Professional Documents
Culture Documents
No part of this manual may be reproduced or transmitted in any form or by any means without prior
written consent of Hangzhou H3C Technologies Co., Ltd.
Trademarks
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Preface
This document is the Web-based configuration guide for the H3C MSR series routers, and describes
how to visually manage and maintain the H3C MSR series routers through a Web-based interface.
This preface includes:
• Audience
• Conventions
• About the H3C MSR documentation set
• Obtaining documentation
• Technical support
• Documentation feedback
These configuration guides apply to the following models of the H3C MSR series routers:
Model
• MSR 900
MSR 900
• MSR 920
• MSR 930
• MSR 930-GU
MSR 930 • MSR 930-GT
• MSR 930-DG
• MSR 930-SA
• MSR 20-10
• MSR 20-10E
MSR 20-1X • MSR 20-11
• MSR 20-12
• MSR 20-15
• MSR 20-20
MSR 20 • MSR 20-21
• MSR 20-40
• MSR 30-10
• MSR 30-11
• MSR 30-11E
• MSR 30-11F
MSR 30
• MSR 30-16
• MSR 30-20
• MSR 30-40
• MSR 30-60
• MSR 50-40
MSR 50
• MSR 50-60
Audience
This documentation is intended for:
• Network planners
• Field technical support and servicing engineers
• Network administrators working with the routers
Conventions
This section describes the conventions used in this documentation set.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[] Square brackets enclose syntax choices (keywords or arguments) that are optional.
Braces enclose a set of required syntax choices separated by vertical bars, from which
{ x | y | ... }
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars, from
[ x | y | ... ]
which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by vertical
{ x | y | ... } *
bars, from which you select at least one.
Asterisk marked square brackets enclose optional syntax choices separated by vertical
[ x | y | ... ] *
bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&) sign can
&<1-n>
be entered 1 to n times.
GUI conventions
Convention Description
Window names, button names, field names, and menu items are in Boldface. For
Boldface
example, the New User window appears; click OK.
> Multi-level menus are separated by angle brackets. For example, File > Create > Folder.
Symbols
Convention Description
An alert that calls attention to important information that if not understood or followed can
WARNING result in personal injury.
An alert that calls attention to important information that if not understood or followed can
CAUTION result in data loss, data corruption, or damage to hardware or software.
Represents a generic switch, such as a Layer 2 or Layer 3 switch, or a router that supports
Layer 2 forwarding and other Layer 2 features.
MSR Series Routers Web Describe Web software features and configuration
Configuration guides procedures.
Technical support
service@h3c.com
http://www.h3c.com
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.
Contents
i
Configuration procedure ······································································································································ 59
Viewing the general information and statistics of an interface ················································································· 61
ii
Configuring WLAN QoS ········································································································································ 129
Configuring wireless QoS ··········································································································································· 129
Enabling wireless QoS ······································································································································· 129
Setting the SVP service ········································································································································ 129
Setting CAC admission policy ··························································································································· 130
Setting radio EDCA parameters for APs ··········································································································· 131
Setting EDCA parameters for wireless clients ·································································································· 132
Display radio statistics ········································································································································ 133
Displaying client statistics ··································································································································· 135
Setting rate limiting ············································································································································· 137
Wireless QoS configuration example ························································································································ 138
CAC service configuration example ················································································································· 138
Static rate limiting configuration example ········································································································ 139
Dynamic rate limiting configuration example ·································································································· 140
iii
Enabling the blacklist function ··························································································································· 173
Adding a blacklist entry manually ····················································································································· 173
Viewing blacklist entries ····································································································································· 174
Configuring intrusion detection ·································································································································· 174
Attack protection configuration examples ················································································································· 176
Attack protection configuration example for MSR 900/20-1X ······································································ 176
For MSR 20/30/50/930 routers ····················································································································· 179
iv
Configuring DHCP ·················································································································································· 214
Introduction to DHCP ··················································································································································· 214
Recommended configuration procedure···················································································································· 215
Configuring the DHCP server ····························································································································· 215
Configuring the DHCP relay agent···················································································································· 215
Configuring the DHCP client ······························································································································ 216
Enabling DHCP ···························································································································································· 216
Configuring DHCP interface setup ····························································································································· 217
Configuring a static address pool for the DHCP server ··························································································· 218
Configuring a dynamic address pool for the DHCP server ····················································································· 220
Configuring IP addresses excluded from dynamic allocation ················································································· 222
Configuring a DHCP server group ····························································································································· 223
DHCP configuration examples ···································································································································· 224
DHCP configuration example without DHCP relay agent ··············································································· 225
DHCP relay agent configuration example ········································································································ 232
Configuration guidelines ············································································································································· 238
v
Bridging overview ··············································································································································· 285
Major functionalities of bridges ························································································································· 285
VLAN transparency ············································································································································· 289
Configuring bridging ··················································································································································· 289
Recommended basic bridging configuration procedure ················································································· 289
Enabling a bridge set ········································································································································· 289
Adding an interface to a bridge set ·················································································································· 290
Bridging configuration example ································································································································· 291
vi
Displaying ARP entries················································································································································· 354
Creating a static ARP entry ········································································································································· 355
Removing ARP entries ·················································································································································· 355
Enabling learning of dynamic ARP entries ················································································································ 356
Configuring gratuitous ARP ········································································································································· 357
