You are on page 1of 188

re

Mo

ni

ar

Le

ng
ur

so

Re
s:

ce
ht
tp
ea

/l

:/

rn

in
g.
hu

aw
ei
.c
om
/e

n
aw
ei
.c
om
/e

Huawei Certification

in

g.

hu

HCNA-HNTD
INTERMEDIATE

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

Lab Guide

rn

Huawei Networking Technology and Device

Huawei Technologies Co.,Ltd

aw
ei
.c
om
/e

No part of this document may be reproduced or transmitted in any form or by


any means without prior written consent of Huawei Technologies Co., Ltd.
Trademarks and Permissions

hu

and other Huawei trademarks are trademarks of Huawei Technologies


Co., Ltd. All other trademarks and trade names mentioned in this document
are the property of their respective holders.

g.

Notice

ht

tp

:/

/l

ea

rn

in

The information in this document is subject to change without notice. Every


effort has been made in the preparation of this document to ensure accuracy of
the contents, but all statements, information, and recommendations in this
document do not constitute the warranty of any kind, express or implied.

s:

Huawei Certification

ur

ce

HCNA-HNTD Huawei Networking Technology and Device

re

Le

ar

ni

ng

Re

so

Intermediate Lab Guide

Mo

Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved.

Version 2.1

aw
ei
.c
om
/e

Huawei Certification System


Relying on its strong technical and professional training and certification system

and in accordance with customers of different ICT technology levels, Huawei


certification is committed to providing customers with authentic, professional
certification, and addresses the need for the development of quality engineers that
are capable of supporting enterprise networks in the face of an ever changing ICT
industry. The Huawei certification portfolio for routing and switching (R&S) is

g.

skills and knowledge in routing and switching technologies.

hu

comprised of three levels to support and validate the growth and value of customer

in

The Huawei Certified Network Associate (HCNA) certification validates the skills

rn

and knowledge of IP network engineers to implement and support small to


medium-sized enterprise networks. The HCNA certification provides a rich

ea

foundation of skills and knowledge for the establishment of such enterprise

/l

networks, along with the capability to implement services and features within

:/

existing enterprise networks, to effectively support true industry operations.

tp

HCNA certification covers fundamental skills for TCP/IP, routing, switching and
products,

ht

related IP network technologies, together with Huawei data communications


and skills for versatile routing platform

operation and

s:

management.

(VRP)

ce

The Huawei Certified Network Professional (HCNP-R&S (HCDP)) certification is

ur

aimed at enterprise network engineers involved in design and maintenance, as well


as professionals who wish to develop an in depth knowledge of routing, switching,

so

network efficiency and optimization technologies. HCNP-R&S consists of three

Re

units including Implement Enterprise Switch Network (IESN), Implement Enterprise


Routing Network (IERN), and Improving Enterprise Network Performance (IENP),

ng

which includes advanced IPv4 routing and switching technology principles,

ni

network security, high availability and QoS, as well as application of the covered

ar

technologies in Huawei products.

Le

The Huawei Certified Internet Expert (HCIE-R&S) certification is designed to imbue


engineers with a variety of IP network technologies and proficiency in maintenance,

re

for the diagnosis and troubleshooting of Huawei products, to equip engineers with

Mo

in-depth competency in the planning, design and optimization of large-scale IP

networks.

re

Mo

ni

ar

Le

ng
s:

ce

ur

so

Re
ht
tp
ea

/l

:/
rn

hu

g.

in

aw
ei
.c
om
/e

L3 Switch

L2 Switch

Cloud

g.

hu

Router

aw
ei
.c
om
/e

Reference Icons

Serial link

ea

rn

in

Ethernet link

/l

Lab Environment Specification

ht

tp

:/

In order to ensure that that the configuration given in this lab is supported on all
devices, it is recommended that the following device models and VRP versions
be used:

Device Model

R1

AR 2220

R2

AR 2220

R3

AR 2220

Version 5.120 (AR2200 V200R003C00SPC200)

S5700-28C-EI-24S

Version 5.70 (S5700 V100R006C00SPC800)

ce

ur

so

Re

ng

S1

Le

ar

S3

Mo

re

S4

VRP version

Version 5.120 (AR2200 V200R003C00SPC200)


Version 5.120 (AR2200 V200R003C00SPC200)

S5700-28C-EI-24S

Version 5.70 (S5700 V100R006C00SPC800)

S3700-28TP-EI-AC

Version 5.70 (S3700 V100R006C00SPC800)

S3700-28TP-EI-AC

Version 5.70 (S3700 V100R006C00SPC800)

ni

S2

s:

Identifier

re

Mo

ni

ar

Le

ng
s:

ce

ur

so

Re
ht
tp
ea

/l

:/
rn

hu

g.

in

aw
ei
.c
om
/e

HCNA-HNTD Content

aw
ei
.c
om
/e

CONTENTS
MODULE 1 ETHERNET AND VLAN ....................................................................................................... 1

LAB 1-1 ETHERNET INTERFACE AND LINK CONFIGURATION ............................................................................ 1

LAB 1-2 VLAN CONFIGURATION........................................................................................................... 10

LAB 1-3 GVRP CONFIGURATION .......................................................................................................... 21

hu

LAB 1-4 VLAN ROUTING .................................................................................................................... 33

in

g.

LAB 1-5 CONFIGURING LAYER 3 SWITCHING ............................................................................................ 41

rn

MODULE 2 ENTERPRISE WAN CONFIGURATION ............................................................................... 56

ea

LAB 2-1 HDLC AND PPP CONFIGURATION .............................................................................................. 56

/l

LAB 2-2 CONFIGURING FRAME RELAY AT THE CUSTOMER EDGE .................................................................... 73

:/

LAB 2-3 PPPOE CLIENT SESSION ESTABLISHMENT ..................................................................................... 94

tp

MODULE 3 IMPLEMENTING IP SECURITY........................................................................................ 103

ht

LAB 3-1 FILTERING ENTERPRISE DATA WITH ACCESS CONTROL LISTS. ........................................................... 103

s:

LAB 3-2 NETWORK ADDRESS TRANSLATION ........................................................................................... 114


LAB 3-3 ESTABLISHING LOCAL AAA SOLUTIONS ...................................................................................... 124

ce

LAB 3-4 SECURING TRAFFIC WITH IPSEC VPN ........................................................................................ 132

so

ur

LAB 3-5 SUPPORTING DYNAMIC ROUTING WITH GRE .............................................................................. 147

Re

MODULE 4 MANAGING ENTERPRISE NETWORKS ........................................................................... 158

ng

LAB 4-1 MANAGING NETWORKS WITH SNMP ....................................................................................... 158

ni

MODULE 5 ESTABLISHING IPV6 NETWORKS ................................................................................... 169

Mo

re

Le

ar

LAB 5-1 IMPLEMENTING IPV6 NETWORKS AND SOLUTIONS ....................................................................... 169

HC Series

HUAWEI TECHNOLOGIES

Page1

re

Mo

ni

ar

Le

ng
s:

ce

ur

so

Re
ht
tp
ea

/l

:/
rn

hu

g.

in

aw
ei
.c
om
/e

HCNA-HNTD Module 1 Ethernet and VLAN

Learning Objectives

aw
ei
.c
om
/e

Lab 1-1 Ethernet Interface and Link Configuration

Module 1 Ethernet and VLAN

in

g.

Manually set the line rate and duplex mode on an interface.


Configuration of manual mode link aggregation.
Configuration of link aggregation using static LACP mode.
Management of the priority of interfaces in static LACP mode.

rn

hu

As a result of this lab section, you should achieve the following tasks:

ce

s:

ht

tp

:/

/l

ea

Topology

ur

Figure 1.1 Ethernet link aggregation topology

Re

so

Scenario

Mo

re

Le

ar

ni

ng

As a network administrator of an existing enterprise network, it has been


requested that the connections between the switches be used more effectively
by preparing the switches to support link aggregation before establishing
manual link aggregation, for which the media between the switches are to be
configured as member links.

HC Series

HUAWEI TECHNOLOGIES

Page1

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Tasks
Step 1 Perform basic configuration on the Ethernet switches.

Auto-negotiation is enabled on Huawei switch interfaces by default. The rate


and duplex mode of G0/0/9 and G0/0/10 on S1 and S2 are to be set manually.

hu

Change the system name and view detailed information for G0/0/9 and
G0/0/10 on S1.
<Quidway>system-view

g.

[Quidway]sysname S1

in

[S1]display interface GigabitEthernet 0/0/9


GigabitEthernet0/0/9 current state : UP

rn

Line protocol current state : UP

Description:HUAWEI, Quidway Series, GigabitEthernet0/0/9 Interface


1,The Maximum Frame Length is 1600

ea

Switch Port,PVID :

/l

IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-82e1-aea6


Speed : 1000, Loopback: NONE
Mdi

tp

Duplex: FULL, Negotiation: ENABLE

:/

Port Mode: COMMON COPPER

: AUTO

ht

Last 300 seconds input rate 752 bits/sec, 0 packets/sec


Last 300 seconds output rate 720 bits/sec, 0 packets/sec

s:

Input peak rate 1057259144 bits/sec,Record time: 2008-10-01 00:08:58


Output peak rate 1057267232 bits/sec,Record time: 2008-10-01 00:08:58
5011357

Broadcast

CRC

0,Giants

Jabbers

0,Throttles

Runts

0,DropEvents

0,Symbols

0,Frames

5009016

Late Collisions :

0,ExcessiveCollisions :

Buffers Purged :

Discard

5,Total Error

ni

Discard

ng

Alignments
Ignoreds

ur

70,Multicast

6643714,Jumbo

so

Re

Unicast

ce

Input: 11655141 packets, 960068100 bytes

69,Total Error

Output: 11652169 packets, 959869843 bytes


:

Broadcast

Collisions

Mo

re

Le

ar

Unicast

Page2

345,Multicast
6642808,Jumbo
0,Deferreds

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


Input bandwidth utilization threshold : 100.00%
: 0.01%

Output bandwidth utilization

: 0.00%

aw
ei
.c
om
/e

Input bandwidth utilization

Output bandwidth utilization threshold: 100.00%

[S1]display interface GigabitEthernet 0/0/10


GigabitEthernet0/0/10 current state : UP
Line protocol current state : UP

Description:HUAWEI, Quidway Series, GigabitEthernet0/0/10 Interface


Switch Port,PVID :

1,The Maximum Frame Length is 1600

hu

IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-82e1-aea6


Port Mode: COMMON COPPER

g.

Speed : 1000, Loopback: NONE


Mdi

in

Duplex: FULL, Negotiation: ENABLE


: AUTO

rn

Last 300 seconds input rate 1312 bits/sec, 0 packets/sec

ea

Last 300 seconds output rate 72 bits/sec, 0 packets/sec

Input peak rate 1057256792 bits/sec,Record time: 2008-10-01 00:08:58

5009062

CRC

3,Giants

Jabbers

0,Throttles

Runts

0,DropEvents

Alignments

0,Symbols

Ignoreds

0,Frames

Discard

5011284

Late Collisions :

0,ExcessiveCollisions :

Buffers Purged :

6642648,Jumbo

tp

ht

Broadcast

115,Multicast

s:

218,Total Error

ce

Unicast

:/

Input: 11651829 packets, 959852817 bytes

/l

Output peak rate 1057267296 bits/sec,Record time: 2008-10-01 00:08:58

Collisions

so

Broadcast

245,Multicast

6643751,Jumbo
0,Deferreds

Re

Unicast

ur

Output: 11655280 packets, 960072712 bytes

107,Total Error

ng

Discard

ni

Input bandwidth utilization threshold : 100.00%


Output bandwidth utilization threshold: 100.00%
: 0.01%

Output bandwidth utilization

: 0.00%

Le

ar

Input bandwidth utilization

Mo

re

Set the rate of G0/0/9 and G0/0/10 on S1 to 100 Mbit/s and configure them to
work in full duplex mode. Before changing the interface rate and duplex mode,
disable auto-negotiation.
HC Series

HUAWEI TECHNOLOGIES

Page3

HCNA-HNTD Module 1 Ethernet and VLAN


[S1]interface GigabitEthernet 0/0/9

[S1-GigabitEthernet0/0/9]undo negotiation auto

aw
ei
.c
om
/e

[S1-GigabitEthernet0/0/9]speed 100
[S1-GigabitEthernet0/0/9]duplex full
[S1-GigabitEthernet0/0/9]quit
[S1]interface GigabitEthernet 0/0/10
[S1-GigabitEthernet0/0/10]undo negotiation auto
[S1-GigabitEthernet0/0/10]speed 100
[S1-GigabitEthernet0/0/10]duplex full

g.

hu

Set the rate of G0/0/9 and G0/0/10 on S2 to 100 Mbit/s and configure them to
work in full duplex mode.
<Quidway>system-view

in

[Quidway]sysname S2
[S2-GigabitEthernet0/0/9]undo negotiation auto

ea

[S2-GigabitEthernet0/0/9]speed 100

/l

[S2-GigabitEthernet0/0/9]duplex full

:/

[S2-GigabitEthernet0/0/9]quit
[S2]interface GigabitEthernet 0/0/10

rn

[S2]interface GigabitEthernet 0/0/9

[S2-GigabitEthernet0/0/10]speed 100

tp

[S2-GigabitEthernet0/0/10]undo negotiation auto

ht

[S2-GigabitEthernet0/0/10]duplex full

ce

s:

Confirm that the rate and duplex mode of G0/0/9 and G0/0/10 have been set
on S1.
[S1]display interface GigabitEthernet 0/0/9

ur

GigabitEthernet0/0/9 current state : UP


Line protocol current state : UP
1,The Maximum Frame Length is 1600

Re

Switch Port,PVID :

so

Description:HUAWEI, Quidway Series, GigabitEthernet0/0/9 Interface


IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-82e1-aea6
Port Mode: COMMON COPPER

ng

Speed : 100, Loopback: NONE


Mdi

ni

Duplex: FULL, Negotiation: DISABLE


: AUTO

Mo

re

Le

ar

output omitted

Page4

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[S1]display interface GigabitEthernet 0/0/10

GigabitEthernet0/0/10 current state : UP

aw
ei
.c
om
/e

Line protocol current state : UP


Description:HUAWEI, Quidway Series, GigabitEthernet0/0/10 Interface
Switch Port,PVID :

1,The Maximum Frame Length is 1600

IP Sending Frames' Format is PKTFMT_ETHNT_2, Hardware address is 0018-82e1-aea6


Port Mode: COMMON COPPER
Speed : 100, Loopback: NONE
Duplex: FULL, Negotiation: DISABLE
Mdi

: AUTO

g.

hu

output omitted

in

Step 2 Configure manual link aggregation.

ea

rn

Create Eth-Trunk 1 on S1 and S2. Delete the default configuration from G0/0/9
and G0/0/10 on S1 and S2, and then add G0/0/9 and G0/0/10 to Eth-Trunk 1.

/l

[S1]interface Eth-Trunk 1
[S1]interface GigabitEthernet 0/0/9
[S1-GigabitEthernet0/0/9]eth-trunk 1

tp

[S1-GigabitEthernet0/0/9]quit

:/

[S1-Eth-Trunk1]quit

ht

[S1-GigabitEthernet0/0/9]interface GigabitEthernet 0/0/10

[S2]interface Eth-Trunk 1

ce

[S2-Eth-Trunk1]quit

s:

[S1-GigabitEthernet0/0/10]eth-trunk 1

[S2]interface GigabitEthernet 0/0/9

ur

[S2-GigabitEthernet0/0/9]eth-trunk 1

so

[S2-GigabitEthernet0/0/9]quit
[S2-GigabitEthernet0/0/9]interface GigabitEthernet 0/0/10

Re

[S2-GigabitEthernet0/0/10]eth-trunk 1

ng

Verify the Eth-Trunk configuration.

ni

[S1]display eth-trunk 1
Eth-Trunk1's state information is:

ar

WorkingMode: NORMAL

Hash arithmetic: According to SA-XOR-DA

Le

Least Active-linknumber: 1 Max Bandwidth-affected-linknumber: 8


Operate status: up

Number Of Up Port In Trunk: 2

----------------------------------------------------------------------------

re

PortName

Weight

Up

Mo

GigabitEthernet0/0/9

Status

HC Series

HUAWEI TECHNOLOGIES

Page5

HCNA-HNTD Module 1 Ethernet and VLAN


Up

GigabitEthernet0/0/10

aw
ei
.c
om
/e

[S2]display eth-trunk 1
Eth-Trunk1's state information is:
WorkingMode: NORMAL

Hash arithmetic: According to SA-XOR-DA

Least Active-linknumber: 1 Max Bandwidth-affected-linknumber: 8


Operate status: up

Number Of Up Port In Trunk: 2

---------------------------------------------------------------------------Status

Weight

Up

GigabitEthernet0/0/10

Up

g.

GigabitEthernet0/0/9

hu

PortName

rn

in

The greyed lines in the preceding information indicate that the Eth-Trunk works
properly.

ea

Step 3 Configuring Link Aggregation in Static LACP Mode

/l

Delete the configurations from G0/0/9 and G0/0/10 on S1 and S2.

:/

[S1]interface GigabitEthernet 0/0/9

[S1-GigabitEthernet0/0/9]undo eth-trunk

tp

[S1-GigabitEthernet0/0/9]quit

ht

[S1]interface GigabitEthernet 0/0/10

[S1-GigabitEthernet0/0/10]undo eth-trunk

s:

[S2]interface GigabitEthernet 0/0/9

ce

[S2-GigabitEthernet0/0/9]undo eth-trunk
[S2-GigabitEthernet0/0/9]quit

ur

[S2]interface GigabitEthernet 0/0/10

so

[S2-GigabitEthernet0/0/10]undo eth-trunk

Re

Create Eth-Trunk 1 and set the load balancing mode of the Eth-Trunk to static
LACP mode.

ng

[S1]interface Eth-Trunk 1

ni

[S1-Eth-Trunk1]mode lacp-static
[S1-Eth-Trunk1]quit

ar

[S1]interface GigabitEthernet 0/0/9

Le

[S1-GigabitEthernet0/0/9]eth-trunk 1
[S1-GigabitEthernet0/0/9]quit
[S1]interface GigabitEthernet 0/0/10

Mo

re

[S1-GigabitEthernet0/0/10]eth-trunk 1

Page6

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[S2]interface Eth-Trunk 1

[S2-Eth-Trunk1]mode lacp-static

aw
ei
.c
om
/e

[S2-Eth-Trunk1]quit
[S2]interface GigabitEthernet 0/0/9
[S2-GigabitEthernet0/0/9]eth-trunk 1
[S2-GigabitEthernet0/0/9]interface GigabitEthernet 0/0/10
[S2-GigabitEthernet0/0/10]eth-trunk 1

Verify that the LACP-static mode has been enabled on the two links.

hu

[S1]display eth-trunk
Eth-Trunk1's state information is:

g.

Local:
WorkingMode: STATIC

Preempt Delay: Disabled

Hash arithmetic: According to SA-XOR-DA

System Priority: 32768

System ID: 4c1f-cc45-aace

Least Active-linknumber: 1

Max Active-linknumber: 8

Operate status: up

Number Of Up Port In Trunk: 2

ea

rn

in

LAG ID: 1

Status

GigabitEthernet0/0/9

PortType PortPri PortNo PortKey PortState Weight

Selected 100M

32768

289

10111100 1

32768

10

289

10111100 1

tp

GigabitEthernet0/0/10 Selected 100M

:/

ActorPortName

/l

----------------------------------------------------------------------------

Partner:

ht

---------------------------------------------------------------------------SysPri

SystemID

GigabitEthernet0/0/9

32768

4c1f-cc45-aacc

s:

ActorPortName

32768

4c1f-cc45-aacc 32768

289

10111100

10

289

10111100

ur

ce

GigabitEthernet0/0/10 32768

PortPri PortNo PortKey PortState

Set the system priority on S1 to 100 to ensure S1 remains the Actor.

Re

so

[S1]lacp priority 100

Set the priority of the interface and determine active links on S1.

ng

[S1]interface GigabitEthernet 0/0/9


[S1-GigabitEthernet0/0/9]lacp priority 100

ni

[S1-GigabitEthernet0/0/9]quit

ar

[S1]interface GigabitEthernet 0/0/10

Mo

re

Le

[S1-GigabitEthernet0/0/10]lacp priority 100

HC Series

HUAWEI TECHNOLOGIES

Page7

HCNA-HNTD Module 1 Ethernet and VLAN

Verify the Eth-Trunk configuration.

[S1]display eth-trunk 1

aw
ei
.c
om
/e

Eth-Trunk1's state information is:


Local:
LAG ID: 1

WorkingMode: STATIC

Preempt Delay: Disabled

Hash arithmetic: According to SA-XOR-DA

System Priority: 100

System ID: 4c1f-cc45-aace

Least Active-linknumber: 1

Max Active-linknumber: 8

Operate status: up

Number Of Up Port In Trunk: 2

ActorPortName

Status

PortType PortPri PortNo PortKey PortState Weight

Selected 100M

100

289

GigabitEthernet0/0/10 Selected 100M

100

10

289

10111100 1

in

Partner:

10111100 1

g.

GigabitEthernet0/0/9

hu

----------------------------------------------------------------------------

rn

--------------------------------------------------------------------------SysPri

SystemID

PortPri PortNo PortKey PortState

GigabitEthernet0/0/9

32768

4c1f-cc45-aacc 32768

289

10111100

GigabitEthernet0/0/10 32768

4c1f-cc45-aacc 32768

10

289

10111100

/l

ea

ActorPortName

:/

[S2]display eth-trunk 1

tp

Eth-Trunk1's state information is:


Local:

WorkingMode: STATIC

Preempt Delay: Disabled

Hash arithmetic: According to SA-XOR-DA

System Priority: 32768

System ID: 4c1f-cc45-aacc

Least Active-linknumber: 1

Max Active-linknumber: 8

Number Of Up Port In Trunk: 2

ce

Operate status: up

s:

ht

LAG ID: 1

---------------------------------------------------------------------------Status

PortType PortPri PortNo PortKey PortState Weight

Selected 100M

so

GigabitEthernet0/0/9

ur

ActorPortName

GigabitEthernet0/0/10 Selected 100M

289

10111100 1

32768

10

289

10111100 1

Re

Partner:

32768

---------------------------------------------------------------------------SysPri

GigabitEthernet0/0/9

100

4c1f-cc45-aace

100

289

10111100

GigabitEthernet0/0/10 100

4c1f-cc45-aace

100

10

289

10111100

SystemID

PortPri PortNo PortKey PortState

ar

ni

ng

ActorPortName

Le

Final Configuration
[S1]display current-configuration

re

Mo

!Software Version V100R006C00SPC800

Page8

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


sysname S1

aw
ei
.c
om
/e

lacp priority 100


#
interface Eth-Trunk1
mode lacp-static
#
interface GigabitEthernet0/0/9
eth-trunk 1
lacp priority 100

hu

undo negotiation auto


speed 100

g.

in

interface GigabitEthernet0/0/10
eth-trunk 1

rn

lacp priority 100

ea

undo negotiation auto


speed 100

/l

ht

!Software Version V100R006C00SPC800

tp

[S2]display current-configuration

:/

return

sysname S2

s:

#
interface Eth-Trunk1

ce

mode lacp-static

ur

interface GigabitEthernet0/0/9

so

eth-trunk 1

Re

undo negotiation auto


speed 100
#

ng

interface GigabitEthernet0/0/10

ni

eth-trunk 1

undo negotiation auto

Le

ar

speed 100

Mo

re

return

HC Series

HUAWEI TECHNOLOGIES

Page9

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Lab 1-2 VLAN Configuration


Learning Objectives

As a result of this lab section, you should achieve the following tasks:

g.

hu

Assign port interfaces to become access and trunk ports.


Create VLANs.
Configure VLAN tagging over ports using the hybrid port link type.
Configure the default VLAN for an interface using the Port VLAN ID.

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

Topology

Re

Scenario

so

Figure 1.2 VLAN topology

Mo

re

Le

ar

ni

ng

The enterprise network currently operates in a single broadcast domain


resulting in a large amount of traffic being flooded to all network nodes. It is
required that the administrator attempt to control the flow of traffic at the link
layer by implementing VLAN solutions. The VLAN solutions are to be applied
to switches S1 and S2.

Page10

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment.

If you are starting this section with a non-configured device, begin here and
then move to step 2. For those continuing from previous labs, begin at step 2.
Establish an Eth-trunk link between S1 and S2.

hu

<Quidway>system-view
[Quidway]sysname S1

g.

[S1]interface Eth-trunk 1

in

[S1-Eth-Trunk1]mode lacp-static
[S1-Eth-Trunk1]quit

rn

[S1]interface GigabitEthernet0/0/9
[S1-Gigabitethernet0/0/9]eth-trunk 1

ea

[S1-Gigabitethernet0/0/9]interface GigabitEthernet0/0/10

/l

[S1-Gigabitethernet0/0/10]eth-trunk 1

:/

On S2, add interfaces to an Eth-Trunk using the Eth-Trunk view.

tp

<Quidway>system-view

ht

[Quidway]sysname S2
[S2]interface eth-trunk 1
[S2-Eth-Trunk1]mode lacp-static

s:

[S2-Eth-Trunk1]trunkport GigabitEthernet 0/0/9

ce

[S2-Eth-Trunk1]trunkport GigabitEthernet 0/0/10

so

ur

Step 2 Disable unused interfaces and establish a VLAN trunk.

ng

Re

Unused interfaces must be disabled to ensure test result accuracy. In this lab,
interfaces Ethernet 0/0/1 and Ethernet 0/0/23 on S3 and Ethernet0/0/14 on S4
need to be shut down.
<Quidway>system-view

ni

Enter system view, return user view with Ctrl+Z.


[Quidway]sysname S3

ar

[S3]interface Ethernet 0/0/1

Le

[S3-Ethernet0/0/1]shutdown
[S3-Ethernet0/0/1]quit
[S3]interface Ethernet 0/0/23

Mo

re

[S3-Ethernet0/0/23]shutdown

HC Series

HUAWEI TECHNOLOGIES

Page11

HCNA-HNTD Module 1 Ethernet and VLAN

<Quidway>system-view

aw
ei
.c
om
/e

Enter system view, return user view with Ctrl+Z.


[Quidway]sysname S4
[S4]interface Ethernet 0/0/14
[S4-Ethernet0/0/14]shutdown

hu

The link type of a switch port interface is hybrid by default. Configure the port
link-type for Eth-Trunk 1 to become a trunk port. Additionally, allow all VLANS
to be permitted over the trunk port.
[S1]interface Eth-Trunk 1

g.

[S1-Eth-Trunk1]port link-type trunk

in

[S1-Eth-Trunk1]port trunk allow-pass vlan all

rn

[S2]interface Eth-Trunk 1

/l

[S2-Eth-Trunk1]port trunk allow-pass vlan all

ea

[S2-Eth-Trunk1]port link-type trunk

tp

:/

Step 3 Configure VLANs.

s:

ht

Use S3, R1, R3, and S4 as non-VLAN aware hosts. There are two methods to
create VLANs, and two methods to bind interfaces to the created VLANs, S1
and S2 are used to demonstrate the two methods. All interfaces associated
with hosts should be configured as access ports.

ur

ce

On S1, associate interface Gigabit Ethernet 0/0/13 with VLAN 3, and interface
Gigabit Ethernet 0/0/1 with VLAN 4.

so

On S2, associate interface Gigabit Ethernet 0/0/2 with VLAN4, and Gigabit
Ethernet 0/0/24 with VLAN 2.

Re

[S1]interface GigabitEthernet0/0/13
[S1-GigabitEthernet0/0/13]port link-type access

ng

[S1-GigabitEthernet0/0/13]quit
[S1]interface GigabitEthernet0/0/1

ni

[S1-GigabitEthernet0/0/1]port link-type access


[S1-GigabitEthernet0/0/1]quit

ar

[S1]vlan 2

Le

[S1-vlan2]vlan 3
[S1-vlan3]port GigabitEthernet0/0/13
[S1-vlan3]vlan 4

Mo

re

[S1-vlan4]port GigabitEthernet0/0/1

Page12

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[S2]vlan batch 2 to 4

[S2]interface GigabitEthernet 0/0/3

aw
ei
.c
om
/e

[S2-GigabitEthernet0/0/3]port link-type access


[S2-GigabitEthernet0/0/3]port default vlan 4
[S2-GigabitEthernet0/0/3]quit
[S2]interface GigabitEthernet 0/0/24
[S2-GigabitEthernet0/0/24]port link-type access
[S2-GigabitEthernet0/0/24]port default vlan 2

hu

Verify that the VLAN configuration has been correctly applied to S1 and S2.
<S1>display vlan

g.

The total number of vlans is : 4


D: Down;

TG: Tagged;

MP: Vlan-mapping;

UT: Untagged;

ST: Vlan-stacking;

*: Management-vlan;

ea

#: ProtocolTransparent-vlan;

rn

U: Up;

in

----------------------------------------------------------------------------

Ports

:/

VID Type

/l

----------------------------------------------------------------------------

UT:GE0/0/2(U) GE0/0/3(U)

GE0/0/4(U)

GE0/0/5(U)

GE0/0/6(D)

GE0/0/7(D)

GE0/0/8(D)

GE0/0/11(D)

GE0/0/12(D)

GE0/0/14(D)

GE0/0/15(D)

GE0/0/16(D)

GE0/0/17(D)

GE0/0/18(D)

GE0/0/19(D)

GE0/0/20(D)

GE0/0/21(U)

GE0/0/22(U)

GE0/0/23(U)

GE0/0/24(D)

tp

common

s:

ht

----------------------------------------------------------------------------

Eth-Trunk1(U)
common TG:Eth-Trunk1(U)

common UT:GE0/0/13(U)

common UT:GE0/0/1(U)

ur

ce

so

TG:Eth-Trunk1(U)

Re

TG:Eth-Trunk1(U)

Mo

re

Le

ar

ni

ng

output omitted

HC Series

HUAWEI TECHNOLOGIES

Page13

HCNA-HNTD Module 1 Ethernet and VLAN


<S2>display vlan

U: Up;

D: Down;

TG: Tagged;

MP: Vlan-mapping;

UT: Untagged;

ST: Vlan-stacking;

#: ProtocolTransparent-vlan;

*: Management-vlan;

aw
ei
.c
om
/e

----------------------------------------------------------------------------

---------------------------------------------------------------------------VID Type

Ports

---------------------------------------------------------------------------GE0/0/4(U)

GE0/0/6(D)

GE0/0/7(D)

GE0/0/8(D)

GE0/0/12(U)

GE0/0/13(U)

GE0/0/14(D)

GE0/0/16(D)

GE0/0/17(D)

GE0/0/18(D)

GE0/0/20(D)

GE0/0/21(D)

GE0/0/22(D)

common UT:GE0/0/3(U)

GE0/0/23(D)

:/

GE0/0/19(D)

/l

TG:Eth-Trunk1(U)
common TG:Eth-Trunk1(U)

GE0/0/15(D)

ea

common UT:GE0/0/24(U)

GE0/0/11(U)

rn

Eth-Trunk1(U)
2

GE0/0/5(U)

hu

UT:GE0/0/1(U) GE0/0/2(U)

g.

common

in

TG:Eth-Trunk1(U)

tp

output omitted

s:

ht

The highlighted entries confirm the binding of the interfaces to each created
VLAN. All VLANs are permitted over the trunk (TG) port Eth-Trunk 1.

ur

ce

Step 4 Configure IP addressing for each VLAN.

Re

so

Configure IP addresses on hosts, R1, S3, R3, and S4 as part of the respective
VLANs. Physical port interfaces on switches cannot be configured with IP
addresses, therefore configure the native management interface Vlanif1 with
the IP address for the switch.

ng

<Huawei>system-view
[Huawei]sysname R1

ni

[R1]interface GigabitEthernet0/0/1

ar

[R1-GigabitEthernet0/0/1]ip address 10.0.4.1 24

Le

[S3]interface vlanif 1

Mo

re

[S3-vlanif1]ip address 10.0.4.2 24

Page14

HUAWEI TECHNOLOGIES

The total number of vlans is : 4

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

<Huawei>system-view

aw
ei
.c
om
/e

[Huawei]sysname R3
[R3]interface GigabitEthernet0/0/2
[R3-GigabitEthernet0/0/2]ip address 10.0.4.3 24
[S4]interface vlanif 1
[S4-vlanif1]ip address 10.0.4.4 24

hu

Step 5 Verify the configuration, by checking the connectivity.

in

g.

Use the ping command. R1 and R3 in VLAN 4 should be able to communicate


with one another. Devices in other VLANs should be unable to communicate.

rn

[R1]ping 10.0.4.3

PING 10.0.4.3: 56 data bytes, press CTRL_C to break

ea

Reply from 10.0.4.3: bytes=56 Sequence=1 ttl=255 time=6 ms

/l

Reply from 10.0.4.3: bytes=56 Sequence=2 ttl=255 time=2 ms


Reply from 10.0.4.3: bytes=56 Sequence=3 ttl=255 time=2 ms

:/

Reply from 10.0.4.3: bytes=56 Sequence=4 ttl=255 time=2 ms

ht

--- 10.0.4.3 ping statistics --5 packet(s) transmitted


5 packet(s) received

s:

0.00% packet loss

tp

Reply from 10.0.4.3: bytes=56 Sequence=5 ttl=255 time=2 ms

ce

round-trip min/avg/max = 2/2/6 ms

ur

[R1]ping 10.0.4.4

so

PING 10.0.4.4: 56 data bytes, press CTRL_C to break


Request time out

Re

Request time out


Request time out

ng

Request time out

ni

Request time out

ar

--- 10.0.4.4 ping statistics --5 packet(s) transmitted

Le

0 packet(s) received

re

100.00% packet loss

Mo

You may wish to also try between R1 and S3, and between R3 and S4.

HC Series

HUAWEI TECHNOLOGIES

Page15

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Step 6 Configure a hybrid interface.


Use the hybrid port link type to allow VLAN tagging to be closely managed at a
port interface level. We shall use hybrid ports to allow tagged frames from
VLAN 4 to be received by VLAN 2 and vice versa.
Set the port link type of port interface Gigabit Ethernet 0/0/1 of port S1 and the
interfaces Gigabit Ethernet 0/0/3 and 0/0/24 of S2 as hybrid ports. Additionally
set the hybrid ports to untag all frames associated with VLAN 2 and 4.

hu

[S1]interface GigabitEthernet 0/0/1


[S1-GigabitEthernet0/0/1]port link-type hybrid

in

[S1-GigabitEthernet0/0/1]port hybrid untagged vlan 2 4

g.

[S1-GigabitEthernet0/0/1]undo port default vlan

rn

[S1-GigabitEthernet0/0/1]port hybrid pvid vlan 4

ea

[S2]interface GigabitEthernet 0/0/3


[S2-GigabitEthernet0/0/3]undo port default vlan

/l

[S2-GigabitEthernet0/0/3]port link-type hybrid

:/

[S2-GigabitEthernet0/0/3]port hybrid untagged vlan 2 4


[S2-GigabitEthernet0/0/3]port hybrid pvid vlan 4

tp

[S2-GigabitEthernet0/0/3]quit

[S2]interface GigabitEthernet 0/0/24

ht

[S2-GigabitEthernet0/0/24]undo port default vlan


[S2-GigabitEthernet0/0/24]port link-type hybrid

s:

[S2-GigabitEthernet0/0/24]port hybrid untagged vlan 2 4

ur

ce

[S2-GigabitEthernet0/0/24]port hybrid pvid vlan 2

Re

so

The port hybrid pvid vlan command will ensure frames received from the
host are tagged with the appropriate VLAN tag. Frames received from VLAN 2
or 4 will be untagged at the interface before being forwarded to the host.

ng

Use the ping command to verify that R3 in VLAN 4 is still reachable.

ni

<R1>ping 10.0.4.3

PING 10.0.4.3: 56 data bytes, press CTRL_C to break

ar

Reply from 10.0.4.3: bytes=56 Sequence=1 ttl=255 time=1 ms

Le

Reply from 10.0.4.3: bytes=56 Sequence=2 ttl=255 time=1 ms


Reply from 10.0.4.3: bytes=56 Sequence=3 ttl=255 time=1 ms

Mo

re

Reply from 10.0.4.3: bytes=56 Sequence=4 ttl=255 time=10 ms


Reply from 10.0.4.3: bytes=56 Sequence=5 ttl=255 time=1 ms

Page16

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


--- 10.0.4.3 ping statistics ---

5 packet(s) transmitted

aw
ei
.c
om
/e

5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 1/2/10 ms

Use the ping command to test whether S4 in VLAN 2 is now reachable from R1
in VLAN 4.
<R1>ping 10.0.4.4

hu

PING 10.0.4.4: 56 data bytes, press CTRL_C to break

Reply from 10.0.4.4: bytes=56 Sequence=1 ttl=255 time=41 ms

g.

