain name A
DNS response
UDP
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Domain Name Format
The domain name is in the format of hostname.second-level domain.top-level domain.root domain. The
root domain is represented by a dot (.). Generally, the root domain is denoted by an empty name (that is,
containing no characters).
Root domain .
Second-level
domain huawei
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
DNS Query Modes
The DNS is a distributed system. The database of most DNS servers does not have all domain name records. When a
client queries a domain name from a DNS server but the DNS server does not have the record of the domain name, the
client can continue the query in either of the following ways:
Recursive query: The DNS server queries other DNS servers and returns the query result to the DNS client.
Iterative query: The DNS server informs the DNS client of the IP address of another DNS server, from which the DNS client queries
the domain name.
4 2
2 3
3
DNS client DNS client
4
DNS server 2 DNS server 2
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. File Transfer
2. Telnet
3. DHCP
4. HTTP
5. DNS
6. NTP
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Time Synchronization Requirements
Consistent clock of all devices is required in many scenarios on enterprise campus networks:
Network management: Analysis of logs or debugging messages collected from different routers needs time for
reference.
Charging system: The clocks of all devices must be consistent.
Several systems working together on the same complicate event: Systems have to take the same clock for reference
to ensure a proper sequence of implementation.
Incremental backup between a backup server and clients: Clocks on the backup server and clients should be
synchronized.
System time: Some applications need to know the time when users log in to the system and the time when files are
modified.
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NTP Overview
If the administrator manually enters commands to change the system time for time synchronization, the
workload is heavy and the accuracy cannot be ensured. Therefore, the Network Time Protocol (NTP) is
designed to synchronize the clocks of devices.
NTP is an application layer protocol belonging to the TCP/IP suite and synchronizes time between a group
of distributed time servers and clients. NTP is based on IP and UDP, and NTP packets are transmitted
using UDP on port number 123.
NTP server
Time synchronization
Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NTP Network Structure
Primary time server: directly synchronizes its clock with a standard reference clock through a cable or radio. Typically,
the standard reference clock is either a radio clock or the Global Positioning System (GPS).
Stratum-2 time server: synchronizes its clock with either the primary time server or other stratum-2 time servers within
the network. Stratum-2 time servers use NTP to send time information to other hosts in a Local Area Network (LAN).
Stratum: is a hierarchical standard for clock synchronization. It represents the precision of a clock. The value of a
stratum ranges from 1 to 15. A smaller value indicates higher precision. The value 1 indicates the highest clock
precision, and the value 15 indicates that the clock is not synchronized.
NTP client
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Which FTP mode is recommended for transferring log and configuration files on network
devices? Why?
2. Why does a DHCP client need to send a DHCP Request packet to the DHCP server to notify
its use of a particular IP address after receiving a DHCP Offer packet?
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
FTP is used to transfer files. You are advised to use different transfer modes for different
files. FTP is based on TCP and therefore can ensure the reliability and efficiency of file
transfer.
As the document transfer protocol of WWW, HTTP is widely used in today's network for
encoding and transporting information between a client (such as a web browser) and a
web server.
Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
Wired LANs are expensive and lack mobility. The increasing demand for portability and
mobility requires wireless local area network (WLAN) technologies.
WLAN is now the most cost-efficient and convenient network access mode.
This course introduces the development of WLAN in different phases, concepts related
to WLAN technologies, implementation and basic configurations of common WLAN
networking architectures, and WLAN development trends.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
▫ Understand basic concepts of WLAN and the history of the 802.11 protocol family.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. WLAN Overview
3. WLAN Fundamentals
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to WLAN
A wireless local area network (WLAN) is constructed using wireless technologies. It uses high-frequency (2.4 GHz or 5
GHz) signals such as radio waves, lasers, and infrared rays to replace the traditional media used for transmission on a
wired LAN.
WLAN technology allows users to easily access a wireless network and move around within the coverage of the wireless
network.
Router
Access
Wired Wireless
Point
Network Switch Network
Radio
signals
Switch
PC
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IEEE 802.11、WLAN and Wi-Fi
IEEE 802.11 suites are standards for WLANs which are definded LAN WLAN
by the Institute of Electrical and Electronics Engineering (IEEE).
Ethernet Wi-Fi
Wi-Fi Alliance was formed by a group of major manufacturers
IEEE 802.3 IEEE 802.11
and the logo "Wi-Fi" was created. The Wi-Fi standards are
WLAN technologies based on IEEE 802.11 standards.
Standard 802.11 802.11b 802.11a、802.11g 802.11n 802.11ac wave1 802.11ac wave2 802.11ax
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Wi-Fi Development Trends in Office Scenarios
Early 1990s Late 1990s Today
4K
VR/AR ...
All-wireless era
BYOD
Diversified terminals:
• Refined online service
Wireless office era • 802.11ax/ad...
Primary mobile office • VR/4K video
Mobile phone, tablet, and Ultrabook:
Laptop: • Video, voice, and data services
Fixed office • Voice and data services • A large number of real-time services
• 802.11b/a/g • 802.11n -> 802.11ac
Desktop computer:
• Data service Wireless networks as a
Wired and wireless integration All-wireless office, wireless-centric
supplement to wired networks
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. WLAN Overview
3. WLAN Fundamentals
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts Wired Network Wireless Network
WLAN Devices
Home Enterprise
PoE Switch
Network
Wireless Router
AC (Access Controller)
AP (Access Point)
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts Wired Network Wireless Network
Internet Internet
Campus
Egress Gateway
Campus
Egress Gateway Campus
Wired Network Network
Ethernet Protocols Campus
Network
AC
Fat AP Fit AP
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts Wired Network Wireless Network
AC
Architecture Characteristics
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts Wired Network Wireless Network
CAPWAP
What Is a CAPWAP Tunnel?
Transfer:
Control information • Control And Provisioning of Wireless Access
User data A
C Campus
Points (CAPWAP): defines how to manage and
STA
Network configure APs. That is, an AC manages and controls
AP1 APs in a centralized manner through CAPWAP tunnels.
AP2
CAPWAP Tunnel Functions
APn • Maintains the running status of the AC and APs.
• Allows the AC to manage APs and deliver service
configurations to the APs.
STA
• Allows APs to exchange data sent by STAs with the AC
STA through CAPWAP tunnels when the tunnel forwarding
mode is used.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts Wired Network Wireless Network
AP-AC Networking
The AP-AC networking modes are classified into Layer 2 networking and Layer 3 networking.
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts Wired Network Wireless Network
AC Connection Mode
ACs can be connected in in-path or off-path mode.
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Wireless
Basic Concepts Wired Network
Network
Channel
Source Coding Modulation (transmission Demodulation Decoding Sink
media)
Noise source
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Wireless
Basic Concepts Wired Network
Network
Radio Wave
A radio wave is an electromagnetic wave whose frequency is between 3 Hz and about 300 GHz. Radio
technology converts sound signals or other signals and transmits them by using radio waves.
WLAN technology enables transmission of information by radio waves over the air. Currently, the WLAN
uses the following frequency bands:
▫ 2.4 GHz frequency band (2.4–2.4835 GHz)
Extremely Extremely
Super low Ultra low Very low Low Intermediate High Very high Ultra high Super high
low high
frequency frequency frequency frequency frequency frequency frequency frequency frequency
frequency frequency
(SLF) (ULF) (VLF) (LF) (IF) (HF) (VHF) (UHF) (SHF)
(ELF) (EHF)
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Wireless
Basic Concepts Wired Network
Network
Radio Channel
A channel transmits information, and a radio channel is a radio wave in space. Given that radio waves are
ubiquitous, the random use of spectrum resources will cause endless interference issues. Therefore, in
addition to defining the usable frequency bands, wireless communication protocols must also accurately
divide the frequency ranges. Each frequency range is a channel.
2.4 GHz Frequency Band 5 GHz Frequency Band
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Wireless
Basic Concepts Wired Network
Network
BSS/SSID/BSSID
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Wireless
Basic Concepts Wired Network
Network
VAP
In the early stage, APs support only one BSS. If
multiple BSSs are deployed in a space, we must
Discover guest
and internal
also deploy multiple APs, which increases costs
BSS1: VAP1
and occupies channel resources. To resolve this
SSID: guest problem, APs now support creation of multiple
BSSID:
00e0.fc45.24a0 virtual access points (VAPs).
Discover guest A
and internal P VAP:
BSS2: VAP2
SSID: internal ▫ A physical AP can be virtualized into multiple VAPs,
BSSID:
00e0.fc45.24a9 each of which provides the same functions as the
Discover guest physical AP.
and internal
▫ Each VAP corresponds to one BSS. In this way, one
AP may provide multiple BSSs that can have different
SSIDs specified.
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Wireless
Basic Concepts Wired Network
Network
ESS
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. WLAN Overview
3. WLAN Fundamentals
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
1 AP onboarding
An AP obtains an IP address, discovers an AC,
and sets up a connection with the AC.
3 STA access
STAs find the SSID transmitted by the AP, connect to
the network, and go online.
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
1 AP onboarding
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
IP Address Allocation
CAPWAP
tunnel maintenance
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
IP address allocation
AP DHCP Server
CAPWAP DHCP
tunnel establishment DHCP Discover (broadcast)
Server AC Discover DHCP servers on the network
CAPWAP
tunnel maintenance
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
IP address allocation
DHCP Mode (Layer 3 Networking) Broadcast Mode (Layer 2 Networking)
A DHCP Server A
CAPWAP P Layer 2 Campus Layer 3 Campus C A
tunnel Network Network C
establishment
DHCP Discover
DHCP Offer
AP access control (option 43)
Broadcast query
DHCP Request
DHCP Ack
AP upgrade (option 43)
(Optional)
Discovery Request
A
Discovery Response P
CAPWAP
tunnel maintenance
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
CAPWAP
• APs associate with the AC and establish CAPWAP
DHCP
tunnel establishment Server AC
tunnels, including data tunnels and control tunnels.
▫ Data tunnel: transmits service data packets from APs to the
AC for centralized forwarding. Datagram Transport Layer
Security (DTLS) encryption can be enabled over the data
AP access control
tunnel to ensure security of CAPWAP data packets.
Subsequently, CAPWAP data packets will be encrypted and
decrypted using DTLS.
AP upgrade ▫ Control tunnel: transmits control packets between the AC and
(Optional)
APs. DTLS encryption can be enabled over the control tunnel
to ensure security of CAPWAP control packets. Subsequently,
CAPWAP control packets will be encrypted and decrypted
CAPWAP using DTLS.
tunnel maintenance
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
AP Access Control
IP address allocation
A A
AP Access Control P C
CAPWAP
tunnel establishment
• After discovering and AC, the AP sends a Join
Request packet to the AC. The AC then Discovery Request
CAPWAP
tunnel maintenance
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
AP Upgrade
IP address allocation
AP Upgrade A A
P C
CAPWAP • The AP determines whether its system software
tunnel establishment
version is the same as that specified on the AC Discovery Request
according to parameters in the received Join
Discovery Response
AP access control Response packet. If they are different, the AP
Join Request
sends an Image Data Request packet to request
the software package and then upgrades its Join Response
AP upgrade software version in AC, FTP, or SFTP mode. Image Data Request
(Optional)
• After the software version is updated, the AP Image Data Response
restarts and repeats steps 1 to 3.
CAPWAP
tunnel maintenance
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
Discovery Request
CAPWAP Tunnel Maintenance Discovery Response
CAPWAP
tunnel establishment
• Data tunnel maintenance: Join Request
▫ The AP and AC exchange Keepalive packets to Join Response
detect the data tunnel connectivity.
AP access control Image Data Request
• Control tunnel maintenance:
Image Data Response
▫ The AP and AC exchange Echo packets to
AP upgrade
Keepalive
detect the control tunnel connectivity. Data tunnel
(Optional)
Keepalive
Echo Request
Control tunnel
CAPWAP
tunnel maintenance Echo Response
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
• Configure DHCP servers to assign IP addresses to APs and STAs. The AC can function as a DHCP server.
Configure network connectivity
• Configure network connectivity between APs and the DHCP server, and between APs and the AC.
Each AP will be added and can be added to only one AP group. In most cases, we configure an AP group to
Create an AP group
provide the same configurations for multiple APs.
Configure the country code on the AC A country code identifies the country in which the APs are deployed. Country codes regulate different AP radio
(regulatory domain profile) attributes, including the transmit power and supported channels.
Configure a source interface or address Specify a unique source IP address or source interface on each AC. APs must learn the specified source IP
(for establishing CAPWAP tunnels with APs) address or the IP address of the source interface to communicate with the AC and establish CAPWAP tunnels.
In automatic upgrade mode, an AP checks whether its version is the same as that configured on the AC, SFTP
(Optional) Configure the automatic AP upgrade server, or FTP server when going online. If the two versions are different, the AP upgrades its version, restarts, and
goes online again. If the two versions are the same, the AP does not upgrade its version.