Static ARP configuration example ······························································································································ 357
vii
Importing local users in bulk ······························································································································ 422
Configuring a user group ············································································································································ 423
Viewing user information ············································································································································ 425
Viewing online user information ························································································································ 425
Logging out an online user ································································································································· 425
Viewing history user information ······················································································································· 425
Performing basic configurations for the SSL VPN domain······················································································· 426
Configuring the domain policy ·························································································································· 426
Configuring the caching policy ························································································································· 428
Configuring a bulletin ········································································································································· 428
Configuring authentication policies ··························································································································· 429
Configuring local authentication ······················································································································· 430
Configuring RADIUS authentication ·················································································································· 430
Configuring LDAP authentication ······················································································································· 431
Configuring AD authentication ·························································································································· 433
Configuring combined authentication ··············································································································· 434
Configuring a security policy ······································································································································ 435
Customizing the SSL VPN user interface ··················································································································· 439
Customizing the SSL VPN interface partially ···································································································· 440
Customizing the SSL VPN interface fully ··········································································································· 442
viii
Managing the system ·············································································································································· 491
Managing the configuration ······································································································································· 491
Saving the configuration····································································································································· 491
Restoring factory defaults ··································································································································· 492
Backing up configuration ··································································································································· 492
Restoring configuration ······································································································································· 493
Backing up and restoring device files through the USB port ·········································································· 493
Rebooting the device ··················································································································································· 495
Managing services ······················································································································································· 495
Managing users ··························································································································································· 497
Creating a user ···················································································································································· 498
Setting the super password ································································································································ 499
Switching to the management level ··················································································································· 499
Configuring system time ·············································································································································· 500
Setting the system time ········································································································································ 500
Setting the time zone and daylight saving time ······························································································· 502
Configuring TR-069 ····················································································································································· 503
TR-069 network framework ································································································································ 504
Basic functions of TR-069 ··································································································································· 504
Configuration procedure ···································································································································· 506
Configuration guidelines ···································································································································· 507
Upgrading software ····················································································································································· 507
Upgrading software (for the MSR 900/MSR 20-1X) ······················································································ 507
Upgrading software (for the MSR 20/30/50/930)······················································································· 508
ix
Basic service setup ······················································································································································· 539
Entering the configuration wizard homepage·································································································· 539
Selecting a country ·············································································································································· 539
Configuring local numbers ································································································································· 540
Configuring connection properties ···················································································································· 541
Finishing configuration wizard ·························································································································· 541
x
Configuring call waiting ····································································································································· 581
Configuring call forwarding ······························································································································· 582
Configuring call transfer ····································································································································· 584
Configuring hunt group ······································································································································ 585
Configuring three-party conference ··················································································································· 588
Configuring silent monitor and barge in ·········································································································· 590
xi
Configuring registrar ··········································································································································· 651
Configuring proxy server ···································································································································· 653
Configuring session properties ··································································································································· 653
Configuring source address binding ················································································································· 653
Configuring SIP listening ···································································································································· 655
Configuring media security ································································································································ 656
Configuring caller identity and privacy ············································································································ 657
Configuring SIP session refresh·························································································································· 658
Configuring compatibility ··································································································································· 658
Configuring advanced settings ··································································································································· 660
Configuring the address hiding mode ·············································································································· 660
Specifying the outbound proxy ·························································································································· 660
Configuring registration parameters ················································································································· 661
Configuring voice mailbox server ····················································································································· 663