Reply from 10.0.4.4: bytes=56 Sequence=2 ttl=254 time=2 ms

in

Reply from 10.0.4.4: bytes=56 Sequence=3 ttl=254 time=3 ms


Reply from 10.0.4.4: bytes=56 Sequence=4 ttl=254 time=2 ms

ea

rn

Reply from 10.0.4.4: bytes=56 Sequence=5 ttl=254 time=2 ms


--- 10.0.4.4 ping statistics ---

/l

5 packet(s) transmitted
0.00% packet loss

tp

round-trip min/avg/max = 2/10/41 ms

:/

5 packet(s) received

so

ur

Final Configuration

ce

s:

ht

In using the hybrid port link type, frames originating from VLAN 4 are now able
to be received by VLAN 2 and vice versa, whilst still being unable to reach the
host address of 10.0.4.2 in VLAN 3.

[R1]display current-configuration

Re

[V200R003C00SPC200]
#

ng

sysname R1
#

ni

interface GigabitEthernet0/0/1
#

ar

ip address 10.0.4.1 255.255.255.0

Le

return

re

[S3]display current-configuration

Mo

HC Series

HUAWEI TECHNOLOGIES

Page17

HCNA-HNTD Module 1 Ethernet and VLAN


!Software Version V100R006C00SPC800

sysname S3

aw
ei
.c
om
/e

#
interface Vlanif1
ip address 10.0.4.2 255.255.255.0
#
interface Ethernet0/0/1
shutdown
#
interface Ethernet0/0/23

hu

shutdown
#

in

g.

return
[S1]display current-configuration

rn

ea

!Software Version V100R006C00SPC800


sysname S1

/l

:/

vlan batch 2 to 4
#

tp

lacp priority 100


#

ht

interface Eth-Trunk1
port link-type trunk

s:

port trunk allow-pass vlan 2 to 4094


mode lacp-static

ce

ur

interface GigabitEthernet0/0/1
port hybrid pvid vlan 4

so

port hybrid untagged vlan 2 4

Re

interface GigabitEthernet0/0/9
eth-trunk 1

ng

lacp priority 100

ni

undo negotiation auto


speed 100

ar

Le

interface GigabitEthernet0/0/10
eth-trunk 1
lacp priority 100

re

undo negotiation auto

Mo

speed 100

Page18

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


#

interface GigabitEthernet0/0/13

aw
ei
.c
om
/e

port link-type access


port default vlan 3
#
return
[S2]display current-configuration
#
!Software Version V100R006C00SPC800

hu

sysname S2
#

g.

vlan batch 2 4

in

#
interface Eth-Trunk1

rn

port link-type trunk

ea

port trunk allow-pass vlan 2 to 4094


mode lacp-static

/l

:/

interface GigabitEthernet0/0/3
port hybrid pvid vlan 4

tp

port hybrid untagged vlan 2 4


#

ht

interface GigabitEthernet0/0/9
eth-trunk 1

s:

undo negotiation auto


speed 100

ce

ur

interface GigabitEthernet0/0/10
eth-trunk 1

so

undo negotiation auto

Re

speed 100
#

interface GigabitEthernet0/0/24

ng

port hybrid pvid vlan 2

ni

port hybrid untagged vlan 2 4


#

Le

ar

interface NULL0
user-interface con 0
user-interface vty 0 4

re

Mo

return

HC Series

HUAWEI TECHNOLOGIES

Page19

HCNA-HNTD Module 1 Ethernet and VLAN

[R3]display current-configuration

aw
ei
.c
om
/e

[V200R003C00SPC200]
#
sysname R3
#
interface GigabitEthernet0/0/2
ip address 10.0.4.3 255.255.255.0
#

hu

return
[S4]display current-configuration

g.

in

!Software Version V100R006C00SPC800


sysname S4

rn

ea

interface Vlanif1
ip address 10.0.4.4 255.255.255.0

/l

:/

interface Ethernet0/0/14
shutdown

tp

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

return

Page20

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Lab 1-3 GVRP Configuration


Learning Objectives

As a result of this lab section, you should achieve the following tasks:

Configuration of GVRP.
Setting of the GVRP registration mode.

ht

tp

:/

/l

ea

rn

in

g.

hu

Topology

s:

Figure 1.3 GVRP topology

ur

ce

Scenario

Mo

re

Le

ar

ni

ng

Re

so

The enterprise network contains multiple switches which are expected to be


regularly managed. VLANs are required to be applied and removed as
necessary on all switches however this tends to be a laborious task for the
administrator and often configuration mistakes occur due to human error. The
administrator wishes to simplify the VLAN management process and has
requested that GVRP be enabled on all switchs and the registration mode on
the interfaces be set.

HC Series

HUAWEI TECHNOLOGIES

Page21

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
<Quidway>system-view
[Quidway]sysname S1

hu

[S1]interface GigabitEthernet 0/0/9

g.

[S1-GigabitEthernet0/0/9]shutdown
[S1-GigabitEthernet0/0/9]quit

in

[S1]interface GigabitEthernet 0/0/10

rn

[S1-GigabitEthernet0/0/10]shutdown

ea

<Quidway>system-view
[Quidway]sysname S2

/l

[S2]interface GigabitEthernet 0/0/9


[S2-GigabitEthernet0/0/9]quit

ht

[S2-GigabitEthernet0/0/10]shutdown

[Quidway]sysname S3

ur

[Quidway]sysname S4

ce

[S3-Ethernet0/0/23]shutdown

s:

<Quidway>system-view

<Quidway>system-view

tp

[S2]interface GigabitEthernet 0/0/10

:/

[S2-GigabitEthernet0/0/9]shutdown

Re

so

[S4-Ethernet0/0/14]shutdown

ng

Step 2 Clean up the previous configuration

ar

ni

Remove the unsed VLANs and disable the Eth-Trunk interface on S1 and S2.
Remove Vlanif1 on S3 and S4 and bring up interface Ethernet 0/0/1 on S3.
[S1]undo vlan batch 2 to 4

Le

Warning: The configurations of the VLAN will be deleted. Continue?[Y/N]:y


Info: This operation may take a few seconds. Please wait for a moment...done.

re

[S1]interface Eth-Trunk 1

Mo

[S1-Eth-Trunk1]shutdown

Page22

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[S2]undo vlan batch 2 to 4

aw
ei
.c
om
/e

Info: This operation may take a few seconds. Please wait for a moment...done.
[S2]interface Eth-Trunk 1
[S2-Eth-Trunk1]shutdown
[S2-Eth-Trunk1]quit
[S2]interface GigabitEthernet 0/0/24
[S2-GigabitEthernet0/0/24]undo port hybrid vlan 2 4
[S3]interface Ethernet 0/0/1

hu

[S3-Ethernet0/0/1]undo shutdown
[S3-Ethernet0/0/1]quit

g.

[S3]undo interface Vlanif 1

in

Info: This operation may take a few seconds. Please wait for a moment...succeeded.

rn

[S4]undo interface Vlanif 1

/l

ea

Info: This operation may take a few seconds. Please wait for a moment...succeeded.

:/

Step 3 Configure trunk links between the switches.


[S1]interface GigabitEthernet 0/0/13

tp

[S1-Gigabitethernet0/0/13]port link-type trunk

ht

[S1-Gigabitethernet0/0/13]port trunk allow-pass vlan all


[S3]interface Ethernet 0/0/13

s:

[S3-Ethernet0/0/13]port link-type trunk

ce

[S3-Ethernet0/0/13]port trunk allow-pass vlan all


[S3-Ethernet0/0/13]quit

ur

[S3]interface Ethernet 0/0/1

so

[S3-Ethernet0/0/1]port link-type trunk

Re

[S3-Ethernet0/0/1]port trunk allow-pass vlan all


[S2]interface GigabitEthernet 0/0/24

ng

[S2-Gigabitethernet0/0/24]port link-type trunk

ni

[S2-Gigabitethernet0/0/24]port trunk allow-pass vlan all

ar

[S4]interface Ethernet 0/0/24


[S4-Ethernet0/0/24]port link-type trunk

Le

[S4-Ethernet0/0/24]port trunk allow-pass vlan all


[S4-Ethernet0/0/24]quit

re

[S4]interface Ethernet 0/0/1

Mo

[S4-Ethernet0/0/1]port link-type trunk


[S4-Ethernet0/0/1]port trunk allow-pass vlan all

HC Series

HUAWEI TECHNOLOGIES

Warning: The configurations of the VLAN will be deleted. Continue?[Y/N]:y

Page23

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Step 1 Enable GVRP globally, and on all relevant interfaces.


[S1]gvrp
[S1]interface GigabitEthernet 0/0/13
[S1-GigabitEthernet0/0/13]gvrp
[S3]gvrp
[S3]interface Ethernet 0/0/13
[S3-Ethernet0/0/13]gvrp

hu

[S3-Ethernet0/0/13]quit
[S3]interface Ethernet 0/0/1

in

g.

[S3-Ethernet0/0/1]gvrp
[S2]gvrp

rn

[S2]interface GigabitEthernet 0/0/24

ea

[S2-Gigabitethernet0/0/24]gvrp

/l

[S4]gvrp
[S4]interface Ethernet0/0/24

:/

[S4-Ethernet0/0/24]gvrp

tp

[S4-Ethernet0/0/24]quit
[S4]interface Ethernet 0/0/1

ht

[S4-Ethernet0/0/1]gvrp

s:

Create VLAN 100 on S1, VLAN 200 on S2 and VLAN 2 on S1, S2, S3 and S4.

ce

[S1]vlan batch 2 100


[S2]vlan batch 2 200

ur

[S3]vlan 2

so

[S4]vlan 2

Re

Run the display gvrp statistics command on S3 and S4 to view the GVRP
statistics.

ng

[S3]display gvrp statistics


: Enabled

GVRP registrations failed

: 0

GVRP last PDU origin

: 5489-98ec-f012

GVRP registration type

: Normal

Le

GVRP status

ar

ni

GVRP statistics on port Ethernet0/0/1

Mo

re

GVRP statistics on port Ethernet0/0/13


GVRP status

Page24

: Enabled

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


: 0

GVRP last PDU origin

: 4c1f-cc45-aace
: Normal

aw
ei
.c
om
/e

GVRP registration type

GVRP registrations failed

[S4]display gvrp statistics


GVRP statistics on port Ethernet0/0/1
: Enabled

GVRP registrations failed

: 0

GVRP last PDU origin

: 781d-ba99-d977

GVRP registration type

: Normal

hu

GVRP status

GVRP statistics on port Ethernet0/0/24


: Enabled

GVRP registrations failed

: 0

GVRP last PDU origin

: 4c1f-cc45-aacc

GVRP registration type

: Normal

ea

rn

in

g.

GVRP status

/l

The registration type is set as normal by default. Use the display vlan
command to verify the VLAN configuration on S3 and S4.

:/

[S3]display vlan

tp

The total number of vlans is : 4

---------------------------------------------------------------------------D: Down;

TG: Tagged;

MP: Vlan-mapping;

ht

U: Up;

UT: Untagged;

ST: Vlan-stacking;
*: Management-vlan;

s:

#: ProtocolTransparent-vlan;

VID Type

ce

---------------------------------------------------------------------------Ports

common

UT:Eth0/0/1(U) Eth0/0/2(D)

so

ur

---------------------------------------------------------------------------Eth0/0/6(D)

Eth0/0/7(D)

Eth0/0/8(D)

Eth0/0/9(D)

Eth0/0/10(D)

Eth0/0/11(D)

Eth0/0/12(D)

Eth0/0/13(U)

Eth0/0/14(D)

Eth0/0/15(D)

Eth0/0/16(D)

Eth0/0/17(D)

Eth0/0/18(D)

Eth0/0/19(D)

Eth0/0/20(D)

Eth0/0/21(D)

Eth0/0/22(D)

Eth0/0/23(D)

Eth0/0/24(D)

GE0/0/1(D)

GE0/0/2(D)

GE0/0/3(D)

GE0/0/4(D)

ng

Re

Eth0/0/5(D)

ni

common

Eth0/0/4(D)

TG:Eth0/0/1(U) Eth0/0/13(U)

ar

Eth0/0/3(D)

100 dynamic TG:Eth0/0/13(U)

Le

200 dynamic TG:Eth0/0/1(U)

Mo

re

output omitted

HC Series

HUAWEI TECHNOLOGIES

Page25

HCNA-HNTD Module 1 Ethernet and VLAN


[S4]display vlan

U: Up;

D: Down;

TG: Tagged;

MP: Vlan-mapping;

UT: Untagged;

ST: Vlan-stacking;

#: ProtocolTransparent-vlan;

*: Management-vlan;

aw
ei
.c
om
/e

----------------------------------------------------------------------------

---------------------------------------------------------------------------VID Type

Ports

----------------------------------------------------------------------------

common

Eth0/0/3(D)

Eth0/0/4(D)

Eth0/0/6(D)

Eth0/0/7(D)

Eth0/0/8(D)

Eth0/0/9(D)

Eth0/0/10(D)

Eth0/0/11(D)

Eth0/0/13(D)

Eth0/0/14(D)

Eth0/0/15(D)

Eth0/0/17(D)

Eth0/0/18(D)

Eth0/0/19(D)

Eth0/0/21(D)

Eth0/0/22(D)

Eth0/0/23(D)

Eth0/0/24(U)

GE0/0/1(D)

GE0/0/2(D)

GE0/0/3(D)

GE0/0/4(D)

hu

UT:Eth0/0/1(U) Eth0/0/2(D)
Eth0/0/5(D)

Eth0/0/12(D)

g.

Eth0/0/16(D)
Eth0/0/20(D)

in

rn

common

TG:Eth0/0/1(U) Eth0/0/24(U)

ea

100 dynamic TG:Eth0/0/1(U)

/l

200 dynamic TG:Eth0/0/24(U)

:/

output omitted

ht

tp

S3 and S4 are learning VLAN 100 and VLAN 200 dynamically, but only in one
direction. VLAN 2 has been statically defined. Create VLAN 200 on S1 and
VLAN 100 on S2 to enable 2-way propagation.
[S1]vlan 200

s:

[S2]vlan 100

ce

Run the display vlan command to verify the configuration.


output omitted
Ports

so

VID Type

ur

[S3]display vlan

---------------------------------------------------------------------------UT:Eth0/0/1(U) Eth0/0/2(D)

Eth0/0/3(D)

Eth0/0/4(D)

Eth0/0/5(D)

Eth0/0/6(D)

Eth0/0/7(D)

Eth0/0/8(D)

Eth0/0/9(D)

Eth0/0/10(D)

Eth0/0/11(D)

Eth0/0/12(D)

Eth0/0/13(U)

Eth0/0/14(D)

Eth0/0/15(D)

Eth0/0/16(D)

Eth0/0/17(D)

Eth0/0/18(D)

Eth0/0/19(D)

Eth0/0/20(D)

Eth0/0/21(D)

Eth0/0/22(D)

Eth0/0/23(D)

Eth0/0/24(D)

GE0/0/1(D)

GE0/0/2(D)

GE0/0/3(D)

GE0/0/4(D)

Re

common

ar

ni

ng

common

Le

TG:Eth0/0/1(U) Eth0/0/13(U)

100 dynamic TG:Eth0/0/1(U) Eth0/0/13(U)

re

200 dynamic TG:Eth0/0/1(U) Eth0/0/13(U)

Mo

output omitted

Page26

HUAWEI TECHNOLOGIES

The total number of vlans is : 4

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[S4]display vlan
Ports

aw
ei
.c
om
/e

VID Type

output omitted
---------------------------------------------------------------------------common

common

UT:Eth0/0/1(U) Eth0/0/2(D)

Eth0/0/3(D)

Eth0/0/4(D)

Eth0/0/5(D)

Eth0/0/6(D)

Eth0/0/7(D)

Eth0/0/8(D)

Eth0/0/9(D)

Eth0/0/10(D)

Eth0/0/11(D)

Eth0/0/12(D)

Eth0/0/13(D)

Eth0/0/14(D)

Eth0/0/15(D)

Eth0/0/16(D)

Eth0/0/17(D)

Eth0/0/18(D)

Eth0/0/19(D)

Eth0/0/20(D)

Eth0/0/21(D)

Eth0/0/22(D)

Eth0/0/23(D)

Eth0/0/24(U)

GE0/0/1(D)

GE0/0/2(D)

GE0/0/3(D)

GE0/0/4(D)

hu

TG:Eth0/0/1(U) Eth0/0/24(U)

g.

100 dynamic TG:Eth0/0/1(U) Eth0/0/24(U)

in

200 dynamic TG:Eth0/0/1(U) Eth0/0/24(U)

rn

output omitted

/l

ea

The highlighted entries indicate the interfaces that have been added to
VLAN100 and VLAN200 on both S3 and S4.

:/

Step 2 Change the registration type for the interfaces

ht

tp

Change the registration type of Ethernet 0/0/1 on S3 to fixed. The same steps
can be performed on Ethernet 0/0/1 of S4.
[S3]interface Ethernet 0/0/1

ce

s:

[S3-Ethernet0/0/1]gvrp registration fixed

Run the display gvrp statistics command on S3 and S4 to view the changes.

ur

[S3]display gvrp statistics interface Ethernet 0/0/1

so

GVRP statistics on port Ethernet0/0/1


GVRP status

: Enabled
: 12

GVRP last PDU origin

: 5489-98ec-f012

GVRP registration type

: Fixed

ng

Re

GVRP registrations failed

Mo

re

Le

ar

ni

The GVRP registration type is verified as fixed on Ethernet 0/0/1 interface.


Dynamic VLANs are not allowed to register on this interface.

HC Series

HUAWEI TECHNOLOGIES

Page27

HCNA-HNTD Module 1 Ethernet and VLAN

Run the display vlan command to view the effect of the fixed registration type.

[S3]display vlan
VID Type

aw
ei
.c
om
/e

output omitted
Ports

common

UT:Eth0/0/1(U) Eth0/0/2(D)

Eth0/0/3(D)

Eth0/0/4(D)

Eth0/0/5(D)

Eth0/0/6(D)

Eth0/0/7(D)

Eth0/0/8(D)

Eth0/0/9(D)

Eth0/0/10(D)

Eth0/0/11(D)

Eth0/0/12(D)

Eth0/0/13(U)

Eth0/0/14(D)

Eth0/0/15(D)

Eth0/0/16(D)

Eth0/0/17(D)

Eth0/0/18(D)

Eth0/0/19(D)

Eth0/0/20(D)

Eth0/0/21(D)

Eth0/0/22(D)

Eth0/0/23(D)

GE0/0/1(D)

GE0/0/2(D)

GE0/0/3(D)

common TG:Eth0/0/1(U) Eth0/0/13(U)

GE0/0/4(D)

in

100 dynamic TG:Eth0/0/13(U)

Eth0/0/24(D)

g.

hu

----------------------------------------------------------------------------

rn

200 dynamic TG:Eth0/0/13(U)

/l

ea

The highlighted entries show that interface Ethernet 0/0/1 is not in registering
dynamic VLANs 100 and 200.

tp

:/

Configure interface Ethernet 0/0/1 of S3 to use the forbidden registration type.


The same steps can be performed on Ethernet 0/0/1 of S4.
[S3]interface Ethernet 0/0/1

ht

[S3-Ethernet0/0/1]gvrp registration forbidden

s:

Run the display gvrp statistics command to view the changes to GVRP.

ce

[S3]display gvrp statistics interface Ethernet 0/0/1

ur

GVRP statistics on port Ethernet0/0/1


GVRP status

: Enabled
: 18

GVRP last PDU origin

: 5489-98ec-f012

GVRP registration type

: Forbidden

ng

Re

so

GVRP registrations failed

Mo

re

Le

ar

ni

The GVRP registration type is set to forbidden on the Ethernet 0/0/1 interface.

Page28

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

Run the display vlan command to view the effect of the forbidden registration.

[S3]display vlan

aw
ei
.c
om
/e

The total number of vlans is : 4


output omitted
VID Type

Ports

common

UT:Eth0/0/1(U) Eth0/0/2(D)

Eth0/0/3(D)

Eth0/0/4(D)

Eth0/0/5(D)

Eth0/0/6(D)

Eth0/0/7(D)

Eth0/0/8(D)

Eth0/0/9(D)

Eth0/0/10(D)

Eth0/0/11(D)

Eth0/0/12(D)

Eth0/0/13(U)

Eth0/0/14(D)

Eth0/0/15(D)

Eth0/0/16(D)

Eth0/0/17(D)

Eth0/0/18(D)

Eth0/0/19(D)

Eth0/0/21(D)

Eth0/0/22(D)

Eth0/0/23(D)

GE0/0/1(D)

GE0/0/2(D)

GE0/0/3(D)

GE0/0/4(D)

TG:Eth0/0/13(U)

Eth0/0/20(D)
Eth0/0/24(D)

g.

common

in

hu

----------------------------------------------------------------------------

rn

100 dynamic TG:Eth0/0/13(U)

ea

200 dynamic TG:Eth0/0/13(U)

:/

/l

Forbidden mode only allows VLAN1 pass over interface Ethernet 0/0/1, all
other VLANS are restricted.

ht

tp

Final Configuration
[S1]dis current-configuration
#

s:

!Software Version V100R006C00SPC800

ce

sysname S1
vlan batch 2 100 200
#

so

gvrp

ur

Re

interface Eth-Trunk1

ng

shutdown

port link-type trunk

ni

port trunk allow-pass vlan 2 to 4094


#

ar

mode lacp-static

Le

interface GigabitEthernet0/0/1
port hybrid untagged vlan 2 4

re

interface GigabitEthernet0/0/9

Mo

shutdown

HC Series

HUAWEI TECHNOLOGIES

Page29

HCNA-HNTD Module 1 Ethernet and VLAN


eth-trunk 1

lacp priority 100

aw
ei
.c
om
/e

undo negotiation auto


speed 100
#
interface GigabitEthernet0/0/10
shutdown
eth-trunk 1
lacp priority 100
undo negotiation auto

hu

speed 100
#

g.

interface GigabitEthernet0/0/13

in

port link-type trunk


port trunk allow-pass vlan 2 to 4094

rn

gvrp

ea

/l

return

:/

[S2]dis current-configuration
!Software Version V100R006C00SPC800
sysname S2

ht

tp

vlan batch 2 100 200

s:

#
gvrp

ce

#
shutdown

so

port link-type trunk

ur

interface Eth-Trunk1

Re

port trunk allow-pass vlan 2 to 4094


mode lacp-static
#

ng

interface GigabitEthernet0/0/3

ni

port hybrid untagged vlan 2 4


#

ar

interface GigabitEthernet0/0/9

Le

shutdown

eth-trunk 1
undo negotiation auto

re

speed 100

Mo

Page30

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


interface GigabitEthernet0/0/10

shutdown

aw
ei
.c
om
/e

eth-trunk 1
undo negotiation auto
speed 100
#
interface GigabitEthernet0/0/24
port link-type trunk
port trunk allow-pass vlan 2 to 4094
gvrp

hu

g.

return

in

[S3]display current-configuration
#

rn

!Software Version V100R006C00SPC800

ea

sysname S3
#

/l

vlan batch 2

:/

#
gvrp

tp

#
interface Ethernet0/0/1

ht

port link-type trunk

port trunk allow-pass vlan 2 to 4094

s:

gvrp
#
port link-type trunk

ur

interface Ethernet0/0/13

ce

gvrp registration forbidden

so

port trunk allow-pass vlan 2 to 4094

Re

gvrp
#
shutdown

ar

return

ni

ng

interface Ethernet0/0/23

Le

[S4]display current-configuration
#

!Software Version V100R006C00SPC800

re

sysname S4

Mo

HC Series

HUAWEI TECHNOLOGIES

Page31

HCNA-HNTD Module 1 Ethernet and VLAN


vlan batch 2

aw
ei
.c
om
/e

gvrp
#
interface Ethernet0/0/1
port link-type trunk
port trunk allow-pass vlan 2 to 4094
gvrp
gvrp registration forbidden
#

hu

interface Ethernet0/0/14
shutdown

g.

in

interface Ethernet0/0/24
port link-type trunk

rn

port trunk allow-pass vlan 2 to 4094

ea

gvrp
#

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

return

Page32

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Lab 1-4 VLAN Routing


Learning Objectives

As a result of this lab section, you should achieve the following tasks:
Establishment of a trunk inteface for VLAN routing.
Configuration of sub-interfaces on a single physical interface.
Enabling of ARP messages to be broadcast between VLANS.

hu

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g.

Topology

ng

Re

Figure 1.4 VLAN routing topology using a layer 2 switch.

ni

Scenario

Mo

re

Le

ar

The implementation of VLANs in the enterprise network has resulted in groups


of users being isolated from other users that are part of different subnets. As
the network administrator you have been given the task to ensure that the
broadcast domains are maintained whilst allowing communication between the
disparate users.

HC Series

HUAWEI TECHNOLOGIES

Page33

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment.

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.

hu

Configure the system name for R1, R3 and S1. Configure the IP address
10.0.4.1/24 on interface Gigabit Ethernet 0/0/1.

g.

<Huawei>system-view
Enter system view, return user view with Ctrl+Z.

in

[Huawei]sysname R1

ea

[R1-GigabitEthernet0/0/1]ip address 10.0.4.1 24

rn

[R1]interface GigabitEthernet 0/0/1

/l

<Huawei>system-view

Enter system view, return user view with Ctrl+Z.

tp

:/

[Huawei]sysname R3
<Quidway>system-view

ht

[Quidway]sysname S1

ce

s:

Step 2 Clean up the previous configuration

so

ur

Remove the IP address 10.0.4.3 from R3, and disable the swich interfaces
between S1 and S3 and S2 and S4 respectively.
[R3]interface GigabitEthernet 0/0/2

ng

Re

[R3-GigabitEthernet0/0/2]undo ip address

[S1]undo gvrp

ni

Warning: All information about the GVRP will be deleted . Continue?[Y/N]:y

ar

Info: This operation may take a few seconds. Please wait for a moment...done.
[S1]interface GigabitEthernet 0/0/13

Le

[S1-GigabitEthernet0/0/13]undo port trunk allow-pass vlan 2 to 4094


[S1-GigabitEthernet0/0/13]shutdown

re

[S1-GigabitEthernet0/0/13]quit

Mo

[S1]interface GigabitEthernet 0/0/1

Page34

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[S1-GigabitEthernet0/0/1]undo port hybrid vlan 2 4

[S1-GigabitEthernet0/0/1]quit

aw
ei
.c
om
/e

[S1]undo vlan batch 2 100 200


Warning: The configurations of the VLAN will be deleted. Continue?[Y/N]:y

Info: This operation may take a few seconds. Please wait for a moment...done.
[S2]undo gvrp

Warning: All information about the GVRP will be deleted . Continue?[Y/N]:y

Info: This operation may take a few seconds. Please wait for a moment...done.
[S2]interface GigabitEthernet 0/0/24

hu

[S2-GigabitEthernet0/0/24]undo port trunk allow-pass vlan 2 to 4094


[S2-GigabitEthernet0/0/24]shutdown

g.

[S2-GigabitEthernet0/0/24]quit
[S2-GigabitEthernet0/0/3]undo port hybrid vlan 2 4

rn

[S2-GigabitEthernet0/0/3]quit

in

[S2]interface GigabitEthernet 0/0/3

ea

[S2]undo vlan batch 2 100 200

Warning: The configurations of the VLAN will be deleted. Continue?[Y/N]:y

:/

/l

Info: This operation may take a few seconds. Please wait for a moment...done.
[S3]undo gvrp

tp

Warning: All information about the GVRP will be deleted . Continue?[Y/N]:y


Info: This operation may take a few seconds. Please wait for a moment...done.

ht

[S3]interface Ethernet 0/0/13

[S3-Ethernet0/0/13]undo port trunk allow-pass vlan 2 to 4094

s:

[S3-Ethernet0/0/13]port link-type hybrid


[S3-Ethernet0/0/13]quit

ce

[S3]interface Ethernet 0/0/1

ur

[S3-Ethernet0/0/1]undo port trunk allow-pass vlan 2 to 4094

[S4]undo gvrp

Re

[S3]undo vlan 2

so

[S3-Ethernet0/0/1]quit

Warning: All information about the GVRP will be deleted . Continue?[Y/N]:y

ng

Info: This operation may take a few seconds. Please wait for a moment...done.

ni

[S4]interface Ethernet 0/0/24


[S4-Ethernet0/0/24]undo port trunk allow-pass vlan 2 to 4094

ar

[S4-Ethernet0/0/24]port link-type hybrid

Le

[S4-Ethernet0/0/24]quit
[S4]interface Ethernet 0/0/1
[S4-Ethernet0/0/1]undo port trunk allow-pass vlan 2 to 4094

re

[S4-Ethernet0/0/1]quit

Mo

[S4]undo vlan 2

HC Series

HUAWEI TECHNOLOGIES

Page35

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Configure an IP address in the 10.0.8.0/24 network range on R1 interface


Gigabit Ethetnet 0/0/1
[R3]interface GigabitEthernet 0/0/1
[R3-GigabitEthernet0/0/1]ip address 10.0.8.1 24

hu

Step 4 Establish two VLANs

in

g.

Create VLANs 4 and 8 on S1, configure interface Gigabit Ethernet 0/0/1 to


belong to VLAN 4, and interface Gigabit Ethernet 0/0/3 to belong to VLAN 8.
[S1]vlan batch 4 8

/l

[S1-GigabitEthernet0/0/1]port default vlan 4

ea

[S1-GigabitEthernet0/0/1]port link-type access

rn

Info: This operation may take a few seconds. Please wait for a moment...done.
[S1]interface GigabitEthernet 0/0/1

[S1-GigabitEthernet0/0/1]quit

:/

[S1]interface GigabitEthernet0/0/3

tp

[S1-GigabitEthernet0/0/3]port link-type access


[S1-GigabitEthernet0/0/3]port default vlan 8

ht

[S1-GigabitEthernet0/0/3]quit

s:

Set interface Gigabit Ethernet 0/0/2 as a trunk link for VLANs 4 and 8.

ce

[S1]interface GigabitEthernet0/0/2

ur

[S1-GigabitEthernet0/0/2]port link-type trunk

so

[S1-GigabitEthernet0/0/2]port trunk allow-pass vlan 4 8

Re

Step 5 Configure VLAN routing through the sub-interface of R2

ni

ng

Configure sub-interfaces GigabitEthernet0/0/1.1 and GigabitEthernet0/0/1.3,


to act as the gateway of VLAN 4, and act as the gateway of VLAN 8.
<Huawei>system-view

ar

Enter system view, return user view with Ctrl+Z.

Le

[Huawei]sysname R2
[R2]interface GigabitEthernet0/0/1.1
[R2-GigabitEthernet0/0/1.1]ip address 10.0.4.254 24

Mo

re

[R2-GigabitEthernet0/0/1.1]dot1q termination vid 4

Page36

Step 3 Configure an IP address for R3

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[R2-GigabitEthernet0/0/1.1]arp broadcast enable

[R2-GigabitEthernet0/0/1.1]quit

aw
ei
.c
om
/e

[R2]interface GigabitEthernet0/0/1.3
[R2-GigabitEthernet0/0/1.3]ip address 10.0.8.254 24
[R2-GigabitEthernet0/0/1.3]dot1q termination vid 8
[R2-GigabitEthernet0/0/1.3]arp broadcast enable

Test connectivity between R1 and R3.


<R1>ping 10.0.8.1

hu

PING 10.0.8.1: 56 data bytes, press CTRL_C to break


Request time out

g.

Request time out

in

Request time out


Request time out

ea

rn

Request time out


--- 10.0.8.1 ping statistics ---

/l

5 packet(s) transmitted

:/

0 packet(s) received

tp

100.00% packet loss

ht

Configure a default route on R1 and R3.

s:

[R1]ip route-static 0.0.0.0 0.0.0.0 10.0.4.254

ce

[R3]ip route-static 0.0.0.0 0.0.0.0 10.0.8.254

so

<R1>ping 10.0.8.1

ur

Test connectivity between R1 and R3 again.

Re

PING 10.0.8.1: 56 data bytes, press CTRL_C to break


Reply from 10.0.8.1: bytes=56 Sequence=1 ttl=254 time=10 ms
Reply from 10.0.8.1: bytes=56 Sequence=2 ttl=254 time=1 ms

ng

Reply from 10.0.8.1: bytes=56 Sequence=3 ttl=254 time=1 ms

ni

Reply from 10.0.8.1: bytes=56 Sequence=4 ttl=254 time=10 ms

ar

Reply from 10.0.8.1: bytes=56 Sequence=5 ttl=254 time=1 ms

Le

--- 10.0.8.1 ping statistics --5 packet(s) transmitted


0.00% packet loss
round-trip min/avg/max = 1/4/10 ms

Mo

re

5 packet(s) received

HC Series

HUAWEI TECHNOLOGIES

Page37

HCNA-HNTD Module 1 Ethernet and VLAN


[R2]display ip routing-table

aw
ei
.c
om
/e

------------------------------------------------------------------------Routing Tables: Public


Destinations : 10

Routes : 10
Cost Flags NextHop

Interface

10.0.4.0/24

Direct 0

10.0.4.254

GigabitEthernet0/0/1.1

10.0.4.254/32

Direct 0

127.0.0.1

GigabitEthernet0/0/1.1

10.0.4.255/32

Direct 0

127.0.0.1

GigabitEthernet0/0/1.1

10.0.8.0/24

Direct 0

10.0.8.254

GigabitEthernet0/0/1.3

10.0.8.254/32

Direct 0

127.0.0.1

GigabitEthernet0/0/1.3

10.0.8.255/32

Direct 0

127.0.0.1

GigabitEthernet0/0/1.3

127.0.0.0/8

Direct 0

127.0.0.1

127.0.0.1/32

Direct 0

127.0.0.1

127.255.255.255/32 Direct 0

127.0.0.1

255.255.255.255/32 Direct 0

127.0.0.1

in

g.

hu

Destination/Mask Proto Pre

InLoopBack0

InLoopBack0
InLoopBack0

/l

ea

rn

InLoopBack0

tp

:/

Final Configuration
[R1]display current-configuration

ht

[V200R003C00SPC200]
#

s:

sysname R1
#

ce

interface GigabitEthernet0/0/1

ip address 10.0.4.1 255.255.255.0

ur

so

ip route-static 0.0.0.0 0.0.0.0 10.0.4.254


#

Re

user-interface con 0

authentication-mode password

ng

set authentication password


cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$

ar

ni

user-interface vty 0 4
#

Mo

re

Le

return

Page38

HUAWEI TECHNOLOGIES

Route Flags: R - relay, D - download to fib

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[R2]display current-configuration

[V200R003C00SPC200]

aw
ei
.c
om
/e

#
sysname R2
#
interface GigabitEthernet0/0/1
#
interface GigabitEthernet0/0/1.1
dot1q termination vid 4
ip address 10.0.4.254 255.255.255.0

hu

arp broadcast enable


#

g.

interface GigabitEthernet0/0/1.3

in

dot1q termination vid 8


ip address 10.0.8.254 255.255.255.0

rn

arp broadcast enable

ea

#
user-interface con 0

/l

authentication-mode password

:/

set authentication password

cipher %$%$|nRPL^hr2IXi7LHDID!/,.*%.8%h;3:,hXO2dk#ikaWI.*(,%$%$

tp

user-interface vty 0 4
#

s:

ht

return

[V200R003C00SPC200]

ur

ce

[R3]dis current-configuration

sysname R3

so

Re

interface GigabitEthernet0/0/1
ip address 10.0.8.1 255.255.255.0
#

ng

ip route-static 0.0.0.0 0.0.0.0 10.0.8.254

ni

user-interface con 0

ar

authentication-mode password

Le

set authentication password

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$
#
return

Mo

re

user-interface vty 0 4

HC Series

HUAWEI TECHNOLOGIES

Page39

HCNA-HNTD Module 1 Ethernet and VLAN


[S1]display current-configuration

aw
ei
.c
om
/e

!Software Version V100R006C00SPC800


sysname S1
#
vlan batch 4 8
#
interface GigabitEthernet0/0/1
port link-type access
port default vlan 4

hu

#
interface GigabitEthernet0/0/2

g.

port link-type trunk

in

port trunk allow-pass vlan 4 8


#

rn

interface GigabitEthernet0/0/3

ea

port link-type access


port default vlan 8

/l

:/

user-interface con 0
user-interface vty 0 4

tp

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

return

Page40

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Lab 1-5 Configuring Layer 3 Switching


Learning Objectives

As a result of this lab section, you should achieve the following tasks:

hu

Configuration of VLAN interfaces.