Add APs
You can add APs by importing them in offline mode, automatic discovery, and manual confirmation.
(configure the AP authentication mode)
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
1 AP onboarding
Configuration Update Request
3 STA access
AP AP
4 WLAN service data forwarding
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
WLAN Profiles
Various profiles are designed based on different functions and features of WLAN networks to help users
configure and maintain functions of WLAN networks. These profiles are called WLAN profiles.
Bound to regulatory domain • A regulatory domain profile provides configurations of country code,
profile calibration channel, and calibration bandwidth for an AP.
Bound to • Radio profiles are used to optimize radio parameters, and control the
Radio profile
in-service channel switching function.
AP or Bound to • Configure parameters in the VAP profile and reference the SSID profile,
VAP profile
AP group security profile, and authentication profile.
Bound to
Other profiles • AP System Profile, Location Profile, WIDS Profile, Mesh Profile and etc.
Configure radio • Configure the bandwidth, channel, antenna gain, transmit power,
parameters coverage distance, and operating frequency band of a specified radio.
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
VAP Profile
Bound to Create a • You can configure WLAN security policies to authenticate STAs and
security profile encrypt user packets, protecting the security of the WLAN and users.
VAP Profile
Configure the data • Control packets (management packets) and data packets are
forwarding mode transmitted on a WLAN.
Configure service • Layer 2 data packets delivered from the VAP to an AP carry the service
VLANs VLAN IDs.
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
1 AP onboarding
3 STA access
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
Scanning
In active scanning, a STA periodically searches for nearby wireless networks.
Scanning
The STA can send two types of Probe Request frames: probes containing an SSID
and probes that do not contain an SSID.
Link authentication Active Scanning by Sending a Probe Request Active Scanning by Sending a Probe Request
Frame Containing an SSID Frame Containing No SSID
DHCP • The STA sends a Probe Request containing an • The STA periodically broadcasts a Probe Request
SSID on each channel to search for the AP with the frame that does not contain an SSID on the
same SSID. Only the AP with the same SSID will supported channels. The APs return Probe
User authentication Response frames to notify the STA of the wireless
respond to the STA.
services they can provide.
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
Link Authentication
To ensure wireless link security, an AP needs to authenticate STAs that attempt to access the AP.
Scanning IEEE 802.11 defines two authentication modes: open system authentication and shared key authentication.
STA AP
Authentication Request
Association Authentication Request
Authentication Response
Authentication Response (Challenge)
Authentication Response
(Success)
DHCP
• Open system authentication requires no authentication, • Shared key authentication requires that the STA and AP
allowing any STA to be successfully authenticated. have the same shared key preconfigured. The AP checks
whether a STA has the same shared key to determine the
authentication result. If the STA has the same shared key as
User authentication
the AP, the STA is authenticated. Otherwise, STA
authentication fails.
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
Association
After link authentication is complete, a STA initiates link service negotiation using
Scanning Association packets.
The STA association process is actually a link service negotiation process, during
Link authentication
which the supported rate, channel, and the like are negotiated.
STA AP AC
Association
1. Association Request
Access authentication
2. Association Request
3. Association Response
DHCP
4. Association Response
User authentication
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
Access Authentication
User access authentication differentiates users and controls access rights of users.
Scanning Compared with link authentication, access authentication is more secure.
Major access authentication modes include PSK authentication and 802.1X
Link authentication
authentication.
Association AP
Access authentication
User authentication
Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
DHCP Offer
DHCP
DHCP Request
DHCP Ack
User authentication
Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration
AP Onboarding STA Access Data Forwarding
Delivery
User Authentication
User authentication is an end-to-end security architecture, supporting 802.1X, MAC
Scanning address, and Portal authentication modes.
Link authentication
Portal Authentication
User authentication
Page 49 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Data
AP Onboarding STA Access
Delivery Forwarding
1 AP onboarding
DHCP Server AC 2 WLAN service configuration delivery
3 STA access
Page 50 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuration Data
AP Onboarding STA Access
Delivery Forwarding
AP AP AP AP
• In tunnel forwarding mode, APs encapsulate user data packets • In direct forwarding mode, an AP directly forwards user data
over a CAPWAP data tunnel and send them to an AC. The AC packets to an upper-layer network without encapsulating them
then forwards these packets to an upper-layer network. over a CAPWAP data tunnel.
Page 51 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. WLAN Overview
3. WLAN Fundamentals
Page 52 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
[AC-ip-pool-pool1] option code [ sub-option sub-code ] { ascii ascii-string | hex hex-string | cipher cipher-string |
ip-address ip-address
Configure the user-defined option that a DHCP server assigns to a DHCP client.
[AC] wlan
[AC-wlan-view]
Enter the WLAN view.
[AC-wlan-view] regulatory-domain-profile name profile-name
[AC-wlan-regulate-domain-profile-name]
Create a regulatory domain profile and enter the regulatory domain profile view, or enter the view of an existing
regulatory domain profile.
Page 55 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
[AC-wlan-view] ap-id 0
[AC-wlan-ap-0] ap-group ap-group
Add the AP to an AP group.
5. Verify the configuration.
Page 56 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
[AC-wlan-view] ap-id 0
[AC-wlan-ap-0] radio radio-id
[AC-wlan-radio-0]
Page 57 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
Page 58 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
Page 59 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
Page 60 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
Page 61 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
Page 62 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
AP Onboarding WLAN Services
[AC] display vap { ap-group ap-group-name | { ap-name ap-name | ap-id ap-id } [ radio radio-id ] } [
ssid ssid ]
Page 63 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring Layer 2 Tunnel
Forwarding in Off-Path Mode
Data Configuration
IP
Network Management VLAN for APs VLAN 100
Page 64 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network
AP Onboarding WLAN Services
Connectivity
Page 65 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network
AP Onboarding WLAN Services
Connectivity
Page 67 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network
AP Onboarding WLAN Services
Connectivity
Page 68 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network
AP Onboarding WLAN Services
Connectivity
Page 69 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network
AP Onboarding WLAN Services
Connectivity
STA
Page 70 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network
AP Onboarding WLAN Services
Connectivity
Page 71 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network
AP Onboarding WLAN Services
Connectivity
Page 72 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. WLAN Overview
3. WLAN Fundamentals
Page 73 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei WLAN Solutions Meet Future Wireless
Network Construction Requirements
• Use scenario-based customized solutions for complex and diversified application scenarios
All-scenario
• Complete WLAN deployment and management solutions for campus networks and branch networks
• 802.11ac Wave 2 protocol, dual-5G radio coverage, and up to 3.46 Gbps wireless access bandwidth
• Huawei is a key contributor to the next-generation 802.11ax standard (Wi-Fi 6) with a single 5 GHz radio
High bandwidth rate of up to 9.6 Gbps.
• Roaming and multiple wireless QoS protocols such as Wi-Fi multimedia (WMM) to ensure QoS
• Mainstream authentication and encryption modes, such as WPA, WPA2, WPA3, and WAPI
High security • Wireless intrusion detection
• Portal and 802.1X authentication, protecting intranet security
• APs support plug-and-play, automatic upgrade, automatic channel selection, dynamic rate and power
adjustment, and load balancing.
Easy deployment • IoT APs and APs with built-in high-density antennas, simplifying installation and enabling fast deployment
• APs support cloud management and can work in dual-stack mode to smoothly switch between the cloud and
local management modes.
Page 74 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Dual Drivers (Technology Advances + Application
Development) Promote the Arrival of the Wi-Fi 6 Era
October 2018
Wi-Fi standards are
New Wi-Fi naming
upgraded every Wi-Fi 4 Wi-Fi 5 Wi-Fi 6
convention released
four to five years.
by the WFA
4K
Application HD video
Video 4K video Interactive
Social Wireless conferencing conferencing VR/AR
Video E-classroom 3D diagnosis
networking office surveillance
Bandwidth per user: 2 Bandwidth per user: 4 to 12 Mbps Bandwidth per user > 50 Mbps
to 4 Mbps Latency < 30 ms
Latency < 50 ms
Latency < 10 ms
Page 75 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Wi-Fi 6 Vs. Wi-Fi 5
High Bandwidth High Concurrency Rate Low Latency Low Power
Consumption
Frequency
User 1
User 2
User 3
User 4
Time
Rate of up to 9.6 Gbps Access of 1024 STAs per AP Service latency reduced to 20 ms Target wakeup time
Number of concurrent users (TWT) mechanism
Bandwidth increased by 4 times Average latency reduced by 30%
STA power
increased by 4 times
consumption reduced
by 30%
Page 76 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Next-Generation Campus Network: Intent-
Driven Campus (Small- and Medium-Sized)
Basic Concepts
Page 77 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Next-Generation Campus Network: Intent-
Driven Campus (Medium- and Large-Sized)
Internet WAN
Egress Zone
DC
NMS O&M Zone
Native AC Native AC
Core Layer
Architecture Characteristics
iStack/CSS Link
Page 78 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. What are the advantages and disadvantages of in-path and off-path networking modes?
2. (Multiple) Which of the following methods are supported by Fit APs to discover an AC?( )
A. Static discovery
Page 79 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
WLAN technology allows users to easily access a wireless network and freely move
around within the coverage of the wireless network, eliminating the constraints of wired
networks.
Page 80 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 81 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
As economic globalization and digital transformation accelerate, enterprises keep expanding their scales.
More and more branches locate in different regions, with each branch network being considered as a local
area network (LAN). The headquarters and branches need to cross geographical locations to communicate
with each other. To better carry out services, an enterprise needs to connect these geographically
dispersed branches through a wide area network (WAN).
The development of the WAN technologies is accompanied by the continuously increased bandwidth. In
the early stage, X.25 provided only the bandwidth of 64 kbit/s. Later, the digital data network (DDN) and
Frame Relay (FR) increased the bandwidth to 2 Mbit/s. Synchronous digital hierarchy (SDH) and
asynchronous transfer mode (ATM) further increased the bandwidth to 10 Gbit/s. Now, the current IP-based
WANs provide 10 Gbit/s or even higher bandwidth.
This course describes the development history of WAN technologies, especially the implementations and
configurations of Point-to-Point Protocol (PPP) and Point-to-Point Protocol over Ethernet (PPPoE).
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
Understand the basic concepts and development history of WANs.
Understand PPP and PPPoE implementations.
Master basic PPP and PPPoE configurations.
Understand basic MPLS/SR concepts.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Early WAN Technologies
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
What Is a WAN?
A WAN is a network that connects LANs in different areas. A WAN generally covers tens of kilometers to thousands of
kilometers. It can connect multiple regions, cities, and countries, or provide long-distance communication across several
continents, forming an international remote network.
LAN LAN
WAN
Enterprise
DC branch
ISP
HQ
Residential area
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Differences Between a WAN and a LAN
LAN WAN
Remote
Customer office Partner
1 Leased ISP
network
Home office Mobile office
HQ
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Overview of Early WAN Technologies
The early WANs and LANs differ in the data link layer and physical layer and are the same in the other
layers in the TCP/IP reference model.
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
WAN Device Roles
There are three basic roles of WAN devices: customer edge (CE), provider edge (PE), and provider (P).
They are defined as follows:
CE: a device located at the customer premises and connected to one or more PEs for user access.
PE: a service provider's important edge device that is connected to both a CE and a P.
P: a service provider's device that is not connected to any CE.
Enterprise A Enterprise C
CE PE PE CE
Enterprise B Enterprise D
CE PE PE CE
Service provider
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Application of Early WAN Technologies
The early WAN technologies perform different Layer 2 encapsulation at the data link layer for
different types of physical links. PPP, HDLC, and FR are commonly used between CEs and PEs
to implement long-distance transmission of user access packets over a WAN. ATM is commonly
used on ISP backbone networks for high-speed forwarding.
PE PE
PPP/HDLC/FR PPP/HDLC/FR
CE CE
ATM
CE PPP/HDLC/FR PE PE PPP/HDLC/FR
CE
ISP backbone
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Early WAN Technologies
▫ PPP Configuration
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
PPP Introduction
PPP is a common WAN data link layer protocol. It is used for P2P data encapsulation and transmission on full-duplex
links.
PPP provides the Password Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol (CHAP).
PPP features high extensibility. For example, PPP can be extended as Point-to-Point Protocol over Ethernet (PPPoE)
when PPP packets need to be transmitted over an Ethernet.
PPP provides the Link Control Protocol (LCP), which is used to negotiate link layer parameters, such as the maximum
receive unit (MRU) and authentication mode.
PPP provides various Network Control Protocols (NCPs), such as IP Control Protocol (IPCP), for negotiation of network
layer parameters and better support for network layer protocols.
R1 R2
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
R1 R2
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
Establish
1 Link layer negotiation
No
Success? Down
Yes (Opened)
Authenticated required?