Configuring signaling security ··························································································································· 664
Configuring call release cause code mapping ········································································································· 665
Configuring PSTN call release cause code mappings ···················································································· 665
Configuring SIP status code mappings ············································································································· 666
SIP connection configuration examples ····················································································································· 666
Configuring basic SIP calling features ·············································································································· 666
Configuring caller ID blocking ··························································································································· 666
Configuring SRTP for SIP calls ···························································································································· 668
Configuring TCP to carry outgoing SIP calls ···································································································· 669
Configuring TLS to carry outgoing SIP calls ····································································································· 670
xii
E1 and T1 voice functions ·································································································································· 701
E1 and T1 interfaces ··········································································································································· 702
Features of E1 and T1········································································································································· 703
Introduction to BSV interface ······························································································································ 703
Configuring digital link management ························································································································ 704
Configuring VE1 line··········································································································································· 704
Configuring VT1 line ··········································································································································· 709
Configuring BSV line ··········································································································································· 711
Displaying ISDN link state ·································································································································· 716
E1 voice DSS1 signaling configuration example ····································································································· 716
xiii
Error processing methods ··································································································································· 767
Timeout processing methods ······························································································································ 767
Various types of secondary calls ······················································································································· 767
Configuring IVR ···························································································································································· 767
Uploading media resource files ························································································································· 767
Importing a media resource through an MoH audio input port ····································································· 768
Configuring the global key policy ······························································································································ 769
Configuring IVR nodes················································································································································· 770
Configuring a call node ····································································································································· 770
Configure a jump node ······································································································································ 773
Configure a service node ··································································································································· 775
Configuring access number management ················································································································· 776
Configuring an access number ·························································································································· 776
Configuring advanced settings for the access number ··················································································· 777
IVR configuration examples ········································································································································ 778
Configure a secondary call on a call node (match the terminator of numbers) ··········································· 778
Configure a secondary call on a call node (match the number length) ························································ 782
Configure a secondary call on a call node (match a number) ······································································ 785
Configure an extension secondary call on a call node ·················································································· 787
Configure a jump node ······································································································································ 789
Configure an immediate secondary call on a service node ··········································································· 791
Configure a secondary call on a service node ································································································ 793
Configure a call node, jump node, and service node ···················································································· 795
Customizing IVR services············································································································································· 801
Create a menu ····················································································································································· 802
Bind an access number ······································································································································· 808
Customize IVR services ······································································································································· 808
Custom IVR service configuration example ······································································································ 809
xiv
IVR information ····························································································································································· 846
Displaying IVR call states ···································································································································· 846
Displaying IVR play states ·································································································································· 847
xv
Web overview
The device provides Web-based configuration interfaces for visual device management and
maintenance.
Figure 1 Web-based network management operating environment
1
Figure 2 Login page of the Web interface
Click Logout in the upper-right corner of the Web interface to quit Web-based network management.
The system will not save the current configuration before you log out of the Web interface. Save the
current configuration before logout.
2
Figure 3 Initial page of the Web interface
3
4
① Navigation area ② Title area ③ Body area
• Navigation area—Organizes the Web function menus in the form of a navigation tree, where you
can select function menus as needed. The result is displayed in the body area.
• Title area—On the left, displays the path of the current configuration interface in the navigation
area; on the right, provides the Save button to quickly save the current configuration, the Help button
to display the Web related help information, and the Logout button to log out of the Web interface.
• Body area—The area where you can configure and display a function.
User level
Web user levels, ranging from low to high, are visitor, monitor, configure, and management. A
higher-level user has all rights of a lower-level user.
• Visitor—Users of this level can perform the ping and traceroute operations, but can neither access
the device data nor configure the device.
• Monitor—Users of this level can only access the device data but cannot configure the device.
• Configure—Users of this level can access data from the device and configure the device, but they
cannot upgrade the host software, add/delete/modify users, or backup/restore the application
file.
• Management—Users of this level can perform any operations for the device.
5
Function menu Description User level
Displays the configuration
information of a WAN
Monitor
interface, and allows you to
WAN view interface statistics.
Interface WAN Interface Setup
Setup Allows you to modify WAN
interface configuration, and
Configure
clear the statistics of a WAN
interface.
Displays configuration
information about an access Monitor
Access Service service.
Displays configuration
information of blacklist, Monitor
whitelist, and user isolation.
Security
Allows you to configure
blacklist, whitelist, and user Configure
isolation.
6
Function menu Description User level
Allows you to configure
wireless QoS and rate
Configure
limiting, and clear radio and
client information.
Displays configuration
information of the country Monitor
Country Code code.
Displays 3G modem
information, UIM card
3G Information Monitor
information, and 3G
network information.
3G
Displays UIM card status. Monitor
PIN Code Management Allows you to manage PIN
Configure
codes.
Displays configurations of
Monitor
the internal server.
NAT Server Setup
NAT Allows you to configure the
NAT Configure
Configurati internal server.
Configuration
on Displays configurations of
the application layer Monitor
protocol check function.
ALG
Allows you to configure the
application layer protocol Configure
check function.
Displays configuration
information about the
Monitor
number of connections
Nat Outbound Setup displayed.
7
Function menu Description User level
Displays the information
about URL filtering Monitor
URL Filter conditions.