Establishment of VLAN routing on a single switch
Perform VLAN routing over an Ethernet Trunk link.
Perform dynamic routing between VLAN interfaces using OSPF.

g.

ce

s:

ht

tp

:/

/l

ea

rn

in

Topology

so

ur

Figure 5.5 Layer 3 switching topology

Re

Scenario

Mo

re

Le

ar

ni

ng

The introduction of layer three switches into the enterprise network opened up
opportunities for streamlining the current VLAN routing configuration. The
network administrator has been given the task to implement VLAN routing
using only the layer three switches to support communication between the
VLANs in the network as displayed in the topology. VLANs should be capable
of inter VLAN communication. Additionally S1 and S2 are expected to
communicate over a Layer 3 for which routing protocol support is required.

HC Series

HUAWEI TECHNOLOGIES

Page41

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.

hu

Configure R1 with the address 10.0.4.1/24 on interface Gigabit Ethernet 0/0/1.


Establish an Eth-Trunk beween S1 an S2. Disable any unnecessary interfaces
on S1 and S2 to S3 and S4.

g.

<Huawei>system-view

in

Enter system view, return user view with Ctrl+Z.


[R1]interface GigabitEthernet 0/0/1

ea

[R1-GigabitEthernet0/0/1]ip address 10.0.4.1 24

rn

[Huawei]sysname R1

/l

<Huawei>system-view

Enter system view, return user view with Ctrl+Z.

tp

:/

[Huawei]sysname R3
<Quidway>system-view

ht

[Quidway]sysname S1
[S1]interface Eth-Trunk 1

s:

[S1-Eth-Trunk1]mode lacp-static
[S1-Eth-Trunk1]port link-type trunk

ce

[S1-Eth-Trunk1]port trunk allow-pass vlan all

ur

[S1-Eth-Trunk1]quit

[S1]interface GigabitEthernet 0/0/9

so

[S1-GigabitEthernet0/0/9]eth-trunk 1
[S1-GigabitEthernet0/0/9]interface GigabitEthernet 0/0/10

Re

[S1-GigabitEthernet0/0/10]eth-trunk 1

ng

<Quidway>system-view

ni

[Quidway]sysname S2
[S2]interface Eth-Trunk 1

ar

[S2-Eth-Trunk1]mode lacp-static
[S2-Eth-Trunk1]port link-type trunk

Le

[S2-Eth-Trunk1]port trunk allow-pass vlan all


[S2-Eth-Trunk1]quit

re

[S2]interface GigabitEthernet 0/0/9

Mo

[S2-GigabitEthernet0/0/9]eth-trunk 1

Page42

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[S2-GigabitEthernet0/0/9]interface GigabitEthernet 0/0/10

aw
ei
.c
om
/e

[S2-GigabitEthernet0/0/10]eth-trunk 1
<Quidway>system-view
[Quidway]sysname S3
[S3]interface Ethernet 0/0/23
[S3-Ethernet0/0/23]shutdown
<Quidway>system-view
[Quidway]sysname S4

hu

[S4]interface Ethernet 0/0/14

rn

in

Step 2 Clean up the previous configuration

g.

[S4-Ethernet0/0/14]shutdown

ea

Remove the VLAN routing configuration and sub-interfaces on the devices.

/l

[R1]undo ip route-static 0.0.0.0 0

:/

[R2]undo interface GigabitEthernet 0/0/1.1

ht

[R3]interface GigabitEthernet 0/0/1

tp

[R2]undo interface GigabitEthernet 0/0/1.3

[R3-GigabitEthernet0/0/1]undo ip address

s:

[R3-GigabitEthernet0/0/1]quit

ur

[S1]undo vlan batch 4 8

ce

[R3]undo ip route-static 0.0.0.0 0

Warning: The configurations of the VLAN will be deleted. Continue?[Y/N]:y

so

Info: This operation may take a few seconds. Please wait for a moment...done.

Re

[S1]interface GigabitEthernet 0/0/2


[S1-GigabitEthernet0/0/2]undo port trunk allow-pass vlan 4 8
[S1-GigabitEthernet0/0/2]quit

ng

[S1]interface GigabitEthernet 0/0/13

ni

[S1-GigabitEthernet0/0/13]undo shutdown

ar

[S2]interface GigabitEthernet0/0/24

Mo

re

Le

[S2-GigabitEthernet0/0/24]undo shutdown

HC Series

HUAWEI TECHNOLOGIES

Page43

HCNA-HNTD Module 1 Ethernet and VLAN

Re-enable the Eth-Trunk interface between S1 and S2

aw
ei
.c
om
/e

[S1]interface Eth-Trunk 1
[S1-Eth-Trunk1]undo shutdown
[S2]interface Eth-Trunk 1
[S2-Eth-Trunk1]undo shutdown

hu

Step 3 Configure VLAN 3 through to VLAN 7 for S1 and S2.


[S1]vlan batch 3 to 7

in

g.

Info: This operation may take a few seconds. Please wait for a moment...done.
[S2]vlan batch 3 to 7

ea

rn

Info: This operation may take a few seconds. Please wait for a moment...done.

/l

Verify that the VLANs have been created.


[S1]display vlan

:/

The total number of vlans is : 6


output omitted
Ports

tp

VID Type

common UT:GE0/0/1(U)

GE0/0/2(D)

GE0/0/3(U)

GE0/0/4(U)

GE0/0/5(U)

GE0/0/6(D)

GE0/0/7(D)

GE0/0/11(D)

GE0/0/12(D)

GE0/0/13(D)

GE0/0/14(D)

GE0/0/16(D)

GE0/0/17(D)

GE0/0/18(D)

GE0/0/20(D)

GE0/0/21(U)

GE0/0/22(U)

GE0/0/24(D)

Eth-Trunk1(U)

s:

ht

----------------------------------------------------------------------------

GE0/0/19(D)

ur

GE0/0/23(U)

ce

GE0/0/15(D)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

ng

Re

so

GE0/0/8(D)

Mo

re

Le

ar

ni

output omitted

Page44

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[S2]display vlan

The total number of vlans is : 6


VID Type

aw
ei
.c
om
/e

output omitted
Ports

---------------------------------------------------------------------------common UT:GE0/0/1(U)

GE0/0/2(D)

GE0/0/3(U)

GE0/0/4(U)

GE0/0/6(D)

GE0/0/7(D)

GE0/0/8(D)

GE0/0/11(U)

GE0/0/12(U)

GE0/0/13(U)

GE0/0/14(D)

GE0/0/15(D)

GE0/0/16(D)

GE0/0/17(D)

GE0/0/18(D)

GE0/0/19(D)

GE0/0/20(D)

GE0/0/21(D)

GE0/0/22(D)

GE0/0/23(D)

GE0/0/24(D)

Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

g.

common TG:Eth-Trunk1(U)

in

hu

GE0/0/5(U)

rn

/l

ea

Step 4 Set the Eth-Trunk link between S1 and S2 with PVID 5.

tp

:/

Add interfaces Gigabit Ethernet 0/0/1 and 0/0/13 of S1 to VLAN 4 and VLAN 3
respectively. For S2, add interfaces Gigabit Ethernet 0/0/3 and G0/0/24 to
VLAN 6 and VLAN 7 respectively.
[S1]interface Eth-Trunk 1

ht

[S1-Eth-Trunk1]port trunk pvid vlan 5


[S1-Eth-Trunk1]quit

s:

[S1]interface GigabitEthernet 0/0/1


[S1-GigabitEthernet0/0/1]port link-type access

ce

[S1-GigabitEthernet0/0/1]port default vlan 4

ur

[S1-GigabitEthernet0/0/1]quit

[S1]interface GigabitEthernet 0/0/13

so

[S1-GigabitEthernet0/0/13]port link-type access

Re

[S1-GigabitEthernet0/0/13]port default vlan 3


[S2]interface Eth-Trunk 1

ng

[S2-Eth-Trunk1]port trunk pvid vlan 5

ni

[S2-Eth-Trunk1]quit
[S2]interface GigabitEthernet 0/0/3

ar

[S2-GigabitEthernet0/0/3]port link-type access

Le

[S2-GigabitEthernet0/0/3]port default vlan 6


[S2-GigabitEthernet0/0/3]quit
[S2]interface GigabitEthernet 0/0/24

re

[S2-GigabitEthernet0/0/24]port link-type access

Mo

[S2-GigabitEthernet0/0/24]port default vlan 7

HC Series

HUAWEI TECHNOLOGIES

Page45

HCNA-HNTD Module 1 Ethernet and VLAN


<S1>display vlan

The total number of vlans is : 6


VID Type

aw
ei
.c
om
/e

output omitted
Ports

---------------------------------------------------------------------------1

common UT:GE0/0/2(D)

GE0/0/3(U)

GE0/0/4(U)

GE0/0/6(D)

GE0/0/7(D)

GE0/0/8(D)

GE0/0/11(D)

GE0/0/12(D)

GE0/0/14(D)

GE0/0/15(D)

GE0/0/16(D)

GE0/0/17(D)

GE0/0/18(D)

GE0/0/19(D)

GE0/0/20(D)

GE0/0/21(U)

GE0/0/22(U)

GE0/0/23(U)

GE0/0/24(D)

hu

Eth-Trunk1(U)
3

common UT:GE0/0/13(U)

g.

TG:Eth-Trunk1(U)
common UT:GE0/0/1(U)

in

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

ea

rn

TG:Eth-Trunk1(U)

:/

/l

output omitted
<S2>display vlan

tp

The total number of vlans is : 6

ht

output omitted
VID Type

GE0/0/5(U)

Ports

common UT:GE0/0/1(U)
GE0/0/6(D)

GE0/0/2(D)

GE0/0/4(U)

GE0/0/5(U)

GE0/0/7(D)

GE0/0/8(D)

GE0/0/11(U)

GE0/0/13(U)

GE0/0/14(D)

GE0/0/15(D)

GE0/0/16(D)

GE0/0/17(D)

GE0/0/18(D)

GE0/0/19(D)

GE0/0/20(D)

GE0/0/21(D)

GE0/0/22(D)

GE0/0/23(D)

so

ur

GE0/0/12(U)

ce

s:

----------------------------------------------------------------------------

Re

Eth-Trunk1(U)
common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common TG:Eth-Trunk1(U)

common UT:GE0/0/3(U)

ni

ng

TG:Eth-Trunk1(U)

common UT:GE0/0/24(U)
TG:Eth-Trunk1(U)

Mo

re

Le

ar

Page46

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Step 5 Configure gateway addresses for VLANs on S1 and S2.


Configure IP addresses for Vlanif3, Vlanif4, and Vlanif5 on S1, and for Vlanif5,
Vlanif6, and Vlanif7 on S2.
[S1]interface Vlanif 3
[S1-Vlanif3]ip address 10.0.3.254 24
[S1-Vlanif3]interface Vlanif 4
[S1-Vlanif4]ip address 10.0.4.254 24
[S1-Vlanif4]interface Vlanif 5

g.

hu

[S1-Vlanif5]ip address 10.0.5.1 24


[S2]interface Vlanif 5

in

[S2-Vlanif5]ip address 10.0.5.2 24

rn

[S2-Vlanif5]interface Vlanif 6
[S2-Vlanif6]ip address 10.0.6.254 24

ea

[S2-Vlanif6]interface Vlanif 7

/l

[S2-Vlanif7]ip address 10.0.7.254 24

tp

:/

Step 6 IP addressing and default routes for R1, R3, S3 and S4.

ce

s:

ht

IP addresses on a switch much be assigned to a Vlanif, where Vlanif1 is a


common (untagged) Vlanif. Interfaces Ethernet 0/0/13 of S3 and Ethernet
0/0/24 of S4 should be associated with the common VLAN1. R1 should
already be configured with the address 10.0.4.1/24.

ur

[R1]ip route-static 0.0.0.0 0.0.0.0 10.0.4.254

so

[S3]interface Vlanif 1

[S3-Vlanif1]ip address 10.0.3.3 24

Re

[S3-Vlanif1]quit

ng

[S3]ip route-static 0.0.0.0 0.0.0.0 10.0.3.254


[R3]interface GigabitEthernet 0/0/2

ni

[R3-GigabitEthernet0/0/2]ip address 10.0.6.3 24


[R3-GigabitEthernet0/0/2]quit

Le

ar

[R3]ip route-static 0.0.0.0 0.0.0.0 10.0.6.254


[S4]interface Vlanif 1

re

[S4-Vlanif1]ip address 10.0.7.4 24

Mo

[S4-Vlanif1]quit
[S4]ip route-static 0.0.0.0 0.0.0.0 10.0.7.254

HC Series

HUAWEI TECHNOLOGIES

Page47

HCNA-HNTD Module 1 Ethernet and VLAN

aw
ei
.c
om
/e

Step 7 Test connectivity between VLAN 3 and VLAN 4.


Test connectivity between S3 and R1.
<R1>ping 10.0.3.3
PING 10.0.3.3: 56 data bytes, press CTRL_C to break

Reply from 10.0.3.3: bytes=56 Sequence=1 ttl=254 time=37 ms


Reply from 10.0.3.3: bytes=56 Sequence=2 ttl=253 time=2 ms

Reply from 10.0.3.3: bytes=56 Sequence=3 ttl=253 time=10 ms


Reply from 10.0.3.3: bytes=56 Sequence=4 ttl=253 time=3 ms

g.

hu

Reply from 10.0.3.3: bytes=56 Sequence=5 ttl=253 time=2 ms


--- 10.0.3.3 ping statistics ---

in

5 packet(s) transmitted

rn

5 packet(s) received
0.00% packet loss

/l

Test connectivity between R3 and R1.

:/

<R1>ping 10.0.6.3

ea

round-trip min/avg/max = 2/10/37 ms

tp

PING 10.0.6.3: 56 data bytes, press CTRL_C to break


Request time out

ht

Request time out


Request time out

s:

Request time out

ce

Request time out

ur

--- 10.0.6.3 ping statistics --5 packet(s) transmitted

so

0 packet(s) received

Re

100.00% packet loss

ng

The connectivity between R1 and R3 fails. Use the tracert command to


troubleshoot the fault:

ni

[R1]tracert 10.0.6.3

ar

traceroute to 10.0.6.3(10.0.6.3), max hops: 30 ,packet length: 40,press CTRL_C


to break

Le

1 10.0.4.254 17 ms 4 ms 4 ms

Mo

re

2 * * *

Page48

HUAWEI TECHNOLOGIES

HC Series

aw
ei
.c
om
/e

According to the command output, R1 has sent data packets to the destination
address 10.0.6.3, but the gateway at 10.0.4.254 responds that the network is
unreachable.
Check whether the network is unreachable on the gateway (S1).
[S1]display ip routing-table
Route Flags: R - relay, D - download to fib

---------------------------------------------------------------------------Routing Tables: Public


Routes : 8

Destination/Mask

Proto Pre Cost

10.0.3.0/24

Direct

10.0.3.254 Vlanif3

10.0.3.254/32

Direct

127.0.0.1

10.0.4.0/24

Direct

10.0.4.254 Vlanif4

10.0.4.254/32

Direct

10.0.5.0/24

Direct

10.0.5.1/32

Direct

127.0.0.0/8

Direct

127.0.0.1/32

Direct

in

rn

ea

127.0.0.1

InLoopBack0
InLoopBack0

10.0.5.1

Vlanif5

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

/l

tp

:/

Interface

g.

Flags NextHop

hu

Destinations : 8

ce

s:

ht

According to the command output, S1 does not have a route to the network
segment 10.0.6.0 because the network segment is not directly connected to
S1. In addition, no static route or dynamic routing protocol has been configured
to advertise the routes.

[S1-ospf-1]area 0

so

ur

Step 8 Enable OSPF on S1 and S2.


[S1]ospf

ng

Re

[S1-ospf-1-area-0.0.0.0]network 10.0.0.0 0.255.255.255


[S2]ospf

[S2-ospf-1]area 0

Mo

re

Le

ar

ni

[S2-ospf-1-area-0.0.0.0]network 10.0.0.0 0.255.255.255

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

HUAWEI TECHNOLOGIES

Page49

After the configuration, wait until S1 and S2 exchange OSPF routes and
complete the link state database, then view the resulting routing table of S1.

aw
ei
.c
om
/e

[S1]display ip routing-table
Route Flags: R - relay, D - download to fib

---------------------------------------------------------------------------Routing Tables: Public

Destination/Mask

Routes : 10

Proto Pre Cost

Flags NextHop

Interface

hu

Destinations : 10

Direct 0

10.0.3.254

10.0.3.254/32

Direct 0

127.0.0.1

10.0.4.0/24

Direct 0

10.0.4.254

Vlanif4

10.0.4.254/32

Direct 0

127.0.0.1

InLoopBack0

10.0.5.0/24

Direct 0

10.0.5.1

Vlanif5

10.0.5.1/32

Direct 0

127.0.0.1

InLoopBack0

10.0.6.0/24

OSPF

10

10.0.5.2

Vlanif5

10.0.7.0/24

OSPF

10

10.0.5.2

Vlanif5

127.0.0.0/8

Direct 0

127.0.0.1/32

Direct 0

/l

ea

rn

in

g.

10.0.3.0/24

Vlanif3
InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

tp

:/

ht

S1 has learned two routes using OSPF. Test connectivity between R1 and R3.
[R1]ping 10.0.6.3

s:

PING 10.0.6.3: 56 data bytes, press CTRL_C to break


Reply from 10.0.6.3: bytes=56 Sequence=1 ttl=253 time=11 ms

ce

Reply from 10.0.6.3: bytes=56 Sequence=2 ttl=253 time=1 ms

ur

Reply from 10.0.6.3: bytes=56 Sequence=3 ttl=253 time=10 ms


Reply from 10.0.6.3: bytes=56 Sequence=4 ttl=253 time=1 ms

so

Reply from 10.0.6.3: bytes=56 Sequence=5 ttl=253 time=1 ms

Re

--- 10.0.6.3 ping statistics --5 packet(s) transmitted

ng

5 packet(s) received
0.00% packet loss

Mo

re

Le

ar

ni

round-trip min/avg/max = 1/4/11 ms

Page50

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 1 Ethernet and VLAN

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


[R1]ping 10.0.7.4

PING 10.0.7.4: 56 data bytes, press CTRL_C to break

aw
ei
.c
om
/e

Reply from 10.0.7.4: bytes=56 Sequence=1 ttl=253 time=30 ms


Reply from 10.0.7.4: bytes=56 Sequence=2 ttl=252 time=2 ms
Reply from 10.0.7.4: bytes=56 Sequence=3 ttl=252 time=3 ms
Reply from 10.0.7.4: bytes=56 Sequence=4 ttl=252 time=2 ms

Reply from 10.0.7.4: bytes=56 Sequence=5 ttl=252 time=2 ms


--- 10.0.7.4 ping statistics --5 packet(s) transmitted

hu

5 packet(s) received
0.00% packet loss

in

g.

round-trip min/avg/max = 2/7/30 ms

rn

Final Configuration

ea

[R1]display current-configuration

/l

[V200R003C00SPC200]
#
#
interface GigabitEthernet0/0/1

ht

ip address 10.0.4.1 255.255.255.0

tp

:/

sysname R1

s:

ip route-static 0.0.0.0 0.0.0.0 10.0.4.254


#

ce

user-interface con 0

authentication-mode password

ur

set authentication password

so

cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$
user-interface vty 0 4

Re

ng

return

ar

ni

[S1]display current-configuration
!Software Version V100R006C00SPC800

Le

sysname S1

re

vlan batch 3 to 7

Mo

HC Series

HUAWEI TECHNOLOGIES

Page51

HCNA-HNTD Module 1 Ethernet and VLAN


interface Vlanif3

ip address 10.0.3.254 255.255.255.0

aw
ei
.c
om
/e

#
interface Vlanif4
ip address 10.0.4.254 255.255.255.0
#
interface Vlanif5
ip address 10.0.5.1 255.255.255.0
#
interface Eth-Trunk1

hu

port link-type trunk


port trunk allow-pass vlan 2 to 4094

g.

mode lacp-static

in

#
interface GigabitEthernet0/0/1

rn

port link-type access

ea

port default vlan 4


#

/l

interface GigabitEthernet0/0/9

:/

eth-trunk 1
lacp priority 100

tp

undo negotiation auto


speed 100

ht

#
interface GigabitEthernet0/0/10

s:

eth-trunk 1
undo negotiation auto

ur

speed 100

ce

lacp priority 100

so

interface GigabitEthernet0/0/13

Re

port link-type access


port default vlan 3
#

ng

ospf 1

ni

area 0.0.0.0

network 10.0.0.0 0.255.255.255

ar

Le

user-interface con 0
user-interface vty 0 4
#

Mo

re

return

Page52

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN

[S2]display current-configuration

aw
ei
.c
om
/e

#
!Software Version V100R006C00SPC800
sysname S2
#
vlan batch 3 to 7
#
interface Vlanif5
ip address 10.0.5.2 255.255.255.0

hu

#
interface Vlanif6

g.

ip address 10.0.6.254 255.255.255.0

in

#
interface Vlanif7

rn

ip address 10.0.7.254 255.255.255.0

ea

#
interface Eth-Trunk1

/l

port link-type trunk

:/

port trunk allow-pass vlan 2 to 4094


mode lacp-static

tp

#
interface GigabitEthernet0/0/3

ht

port link-type access


port default vlan 6

s:

#
eth-trunk 1

ur

undo negotiation auto

ce

interface GigabitEthernet0/0/9

speed 100

so

#
eth-trunk 1

Re

interface GigabitEthernet0/0/10

speed 100

ni

ng

undo negotiation auto

interface GigabitEthernet0/0/24

ar

port link-type access

Le

port default vlan 7


#

ospf 1

re

area 0.0.0.0

Mo

network 10.0.0.0 0.255.255.255

HC Series

HUAWEI TECHNOLOGIES

Page53

HCNA-HNTD Module 1 Ethernet and VLAN


#

user-interface con 0

aw
ei
.c
om
/e

user-interface vty 0 4
#
return
[S3]display current-configuration
#
!Software Version V100R006C00SPC800
sysname S3

hu

#
interface Vlanif1

g.

ip address 10.0.3.3 255.255.255.0

in

#
interface Ethernet0/0/23

rn

shutdown
ip route-static 0.0.0.0 0.0.0.0 10.0.3.254

/l

ea

:/

user-interface con 0
user-interface vty 0 4

tp

ht

return

s:

[S4]display current-configuration
#

ce

!Software Version V100R006C00SPC800

ur

sysname S4
#

so

undo http server enable

Re

drop illegal-mac alarm


#

ng

aaa

ni

authentication-scheme default
authorization-scheme default

ar

accounting-scheme default

Le

domain default
domain default_admin
local-user admin password simple admin

re

local-user admin service-type http

Mo

Page54

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 1 Ethernet and VLAN


interface Vlanif1

ip address 10.0.7.4 255.255.255.0

aw
ei
.c
om
/e

#
interface Ethernet0/0/14
shutdown
#
ip route-static 0.0.0.0 0.0.0.0 10.0.7.254
#
user-interface con 0
user-interface vty 0 4

hu

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g.

return

HC Series

HUAWEI TECHNOLOGIES

Page55

aw
ei
.c
om
/e

Module 2 Enterprise WAN Configuration


Lab 2-1 HDLC and PPP Configuration
Learning Objectives

hu

As a result of this lab section, you should achieve the following tasks:

rn

in

g.

Establish HDLC encapsulation as the serial link layer protocol.


Change the DCE clock baud rate on a serial link.
Establish PPP encapsulation as the serial link layer protocol.
Implementation of PAP authentication on the PPP link.
Implementation of CHAP authentication on the PPP link.

ea

ht

tp

:/

/l

Topology

ce

s:

Figure 2.1 HDLC and PPP configuration topology

ur

Scenario

Mo

re

Le

ar

ni

ng

Re

so

As an expanding enterprise business, multiple branch offices have been


established and are to be part of the companys administrative domain. WAN
solutions are required and as the network administrator the company you have
been tasked with establishing HDLC and PPP solutions at the edge router to
be carried over some service provider network, possibly MPLS, however the
details of this have not been revealed to you since the service provider network
remains outside of the scope of your task. R2 is an edge router located in the
HQ, and R1 and R3 are located in branch offices. The HQ and branches need
to be established as a single administrative domain. Use HDLC and PPP on
the WAN links, and establish authentication as a simple security measure.

Page56

HCNA-HNTD Module 2 Enterprise WAN Configuration

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
<Huawei>system-view

hu

Enter system view, return user view with Ctrl+Z.

g.

[Huawei]sysname R1
<Huawei>system-view

in

Enter system view, return user view with Ctrl+Z.

rn

[Huawei]sysname R2

ea

<Huawei>system-view

/l

Enter system view, return user view with Ctrl+Z.

:/

[Huawei]sysname R3

ht

tp

Step 2 Clean up the previous configuration

s:

Remove the static routes to R2 and disable the Ethernet interfaces to avoid
creating alternative routes. Remove any unnecessary VLAN configuration.

ce

[R1]undo ip route-static 0.0.0.0 0

[R1]interface GigabitEthernet 0/0/1

so

ur

[R1-GigabitEthernet0/0/1]shutdown
[R3]undo ip route-static 0.0.0.0 0

Re

[R3]interface GigabitEthernet 0/0/2

ng

[R3-GigabitEthernet0/0/2]shutdown
[S1]undo interface Vlanif 3

ni

[S1]undo interface Vlanif 5

ar

[S1]undo vlan batch 3 5 to 7


Warning: The configurations of the VLAN will be deleted. Continue?[Y/N]:y

Le

Info: This operation may take a few seconds. Please wait for a moment...done.
[S1]interface GigabitEthernet 0/0/1

re

[S1-GigabitEthernet0/0/1]undo port default vlan

Mo

[S1-GigabitEthernet0/0/1]quit
[S1]undo ospf 1

HC Series

HUAWEI TECHNOLOGIES

Page57

HCNA-HNTD Module 2 Enterprise WAN Configuration


[S2]undo interface Vlanif 5

[S2]undo interface Vlanif 7

aw
ei
.c
om
/e

[S2]undo vlan batch 3 to 5 7


Warning: The configurations of the VLAN will be deleted. Continue?[Y/N]:y

Info: This operation may take a few seconds. Please wait for a moment...done.
[S2]interface GigabitEthernet 0/0/3
[S2-GigabitEthernet0/0/3]undo port default vlan
[S2-GigabitEthernet0/0/3]quit
[S2]undo ospf 1

hu

[S3]undo interface Vlanif 1

in

g.

[S4]undo interface Vlanif 1

ea

rn

Step 3 Configure serial interface IP addressing for R1, R2 & R3

[R1-Serial1/0/0]ip address 10.0.12.1 24

:/

[R2]interface Serial 1/0/0

/l

[R1]interface Serial 1/0/0

tp

[R2-Serial1/0/0]ip address 10.0.12.2 24


[R2-Serial1/0/0]quit

ht

[R2]interface Serial 2/0/0

[R3]interface Serial 2/0/0

s:

[R2-Serial2/0/0]ip address 10.0.23.2 24

ur

ce

[R3-Serial2/0/0]ip address 10.0.23.3 24

so

Step 4 Enable the HDLC protocol on the serial interfaces.

Re

[R1]interface Serial 1/0/0


[R1-Serial1/0/0]link-protocol hdlc

ng

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y

ni

[R2]interface Serial 1/0/0

ar

[R2-Serial1/0/0]link-protocol hdlc
Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y

Le

[R2-Serial1/0/0]quit
[R2]interface Serial 2/0/0

re

[R2-Serial2/0/0]link-protocol hdlc

Mo

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y

Page58

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


[R3]interface Serial 2/0/0

aw
ei
.c
om
/e

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y

After HDLC is enabled on the serial interfaces, view the serial interface status.
The displayed information for R1 should be used as an example.
[R1]display interface Serial1/0/0
Serial1/0/0 current state : UP
Line protocol current state : UP

hu

Last line protocol up time : 2013-12-10 11:25:08


Description:HUAWEI, AR Series, Serial1/0/0 Interface

g.

Route Port,The Maximum Transmit Unit is 1500, Hold timer is 10(sec)


Internet Address is 10.0.12.1/24

in

Link layer protocol is nonstandard HDLC


: 2013-12-10 11:23:55

rn

Last physical up time

Last physical down time : 2013-12-10 11:23:55

ea

Current system time: 2013-12-10 11:25:46

/l

Physical layer is synchronous, Baudrate is 64000 bps

Interface is DCE, Cable type is V24, Clock mode is DCECLK

:/

Last 300 seconds input rate 3 bytes/sec 24 bits/sec 0 packets/sec

tp

Last 300 seconds output rate 3 bytes/sec 24 bits/sec 0 packets/sec

ht

Input: 100418 packets, 1606804 bytes

0, Multicast:

Errors:

0, Runts:

Giants:

0, CRC:

Alignments:

0, Overruns:

Dribbles:

0, Aborts:

0, Frame Error:

ur

ce

s:

Broadcast:

so

No Buffers:

Re

Output: 100418 packets, 1606830 bytes


0, Overruns:

Collisions:

0, Deferred:

No Buffers:

ng

Total Error:

ni

DCD=UP DTR=UP DSR=UP RTS=UP CTS=UP

ar

Input bandwidth utilization : 0.06%

Mo

re

Le

Output bandwidth utilization : 0.06%

HC Series

[R3-Serial2/0/0]link-protocol hdlc

HUAWEI TECHNOLOGIES

Page59

Test connectivity of the directly connected link after verifying that the physical
status and protocol status of the interface are Up.

aw
ei
.c
om
/e

<R2>ping 10.0.12.1
PING 10.0.12.1: 56 data bytes, press CTRL_C to break

Reply from 10.0.12.1: bytes=56 Sequence=1 ttl=255 time=44 ms

Reply from 10.0.12.1: bytes=56 Sequence=2 ttl=255 time=39 ms


Reply from 10.0.12.1: bytes=56 Sequence=3 ttl=255 time=39 ms
Reply from 10.0.12.1: bytes=56 Sequence=4 ttl=255 time=40 ms

hu

Reply from 10.0.12.1: bytes=56 Sequence=5 ttl=255 time=39 ms


--- 10.0.12.1 ping statistics ---

g.

5 packet(s) transmitted
5 packet(s) received

in

0.00% packet loss

rn

round-trip min/avg/max = 39/40/44 ms

ea

[R2]ping 10.0.23.3

/l

PING 10.0.23.3: 56 data bytes, press CTRL_C to break


Reply from 10.0.23.3: bytes=56 Sequence=1 ttl=255 time=44 ms

:/

Reply from 10.0.23.3: bytes=56 Sequence=2 ttl=255 time=39 ms

tp

Reply from 10.0.23.3: bytes=56 Sequence=3 ttl=255 time=39 ms


Reply from 10.0.23.3: bytes=56 Sequence=4 ttl=255 time=40 ms

ht

Reply from 10.0.23.3: bytes=56 Sequence=5 ttl=255 time=39 ms

0.00% packet loss

ce

5 packet(s) received

s:

--- 10.0.23.3 ping statistics --5 packet(s) transmitted

so

ur

round-trip min/avg/max = 39/40/44 ms

Re

Step 5 Configure RIPv2.

ni

ng

Enable the RIP routing protocol to advertise the remote networks of R1 & R3
[R1]rip

[R1-rip-1]version 2

Le

ar

[R1-rip-1]network 10.0.0.0
[R2]rip

[R2-rip-1]version 2

Mo

re

[R2-rip-1]network 10.0.0.0

Page60

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 2 Enterprise WAN Configuration

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


[R3]rip

[R3-rip-1]version 2

aw
ei
.c
om
/e

[R3-rip-1]network 10.0.0.0

After the configuration is complete, check that all the routes have been learned.
Verify that corresponding routes are learned by RIP.
<R1>display ip routing-table
Route Flags: R - relay, D - download to fib

----------------------------------------------------------------------------

Proto

Pre Cost

Flags NextHop

g.

Destination/Mask

Routes : 8

in

Destinations : 8

hu

Routing Tables: Public

Interface

Direct 0

10.0.12.1

10.0.12.1/32

Direct 0

127.0.0.1

Serial1/0/0

10.0.12.255/32 Direct 0

127.0.0.1

100 1

10.0.12.2

Serial1/0/0

10.0.23.0/24

RIP

ea

127.0.0.0/8

Direct 0

127.0.0.1

InLoopBack0

127.0.0.1/32

Direct 0

127.0.0.1

InLoopBack0

127.255.255.255/32 Direct 0

127.0.0.1

InLoopBack0

255.255.255.255/32 Direct 0

127.0.0.1

InLoopBack0

:/

Serial1/0/0

/l

Serial1/0/0

tp

rn

10.0.12.0/24

s:

ht

ce

On R1, run the ping command to test connectivity between R1 and R3.
<R1>ping 10.0.23.3

ur

PING 10.0.23.3: 56 data bytes, press CTRL_C to break


Reply from 10.0.23.3: bytes=56 Sequence=1 ttl=254 time=44 ms

so

Reply from 10.0.23.3: bytes=56 Sequence=2 ttl=254 time=39 ms

Re

Reply from 10.0.23.3: bytes=56 Sequence=3 ttl=254 time=39 ms


Reply from 10.0.23.3: bytes=56 Sequence=4 ttl=254 time=40 ms

ng

Reply from 10.0.23.3: bytes=56 Sequence=5 ttl=254 time=39 ms

ni

--- 10.0.23.3 ping statistics --5 packet(s) transmitted

ar

5 packet(s) received

Le

0.00% packet loss

Mo

re

round-trip min/avg/max = 39/40/44 ms

HC Series

HUAWEI TECHNOLOGIES

Page61

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Step 6 Manage the serial connection


View the type of the cable connected to the serial interface, interface status,
and clock frequency, and change the clock frequency.
<R1>display interface Serial1/0/0
Serial1/0/0 current state : UP
Line protocol current state : UP
Last line protocol up time : 2013-12-10 11:25:08
Description:HUAWEI, AR Series, Serial1/0/0 Interface

hu

Route Port,The Maximum Transmit Unit is 1500, Hold timer is 10(sec)

g.

Internet Address is 10.0.12.1/24


Link layer protocol is nonstandard HDLC
: 2013-12-10 11:23:55

in

Last physical up time

rn

Last physical down time : 2013-12-10 11:23:55


Current system time: 2013-12-10 11:51:12

ea

Physical layer is synchronous, Baudrate is 64000 bps

/l

Interface is DCE, Cable type is V24, Clock mode is DCECLK


Last 300 seconds input rate 6 bytes/sec 48 bits/sec 0 packets/sec

:/

Last 300 seconds output rate 4 bytes/sec 32 bits/sec 0 packets/sec

tp

output omitted

s:

ht

The preceding information shows that S1/0/0 on R1 connects to a DCE cable


and the clock frequency is 64000 bit/s. The DCE controls the clock frequency
and bandwidth.

ce

Change the clock frequency on the link between R1 and R2 to 128000 bit/s.
This operation must be performed on the DCE, R1.

ur

[R1]interface Serial 1/0/0

so

[R1-Serial1/0/0]baudrate 128000

Re

After the configuration is complete, view the serial interface status.


<R1>display interface Serial1/0/0

ng

Serial1/0/0 current state : UP

ni

Line protocol current state : UP


Last line protocol up time : 2013-12-10 11:25:08

ar

Description:HUAWEI, AR Series, Serial1/0/0 Interface

Le

Route Port,The Maximum Transmit Unit is 1500, Hold timer is 10(sec)


Internet Address is 10.0.12.1/24
Link layer protocol is nonstandard HDLC

re

Last physical up time

: 2013-12-10 11:23:55

Mo

Last physical down time : 2013-12-10 11:23:55

Page62

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


Current system time: 2013-12-10 11:54:19

Physical layer is synchronous, Baudrate is 128000 bps

aw
ei
.c
om
/e

Interface is DCE, Cable type is V24, Clock mode is DCECLK


Last 300 seconds input rate 6 bytes/sec 48 bits/sec 0 packets/sec

Last 300 seconds output rate 4 bytes/sec 32 bits/sec 0 packets/sec


output omitted

Step 7 Configure PPP on the serial interfaces.

g.

hu

Configure PPP between R1 and R2, as well as R2 and R3. Both ends of the
link must use the same encapsulation mode. If different encapsulation modes
are used, interfaces may display as Down.

in

[R1]interface Serial 1/0/0

rn

[R1-Serial1/0/0]link-protocol ppp

ea

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y
[R2]interface Serial 1/0/0

/l

[R2-Serial1/0/0]link-protocol ppp

[R2-Serial1/0/0]quit
[R2]interface Serial 2/0/0

ht

[R2-Serial2/0/0]link-protocol ppp

tp

:/

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y

[R3]interface Serial 2/0/0

s:

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y

[R3-Serial2/0/0]link-protocol ppp

ce

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y

so

<R2>ping 10.0.12.1

ur

After the configuration is complete, test link connectivity.