No Terminate
Yes
Fail Closing
Pass authentication?
Success
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
0x0021: IP packet
0x8021: IPCP packet
0xC021: LCP packet
0xC023: PAP packet Code Identifier Length Data…
0xC223: CHAP packet
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
Configure-Request 1
2 Configure-Ack
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
PAP authentication requires a two-way handshake. Negotiation packets are transmitted on the link in clear text.
Authenticator Peer
S 1/0/0 PPP S 1/0/0 Configure a username and
Database
10.1.1.1/30 10.1.1.2/30 password for authentication
Username Password on S 1/0/0.
R1 R2
hcia Huawei123
LCP link negotiation succeeds.
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
Static IP address negotiation requires manual configuration of IP addresses at both ends of a link.
10.1.1.1/30 10.1.1.2/30
R1 R2
1 Configure-Request (10.1.1.1)
1. Sends a Configure-Request packet
carrying the local IP address.
Configure-Ack 2
2. Verifies that the peer IP
address is valid.
Configure-Request (10.1.1.2) 1
2 Configure-Ack
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Feature LCP Authentication NCP
Link Setup
Introduction Negotiation Negotiation Negotiation
10.1.1.2/30
R1 R2
1 Configure-Request (0.0.0.0)
1. Sends a Configure-Request packet
to notify the peer end that it has no
Configure-Nak (10.1.1.1) 2
available IP address. 2. Determines that the peer IP
address is invalid and returns an IP
3 Configure-Request (10.1.1.1) address for negotiation.
3. Resends a Configure-Request
packet that carries the negotiated
IP address. Configure-Ack 4
4. Verifies that the peer IP address
is valid.
Configure-Request (10.1.1.2) 5
5. Sends a Configure-Request packet
carrying the local IP address.
6. Verifies that the peer IP address 6 Configure-Ack
is valid.
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Early WAN Technologies
▪ PPP Configuration
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuring Basic PPP Functions
1. Encapsulate an interface with PPP.
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuring PAP Authentication
1. Configure an authenticator to authenticate a peer using the PAP mode.
Before configuring the authenticator to authenticate a peer using the PAP mode, add the username and password of
the peer to the local user list in the AAA view. Then select the PAP authentication mode.
This command configures the peer to send its username and password to the authenticator.
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuring CHAP Authentication
1. Configure an authenticator to authenticate a peer using CHAP mode.
This command configures a local username and a password for CHAP authentication.
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring PAP Authentication
Configurations on R1
[R1]aaa # Add information about the user to be authenticated.
Authenticator Peer [R1-aaa]local-user huawei password cipher huawei123
PPP
S 1/0/0 S 1/0/0 [R1-aaa]local-user huawei service-type ppp
10.1.1.1/30 10.1.1.2/30 # Specify the service type of the user to be authenticated.
R1 R2
[R1]interface Serial 1/0/0
[R1-Serial1/0/0]link-protocol ppp
[R1-Serial1/0/0]ppp authentication-mode pap
# Set the authentication mode to PAP.
Experiment requirements:
[R1-Serial1/0/0]ip address 10.1.1.1 30
1. Enable PAP authentication on the PPP link
Configurations on R2
between R1 and R2.
[R2]interface Serial 1/0/0
2. Configure R1 as the authenticator. [R2-Serial1/0/0]link-protocol ppp
3. Configure R2 as the peer. [R2-Serial1/0/0]ppp pap local-user huawei password cipher
huawei123 # Add user information for PPP authentication.
[R2-Serial1/0/0]ip address 10.1.1.2 30
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring CHAP Authentication
Configurations on R1
[R1]aaa # Add information about the user to be authenticated.
Authenticator PPP Peer [R1-aaa]local-user huawei password cipher huawei123
S 1/0/0 S 1/0/0 [R1-aaa]local-user huawei service-type ppp
10.1.1.1/30 10.1.1.2/30 # Specify the service type of the user to be authenticated.
R1 R2
[R1]interface Serial 1/0/0
[R1-Serial1/0/0]link-protocol ppp
[R1-Serial1/0/0]ppp authentication-mode chap
# Set the authentication mode to CHAP.
Experiment requirements:
1. Enable CHAP authentication on the PPP link Configurations on R2
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Early WAN Technologies
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
PPPoE Session Packet PPPoE PPPoE PPPoE
Overview Establishment Format Discovery Session Termination
What Is PPPoE?
PPP over Ethernet (PPPoE) is a link layer protocol that encapsulates PPP frames into Ethernet frames. PPPoE enables
multiple hosts on an Ethernet to connect to a broadband remote access server (BRAS).
PPPoE integrates the advantages of Ethernet and PPP. It has the flexible networking advantage of Ethernet and can use
PPP to implement authentication and accounting.
PPP frame structure Flag Address Control Protocol Information FCS Flag
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
PPPoE Session Packet PPPoE PPPoE PPPoE
Overview Establishment Format Discovery Session Termination
PPPoE is usually used by home users and enterprise users to dial up to access the Internet.
After installed with PPPoE client dial-up software, each
PPPoE client host becomes a PPPoE client and establishes a
PPPoE session with the PPPoE server. Each host uses
PC-A a unique account, which facilitates user accounting and
control by the carrier.
PPPoE client
PC-B
Internet
...
PPPoE server
PPPoE client
PC-C
PPPoE
packets
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
PPPoE Session Packet PPPoE PPPoE PPPoE
Overview Establishment Format Discovery Session Termination
3 PPPoE termination PPPoE The user goes offline, and the client or server then
disconnection terminates the connection.
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
PPPoE Session Packet PPPoE PPPoE PPPoE
Overview Establishment Format Discovery Session Termination
PPPoE Packets
A PPPoE session is established by exchanging different PPPoE packets. The PPPoE packet structure and common
packet types are as follows.
6 bytes 6 bytes 2 bytes 6 bytes 40–1494 bytes 4 bytes
Cod
Name Content
e
0x09 PADI PPPoE Active Discovery Initiation packet
0x07 PADO PPPoE Active Discovery Offer packet
0x19 PADR PPPoE Active Discovery Request packet
0x65 PADS PPPoE Active Discovery Session-confirmation packet
0xa7 PADT PPPoE Active Discovery Terminate packet
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
PPPoE Session Packet PPPoE PPPoE PPPoE
Overview Establishment Format Discovery Session Termination
• The client broadcasts a requested service. PPPoE server C • Multiple servers may be available to provide the service.
PPPoE server C
Step 4 Step 3
Session ID
PADS PPPoE server A PADR PPPoE server A
PPPoE server C • The client preferentially selects the first received service PPPoE server C
• The server assigns a session ID to the client to establish a session. response and sends a service request.
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
PPPoE Session Packet PPPoE PPPoE PPPoE
Overview Establishment Format Discovery Session Termination
PPPoE server C
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
PPPoE Session Packet PPPoE PPPoE PPPoE
Overview Establishment Format Discovery Session Termination
PPPoE server C
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Early WAN Technologies
▫ PPPoE Overview
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Configuring Basic PPPoE Functions
1. Configure a dialer rule and set conditions for initiating a PPPoE session under the rule.
[Huawei] dialer-rule
Configure a username on the dialer interface. The username must be the same as that of the peer server.
[Huawei-Dialer1]dialer-bundle number
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring a PPPoE Client (1)
R1 R2 [R1-dialer-rule]dialer-rule 1 ip permit
[R1-dialer-rule]quit
[R1]interface dialer 1
[R1-Dialer1] dialer user enterprise
[R1-Dialer1] dialer-group 1
Experiment requirements: [R1-Dialer1] dialer bundle 1
1. Configure R1 as a PPPoE client and R2 as a PPPoE server. [R1-Dialer1] ppp chap user huawei1
2. Configure a dialer interface for the PPPoE client on R1.
[R1-Dialer1] ppp chap password cipher huawei123
3. Configure the authentication function on the dialer interface
[R1-Dialer1] ip address ppp-negotiate
on R1.
4. The dialer interface on R1 can obtain the IP address
allocated by the PPPoE server.
5. R1 can access the server through the dialer interface.
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring a PPPoE Client (2)
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example for Configuring a PPPoE Server
1. Create an address pool and a virtual template.
[R2]ip pool pool1 # Create an address pool and specify the range of
PPPoE client PPPoE server the IP addresses to be allocated and a gateway.
GE 0/0/1 GE 0/0/0 [R2-ip-pool-pool1]network 192.168.1.0 mask 255.255.255.0
[R2-ip-pool-pool1]gateway-list 192.168.1.254
R1 R2 [R2]interface Virtual-Template 1 # Create a virtual template interface.
[R2-Virtual-Template1]ppp authentication-mode chap
[R2-Virtual-Template1]ip address 192.168.1.254 255.255.255.0
[R2-Virtual-Template1]remote address pool pool1
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Verifying the Configuration
1. Check detailed information about the dialer interface. 2. Check the initial status of the PPPoE session on the client.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Overview of Early WAN Technologies
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Evolution of WAN Technologies
The data link layer protocols commonly used on early WANs include PPP, HDLC, and ATM. With the network evolution
towards all-IP, the IP-based Internet becomes popular. However, the IP technology based on the longest match rule
must use software to search for routes, resulting in low forwarding performance, which has become the bottleneck that
restricts the network development.
Multiprotocol Label Switching (MPLS) was originally proposed to improve the forwarding speeds of routers. Compared
with the traditional IP routing mode, MPLS parses IP packet headers only at the network edges during data forwarding.
Transit nodes forward packets based on labels, without the need to parse IP packet headers. This speeds up software
processing.
With the improvement of router performance, the route search speed is no longer a bottleneck for network development.
Thus, MPLS loses its advantage in fast forwarding speed. However, leveraging support for multi-layer labels and a
connection-oriented forwarding plane, MPLS is widely applied in various scenarios, such as virtual private network
(VPN), traffic engineering (TE), and quality of service (QoS) scenarios. MPLS apllied
VPN
QoS
TE
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Traditional IP Routing and Forwarding
Traditional IP forwarding uses hop-by-hop forwarding. Each time a data packet passes through a router, the router
decapsulates the packet to check the network layer information and searches its routing table based on the longest
match rule to guide packet forwarding. The repeat process of decapsulating packets, searching routing tables, and re-
encapsulating the packets on routers lead to low forwarding performance.
• Characteristics of traditional IP routing and forwarding:
IP address
PC1:192.168.1.1/24 PC2:192.168.2.1/24
Data
▫ All routers need to know the network-wide routes.
IP address
IP address
Data
Data ▫ Traditional IP forwarding is connectionless-oriented and
IP address
IP address
R3 Data cannot provide good end-to-end QoS guarantee.
Data
IGP
G0/0/2 R1 routing table
R1 R2 R5 R6
Destination/Mask Protocol Preference Cost NextHop Interface
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MPLS Label-based Forwarding
PC1:192.168.1.1/24
MPLS label 2
PC2:192.168.2.1/24
MPLS is used on IP backbone networks.
IP address
MPLS label 1
Data MPLS is a tunneling technology that provides
IP address
Data
IP address connection-oriented switching for the network layer
Data
IP address
IP address based on IP routing and control protocols. It provides
Data
R3 Data
P node better QoS guarantee.
Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
MPLS Forwarding Problems
MPLS labels can be statically or dynamically distributed. The involved problems are as follows:
Static label distribution requires manual configuration. As the network scale expands, network topologies are prone to change. Static label configuration
cannot meet the requirements of large-scale networks.
Some dynamic label distribution protocols do not have the path computation capability and need to use IGPs to compute paths. In addition, the control
planes of these protocols are complex, requiring devices to send a large number of messages to maintain peer and path status, wasting link bandwidth and
device resources. What is more, despite supporting TE, some label distribution protocols require complex configurations and do not support load balancing.
Devices have to send a large number of protocol packets to maintain proper paths. In addition, as devices are independent and know only their own status,
they need to exchange signaling packets, which also waste link bandwidth and device resources.
R2
IGP
R5 R1 R3 R6
R4
IGP
MPLS domain Label distribution protocol
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to Segment Routing
To solve the problems facing traditional IP forwarding and MPLS forwarding, the industry proposed
Segment Routing (SR). SR makes the following improvements:
1. Extends the existing protocols.
The extended IGPs and BGP have the label distribution capability, eliminating the need for other label distribution protocols on
networks, and thereby simplifying protocols.
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SR Forwarding Implementation (1)
SR divides a network path into segments and assigns segment IDs (SIDs) to these segments.
SIDs are allocated to forwarding nodes or adjacency links. In this example, SIDs of the forwarding nodes
are expressed in 1600X, where X is a node ID; SIDs of the adjacency links are expressed in 160XX, where
XX indicates the node IDs at both ends of a link.