8
Function menu Description User level
Allows you to create IPv4
Create Configure
static routes.
Displays DNS
Monitor
configurations.
DNS Configuration
Allows you to configure
Configure
DNS.
DNS Setup
Displays DDNS
Monitor
configurations.
DDNS Configuration
Allows you to add, modify,
Configure
and delete a DDNS entry.
9
Function menu Description User level
Set Allows you to add an IPv4
up Add Configure
ACL.
Displays classifier
Summary Monitor
information.
Displays behavior
Summary Monitor
information.
10
Function menu Description User level
Displays QoS policy
Summary Monitor
information.
11
Function menu Description User level
Displays the brief
Monitor
information of SNMP views.
View Allows you to create,
modify, and remove an Configure
SNMP view.
Displays configuration of
Monitor
access control.
Connection Control
Allows you to configure time
Configure
range-based access control.
Security
Displays custom application
Monitor
configuration.
Application Control
Allows you to customize
Configure
applications.
Displays bandwidth
Monitor
management configuration.
Bandwidth
Allows you to configure
Configure
bandwidth control.
12
Function menu Description User level
Allows you to modify the
MST region-related
Configure
parameters and
VLAN-to-MSTI mappings.
Displays information of an
Monitor
ARP table.
ARP Table
Allows you to add, modify
Configure
and delete ARP entries.
13
Function menu Description User level
Allows you to convert all
dynamic ARP entries to static
Configure
ones or delete all static ARP
entries.
14
Function menu Description User level
Displays CRLs. Monitor
CRL
Allows you to retrieve CRLs. Configure
Displays related
configuration of system Configure
services.
Service Management
Allows you to set whether to
Managem
enable different services and
ent
set related parameters.
Managem
Create User Allows you to create a user.
ent
15
Function menu Description User level
Allows you to modify user Managem
Modify User
account. ent
Managem
Remove User Allows you to remove a user.
ent
Displays SNMP
Monitor
SNMP (supported on the MSR 900 and MSR configuration information.
20-1X series) Allows you to configure
Configure
SNMP.
Displays TR-069
Monitor
TR-069 configurations.
Displays detailed
Monitor
information of system logs.
Loglist
Allows you to clear the log
Configure
buffer.
Displays configurations of
Monitor
the specified loghost.
Loghost
Allows you to set the IP
Configure
address of the loghost.
Syslog
Displays the number of logs
Other that can be stored in the log
buffer; allows you to set the
Monitor
refresh period on the log
Logset information displayed on the
Web interface.
16
Function menu Description User level
Allows you to execute the
Trace Route trace route command and Visitor
view the result.
Displays configuration
information about the Monitor
configuration wizard.
Configuration Wizard Allows you to configure
voice basic parameters
Configure
through the configuration
wizard.
17
Function menu Description User level
Displays call authority
control configuration
information, and the Monitor
maximum number of call
Call Authority Control connections in a set.
Displays connection
properties,session
properties, advanced Monitor
settings, and call release
cause code mappings.
SIP Connection Allows you to configure
connection properties,
Call session properties,
Configure
Connection advanced settings, and call
release cause code
mappings.
Displays global
Monitor
configuration information.
Global Configuration
Advanced Allows you to perform
Configure
Configuration global configurations.
18
Function menu Description User level
Allows you to create local
numbers, call routes, and Configure
manage lines in batches.
Allows you to cancel the configuration on the current page, and go to the
corresponding display page or device information page.
Allows you to select all the entries on a list or all ports on a device panel.
Allows you to clear all the entries on a list or all ports on a device panel.
19
Figure 4 Content display by pages
Searching function
The Web interface provides you with the basic and advanced searching functions to display only the
entries that match specific searching criteria.
• Basic search: As shown in Figure 4, input the keyword in the text box above the list, select a search
item from the drop-down list and click the Search button to display the entries that match the
criteria. Figure 5 shows an example of searching for entries with VLAN ID being 2.
Figure 5 Basic search function example
• Advanced search: Advanced search function: As shown in Figure 4, you can click the Advanced
Search link to open the advanced search page, as shown in Figure 6. Specify the search criteria,
and click Apply to display the entries that match the criteria.
20
Figure 6 Advanced search
Take the ARP table shown in Figure 4 as an example. If you want to search for the ARP entries with
interface being Ethernet 0/4, and IP address range being 192.168.1.50 to 192.168.1.59, follow these
steps:
1. Click the Advanced Search link, specify the search criteria on the advanced search page as shown
in Figure 7, and click Apply. The ARP entries with interface being Ethernet 0/4 are displayed.