Re

PING 10.0.12.1: 56 data bytes, press CTRL_C to break


Reply from 10.0.12.1: bytes=56 Sequence=1 ttl=255 time=22 ms
Reply from 10.0.12.1: bytes=56 Sequence=2 ttl=255 time=27 ms

ng

Reply from 10.0.12.1: bytes=56 Sequence=3 ttl=255 time=27 ms

ni

Reply from 10.0.12.1: bytes=56 Sequence=4 ttl=255 time=27 ms

ar

Reply from 10.0.12.1: bytes=56 Sequence=5 ttl=255 time=27 ms

Le

--- 10.0.12.1 ping statistics --5 packet(s) transmitted


0.00% packet loss
round-trip min/avg/max = 22/26/27 ms

Mo

re

5 packet(s) received

HC Series

HUAWEI TECHNOLOGIES

Page63

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R2>ping 10.0.23.3

aw
ei
.c
om
/e

Reply from 10.0.23.3: bytes=56 Sequence=1 ttl=255 time=35 ms


Reply from 10.0.23.3: bytes=56 Sequence=2 ttl=255 time=40 ms

Reply from 10.0.23.3: bytes=56 Sequence=3 ttl=255 time=40 ms


Reply from 10.0.23.3: bytes=56 Sequence=4 ttl=255 time=40 ms
Reply from 10.0.23.3: bytes=56 Sequence=5 ttl=255 time=40 ms
--- 10.0.23.3 ping statistics --5 packet(s) transmitted

hu

5 packet(s) received
0.00% packet loss

in

g.

round-trip min/avg/max = 35/39/40 ms

rn

If the ping operation fails, check the interface status and whether the link layer
protocol type is correct.

ea

<R1>display interface Serial1/0/0

/l

Serial1/0/0 current state : UP


Line protocol current state : UP

:/

Last line protocol up time : 2013-12-10 12:35:41

tp

Description:HUAWEI, AR Series, Serial1/0/0 Interface

Link layer protocol is PPP

s:

LCP opened, IPCP opened

ht

Route Port,The Maximum Transmit Unit is 1500, Hold timer is 10(sec)


Internet Address is 10.0.12.1/24

Last physical up time

: 2013-12-10 11:57:20

ce

Last physical down time : 2013-12-10 11:57:19


Current system time: 2013-12-10 13:38:03

ur

Physical layer is synchronous, Baudrate is 128000 bps

so

Interface is DCE, Cable type is V24, Clock mode is DCECLK


Last 300 seconds input rate 7 bytes/sec 56 bits/sec 0 packets/sec

Re

Last 300 seconds output rate 4 bytes/sec 32 bits/sec 0 packets/sec

ng

output omitted

ar

ni

Step 8 Check routing entry changes.

Mo

re

Le

After PPP configuration is complete, routers establish connections at the data


link layer. The local device sends a route to the peer device. The route
contains the interface IP address and a 32-bit mask.

Page64

PING 10.0.23.3: 56 data bytes, press CTRL_C to break

HUAWEI TECHNOLOGIES

HC Series

The following information uses R2 as an example, for which the routes to R1


and R3 can be seen.

aw
ei
.c
om
/e

[R2]display ip routing-table
Route Flags: R - relay, D - download to fib

---------------------------------------------------------------------------Routing Tables: Public

Proto

Pre Cost

Flags

NextHop

Interface

Direct 0

10.0.12.2

Direct 0

10.0.12.1

10.0.12.2/32

Direct 0

127.0.0.1

Serial1/0/0

10.0.12.255/32 Direct 0

127.0.0.1

Serial1/0/0

10.0.23.0/24

Direct 0

10.0.23.2

Serial2/0/0

10.0.23.2/32

Direct 0

127.0.0.1

Serial2/0/0

10.0.23.3/32

Direct 0

10.0.23.3

Serial2/0/0

10.0.23.255/32 Direct 0

127.0.0.1

Serial2/0/0

127.0.0.0/8

Direct 0

127.0.0.1/32

Direct 0

127.255.255.255/32 Direct 0

255.255.255.255/32 Direct 0

Serial1/0/0
Serial1/0/0

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

:/

127.0.0.1

tp

/l

ea

in

g.

10.0.12.0/24
10.0.12.1/32

rn

Destination/Mask

Routes : 12

hu

Destinations : 12

ht

s:

Think about the origin and functions of the two routes. Check the following
items:

ce

If HDLC encapsulation is used, do these two routes exist?

so

ur

Can R1 and R2 communicate using HDLC or PPP when the IP addresses of


S1/0/0 interfaces on R1 and R2 are located on different network segments?

Re

Step 9 Enable PAP authentication between R1 and R2.

ng

Configure PAP authentication with R1 as the PPP PAP authenticator.

ni

[R1]interface Serial 1/0/0


[R1-Serial1/0/0]ppp authentication-mode pap

ar

[R1-Serial1/0/0]quit

Le

[R1]aaa

[R1-aaa]local-user huawei password cipher huawei

re

info: A new user added

Mo

[R1-aaa]local-user huawei service-type ppp

HC Series

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 2 Enterprise WAN Configuration

Page65

HCNA-HNTD Module 2 Enterprise WAN Configuration

Configure PAP authentication with R2 acting as the PAP authenticated device.

aw
ei
.c
om
/e

[R2]interface Serial 1/0/0

[R2-Serial1/0/0]ppp pap local-user huawei password cipher huawei

After R2 sends an authentication request to R1, R1 sends a response


message to R2, requesting R2 to use PAP authentication following which R2
will send its password to R1.

hu

After the configuration is complete, test connectivity between R1 and R2.


<R1>debugging ppp pap packet

g.

<R1>terminal debugging

in

<R1>display debugging
PPP PAP packets debugging switch is on

rn

<R1>system-view

ea

[R1]interface Serial 1/0/0


[R1-Serial1/0/0]shutdown

:/

/l

[R1-Serial1/0/0]undo shutdown

Dec 10 2013 14:44:22.440.1+00:00 R1 PPP/7/debug2:

tp

PPP Packet:

Serial1/0/0 Input PAP(c023) Pkt, Len 22

ht

State ServerListen, code Request(01), id 1, len 18


Host Len: 6 Name:huawei

s:

[R1-Serial1/0/0]

ce

Dec 10 2013 14:44:22.440.2+00:00 R1 PPP/7/debug2:


PPP Packet:

ur

Serial1/0/0 Output PAP(c023) Pkt, Len 52


State WaitAAA, code Ack(02), id 1, len 48

Re

so

Msg Len: 43 Msg:Welcome to use Quidway ROUTER, Huawei Tech.


[R1-Serial1/0/0]return
<R1>undo debugging all

ni

ng

Info: All possible debugging has been turned off

Le

ar

Step 10 Enable CHAP authentication between R2 and R3.

Mo

re

Configure R3 as the authenticator. After R2 sends an authentication request to


R3, R3 sends a response message to R2, requesting R2 to use CHAP
authentication following which a challenge is sent to R3.

Page66

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


[R3]interface Serial 2/0/0

[R3-Serial2/0/0]ppp authentication-mode chap

aw
ei
.c
om
/e

[R3-Serial2/0/0]quit
[R3]aaa
[R3-aaa]local-user huawei password cipher huawei
info: A new user added
[R3-aaa]local-user huawei service-type ppp
[R3-aaa]quit
[R3]interface Serial 2/0/0
[R3-Serial2/0/0]shutdown

g.

hu

[R3-Serial2/0/0]undo shutdown

On R3, the following information is displayed.

in

Dec 10 2013 15:06:00+00:00 R3 %%01PPP/4/PEERNOCHAP(l)[5]:On the interface

rn

Serial2/0/0, authentication failed and PPP link was closed because CHAP was
disabled on the peer.

ea

[R3-Serial2/0/0]

/l

Dec 10 2013 15:06:00+00:00 R3 %%01PPP/4/RESULTERR(l)[6]:On the interface

:/

Serial2/0/0, LCP negotiation failed because the result cannot be accepted.

ht

Configure R2 as the CHAP client.

tp

The highlighted output indicates that authentication is unable to initialize.

[R2]interface Serial 2/0/0

s:

[R2-Serial2/0/0]ppp chap user huawei

ce

[R2-Serial2/0/0]ppp chap password cipher huawei

so

<R2>ping 10.0.23.3

ur

After the configuration is complete, the interface changes to an Up state. The


ping command output is as follows:

Re

PING 10.0.23.3: 56 data bytes, press CTRL_C to break


Reply from 10.0.23.3: bytes=56 Sequence=1 ttl=255 time=35 ms

ng

Reply from 10.0.23.3: bytes=56 Sequence=2 ttl=255 time=41 ms


Reply from 10.0.23.3: bytes=56 Sequence=3 ttl=255 time=41 ms

ni

Reply from 10.0.23.3: bytes=56 Sequence=4 ttl=255 time=41 ms

ar

Reply from 10.0.23.3: bytes=56 Sequence=5 ttl=255 time=41 ms

Le

--- 10.0.23.3 ping statistics --5 packet(s) transmitted


0.00% packet loss
round-trip min/avg/max = 35/39/41 ms

Mo

re

5 packet(s) received

HC Series

HUAWEI TECHNOLOGIES

Page67

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Step 11 PPP CHAP debugging


Run the debug command to view negotiation of the PPP connection between
R2 and R3. The PPP connection is established using CHAP. Disable interface
Serial 2/0/0 on R2, run the debug command, and enable Serial 2/0/0 on R2.
[R2]interface Serial 2/0/0
[R2-Serial2/0/0]shutdown

hu

Run the debugging ppp chap all and the terminal debugging commands to
display the debugging information.

g.

[R2-Serial2/0/0]return

in

<R2>debugging ppp chap all


<R2>terminal debugging

rn

Info: Current terminal debugging is on.

ea

<R2>display debugging
PPP CHAP packets debugging switch is on

/l

PPP CHAP events debugging switch is on

:/

PPP CHAP errors debugging switch is on

tp

PPP CHAP state change debugging switch is on

ht

Force CHAP authentication to initialize on S2/0/0 of R2.


<R2>system-view
[R2]interface Serial 2/0/0

s:

Enter system view, return user view with Ctrl+Z.

ce

[R2-Serial2/0/0]undo shutdown

ur

The following debugging information is displayed:

so

Dec 10 2013 09:10:38.700.1+00:00 R2 PPP/7/debug2:

Re

PPP State Change:

Serial2/0/0 CHAP : Initial --> ListenChallenge


[R2-Serial2/0/0]

ng

Dec 10 2013 09:10:38.710.1+00:00 R2 PPP/7/debug2:

ni

PPP Packet:

Serial2/0/0 Input CHAP(c223) Pkt, Len 25

ar

State ListenChallenge, code Challenge(01), id 1, len 21

Le

Value_Size: 16 Value: fc 9b 56 e1 53 e3 a6 26 1b 54 e5 e2 a1 ed 90 87
Name:

[R2-Serial2/0/0]

re

Dec 10 2013 09:10:38.710.2+00:00 R2 PPP/7/debug2:

Mo

PPP Event:

Page68

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


Serial2/0/0 CHAP Receive Challenge Event

state ListenChallenge
Dec 10 2013 09:10:38.710.3+00:00 R2 PPP/7/debug2:
PPP Packet:
Serial2/0/0 Output CHAP(c223) Pkt, Len 31
State ListenChallenge, code Response(02), id 1, len 27

aw
ei
.c
om
/e

[R2-Serial2/0/0]

Value_Size: 16 Value: f9 54 1 69 30 59 a0 af 52 a1 1d de 85 77 27 6b
Name: huawei
Dec 10 2013 09:10:38.710.4+00:00 R2 PPP/7/debug2:
PPP State Change:

g.

Serial2/0/0 CHAP : ListenChallenge --> SendResponse

hu

[R2-Serial2/0/0]

PPP Packet:

ea

Serial2/0/0 Input CHAP(c223) Pkt, Len 20

rn

Dec 10 2013 09:10:38.720.1+00:00 R2 PPP/7/debug2:

in

[R2-Serial2/0/0]

State SendResponse, code SUCCESS(03), id 1, len 16

/l

Message: Welcome to .

:/

[R2-Serial2/0/0]

Dec 10 2013 09:10:38.720.2+00:00 R2 PPP/7/debug2:

tp

PPP Event:

Serial2/0/0 CHAP Receive Success Event

ht

state SendResponse
[R2-Serial2/0/0]

s:

Dec 10 2013 09:10:38.720.3+00:00 R2 PPP/7/debug2:


PPP State Change:

ur

ce

Serial2/0/0 CHAP : SendResponse --> ClientSuccess

so

The highlighted debugging information shows the key CHAP behavior. Disable
the debugging process.

Re

[R2-Serial2/0/0]return
<R2>undo debugging all

ni

ng

Info: All possible debugging has been turned off

ar

Additional Exercises: Analyzing and Verifying

Mo

re

Le

Why is the PPP Challenge Handshake Authentication Protocol (CHAP) more


secure than the PPP Password Authentication Protocol (PAP)?

HC Series

HUAWEI TECHNOLOGIES

Page69

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Final Configuration
[R1]display current-configuration
[V200R003C00SPC200]
#
sysname R1
#
aaa
authentication-scheme default

hu

authorization-scheme default
accounting-scheme default

g.

domain default

in

domain default_admin

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$

rn

local-user admin service-type http

local-user huawei password cipher %$%$B:%I)Io0H8)[%SB[idM3C/!#%$%$

ea

local-user huawei service-type ppp

/l

#
interface Serial1/0/0
ppp authentication-mode pap
ip address 10.0.12.1 255.255.255.0

ht

baudrate 128000

tp

:/

link-protocol ppp

s:

rip 1
version 2

ce

network 10.0.0.0
user-interface con 0

ur

so

authentication-mode password

Re

set authentication password


cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$
user-interface vty 0 4

ng

ar

ni

return

[R2]display current-configuration

Le

[V200R003C00SPC200]
#

re

sysname R2

Mo

Page70

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


interface Serial1/0/0

aw
ei
.c
om
/e

ppp pap local-user huawei password cipher %$%$u[hr6d<JVHR@->T7xr1<$.iv%$%$


ip address 10.0.12.2 255.255.255.0
#
interface Serial2/0/0
link-protocol ppp
ppp chap user huawei
ppp chap password cipher %$%$e{5h)gh"/Uz0mUC%vEx3$4<m%$%$
ip address 10.0.23.2 255.255.255.0

hu

#
rip 1

g.

version 2

in

network 10.0.0.0
#

rn

user-interface con 0

ea

authentication-mode password
set authentication password

/l

cipher %$%$|nRPL^hr2IXi7LHDID!/,.*%.8%h;3:,hXO2dk#ikaWI.*(,%$%$

:/

user-interface vty 0 4
#

ht

tp

return

[R3]display current-configuration

s:

[V200R003C00SPC200]
#

ce

sysname R3

ur

#
aaa

so

authentication-scheme default

Re

authorization-scheme default
accounting-scheme default
domain default

ng

domain default_admin

ni

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$


local-user admin service-type http

ar

local-user huawei password cipher %$%$fZsyUk1=O=>:L4'ytgR~D*Im%$%$

Le

local-user huawei service-type ppp


#

interface Serial2/0/0

re

link-protocol ppp

Mo

ppp authentication-mode chap

HC Series

HUAWEI TECHNOLOGIES

link-protocol ppp

Page71

HCNA-HNTD Module 2 Enterprise WAN Configuration


ip address 10.0.23.3 255.255.255.0

aw
ei
.c
om
/e

rip 1
version 2
network 10.0.0.0
#
user-interface con 0
authentication-mode password
set authentication password

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$

hu

user-interface vty 0 4
#

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g.

return

Page72

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Lab 2-2 Configuring Frame Relay at the Customer Edge


Learning Objectives

As a result of this lab section, you should achieve the following tasks:

hu

Configuration of frame relay interfaces on the customer edge.


Establishment of RIP in a hub and spoke network.
Establishment of OSPF in a hub and spoke (NBMA) network.
Configuration of frame relay interfaces when using the OSPF
point-to-multipoint network type.

g.

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

Topology

ng

Scenario

Re

so

Figure 2.2 Lab topology for frame relay configuration

Mo

re

Le

ar

ni

The enterprise network has existing frame relay virtual circuits between the HQ
and some branch offices. A recent change in equipment requires that these
frame relay VC be re-established. The virtual circuits had been provided by the
service provider at the time the service was first implemented and it is the task
of the administrator to implement the frame relay configuration on the edge
routers for the HQ and branch offices. The administrator must configure frame
relay on the WAN links and perform mapping between the local DLCI and IP
addresses.
HC Series

HUAWEI TECHNOLOGIES

Page73

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
<Huawei>system-view
Enter system view, return user view with Ctrl+Z.

g.

hu

[Huawei]sysname R1
<Huawei>system-view

in

Enter system view, return user view with Ctrl+Z.

rn

[Huawei]sysname R2

ea

<Huawei>system-view
Enter system view, return user view with Ctrl+Z.

:/

/l

[Huawei]sysname R3

tp

Step 2 Clean up the previous configuration.

[R1]interface Serial 1/0/0

ce

[R1-Serial1/0/0]shutdown

s:

ht

Disable the serial interfaces used for establishing the HDLC & PPP networks.

ur

[R2]interface Serial 1/0/0


[R2-Serial1/0/0]shutdown

so

[R2-Serial1/0/0]interface Serial 2/0/0

Re

[R2-Serial2/0/0]shutdown

[R3]interface Serial 2/0/0

ni

ng

[R3-Serial2/0/0]shutdown

Le

ar

Step 3 Establish frame relay encapsulation.

Mo

re

Set basic parameters, including IP addresses. Manually define the mapping


between the peer and DLCI. The inverse ARP function should be disabled.
Ensure that the broadcast parameter is used in the fr map command to allow
the network on the loopback interface to be advertised using RIP.
Page74

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


[R1]interface Serial 2/0/0

aw
ei
.c
om
/e

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y
[R1-Serial2/0/0]ip address 10.0.123.1 24
[R1-Serial2/0/0]undo fr inarp
[R1-Serial2/0/0]fr map ip 10.0.123.2 102 broadcast
[R1-Serial2/0/0]fr map ip 10.0.123.3 103 broadcast
[R1-Serial2/0/0]interface loopback 0
[R1-LoopBack0]ip address 10.0.1.1 24

hu

[R2]interface Serial 3/0/0


[R2-Serial3/0/0]link-protocol fr

g.

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y

rn

[R2-Serial3/0/0]fr map ip 10.0.123.1 201 broadcast

in

[R2-Serial3/0/0]ip address 10.0.123.2 24


[R2-Serial3/0/0]undo fr inarp

ea

[R2-Serial3/0/0]interface loopback 0

/l

[R2-LoopBack0]ip address 10.0.2.2 24

:/

[R3]interface Serial 1/0/0


[R3-Serial1/0/0]link-protocol fr

tp

Warning: The encapsulation protocol of the link will be changed. Continue? [Y/N]:y
[R3-Serial1/0/0]ip address 10.0.123.3 24

ht

[R3-Serial1/0/0]undo fr inarp

[R3-Serial1/0/0]fr map ip 10.0.123.1 301 broadcast

s:

[R3-Serial1/0/0]interface loopback 0

ce

[R3-LoopBack0]ip address 10.0.3.3 24

so

ur

After the IP addresses are configured, test network connectivity.


<R1>ping 10.0.123.2

PING 10.0.123.2: 56 data bytes, press CTRL_C to break

Re

Reply from 10.0.123.2: bytes=56 Sequence=1 ttl=255 time=64 ms


Reply from 10.0.123.2: bytes=56 Sequence=2 ttl=255 time=59 ms

ng

Reply from 10.0.123.2: bytes=56 Sequence=3 ttl=255 time=59 ms


Reply from 10.0.123.2: bytes=56 Sequence=4 ttl=255 time=59 ms

ar

ni

Reply from 10.0.123.2: bytes=56 Sequence=5 ttl=255 time=59 ms


--- 10.0.123.2 ping statistics ---

Le

5 packet(s) transmitted
5 packet(s) received
round-trip min/avg/max = 59/60/64 ms

Mo

re

0.00% packet loss

HC Series

HUAWEI TECHNOLOGIES

[R1-Serial2/0/0]link-protocol fr

Page75

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R1>ping 10.0.123.3

aw
ei
.c
om
/e

Reply from 10.0.123.3: bytes=56 Sequence=1 ttl=255 time=64 ms


Reply from 10.0.123.3: bytes=56 Sequence=2 ttl=255 time=59 ms
Reply from 10.0.123.3: bytes=56 Sequence=3 ttl=255 time=59 ms
Reply from 10.0.123.3: bytes=56 Sequence=4 ttl=255 time=59 ms
Reply from 10.0.123.3: bytes=56 Sequence=5 ttl=255 time=59 ms
--- 10.0.123.3 ping statistics --5 packet(s) transmitted

hu

5 packet(s) received
0.00% packet loss

in

g.

round-trip min/avg/max = 59/60/64 ms

<R1>display fr interface Serial 2/0/0

/l

Serial2/0/0, DTE, physical up, protocol up

ea

rn

Run the following commands to view the FR encapsulation information for the
R1 interfaces.

:/

<R1>display fr lmi-info interface Serial 2/0/0

tp

Frame relay LMI statistics for interface Serial2/0/0 (DTE, Q933)


T391DTE = 10 (hold timer 10)

ht

N391DTE = 6, N392DTE = 3, N393DTE = 4

out status enquiry = 180, in status = 178

s:

status timeout = 0, discarded messages = 0

ce

<R1>display fr map-info interface Serial 2/0/0


Map Statistics for interface Serial2/0/0 (DTE)

ur

DLCI = 102, IP 10.0.123.2, Serial2/0/0

so

create time = 2011/11/16 09:28:49, status = ACTIVE


encapsulation = ietf, vlink = 1, broadcast

Re

DLCI = 103, IP 10.0.123.3, Serial2/0/0


create time = 2011/11/16 09:28:56, status = ACTIVE

Mo

re

Le

ar

ni

ng

encapsulation = ietf, vlink = 2, broadcast

Page76

PING 10.0.123.3: 56 data bytes, press CTRL_C to break

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Configure RIPv2 on R1, R2 and R3. If you are continuing from the previous
HDLC/PPP lab, the RIP routes for network 10.0.0.0 may have already been
configured, however the automatic summary must still be disabled to uniquely
identify the routes of the peers.

Step 4 Configure RIPv2 between R1, R2, and R3.

hu

In addition, split horizon is disabled by default on frame relay networks, and so


It is not necessary for the split horizon parameters to be modified in this
exercise.
[R1]rip 1

g.

[R1-rip-1]version 2
[R1-rip-1]network 10.0.0.0

rn

in

[R1-rip-1]undo summary
[R2]rip 1

ea

[R2-rip-1]version 2

/l

[R2-rip-1]network 10.0.0.0

:/

[R2-rip-1]undo summary

tp

[R3]rip 1
[R3-rip-1]version 2

ht

[R3-rip-1]network 10.0.0.0

s:

[R3-rip-1]undo summary

ce

View the routing tables on R1, R2, and R3 to check the learned routes.
<R1>display ip routing-table protocol rip

ur

Route Flags: R - relay, D - download to fib


----------------------------------------------------------------------------

so

Public routing table : RIP

Routes : 2

Re

Destinations : 2

RIP routing table status : <Active>

ni

ng

Destinations : 2
Proto

ar

Destination/Mask

Le

10.0.2.0/24 RIP
10.0.3.0/24 RIP

Routes : 2
Pre Cost

Flags NextHop

Interface

100 1

10.0.123.2

Serial2/0/0

100 1

10.0.123.3

Serial2/0/0

Destinations : 0

Routes : 0

Mo

re

RIP routing table status : <Inactive>

HC Series

HUAWEI TECHNOLOGIES

Page77

HCNA-HNTD Module 2 Enterprise WAN Configuration

<R2>display ip routing-table protocol rip

aw
ei
.c
om
/e

Route Flags: R - relay, D - download to fib


---------------------------------------------------------------------------Public routing table : RIP
Destinations : 2

Routes : 2

RIP routing table status : <Active>

Proto

Pre Cost

Flags NextHop

100 1

10.0.123.1

10.0.3.0/24 RIP

100 2

10.0.123.1

Serial3/0/0

rn

RIP routing table status : <Inactive>

[R3]display ip routing-table protocol rip

ea

Routes : 0

/l

Destinations : 0

Serial3/0/0

in

10.0.1.0/24 RIP

Interface

hu

Destination/Mask

Routes : 2

g.

Destinations : 2

:/

Route Flags: R - relay, D - download to fib

----------------------------------------------------------------------------

tp

Public routing table : RIP

Routes : 2

ht

Destinations : 2

RIP routing table status : <Active>

Pre Cost

ce

Proto

ur

Destination/Mask

Routes : 2

s:

Destinations : 2

Flags NextHop

Interface

100 1

10.0.123.1

Serial1/0/0

10.0.2.0/24 RIP

100 2

10.0.123.1

Serial1/0/0

Re

so

10.0.1.0/24 RIP

RIP routing table status : <Inactive>


Routes : 0

Mo

re

Le

ar

ni

ng

Destinations : 0

Page78

HUAWEI TECHNOLOGIES

HC Series

Verify that the 10.0.3.0 network of R3 is capable of reaching the 10.0.1.0


network of R1.

aw
ei
.c
om
/e

[R3]ping a 10.0.3.3 10.0.1.1


PING 10.0.1.1: 56 data bytes, press CTRL_C to break

Reply from 10.0.1.1: bytes=56 Sequence=1 ttl=255 time=68 ms


Reply from 10.0.1.1: bytes=56 Sequence=2 ttl=255 time=63 ms
Reply from 10.0.1.1: bytes=56 Sequence=3 ttl=255 time=63 ms

Reply from 10.0.1.1: bytes=56 Sequence=4 ttl=255 time=63 ms

hu

Reply from 10.0.1.1: bytes=56 Sequence=5 ttl=255 time=63 ms


--- 10.0.1.1 ping statistics ---

g.

5 packet(s) transmitted
5 packet(s) received

in

0.00% packet loss

rn

round-trip min/avg/max = 63/64/68 ms

/l

ea

Perform the same test to network 10.0.2.2 of R2 from network 10.0.3.3 of R3.
<R3>ping -a 10.0.3.3 10.0.2.2

:/

PING 10.0.2.2: 56 data bytes, press CTRL_C to break

tp

Reply from 10.0.2.2: bytes=56 Sequence=1 ttl=254 time=101 ms


Reply from 10.0.2.2: bytes=56 Sequence=2 ttl=254 time=110 ms

ht

Reply from 10.0.2.2: bytes=56 Sequence=3 ttl=254 time=101 ms


Reply from 10.0.2.2: bytes=56 Sequence=4 ttl=254 time=101 ms

s:

Reply from 10.0.2.2: bytes=56 Sequence=5 ttl=254 time=101 ms

ce

--- 10.0.2.2 ping statistics --5 packet(s) transmitted

so

0.00% packet loss

ur

5 packet(s) received

Re

round-trip min/avg/max = 101/102/110 ms

Mo

re

Le

ar

ni

ng

The RIP routing protocol has enabled a route between the loopback interfaces
of R2 and R3 to be established via R1.

HC Series

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 2 Enterprise WAN Configuration

Page79

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Attempt the same procedure to network 10.0.2.2 of R2 from the S2/0/0


(10.0.123.3) interface of R3.
[R3]ping 10.0.2.2
PING 10.0.2.2: 56 data bytes, press CTRL_C to break
Request time out
Request time out
Request time out
Request time out

hu

Request time out


--- 10.0.2.2 ping statistics ---

g.

5 packet(s) transmitted

in

0 packet(s) received

rn

100.00% packet loss

:/

/l

ea

The preceding test results indicate that R3 is unable to communicate with R2


(and vice versa) when the serial interface is the source. Check the routes to
find out why R3 and R2 are disconnected. The procedure for diagnosing this
fault is as follows:

ht

tp

View the R3 routing table and check whether any route is destined for the IP
address 10.0.2.2.

s:

If there is such a route, find out the next hop IP address of this route. Then
check whether R3 can reach the next hop and whether there is mapping
between the layer-3 IP addresses and layer-2 PVCs.

Re

so

ur

ce

If R3 can reach the next hop and there is mapping between Layer-3 IP
addresses and Layer-2 PVCs, check the devices on the route to determine
whether there is any route that can reach IP address 10.0.2.2, whether the
next hop of this route is reachable, and whether there is mapping between
Layer-3 IP addresses and Layer-2 PVCs.

ni

ng

If there is a route that can reach IP address 10.0.2.2 and there is mapping
between Layer-3 IP addresses and Layer-2 PVCs, check R2 to determine
whether there is any route that reaches the destination IP address of the
response packets and whether the next hop of this route is reachable.

Le

ar

If the next hop of this route is unreachable and the destination IP address of
the response packets is 10.0.123.3, R2 has the route that reaches this address
but there is no mapping between Layer-3 IP addresses and Layer-2 PVCs.

Mo

re

The following is the output of the commands used in the preceding fault
diagnosis procedure.
Page80

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R3>display ip routing-table

aw
ei
.c
om
/e

---------------------------------------------------------------------------Routing Tables: Public


Destinations : 13
Destination/Mask

Routes : 13

Proto

Pre Cost

10.0.1.0/24

RIP

100 1

100 2

Flags NextHop

Interface

10.0.123.1

Serial1/0/0

10.0.2.0/24

RIP

10.0.123.1

10.0.3.0/24

Direct 0

10.0.3.3

10.0.3.3/32

Direct 0

127.0.0.1

10.0.3.255/32

Direct 0

127.0.0.1

10.0.123.0/24

Direct 0

10.0.123.3

10.0.123.1/32

Direct 0

10.0.123.1

Serial1/0/0

10.0.123.3/32

Direct 0

127.0.0.1

InLoopBack0

10.0.123.255/32 Direct 0

127.0.0.1

InLoopBack0

127.0.0.0/8

Direct 0

127.0.0.1/32

Direct 0

127.255.255.255/32 Direct 0

255.255.255.255/32 Direct 0

Serial1/0/0

hu

LoopBack0

ea

rn

in

g.

InLoopBack0

Serial1/0/0

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

tp

InLoopBack0

127.0.0.1

/l
:/

<R3>display fr map-info interface Serial 1/0/0

ht

Map Statistics for interface Serial1/0/0 (DTE)


DLCI = 301, IP 10.0.123.1, Serial1/0/0

s:

create time = 2011/11/16 09:22:30, status = ACTIVE

ce

encapsulation = ietf, vlink = 1, broadcast

ur

<R1>display ip routing-table

Route Flags: R - relay, D - download to fib

so

----------------------------------------------------------------------------

Re

Routing Tables: Public

Proto

Pre Cost

10.0.1.0/24

Direct

10.0.1.1

LoopBack0

10.0.1.1/32

Direct

127.0.0.1

InLoopBack0

10.0.1.255/32

Direct

127.0.0.1

InLoopBack0

Flags NextHop

Interface

10.0.2.0/24

RIP

100 1

10.0.123.2

Serial2/0/0

10.0.3.0/24

RIP

100 1

10.0.123.3

Serial2/0/0

10.0.123.0/24

Direct

10.0.123.1

Serial2/0/0

10.0.123.1/32

Direct

127.0.0.1

InLoopBack0

Mo

re

Le

ar

ng

Destination/Mask

Routes : 14

ni

Destinations : 14

HC Series

HUAWEI TECHNOLOGIES

Route Flags: R - relay, D - download to fib

Page81

Direct

10.0.123.2

Serial2/0/0

10.0.123.3/32

Direct

10.0.123.3

Serial2/0/0

10.0.123.255/32 Direct

127.0.0.1

InLoopBack0

127.0.0.0/8

Direct

127.0.0.1

127.0.0.1/32

Direct

127.0.0.1

127.255.255.255/32 Direct 0

127.0.0.1

255.255.255.255/32 Direct 0

127.0.0.1

aw
ei
.c
om
/e

10.0.123.2/32

InLoopBack0

InLoopBack0

InLoopBack0
InLoopBack0

<R1>display fr map-info interface Serial 2/0/0


Map Statistics for interface Serial2/0/0 (DTE)

hu

DLCI = 102, IP 10.0.123.2, Serial2/0/0


create time = 2011/11/16 09:28:49, status = ACTIVE

g.

encapsulation = ietf, vlink = 1, broadcast

in

DLCI = 103, IP 10.0.123.3, Serial2/0/0

/l

Route Flags: R - relay, D - download to fib

ea

<R2>display ip routing-table

rn

create time = 2011/11/16 09:28:56, status = ACTIVE


encapsulation = ietf, vlink = 2, broadcast

:/

---------------------------------------------------------------------------Routing Tables: Public

Pre

Cost

10.0.1.0/24

RIP

100 1

10.0.123.1

Serial3/0/0

10.0.2.0/24

Direct

10.0.2.2

LoopBack0

10.0.2.2/32

Direct

127.0.0.1

InLoopBack0

10.0.2.255/32

Direct

127.0.0.1

InLoopBack0

Flags NextHop

Interface

10.0.3.0/24

RIP

100 2

10.0.123.1

Serial3/0/0

10.0.123.0/24

Direct

10.0.123.2

Serial3/0/0

Direct

10.0.123.1

Serial3/0/0

Direct

127.0.0.1

InLoopBack0

10.0.123.255/32 Direct

127.0.0.1

InLoopBack0

127.0.0.0/8

Direct

127.0.0.1

InLoopBack0

127.0.0.1/32

Direct

127.0.0.1

InLoopBack0

127.255.255.255/32 Direct

127.0.0.1

InLoopBack0

255.255.255.255/32 Direct

127.0.0.1

InLoopBack0

Re

10.0.123.1/32

ur

ce

s:

ht

Proto

so

Destination/Mask

Routes : 13

tp

Destinations : 13

Mo

re

Le

ar

ni

ng

10.0.123.2/32

Page82

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 2 Enterprise WAN Configuration

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R2>display fr map-info interface Serial 3/0/0

Map Statistics for interface Serial3/0/0 (DTE)

aw
ei
.c
om
/e

DLCI = 201, IP 10.0.123.1, Serial3/0/0


create time = 2011/11/16 09:21:10, status = ACTIVE
encapsulation = ietf, vlink = 1, broadcast

The conclusion is that there is no PVC that allows R2 to reach IP address


10.0.123.3.

hu

Step 5 Modify network parameters to enable the connection

g.

between R2 and R3.

ea

rn

in

The fault diagnosis results from step 2 indicate that communication fails since
there is no virtual circuit between the frame relay interfaces on R2 and R3. In
order to resolve this, configure a frame relay PVC between the interfaces on
R2 and R3.

:/

[R2-Serial3/0/0]fr map ip 10.0.123.3 201

/l

[R2]interface Serial 3/0/0

[R3]interface Serial 1/0/0

ht

tp

[R3-Serial1/0/0]fr map ip 10.0.123.2 301

s:

After the mapping has been configured between IP addresses and PVCs,
check the IP address-PVC mapping tables on R2 and R3 and detect network
connectivity.

ce

<R3>display fr lmi-info inter Serial 1/0/0

ur

Frame relay LMI statistics for interface Serial1/0/0 (DTE, Q933)


T391DTE = 10 (hold timer 10)

so

N391DTE = 6, N392DTE = 3, N393DTE = 4


out status enquiry = 326, in status = 324

Re

status timeout = 0, discarded messages = 0

ng

<R3>display fr map-info interface Serial 1/0/0

ni

Map Statistics for interface Serial1/0/0 (DTE)


DLCI = 301, IP 10.0.123.1, Serial1/0/0

ar

create time = 2011/11/16 09:22:30, status = ACTIVE


encapsulation = ietf, vlink = 1, broadcast

Le

DLCI = 301, IP 10.0.123.2, Serial1/0/0


encapsulation = ietf, vlink = 2

Mo

re

create time = 2011/11/16 09:55:23, status = ACTIVE

HC Series

HUAWEI TECHNOLOGIES

Page83

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R3>ping 10.0.2.2

aw
ei
.c
om
/e

Reply from 10.0.2.2: bytes=56 Sequence=1 ttl=254 time=118 ms


Reply from 10.0.2.2: bytes=56 Sequence=2 ttl=254 time=123 ms
Reply from 10.0.2.2: bytes=56 Sequence=3 ttl=254 time=123 ms
Reply from 10.0.2.2: bytes=56 Sequence=4 ttl=254 time=123 ms
Reply from 10.0.2.2: bytes=56 Sequence=5 ttl=254 time=123 ms
--- 10.0.2.2 ping statistics --5 packet(s) transmitted

hu

5 packet(s) received
0.00% packet loss

in

g.

round-trip min/avg/max = 118/122/123 ms

ea

rn

Step 6 Configure OSPF between R1 and R2.