SID: 16003
R3
R1 R2 R5 R6
R4 MPLS
Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SR Forwarding Implementation (2)
SIDs of adjacency links and network nodes are arranged in order to form a segment list, which represents
a forwarding path. The segment list is encoded by the source node in a header of a data packet, and is
transmitted with the data packet. The essence of SR is instructions, which guide where and how packets
go.
16003
16035 SID: 16003
16005 R3
IP address
Data
SID: 16005
R1 R2 R5 R6
R4 MPLS
Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SR Deployment Modes
SR can be deployed with or without a controller. If a controller is used, the controller collects information,
reserves path resources, computes paths, and delivers the results to the source node. This mode is
preferred.
PCEP
CLI
R2 R2
R1 R4 R3 R1 R4 R3
Page 49 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SR Application
SR can be used to easily specify packet forwarding paths. On a live network, different paths can be defined for different
services. In this example, three explicit paths are defined to implement the service-driven network: one each for data
download, video, and voice services. Devices are managed by the controller, which can quickly provision paths in real
time.
NETCONF
High-bandwidth path
PCEP
Low-latency path
Data download
Video
Voice
Page 50 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Multiple) Which of the following statements about PPP are true?
A. PPP supports the bundling of multiple physical links into a logical link to increase the bandwidth.
D. PPP supports asynchronous and synchronous links for the physical layer.
2. (Single) After a PPPoE client sends a PADI packet to PPPoE servers, the PPPoE servers reply with a
PADO packet. Which kind of frame is the PADO packet?
A. A. Multicast B. Broadcast C. Unicast D. Anycast
3. (Single) Which of the following values of the Length/Type field in an Ethernet data frame indicates that the
Ethernet data frame carries PPPoE discovery packets?
A. A. 0x0800 B. 0x8864 C. 0x8863 D. 0x0806
Page 51 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
This course reviews the types and applications of early WAN technologies and describes the evolution of
WANs from the early circuit switching networks to IP networks, MPLS label switching network, and finally to
SR networks. With the development of network technologies, networks become more efficient and
intelligent.
The course also describes the implementation of PPP, including parameter negotiation during PPP link
establishment, authentication negotiation, and network layer negotiation. It analyzes in detail two PPP
authentication protocols – PAP and CHAP, and describes their working processes and differences.
PPPoE is the most widely used PPP application. By analyzing how a PPPoE session is discovered,
negotiated, established, and torn down, this course help you better understand the working mechanism
and configuration of PPPoE.
Page 52 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
More Information
(Multimedia) Segment Routing MPLS Advanced Series
https://support.huawei.com/carrier/docview?nid=DOC1100645168&path=PBI1-7275726/PBI1-
21782273/PBI1-7275849/PBI1-7276518/PBI1-15837
Page 53 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 54 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
• Network management and O&M is classified as software management or hardware
management.
• Note:
▫ Web system: The built-in web server of the device provides a graphical user
interface (GUI). You need to log in to the device to be managed from a terminal
through Hypertext Transfer Protocol Secure (HTTPS).
▫ CLI mode: You can log in to a device through the console port, Telnet, or SSH to
manage and maintain the device. This mode provides refined device
management but requires that users be familiar with command lines.
▫ There are various types of network devices and the management interfaces (such
as command line interfaces) provided by different vendors vary from each other,
making network management more complex.
• There are three SNMP versions: SNMPv1, SNMPv2c, and SNMPv3.
▫ In May 1990, RFC 1157 defined the first SNMP version: SNMPv1. RFC 1157
provides a systematic method for monitoring and managing networks. SNMPv1
implements community name-based authentication, failing to provide high
security. In addition, only a few error codes are returned in SNMPv1 packets.
▫ In 1996, the Internet Engineering Task Force (IETF) released RFC 1901 in which
SNMPv2c is defined. SNMPv2c provides enhancements to standard error codes,
data types (Counter 64 and Counter 32), and operations including GetBulk and
Inform.
▫ Public MIBs: defined by RFCs and used for structure design of public protocols
and standardization of interfaces. Most vendors need to provide SNMP interfaces
according to the specifications defined in RFCs.
▫ Private MIBs: They are the supplement of the public MIBs. Some enterprises need
to develop private protocols or special functions. The private MIBs are designed
to enable the SNMP interface to manage such protocols or functions. They also
help the NMS provided by the third party to manage devices. For example, the
MIB object of Huawei is 1.3.6.1.4.1.2011.
• The maximum access permission of a MIB object indicates the operations that the
NMS can perform on the device through the MIB object.
• When generating a trap, the device reports the type of the current trap together with
some variables. For example, when sending a linkDown trap, the device also sends
variables such as the interface index and current configuration status of the involved
interface.
▫ ifAdminStatus: indicates the administrative status, that is, whether the interface
is shut down. 1 indicates that the interface is not shut down, and 2 indicates that
the interface is shut down.
▫ ifOperStasuts: indicates the current operating status of the interface, that is, the
link layer protocol status of the interface. The value 1 indicates Up, 2 indicates
Down.
▫ Get-Request: The NMS extracts one or more parameter values from the MIB of
the agent process on the managed device.
▫ Get-Next-Request: The NMS obtains the next parameter value from the MIB of
the agent process in lexicographical order.
▫ Set-Request: The NMS sets one or more parameter values in the MIB of the
agent process.
▫ Response: The agent process returns one or more parameter values. It is the
response to the first three operations.
▫ Trap: The agent process sends messages to the NMS to notify the NMS of critical
or major events.
• SNMPv2c supports the following operations:
▫ GetBulk: equals to multiple GetNext operations. You can set the number of
GetNext operations to be included in one GetBulk operation.
▫ Inform: A managed device proactively sends traps to the NMS. In contrast to the
trap operation, the inform operation requires an acknowledgement. After a
managed device sends an InformRequest message to the NMS, the NMS returns
an InformResponse message. If the managed device does not receive the
acknowledgment message, it temporarily saves the trap in the Inform buffer and
resends the trap until the NMS receives the trap or the number of retransmission
times reaches the maximum.
• SNMPv3 supports identity authentication and encryption.
▫ Identity authentication: A process in which the agent process (or NMS) confirms
whether the received message is from an authorized NMS (or agent process) and
whether the message is changed during transmission.
▫ Encryption: The header data and security parameter fields are added to SNMPv3
messages. For example, when the management process sends an SNMPv3 Get-
Request message carrying security parameters such as the username, key, and
encryption parameters, the agent process also uses an encrypted response
message to respond to the Get-Request message. This security encryption
mechanism is especially applicable to a scenario in which data needs to be
transmitted through a public network between the management process and
agent process.
• One zettabyte (abbreviated "ZB") is equal to 1012 GB.
180trillion
• iMaster NCE provides the following key capabilities:
▫ Intelligent closed-loop management based on big data and AI: iMaster NCE
constructs a complete intelligent closed-loop system based on its intent engine,
automation engine, analytics engine, and intelligence engine. It also uses
telemetry to collect and aggregate massive volumes of network data. This allows
it to determine the network status in real time. iMaster NCE provides big data-
based global network analysis and insights through unified data modeling, and is
equipped with Huawei's sophisticated AI algorithms accumulated during its 30
years in the telecom industry. It provides automated closed-loop analysis,
forecast, and decision-making based on customers' intents. This helps improve
user experience and continuously enhance network intelligence.
• NETCONF client: manages network devices using NETCONF. Generally, the NMS
functions as the NETCONF client. It sends <rpc> elements to a NETCONF server to
query or modify configuration data. The client can learn the status of a managed
device based on the traps and events reported by the server.
▫ OpenConfig YANG
▫ It can be converted to the YANG Independent Notation (YIN) model based on the
XML syntax without any loss.
2. C
3. A
4. A
Foreword
In the 1980s, the Internet Engineering Task Force (IETF) released RFC 791 – Internet
Protocol, which marks the standardization of IPv4. In the following decades, IPv4 has
become one of the most popular protocols. Numerous people have developed various
applications based on IPv4 and made various supplements and enhancements to IPv4,
enabling the Internet to flourish.
However, with the expansion of the Internet and the development of new technologies
such as 5G and Internet of Things (IoT), IPv4 faces more and more challenges. It is
imperative to replace IPv4 with IPv6.
This course describes the reasons for IPv4-to-IPv6 transition and basic IPv6
knowledge.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
▫ Summarize the advantages of IPv6 over IPv4.
▫ Describe the method and basic procedure for configuring IPv6 addresses.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. IPv6 Overview
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv4 Status
On February 3, 2011, the Internet Assigned Numbers Authority (IANA) announced even allocation of its last
4.68 million IPv4 addresses to five Regional Internet Registries (RIRs) around the world. The IANA
thereafter had no available IPv4 address.
?
RIPE: announced IPv4 ARIN: announced IPv4
IPv6
address exhaustion address exhaustion
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Why IPv6?
IPv4 IPv6
...
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Advantages
Nearly infinite address The 128-bit address length provides numerous addresses, meeting the requirements of emerging services such as
space the IoT and facilitating service evolution and expansion.
Hierarchical address IPv6 addresses are allocated more properly than IPv4 addresses, facilitating route aggregation (reducing the size of
structure IPv6 routing tables) and fast route query.
Plug-and-play IPv6 supports stateless address autoconfiguration (SLAAC), simplifying terminal access.
Simplified packet The simplified packet header improves forwarding efficiency. New applications can be supported using extension
header headers, which facilitate the forwarding processing of network devices and reduce investment costs.
IPsec, source address authentication, and other security features ensure E2E security, preventing NAT from
Security features damaging the integrity of E2E communication.
Enhanced QoS A Flow Label field is additionally defined and can be used to allocate a specific resource for a special service and data
features flow.
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic IPv6 Header
An IPv6 header consists of a mandatory basic IPv6 header and optional extension headers.
The basic header provides basic information for packet forwarding and is parsed by all devices on a
forwarding path.
IPv4 packet header (20–60 bytes) Basic IPv6 header (40 bytes)
Destination Address
Destination Address
Options Padding
Name/Location
Deleted Reserved New
changed
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Extension Header
Traffic • Extension Header Length: 8 bits long. This
Version Flow Label
Class field indicates the extension header length
excluding the length of the Next Header field.
Next 40 • Extension Header Data: variable length. This
Payload Length Hop Limit
Header bytes field indicates the payload of the extension
headers and is a combination of a series of
Source Address (128 bits) options and padding fields.
Destination Address (128 bits)
Basic IPv6 Header
Next Header Extension Header Length Next Header=0 (Hop-by-Hop Options Header)
Variable
length IPv6 Hop-by-Hop Options Header
Extension Header Data Next Header=51 (Authentication Header)
IPv6 Authentication Header
Next Header Extension Header Length Variable Next Header=6 (TCP)
Extension Header Data length
TCP Data Segment
... IPv6 packet example
Data
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Packet Processing Mechanism
Basic IPv6 Header Basic IPv6 Header Basic IPv6 Header
Next Header=0 (Hop-by-Hop Next Header=0 (Hop-by-Hop Options Next Header=0 (Hop-by-Hop
Options Header) Header) Options Header)
IPv6 Hop-by-Hop Options Header IPv6 Hop-by-Hop Options Header IPv6 Hop-by-Hop Options Header
Next Header=51 (Authentication Next Header=51 (Authentication Header) Next Header=51 (Authentication
Header) Header)
IPv6 Authentication Header
IPv6 Authentication Header Next Header=6 (TCP) IPv6 Authentication Header
Next Header=6 (TCP) Next Header=6 (TCP)
TCP Data Segment
TCP Data Segment TCP Data Segment
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Address
The length of an IPv6 address is 128 bits. Colons are generally used to divide the IPv6 address into eight
segments. Each segment contains 16 bits and is expressed in hexadecimal notation.
The letters in an IPv6 address are case insensitive. For example, A is equivalent to a.
• Similar to an IPv4 address, an IPv6 address is expressed in the format of IPv6 address/mask length.
▫ Example: 2001:0DB8:2345:CD30:1230:4567:89AB:CDEF/64
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Address Abbreviation Specifications
For convenience, IPv6 can be abbreviated according to the following rules.
Abbreviation Specifications Abbreviation Examples
2001 : 0DB8 : 0000 : 0000 : 0008 : 0800 : 200C : 417A Before 0000:0000:0000:0000:0000:0000:0000:0001
The leading 0s in each 16-bit segment can be omitted. However, if all bits After ::1
in a 16-bit segment are 0s, at least one 0 must be reserved. The tailing 0s
cannot be omitted.
Before 2001:0DB8:0000:0000:FB00:1400:5000:45FF
After 2001:DB8::FB00:1400:5000:45FF
2001 : DB8 : 0 : 0 : 8 : 800 : 200C : 417A
If one or more consecutive 16-bit segments contain only 0s, a double Before 2001:0DB8:0000:0000:0000:2A2A:0000:0001
colon (::) can be used to represent them, but only one :: is allowed in an After 2001:DB8::2A2A:0:1
entire IPv6 address.