Figure 7 Advanced search function example (I)
2. Click the Advanced Search link, specify the search criteria on the advanced search page as shown
in Figure 8, and click Apply. The ARP entries with interface being Ethernet 0/4 and IP address
range being 192.168.1.50 to 192.168.1.59 are displayed as shown in Figure 9.
21
Figure 8 Advanced searching function example (II)
Sorting function
The Web interface provides you with the basic sorting function to display entries in certain orders.
On a list page, you can click the blue heading item of each column to sort the entries based on the
heading item you selected. After your clicking, the heading item is displayed with an arrow beside it as
shown in Figure 10. The upward arrow indicates the ascending order, and the downward arrow
indicates the descending order.
22
Figure 10 Basic sorting function example (based on IP address in the descending order)
Configuration guidelines
• The Web-based configuration interface supports the operating systems of Windows XP, Windows
2000, Windows Server 2003 Enterprise Edition, Windows Server 2003 Standard Edition,
Windows Vista, Windows 7, Linux, and MAC OS.
23
• The Web-based configuration interface supports the browsers of Microsoft Internet Explorer 6.0
SP2 and higher, Mozilla Firefox 3.0 and higher, and Google Chrome 2.0.174.0 and higher.
• The Web-based configuration interface does not support the Back, Next, Refresh buttons provided
by the browser. Using these buttons may result in abnormal display of Web pages.
• The Windows firewall limits the number of TCP connections, when you use IE to log in to the Web
interface, sometimes you may be unable to open the Web interface. To avoid this problem, turn off
the Windows firewall before login.
• If the software version of the device changes, clear the cache data on the browser before logging
in to the device through the Web interface; otherwise, the Web page content may not be displayed
correctly.
• You can display at most 20,000 entries that support content display by pages.
Analysis
• If you use the Microsoft Internet Explorer, you can access the Web interface only when the following
functions are enabled: Run ActiveX controls and plug-ins, script ActiveX controls marked safe for
scripting and active scripting.
• If you use the Mozilla Firefox, you can access the Web interface only when JavaScript is enabled.
24
Figure 11 Internet Explorer setting (I)
25
Figure 12 Internet Explorer setting (II)
26
Figure 13 Firefox Web browser setting
27
Displaying device information
When you are logged in to the Web interface, you are placed on the Device Info page.
The Device Info page contains five parts, which correspond to the five tabs below the figure on the page
except the Services Information and Recent System Logs tabs. When you put your cursor on a part of the
figure, the system prompts you for the tab of the corresponding information, and you can jump to the tab
by clicking this part.
28
Figure 14 Device information
29
Select the refresh mode from the Refresh Period list.
• If you select a specific period, the system periodically refreshes the Device Info page.
• If you select Manual, click Refresh to refresh the page.
Field Description
Device Model Device name.
Running Time Running time after the latest boot of the device.
Field Description
Interface Interface name.
Network-Side Connection
Connection state at the network side of the interface.
State
Uplink Rate (kbps) Average rate in the outgoing direction on the interface in recent 300 seconds.
Downlink Rate (kbps) Average rate in the incoming direction on the interface in recent 300 seconds.
30
Figure 15 3G wireless card state
Field Description
3G Modem Information Connection state of the 3G network.
31
Field Description
State of the UIM card, which can be:
• Absent.
• Being initialized.
• Fault.
• Destructed.
UIM Card State • Personal identification number (PIN) code protection is disabled.
• PIN code protection is enabled. Enter the PIN code for authentication.
• PIN code protection is enabled, and the PIN code has passed the
authentication.
• The PIN code has been blocked. Enter the PIN unlocking key (PUK) code to
unblock it.
State of the 3G network where the UIM card resides, which can be:
• No Service.
• CDMA.
Network Type
• HDR.
• CDMA/HDR HYBRID.
• Unknown.
Field Description
Interface Interface name.
Field Description
SSID (WLAN Name) Name of the WLAN service.
32
Displaying service information
Table 8 Field description
Field Description
Service Name of the service.
Field Description
Time Time when the system logs are generated.
• To change the URL address of the card, click of the target card. Enter the URL address in the field
and click to apply the configuration or click to cancel the modification.
• Properly set the URL address of the card, and then connect the card to the LAN to which the
administrator belongs. On the page as shown in Figure 16, click the Manage button, a page linked
to the specified URL address pops up, and then you can log in to the Web interface of this card to
manage it.
Figure 17 Changing card URL address
33
Basic services configuration
This document guides you through quick configuration of basic services of routers, including configuring
WAN interface parameters, LAN interface parameters, and WLAN interface parameters.
For information about WAN interfaces, see "Configuring WAN interfaces." For information about LAN
interfaces, see "Configuring VLANs." For information about WLAN interfaces, see "Wireless
configuration overview."