/l

Delete the RIP configurations referenced in step 2 and the frame relay
mapping between R2 and R3 that was established during step 3.

:/

[R1]undo rip 1

tp

Warning: The RIP process will be deleted. Continue?[Y/N]y

ht

[R2]interface Serial 3/0/0

[R2-Serial3/0/0]undo fr map ip 10.0.123.3 201


[R2-Serial3/0/0]quit

s:

[R2]undo rip 1

ce

Warning: The RIP process will be deleted. Continue?[Y/N]y

ur

[R3]interface Serial 1/0/0

so

[R3-Serial1/0/0]undo fr map ip 10.0.123.2 301

Re

[R3-Serial1/0/0]quit
[R3]undo rip 1

Warning: The RIP process will be deleted. Continue?[Y/N]y

ng

[R3]

ni

Configure single-area OSPF on R1, R2, and R3.

ar

[R1]ospf 1 router-id 10.0.1.1

Le

[R1-ospf-1]area 0

Mo

re

[R1-ospf-1-area-0.0.0.0]network 10.0.0.0 0.255.255.255

Page84

PING 10.0.2.2: 56 data bytes, press CTRL_C to break

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


[R2]ospf 1 router-id 10.0.2.2

[R2-ospf-1]area 0

aw
ei
.c
om
/e

[R2-ospf-1-area-0.0.0.0]network 10.0.0.0 0.255.255.255


[R3]ospf 1 router-id 10.0.3.3
[R3-ospf-1]area 0
[R3-ospf-1-area-0.0.0.0]network 10.0.0.0 0.255.255.255

g.

hu

After the basic parameters are set, OSPF cannot establish neighbor
adjacencies. When using frame relay for data link layer encapsulation, OSPF
will set the network type to NBMA by default. As a result, OSPF does not
support broadcasts, and therefore cannot automatically discover neighbors.

in

<R3>display ospf interface Serial 1/0/0 verbose

rn

OSPF Process 1 with Router ID 10.0.3.3

ea

Interfaces

Cost: 1562

State: DR

Type: NBMA

MTU: 1500

:/

Priority: 1

/l

Interface: 10.0.123.3 (Serial1/0/0)

Backup Designated Router: 0.0.0.0

tp

Designated Router: 10.0.123.3

ht

Timers: Hello 30 , Dead 120 , Poll 120 , Retransmit 5 , Transmit Delay 1


IO Statistics

Output

DB Description

ce

Hello

s:

Input

ur

Type

Link-State Update
Link-State Ack

PrevState: Waiting

Re

OpaqueId: 0

so

Link-State Req

ng

Step 7 Configuring the NBMA environment.

Mo

re

Le

ar

ni

While R3 is the DR, R2 is unable to establish a full adjacency with the DR


since R3 is not reachable via the PVC between R2 and R1. Therefore the DR
must be set on R1. Additionally OSPF hello messages are unicast in an NBMA
network. Peers must be manually specified to allow hello packet forwarding.

HC Series

HUAWEI TECHNOLOGIES

Page85

HCNA-HNTD Module 2 Enterprise WAN Configuration


[R1]ospf

[R1-ospf-1]peer 10.0.123.2

aw
ei
.c
om
/e

[R1-ospf-1]peer 10.0.123.3
[R1-ospf-1]interface Serial 2/0/0
[R1-Serial2/0/0]ospf dr-priority 255
[R2]ospf
[R2-ospf-1]peer 10.0.123.1
[R3]ospf

g.

hu

[R3-ospf-1]peer 10.0.123.1

ea

OSPF Process 1 with Router ID 10.0.1.1

/l

Interfaces

:/

Interface: 10.0.123.1 (Serial2/0/0)


Cost: 1562

rn

<R1>display ospf interface Serial 2/0/0 verbose

in

Optionally the DR priority for R2 and R3 can be set to 0 to force their


exemption from any DR election.

State: DR

Type: NBMA

tp

Priority: 255

MTU: 1500

Designated Router: 10.0.123.1

ht

Backup Designated Router: 10.0.123.3


IO Statistics
Type

Input
32

OpaqueId: 0

29
2

16

30

20

Re

Link-State Ack

32

so

Link-State Req

ur

DB Description

Output

ce

Hello

Link-State Update

s:

Timers: Hello 30 , Dead 120 , Poll 120 , Retransmit 5 , Transmit Delay 1

PrevState: BDR

ng

Effective cost: 1562, enabled by OSPF Protocol

ar

ni

If R1 is not the designated router, reset the ospf process on all routers using
the following command and reattempt the above display command

Le

<R1>reset ospf process graceful-restart

Mo

re

Display the routing table to confirm that OSPF has been established over the
frame relay network.

Page86

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R1>display ip routing-table

aw
ei
.c
om
/e

---------------------------------------------------------------------------Routing Tables: Public


Destinations : 14

Routes : 14

Proto

Pre Cost

10.0.1.0/24

Direct

10.0.1.1

10.0.1.1/32

Direct

127.0.0.1

10.0.1.255/32

Direct

127.0.0.1

10.0.2.2/32

OSPF

10

1562

10.0.123.2

10.0.3.3/32

OSPF

10

1562

10.0.123.3

10.0.123.0/24

Direct

10.0.123.1

10.0.123.1/32

Direct

127.0.0.1

Serial2/0/0

10.0.123.2/32

Direct

10.0.123.2

Serial2/0/0

10.0.123.3/32

Direct

10.0.123.3

Serial2/0/0

10.0.123.255/32 Direct

127.0.0.0/8

Direct

127.0.0.1/32

255.255.255.255/32 Direct

LoopBack0

LoopBack0

hu

g.

in

rn

ea

LoopBack0

Serial2/0/0
Serial2/0/0

Serial2/0/0

127.0.0.1

Serial2/0/0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

ht

<R1>ping -a 10.0.1.1 10.0.2.2

Interface

/l

:/

Direct

127.255.255.255/32 Direct

Flags NextHop

tp

Destination/Mask

PING 10.0.2.2: 56 data bytes, press CTRL_C to break

s:

Reply from 10.0.2.2: bytes=56 Sequence=1 ttl=255 time=51 ms


Reply from 10.0.2.2: bytes=56 Sequence=2 ttl=255 time=60 ms

ce

Reply from 10.0.2.2: bytes=56 Sequence=3 ttl=255 time=51 ms

ur

Reply from 10.0.2.2: bytes=56 Sequence=4 ttl=255 time=51 ms

so

Reply from 10.0.2.2: bytes=56 Sequence=5 ttl=255 time=60 ms

Re

--- 10.0.2.2 ping statistics --5 packet(s) transmitted


5 packet(s) received

ng

0.00% packet loss

ni

round-trip min/avg/max = 51/54/60 ms

Mo

re

Le

ar

Attempts to establish a connection between 10.0.2.2 and 10.0.3.3 when using


the NBMA network type will fail unless a virtual circuit (PVC) is established
between R2 and R3. Alternatively the point-to-multipoint network type can be
applied.

HC Series

HUAWEI TECHNOLOGIES

Route Flags: R - relay, D - download to fib

Page87

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Step 8 Setting the OSPF network type to point-to-multipoint.


OSPF configuration can also use the point-to-multipoint OSPF network type
over frame relay networks. First remove the manual peering and change the
network type to point-to-multipoint.
[R1]ospf
[R1-ospf-1]undo peer 10.0.123.2

hu

[R1-ospf-1]undo peer 10.0.123.3


[R2]ospf

in

g.

[R2-ospf-1]undo peer 10.0.123.1


[R3]ospf

/l

Establish the Point-to-multipoint network type.

tp

:/

[R1]interface Serial 2/0/0


[R1-Serial2/0/0]ospf network-type p2mp

ea

rn

[R3-ospf-1]undo peer 10.0.123.1

[R2]interface Serial 3/0/0

ht

[R2-Serial3/0/0]ospf network-type p2mp

s:

[R3]interface Serial 1/0/0

ce

[R3-Serial1/0/0]ospf network-type p2mp

so

ur

After setting the OSPF network type, wait until the neighbor relationship is
established, then check the neighbor relationship and route information.

Re

<R1>display ospf peer brief

ng

OSPF Process 1 with Router ID 10.0.1.1


Peer Statistic Information

ni

---------------------------------------------------------------------------Interface

Neighbor id

State

0.0.0.0

Serial2/0/0

10.0.2.2

Full

0.0.0.0

Serial2/0/0

10.0.3.3

Full

Le

ar

Area Id

Mo

re

----------------------------------------------------------------------------

Page88

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R1>display ip routing-table

aw
ei
.c
om
/e

---------------------------------------------------------------------------Routing Tables: Public


Destinations : 14

Routes : 14

Proto

Pre Cost

10.0.1.0/24

Direct

10.0.1.1

10.0.1.1/32

Direct

127.0.0.1

10.0.1.255/32

Direct

127.0.0.1

10.0.2.2/32

OSPF

10

1562

10.0.123.2

10.0.3.3/32

OSPF

10

1562

10.0.123.3

10.0.123.0/24

Direct

10.0.123.1

10.0.123.1/32

Direct

127.0.0.1

Serial2/0/0

10.0.123.2/32

Direct

10.0.123.2

Serial2/0/0

10.0.123.3/32

Direct

10.0.123.3

Serial2/0/0

10.0.123.255/32 Direct

127.0.0.0/8

Direct

127.0.0.1/32

255.255.255.255/32 Direct

LoopBack0

LoopBack0

hu

LoopBack0

ea

rn

in

g.

Serial2/0/0

Serial2/0/0

Serial2/0/0

127.0.0.1

Serial2/0/0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

ht

<R2>display ospf peer brief

Interface

/l

:/

Direct

127.255.255.255/32 Direct

Flags NextHop

tp

Destination/Mask

s:

OSPF Process 1 with Router ID 10.0.2.2


Peer Statistic Information

ce

---------------------------------------------------------------------------Interface

0.0.0.0

Serial3/0/0

ur

Area Id

Neighbor id

State

10.0.1.1

Full

Re

so

---------------------------------------------------------------------------<R2>display ip routing-table
Route Flags: R - relay, D - download to fib

ng

----------------------------------------------------------------------------

ni

Routing Tables: Public

Proto

Pre Cost

10.0.1.1/32

OSPF

10

1562

10.0.123.1

Serial3/0/0

10.0.2.0/24

Direct

10.0.2.2

LoopBack0

10.0.2.2/32

Direct

127.0.0.1

LoopBack0

Le

Destination/Mask

Flags NextHop

Interface

Mo

re

Routes : 14

ar

Destinations : 14

HC Series

HUAWEI TECHNOLOGIES

Route Flags: R - relay, D - download to fib

Page89

Direct

127.0.0.1

LoopBack0

10.0.3.3/32

OSPF

10

3124

10.0.123.1

Serial3/0/0

10.0.123.0/24

Direct

10.0.123.2

Serial3/0/0

10.0.123.1/32

Direct

10.0.123.1

10.0.123.2/32

Direct

127.0.0.1

10.0.123.3/32

OSPF

10

3124

10.0.123.1

10.0.123.255/32 Direct

127.0.0.1

127.0.0.0/8

Direct

127.0.0.1

127.0.0.1/32

Direct

127.0.0.1

127.255.255.255/32 Direct

127.0.0.1

255.255.255.255/32 Direct

127.0.0.1

Serial3/0/0

Serial3/0/0

Serial3/0/0

Serial3/0/0

InLoopBack0

InLoopBack0

InLoopBack0

hu

InLoopBack0

in

g.

<R3>display ospf peer brief

aw
ei
.c
om
/e

10.0.2.255/32

OSPF Process 1 with Router ID 10.0.3.3

rn

Peer Statistic Information

ea

---------------------------------------------------------------------------Interface

Neighbor id

State

0.0.0.0

Serial1/0/0

10.0.1.1

Full

/l

Area Id

:/

----------------------------------------------------------------------------

tp

<R3>display ip routing-table

Route Flags: R - relay, D - download to fib

ht

---------------------------------------------------------------------------Routing Tables: Public

Flags NextHop

Interface

OSPF

10

1562

10.0.123.1

Serial1/0/0

10.0.2.2/32

OSPF

10

3124

10.0.123.1

Serial1/0/0

Direct

10.0.3.3

LoopBack0

Re

so

10.0.1.1/32
10.0.3.0/24

Direct

127.0.0.1

LoopBack0

10.0.3.255/32

Direct

127.0.0.1

LoopBack0

10.0.123.0/24

Direct

10.0.123.3

Serial1/0/0

10.0.123.1/32

Direct

10.0.123.1

Serial1/0/0

10.0.123.2/32

OSPF

10

3124

10.0.123.1

Serial1/0/0

10.0.123.3/32

Direct

127.0.0.1

Serial1/0/0

10.0.123.255/32 Direct

127.0.0.1

Serial1/0/0

Le

ar

ni

ng

10.0.3.3/32

127.0.0.0/8

Direct

127.0.0.1

InLoopBack0

127.0.0.1/32

Direct

127.0.0.1

InLoopBack0

127.255.255.255/32 Direct

127.0.0.1

InLoopBack0

255.255.255.255/32 Direct

127.0.0.1

InLoopBack0

re
Mo

Pre Cost

ce

Proto

ur

Destination/Mask

Routes : 14

s:

Destinations : 14

Page90

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 2 Enterprise WAN Configuration

HC Series

Perform a network connectivity test on R3 from the source 10.0.3.3.

aw
ei
.c
om
/e

<R3>ping -a 10.0.3.3 10.0.1.1


PING 10.0.1.1: 56 data bytes, press CTRL_C to break

Reply from 10.0.1.1: bytes=56 Sequence=1 ttl=255 time=60 ms


Reply from 10.0.1.1: bytes=56 Sequence=2 ttl=255 time=51 ms
Reply from 10.0.1.1: bytes=56 Sequence=3 ttl=255 time=50 ms
Reply from 10.0.1.1: bytes=56 Sequence=4 ttl=255 time=60 ms

hu

Reply from 10.0.1.1: bytes=56 Sequence=5 ttl=255 time=51 ms


--- 10.0.1.1 ping statistics ---

g.

5 packet(s) transmitted
5 packet(s) received

in

0.00% packet loss

rn

round-trip min/avg/max = 50/54/60 ms

ea

<R3>ping -a 10.0.3.3 10.0.123.2

/l

PING 10.0.123.2: 56 data bytes, press CTRL_C to break


Reply from 10.0.123.2: bytes=56 Sequence=1 ttl=254 time=110 ms

:/

Reply from 10.0.123.2: bytes=56 Sequence=2 ttl=254 time=101 ms


Reply from 10.0.123.2: bytes=56 Sequence=3 ttl=254 time=101 ms

tp

Reply from 10.0.123.2: bytes=56 Sequence=4 ttl=254 time=110 ms

ht

Reply from 10.0.123.2: bytes=56 Sequence=5 ttl=254 time=101 ms

s:

--- 10.0.123.2 ping statistics --5 packet(s) transmitted


0.00% packet loss

ce

5 packet(s) received

so

ur

round-trip min/avg/max = 101/104/110 ms


<R3>ping -a 10.0.3.3 10.0.2.2

Re

PING 10.0.2.2: 56 data bytes, press CTRL_C to break


Reply from 10.0.2.2: bytes=56 Sequence=1 ttl=254 time=102 ms

ng

Reply from 10.0.2.2: bytes=56 Sequence=2 ttl=254 time=101 ms


Reply from 10.0.2.2: bytes=56 Sequence=3 ttl=254 time=110 ms

ni

Reply from 10.0.2.2: bytes=56 Sequence=4 ttl=254 time=101 ms

ar

Reply from 10.0.2.2: bytes=56 Sequence=5 ttl=254 time=102 ms

Le

--- 10.0.2.2 ping statistics --5 packet(s) transmitted

Mo

re

5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 101/103/110 ms
HC Series

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 2 Enterprise WAN Configuration

Page91

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Final Configuration
[R1]display current-configuration
[V200R003C00SPC200]
#
sysname R1
#
interface Serial2/0/0
link-protocol fr

hu

undo fr inarp
fr map ip 10.0.123.2 102 broadcast

g.

fr map ip 10.0.123.3 103 broadcast

in

ip address 10.0.123.1 255.255.255.0


ospf network-type p2mp

rn

ospf dr-priority 255


#

ea

interface LoopBack0

/l

ip address 10.0.1.1 255.255.255.0


#

:/

ospf 1 router-id 10.0.1.1

tp

area 0.0.0.0
network 10.0.0.0 0.255.255.255

ht

#
user-interface con 0

s:

authentication-mode password
set authentication password

ur

user-interface vty 0 4

ce

cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$
#

Re

so

return

[R2]display current-configuration
[V200R003C00SPC200]

ng

ni

sysname R2
#

ar

interface Serial3/0/0
link-protocol fr

Le

undo fr inarp
fr map ip 10.0.123.1 201 broadcast

re

ip address 10.0.123.2 255.255.255.0

Mo

ospf network-type p2mp

Page92

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


#

interface LoopBack0

aw
ei
.c
om
/e

ip address 10.0.2.2 255.255.255.0


#
ospf 1 router-id 10.0.2.2
area 0.0.0.0
network 10.0.0.0 0.255.255.255
#
user-interface con 0
authentication-mode password

hu

set authentication password

cipher %$%$|nRPL^hr2IXi7LHDID!/,.*%.8%h;3:,hXO2dk#ikaWI.*(,%$%$

g.

user-interface vty 0 4

in

rn

return

ea

[R3]display current-configuration
[V200R003C00SPC200]

/l

:/

sysname R3
#

tp

interface Serial1/0/0
link-protocol fr

ht

undo fr inarp

fr map ip 10.0.123.1 301 broadcast

s:

ip address 10.0.123.3 255.255.255.0


ospf network-type p2mp

ce

ur

interface LoopBack0

ip address 10.0.3.3 255.255.255.0

so

#
area 0.0.0.0

Re

ospf 1 router-id 10.0.3.3

network 10.0.0.0 0.255.255.255

ng

ni

user-interface con 0
authentication-mode password

ar

set authentication password

Le

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$
user-interface vty 0 4
#

Mo

re

return

HC Series

HUAWEI TECHNOLOGIES

Page93

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Lab 2-3 PPPoE Client Session Establishment


Learning Objectives

As a result of this lab section, you should achieve the following tasks:

Configuration of a Dialer interface for PPPoE


Authentication of a client over PPPoE.

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g.

hu

Topology

Re

Figure 2.3 PPPoE Server and Client Topology

ni

ng

Scenario

Mo

re

Le

ar

The enterprise subscribes to a (typically high speed) DSL service from the
service provider over which WAN services are supported. R1 and R3 are
enterprise edge routers of different offices, and establish a connection to the
service provider through the PPPoE server (R2). The enterprise is required to
establish a PPPoE dialer on the edge routers to allow hosts in the local area
network to access external resources transparently via the service provider
network over PPPoE.
Page94

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment.

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
<Huawei>system-view
Enter system view, return user view with Ctrl+Z.

g.

hu

[Huawei]sysname R1
<Huawei>system-view

in

Enter system view, return user view with Ctrl+Z.

rn

[Huawei]sysname R2

ea

<Huawei>system-view
Enter system view, return user view with Ctrl+Z.

:/

/l

[Huawei]sysname R3

tp

Step 2 Clean up the previous configuration

[R1]interface Serial 2/0/0

ce

[R1-Serial2/0/0]shutdown

s:

ht

Disable the serial interfaces to avoid routing over the frame relay network.

ur

[R3]interface Serial 1/0/0

so

[R3-Serial1/0/0]shutdown

Re

Step 3 Configure PPPoE Server.

ni

ng

The PPPoE server is not part of the enterprise network, however it is required
to allow the enterprise edge routers R1 and R3 to be authenticated.

ar

[R2]ip pool pool1


Info: It's successful to create an IP address pool.

Le

[R2-ip-pool-pool1]network 119.84.111.0 mask 255.255.255.0


[R2-ip-pool-pool1]gateway-list 119.84.111.254

re

[R2-ip-pool-pool1]quit

Mo

[R2]interface Virtual-Template 1
[R2-Virtual-Template1]ppp authentication-mode chap

HC Series

HUAWEI TECHNOLOGIES

Page95

HCNA-HNTD Module 2 Enterprise WAN Configuration


[R2-Virtual-Template1]ip address 119.84.111.254 255.255.255.0

[R2-Virtual-Template1]remote address pool pool1

Bind the Virtual Template to interface Gigabit Ethernet 0/0/0.


[R2]interface GigabitEthernet 0/0/0
[R2-GigabitEthernet0/0/0]pppoe-server bind virtual-template 1
[R2-GigabitEthernet0/0/0]quit

hu

Configure a PPPoE authenticated user.


[R2]aaa

rn

[R2-aaa]local-user huawei2 password cipher huawei

in

[R2-aaa]local-user huawei1 service-type ppp

g.

[R2-aaa]local-user huawei1 password cipher huawei


Info: Add a new user.

aw
ei
.c
om
/e

[R2-Virtual-Template1]quit

[R2-aaa]local-user huawei2 service-type ppp

tp

Step 4 Configure PPPoE Client.

:/

/l

[R2-aaa]quit

ea

Info: Add a new user.

s:

ht

Configure R1 as a PPPoE client, for which the dialer interface needs to be


created, and PPP authentication enabled. The PPP authenticated username
and password should match that configured on the PPPoE server.

ce

[R1]dialer-rule
[R1-dialer-rule]quit

ur

[R1-dialer-rule]dialer-rule 1 ip permit

so

[R1]interface Dialer 1

Re

[R1-Dialer1]dialer user user1


[R1-Dialer1]dialer-group 1
[R1-Dialer1]dialer bundle 1

ng

[R1-Dialer1]ppp chap user huawei1

ni

[R1-Dialer1]ppp chap password cipher huawei


[R1-Dialer1]dialer timer idle 300

ar

[R1-Dialer1]dialer queue-length 8

Le

[R1-Dialer1]ip address ppp-negotiate

Mo

re

[R1-Dialer1]quit

Page96

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration

Bind the PPPoE Dialer to the outbound interface

[R1]interface GigabitEthernet 0/0/0

aw
ei
.c
om
/e

[R1-GigabitEthernet0/0/0]pppoe-client dial-bundle-number 1
[R1-GigabitEthernet0/0/0]quit

Configure a default static route to the PPPoE server


[R1]ip route-static 0.0.0.0 0.0.0.0 Dialer 1

hu

Configure R3 as a PPPoE client, for which the dialer interface needs to be


created, and PPP authentication enabled. The PPP authenticated username
and password should match that configured on the PPPoE server.
[R3]dialer-rule

g.

[R3-dialer-rule]dialer-rule 1 ip permit

in

[R3-dialer-rule]quit
[R3]interface Dialer 1

rn

[R3-Dialer1]dialer user user2

ea

[R3-Dialer1]dialer-group 1
[R3-Dialer1]dialer bundle 1

/l

[R3-Dialer1]ppp chap user huawei2

:/

[R3-Dialer1]ppp chap password cipher huawei


[R3-Dialer1]dialer timer idle 300

tp

[R3-Dialer1]dialer queue-length 8

[R3-Dialer1]ip address ppp-negotiate

ht

[R3-Dialer1]quit

s:

Bind the PPPoE Dialer to the outbound interface


[R3]interface GigabitEthernet 0/0/0

ce

[R3-GigabitEthernet0/0/0]pppoe-client dial-bundle-number 1

ur

[R3-GigabitEthernet0/0/0]quit

so

Configure a default static route to the PPPoE server

Re

[R3]ip route-static 0.0.0.0 0.0.0.0 Dialer 1

ng

Step 5 Verify the configuration results

ni

Execute the command display pppoe-server session all command to view


the status and configuration information.

ar

<R2>display pppoe-server session all


State

Virtual-Template1:0

UP

GE0/0/0

00e0.fc03.d0ae 00e0.fc03.7516

Virtual-Template1:1

UP

GE0/0/0

00e0.fc03.aedd 00e0.fc03.7516

OIntf

RemMAC

LocMAC

Mo

re

Le

SID Intf

According to displayed information, the session state is normal.


HC Series

HUAWEI TECHNOLOGIES

Page97

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R2>display virtual-access

Virtual-Template1:0 current state : UP


Last line protocol up time : 2013-12-12 04:15:54
Description:HUAWEI, AR Series, Virtual-Template1:0 Interface

aw
ei
.c
om
/e

Line protocol current state : UP

Route Port,The Maximum Transmit Unit is 1492, Hold timer is 10(sec)


Link layer protocol is PPP
LCP opened, IPCP opened
Input bandwidth utilization :

0%

Output bandwidth utilization :

0%

hu

Current system time: 2013-12-12 04:53:01

g.

Virtual-Template1:1 current state : UP

in

Line protocol current state : UP


Last line protocol up time : 2013-12-12 04:23:13

rn

Description:HUAWEI, AR Series, Virtual-Template1:1 Interface

ea

Route Port,The Maximum Transmit Unit is 1492, Hold timer is 10(sec)


LCP opened, IPCP opened
Input bandwidth utilization :

0%

tp

Output bandwidth utilization : 0%

:/

Current system time: 2013-12-12 04:53:01

/l

Link layer protocol is PPP

s:

ht

Check the dialer interface of R1 and R3, and ensure both can obtain an IP
address from the PPPoE server.
<R1>display ip interface brief

ce

*down: administratively down

ur

^down: standby
(s): spoofing

so

(l): loopback

Re

The number of interface that is UP in Physical is 7


The number of interface that is DOWN in Physical is 4
The number of interface that is UP in Protocol is 5

ni

ng

The number of interface that is DOWN in Protocol is 6


IP Address/Mask

Physical

Protocol

Cellular0/0/0

unassigned

down

down

Cellular0/0/1

unassigned

down

down

Dialer1

119.84.111.253/32

up

up(s)

GigabitEthernet0/0/0

unassigned

up

down

Le

ar

Interface

Mo

re

output omitted

Page98

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


<R3>display ip interface brief
IP Address/Mask

Physical

Protocol

Cellular0/0/0

unassigned

down

down

Cellular0/0/1

unassigned

down

down

Dialer1

119.84.111.252/32

up

up(s)

GigabitEthernet0/0/0

unassigned

up

down

aw
ei
.c
om
/e

Interface

output omitted

output omitted

hu

Final Configuration

g.

[R1]display current-configuration
[V200R003C00SPC200]

in

rn

sysname R1
#

ea

aaa

/l

authentication-scheme default
authorization-scheme default

:/

accounting-scheme default

tp

domain default
domain default_admin

ht

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$


local-user admin service-type http

s:

local-user huawei password cipher %$%$B:%I)Io0H8)[%SB[idM3C/!#%$%$


local-user huawei service-type ppp

ce

#
link-protocol ppp

ur

interface Dialer1

so

ppp chap user huawei1

ppp chap password cipher %$%$A8E~UjX}@;bhCL*C4w#<%"Ba%$%$

Re

ip address ppp-negotiate
dialer user user1

ng

dialer bundle 1

dialer queue-length 8

ni

dialer timer idle 300


#

ar

dialer-group 1

Le

interface GigabitEthernet0/0/0
pppoe-client dial-bundle-number 1

re

Mo

dialer-rule

HC Series

HUAWEI TECHNOLOGIES

Page99

HCNA-HNTD Module 2 Enterprise WAN Configuration


dialer-rule 1 ip permit

aw
ei
.c
om
/e

ip route-static 0.0.0.0 0.0.0.0 Dialer1


#
user-interface con 0
authentication-mode password
set authentication password

cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$
user-interface vty 0 4
#

g.

hu

return

in

[R2]dis current-configuration
[V200R003C00SPC200]

rn

ea

sysname R2
#

/l

ip pool pool1

:/

gateway-list 119.84.111.254
network 119.84.111.0 mask 255.255.255.0

tp

#
aaa

ht

authentication-scheme default
accounting-scheme default
domain default

ce

domain default_admin

s:

authorization-scheme default

ur

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$


local-user admin service-type http

so

local-user huawei1 password cipher %$%$MjCY6,a82N4W`]F]3LMAKG9+%$%$

Re

local-user huawei1 service-type ppp


local-user huawei2 password cipher %$%$Ctq55RX:]R,8Jc13{|,)KH!m%$%$
local-user huawei2 service-type ppp

ng

ni

interface Virtual-Template1
ppp authentication-mode chap

ar

remote address pool pool1

Le

ip address 119.84.111.254 255.255.255.0


#

interface GigabitEthernet0/0/0

re

pppoe-server bind Virtual-Template 1

Mo

Page100

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 2 Enterprise WAN Configuration


user-interface con 0

authentication-mode password

aw
ei
.c
om
/e

set authentication password


cipher %$%$|nRPL^hr2IXi7LHDID!/,.*%.8%h;3:,hXO2dk#ikaWI.*(,%$%$
user-interface vty 0 4
#
return

[R3]display current-configuration

hu

[V200R003C00SPC200]
#

g.

sysname R3

in

#
aaa

rn

authentication-scheme default

ea

authorization-scheme default
accounting-scheme default

/l

domain default

:/

domain default_admin
local-user admin service-type http

tp

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$


local-user huawei password cipher %$%$fZsyUk1=O=>:L4'ytgR~D*Im%$%$

ht

local-user huawei service-type ppp


#

s:

interface Dialer1
ppp chap user huawei2

ce

link-protocol ppp

ur

ppp chap password cipher %$%$0f8(;^]1NS:q;SPo8TyP%.Ei%$%$


dialer user user2

Re

dialer bundle 1

so

ip address ppp-negotiate

dialer queue-length 8
dialer timer idle 300

ng

dialer-group 1

ni

interface GigabitEthernet0/0/0

Le

ar

pppoe-client dial-bundle-number 1
#

dialer-rule

re

dialer-rule 1 ip permit

Mo

HC Series

HUAWEI TECHNOLOGIES

Page101

HCNA-HNTD Module 2 Enterprise WAN Configuration


ip route-static 0.0.0.0 0.0.0.0 Dialer1

aw
ei
.c
om
/e

user-interface con 0
authentication-mode password
set authentication password

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$
user-interface vty 0 4
#

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g.

hu

return

Page102

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Module 3 Implementing IP Security


Lab 3-1 Filtering Enterprise Data with Access Control Lists.
Learning Objectives

hu

As a result of this lab section, you should achieve the following tasks:

in

g.

Establishment of a basic ACL to implement source based filtering.


Establishment of an advanced ACL to implement enhanced filtering.

ur

ce

s:

ht

tp

:/

/l

ea

rn

Topology

Re

Scenario

so

Figure 3.1 Filtering enterprise network data with Access Control Lists

Mo

re

Le

ar

ni

ng

Assume that you are a network administrator of a company that has three
networks belonging to three sites. R2 is deployed at the border of the network
for the main site, while R1 and R3 are deployed at the boundary of the
remaining sites. The routers are interconnected over a private WAN
connection. The company needs to control the access of employees to telnet
and FTP services. Only site R1 has permission to access the telnet server in
the main site. Only site R3 has permission to access the FTP server.

HC Series

HUAWEI TECHNOLOGIES

Page103

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
[Huawei]sysname R1

hu

[Huawei]sysname R2

g.

[Huawei]sysname R3

in

[Huawei]sysname S1
[S1]vlan 4

rn

[S1-vlan4]quit
[S1]interface vlanif 4

/l

ea

[S1-Vlanif4]ip address 10.0.4.254 24


[Huawei]sysname S2

:/

[S2]vlan 6

tp

[S2-vlan6]quit
[S2]interface vlanif 6

ht

[S2-Vlanif6]ip address 10.0.6.254 24

ce

s:

Step 2 Clean up the previous configuration

[R1]ospf

Re

[R1-ospf-1]area 0

so

ur

Remove the current network being advertised in OSPF, the PPPoE dialer
interfaces, as well as the PPPoE server virtual template configuration from R2.

[R1-ospf-1-area-0.0.0.0]undo network 10.0.0.0 0.255.255.255

ng

[R1]undo ip route-static 0.0.0.0 0


[R1-GigabitEthernet0/0/0]undo pppoe-client dial-bundle-number 1

ni

[R1]interface Dialer 1

ar

[R1-Dialer1]undo dialer user


[R1]undo interface Dialer 1

Le

[R1]dialer-rule

re

[R1-dialer-rule]undo dialer-rule 1

Mo

[R2]ospf

Page104

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


[R2-ospf-1]area 0

[R2-ospf-1-area-0.0.0.0]undo network 10.0.0.0 0.255.255.255

aw
ei
.c
om
/e

[R2]interface GigabitEthernet 0/0/0


[R2-GigabitEthernet0/0/0]undo pppoe-server bind
[R2]undo interface Virtual-Template 1
[R2]undo ip pool pool1
[R2]aaa
[R2-aaa]undo local-user huawei1
[R2-aaa]undo local-user huawei2

hu

[R3]ospf
[R3-ospf-1]area 0

g.

[R3-ospf-1-area-0.0.0.0]undo network 10.0.0.0 0.255.255.255

in

[R3]undo ip route-static 0.0.0.0 0

[R3-GigabitEthernet0/0/0]undo pppoe-client dial-bundle-number 1

rn

[R3]interface Dialer 1

ea

[R3-Dialer1]undo dialer user


[R3]undo interface Dialer 1

/l

[R3]dialer-rule

ht

tp

Step 3 Configure IP addressing

:/

[R3-dialer-rule]undo dialer-rule 1

s:

Configure addressing for the 10.0.13.0/24. 10.0.4.0/24 and 10.0.6.0/24


networks as shown in the topology of figure 7.1.

ce

[R1]interface GigabitEthernet 0/0/0

ur

[R1-GigabitEthernet0/0/0]ip address 10.0.13.1 24

so

[R2]interface GigabitEthernet 0/0/0


[R2-GigabitEthernet0/0/0]ip address 10.0.13.2 24

Re

[R2-GigabitEthernet0/0/0]interface GigabitEthernet 0/0/1


[R2-GigabitEthernet0/0/1]ip address 10.0.4.2 24

ng

[R2-GigabitEthernet0/0/1]interface GigabitEthernet 0/0/2

ni

[R2-GigabitEthernet0/0/2]ip address 10.0.6.2 24

ar

[R3]interface GigabitEthernet 0/0/0

Le

[R3-GigabitEthernet0/0/0]ip address 10.0.13.3 24

Mo

re

Establish VLAN trunks on S1 and S2. The port link type should already be
configured for interface GigabitEthernet 0/0/2 on S1.

HC Series

HUAWEI TECHNOLOGIES

Page105

HCNA-HNTD Module 3 Implementing IP Security

[S1]interface GigabitEthernet 0/0/2

aw
ei
.c
om
/e

[S1-GigabitEthernet0/0/2]port link-type trunk


[S1-GigabitEthernet0/0/2]port trunk allow-pass vlan all
[S1-GigabitEthernet0/0/2]port trunk pvid vlan 4
[S1-GigabitEthernet0/0/2]quit
[S2]interface GigabitEthernet 0/0/2
[S2-GigabitEthernet0/0/2]port link-type trunk
[S2-GigabitEthernet0/0/2]port trunk allow-pass vlan all

hu

[S2-GigabitEthernet0/0/2]port trunk pvid vlan 6

g.