Before 2001:0DB8:0000:1234:FB00:0000:5000:45FF
2001 : DB8 :: 8 : 800 : 200C : 417A
After 2001:DB8::1234:FB00:0:5000:45FF
If an abbreviated IPv6 address contains two double colons (::), the IPv6
address cannot be restored to the original one. or 2001:DB8:0:1234:FB00::5000:45FF
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Address Classification
IPv6 addresses are classified into unicast, multicast, and anycast addresses according
to the IPv6 address prefix. No broadcast addresses
IPv6 are defined in IPv6.
addresses
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Unicast IPv6 Multicast IPv6 Anycast
Address Address Address
▫ Interface ID: consists of (128 – n) bits and is parallel to the host ID of an IPv4 address.
Common IPv6 unicast addresses, such as GUAs and LLAs, require that the network
prefix and interface ID be 64 bits.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Unicast IPv6 Multicast IPv6 Anycast
Address Address Address
EUI-64 is most commonly used. It converts the MAC address of an interface into an IPv6 interface ID.
EUI-64 ID
(binary) 00111110-10010010-10000010-11111111-11111110-01001001-01111110-10011101
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Unicast IPv6 Multicast IPv6 Anycast
Address Address Address
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Unicast IPv6 Multicast IPv6 Anycast
Address Address Address
Generated using a
pseudo-random algorithm
• ULAs use the FC00::/7 address segment, among
which, only the FD00::/8 address segment is currently
used. FC00::/8 is reserved for future expansion.
• Although a ULA is valid only in a limited range, it also
has a globally unique prefix (generated using a
pseudo-random algorithm, low conflict probability).
FD00:1AC0:872E::1/6 FD00:1AC0:872E::2/6 FD00:2BE1:2320::1/6
4 4 4
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Unicast IPv6 Multicast IPv6 Anycast
Address Address Address
IPv6
10 bit 54 bit 64 bit
Internet
1111 1110 10 0 Interface ID
Fixed at 0
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Unicast IPv6 Multicast IPv6 Anycast
Address Address Address
An IPv6 multicast address can be used only as the destination address of IPv6 packets.
Multicast
source
8 bits 4 bits 4 bits 80 bits 32 bits Multicast
11111111 Flags Scop Reserved (must be 0) Group ID Network
e
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Unicast IPv6 Multicast IPv6 Anycast
Address Address Address
64 bits 64 bits
IPv6 unicast or
anycast IPv6 Address Prefix Interface ID
address
24 bits
copied
Corresponding
FF02 0000 0000 0000 0000 0001 FF
solicited-node
multicast address 104 bits (fixed prefix) 24 bits
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Unicast IPv6 Multicast IPv6 Anycast
Address Address Address
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. IPv6 Overview
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
IPv6 Addresses of Hosts and Routers
The unicast IPv6 addresses and multicast addresses of hosts and routers are typically as follows:
Network
LLA of the network adapter FE80::2E0:FCFF:FE35:7287 LLA of the network adapter FE80::2E0:FCFF:FE99:1285
GUA assigned by an
GUA assigned by an 2001::2
2001::1 administrator
administrator
Loopback address ::1
Loopback address ::1
Multicast addresses of all
FF01::1 and FF02::1
Multicast addresses of all nodes
FF01::1 and FF02::1
nodes Multicast addresses of all
FF01::2 and FF02::2
Solicited-node multicast routers
address corresponding to each FF02::1:FF35:7287 Solicited-node multicast
unicast address of the network FF02::1:FF00:1 address corresponding to each FF02::1:FF99:1285
adapter unicast address of the network FF02::1:FF00:2
adapter
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Service Process of IPv6 Unicast Addresses
Before sending IPv6 packets, an interface undergoes address configuration, DAD, and address resolution.
During this process, the Neighbor Discovery Protocol (NDP) plays an important role.
Similar to ARP requests in IPv4,
GUAs and LLAs are the most common ICMPv6 messages are used to
IPv6 unicast addresses on an DAD is similar to gratuitous ARP in IPv4 and is
used to detect address conflicts. generate the mappings between IPv6
interface. Multiple IPv6 addresses can addresses and data link layer
be configured on one interface. addresses (usually MAC addresses).
IPv6
Address data
DAD Address resolution
configuration forwarding
GUA LLA
Manual Manual
configuration configuration
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NDP
NDP is defined in RFC 2461, which was replaced by RFC 4861.
NDP uses ICMPv6 messages to implement its functions.
ICMPv6 messages used by
NDP
SLAAC Prefix ICMPv6 Type Message Name
advertisement 133 Router Solicitation (RS)
NDP DAD 134 Router Advertisement (RA)
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Dynamic Address Address
DAD
Configuration Resolution
DHCPv6 interaction
• Through DHCPv6 message exchange, the DHCPv6 server automatically configures IPv6 addresses/prefixes and other
network configuration parameters (such as DNS, NIS, and SNTP server addresses).
ICMPv6 RA
(My interface address prefix is 2000::/64.)
• The PC generates a unicast address based on the address prefix in the RA and the locally generated 64-bit interface ID
(for example, using EUI-64).
• Only IPv6 addresses can be obtained. Parameters such as NIS and SNTP server parameters cannot be obtained.
DHCPv6 or manual configuration is required to obtain other configuration information.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Dynamic Address Address
DAD
Configuration Resolution
DAD
Regardless of how an IPv6 unicast address is configured, a host or router:
▫ Performs DAD through ICMPv6 messages.
ICMPv6 NS ICMPv6 NA
P 2
R
1
C 1
New online Source 5489-98C8-1111 Source 5489-9850-2222 Already online
device Destination 3333-FF00-FFFF Destination 3333-0000-0001 device
Source ::
Source 2001::FFFF
Destination
Destination FF02::1
FF02::1:FF00:FFFF
ICMPv6 (Type135) NS ICMPv6 (Type136) NA
Target: 2001::FFFF
Target: 2001::FFFF
MAC 5489-9850-2222
3 [DUPLICATE]
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Dynamic Address Address
DAD
Configuration Resolution
Address Resolution
IPv6 uses ICMPv6 NS and NA messages to replace the address resolution function of ARP in IPv4.
2001::1/64 2001::2/64
5489-98C8-1111 5489-9850-2222
Requests the MAC address
corresponding to 2001::2/64.
P 1 2 R
Responds
C 1
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. IPv6 Overview
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic IPv6 Configurations (1)
1. Enable IPv6.
[Huawei] ipv6
Enable the device to send and receive IPv6 unicast packets, including local IPv6 packets.
[Huawei-GigabitEthernet0/0/0] ipv6 enable
Enable IPv6 on the interface in the interface view.
2. Configure an LLA for the interface.
[Huawei-GigabitEthernet0/0/0] ipv6 address ipv6-address link-local
[Huawei-GigabitEthernet0/0/0] ipv6 address auto link-local
Configure an LLA for the interface manually or automatically in the interface view.
3. Configure a GUA for the interface.
[Huawei-GigabitEthernet0/0/0] ipv6 address { ipv6-address prefix-length | ipv6-address/prefix-length }
[Huawei-GigabitEthernet0/0/0] ipv6 address auto { global | dhcp }
Configure a GUA for the interface manually or automatically (stateful or stateless) in the interface view.
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic IPv6 Configurations (2)
4. Configure an IPv6 static route.
By default, a Huawei router's interfaces do not send ICMPv6 RA messages. In this situation, other devices on the
links connected to the interfaces cannot perform SLAAC.
To perform SLAAC, you need to manually enable the function of sending RA messages.
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example: Configuring a Small IPv6 Network (1)
R3 1. Enable IPv6 globally and on related interfaces of R1, R2,
GE 0/0/0
Using DHCPv6 R3, and R4, and enable the interfaces to automatically
2002::1/64 generate LLAs. The following uses R1 configurations as an
GE 0/0/0
example.
GE 1/0/0
R2 2001::2/64 [R1]ipv6
GE 0/0/0
[R1]interface GigabitEthernet 0/0/0
GE 0/0/1 2001::1/64
R1 [R1-GigabitEthernet0/0/0]ipv6 enable
2003::1/64
[R1-GigabitEthernet0/0/0]ipv6 address auto link-local
GE 0/0/0
SLAAC
R4 2. Configure static IPv6 GUAs on the related interfaces of
IPv6 network
• Configuration Requirements
R1 and R2.
[R1]interface GigabitEthernet 0/0/0
▫ Connect R1 and R2 through interfaces with static IPv6
[R1-GigabitEthernet0/0/0]ipv6 address 2001::1 64
addresses.
▫ Configure R2 as a DHCPv6 server to assign a GUA to
GE 0/0/0 of R3. [R2]interface GigabitEthernet 1/0/0
[R2-GigabitEthernet1/0/0]ipv6 address 2001::2 64
▫ Enable R2 to send RA messages, and configure GE [R2-GigabitEthernet1/0/0]interface GigabitEthernet 0/0/0
0/0/0 of R4 to automatically perform SLAAC based on [R2-GigabitEthernet0/0/0]ipv6 address 2002::1 64
the RA messages sent by R2. [R2-GigabitEthernet0/0/0]interface GigabitEthernet 0/0/1
▫ Configure static routes to implement mutual access [R2-GigabitEthernet0/0/1]ipv6 address 2003::1 64
between the devices.
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example: Configuring a Small IPv6 Network (2)
R3
GE 0/0/0 3. Configure R2 as a DHCPv6 server. Configure the related
Using DHCPv6
2002::1/64 interface of R3 to obtain a GUA using DHCPv6.
GE 0/0/0
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example: Configuring a Small IPv6 Network (3)
R3 4. Enable R2 to advertise RA messages. Enable R4 to
GE 0/0/0
Using DHCPv6 obtain an address through SLAAC based on the RA
2002::1/64
GE 0/0/0 messages sent by R2.
GE 1/0/0
R2 [R2]interface GigabitEthernet 0/0/1
2001::2/64 GE 0/0/0
GE 0/0/1 2001::1/64 [R2-GigabitEthernet0/0/1]undo ipv6 nd ra halt
R1
2003::1/64
GE 0/0/0
SLAAC [R4]interface GigabitEthernet 0/0/0
R4
IPv6 network [R4-GigabitEthernet0/0/0]ipv6 address auto global
• Configuration Requirements
▫ Connect R1 and R2 through interfaces with static IPv6
addresses.
▫ Configure R2 as a DHCPv6 server to assign a GUA to
GE 0/0/0 of R3.
▫ Enable R2 to send RA messages, and configure GE
0/0/0 of R4 to automatically perform SLAAC based on
the RA messages sent by R2.
▫ Configure static routes to implement mutual access
between the devices.
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Example: Configuring a Small IPv6 Network (4)
R3
GE 0/0/0 5. Configure static routes on R4.
Using DHCPv6
2002::1/64
GE 0/0/0 [R4]ipv6 route-static 2001:: 64 2003::1
[R4]ipv6 route-static 2002:: 64 2003::1
GE 1/0/0
R2 2001::2/64 GE 0/0/0
GE 0/0/1 2001::1/64 6. Configure an aggregated static route on R1.
R1
2003::1/64
GE 0/0/0 [R1]ipv6 route-static 2002:: 15 2001::2
SLAAC
R4
IPv6 network
• Configuration Requirements 7. Configure a default route on R3.
▫ Connect R1 and R2 through interfaces with static IPv6
addresses. [R3]ipv6 route-static :: 0 2002::1
▫ Configure R2 as a DHCPv6 server to assign a GUA to
GE 0/0/0 of R3.
▫ Enable R2 to send RA messages, and configure GE
0/0/0 of R4 to automatically perform SLAAC based on
the RA messages sent by R2.
▫ Configure static routes to implement mutual access
between the devices.
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. What is the most abbreviated form of the IPv6 address
2001:0DB8:0000:0000:032A:0000:0000:2D70?
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
A fixed 40-byte basic packet A basic header containing the Options field to
Packet format
header+variable-length extension headers support extended features
Address type Unicast, multicast, and anycast Unicast, multicast, and broadcast
Address
Static, DHCP, and SLAAC Static and DHCP
configuration
Address
ICMPv6 ARP
resolution
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
The open ecosystem of the computing industry brings booming development of multiple
fields, such as Commercial Off-the-Shelf (COTS), operating system, virtualization,
middleware, cloud computing, and software applications. The network industry is also
seeking transformation and development. Software Defined Networking (SDN) and
Network Functions Virtualization (NFV) are mainly used.