34
Ethernet interface
Figure 19 Setting Ethernet interface parameters
Item Description
WAN Interface Select the Ethernet interface to be configured.
Connect Mode: Auto Select the Auto connect mode to automatically obtain an IP address.
Specify the MAC address of the Ethernet interface in either of the two ways:
• Use the MAC address of the device—Use the default MAC address of the
MAC Address Ethernet interface, which is displayed in the brackets.
• Use the customized MAC address—Assign a MAC address in the field to the
Ethernet interface.
Item Description
WAN Interface Select the Ethernet interface to be configured.
Connect Mode: Manual Select the Manual connect mode to configure an IP address.
Specify a DNS server IP address for the interface. Note that DNS server 1 is used
DNS1
before DNS server 2.
35
Item Description
To configure the global DNS server on the page you enter, select Advanced > DNS
Setup > DNS Configuration. The global DNS server has priority over the DNS
DNS2 servers of the interfaces. The DNS query is sent to the global DNS server first. If the
query fails, the DNS query is sent to the DNS server of the interface until the query
succeeds.
Specify the MAC address of the Ethernet interface in either of the two ways:
• Use the MAC address of the device—Use the default MAC address of the
MAC Address Ethernet interface, which is displayed in the brackets.
• Use the customized MAC address—Assign a MAC address in the field to the
Ethernet interface.
Item Description
WAN Interface Select the Ethernet interface to be configured.
Specify the MAC address of the Ethernet interface in either of the two ways:
• Use the MAC address of the device—Use the default MAC address of the
MAC Address Ethernet interface, which is displayed in the brackets.
• Use the customized MAC address—Assign a MAC address in the field to the
Ethernet interface.
36
SA interface
Figure 20 Setting SA parameters
Item Description
WAN Interface Select the SA interface to be configured.
37
ADSL/G.SHDSL interface
Figure 21 Setting ADSL/G.SHDSL parameters
Item Description
WAN Interface Select the ADSL/G.SHDSL interface to be configured.
Item Description
WAN Interface Select the ADSL/G.SHDSL interface to be configured.
Item Description
WAN Interface Select the ADSL/G.SHDSL interface to be configured.
38
Item Description
Connect Mode: PPPoA Select the PPPoA connect mode.
Item Description
WAN Interface Select the ADSL/G.SHDSL interface to be configured.
CE1/PR1 interface
The CE1/PR1 interface operates in two modes: E1 mode and CE1 mode.
1. In E1 mode
39
Figure 22 Setting CE1/PR1 interface parameters (in E1 mode)
Item Description
WAN Interface Select the CE1/PR1 interface to be configured.
2. In CE1 mode
Figure 23 Setting CE1/PR1 interface parameters (in CE1 mode)
40
Table 19 Configuration items (in CE1 mode)
Item Description
WAN Interface Select the CE1/PR1 interface to be configured.
CT1/PR1 interface
Figure 24 Setting CT1/PR1 parameters
Item Description
WAN Interface Select the CT1/PR1 interface to be configured.
41
Item Description
Serial Select the number for the created serial interface.
Cellular interface
Figure 25 Setting Cellular parameters
Item Description
WAN Interface Select the Cellular interface to be configured.
Online for all time Select an idle timeout value from either of the following:
Online according to the • Online for all time—The device is always online.
Idle Timeout value • Online according to the idle timeout value—The device disconnects from the
42
Item Description
server if no data exchange occurs between it and the server within the specified
time. After that, it automatically establishes the connection upon receiving a
Idle Timeout request for accessing the Internet from the LAN.
When Online according to the Idle Timeout value is enabled, specify an idle
timeout value.
Item Description
Display the ID of the VLAN interface to be configured.
IMPORTANT:
VLAN Interface
By default, the VLAN interface on the device that has the smallest number is displayed. If no
VLAN interface is available on the device, the system automatically creates an interface
numbered 1 and displays it.
IP Address
Specify the IP address and a subnet mask for the VLAN interface.
Subnet Mask
Start IP Address Specify the IP address range for dynamic allocation in an extended address pool.
43
Item Description
IMPORTANT:
If the extended address pool is configured on an interface, when a DHCP client's request
End IP Address arrives at the interface, the server assigns an IP address from this extended address pool
only. The client cannot obtain an IP address if no IP address is available in the extended
address pool.
Specify a gateway IP address in the DHCP address pool for DHCP clients.
Gateway IP When accessing a server or host that is not in its network segment, a DHCP client needs
Address the gateway to forward data for it. When you specify a gateway IP address in the
address pool, the DHCP server sends an IP address as well as the gateway IP address to
a requesting client.