[S2-GigabitEthernet0/0/2]quit

rn

in

Step 4 Configure OSPF to enable internetwork communication

/l

ea

Configure OSPF for R1, R2, and R3. Ensure that all are part of the same
OSPF area and advertise the networks that have been created.
[R1]ospf

:/

[R1-ospf-1]area 0

tp

[R1-ospf-1-area-0.0.0.0]network 10.0.13.0 0.0.0.255

ht

[R2]ospf
[R2-ospf-1]area 0

s:

[R2-ospf-1-area-0.0.0.0]network 10.0.13.0 0.0.0.255


[R2-ospf-1-area-0.0.0.0]network 10.0.4.0 0.0.0.255

[R3-ospf-1]area 0

so

[R3]ospf

ur

ce

[R2-ospf-1-area-0.0.0.0]network 10.0.6.0 0.0.0.255

Re

[R3-ospf-1-area-0.0.0.0]network 10.0.13.0 0.0.0.255

ng

Configure a static route on S1 and S2, the nexthop as the private networks
gateway.

ni

[S1]ip route-static 0.0.0.0 0.0.0.0 10.0.4.2

Le

ar

[S2]ip route-static 0.0.0.0 0.0.0.0 10.0.6.2

Mo

re

Verify that a path exists from R1 and R3 to S1 and S2.

Page106

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


<R1>ping 10.0.4.254

PING 10.0.4.254: 56 data bytes, press CTRL_C to break

aw
ei
.c
om
/e

Reply from 10.0.4.254: bytes=56 Sequence=1 ttl=253 time=2 ms


Reply from 10.0.4.254: bytes=56 Sequence=2 ttl=253 time=10 ms
Reply from 10.0.4.254: bytes=56 Sequence=3 ttl=253 time=1 ms

Reply from 10.0.4.254: bytes=56 Sequence=4 ttl=253 time=2 ms


Reply from 10.0.4.254: bytes=56 Sequence=5 ttl=253 time=2 ms
--- 10.0.4.254 ping statistics --5 packet(s) transmitted

hu

5 packet(s) received
0.00% packet loss

in

g.

round-trip min/avg/max = 1/3/10 ms


<R1>ping 10.0.6.254

rn

PING 10.0.6.254: 56 data bytes, press CTRL_C to break

ea

Reply from 10.0.6.254: bytes=56 Sequence=1 ttl=253 time=10 ms


Reply from 10.0.6.254: bytes=56 Sequence=2 ttl=253 time=2 ms

/l

Reply from 10.0.6.254: bytes=56 Sequence=3 ttl=253 time=2 ms

:/

Reply from 10.0.6.254: bytes=56 Sequence=4 ttl=253 time=10 ms

tp

Reply from 10.0.6.254: bytes=56 Sequence=5 ttl=253 time=2 ms


--- 10.0.6.254 ping statistics ---

ht

5 packet(s) transmitted
5 packet(s) received

s:

0.00% packet loss

ce

round-trip min/avg/max = 2/5/10 ms

ur

<R3>ping 10.0.4.254

PING 10.0.4.254: 56 data bytes, press CTRL_C to break

so

Reply from 10.0.4.254: bytes=56 Sequence=1 ttl=253 time=10 ms

Re

Reply from 10.0.4.254: bytes=56 Sequence=2 ttl=253 time=2 ms


Reply from 10.0.4.254: bytes=56 Sequence=3 ttl=253 time=2 ms
Reply from 10.0.4.254: bytes=56 Sequence=4 ttl=253 time=10 ms

ni

ng

Reply from 10.0.4.254: bytes=56 Sequence=5 ttl=253 time=2 ms


--- 10.0.4.254 ping statistics ---

ar

5 packet(s) transmitted

Le

5 packet(s) received
0.00% packet loss

Mo

re

round-trip min/avg/max = 2/5/10 ms

HC Series

HUAWEI TECHNOLOGIES

Page107

HCNA-HNTD Module 3 Implementing IP Security


<R3>ping 10.0.6.254

aw
ei
.c
om
/e

Reply from 10.0.6.254: bytes=56 Sequence=1 ttl=253 time=10 ms


Reply from 10.0.6.254: bytes=56 Sequence=2 ttl=253 time=2 ms
Reply from 10.0.6.254: bytes=56 Sequence=3 ttl=253 time=2 ms

Reply from 10.0.6.254: bytes=56 Sequence=4 ttl=253 time=10 ms


Reply from 10.0.6.254: bytes=56 Sequence=5 ttl=253 time=2 ms
--- 10.0.6.254 ping statistics --5 packet(s) transmitted

hu

5 packet(s) received
0.00% packet loss

in

g.

round-trip min/avg/max = 2/5/10 ms

rn

Step 5 Configure Filters using Access Control Lists

ea

Configure S1 as a telnet server.

/l

[S1]user-interface vty 0 4
[S1-ui-vty0-4]authentication-mode password

tp

:/

[S1-ui-vty0-4]set authentication password cipher huawei

Configure S2 as an FTP server.

ht

[S2]ftp server enable


[S2]aaa

s:

[S2-aaa]local-user huawei password cipher huawei


[S2-aaa]local-user huawei service-type ftp

ur

ce

[S2-aaa]local-user huawei ftp-directory flash:

so

Configure an access control list on R2 to allow R1 to access the telnet server,


and R3 to access the FTP server.
[R2]acl 3000

Re

[R2-acl-adv-3000]rule 5 permit tcp source 10.0.13.1 0.0.0.0 destination


10.0.4.254 0.0.0.0 destination-port eq 23

ng

[R2-acl-adv-3000]rule 10 permit tcp source 10.0.13.3 0.0.0.0 destination


10.0.6.254 0.0.0.0 destination-port range 20 21

ni

[R2-acl-adv-3000]rule 15 deny ip source any

ar

[R2-acl-adv-3000]quit

Le

Apply the ACL to the Gigabit Ethernet 0/0/0 interface of R2.


[R2]interface GigabitEthernet0/0/0

Mo

re

[R2-GigabitEthernet0/0/0]traffic-filter inbound acl 3000

Page108

PING 10.0.6.254: 56 data bytes, press CTRL_C to break

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

Verify the results of the access control list on the network.

aw
ei
.c
om
/e

<R1>telnet 10.0.4.254
Press CTRL_] to quit telnet mode
Trying 10.0.4.254 ...
Connected to 10.0.4.254 ...
Login authentication

hu

Password:
Info: The max number of VTY users is 5, and the number

g.

of current VTY users on line is 1.

in

<S1>

ea

rn

Note: use the quit command to exit the telnet session


<R1>ftp 10.0.6.254

/l

Trying 10.0.6.254 ...

:/

Press CTRL+K to abort

tp

Error: Failed to connect to the remote host.

ht

Note: The FTP connection may take a while to respond (approx 60 seconds).
<R3>telnet 10.0.4.254

s:

Press CTRL_] to quit telnet mode


Trying 10.0.4.254 ...

<R3>ftp 10.0.6.254

so

Trying 10.0.6.254 ...

ur

ce

Error: Can't connect to the remote host

Re

Press CTRL+K to abort

Connected to 10.0.6.254.
220 FTP service ready.

ng

User(10.0.6.254:(none)):huawei

ni

331 Password required for huawei.


Enter password:

ar

230 User logged in.

Le

[R3-ftp]

Mo

re

Note: The bye command can be used to close the FTP connection

HC Series

HUAWEI TECHNOLOGIES

Page109

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Additional Exercises: Analyzing and Verifying


FTP requires two ports to be defined in the access control list, why is this?

Should basic ACL and advanced ACL be deployed near the source network or
target network, and why?

Final Configuration

hu

<R1>display current-configuration
[V200R003C00SPC200]

g.

in

sysname R1
#

rn

aaa

ea

authentication-scheme default
authorization-scheme default

/l

accounting-scheme default
domain default

:/

domain default_admin
local-user admin service-type http

tp

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$

ht

local-user huawei password cipher %$%$B:%I)Io0H8)[%SB[idM3C/!#%$%$


local-user huawei service-type ppp

s:

interface GigabitEthernet0/0/0

ce

ip address 10.0.13.1 255.255.255.0

ur

ospf 1 router-id 10.0.1.1

so

area 0.0.0.0

Re

network 10.0.13.0 0.0.0.255


#

user-interface con 0

ng

authentication-mode password

ni

set authentication password


cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$

ar

user-interface vty 0 4

Le

Mo

re

return

Page110

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


<R2>display current-configuration

[V200R003C00SPC200]

aw
ei
.c
om
/e

#
sysname R2
#
acl number 3000

rule 5 permit tcp source 10.0.13.1 0 destination 10.0.4.254 0 destination-port


eq telnet

rule 10 permit tcp source 10.0.13.3 0 destination 10.0.6.254 0 destination-port


range ftp-data ftp

hu

rule 15 deny ip
#

g.

interface GigabitEthernet0/0/0

in

ip address 10.0.13.2 255.255.255.0


traffic-filter inbound acl 3000

rn

ea

interface GigabitEthernet0/0/1
ip address 10.0.4.2 255.255.255.0

/l

#
ip address 10.0.6.2 255.255.255.0

tp

:/

interface GigabitEthernet0/0/2

ospf 1 router-id 10.0.2.2

ht

area 0.0.0.0
network 10.0.4.0 0.0.0.255

s:

network 10.0.6.0 0.0.0.255

network 10.0.13.0 0.0.0.255

ce

ur

user-interface con 0

authentication-mode password

so

set authentication password

Re

cipher %$%$|nRPL^hr2IXi7LHDID!/,.*%.8%h;3:,hXO2dk#ikaWI.*(,%$%$
user-interface vty 0 4
#

ni

ng

return

ar

<R3>display current-configuration

Le

[V200R003C00SPC200]
#

sysname R3

re

Mo

interface GigabitEthernet0/0/0

HC Series

HUAWEI TECHNOLOGIES

Page111

HCNA-HNTD Module 3 Implementing IP Security


ip address 10.0.13.3 255.255.255.0

aw
ei
.c
om
/e

ospf 1 router-id 10.0.3.3


area 0.0.0.0
network 10.0.13.0 0.0.0.255
#
user-interface con 0
authentication-mode password
set authentication password

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$

hu

user-interface vty 0 4
#

in

g.

return

rn

<S1>display current-configuration

ea

#
!Software Version V100R006C00SPC800

/l

sysname S1

:/

#
vlan batch 4

tp

#
interface Vlanif4

ht

ip address 10.0.4.254 255.255.255.0


#

s:

interface GigabitEthernet0/0/2
port trunk pvid vlan 4

ce

port link-type trunk

ur

port trunk allow-pass vlan 2 to 4094


#

so

ip route-static 0.0.0.0 0.0.0.0 10.0.4.2

Re

user-interface con 0

user-interface vty 0 4

ng

set authentication password cipher N`C55QK<`=/Q=^Q`MAF4<1!!

Mo

re

Le

ar

return

ni

Page112

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


<S2>dis current-configuration

aw
ei
.c
om
/e

!Software Version V100R006C00SPC800


sysname S2
#
FTP server enable
#
vlan batch 6
#
aaa

hu

authentication-scheme default
authorization-scheme default

g.

accounting-scheme default

in

domain default
domain default_admin

rn

local-user admin password simple admin

ea

local-user admin service-type http


local-user huawei ftp-directory flash:

:/

local-user huawei service-type ftp

/l

local-user huawei password cipher N`C55QK<`=/Q=^Q`MAF4<1!!

tp

interface Vlanif6

ip address 10.0.6.254 255.255.255.0

ht

#
interface GigabitEthernet0/0/2

s:

port link-type trunk


port trunk pvid vlan 6

ce

port trunk allow-pass vlan 2 to 4094

ur

ip route-static 0.0.0.0 0.0.0.0 10.0.6.2

so

Re

user-interface con 0

user-interface vty 0 4
#

Mo

re

Le

ar

ni

ng

return

HC Series

HUAWEI TECHNOLOGIES

Page113

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Lab 3-2 Network Address Translation


Learning Objectives

As a result of this lab section, you should achieve the following tasks:

Translation of addresses between networks (NAT).


Configuration of Easy IP.

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g.

hu

Topology

ng

Scenario

Re

so

Figure 3.2 Network Address Translation Topology

Mo

re

Le

ar

ni

In order to conserve addressing the offices of the enterprise network have


implemented private addressing internally. Users however require a means to
be routed between these private networks and the public network domain. R1
and R3 represent edge routers of the enterprise branch offices ,the branch
network need access to the public network. The administrator of the network is
requested to configure dynamic NAT solutions on the in order to allow R1 to
perform address translation. An easyIP NAT solution is to be applied to R3.

Page114

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
[Huawei]sysname R1

hu

[R1]inter GigabitEthernet0/0/1

g.

[R1-GigabitEthernet0/0/1]ip address 10.0.4.1 24


[Huawei]sysname R3

in

[R3]interface GigabitEthernet0/0/2

rn

[R3-GigabitEthernet0/0/2]ip address 10.0.6.3 24

ea

[Huawei]sysname S1

/l

[S1]vlan 4
[S1]interface vlanif 4

tp

[S1-Vlanif4]ip address 10.0.4.254 24

:/

[S1-vlan3]quit

ht

[S1-Vlanif4]quit
[Huawei]sysname S2

s:

[S2]vlan 6
[S2]interface vlanif 6

ce

[S2-vlan6]quit

so

[S2-Vlanif6]quit

ur

[S2-Vlanif6]ip address 10.0.6.254 24

Re

Step 2 Clean up the previous configuration

ni

ng

Re-establish the connection to S1 and S2 via Gigabit Ethernet 0/0/1 on R1 and


Gigabit Ethernet 0/0/2 on R3. Remove OSPF from all routers.

ar

[R1]interface GigabitEthernet 0/0/0


[R1-GigabitEthernet0/0/0]undo ip address

Le

[R1]interface GigabitEthernet 0/0/1


[R1-GigabitEthernet0/0/1]undo shutdown

re

[R1]undo ospf 1

Mo

Warning: The OSPF process will be deleted. Continue? [Y/N]:y

HC Series

HUAWEI TECHNOLOGIES

Page115

HCNA-HNTD Module 3 Implementing IP Security


[R2]undo ospf 1

[R3-GigabitEthernet0/0/0]undo ip address
[R3]interface GigabitEthernet 0/0/2
[R3-GigabitEthernet0/0/2]undo shutdown
[R3]undo ospf 1
Warning: The OSPF process will be deleted. Continue? [Y/N]:y

hu

Remove the static routes pointing to R2 on S1 and S2.

aw
ei
.c
om
/e

Warning: The OSPF process will be deleted. Continue? [Y/N]:y

g.

[S1]undo ip route-static 0.0.0.0 0.0.0.0

rn

in

[S2]undo ip route-static 0.0.0.0 0.0.0.0

ea

Step 3 Implement VLAN configuration for S1 and S2

/l

[S1]interface GigabitEthernet 0/0/1

[S1-GigabitEthernet0/0/1]port link-type trunk

:/

[S1-GigabitEthernet0/0/1]port trunk pvid vlan 4

tp

[S1-GigabitEthernet0/0/1]port trunk allow-pass vlan all

ht

[S1-GigabitEthernet0/0/1]quit
[S2]interface GigabitEthernet 0/0/3

s:

[S2-GigabitEthernet0/0/3]port link-type trunk


[S2-GigabitEthernet0/0/3]port trunk pvid vlan 6

ur

ce

[S2-GigabitEthernet0/0/3]port trunk allow-pass vlan all


[R1]interface GigabitEthernet0/0/0

Re

so

[R1-GigabitEthernet0/0/0]ip address 119.84.111.1 24


[R3]interface GigabitEthernet0/0/0

Mo

re

Le

ar

ni

ng

[R3-GigabitEthernet0/0/0]ip address 119.84.111.3 24

Page116

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

Verify that R1 is able to reach both S1 and R3.

<R1>ping 10.0.4.254

aw
ei
.c
om
/e

PING 10.0.4.254: 56 data bytes, press CTRL_C to break


Reply from 10.0.4.254: bytes=56 Sequence=1 ttl=255 time=23 ms
Reply from 10.0.4.254: bytes=56 Sequence=2 ttl=254 time=1 ms
Reply from 10.0.4.254: bytes=56 Sequence=3 ttl=254 time=1 ms

Reply from 10.0.4.254: bytes=56 Sequence=4 ttl=254 time=10 ms


Reply from 10.0.4.254: bytes=56 Sequence=5 ttl=254 time=1 ms
--- 10.0.4.254 ping statistics ---

hu

5 packet(s) transmitted
5 packet(s) received

g.

0.00% packet loss

in

round-trip min/avg/max = 1/7/23 ms

rn

<R1>ping 119.84.111.3

ea

PING 119.84.111.3: 56 data bytes, press CTRL_C to break


Reply from 119.84.111.3: bytes=56 Sequence=1 ttl=255 time=1 ms

/l

Reply from 119.84.111.3: bytes=56 Sequence=2 ttl=255 time=10 ms

:/

Reply from 119.84.111.3: bytes=56 Sequence=3 ttl=255 time=1 ms


Reply from 119.84.111.3: bytes=56 Sequence=4 ttl=255 time=1 ms

tp

Reply from 119.84.111.3: bytes=56 Sequence=5 ttl=255 time=10 ms

ht

--- 119.84.111.3 ping statistics --5 packet(s) transmitted

s:

5 packet(s) received
0.00% packet loss

ur

ce

round-trip min/avg/max = 1/4/10 ms

so

Step 4 Configure Access Control Lists for R1 and R3

Re

Configure an advanced ACL on R1 and select the data flow with the source of
S1, the destination of R3, and destined for the telnet service port.

ng

[R1]acl 3000
[R1-acl-adv-3000]rule 5 permit tcp source 10.0.4.254 0.0.0.0 destination

ni

119.84.111.3 0.0.0.0 destination-port eq 23

ar

[R1-acl-adv-3000]rule 10 permit ip source 10.0.4.0 0.0.0.255 destination any

Le

[R1-acl-adv-3000]rule 15 deny ip

Mo

re

Configure a basic ACL on R3 and select the data flow whose source IP
address is 10.0.6.0/24.
[R3]acl 2000
[R3-acl-basic-2000]rule permit source 10.0.6.0 0.0.0.255

HC Series

HUAWEI TECHNOLOGIES

Page117

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Configure static route on S1 and S2,the nexthop as the private networks


gateway.
[S1]ip route-static 0.0.0.0 0.0.0.0 10.0.4.1
[S2]ip route-static 0.0.0.0 0.0.0.0 10.0.6.3

Configure dynamic NAT on the GigabitEthernet0/0/0 interface of R1.


[R1]nat address-group 1 119.84.111.240 119.84.111.243
[R1]interface GigabitEthernet 0/0/0

g.

hu

[R1-GigabitEthernet0/0/0]nat outbound 3000 address-group 1

Configure R3 as the telnet server.

in

[R3]user-interface vty 0 4

rn

[R3-ui-vty0-4]authentication-mode password

[R3-ui-vty0-4]set authentication password cipher huawei

/l

ea

[R3-ui-vty0-4]quit

Verify the address group has been configured correctly

:/

<R1>display nat address-group


NAT Address-Group Information:

tp

-------------------------------------Start-address

End-address

ht

Index

-------------------------------------1

119.84.111.240

119.84.111.243

s:

--------------------------------------

ce

Total : 1

so

ur

Test connectivity to the gateway of the remote peer from the internal network.
<S1>ping 119.84.111.3

PING 119.84.111.3: 56 data bytes, press CTRL_C to break

Re

Request time out

Reply from 119.84.111.3: bytes=56 Sequence=2 ttl=254 time=1 ms

ng

Reply from 119.84.111.3: bytes=56 Sequence=3 ttl=254 time=1 ms


Reply from 119.84.111.3: bytes=56 Sequence=4 ttl=254 time=1 ms

ar

ni

Reply from 119.84.111.3: bytes=56 Sequence=5 ttl=254 time=1 ms


--- 119.84.111.3 ping statistics ---

Le

5 packet(s) transmitted
4 packet(s) received

Mo

re

20.00% packet loss


round-trip min/avg/max = 1/1/1 ms

Page118

HUAWEI TECHNOLOGIES

Step 5 Configure Dynamic NAT

HC Series

HCNA-HNTD Module 3 Implementing IP Security

Establish a telnet connection to the public address of the remote peer.

<S1>telnet 119.84.111.3

aw
ei
.c
om
/e

Trying 119.84.111.3 ...


Press CTRL+K to abort
Connected to 119.84.111.3 ...
Login authentication
Password:
<R3>

g.

hu

Do not exit the telnet session, instead open a second session window to R1
and view the results of the ACL and NAT session translation.

in

<R1>display acl 3000


Advanced ACL 3000, 2 rules

rn

Acl's step is 5

ea

rule 5 permit tcp source 10.0.4.254 0 destination 119.84.111.3 0 destination-port


eq telnet (1 matches)

/l

rule 10 permit ip source 10.0.4.0 0.0.0.255 (1 matches)

:/

rule 15 deny ip

tp

<R1>display nat session all

ht

NAT Session Table Information:


Protocol
Vpn

: 10.0.4.254

s:

SrcAddr

: ICMP(1)

: 119.84.111.3

Type Code IcmpId

: 8

ce

DestAddr Vpn

Protocol

Re

New IcmpId

: 119.84.111.242

so

New SrcAddr
New DestAddr

44003

ur

NAT-Info

: ---: 10247
: TCP(6)
: 10.0.4.254

49646

DestAddr Port Vpn

: 119.84.111.3

23

ni

ng

SrcAddr Port Vpn


NAT-Info

: 119.84.111.242

New SrcPort

: 10249

Le

ar

New SrcAddr

: ----

New DestPort

: ----

re

New DestAddr

Mo

Total : 2

HC Series

HUAWEI TECHNOLOGIES

Page119

aw
ei
.c
om
/e

The ICMP session has a lifetime of only 20 seconds and therefore may not
appear to be present when displaying the NAT session results. The following
command can be used in this case to extend the period over which the ICMP
results are maintained:
[R1]firewall-nat session icmp aging-time 300

hu

Configure easyIP on the Gigabit Ethernet 0/0/0 interface of R3, associating the
easyIP configuration with ACL 2000 that had been configured earlier.

g.

[R3-GigabitEthernet0/0/0]nat outbound 2000

in

Test the connectivity from S2 to R1 via R3.


<S2>ping 119.84.111.1

rn

PING 119.84.111.1: 56 data bytes, press CTRL_C to break

ea

Reply from 119.84.111.1: bytes=56 Sequence=1 ttl=254 time=1 ms


Reply from 119.84.111.1: bytes=56 Sequence=2 ttl=254 time=1 ms

/l

Reply from 119.84.111.1: bytes=56 Sequence=3 ttl=254 time=1 ms

:/

Reply from 119.84.111.1: bytes=56 Sequence=4 ttl=254 time=1 ms

tp

Reply from 119.84.111.1: bytes=56 Sequence=5 ttl=254 time=1 ms


--- 119.84.111.1 ping statistics ---

ht

5 packet(s) transmitted
5 packet(s) received

s:

0.00% packet loss

ce

round-trip min/avg/max = 1/1/1 ms

ur

<R3>display acl 2000

so

Basic ACL 2000, 1 rule


Acl's step is 5

Re

rule 5 permit source 10.0.6.0 0.0.0.255 (1 matches)


<R3>display nat outbound acl 2000

ng

NAT Outbound Information:

ni

--------------------------------------------------------------------Interface

Acl

Address-group/IP/Interface

Type

ar

--------------------------------------------------------------------2000

119.84.111.3

easyip

Le

GigabitEthernet0/0/0

---------------------------------------------------------------------

Mo

re

Total : 1

Page120

HCNA-HNTD Module 3 Implementing IP Security

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Final Configuration
<R1>display current-configuration
[V200R003C00SPC200]
#
sysname R1
#
firewall-nat session icmp aging-time 300
#

hu

acl number 3000

rule 5 permit tcp source 10.0.4.254 0 destination 119.84.111.3 0 destination-port

g.

eq telnet

in

rule 10 permit ip source 10.0.4.0 0.0.0.255


rule 15 deny ip

rn

nat address-group 1 119.84.111.240 119.84.111.243

ea

/l

interface GigabitEthernet0/0/0

interface GigabitEthernet0/0/1

ht

ip address 10.0.4.1 255.255.255.0

tp

nat outbound 3000 address-group 1


#

:/

ip address 119.84.111.1 255.255.255.0

s:

user-interface con 0
authentication-mode password

ce

set authentication password

ur

cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$
user-interface vty 0 4

so

Re

return

ng

<R3>display current-configuration
#

ni

[V200R003C00SPC200]

ar

sysname R3

Le

acl number 2000


rule 5 permit source 10.0.6.0 0.0.0.255

re

Mo

interface GigabitEthernet0/0/0

HC Series

HUAWEI TECHNOLOGIES

Page121

HCNA-HNTD Module 3 Implementing IP Security


ip address 119.84.111.3 255.255.255.0

nat outbound 2000

aw
ei
.c
om
/e

#
interface GigabitEthernet0/0/2
ip address 10.0.6.3 255.255.255.0
#
user-interface con 0
authentication-mode password
set authentication password

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$

hu

user-interface vty 0 4
authentication-mode password

g.

set authentication password

in

cipher %$%$7ml|,!ccE$SQ~CZ{GtaE%hO>v}~bVk18p5qq<:UPtI:9hOA%%$%$
#

ea

rn

return

/l

<S1>display current-configuration

:/

#
!Software Version V100R006C00SPC800

tp

sysname S1
#

ht

vlan batch 4
#

s:

interface Vlanif4

ip address 10.0.4.254 255.255.255.0

ce

#
port link-type trunk

ur

interface GigabitEthernet0/0/1

so

port trunk pvid vlan 4

Re

port trunk allow-pass vlan 2 to 4094


#

interface GigabitEthernet0/0/2

ng

port link-type trunk

ni

port trunk pvid vlan 4


port trunk allow-pass vlan 2 to 4094

ar

Le

interface GigabitEthernet0/0/14
shutdown

re

ip route-static 0.0.0.0 0.0.0.0 10.0.4.1

Mo

Page122

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


user-interface con 0

user-interface vty 0 4

aw
ei
.c
om
/e

set authentication password cipher N`C55QK<`=/Q=^Q`MAF4<1!!


#
return

<S2>display current-configuration
#
!Software Version V100R006C00SPC800

hu

sysname S2
#

g.

vlan batch 6

in

#
interface Vlanif6

rn

ip address 10.0.6.254 255.255.255.0

ea

#
interface GigabitEthernet0/0/2

/l

port link-type trunk


port trunk allow-pass vlan 2 to 4094

tp

:/

port trunk pvid vlan 6

interface GigabitEthernet0/0/3

ht

port link-type trunk


port trunk pvid vlan 6

s:

port trunk allow-pass vlan 2 to 4094


#

ce

interface GigabitEthernet0/0/23

ur

shutdown
#

so

ip route-static 0.0.0.0 0.0.0.0 10.0.6.3

Re

user-interface con 0

user-interface vty 0 4

ng

Mo

re

Le

ar

ni

return

HC Series

HUAWEI TECHNOLOGIES

Page123

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Lab 3-3 Establishing Local AAA solutions


Learning Objectives

As a result of this lab section, you should achieve the following tasks:

Configuration of local AAA for which authentication and authorization


schemes are to be used.
Establishment of a domain named huawei
Implementation of privilege levels for authenticated users.

g.

hu

tp

:/

/l

ea

rn

in

Topology

ht

Figure 3-3 AAA configuration

s:

Scenario

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

R1 and R3 have been deployed on the network and are to provide remote
authentication services using AAA. The company requires that both routers
are made part of the huawei domain and that the telnet service is made
available to users, with limited privileges given once authenticated.

Page124

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
[Huawei]sysname R1

hu

[R1]interface GigabitEthernet0/0/0

g.

[R1-GigabitEthernet0/0/0]ip address 119.84.111.1 24

[R3]inter GigabitEthernet0/0/0

ea

rn

[R3-GigabitEthernet0/0/0]ip address 119.84.111.3 24

in

[Huawei]sysname R3

:/

/l

Step 2 Clean up the previous configuration

ht

[R1]interface GigabitEthernet 0/0/0

tp

Remove the previous NAT and ACL configuration from R1 and R3.

[R1-GigabitEthernet0/0/0]undo nat outbound 3000 address-group 1


[R1-GigabitEthernet0/0/0]quit

s:

[R1]undo nat address-group 1

ce

[R1]undo acl 3000

ur

[R3]interface GigabitEthernet 0/0/0

so

[R3-GigabitEthernet0/0/0]undo nat outbound 2000


[R3-GigabitEthernet0/0/0]quit

Re

[R3]undo acl 2000

ng

Step 3 Verify connectivity between R1 and R3

ni

<R1>ping 119.84.111.3
PING 119.84.111.3: 56 data bytes, press CTRL_C to break

ar

Reply from 119.84.111.3: bytes=56 Sequence=1 ttl=255 time=70 ms


Reply from 119.84.111.3: bytes=56 Sequence=2 ttl=255 time=20 ms

Le

Reply from 119.84.111.3: bytes=56 Sequence=3 ttl=255 time=10 ms


Reply from 119.84.111.3: bytes=56 Sequence=5 ttl=255 time=10 ms

Mo

re

Reply from 119.84.111.3: bytes=56 Sequence=4 ttl=255 time=20 ms

HC Series

HUAWEI TECHNOLOGIES

Page125

HCNA-HNTD Module 3 Implementing IP Security


--- 119.84.111.3 ping statistics ---

5 packet(s) transmitted

aw
ei
.c
om
/e

5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 10/26/70 ms

Step 4 Perform AAA configuration on R1

hu

Configure an authentication-scheme and authorization-scheme on R1. The


configuration for R3 can be found at step 5.

g.

[R1]aaa

in

[R1-aaa]authentication-scheme auth1
[R1-aaa-authen-auth1]authentication-mode local
[R1-aaa-authen-auth1]quit

ea

[R1-aaa]authorization-scheme auth2

rn

Info: Create a new authentication scheme.

/l

Info: Create a new authorization scheme.


[R1-aaa-author-auth2]authorization-mode local

tp

:/

[R1-aaa-author-auth2]quit

ht

Configure the domain huawei on R1, then create a user and apply the user to
this domain.

s:

[R1-aaa]domain huawei
[R1-aaa-domain-huawei]authentication-scheme auth1

ce

[R1-aaa-domain-huawei]authorization-scheme auth2

ur

[R1-aaa-domain-huawei]quit

[R1-aaa]local-user user1@huawei password cipher huawei

so

[R1-aaa]local-user user1@huawei service-type telnet

Re

[R1-aaa]local-user user1@huawei privilege level 0

ng

Configure R1 as the telnet server, using AAA authentication mode.


[R1]user-interface vty 0 4

Mo

re

Le

ar

ni

[R1-ui-vty0-4]authentication-mode aaa

Page126

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

Verify whether the telnet service on R1 has been established successfully.

aw
ei
.c
om
/e

<R3>telnet 119.84.111.1
Press CTRL_] to quit telnet mode
Trying 119.84.111.1 ...
Connected to 119.84.111.1 ...
Login authentication
Username:user1@huawei

hu

Password:
<R1>system-view

g.

in

Error: Unrecognized command found at '^' position.

rn

<R1>quit

/l

ea

Operations are restricted as user privileges are limited to privilege level 0 for
user1@huawei.

[R3]aaa

ht

[R3-aaa]authentication-scheme auth1

tp

:/

Step 5 Perform AAA configuration on R3

Info: Create a new authentication scheme.


[R3-aaa-authen-auth1]quit

s:

[R3-aaa-authen-auth1]authentication-mode local

ce

[R3-aaa]authorization-scheme auth2

ur

Info: Create a new authorization scheme.


[R3-aaa-author-auth2]authorization-mode local

Re

so

[R3-aaa-author-auth2]quit

ng

Configure the domain huawei on R3, then create a user and apply the user to
this domain.
[R3-aaa]domain huawei

ni

[R3-aaa-domain-huawei]authentication-scheme auth1

ar

[R3-aaa-domain-huawei]authorization-scheme auth2
[R3-aaa-domain-huawei]quit

Le

[R3-aaa]local-user user3@huawei password cipher huawei


[R3-aaa]local-user user3@huawei service-type telnet

Mo

re

[R3-aaa]local-user user3@huawei privilege level 0

HC Series

HUAWEI TECHNOLOGIES

Page127

HCNA-HNTD Module 3 Implementing IP Security

Configure the telnet service on R3 to use AAA authentication mode.

[R3-ui-vty0-4]authentication-mode aaa

Verify the results of implementing AAA on the vty interface.


.
<R1>telnet 119.84.111.3
Press CTRL_] to quit telnet mode
Trying 119.84.111.1 ...

hu

Connected to 119.84.111.1 ...

aw
ei
.c
om
/e

[R3]user-interface vty 0 4

in

g.

Login authentication
Username:user3@huawei

rn

Password:

ea

<R3>system-view
^

/l

Error: Unrecognized command found at '^' position.

:/

<R3>

ht

tp

Operations are restricted as user privileges are set to privilege level 0 for
user3@huawei.

s:

Step 6 Observe the results of the AAA configuration

ur

ce

<R1>display domain name huawei


Domain-name

so

Domain-state

: huawei
: Active
: auth1

Accounting-scheme-name

: default

Re

Authentication-scheme-name

Authorization-scheme-name : auth2
: -

RADIUS-server-template

: -

HWTACACS-server-template

: -

User-group

: -

Mo

re

Le

ar

ni

ng

Service-scheme-name

Page128

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


<R1>display local-user username user1@huawei
: ****************

State

: active

Service-type-mask

: T

Privilege level

: 0

Ftp-directory

: -

Access-limit

: -

Accessed-num

: 0

Idle-timeout

: -

User-group

: -

hu

aw
ei
.c
om
/e

Password

The contents of local user(s):

: Active

Authentication-scheme-name

: auth1

Accounting-scheme-name

: default

Authorization-scheme-name

: auth2

Service-scheme-name

: -

RADIUS-server-template

: -

HWTACACS-server-template

: -

User-group

: -

rn

Domain-state

ea

: huawei

ht

tp

:/

/l

Domain-name

in

g.

<R3>display domain name huawei

<R3>display local-user username user3@huawei

s:

The contents of local user(s):

: ****************

State

: active

Service-type-mask

: T

so

: 0
: : -

Mo

re

Le

ar

ni

ng

User-group

: -

Re

Idle-timeout

: 0

: -

Access-limit
Accessed-num

ur

Privilege level
Ftp-directory

ce

Password

HC Series

HUAWEI TECHNOLOGIES

Page129

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Final Configuration
<R1>display current-configuration
[V200R003C00SPC200]
#
sysname R1
#
aaa
authentication-scheme default

hu

authentication-scheme auth1
authorization-scheme default

g.

authorization-scheme auth2

in

accounting-scheme default
domain default

rn

domain default_admin
domain huawei

ea

authentication-scheme auth1

/l

authorization-scheme auth2

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$

:/

local-user admin service-type http


local-user huawei service-type ppp

tp

local-user huawei password cipher %$%$B:%I)Io0H8)[%SB[idM3C/!#%$%$

ht

local-user user1@huawei password cipher %$%$^L*5IP'0^A!;R)R*L=LFcXgv%$%$


local-user user1@huawei privilege level 0

s:

local-user user1@huawei service-type telnet


#

ce

interface GigabitEthernet0/0/0

ur

ip address 119.84.111.1 255.255.255.0


nat outbound 3000 address-group 1 //may remain from previous labs

so

Re

user-interface con 0

authentication-mode password
set authentication password

ng

cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$

ni

user-interface vty 0 4
authentication-mode aaa

ar

Mo

re

Le

return

Page130

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


<R3>dis current-configuration

[V200R003C00SPC200]

aw
ei
.c
om
/e

#
sysname R3
#
aaa
authentication-scheme default
authentication-scheme auth1
authorization-scheme default
authorization-scheme auth2

hu

accounting-scheme default
domain default

g.

domain default_admin

in

domain huawei
authentication-scheme auth1

rn

authorization-scheme auth2

ea

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$


local-user admin service-type http

/l

local-user huawei password cipher %$%$fZsyUk1=O=>:L4'ytgR~D*Im%$%$

:/

local-user huawei service-type ppp

local-user user3@huawei password cipher %$%$WQt.;bEsR<8fz3LCiPY,che_%$%$

tp

local-user user3@huawei privilege level 0

local-user user3@huawei service-type telnet

ht

#
interface GigabitEthernet0/0/0

s:

ip address 119.84.111.3 255.255.255.0


nat outbound 2000 //may remain from previous labs

ce

ur

user-interface con 0

authentication-mode password

so

set authentication password

Re

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$
user-interface vty 0 4

authentication-mode aaa

ng

Mo

re

Le

ar

ni

return

HC Series

HUAWEI TECHNOLOGIES

Page131

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Lab 3-4 Securing Traffic with IPsec VPN


Learning Objectives

As a result of this lab section, you should achieve the following tasks:

hu

Configuration of an IPsec proposal using an esp transform set.