This course aims to help engineers understand the development of SDN and NFV and
introduce Huawei SDN and NFV solutions.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
Upon completion of this course, you will be able to:
▫ Describe the development of SDN and NFV.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. SDN Overview
2. NFV Overview
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Evolution of the Computer Era
Mainframe PC (compatible)
App
Open interface
Dedicated application
Windows Mac
or Linux or
Dedicated OS (OS) OS
Microprocessorr
Vertical integration and closed interfaces Horizontal integration and open interfaces
Small-scale industry applications Large-scale application across industries
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Industry Development: Implications
from the IT Industry
The transformation of the IT industry has triggered the thinking of the network industry. The industry has proposed the
SDN concept and has made attempts to put SDN into commercial use, aiming to make networks more open, flexible,
and simple.
Computing Industry Openness Promotes Ecosystem Development What About Network Industry Changes
operating systems,
OS middleware, database
FusionSphere Network application
software, etc.
Virtualization …
SDN controller
Server, storage Storage array PC …
device, PC x86/ARM server Hardware network device
…
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Current Situation of the Network Industry:
Typical IP Network - Distributed Network
The typical IP network is a distributed network with peer-to-peer control. Each network device has independent
forwarding, control, and management planes. The control plane of a network device exchanges packets of a routing
protocol to generate an independent data plane to guide packet forwarding.
The advantage of a typical IP network is that network devices are
Management
decoupled from protocols, devices from different vendors are compatible Control plane
plane
with each other, and network convergence is ensured in fault scenarios. Forwarding plane
Router-A
Management plane
Configuration commands
Control plane
Receive frames
Send frames
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thinking in the Network Field: Problems
Faced by Typical Networks
?
Difficult O&M Slow service deployment
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Slow Service
Difficult O&M
Congestion Technologies Deployment
C A F G H E
6G/5G 1
Used bandwidth/Total D E
bandwidth
Global path calculation and optimal tunnel path adjustment:
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Slow Service
Difficult O&M
Congestion Technologies Deployment
242
212 205 185
152
129 124 150
79
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Difficult Slow Service
Congestion Technologies O&M Deployment
Manual packet Abnormal flows account for 3.65% of all flows on the network.
Manual fault
obtaining for locating Manual fault diagnosis
identification
faults
• Traditional O&M networks rely on manual fault • Traditional O&M only monitors device indicators. Some
identification, location, and diagnosis. indicators are normal, but user experience is poor. There is no
• More than 85% of network faults are found only after correlated analysis of users and networks.
service complaints. Problems cannot be proactively • According to data center network (DCN) statistics, it takes 76
identified or analyzed. minutes to locate a fault on average.
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Frequent Network Complex Slow Service
Difficult O&M
Congestion Technologies Deployment
Service network
Long service deployment period:
New service deployment involves E2E device configuration
VN for office VN for scientific VN for video modification.
purposes research surveillance
End-to-end configuration using
commands
Physical network
Low physical network deployment efficiency:
The physical network does not support zero touch
provisioning (ZTP).
Command line-based
configuration by device
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SDN Origin
SDN was developed by the Clean Slate Program at Stanford University as an innovative new network architecture. The
core of SDN is to separate the control plane from the data plane of network devices to implement centralized control of
the network control plane and provide good support for network application innovation.
SDN has three characteristics in initial phase: forwarding-control separation, centralized control, and open
programmable interfaces.
SDN application
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Basic Concepts of OpenFlow
OpenFlow is an SBI protocol between a controller and a switch. It defines three types of messages:
Controller-to-Switch, Asynchronous, and Symmetric. Each message contains more subtypes.
Controller-to-Switch
OpenFlow Controller
This message is sent by the controller. It is used to manage
and query switch information.
Asynchronous
Symmetric
This message can be initiated by a switch or controller.
Symmetric messages include Hello, Echo, and Error
OpenFlow switches messages.
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Flow Table Overview
OpenFlow switches forward packets based on flow tables.
Each flow entry includes the Match Fields, Priority, Counters, Instructions, Timeouts, Cookie, and Flags.
The Match Fields and Instructions are key fields for packet forwarding.
▫ The Match Fields is a field against which a packet is matched and can be customized.
▫ The Instructions field indicates OpenFlow processing when a packet matches a flow entry.
Match
Priority Counters Instructions Timeouts Cookie Flags
Fields
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Comparison Between Forwarding Modes
Typical Routing Protocol: OpenFlow:
Packet Forwarding Based on Routing Tables Packet Forwarding Based on Flow Tables
OpenFlow controller
Routing protocol
10.0.0.0/30 10.0.0.0/30
1.1.1.1 1.1.1.2
G0/0/1
Flow table
matching
process:
Table 0 Table 1 … Table N
Routing Destination Outbound
Protocol Next Hop
table Network Interface
Flow Match
Priority Counters Instructions Timeouts Cookie
10.0.0.0/30 OSPF 1.1.1.2 G0/0/1 table Fields
• In typical cases, network devices query routing tables to guide • OpenFlow is a network protocol. Switches running OpenFlow
traffic forwarding. forward traffic based on flow tables.
• Entries in a routing table are calculated by running a routing • Flow tables are calculated by the OpenFlow controller and then
protocol between network devices. delivered to switches.
• The length of the routing table is fixed. Network devices • A flow table has variable length and defines various matching and
forward packets based on the longest match rule. A network forwarding rules. A network device has multiple flow tables.
device has only one routing table.
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Essential Requirements of SDN
The essence of SDN is to make networks more open, flexible, and simple. It builds a centralized brain for a
network and implements fast service deployment, traffic optimization, or network service openness through
centralized control in the global view.
SDN has the following benefits:
▫ Provides centralized management, simplifying network management and O&M.
▫ Shields technical differences, simplifies network configuration, and reduces O&M costs.
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
SDN Network Architecture
The SDN network architecture consists of the orchestration application layer, controller layer, and device layer. Different
layers are connected through open interfaces. From the perspective of the controller layer, SBIs oriented to the device
layer and NBIs oriented to the orchestration application layer are distinguished. OpenFlow is one of SBI protocols.
NBI
Service
Controller layer
orchestration
SBI
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei SDN Network Architecture
Huawei SDN network architecture supports various SBIs and NBIs, including OpenFlow, OVSDB, NETCONF, PCEP,
RESTful, SNMP, BGP, JSON-RPC, and RESTCONF interfaces.
Network Cloud
EMS Orchestration Apps
Applications platform
Open NBI
Open SBI
PCEP NETCONF OpenFlow BGP-LS OVSDB SNMP BGP Json-RPC
Telemetry
Interface Interface Interface Interface Interface Interface Interface Interface
Forwarding Security
AP Switch CPE Router VNF
device gateway
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei SDN Solution - Integrating Management, Control,
and Analysis to Build an Intent-Driven Network
Network
management
and control Manager Controller Analyzer
layer
AP AP
DC Fabric
Campus Campus
CPE CPE
DC Fabric
Branch SD-WAN
CPE Branch
CPE
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to iMaster NCE
Huawei iMaster NCE is the industry intelligent network automation platform that integrates management,
control, analysis, and AI capabilities.
SDN-based automatic service Unified data base Full lifecycle management
configuration/deployment Detection, location, and Simulation verification and
AI-based intelligent analysis, prediction, troubleshooting monitoring optimization
and troubleshooting
Planning + Construction +
Automation + Intelligence Manager + Controller + Analyzer
Maintenance + Optimization
2 3 4
Autonomous Driving
NMS Controller Analyzer Network System
Network =
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
iMaster NCE Application
DC iMaster NCE-Fabric *
Enterprise
iMaster NCE-Campus *
campus
WAN
iMaster NCE-T
transmission
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
Service Intent/Strategy
Integrated planning and construction:
• The planning tool interconnects with iMaster NCE-Fabric to implement
Simplification elements
integrated planning and construction.
• Zero Touch Provisioning (ZTP)
Analyzer
Simplified deployment
• Service intent self-understanding and conversion
+AI • Network change simulation and evaluation, eliminating human errors
Controller Manager
Intelligent O&M:
• Rapid fault detection and location based on knowledge graph and expert
experience
Telemetry & ERSPAN • Fast fault rectification based on expert experiences and simulation analysis
NETCONF & SNMP
Real-time optimization:
• AI-Fabric-oriented local traffic inference and online model training and
optimization
VM VM VM
VM VM VM
• User behavior prediction and resource optimization suggestions
VM VM VM
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
iMaster NCE-Fabric
Verification result analysis
Work order
Built-in model:
Intent model ACL deployment 10 minutes
Network provisioning
Huawei iMaster NCE-Fabric supports automatic and fast deployment of virtualization, cloud computing,
and container networks.
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
Configuration to be
Resource
changed
sufficiency
Live network
configuration Access
connectivity
Live network topology
information
Network Formal verification Impact on original
Live network resource services
modeling algorithm
information
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
of O&M IS-IS
expert experience Router ID
flapping BFD
flapping
Manual
conflict
rectification
Exception
detection Intent-based
Continuous learning
and training Root cause loop closing
based on real site analysis
Knowledge Knowledge Knowledge Knowledge
faults
Risk prediction
Recommended
Model application emergency plan:
DC holographic data • Port isolation
Service flow
Data cleaning
AI exception Network object • Configuration rollback
data/Telemetry data identification modeling • Capacity expansion
recommendation
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
Device Plug-and-Play
Deployment Through the Registration
Deployment by Scanning Bar Codes DHCP-based Deployment
Query Center
1 1 1 2
Registration
query center
4 4 3 5
3 4
DHCP server
3
2 2
1. Pre-configuration
1. Pre-configuration
1. Pre-configuration 2. Information synchronization
2. Obtaining registration information through the
2. Deployment by scanning bar codes 3. Obtaining registration information through the
DHCP server
3. Automatic device registration and login registration query center
3. Automatic device registration and login
4. Automatic configuration delivery 4. Automatic device registration and login
4. Automatic configuration delivery
5. Automatic configuration delivery
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
Free Mobility:
Policy Management Based on Security Groups
Free mobility: Enables users to have consistent network rights and security policies regardless of their
locations and IP addresses.
Security group
1 Use security groups. A security group is
Security group Security group
for server a group of users for which the same
for sales users for R&D users
resources security policy is used.
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
Campus
Wired and wireless authentication point separation, distributed policy control, separation of control and data traffic forwarding, and troubleshooting and
management difficulties.
The switch integrates the AC function, eliminating wireless traffic forwarding bottlenecks and reducing fault
Native AC nodes. Wired and wireless devices are centrally managed.
• Unified management and converged forwarding of wired and wireless services
• Converged management for wired and wireless users and gateway convergence
• Converged authentication points for wired and wireless access
• Unified wired and wireless policy execution
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus
Terminal information is
collected by IT
departments of colleges: >>
MAC address collection is
difficult and error-prone.
An enterprise >>
100+ authentication faults
reported per day Terminal-type-based Terminal-type-based Terminal-type-based
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus
The efficiency is improved by using algorithms. With scenario-based continuous learning and expert experience, intelligent O&M frees O&M
personnel from complex alarms and noises, making O&M more automated and intelligent.
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Enterprise
DC
campus
Objects
Power adjustment
Optimal channel
Frequency
selection
Channel usage
Time
Signal interference ratio
Channel/Frequency Before radio After AI-powered
bandwidth/Power calibration smart radio
calibration
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. SDN Overview
2. NFV Overview
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Background: Thinking from IT Industry
Transformation
The IT industry transformation brings thinking on network architecture and device architecture in the
network industry. The network architecture layer involves the SDN controller and the device architecture
layer involves the device deployment mode.
IT Industry Transformation
• In recent years, IT technologies such as virtualization and
Network?
cloud computing have been booming, and applications
deployed on hardware have been gradually migrated to
the cloud. Applications are deployed on private clouds,
public clouds, or hybrid clouds as software.
• Thinking about the network industry: Can network
App App
applications be deployed in a software-based manner?
OS OS • In the context, Network Functions Virtualization (NFV)
App
is introduced.
Virtualization/ VM VM
Cloudification
OS
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Origin of NFV
In October 2012, 13 top carriers (including AT&T, Verizon, VDF, DT, T-Mobile, BT, and Telefonica) released
the first version of NFV White Paper at the SDN and OpenFlow World Congress. In addition, the Industry
Specification Group (ISG) was founded to promote the definition of network virtualization requirements and
the formulation of the system architecture.
In 2013, the ETSI NFV ISG conducted the first phase of research and completed the formulation of related
standards. The ETSI NFV ISG defined NFV requirements and architecture and sorts out the
standardization processes of different interfaces.
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Value
NFV aims to address issues such as complex deployment and O&M and service innovation
difficulties due to large numbers of telecom network hardware devices. NFV brings the following
benefits to carriers while reconstructing telecom networks:
▫ Shortened service rollout time
▫ Open ecosystem
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Key NFV Technologies: Virtualization
Virtualization is the foundation of NFV, and cloudification is the key.
On traditional telecom networks, each NE is implemented by dedicated hardware, resulting in high costs and difficult
O&M. Virtualization features partition, isolation, encapsulation, and independence from hardware, which can meet NFV
requirements. Carriers use virtualization to run software-based NEs on universal infrastructures.