DNS Server 1 Specify a DNS server IP address in the DHCP address pool for DHCP clients. Note that
DNS server 1 is used before DNS server 2.
DNS Server 2 To allow DHCP clients to access the Internet through domain names, the DHCP server
needs to send an IP address as well as a DNS server IP address to clients.
Item Description
WLAN Setting Select whether to make WLAN settings.
44
Item Description
Network Name
Specify a wireless network name.
(SSID)
Encrypt Act Select an encryption mode for the wireless network, WEP40 or WEP104.
Key Seed You can either use a key seed to generate keys or enter keys manually. Then, you can
choose one of the configured keys.
Key 1 • When you select WEP40 and ASCII, the generated or entered key is a 5-character
string.
• When you select WEP40 and HEX, the generated or entered key is a 10-digit
Key 2
hexadecimal number.
• When you select WEP104 and ASCII, the generated or entered key is a 13-character
Key 3 string.
• When you select WEP104 and HEX, the generated or entered key is a 26-digit
Key 4 hexadecimal number.
45
Figure 28 Checking the basic service configuration
46
Configuring WAN interfaces
The WAN interfaces that you can configure on the Web interface include Ethernet interfaces, SA
interfaces, ADSL/G.SHDSL interfaces, CE1/PRI interfaces, CT1/PRI interfaces, and cellular interfaces.
Click the icon for an Ethernet interface to enter the page for configuring the Ethernet interface.
47
Figure 30 Configuring an Ethernet interface
Item Description
WAN Interface Displays the name of the Ethernet interface to be configured.
Select Auto as the connection mode. The interface will get an IP address
Connect Mode: Auto
automatically.
Set the MAC address of the Ethernet interface using one of these available options:
• Use the MAC address of the device—Use the default MAC address of the
Ethernet interface, which is displayed in the following brackets.
MAC Address
• Use the customized MAC address—Manually set the MAC address of the
Ethernet interface. When you select this option, you must enter a MAC address in
the field below.
48
Table 25 Configuration items (manual mode)
Item Description
WAN Interface Displays the name of the Ethernet interface to be configured.
Select Manual as the connection mode. In this mode, you must manually assign an
Connect Mode: Manual
IP address and subnet mask to the interface.
Gateway IP Address Configure the next hop for the static route.
DNS1 Assign an IP address to the DNS servers. DNS1 has a higher precedence than
DNS2.
To configure a global DNS server, select Advanced > DNS Setup > DNS
Configuration from the navigation tree. The global DNS server has a higher
DNS2 precedence than all the DNS servers configured on the interfaces. That is, an
interface first sends a query request to the global DNS server. If failing to receive a
response, it sends query requests to the DNS servers configured on the interfaces
one by one.
Set the MAC address of the Ethernet interface using one of these available options:
• Use the MAC address of the device—Use the default MAC address of the
Ethernet interface, which is displayed in the following brackets.
MAC Address
• Use the customized MAC address—Manually set the MAC address of the
Ethernet interface. When you select this option, you must enter a MAC address in
the field below.
Item Description
WAN Interface Displays the name of the Ethernet interface to be configured.
49
Item Description
Displays whether a password is configured for authentication.
Password
If the field displays null, no password is configured for authentication.
Set the MAC address of the Ethernet interface by using one of these available
options:
• Use the MAC address of the device—Use the default MAC address of the
MAC Address Ethernet interface, which is displayed in the following brackets.
• Use the customized MAC address—Manually set the MAC address of the
Ethernet interface. When you select this option, you must enter a MAC address in
the field below.
Configuring an SA interface
SA interface overview
The synchronous/asynchronous serial (SA) interface supports PPP connection mode.
PPP is a link layer protocol that carries packets over point-to-point links. It has been widely used because
it can provide user authentication and allows for easy extension while supporting
synchronous/asynchronous communication.
PPP contains a set of protocols, including a LCP, a NCP, and authentication protocols such as PAP and
CHAP. Among these protocols:
• The LCP is responsible for establishing, tearing down, and monitoring data links.
• The NCP is used for negotiating the packet format and type of data links.
• PAP and CHAP are for network security.
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the icon for the SA interface you want to configure to enter the SA interface
configuration page.
50
Figure 31 Configuring an SA interface
Item Description
WAN Interface Displays the name of the interface to be configured.
51
Configuring an ADSL/G.SHDSL interface
ADSL/G.SHDSL interface overview
The ADSL interface and the G.SHDSL interface support IPoA, IPoEoA, PPPoA, and PPPoEoA.
IPoA
IPoA enables IP packets to traverse an ATM network. In an IPoA implementation, ATM provides the data
link layer for the IP hosts on the same network to communicate with one another, and IP packets must be
adapted in order to traverse the ATM network.