Configuration of an ACL used to determine interesting traffic.
Configuration of an IPsec policy
The binding of an IPsec policy to an interface.

g.

tp

:/

/l

ea

rn

in

Topology

ht

Figure 3.4 IPsec VPN topology

ce

s:

Scenario

Mo

re

Le

ar

ni

ng

Re

so

ur

In the interests of protecting both the integrity and confidentiality of company


data, it is required that the communication between the offices of the
enterprise secure specific private data as it is transmitted over the public
network infrastructure. As the network administrator of the company, the task
has been assigned to implement IPsec VPN solutions between the HQ edge
router (R1) and the branch office (R3). Currently only select departments
within the HQ require secured communication over the public network (R2).
The administrator should establish IPsec using tunnel mode between the two
offices for all traffic originating from the department.

Page132

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment.

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
<Huawei>system-view
[Huawei]sysname R1
[R1]interface Serial 1/0/0

hu

[R1-Serial1/0/0]ip address 10.0.12.1 24


[R1-Serial1/0/0]interface loopback 0

in

g.

[R1-LoopBack0]ip address 10.0.1.1 24


<Huawei>system-view

rn

[Huawei]sysname R2

ea

[R2]interface Serial 1/0/0


[R2-Serial1/0/0]interface serial 2/0/0
[R2-Serial2/0/0]interface loopback 0

tp

[R2-LoopBack0]ip address 10.0.2.2 24

:/

[R2-Serial2/0/0]ip address 10.0.23.2 24

/l

[R2-Serial1/0/0]ip address 10.0.12.2 24

ht

<Huawei>system-view
[R3]interface Serial 2/0/0

s:

[Huawei]sysname R3

[R3-Serial2/0/0]ip address 10.0.23.3 24

ce

[R3-Serial2/0/0]interface loopback 0

so

ur

[R3-LoopBack0]ip address 10.0.3.3 24

Re

Step 2 Clean up the previous configuration.

ng

Remove the addressing for the Gigabit Ethernet 0/0/0 interface on R1 & R3,
and disable the interfaces as shown to prevent alternative routes.
[R1]interface GigabitEthernet 0/0/0

ni

[R1-GigabitEthernet0/0/0]undo ip address

ar

[R1-GigabitEthernet0/0/0]quit
[R1]interface GigabitEthernet 0/0/1

Le

[R1-GigabitEthernet0/0/1]shutdown
[R1-GigabitEthernet0/0/1]quit

re

[R1]interface Serial 1/0/0

Mo

[R1-Serial1/0/0]undo shutdown

HC Series

HUAWEI TECHNOLOGIES

Page133

HCNA-HNTD Module 3 Implementing IP Security


[R2]interface Serial 1/0/0

[R2-Serial1/0/0]undo shutdown

aw
ei
.c
om
/e

[R2]interface Serial 2/0/0


[R2-Serial2/0/0]undo shutdown
[R3]interface GigabitEthernet 0/0/0
[R3-GigabitEthernet0/0/0]undo ip address
[R3]interface GigabitEthernet 0/0/2
[R3-GigabitEthernet0/0/2]shutdown
[R3]interface Serial 2/0/0

g.

hu

[R3-Serial2/0/0]undo shutdown

in

Step 3 Establish additional logical interfaces.

rn

[R1-LoopBack0]interface loopback 1

ea

[R1-LoopBack1]ip address 10.0.11.11 24

/l

[R3-LoopBack0]interface loopback 1

:/

[R3-LoopBack1]ip address 10.0.33.33 24

ht

tp

Step 4 Configure OSPF.

ce

s:

Use the IP address of Loopback 0 as the router ID, use the default OSPF
process (1), and specify the public network segments 10.0.12.0/24, and
10.0.23.0/24 as part of OSPF area 0.
[R1-ospf-1]area 0

ur

[R1]ospf router-id 10.0.1.1

so

[R1-ospf-1-area-0.0.0.0]network 10.0.12.0 0.0.0.255


[R1-ospf-1-area-0.0.0.0]network 10.0.1.0 0.0.0.255

Re

[R1-ospf-1-area-0.0.0.0]network 10.0.11.0 0.0.0.255

ng

[R2]ospf router-id 10.0.2.2


[R2-ospf-1]area 0

ni

[R2-ospf-1-area-0.0.0.0]network 10.0.2.0 0.0.0.255


[R2-ospf-1-area-0.0.0.0]network 10.0.12.0 0.0.0.255

Le

ar

[R2-ospf-1-area-0.0.0.0]network 10.0.23.0 0.0.0.255


[R3]ospf router-id 10.0.3.3

re

[R3-ospf-1]area 0

Mo

[R3-ospf-1-area-0.0.0.0]network 10.0.23.0 0.0.0.255

Page134

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


[R3-ospf-1-area-0.0.0.0]network 10.0.3.0 0.0.0.255

aw
ei
.c
om
/e

[R3-ospf-1-area-0.0.0.0]network 10.0.33.0 0.0.0.255

After OSPF route convergence is complete, view the configuration.


<R2>display ospf peer brief
OSPF Process 1 with Router ID 10.0.2.2
Peer Statistic Information

---------------------------------------------------------------------------Interface

Neighbor id

State

0.0.0.0

Serial1/0/0

10.0.1.1

Full

0.0.0.0

Serial2/0/0

10.0.3.3

hu

Area Id

Full

g.

----------------------------------------------------------------------------

in

<R1>display ip routing-table

rn

Route Flags: R - relay, D - download to fib

----------------------------------------------------------------------------

10.0.1.0/24

Direct

10.0.1.1/32

Direct

10.0.1.255/32

Direct

10.0.2.2/32

OSPF

10

781

10.0.3.3/32

OSPF

10

10.0.11.0/24

Direct

10.0.11.11/32

/l

Pre Cost

Flags NextHop

Interface

10.0.1.1

LoopBack0

127.0.0.1

LoopBack0

127.0.0.1

LoopBack0

10.0.12.2

Serial1/0/0

2343

10.0.12.2

Serial1/0/0

10.0.11.11

LoopBack1

Direct

127.0.0.1

LoopBack1

10.0.11.255/32 Direct

127.0.0.1

LoopBack1

10.0.12.0/24

Direct

10.0.12.1

Serial1/0/0

10.0.12.1/32

Direct

127.0.0.1

Serial1/0/0

Direct

10.0.12.2

Serial1/0/0

10.0.12.255/32 Direct

127.0.0.1

Serial1/0/0

10.0.23.0/24

OSPF

10

2343

10.0.12.2

Serial1/0/0

10.0.33.33/32

OSPF

10

2343

10.0.12.2

Serial1/0/0

127.0.0.0/8

Direct

127.0.0.1

InLoopBack0

127.0.0.1/32

Direct

127.0.0.1

InLoopBack0

127.255.255.255/32 Direct

127.0.0.1

InLoopBack0

255.255.255.255/32 Direct

127.0.0.1

InLoopBack0

Le

ar

ni

ng

ce

ur

Re

10.0.12.2/32

ht

s:

tp

Proto

so

Destination/Mask

Routes : 17

:/

Destinations : 17

ea

Routing Tables: Public

Mo

re

If the baudrate is maintained as 128000 from lab 6-1, the OSPF cost will be set
as shown, and thus may vary due to the the metric calculation used by OSPF.

HC Series

HUAWEI TECHNOLOGIES

Page135

HCNA-HNTD Module 3 Implementing IP Security


<R3>display ip routing-table

aw
ei
.c
om
/e

---------------------------------------------------------------------------Routing Tables: Public


Destinations : 17
Destination/Mask

Routes : 17

Proto

Pre Cost

10.0.1.1/32

OSPF

10

3124

10.0.23.2

Flags NextHop

Interface

Serial2/0/0

10.0.2.2/32

OSPF

10

1562

10.0.23.2

10.0.3.0/24

Direct

10.0.3.3

10.0.3.3/32

Direct

127.0.0.1

10.0.3.255/32

Direct

127.0.0.1

10.0.11.11/32

OSPF

10

3124

10.0.23.2

10.0.12.0/24

OSPF

10

3124

10.0.23.2

Serial2/0/0

10.0.23.0/24

Direct

10.0.23.3

Serial2/0/0

10.0.23.2/32

Direct

10.0.23.2

Serial2/0/0

10.0.23.3/32

Direct

10.0.23.255/32 Direct

10.0.33.0/24

Direct

10.0.33.33/32

Direct

10.0.33.255/32 Direct

127.0.0.0/8

Direct

127.0.0.1/32

Direct

127.255.255.255/32 Direct

255.255.255.255/32 Direct

hu

g.

in

rn

ea

LoopBack0
Serial2/0/0

Serial2/0/0

127.0.0.1

Serial2/0/0

/l

127.0.0.1
10.0.33.33

LoopBack1

127.0.0.1

LoopBack1

127.0.0.1

LoopBack1

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

tp
ht

LoopBack0

ce

s:

Serial2/0/0

LoopBack0

:/

ur

Step 5 Configure the ACL to define interesting traffic

Re

so

An advanced ACL is created to identify interesting traffic for which the IPsec
VPN will be applied. The advanced ACL is capable of filtering based on
specific parameters for selective traffic filtering.

ng

[R1]acl 3001
[R1-acl-adv-3001]rule 5 permit ip source 10.0.1.0 0.0.0.255 destination 10.0.3.0

ar

ni

0.0.0.255

[R3]acl 3001

Le

[R3-acl-adv-3001]rule 5 permit ip source 10.0.3.0 0.0.0.255 destination 10.0.1.0

Mo

re

0.0.0.255

Page136

HUAWEI TECHNOLOGIES

Route Flags: R - relay, D - download to fib

HC Series

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Step 6 Configure IPsec VPN Proposal


Create an IPsec proposal and enter the IPsec proposal view to specify the
security protocols to be used. Ensure both peers use the same protocols.
[R1]ipsec proposal tran1
[R1-ipsec-proposal-tran1]esp authentication-algorithm sha1
[R1-ipsec-proposal-tran1]esp encryption-algorithm 3des
[R3]ipsec proposal tran1

hu

[R3-ipsec-proposal-tran1]esp authentication-algorithm sha1

g.

[R3-ipsec-proposal-tran1]esp encryption-algorithm 3des

in

Run the display ipsec proposal command to verify the configuration.

ea

rn

[R1]display ipsec proposal

/l

Number of proposals: 1
tran1

Encapsulation mode :

Tunnel

Transform

esp-new

ESP protocol

Authentication SHA1-HMAC-96
3DES

IPSec proposal name :

tran1

Tunnel

so

Encapsulation mode :

ur

Number of proposals: 1

ce

[R3]display ipsec proposal

s:

ht

Encryption

tp

:/

IPSec proposal name :

:
:

esp-new
Authentication SHA1-HMAC-96

Encryption

3DES

ng

ESP protocol

Re

Transform

ar

ni

Step 7 IPsec Policy Creation

Le

Create an IPsec policy and define the parameters for establishing the SA.
[R1]ipsec policy P1 10 manual

re

[R1-ipsec-policy-manual-P1-10]security acl 3001

Mo

[R1-ipsec-policy-manual-P1-10]proposal tran1
[R1-ipsec-policy-manual-P1-10]tunnel remote 10.0.23.3

HC Series

HUAWEI TECHNOLOGIES

Page137

HCNA-HNTD Module 3 Implementing IP Security


[R1-ipsec-policy-manual-P1-10]tunnel local 10.0.12.1

[R1-ipsec-policy-manual-P1-10]sa spi outbound esp 54321

aw
ei
.c
om
/e

[R1-ipsec-policy-manual-P1-10]sa spi inbound esp 12345


[R1-ipsec-policy-manual-P1-10]sa string-key outbound esp simple huawei
[R1-ipsec-policy-manual-P1-10]sa string-key inbound esp simple huawei
[R3]ipsec policy P1 10 manual
[R3-ipsec-policy-manual-P1-10]security acl 3001
[R3-ipsec-policy-manual-P1-10]proposal tran1
[R3-ipsec-policy-manual-P1-10]tunnel local 10.0.23.3
[R3-ipsec-policy-manual-P1-10]sa spi inbound esp 54321

g.

[R3-ipsec-policy-manual-P1-10]sa spi outbound esp 12345

hu

[R3-ipsec-policy-manual-P1-10]tunnel remote 10.0.12.1

in

[R3-ipsec-policy-manual-P1-10]sa string-key outbound esp simple huawei

rn

[R3-ipsec-policy-manual-P1-10]sa string-key inbound esp simple huawei

ea

Run the display ipsec policy command to verify the configuration.

/l

<R1>display ipsec policy

:/

===========================================

tp

IPSec policy group: "P1"


Using interface:

ht

===========================================

Security data flow: 3001

s:

Sequence number: 10

ce

Tunnel local address: 10.0.12.1


Tunnel remote address: 10.0.23.3

ur

Qos pre-classify: Disable

so

Proposal name:tran1
AH SPI:

Re

Inbound AH setting:
AH string-key:

ng

AH authentication hex key:


Inbound ESP setting:

ni

ESP SPI: 12345 (0x3039)

ar

ESP string-key: huawei


ESP encryption hex key:

Le

ESP authentication hex key:

Outbound AH setting:

Mo

re

AH SPI:
AH string-key:

Page138

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


AH authentication hex key:

Outbound ESP setting:

aw
ei
.c
om
/e

ESP SPI: 54321 (0xd431)


ESP string-key: huawei
ESP encryption hex key:
ESP authentication hex key:
<R3>display ipsec policy
===========================================

hu

IPSec policy group: "P1"


Using interface:

in

g.

===========================================
Sequence number: 10

rn

Security data flow: 3001

ea

Tunnel local address: 10.0.23.3


Tunnel remote address: 10.0.12.1

/l

Qos pre-classify: Disable

:/

Proposal name:tran1
Inbound AH setting:

tp

AH SPI:
AH string-key:

ht

AH authentication hex key:


Inbound ESP setting:
ESP string-key: huawei

s:

ESP SPI: 54321 (0xd431)

ce

ESP encryption hex key:

ur

ESP authentication hex key:


Outbound AH setting:

so

AH SPI:

Re

AH string-key:

AH authentication hex key:


Outbound ESP setting:

ng

ESP SPI: 12345 (0x3039)

ni

ESP string-key: huawei


ESP encryption hex key:

Mo

re

Le

ar

ESP authentication hex key:

HC Series

HUAWEI TECHNOLOGIES

Page139

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Apply the policy to the physical interface upon which traffic will be subjected to
IPsec processing.
[R1]interface Serial 1/0/0
[R1-Serial1/0/0]ipsec policy P1
[R3]interface Serial 2/0/0

hu

[R3-Serial2/0/0]ipsec policy P1

g.

Step 9 Test connectivity between the IP networks.

in

Observe and verity that non-interesting traffic bypasses the IPsec processing.

rn

<R1>ping -a 10.0.11.11 10.0.33.33

ea

PING 10.0.33.33: 56 data bytes, press CTRL_C to break

Reply from 10.0.33.33: bytes=56 Sequence=1 ttl=254 time=60 ms

/l

Reply from 10.0.33.33: bytes=56 Sequence=2 ttl=254 time=50 ms


Reply from 10.0.33.33: bytes=56 Sequence=3 ttl=254 time=50 ms

:/

Reply from 10.0.33.33: bytes=56 Sequence=4 ttl=254 time=60 ms

tp

Reply from 10.0.33.33: bytes=56 Sequence=5 ttl=254 time=50 ms


--- 10.0.33.33 ping statistics ---

ht

5 packet(s) transmitted
5 packet(s) received

s:

0.00% packet loss

ce

round-trip min/avg/max = 50/54/60 ms

ur

<R1>display ipsec statistics esp


Inpacket count

: 0

so

Inpacket auth count

: 0

Re

: 0

Outpacket auth count

: 0

Outpacket encap count

: 0

Inpacket drop count

: 0

Outpacket drop count

: 0

BadAuthLen count

: 0

AuthFail count

: 0

InSAAclCheckFail count

: 0

PktDuplicateDrop count

: 0

ar

ng

Outpacket count

ni

: 0

Le

Inpacket decap count

re

PktSeqNoTooSmallDrop count : 0

Mo

PktInSAMissDrop count

Page140

Step 8 Applying IPsec Policies to Interfaces

: 0

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

Observe that only the interesting traffic will be secured by the IPsec VPN.

aw
ei
.c
om
/e

<R1>ping -a 10.0.1.1 10.0.3.3


PING 10.0.3.3: 56 data bytes, press CTRL_C to break

Reply from 10.0.3.3: bytes=56 Sequence=1 ttl=255 time=80 ms


Reply from 10.0.3.3: bytes=56 Sequence=2 ttl=255 time=77 ms
Reply from 10.0.3.3: bytes=56 Sequence=3 ttl=255 time=77 ms
Reply from 10.0.3.3: bytes=56 Sequence=4 ttl=255 time=80 ms
Reply from 10.0.3.3: bytes=56 Sequence=5 ttl=255 time=77 ms

hu

--- 10.0.3.3 ping statistics --5 packet(s) transmitted

g.

5 packet(s) received
0.00% packet loss

rn

in

round-trip min/avg/max = 77/78/80 ms

: 0

Outpacket count

: 5

Outpacket auth count

: 0

Outpacket encap count

: 0

Inpacket drop count

: 0

Outpacket drop count

: 0

BadAuthLen count

: 0

AuthFail count

: 0

InSAAclCheckFail count

: 0

ce

PktDuplicateDrop count

/l

Inpacket decap count

:/

: 0

tp

Inpacket auth count

ht

: 5

s:

Inpacket count

ea

<R1>display ipsec statistics esp

: 0

ur

PktSeqNoTooSmallDrop count : 0
: 0

Re

so

PktInSAMissDrop count

Redefine interesting traffic

ng

Step 10

ni

Change the ACL to define OSPF traffic as interesting traffic.


[R1]acl 3001

Le

ar

[R1-acl-adv-3001]rule 5 permit ospf source any destination any


[R3]acl 3001

Mo

re

[R3-acl-adv-3001]rule 5 permit ospf source any destination any

HC Series

HUAWEI TECHNOLOGIES

Page141

HCNA-HNTD Module 3 Implementing IP Security

<R1>display ospf peer brief

aw
ei
.c
om
/e

OSPF Process 1 with Router ID 10.0.1.1


Peer Statistic Information

---------------------------------------------------------------------------Area Id

Interface

Neighbor id

0.0.0.0

Serial1/0/0

10.0.2.2

State

Init

---------------------------------------------------------------------------<R1>display ip routing-table

hu

Route Flags: R - relay, D - download to fib

----------------------------------------------------------------------------

in

Pre Cost

10.0.1.0/24

Direct

10.0.1.1/32

Direct

10.0.11.11/32

Direct

10.0.11.255/32 Direct

10.0.12.0/24

Direct

10.0.12.1/32

Direct

10.0.12.2/32

Direct

10.0.12.255/32 Direct
127.0.0.0/8
127.0.0.1/32

Interface

10.0.1.1

LoopBack0

127.0.0.1

LoopBack0

/l

127.0.0.1

LoopBack0

10.0.11.11

LoopBack1

127.0.0.1

LoopBack1

127.0.0.1

LoopBack1

10.0.12.1

Serial1/0/0

127.0.0.1

Serial1/0/0

10.0.12.2

Serial1/0/0

127.0.0.1

Serial1/0/0

Direct

127.0.0.1

InLoopBack0

Direct

127.0.0.1

InLoopBack0

:/

tp

Direct

ht

Direct

10.0.11.0/24

ce

s:

10.0.1.255/32

Flags NextHop

rn

Proto

ur

Destination/Mask

Routes : 14

ea

Destinations : 14

g.

Routing Tables: Public

127.0.0.1

InLoopBack0

255.255.255.255/32 Direct

127.0.0.1

InLoopBack0

Re

so

127.255.255.255/32 Direct

<R3>display ospf peer brief

ng

OSPF Process 1 with Router ID 10.0.3.3

ni

Peer Statistic Information

---------------------------------------------------------------------------Interface

Neighbor id

State

0.0.0.0

Serial2/0/0

10.0.2.2

Init

Le

ar

Area Id

Mo

re

----------------------------------------------------------------------------

Page142

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


<R3>display ip routing-table

aw
ei
.c
om
/e

---------------------------------------------------------------------------Routing Tables: Public


Destinations : 14

Routes : 14

Proto

Pre Cost

10.0.3.0/24

Direct

10.0.3.3

10.0.3.3/32

Direct

127.0.0.1

10.0.3.255/32

Direct

127.0.0.1

10.0.23.0/24

Direct

10.0.23.3

10.0.23.2/32

Direct

10.0.23.2

10.0.23.3/32

Direct

127.0.0.1

10.0.23.255/32 Direct

127.0.0.1

Serial2/0/0

10.0.33.0/24

Direct

10.0.33.33

LoopBack1

10.0.33.33/32

Direct

127.0.0.1

LoopBack1

10.0.33.255/32 Direct

127.0.0.0/8

Direct

127.0.0.1/32

255.255.255.255/32 Direct

LoopBack0
LoopBack0

hu

g.

in

rn

ea

LoopBack0

Serial2/0/0
Serial2/0/0
Serial2/0/0

127.0.0.1

LoopBack1

127.0.0.1

InLoopBack0

/l

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

127.0.0.1

InLoopBack0

:/

Interface

ht

Direct

127.255.255.255/32 Direct

Flags NextHop

tp

Destination/Mask

ur

ce

s:

OSPF hello messages fail to be encapsulated using IPsec, causing the link
state to fail, returning OSPF to an Init state and effectively breaking the
established OSPF adjacent relationship of R1 and R3 with R2. Lab 7-5 will
introduce solutions to the problem of dynamic routing over IPsec VPN.

so

Final Configuration

Re

<R1>display current-configuration
[V200R003C00SPC200]

ng

ni

sysname R1
#

ar

acl number 3001


rule 5 permit ospf

Le

ipsec proposal tran1

re

esp authentication-algorithm sha1

Mo

esp encryption-algorithm 3des

HC Series

HUAWEI TECHNOLOGIES

Route Flags: R - relay, D - download to fib

Page143

HCNA-HNTD Module 3 Implementing IP Security


#

ipsec policy P1 10 manual

aw
ei
.c
om
/e

security acl 3001


proposal tran1
tunnel local 10.0.12.1
tunnel remote 10.0.23.3
sa spi inbound esp 12345
sa string-key inbound esp simple huawei
sa spi outbound esp 54321
sa string-key outbound esp simple huawei

hu

#
interface Serial1/0/0

g.

link-protocol ppp

in

ppp authentication-mode pap


ip address 10.0.12.1 255.255.255.0

rn

ipsec policy P1

ea

baudrate 128000
#

/l

interface LoopBack0

:/

ip address 10.0.1.1 255.255.255.0


#

tp

interface LoopBack1

ip address 10.0.11.11 255.255.255.0

ht

#
ospf 1 router-id 10.0.1.1

s:

area 0.0.0.0

network 10.0.1.0 0.0.0.255

ce

network 10.0.11.0 0.0.0.255


#

so

user-interface con 0

ur

network 10.0.12.0 0.0.0.255

Re

authentication-mode password
set authentication password
cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$

ng

user-interface vty 0 4
#

Mo

re

Le

ar

return

ni

authentication-mode aaa

Page144

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


<R2>display current-configuration

[V200R003C00SPC200]

aw
ei
.c
om
/e

#
sysname R2
#
interface Serial1/0/0
link-protocol ppp

ppp pap local-user huawei password cipher %$%$u[hr6d<JVHR@->T7xr1<$.iv%$%$


ip address 10.0.12.2 255.255.255.0
#

hu

interface Serial2/0/0
link-protocol ppp

g.

ppp chap user huawei

in

ppp chap password cipher %$%$e{5h)gh"/Uz0mUC%vEx3$4<m%$%$


ip address 10.0.23.2 255.255.255.0

rn

ea

interface LoopBack0
ip address 10.0.2.2 255.255.255.0

/l

:/

ospf 1 router-id 10.0.2.2


area 0.0.0.0

tp

network 10.0.12.0 0.0.0.255


network 10.0.23.0 0.0.0.255

ht

#
user-interface con 0

s:

authentication-mode password
set authentication password

ur

user-interface vty 0 4

ce

cipher %$%$|nRPL^hr2IXi7LHDID!/,.*%.8%h;3:,hXO2dk#ikaWI.*(,%$%$
#

Re

so

return

<R3>display current-configuration

ng

[V200R003C00SPC200]

ni

#
#

ar

sysname R3

Le

acl number 3001


rule 5 permit ospf

re

ipsec proposal tran1

Mo

esp authentication-algorithm sha1

HC Series

HUAWEI TECHNOLOGIES

Page145

HCNA-HNTD Module 3 Implementing IP Security


esp encryption-algorithm 3des

aw
ei
.c
om
/e

ipsec policy P1 10 manual


security acl 3001
proposal tran1
tunnel local 10.0.23.3
tunnel remote 10.0.12.1
sa spi inbound esp 54321
sa string-key inbound esp simple huawei
sa spi outbound esp 12345

hu

sa string-key outbound esp simple huawei


#

g.

interface Serial2/0/0

in

link-protocol ppp
ppp authentication-mode chap

rn

ip address 10.0.23.3 255.255.255.0

ea

ipsec policy P1
#

/l

interface LoopBack0

:/

ip address 10.0.3.3 255.255.255.0


#

tp

interface LoopBack1

ip address 10.0.33.33 255.255.255.0

ht

#
ospf 1 router-id 10.0.3.3

s:

area 0.0.0.0

network 10.0.3.0 0.0.0.255

ce

network 10.0.23.0 0.0.0.255


#

so

user-interface con 0

ur

network 10.0.33.0 0.0.0.255

Re

authentication-mode password
set authentication password
cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$

ng

user-interface vty 0 4
#

Mo

re

Le

ar

return

ni

authentication-mode aaa

Page146

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Lab 3-5 Supporting Dynamic Routing with GRE


Learning Objectives

As a result of this lab section, you should achieve the following tasks:
Configuration of an ACL to support GRE encapsulation
Establishment of a tunnel interface for GRE
Implementation of the GRE keepalive feature.

hu

tp

:/

/l

ea

rn

in

g.

Topology

ht

Figure 3.5 Dynamic routing with GRE topology

s:

Scenario

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

A requirement has been made to allow networks from other offices to be


advertised to the HQ. Following the implementation of IPsec VPN solutions, it
was discovered that this was not possible. After some consultation the
administrator has been advised to implement a GRE solution over the existing
IPsec network to enable the enterprise offices to truly operate as a single
administrative domain.

HC Series

HUAWEI TECHNOLOGIES

Page147

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Tasks
Note: It is a prerequisite that lab 3-4 be completed before attempting this lab.

Step 1 Set GRE traffic as the interesting traffic

Reconfigure the access control list establish GRE encapsulation over IPsec.

hu

[R1]acl 3001

g.

[R1-acl-adv-3001]rule 5 permit gre source 10.0.12.1 0 destination 10.0.23.3 0

in

[R3]acl 3001

ea

/l

Step 2 Configure a tunnel interface.

rn

[R3-acl-adv-3001]rule 5 permit gre source 10.0.23.3 0 destination 10.0.12.1 0

tp

:/

Create a tunnel interface and specify GRE as the encapsulation type. Set the
tunnel source address or source interface, and set the tunnel destination
address.

ht

[R1]interface Tunnel 0/0/1

[R1-Tunnel0/0/1]ip address 100.1.1.1 24

s:

[R1-Tunnel0/0/1]tunnel-protocol gre
[R1-Tunnel0/0/1]source 10.0.12.1

ce

[R1-Tunnel0/0/1]destination 10.0.23.3

ur

[R3]interface Tunnel 0/0/1

so

[R3-Tunnel0/0/1]ip address 100.1.1.2 24


[R3-Tunnel0/0/1]tunnel-protocol gre

Re

[R3-Tunnel0/0/1]source 10.0.23.3

ni

ng

[R3-Tunnel0/0/1]destination 10.0.12.1

ar

Step 3 Configure a second OSPF process to route the tunnel.

Mo

re

Le

Add the tunnel interface network to OSPF 1 process, and create a second
OSPF instance of the link state database (process 2) for the 10.0.12.0 and
10.0.23.0 networks, be sure to remove these networks from OSPF 1.

Page148

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


[R1]ospf 1

[R1-ospf-1]area 0

aw
ei
.c
om
/e

[R1-ospf-1-area-0.0.0.0]network 100.1.1.0 0.0.0.255


[R1-ospf-1-area-0.0.0.0]undo network 10.0.12.0 0.0.0.255
[R1]ospf 2 router-id 10.0.1.1
[R1-ospf-2]area 0
[R1-ospf-2-area-0.0.0.0]network 10.0.12.0 0.0.0.255
[R3]ospf 1
[R3-ospf-1-area-0.0.0.0]network 100.1.1.0 0.0.0.255
[R3-ospf-1-area-0.0.0.0]undo network 10.0.23.0 0.0.0.255

g.

[R3]ospf 2 router-id 10.0.3.3

hu

[R3-ospf-1]area 0

rn

[R3-ospf-2-area-0.0.0.0]network 10.0.23.0 0.0.0.255

in

[R3-ospf-2]area 0

/l

ea

OSPF LSDB are significant only to the local router, therefore allowing routes
from OSPF LSDB 2 of R1 and R3 to reach OSPF LSDB 1 of R2.

:/

Run the display interface Tunnel 0/0/1 command to verify the configuration.

tp

<R1>display interface Tunnel 0/0/1


Line protocol current state : UP

ht

Tunnel0/0/1 current state : UP

Last line protocol up time : 2013-12-17 17:10:16

s:

Description:HUAWEI, AR Series, Tunnel0/0/1 Interface


Route Port,The Maximum Transmit Unit is 1500

ce

Internet Address is 100.1.1.1/24

Encapsulation is TUNNEL, loopback not set

ur

Tunnel source 10.0.12.1 (Serial1/0/0), destination 10.0.23.3

so

Tunnel protocol/transport GRE/IP, key disabled


keepalive disabled

Re

Checksumming of packets disabled


Current system time: 2013-12-17 17:35:39

ng

Last 300 seconds input rate 0 bytes/sec, 0 packets/sec


Last 300 seconds output rate 9 bytes/sec, 0 packets/sec

ni

Realtime 0 seconds input rate 0 bytes/sec, 0 packets/sec

ar

Realtime 0 seconds output rate 0 bytes/sec, 0 packets/sec


0 packets input, 0 bytes, 0 drops

Le

145 packets output, 14320 bytes, 0 drops


Input bandwidth utilization : --

Mo

re

Output bandwidth utilization : --

HC Series

HUAWEI TECHNOLOGIES

Page149

HCNA-HNTD Module 3 Implementing IP Security


<R3>display interface Tunnel 0/0/1

Tunnel0/0/1 current state : UP


Last line protocol up time : 2013-12-17 17:10:40
Description:HUAWEI, AR Series, Tunnel0/0/1 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is 100.1.1.2/24
Encapsulation is TUNNEL, loopback not set
Tunnel source 10.0.23.3 (Serial2/0/0), destination 10.0.12.1
Tunnel protocol/transport GRE/IP, key disabled

hu

keepalive disabled

aw
ei
.c
om
/e

Line protocol current state : UP

Checksumming of packets disabled

g.

Current system time: 2013-12-17 17:36:44

in

Last 300 seconds input rate 0 bytes/sec, 0 packets/sec

Last 300 seconds output rate 9 bytes/sec, 0 packets/sec

rn

Realtime 0 seconds input rate 0 bytes/sec, 0 packets/sec


0 packets input, 0 bytes, 0 drops

/l

162 packets output, 14420 bytes, 15 drops

tp

:/

Input bandwidth utilization : -Output bandwidth utilization : --

ea

Realtime 0 seconds output rate 0 bytes/sec, 0 packets/sec

ht

Step 4 Verify that the routes are being carried via GRE

s:

Run the display ip routing-table command to check the IPv4 routing table.

ce

<R1>display ip routing-table

Route Flags: R - relay, D - download to fib

ur

----------------------------------------------------------------------------

so

Routing Tables: Public

Proto

Pre Cost

10.0.1.0/24

Direct

10.0.1.1

LoopBack0

10.0.1.1/32

Direct

127.0.0.1

LoopBack0

10.0.1.255/32

Direct

127.0.0.1

LoopBack0

10.0.2.2/32

OSPF

10

781

10.0.12.2

Serial1/0/0

10.0.3.3/32

OSPF

10

1562

100.1.1.2

Tunnel0/0/1

10.0.11.0/24

Direct

10.0.11.11

LoopBack1

10.0.11.11/32

Direct

127.0.0.1

LoopBack1

10.0.11.255/32 Direct

127.0.0.1

LoopBack1

Mo

re

Le

ni

ng

Destination/Mask

Routes : 21

ar

Re

Destinations : 21

Page150

Flags NextHop

HUAWEI TECHNOLOGIES

Interface

HC Series

Direct

10.0.12.1

Serial1/0/0

10.0.12.1/32

Direct

127.0.0.1

Serial1/0/0

10.0.12.2/32

Direct

10.0.12.2

Serial1/0/0

10.0.12.255/32 Direct

127.0.0.1

10.0.23.0/24

OSPF

10

2343

10.0.12.2

10.0.33.33/32

OSPF

10

1562

100.1.1.2

100.1.1.0/24

Direct

100.1.1.1

100.1.1.1/32

Direct

127.0.0.1

100.1.1.255/32 Direct

127.0.0.1

127.0.0.1

Direct

127.0.0.1

127.255.255.255/32 Direct

127.0.0.1

255.255.255.255/32 Direct

127.0.0.1

Serial1/0/0

Tunnel0/0/1

Tunnel0/0/1
Tunnel0/0/1

Tunnel0/0/1

InLoopBack0

InLoopBack0

hu

Direct

127.0.0.1/32

Serial1/0/0

InLoopBack0
InLoopBack0

in

g.

127.0.0.0/8

aw
ei
.c
om
/e

10.0.12.0/24

<R3>display ip routing-table

rn

Route Flags: R - relay, D - download to fib

ea

----------------------------------------------------------------------------

Pre Cost

10.0.1.1/32

OSPF

10

1562

10.0.2.2/32

OSPF

10

1562

10.0.3.0/24

Direct

10.0.3.3/32

Direct

10.0.3.255/32

Direct

10.0.11.11/32

OSPF

10.0.12.0/24

OSPF

10.0.23.0/24

Direct

10.0.23.2/32

Direct
Direct

:/

Proto

Flags NextHop

Interface

100.1.1.1

Tunnel0/0/1

10.0.23.2

Serial2/0/0

10.0.3.3

LoopBack0

127.0.0.1

LoopBack0

127.0.0.1

LoopBack0

10

1562

100.1.1.1

Tunnel0/0/1

10

3124

10.0.23.2

Serial2/0/0

10.0.23.3

Serial2/0/0

10.0.23.2

Serial2/0/0

127.0.0.1

Serial2/0/0

10.0.23.255/32 Direct

127.0.0.1

Serial2/0/0

10.0.33.0/24

Direct

10.0.33.33

LoopBack1

10.0.33.33/32

Direct

127.0.0.1

LoopBack1

10.0.33.255/32 Direct

127.0.0.1

LoopBack1

ni

ng

s:

ce

ur

Re

10.0.23.3/32

ht

so

Destination/Mask

Routes : 21

tp

Destinations : 21

/l

Routing Tables: Public

Direct

100.1.1.2

Tunnel0/0/1

100.1.1.2/32

Direct

127.0.0.1

Tunnel0/0/1

100.1.1.255/32 Direct

127.0.0.1

Tunnel0/0/1

Le

ar

100.1.1.0/24

Direct

127.0.0.1

InLoopBack0

127.0.0.1/32

Direct

127.0.0.1

InLoopBack0

127.255.255.255/32 Direct

127.0.0.1

InLoopBack0

255.255.255.255/32 Direct

127.0.0.1

InLoopBack0

Mo

re

127.0.0.0/8

HC Series

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 3 Implementing IP Security

Page151

aw
ei
.c
om
/e

After a GRE tunnel is set up, the router can exchange OSPF packets through
the GRE tunnel. Clear the IPsec statistics and test the connection
<R1>reset ipsec statistics esp
[R1]ping -a 10.0.1.1 10.0.3.3
PING 10.0.3.3: 56 data bytes, press CTRL_C to break

Reply from 10.0.3.3: bytes=56 Sequence=1 ttl=255 time=69 ms


Reply from 10.0.3.3: bytes=56 Sequence=2 ttl=255 time=70 ms

Reply from 10.0.3.3: bytes=56 Sequence=3 ttl=255 time=68 ms

hu

Reply from 10.0.3.3: bytes=56 Sequence=4 ttl=255 time=68 ms

g.