Partition Isolation
Multiple VMs can concurrently run on VMs that run on the same server are
a single physical server. isolated from each other.
All data of a VM is saved in files. A VM VMs can run on any servers without any
can be moved and replicated by moving modifications.
and replicating the files.
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Key NFV Technology: Cloudification
As defined by the National Institute of Standards and Technology (NIST), cloud computing is a model that allows users
to obtain resources (for example, networks, servers, storage devices, applications, services) in a shared compute
resource pool based on their needs anytime, anywhere. This model enables fast resource provisioning and release, and
minimizes the resource management workload and interactions with service providers.
Cloud computing has many advantages. Cloudification of network functions on carriers' networks mainly uses resource
pooling and rapid elastic scaling.
Characteristics of Cloud Computing
1 On-demand self-service 2 Broad network access 3 Resource pooling 4 Rapid elasticity 5 Measured service
Buy
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Introduction to the NFV Architecture
The NFV architecture includes the network functions virtualization infrastructure (NFVI), a virtualized network function
(VNF), and management and orchestration (MANO). In addition, the NFV architecture needs to support the existing
business support system (BSS) or operations support system (OSS).
MANO:
VNF: uses cloud resources to construct software NEs. Provides functions
such as service
orchestration, service
management, and
resource management.
NFVI: provides cloud-based resource pools.
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Standard NFV Architecture
ETSI defines the standard NFV architecture, which consists of the NFVI, VNF, and MANO. The NFVI includes the
universal hardware layer and virtualization layer. The VNF is implemented using software, and the MANO implements
management and orchestration of an NFV architecture. NFV Management and Orchestration
MANO
Os-Ma
OSS/BSS NFV
Orchestrator
VNF Or-Vnfm
EM 1 EM 2 EM 3 Ve-Vnfm Service, VNF, and
VNF Infrastructure
VNF 1 VNF 2 VNF 3 Manager(s)
Description
Vn-Nf
NFVI Vi-Vnfm
Virtualization Layer
Virtual Virtual Virtual Nf-Vi Virtualized
Computing Network Or-Vi
Storage Infrastructure
Vi-Ha Manager(s)
Hardware
Computing Storage Network
Execution reference point Other reference point Main NFV reference points
Page 42 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Functional Modules of the NFV Architecture
Main functional modules defined in the standard NFV architecture:
OSS or Management system for a service provider. It is not a functional component in the NFV architecture, but the MANO must
BSS provide an interface for interoperation with the OSS or BSS.
MANO NFV management and orchestration. The MANO includes the VIM, VNFM, and NFVO, and provides unified management and
orchestration for VNFs and the NFVI.
• VIM: NFVI management module that runs on an infrastructure site. The VIM provides functions such as resource discovery,
virtual resource management and allocation, and fault handling.
• VNFM: It controls the VNF lifecycle (including instantiation, configuration, and shutdown).
• NFVO: It orchestrates and manages all the software resources and network services on an NFV network.
VNF VNFs refer to VMs as well as service NEs and network function software deployed on the VMs.
NFVI NFV infrastructure, including required hardware and software. The NFVI provides a running environment for VNFs.
• Hardware layer: includes hardware devices that provide compute, network, and storage resources.
• Virtualization layer: abstracts hardware resources to form virtual resources, such as virtual compute, storage, and
network resources. The virtualization function is implemented by Hypervisor[1].
Page 43 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
NFV Architecture Interfaces
Main interfaces of the standard NFV architecture:
Interface Description
Is used between the virtualization layer and hardware layer. The virtualization layer meets basic hardware compatibility
Vi-Ha requirements.
Is used between a VM and the NFVI. It ensures that VMs can be deployed on the NFVI to meet performance, reliability, and
Vn-Nf scalability requirements. The NFVI meets VMs' OS compatibility requirements.
Is used between the virtualization layer management software and NFVI. It provides management of virtual computing, storage,
Nf-Vi and network systems of NFVI, virtual infrastructure configuration and connections, as well as system usage, performance
monitoring, and fault management.
Is used between the VNFM and a VNF, implementing VNF lifecycle management, VNF configuration, VNF performance, and fault
Ve-Vnfm management.
Is used for interaction between the service application management system or service orchestration system and virtualization layer
Vi-Vnfm management software.
Sends configuration information to the VNFM, configures the VNFM, and connects the orchestrator and VNFM. It exchanges
Or-Vnfm information with the NFVI resources allocated to VNFs and information between VNFs.
Is used to send resource reservation and resource allocation requests required by the orchestrator and exchange virtual hardware
Or-Vi resource configurations and status information.
Page 44 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Huawei's NFV Solution
In the Huawei NFV architecture, functions of the virtualization layer and VIM are implemented by the HUAWEI CLOUD
Stack NFVI platform. HUAWEI CLOUD Stack can virtualize compute, storage, and network resources and centrally
manage, monitor, and optimize physical virtualization resources.
Huawei provides cloud-based solutions for carriers' wireless networks, bearer networks, transport networks, access
networks, and core networks.
VNF MANO
Cloud CloudOpera
CloudBB CloudEdge CloudCore 5G Core
DSL/OLT NFVO
VNFM
NFVI
HUAWEI CLOUD Stack
FusionSphere
FusionCompute FusionStorage FusionNetwork OpenStack + OM
Hardware
Computing Storage Network
Page 45 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
FAQ
Q1: What is the relationship between SDN and NFV in the industry?
A: Both SDN and NFV involve network transformation and the NFV concept was proposed at the
SDN and OpenFlow World Congress. However, they are independent of each other. SDN mainly
affects the network architecture, and NFV mainly affects the NE deployment mode.
Q2: What is the relationship between SDN and NFV in Huawei solutions?
A: Huawei provides different solutions for SDN and NFV, but they are associated. Huawei NFVI
solution is provided by HUAWEI CLOUD Stack.
Page 46 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. (Multiple) Which of the following statements about Huawei SDN solution are true? ( )
A. The solution supports various SBI protocols, such as RESTful, NETCONF, and OVSDB.
C. The solution integrates management, control, and analysis to build a simplified network.
D. The solution provides open and programmable network interfaces to support third-party application
development and system interconnection.
Page 47 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
With the transformation and development of the network industry, SDN and NFV are
proposed.
Page 48 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
More Information
For more information about OpenFlow, visit https://www.opennetworking.org/ .
For more information about Huawei SDN solution, see the HCIP course.
Page 49 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 50 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
New protocols, technologies, and delivery and O&M modes are emerging in the
network engineering field. Conventional networks face challenges from new connection
requirements, such as requirements for cloud computing and artificial intelligence (AI).
Enterprises are also pursuing service agility, flexibility, and elasticity. Against this
backdrop, network automation becomes increasingly important.
Network programmability and automation is to simplify network configuration,
management, monitoring, and operations for engineers and improve deployment and
O&M efficiency. This course is to help network engineers understand Python
programming and implement network automation.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
On completion of this course, you will be able to:
▫ Describe the difficulties of conventional network O&M.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Introduction to Network Programmability and Automation
3. Cases
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Background: Difficulties in Conventional Network O&M
Conventional network O&M requires network engineers to manually log in to network devices, query and execute
configuration commands, and filter command output. This highly human-dependent working mode is time-consuming,
inefficient, and difficult to audit.
Typical O&M Scenarios
Network device
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Network Automation
Network automation: Tools are used to implement automated network deployment, operations, and O&M, gradually
reducing dependency on human. This solves the conventional network O&M problems.
Many open-source tools, such as Ansible, SaltStack, Puppet, and Chef, are available for network automation in the
industry. From the perspective of network engineering capability construction, it is recommended that engineers acquire
the code programming capability.
Keywords of network
Chef automation SaltStack
NMS
tool
Ansible Python Automated
scripts
Shell
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Programming-based Network Automation
In recent years, with the emergence of network automation technologies, Python-based programming
capabilities have become a new skill requirement for network engineers.
Automation script written in Python can execute repeated, time-consuming, and rule-based operations.
Example: Implementing automated device configuration
Python file using Python
Configuration File • What can network automation do? The most intuitive example of
network automation is automated device configuration. This
Sysname SW1 SSH/Telnet
process can be divided into two steps: writing a configuration
Vlan 10
description A file, and writing Python code to push the configuration file to a
Vlan20 device.
description B Network • Write the configuration script in command line interface (CLI)
VLAN 30 device mode, and then upload the script to the device using
description C
Telnet/SSH. This method is easy to understand for network
engineers who are beginning to learn network programmability
and automation. This presentation describes how to implement
network automation.
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Introduction to Network Programmability and Automation
3. Cases
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Programming Languages
A programming language is used to write a computer program and control behavior of a computer.
According to whether compilation is required before execution of a language, the programming language may be
classified into the compiled language, and interpreted language that does not need to be compiled.
Compiler
Interpreter: Interprets
source code line by line.
Executable file
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Computing Technology Stack and Program
Execution Process
Computing Technology Stack Program Execution Process
Application
temp = v [k]; TEMP = V[K]
Algorithm High-level v[k] = v[k+1]; V[K] = V[K+1]
Increasing order of Complexity
Software
High-Level Language language C/C++ Fortran
compiler compiler
Assembly Language
lw $t0, 0($2)
lw $t1, 4($2)
Machine Code Assembly sw $t1, 0($2)
language sw $t0, 4($2)
Instruction Set Architecture
Assembler
Micro Architecture
Hardware
0000 1001 1100 0110 1010 1111 0101 1000
1010 1111 0101 1000 0000 1001 1100 0110
Gates/Registers Machine 1100 0110 1010 1111 0101 1000 0000 1001
code 0101 1000 0000 1001 1100 0110 1010 1111
Transistors
Instruction
Physics Instruction 1 Data 1
set
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
High-level Programming Language - Compiled
Language
Compiled language: Before a program in a compiled language is executed, a compilation process is performed to
compile the program into a machine language file. The compilation result can be directly used without re-translation
during running. Typical compiled languages include C/C++ and Go.
From source code to program: The source code needs to be translated into machine instructions by the compiler and
assembler, and then the linker uses the link library function to generate the machine language program. The machine
language must match the instruction set of the CPU, which is loaded to the memory by the loader during running and
executed by the CPU.
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
High-level Programming Language -
Interpreted Language
Interpreted language: Interpreted language programs do not need to be compiled before running. They are translated
line by line when running. Typically, Java and Python are interpreted languages.
Process from source code to programs: Source code of an interpreted language is generated by the compiler and then
interpreted and executed by a virtual machine (VM) (for example, JVM/PVM). The VM shields the differences between
CPU instruction sets. Therefore, portability of the interpreted language is relatively good.
Java language
Python program
program
Compiler Compiler
JVM PVM
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
What Is Python?
Python is a fully-open-source high-level programming language. Its author is Guido Van Rossum.
With support for abundant third-party libraries and advantages of the Python language, Python can be used
in many fields, such as AI, data science, apps, and scripts for automated O&M.
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Python Code Execution Process
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Getting Started with Python Code -
Interactive Running
Python runs in either interactive or script mode.
Interactive programming does not require script files to be created, and code is written in the interactive
mode of the Python interpreter.
C:\Users\Richard>python
Python 3.7.4 (default, Aug 9 2019, 18:34:13) [MSC v.1915 64 bit (AMD64)] ::
Anaconda, Inc. on win32
Type "help", "copyright", "credits" or "license" for more information.
1. Input -- >>> print ("hello world")
2. Output -- hello world
3. Input -- >>> a = 1
4. Input -- >>> b = 2
5. Input -- >>> print ( a + b )
6. Output -- 3
>>>
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Getting Started with Python Code -
Script-based Running
Code in script mode can run on various Python compilers or in integrated development environments. For
example, IDLE, Atom, Visual Studio, Pycharm, and Anaconda provided by Python can be used.
demo.py
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Code Style Guide for Python
Code style rules refer to naming rules, code indentation, and code and statement segmentation modes that must be
complied with when Python is used to write code. Good style rules help improve code readability and facilitate code
maintenance and modification.
For example, the following rules for using semicolons, parentheses, blank lines, and spaces are recommended:
Parentheses Space
• Parentheses can be used for the continuation of • Spaces are not recommended in parentheses.
long statements. Avoid unnecessary parentheses. • You can determine whether to add spaces on both
ends of an operator.
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Code Style Guide for Python - Identifier Naming
• A Python identifier represents the name of a constant, variable, function, or another object.
• An identifier is usually composed of letters, digits, and underscores, but cannot start with a digit. Identifiers are case
sensitive and must be unique. If an identifier does not comply with the rules, the compiler will output a SyntaxError
message when running the code.
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Code Style Guide for Python - Code Indentation
In Python programs, code indentation represents the scope of a code block. If a code block contains two or
more statements, the statements must have the same indentation. For Python, code indentation is a syntax
rule that uses code indentation and colons to distinguish between layers of code.