Reply from 10.0.3.3: bytes=56 Sequence=5 ttl=255 time=68 ms


--- 10.0.3.3 ping statistics ---

in

5 packet(s) transmitted

rn

5 packet(s) received
0.00% packet loss

/l

: 0

Outpacket count

: 8

Outpacket auth count

: 0

Outpacket encap count

: 0

Inpacket drop count

: 0

Outpacket drop count

: 0

ce

BadAuthLen count

: 0
: 0

ur

AuthFail count

tp

: 0

Inpacket decap count

ht

Inpacket auth count

s:

: 8

:/

<R1>display ipsec statistics esp


Inpacket count

ea

round-trip min/avg/max = 68/68/70 ms

so

InSAAclCheckFail count
PktDuplicateDrop count

: 0
: 0

Re

PktSeqNoTooSmallDrop count : 0
: 0

ng

PktInSAMissDrop count

ni

GRE encapsulates all OSPF traffic including the hello packets over IPsec, the
gradual increment of the IPsec esp statistics verifies this.

Le

ar

Step 5 Implement the keepalive feature on the GRE tunnel.


[R1]interface Tunnel 0/0/1

Mo

re

[R1-Tunnel0/0/1]keepalive period 3

Page152

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 3 Implementing IP Security

HC Series

HCNA-HNTD Module 3 Implementing IP Security

aw
ei
.c
om
/e

Verify that the keepalive feature has been enabled on the tunnel interface.
<R1>display interface Tunnel 0/0/1
Tunnel0/0/1 current state : UP
Line protocol current state : UP
Last line protocol up time : 2013-12-18 09:50:21
Description:HUAWEI, AR Series, Tunnel0/0/1 Interface
Route Port,The Maximum Transmit Unit is 1500
Internet Address is 100.1.1.1/24

hu

Encapsulation is TUNNEL, loopback not set

Tunnel source 10.0.12.1 (Serial1/0/0), destination 10.0.23.3

g.

Tunnel protocol/transport GRE/IP, key disabled

in

keepalive enable period 3 retry-times 3


Checksumming of packets disabled

rn

Current system time: 2013-12-18 11:05:49

ea

Last 300 seconds input rate 0 bytes/sec, 0 packets/sec


Last 300 seconds output rate 8 bytes/sec, 0 packets/sec

/l

Realtime 0 seconds input rate 0 bytes/sec, 0 packets/sec


0 packets input, 0 bytes, 0 drops

:/

Realtime 0 seconds output rate 0 bytes/sec, 0 packets/sec

tp

503 packets output, 47444 bytes, 0 drops


Input bandwidth utilization : --

ce

Final Configuration

s:

ht

Output bandwidth utilization : --

[V200R003C00SPC200]

so

#
sysname R1

Re

ur

<R1>display current-configuration

acl number 3001

ng

rule 5 permit gre source 10.0.12.1 0 destination 10.0.23.3 0


#

ni

ipsec proposal tran1

ar

esp authentication-algorithm sha1


esp encryption-algorithm 3des

Le

ipsec policy P1 10 manual

re

security acl 3001

Mo

proposal tran1

HC Series

HUAWEI TECHNOLOGIES

Page153

HCNA-HNTD Module 3 Implementing IP Security


tunnel local 10.0.12.1

tunnel remote 10.0.23.3

aw
ei
.c
om
/e

sa spi inbound esp 12345


sa string-key inbound esp simple huawei
sa spi outbound esp 54321
sa string-key outbound esp simple huawei
#
interface Serial1/0/0
link-protocol ppp
ppp authentication-mode pap

hu

ip address 10.0.12.1 255.255.255.0


ipsec policy P1

g.

baudrate 128000

in

#
interface LoopBack0

rn

ip address 10.0.1.1 255.255.255.0

ea

#
interface LoopBack1

/l

ip address 10.0.11.11 255.255.255.0

ip address 100.1.1.1 255.255.255.0


tunnel-protocol gre

ht

keepalive period 3

tp

interface Tunnel0/0/1

:/

destination 10.0.23.3
#

ce

ospf 1 router-id 10.0.1.1

s:

source 10.0.12.1

ur

area 0.0.0.0

network 10.0.1.0 0.0.0.255

so

network 10.0.11.0 0.0.0.255

Re

network 100.1.1.0 0.0.0.255


#

ospf 2 router-id 10.0.1.1

ng

area 0.0.0.0

ni

network 10.0.12.0 0.0.0.255


#

ar

user-interface con 0

Le

authentication-mode password
set authentication password

cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$

re

user-interface vty 0 4

Mo

authentication-mode aaa

Page154

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


#

aw
ei
.c
om
/e

return

<R2>display current-configuration
[V200R003C00SPC200]
#
sysname R2
#
interface Serial1/0/0

hu

link-protocol ppp

ppp pap local-user huawei password cipher %$%$u[hr6d<JVHR@->T7xr1<$.iv%$%$

g.

ip address 10.0.12.2 255.255.255.0

in

#
interface Serial2/0/0

rn

link-protocol ppp

ea

ppp chap user huawei

ppp chap password cipher %$%$e{5h)gh"/Uz0mUC%vEx3$4<m%$%$

/l

ip address 10.0.23.2 255.255.255.0

ip address 10.0.2.2 255.255.255.0


#

ht

ospf 1 router-id 10.0.2.2

tp

interface LoopBack0

:/

area 0.0.0.0

s:

network 10.0.2.0 0.0.0.255

network 10.0.12.0 0.0.0.255

ce

network 10.0.23.0 0.0.0.255


user-interface con 0

ur

so

authentication-mode password

Re

set authentication password


cipher %$%$|nRPL^hr2IXi7LHDID!/,.*%.8%h;3:,hXO2dk#ikaWI.*(,%$%$
user-interface vty 0 4

ng

ar

ni

return

Le

<R3>display current-configuration
[V200R003C00SPC200]
#

re

sysname R3

Mo

HC Series

HUAWEI TECHNOLOGIES

Page155

HCNA-HNTD Module 3 Implementing IP Security


acl number 3001

rule 5 permit gre source 10.0.23.3 0 destination 10.0.12.1 0

aw
ei
.c
om
/e

#
ipsec proposal tran1
esp authentication-algorithm sha1
esp encryption-algorithm 3des
#
ipsec policy P1 10 manual
security acl 3001
proposal tran1

hu

tunnel local 10.0.23.3


tunnel remote 10.0.12.1

g.

sa spi inbound esp 54321

in

sa string-key inbound esp simple huawei


sa spi outbound esp 12345

rn

sa string-key outbound esp simple huawei

ea

#
interface Serial2/0/0

/l

link-protocol ppp

:/

ppp authentication-mode chap


ip address 10.0.23.3 255.255.255.0

tp

ipsec policy P1
#

ht

interface LoopBack0

ip address 10.0.3.3 255.255.255.0

s:

#
interface LoopBack1

ce

ip address 10.0.33.33 255.255.255.0


interface Tunnel0/0/1

ur

so

ip address 100.1.1.2 255.255.255.0

Re

tunnel-protocol gre
source 10.0.23.3

destination 10.0.12.1

ng

ni

ospf 1 router-id 10.0.3.3


area 0.0.0.0

ar

network 10.0.3.0 0.0.0.255

Le

network 10.0.33.0 0.0.0.255


network 100.1.1.0 0.0.0.255

re

ospf 2 router-id 10.0.3.3

Mo

area 0.0.0.0

Page156

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 3 Implementing IP Security


network 10.0.23.0 0.0.0.255

aw
ei
.c
om
/e

user-interface con 0
authentication-mode password
set authentication password

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$
user-interface vty 0 4
authentication-mode aaa
#

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

ea

rn

in

g.

hu

return

HC Series

HUAWEI TECHNOLOGIES

Page157

aw
ei
.c
om
/e

Module 4 Managing Enterprise Networks


Lab 4-1 Managing Networks with SNMP
Learning Objectives

hu

As a result of this lab section, you should achieve the following tasks:

in

g.

Configuration of an SNMP agent for a network element.


Configuration of SNMP agent traps.
Application of the NMS in managing network elements.

ur

ce

s:

ht

tp

:/

/l

ea

rn

Topology

ng

Re

so

Figure 4.1 Network management with SNMP topology

Scenario

Mo

re

Le

ar

ni

With the continued growth of the enterprise network it has become apparent
that new measures need to be taken to manage and monitor the health of the
network so as to minimize network downtime. The network administrator has
decided that an NMS solution should be deployed, with tests performed to
observe the basic capability of the NMS solution to monitor devices, before
deploying the solution in the enterprise network.

Page158

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 4 Managing Enterprise Networks

HC Series

HCNA-HNTD Module 4 Managing Enterprise Networks

aw
ei
.c
om
/e

Tasks
Step 1 Preparing the environment

If you are starting this section with a non-configured device, begin here and
then move to step 3. For those continuing from previous labs, begin at step 2.
<Huawei>system-view

hu

[Huawei]sysname R1
[R1]interface LoopBack 0

in

g.

[R1-LoopBack0]ip address 10.0.1.1 24


<Huawei>system-view

rn

[Huawei]sysname R3
[R3]interface LoopBack 0

/l

ea

[R3-LoopBack0]ip address 10.0.3.3 24

:/

Step 2 Clean up the previous configuration

ht

tp

Disable the unused serial interfaces and remove the OSPF processes from all
routers.
[R1]interface Serial 1/0/0

s:

[R1-Serial1/0/0]shutdown

ce

[R1-Serial1/0/0]quit
[R1]undo ospf 1

ur

Warning: The OSPF process will be deleted. Continue? [Y/N]:y

so

[R1]undo ospf 2

Re

Warning: The OSPF process will be deleted. Continue? [Y/N]:y


[R3]interface Serial 2/0/0

ng

[R3-Serial2/0/0]shutdown
[R3-Serial2/0/0]quit

ni

[R3]undo ospf 1

ar

Warning: The OSPF process will be deleted. Continue? [Y/N]:y


[R3]undo ospf 2

Mo

re

Le

Warning: The OSPF process will be deleted. Continue? [Y/N]:y

HC Series

HUAWEI TECHNOLOGIES

Page159

HCNA-HNTD Module 4 Managing Enterprise Networks

aw
ei
.c
om
/e

Step 3 Estabish routes between hosts and the NMS.


Configure the IP address and route on the router, make sure the route
between the device and the NMS is reachable.
[R1]interface GigabitEthernet 0/0/0
[R1-GigabitEthernet0/0/0]ip address 10.0.13.1 24
[R3]interface GigabitEthernet 0/0/0

hu

[R3-GigabitEthernet0/0/0]ip address 10.0.13.3 24

g.

[R1]ospf
[R1-ospf-1]area 0

rn

[R1-ospf-1-area-0.0.0.0]network 10.0.1.0 0.0.0.255

in

[R1]ospf 1 router-id 10.0.1.1

ea

[R1-ospf-1-area-0.0.0.0]network 10.0.13.0 0.0.0.255

/l

[R3]ospf 1 router-id 10.0.3.3


[R3-ospf-1]area 0

:/

[R3-ospf-1-area-0.0.0.0]network 10.0.3.0 0.0.0.255

ht

tp

[R3-ospf-1-area-0.0.0.0]network 10.0.13.0 0.0.0.255

s:

Test the network connectivity.


[R1]ping 10.0.13.254

ce

PING 10.0.13.254: 56 data bytes, press CTRL_C to break

ur

Reply from 10.0.13.254: bytes=56 Sequence=1 ttl=128 time=1 ms


Reply from 10.0.13.254: bytes=56 Sequence=2 ttl=128 time=1 ms

so

Reply from 10.0.13.254: bytes=56 Sequence=3 ttl=128 time=10 ms

Re

Reply from 10.0.13.254: bytes=56 Sequence=4 ttl=128 time=1 ms


Reply from 10.0.13.254: bytes=56 Sequence=5 ttl=128 time=1 ms

ng

--- 10.0.13.254 ping statistics ---

ni

5 packet(s) transmitted
5 packet(s) received

ar

0.00% packet loss

Mo

re

Le

round-trip min/avg/max = 1/2/10 ms

Page160

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 4 Managing Enterprise Networks

aw
ei
.c
om
/e

Step 4 Configure SNMP on R1.


Enable the SNMP agent and confige the version SNMPv2c on the R1.
[R1]snmp-agent
[R1]snmp-agent sys-info version v2c

Configure SNMP read and write community

hu

[R1]snmp-agent community read public

g.

[R1]snmp-agent community write private

rn

in

Enable the trap function of R1. Configure contact information about the
device administrator.

ea

[R1]snmp-agent trap enable

Info: All switches of SNMP trap/notification will be open. Continue? [Y/N]:y

/l

[R1]snmp-agent trap queue-size 200


[R1]snmp-agent trap life 60

:/

[R1]snmp-agent target-host trap-hostname NMS address 10.0.13.254 trap-paramsname

tp

public

[R1]snmp-agent target-host trap-paramsname public v2c securityname public

ht

[R1]snmp-agent sys-info contact Call the operator at 010-12345678

ce

s:

After the configuration is complete, run the following commands to verify that
the configuration has taken effect.

ur

<R1>display snmp-agent sys-info

The contact person for this managed node:

Re

so

Call the operator at 010-12345678


The physical location of this node:

ng

Shenzhen China

ni

SNMP version running in the system:

ar

SNMPv2c

<R1>display snmp-agent community write

Le

Community name: %$%$ZR)y~^VY9I"~n`=b`KR1(OX%%$%$


Storage type: nonVolatile

Mo

re

View name: ViewDefault

HC Series

HUAWEI TECHNOLOGIES

Page161

HCNA-HNTD Module 4 Managing Enterprise Networks


<R1>display snmp-agent target-host

Traphost list:

aw
ei
.c
om
/e

Target host name: NMS


Traphost address: 10.0.13.254
Traphost portnumber: 162
Target host parameter: public
Total number is 1
Parameter list trap target host:

hu

Parameter name of the target host: public


Message mode of the target host: SNMPV2C

g.

Trap version of the target host: v2c

in

Security name of the target host: public

ea

rn

Total number is 1

/l

Step 5 Configure Network Elements on the NMS

Re

so

ur

ce

s:

ht

tp

:/

Under the Resource > Add Device > Single path, add the Network Element
(NE) R1 and R3 to the NMS, and configure the SNMP parameters as shown.

Mo

re

Le

ar

ni

ng

Verify that the Network Elements have been added to the NMS under the
Resource > Resource Management > Equipment Resources > NE Resources
path.

Page162

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 4 Managing Enterprise Networks

:/

/l

ea

rn

in

g.

hu

aw
ei
.c
om
/e

Click on the resource name R1 and R3 to view the basic information.

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

tp

Select the Interface Manager option under Device Config in the resource menu
to the left of the screen. The given output represents a scenario in which all
labs throughout the lab guide have been completed in succession, thus
producing multiple addresses.

HC Series

HUAWEI TECHNOLOGIES

Page163

rn

in

g.

hu

aw
ei
.c
om
/e

Select the Telnet Parameters option under Protocol Parameters of the


resource menu, to configure the telnet parameters for accessing each network
element from the NMS. If the AAA local user authentication of lab 7-3 has been
maintained in the current configuration, it can be applied as shown. Note: the
password is huawei.

HCNA-HNTD Module 4 Managing Enterprise Networks

:/

/l

ea

Optionally, if the AAA authentication is not present on the VTY interface of R1


and/or R3, a simple telnet authentication process can be applied as follows
before registering the telnet parameters in the NMS.
[R1]user-interface vty 0 4

tp

[R1-ui-vty0-4]authentication-mode password

[R1-ui-vty0-4]set authentication password cipher huawei

ht

[R1-ui-vty0-4]user privilege level 0

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

The telnet feature in the Basic Information panel of the resource menu grants
remote management of the NE via the NMS, however privileges currently
prevent configuration.

Page164

HUAWEI TECHNOLOGIES

HC Series

aw
ei
.c
om
/e

If the AAA configuration has been maintained from lab 7-3, first increase the
privilege from level 0 to level 3.
[R1]aaa
[R1-aaa]local-user user1@huawei privilege level 3

Alternatively, if the simple telnet authentication process has been used,


change the privilege on the VTY user interface.

g.

hu

[R1-ui-vty0-4]user privilege level 3

in

Step 6 Manage Basic NMS Trap Functions

tp

:/

/l

ea

rn

Changes that occur to the NE can be monitored in the NMS using traps which
trigger alarms. Select the Alarm List from the view panel from the resource
menu .

s:

ht

Currently no alarms are recorded. Access the NE through the telnet feature in
the NMS and shut down the loopback 0 interface to trigger alarms on the NMS.

[R1-LoopBack0]shutdown

ce

[R1]interface LoopBack 0

Mo

re

Le

ar

ni

ng

Re

so

ur

[R1-LoopBack0]undo shutdown

HC Series

HUAWEI TECHNOLOGIES

HCNA-HNTD Module 4 Managing Enterprise Networks

Page165

HCNA-HNTD Module 4 Managing Enterprise Networks

aw
ei
.c
om
/e

Verify that the relevant alarms have been generated in the Alarm List for the
resource, once the interface state has been changed.

Additional Exercises: Analyzing and Verifying

g.

hu

If the interface of R1 that is linked to the NMS is down, will the failure be
detected by the NMS?

in

Final Configuration

rn

<R1>dis current-configuration

ea

[V200R003C00SPC200]
#

/l

sysname R1

:/

snmp-agent local-engineid 800007DB0354899876830A

tp

snmp-agent community read %$%$><Oc4D:9(4}bjw"Bu'd7(ONp%$%$

ht

snmp-agent community write %$%$ZR)y~^VY9I"~n`=b`KR1(OX%%$%$


snmp-agent sys-info contact Call the operator at 010-12345678
snmp-agent sys-info version v2c

s:

snmp-agent target-host trap-hostname NMS address 10.0.13.254 udp-port 162

ce

trap-paramsname public

snmp-agent target-host trap-paramsname public v2c securityname public

ur

snmp-agent trap enable

snmp-agent trap queue-size 200

so

snmp-agent trap life 60

Re

snmp-agent
#

ng

aaa

authentication-scheme default

ni

authentication-scheme auth1
authorization-scheme default

ar

authorization-scheme auth2

Le

accounting-scheme default
domain default
domain default_admin

Mo

re

domain huawei

Page166

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 4 Managing Enterprise Networks


authentication-scheme auth1

aw
ei
.c
om
/e

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$


local-user admin service-type http

local-user huawei password cipher %$%$B:%I)Io0H8)[%SB[idM3C/!#%$%$


local-user huawei service-type ppp

local-user user1@huawei password cipher %$%$^L*5IP'0^A!;R)R*L=LFcXgv%$%$


local-user user1@huawei privilege level 3
local-user user1@huawei service-type telnet
#

hu

interface GigabitEthernet0/0/0
ip address 10.0.13.1 255.255.255.0

g.

in

interface LoopBack0
ip address 10.0.1.1 255.255.255.0

rn

ea

ospf 1 router-id 10.0.1.1


area 0.0.0.0

/l

network 10.0.1.0 0.0.0.255

:/

network 10.0.13.0 0.0.0.255


#

tp

user-interface con 0
authentication-mode password

ht

set authentication password

cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$

s:

user-interface vty 0 4
authentication-mode aaa

ce

so

ur

return

Re

<R3>display current-configuration
[V200R003C00SPC200]
#

ng

sysname R3

ni

snmp-agent local-engineid 800007DB03548998768222

ar

snmp-agent community read %$%$I^)/SB#f|Q#U\*Fd^xVX(bwT%$%$

Le

snmp-agent community write %$%$,CnkQV6[!*c.&0/wn>HU(b{n%$%$


snmp-agent sys-info contact Call the operator at 010-12345678
snmp-agent sys-info version v2c

re

snmp-agent target-host trap-hostname NMS address 10.0.13.254 udp-port 162

Mo

trap-paramsname public

HC Series

authorization-scheme auth2

HUAWEI TECHNOLOGIES

Page167

HCNA-HNTD Module 4 Managing Enterprise Networks


snmp-agent target-host trap-paramsname public v2c securityname public

snmp-agent trap enable

aw
ei
.c
om
/e

snmp-agent trap queue-size 200


snmp-agent trap life 60
snmp-agent
#
aaa
authentication-scheme default
authentication-scheme auth1
authorization-scheme default

hu

authorization-scheme auth2
accounting-scheme default

g.

domain default

in

domain default_admin
domain huawei

rn

authentication-scheme auth1

ea

authorization-scheme auth2

local-user admin password cipher %$%$=i~>Xp&aY+*2cEVcS-A23Uwe%$%$

/l

local-user admin service-type http


local-user huawei service-type ppp

:/

local-user huawei password cipher %$%$fZsyUk1=O=>:L4'ytgR~D*Im%$%$

tp

local-user user3@huawei password cipher %$%$WQt.;bEsR<8fz3LCiPY,che_%$%$


local-user user3@huawei privilege level 3

ht

local-user user3@huawei service-type telnet


#

s:

interface GigabitEthernet0/0/0

ip address 10.0.13.3 255.255.255.0

ce

ur

ospf 1 router-id 10.0.3.3


area 0.0.0.0

so

network 10.0.3.0 0.0.0.255

Re

network 10.0.13.0 0.0.0.255


#

user-interface con 0

ng

authentication-mode password

ni

set authentication password


cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$

ar

user-interface vty 0 4

Le

authentication-mode aaa
#

Mo

re

return

Page168

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 5 Establishing IPv6 Networks

aw
ei
.c
om
/e

Module 5 Establishing IPv6 Networks


Lab 5-1 Implementing IPv6 Networks and Solutions
Learning Objectives

hu

As a result of this lab section, you should achieve the following tasks:

ea

rn

in

g.

Configuration of basic IPv6 addressing.


Configuration of the OSPFv3 routing protocol.
Configuration of DHCPv6 server functions.
Verification of the results using IPv6 display commands.

Figure 5-1 IPv6 topology

Mo

re

Le

ar

ni

ng

Re

so

ur

ce

s:

ht

tp

:/

/l

Topology

HC Series

HUAWEI TECHNOLOGIES

Page169

HCNA-HNTD Module 5 Establishing IPv6 Networks

aw
ei
.c
om
/e

Scenario
In line with plans for deployment of solutions for next generation networks, it
has been decided that the enterprise network should implement an IPv6
design to the existing infrastructure. As the administrator you have been
tasked with the job of implementing the addressing scheme and routing for
IPv6, as well as providing stateful addressing solutions for IPv6.

hu

Tasks

in

g.

Step 1 Preparing the environment

ea

rn

If you are starting this section with a non-configured device, begin here and
then move to step 2. For those continuing from previous labs, begin at step 2.
<huawei>system-view

:/

/l

[huawei]sysname R1
<huawei>system-view

ht

tp

[huawei]sysname R2
<huawei>system-view

ur

ce

s:

[huawei]sysname R3

so

Step 2 Configure IPv6 addressing

ni

[R1]ipv6

ng

Re

Establish IPv6 global unicast addressing on the loopback interfaces and


manually configure link local addressing on interface Gigabit Ethernet 0/0/0 of
all routers.

[R1]interface loopback 0

ar

[R1-LoopBack0]ipv6 enable

Le

[R1-LoopBack0]ipv6 address 2001:1::A 64


[R1]interface GigabitEthernet 0/0/0
[R1-GigabitEthernet0/0/0]ipv6 enable

Mo

re

[R1-GigabitEthernet0/0/0]ipv6 address fe80::1 link-local

Page170

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 5 Establishing IPv6 Networks


[R2]ipv6

[R2]interface loopback 0

aw
ei
.c
om
/e

[R2-LoopBack0]ipv6 enable
[R2-LoopBack0]ipv6 address 2001:2::B 64
[R2]interface GigabitEthernet 0/0/0
[R2-GigabitEthernet0/0/0]ipv6 enable
[R2-GigabitEthernet0/0/0]ipv6 address fe80::2 link-local

[R3]ipv6

hu

[R3]interface loopback 0
[R3-LoopBack0]ipv6 enable

g.

[R3-LoopBack0]ipv6 address 2001:3::C 64

in

[R3]interface GigabitEthernet 0/0/0


[R3-GigabitEthernet0/0/0]ipv6 enable

ea

rn

[R3-GigabitEthernet0/0/0]ipv6 address fe80::3 link-local

:/

GigabitEthernet0/0/0 current state : UP

/l

<R1>display ipv6 interface GigabitEthernet 0/0/0


IPv6 protocol current state : UP

tp

IPv6 is enabled, link-local address is FE80::1


No global unicast address configured

ht

Joined group address(es):


FF02::1:FF00:1

s:

FF02::2
FF02::1

ce

MTU is 1500 bytes

ur

ND DAD is enabled, number of DAD attempts: 1


ND reachable time is 30000 milliseconds

so

ND retransmit interval is 1000 milliseconds

Re

Hosts use stateless autoconfig for addresses

Mo

re

Le

ar

ni

ng

IPv6 interfaces become part of various multicast groups for support of


stateless address auto-configuration (SLAAC). The Network Discovery (ND)
Duplicate Address Detection (DAD) verifies the link local address is unique.

HC Series

HUAWEI TECHNOLOGIES

Page171

HCNA-HNTD Module 5 Establishing IPv6 Networks

aw
ei
.c
om
/e

Step 3 Configure OSPFv3.


Enable the OSPFv3 process and specify its router ID on R1, R2 and R3.
OSPFv3 must then be enabled on the interface.
[R1]ospfv3 1
[R1-ospfv3-1]router-id 1.1.1.1
[R1-ospfv3-1]quit
[R1]interface GigabitEthernet 0/0/0

hu

[R1-GigabitEthernet0/0/0]ospfv3 1 area 0
[R1-GigabitEthernet0/0/0]quit

g.

[R1]interface loopback 0

in

[R1-LoopBack0]ospfv3 1 area 0

rn

[R2]ospfv3 1

ea

[R2-ospfv3-1]router-id 2.2.2.2
[R2]interface GigabitEthernet 0/0/0
[R2-GigabitEthernet0/0/0]ospfv3 1 area 0

:/

[R2-GigabitEthernet0/0/0]quit

/l

[R2-ospfv3-1]quit

tp

[R2]interface loopback 0

ht

[R2-LoopBack0]ospfv3 1 area 0
[R3]ospfv3 1

s:

[R3-ospfv3-1]router-id 3.3.3.3
[R3-ospfv3-1]quit

ce

[R3]interface GigabitEthernet 0/0/0

ur

[R3-GigabitEthernet0/0/0]ospfv3 1 area 0
[R3-GigabitEthernet0/0/0]quit

so

[R3]interface loopback 0

Re

[R3-LoopBack0]ospfv3 1 area 0

ni

ng

Run the display ospfv3 peer command on R1 and R3 to verify the OSPFv3
peering has been established.
<R1>display ospfv3 peer

ar

OSPFv3 Process (1)


OSPFv3 Area (0.0.0.0)
State

Dead Time

Interface

2.2.2.2

Full/Backup

00:00:30

GE0/0/0

3.3.3.3

Full/DROther

00:00:40

GE0/0/0

Mo

re

Le

Neighbor ID Pri

Page172

HUAWEI TECHNOLOGIES

Instance ID

HC Series

HCNA-HNTD Module 5 Establishing IPv6 Networks


<R3>display ospfv3 peer

OSPFv3 Process (1)


Neighbor ID Pri

State

Dead Time

Interface

1.1.1.1

Full/DR

00:00:32

GE0/0/0

2.2.2.2

Full/Backup

00:00:38

GE0/0/0

aw
ei
.c
om
/e

OSPFv3 Area (0.0.0.0)


Instance ID
0
0

If 1.1.1.1 is not currently the DR, the following command can be used to reset
the OSPFv3 process

g.

hu

<R1>reset ospfv3 1 graceful-restart

rn

<R1>ping ipv6 fe80::3 -i GigabitEthernet 0/0/0

in

Test connectivity to the peer link local address and the global unicast address
of interface LoopBack 0.

ea

PING fe80::3 : 56 data bytes, press CTRL_C to break


Reply from FE80::3

/l

bytes=56 Sequence=1 hop limit=64 time = 2 ms

:/

Reply from FE80::3

bytes=56 Sequence=2 hop limit=64 time = 2 ms

tp

Reply from FE80::3

bytes=56 Sequence=3 hop limit=64 time = 11 ms

ht

Reply from FE80::3

bytes=56 Sequence=4 hop limit=64 time = 2 ms

s:

Reply from FE80::3

ce

bytes=56 Sequence=5 hop limit=64 time = 2 ms

ur

--- fe80::3 ping statistics --5 packet(s) transmitted

so

5 packet(s) received

Re

0.00% packet loss

round-trip min/avg/max = 2/3/11 ms

ng

<R1>ping ipv6 2001:3::C

ni

PING 2001:3::C : 56 data bytes, press CTRL_C to break


Reply from 2001:3::C

ar

bytes=56 Sequence=1 hop limit=64 time = 11 ms

Le

Reply from 2001:3::C


bytes=56 Sequence=2 hop limit=64 time = 6 ms
bytes=56 Sequence=3 hop limit=64 time = 2 ms
Reply from 2001:3::C

Mo

re

Reply from 2001:3::C

HC Series

HUAWEI TECHNOLOGIES

Page173

HCNA-HNTD Module 5 Establishing IPv6 Networks


bytes=56 Sequence=4 hop limit=64 time = 2 ms

Reply from 2001:3::C

aw
ei
.c
om
/e

bytes=56 Sequence=5 hop limit=64 time = 6 ms


--- 2001:3::C ping statistics --5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 2/5/11 ms

g.

hu

Step 4 Configure DHCPv6 to distribute IPv6 addresses.

rn

in

Enable the DHCPv6 Server function on R2 so that devices can be assigned


IPv6 addresses using DHCPv6.
[R2]dhcp enable

ea

[R2]dhcpv6 pool pool1

/l

[R2-dhcpv6-pool-pool1]address prefix 2001:FACE::/64


[R2-dhcpv6-pool-pool1]dns-server 2001:444e:5300::1

:/

[R2-dhcpv6-pool-pool1]excluded-address 2001:FACE::1

tp

[R2-dhcpv6-pool-pool1]quit

s:

ht

Configure IPv6 functions on the GigabitEthernet 0/0/0 interface.


Enable the DHCPv6 server function on the interface.
[R2]interface GigabitEthernet 0/0/0

ce

[R2-GigabitEthernet0/0/0]ipv6 address 2001:FACE::1 64

ur

[R2-GigabitEthernet0/0/0]dhcpv6 server pool1

Re

so

Enable the DHCPv6 client function on R1 and R3 so that devices can obtain
IPv6 addresses using DHCPv6.
[R1]dhcp enable

ng

[R1]interface gigabitethernet 0/0/0

ni

[R1-GigabitEthernet0/0/0]ipv6 address auto dhcp

ar

[R3]dhcp enable
[R3]interface GigabitEthernet 0/0/0

Mo

re

Le

[R3-GigabitEthernet0/0/0]ipv6 address auto dhcp

Page174

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 5 Establishing IPv6 Networks

aw
ei
.c
om
/e

Run the display dhcpv6 pool command on R2 to check information about the
DHCPv6 address pool.
<R2>display dhcpv6 pool
DHCPv6 pool: pool1
Address prefix: 2001:FACE::/64
Lifetime valid 172800 seconds, preferred 86400 seconds
2 in use, 0 conflicts
Excluded-address 2001:FACE::1
1 excluded addresses

hu

Information refresh time: 86400


DNS server address: 2001:444E:5300::1

g.

Conflict-address expire-time: 172800

in

Active normal clients: 2

ea

rn

Run the display ipv6 interface brief command on R1 and R3 to check the
IPv6 address information.

/l

[R1]display ipv6 interface brief


(l): loopback
(s): spoofing
Interface

Physical
up

ht

GigabitEthernet0/0/0
[IPv6 Address] 2001:FACE::2

up

s:

LoopBack0

Protocol
up
up(s)

ce

[IPv6 Address] 2001:1::A

tp

:/

*down: administratively down

ur

[R3]display ipv6 interface brief


*down: administratively down

so

(l): loopback

Re

(s): spoofing
Interface

GigabitEthernet0/0/0

Physical

Protocol

up

up

up

up(s)

ni

LoopBack0

ng

[IPv6 Address] 2001:FACE::3

Mo

re

Le

ar

[IPv6 Address] 2001:3::C

HC Series

HUAWEI TECHNOLOGIES

Page175

HCNA-HNTD Module 5 Establishing IPv6 Networks

aw
ei
.c
om
/e

Final Configuration
<R1>display current-configuration
[V200R003C00SPC200]
#
sysname R1
#
ipv6
#

hu

dhcp enable
#

g.

ospfv3 1

in

router-id 1.1.1.1
#

rn

interface GigabitEthernet0/0/0
ipv6 enable

ea

ip address 10.0.13.1 255.255.255.0

/l

ipv6 address FE80::1 link-local


ospfv3 1 area 0.0.0.0

:/

ipv6 address auto dhcp

tp

#
interface LoopBack0

ht

ipv6 enable

ip address 10.0.1.1 255.255.255.0

s:

ipv6 address 2001:1::A/64


ospfv3 1 area 0.0.0.0

ce

ur

user-interface con 0

authentication-mode password

so

set authentication password

Re

cipher %$%$dD#}P<HzJ;Xs%X>hOkm!,.+Iq61QK`K6tI}cc-;k_o`C.+L,%$%$
user-interface vty 0 4

authentication-mode aaa

ng

Mo

re

Le

ar

ni

return

Page176

HUAWEI TECHNOLOGIES

HC Series

HCNA-HNTD Module 5 Establishing IPv6 Networks


<R2>display current-configuration

[V200R003C00SPC200]

aw
ei
.c
om
/e

#
sysname R2
#
ipv6
#
dhcp enable
#
dhcpv6 pool pool1

hu

address prefix 2001:FACE::/64


excluded-address 2001:FACE::1

g.

dns-server 2001:444E:5300::1

in

#
ospfv3 1

rn

router-id 2.2.2.2

ea

#
interface GigabitEthernet0/0/0

/l

ipv6 enable

:/

ip address 10.0.13.2 255.255.255.0


ipv6 address 2001:FACE::1/64

tp

ipv6 address FE80::2 link-local


traffic-filter inbound acl 3000
dhcpv6 server pool1

s:

ht

ospfv3 1 area 0.0.0.0

interface LoopBack0

ce

ipv6 enable

ur

ip address 10.0.2.2 255.255.255.0


ipv6 address 2001:2::B/64

so

ospfv3 1 area 0.0.0.0

Re

user-interface con 0

authentication-mode password

ng

set authentication password

ni

cipher %$%$|nRPL^hr2IXi7LHDID!/,.*%.8%h;3:,hXO2dk#ikaWI.*(,%$%$
#

ar

user-interface vty 0 4

Mo

re

Le

return

HC Series

HUAWEI TECHNOLOGIES

Page177

HCNA-HNTD Module 5 Establishing IPv6 Networks


<R3>display current-configuration

[V200R003C00SPC200]

aw
ei
.c
om
/e

#
sysname R3
#
ipv6
#
dhcp enable
#
ospfv3 1

hu

router-id 3.3.3.3
#

g.

interface GigabitEthernet0/0/0

in

ipv6 enable
ip address 10.0.13.3 255.255.255.0

rn

ipv6 address FE80::3 link-local

ea

ospfv3 1 area 0.0.0.0


ipv6 address auto dhcp

/l

ip address 10.0.3.3 255.255.255.0


ipv6 address 2001:3::C/64

ht

ospfv3 1 area 0.0.0.0

tp

ipv6 enable

:/

interface LoopBack0

s:

user-interface con 0

authentication-mode password

ce

set authentication password

ur

cipher %$%$W|$)M5D}v@bY^gK\;>QR,.*d;8Mp>|+EU,:~D~8b59~..*g,%$%$
user-interface vty 0 4

so

authentication-mode aaa

Re

Mo

re

Le

ar

ni

ng

return

Page178

HUAWEI TECHNOLOGIES

HC Series

re

Mo

ni

ar

Le

ng
ur

so

Re
s:

ce
ht
tp
ea

/l

:/

rn

in
g.
hu

aw
ei
.c
om
/e

You might also like