When writing code, you are advised to use four spaces for indentation. If incorrect indentation is used in
the program code, an IndentationError error message is displayed during code running.
if True:
Correct indentation -- print ("Hello")
else:
Correct indentation -- print (0)
a = “Python”
Incorrect indentation -- print (a)
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Code Style Guide for Python - Using Comments
Comments are explanations added to programs to improve program readability. In the Python program,
comments are classified into single-line comments and multi-line comments.
A single-line comment starts with a pound sign (#).
A multi-line comment can contain multiple lines, which are enclosed in a pair of three quotation marks ('''...'''
or '''''' ...'''''').
“””
Multi-line comment -- The output is Python.
“””
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Code Style Guide for Python - Source Code File
Structure
A complete Python source code file generally consists of interpreter and encoding format declaration,
document string, module import, and running code.
If you need to call a class of a standard library or a third-party library in a program, use "import" or "from...
import" statement to import related modules. The import statement is always after the module comment or
document string (docstring) at the top of the file.
Interpreter declaration -- #!/usr/bin/env python
Encoding format declaration -- #-*- coding:utf-8 -*-
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Python Functions and Modules
A function is a block of organized, reusable code that is used to perform a single, related action. It can improve the
modularity of the program and code utilization. The function is defined using the def keyword.
A module is a saved Python file. Modules can contain definitions of functions, classes, and variables that can then be
utilized in other Python programs. The only difference between a module and a regular Python program is that the
module is used for importing by other programs. Therefore, a module usually does not have a main function.
demo.py test.py
def sit(): #Define a function. import demo #Import a module.
print ('A dog is now sitting’)
demo.sit() #Call a function.
sit() #Call a function.
Execution result:
Execution result:
A dog is now sitting.
A dog is now sitting. A dog is now sitting.
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Python Classes and Methods
A class is a collection of properties and methods that are the same. The class keyword is used to define a
class.
The function of an instantiated class is called a method. When you define a method, a class must carry the
self keyword, which indicates the instance of the class.
demo.py
Different methods in the telnetlib.Telnet class are called to implement different functions.
Import the Telnet class of the telnetlib module. -- from telnetlib import Telnet
Create a Telnet connection to a specified server. -- tn = Telnet(host=None, port=0[, timeout])
Invoke the read_all() method. -- tn.read_all()
…
Method Function
Read data until a given byte string, expected, is encountered or until timeout seconds have
Telnet.read_until (expected, timeout=None)
passed.
Telnet.read_all () Read all data until EOF as bytes; block until connection closed.
Read everything that can be without blocking in I/O (eager). Raise EOFError if connection closed
Telnet.read_very_eager() and no cooked data available. Return b'' if no cooked data available otherwise. Do not block unless
in the midst of an IAC sequence.
Telnet.write(buffer) Write a byte string to the socket, doubling any IAC characters.
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Introduction to Network Programmability and Automation
3. Cases
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case: Logging In to a Device Using telnetlib
Case description :
A network device functions as a Telnet server, and the Python telnetlib needs to be used as a Telnet client to log in to the
device.
Verify the Telnet login Verify the
Configure Telnet. Write Python code.
procedure. result.
192.168.10.10 192.168.10.20
GE1/0/10
Telnet server Telnet client
Manually verify and view the Telnet login procedure as a reference for code implementation.
192.168.10.10 192.168.10.20
GE1/0/10
Telnet server Telnet client
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case: Logging In to a Device Using telnetlib
Configure Telnet. Verify the Telnet login procedure. Write Python code. Verify the result.
192.168.10.10 192.168.10.20
GE1/0/10
Telnet server Telnet client
Telnet login:
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case: Logging In to a Device Using telnetlib
Verify the Telnet login
Configure Telnet. Write Python code. Verify the result.
procedure.
192.168.10.10 192.168.10.20
GE1/0/10
Telnet server Telnet client
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Case: Running Result Comparison
Verify the Telnet login
Configure Telnet. Write Python code. Verify the result.
procedure.
C:\Users\Richard>telnet 192.168.10.10
Login authentication
Manual Telnet login
result: Password:
Info: The max number of VTY users is 5, and the number of current VTY users on line is 1.
The current login time is 2020-01-15 21:12:57.
<Huawei>
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. Python is a compiled language. ( )
A. True
B. False
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
Network automation uses tools to implement automated network deployment,
operation, and O&M, gradually reducing dependency on people. You can use a
programming language or tool to implement the network automation.
The telnetlib module of Python provides the telnetlib.Telnet class for implementing the
Telnet function. It helps you enter the network programmability and automation world!
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
More Information
For more information about Python, visit https://www.python.org/.
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Foreword
• A broad range of places, such as campuses, office spaces, and shopping malls, are
covered by networks. You can access internal resources of your school, access internal
printers of your company to print documents, or access the Internet to browse news
through the networks.
• This chapter describes the basic architecture of a campus network and details how to
build a campus network.
Page 0 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Objectives
Upon completion of this course, you will be able to:
▫ Understand the definition of campus networks.
Page 1 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Basic Concepts of Campus Networks
Page 2 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
What Is a Campus Network?
Outside a
campus Branch Other campuses Remote access user Private and public clouds
Typical
scenario
Office building Campus Factory Government Enterprise Bank
A campus network is a local area network (LAN) that connects people and things in a specified area. Typically, a campus
network has only one management entity. If there are multiple management entries in an area, the area is considered to have
multiple campus networks.
Page 3 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Typical Campus Network Architecture
Internet WAN Branch campus
Anti-DDoS
Network management zone
Egress zone
Traveling
Firewall
employees
AC IPS
Data center
Aggregation
layer
Page 4 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Typical Architecture of Small Campus Networks
Internet
• Small campus networks are typically deployed in
scenarios where the number of access users is
small (several or dozens of users). A small campus
network can cover only one location, has a simple
architecture, and is constructed to enable mutual
access between internal resources.
• Characteristics of small campus networks:
Fat AP
▫ Small number of users Number of
< 200
terminals
▫ Only one location
Host Number of NEs < 25
▫ Simple network architecture
Network topology of a chain cafe
▫ Simple network requirements
Page 5 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Typical Architecture of Midsize Campus Networks
Internet
• A midsize campus network supports access of
hundreds to thousands of users.
Page 6 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Typical Architecture of Large Campus Networks
Page 7 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Main Protocols and Technologies of Campus Networks
WLAN
protocols/technologies Common
protocols/technologies
AC
NAT, OSPF, static routing, and PPPoE
Egress zone
SNMP/
NETCONF
Page 8 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Contents
1. Basic Concepts of Campus Networks
Page 9 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Networking Requirements
• A company (with about 200 employees) plans to build a brand-new campus network to
meet service development requirements. The network requirements are as follows:
▫ Meet the current services requirements of the company.
▫ Provide wired access for employees and wireless access for guests.
Page 10 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Campus Network Project Lifecycle
Page 11 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Basic network
Device model selection Basic service Egress security
management
Intranet wireless
Layer 2 loop prevention
security
Network reliability
Page 12 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
full consideration of the budget and Internet • The names should be easy to
GE0/0/0 remember and can be extended.
service requirements. The following
CORE-R1 • The interfaces should meet the
figure shows the topology. bandwidth requirements of services.
GE0/0/1
GE0/0/1
GE0/0/2
Agg-S1
GE0/0/1
AC1
E0/0/1 E0/0/1 E0/0/1
E0/0/1
Page 13 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
• VLANs can be classified into service VLANs, management VLANs, and interconnection VLANs as required.
VLANIF 100
VLAN assignment by
192.168.100.254
geographic area
VLAN assignment by In most cases, Layer 2 switches use VLANIF interface addresses as
service type management addresses. It is recommended that all switches on the
same Layer 2 network use the same management VLAN and their
management IP addresses be on the same network segment.
Page 14 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
VLAN Planning
• A management VLAN is reserved for Layer 2 devices.
• VLANs are classified into the guest VLAN, R&D department VLAN, marketing department VLAN, and administrative
department VLAN.
• Layer 3 switches need to be connected to routers through VLANIF interfaces. Therefore, interconnection VLANs need to
be reserved.
Page 15 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
192.168.1.254
192.168.5.254
192.168.100.254 VLANIF 100
192.168.100.254
Page 16 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
IP Address Planning
• Reserve sufficient IP addresses based on the number of clients to be accessed and plan network segments and gateway addresses for
each type of service.
Page 17 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Egress Egress
gateway gateway It is recommended that IP
addresses of end users
are allocated by gateways
IP addresses of WAN interfaces are assigned by the AP through DHCP.
carrier in static, DHCP, or PPPoE mode. The IP
addresses of the egress gateways need to be obtained
from the carrier in advance.
Page 18 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
• All terminals obtain IP addresses through DHCP. The servers and printers are assigned fixed IP addresses.
IP Network
Allocation Mode Allocation Mode Description
Segment/Interface
192.168.1.0/24
Allocated by Agg-S1. Agg-S1 allocates
192.168.2.0/24
DHCP fixed IP addresses to fixed devices such
192.168.3.0/24
as servers and printers.
192.168.4.0/24
Device management IP addresses, which
192.168.100.0/24 Static
are statically configured
IP addresses of ACs are statically
192.168.101.0/24 DHCP configured, and IP addresses of APs are
allocated by Agg-S1.
Interconnection IP address, which is
192.168.102.0/30 Static
statically configured
GE0/0/0 on CORE-R1 PPPoE IP address assigned by the carrier
Page 19 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Printer Printer
Page 20 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
WLAN Design
WLAN networking design WLAN data forwarding design
192.168.101.1/24
CAPWAP tunnel
User data
Page 21 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Name: WLAN-Guest
Forwarding mode: direct forwarding
VAP profile
Service VLAN: VLAN 1
Referenced profiles: SSID profile WLAN-Guest and security profile WLAN-Guest
Page 22 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Reliability Design
• Port-level reliability:
Internet Eth-Trunk is used to improve reliability between access
switches and aggregation switches and increase link
bandwidth.
• Device-level reliability
iStack or cluster switch system (CSS) technology can
be used, which is not involved in this networking.
Printer Printer
Page 23 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Misconnection
Printer Printer
Page 24 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
NAT Server
Page 25 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Security Design
Traffic Control DHCP Security
Guest network
Marketing LAN • On a campus network, employees often connect unauthorized
department DHCP-enabled wireless routers to the network, causing private
address disorders, address conflicts, and Internet access failures.
• In most cases, DHCP snooping is enabled on access switches to
prevent this issue.
Administrative
department
Internal network Network Management Security
• Different departments can access each other but cannot access
• When network devices are managed through Telnet or the
the Internet.
web system, you can use access control list (ACL) technology
• Guests can access the Internet but cannot access the internal
network. to allow only users with fixed IP addresses to log in to the
• You can use technologies such as traffic policing and traffic devices.
filtering to isolate the internal network from the external network • For the centralized NMS, SNMPv3 supports identity
and use NAT to control the internal network's access to the authentication and encryption, significantly enhancing the
Internet. NMS security.
Page 26 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
SSH/Telnet Telemetry
LAN Network
Page 27 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
▫ Device installation
▫ Network commissioning
▫ Project acceptance
Page 28 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Page 29 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
PVID:100 PVID:100
Eth-trunk 1 Trunk Eth-trunk 3 Trunk
Acc-S2 Allow pass VLAN 2, 100 Allow pass VLAN 3, 100
Agg-S1
Other ports Access Default VLAN 2 PVID:100
Eth-trunk 4 Trunk
PVID:100 Allow pass VLAN 4, 100
Eth-trunk 1 Trunk
Allow pass VLAN 3, 100
Acc-S3 GE0/0/2 Access Default VLAN 101
Other ports Access Default VLAN 3
Page 30 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Page 31 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Page 32 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Page 33 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Page 34 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
Page 35 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
2. High Reliability
1. Connectivity Test 3. Service Performance Test
Commissioning
Basic link interconnection test Loop prevention function test Service traffic test
Page 36 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
▫ Service check
▫ Alarm handling
• When the network scale reaches a certain level, the network management software can
be used for network management and O&M to improve efficiency.
Page 37 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Planning and Deployment and Network
Network O&M
Design Implementation Optimization
▫ Basic network optimization, such as network architecture optimization and routing protocol
adjustment
▫ Service quality optimization, such as preferential forwarding of voice and video services
Page 38 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Quiz
1. What is the complete lifecycle of a campus network?
Page 39 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Summary
• This chapter describes the concepts, types, and common technologies of campus
networks.
▫ Network O&M
▫ Network optimization
• Based on the previous courses, this course focuses on the planning, design,
deployment, and implementation of campus networks and details how to establish a
small campus network.
Page 40 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.
Thank You
www.huawei.com
Page 41 Copyright © 2020 Huawei Technologies Co., Ltd. All rights reserved.