IPoA makes full use of the advantages of ATM, including high speed point-to-point connections, which
help improve the bandwidth performance of an IP network, excellent network performance, and
complete, mature QoS services.
IPoEoA
IPoEoA adopts a three-layer architecture, with IP encapsulation at the uppermost layer, IPoE in the middle,
and IPoEoA at the bottom.
IPoEoA is suitable where Ethernet packets are to be forwarded through an ATM interface. For example,
it works when a network device forwards traffic from an Ethernet across an ATM PVC to a network access
server.
PPPoA
PPPoA enables ATM to carry PPP protocol packets. With PPPoA, PPP packets, in which IP packets or other
protocols' packets can be encapsulated, are encapsulated in ATM cells. In this case, ATM can be simply
viewed as the carrier of PPP packets. As the communication process of PPPoA is managed by PPP, PPPoA
inherits the flexibility and comprehensive applications of PPP.
PPPoEoA
PPPoEoA enables ATM to carry PPPoE protocol packets. With PPPoEoA, Ethernet packets are
encapsulated in ATM cells, through which you can use a PVC to simulate all the functions of Ethernet. To
allow ATM to carry Ethernet frames, the interface management module provides the VE interface. The VE
interface has Ethernet characteristics and can be dynamically created through configuration commands.
The following is the protocol stack adopted by the VE interface:
• ATM PVC at the bottom layer
• Ethernet at the link layer
• Protocols the same as those for a common Ethernet interface at the network layer and upper layers
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the icon for the ADSL/G.SHDSL interface you want to configure to enter
the ADSL/G.SHDSL interface configuration page, as shown in Figure 32.
52
Figure 32 Configuring an ADSL/G.SHDSL interface
Item Description
WAN Interface Displays the name of the ADSL/G.SHDSL interface to be configured.
Item Description
WAN Interface Displays the name of the ADSL/G.SHDSL interface to be configured.
53
Item Description
Display and set the interface status:
• Connected—Indicating that the current interface is up and connected, click
Disable to shut down the interface.
Interface Status • Not connected—Indicating that the current interface is up but not connected,
click Disable to shut down the interface.
• Administratively Down—Indicating that the current interface is shut down by a
network administrator, click Enable to bring up the interface.
Item Description
WAN Interface Displays the name of the ADSL/G.SHDSL interface to be configured.
Item Description
WAN Interface Displays the name of the ADSL/G.SHDSL interface to be configured.
54
Item Description
Display and set the interface status:
• Connected—Indicating that the current interface is up and connected, click
Disable to shut down the interface.
Interface Status • Not connected—Indicating that the current interface is up but not connected,
click Disable to shut down the interface.
• Administratively Down—Indicating that the current interface is shut down by a
network administrator, click Enable to bring up the interface.
55
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the icon for the CE1/PRI interface you want to configure to enter the
CE1/PRI interface configuration page, which varies with the operating mode of the CE1/PRI interface.
Item Description
WAN Interface Displays the name of the CE1/PRI interface to be configured.
56
Configuring a CE1/PRI interface in CE1 mode
Figure 34 Configuring a CE1/PRI interface in CE1 mode
Item Description
WAN Interface Displays the name of the CE1/PRI interface to be configured.
57
Item Description
TCP-MSS Configure the TCP MSS on the interface.
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the icon for a CT1/PRI interface. The page for configuring the interface
appears.
Figure 35 Configuring a CT1/PRI interface
58
Table 34 Configuration items
Item Description
WAN Interface Displays the name of the CT1/PRI interface to be configured.
Configuration procedure
Select Interface Setup > WAN Interface Setup from the navigation tree to enter the WAN interface
configuration page. Click the icon for a cellular interface. The page for configure the cellular
interface appears.
59
Figure 36 Configuring a cellular interface
Item Description
WAN Interface Displays the name of the cellular interface to be configured.
Dialer Number Set a number for the interface dials up the peer.
60
Item Description
Set the idle timeout time for a connection:
• Online for all time—The connection is maintained until being disconnected
manually or upon an anomaly.
• Online according to the Idle Timeout value—The connection is disconnected
Idle Timeout
automatically if no traffic is transmitted or received on the link for a period of time.
The connection will be re-set up when an access to the Internet request is received.
If you select Online according to the Idle Timeout value, you must set the Idle timeout
value.
61
Configuring VLANs
You can configure the following port-based VLAN and VLAN interface functions through the Web
interface:
• Create or delete VLANs.
• Add/remove member ports to/from a VLAN.
• Create or delete VLAN interfaces.
• Configure VLAN interface parameters.
Overview
Ethernet is a network technology based on the CSMA/CD mechanism. As the medium is shared,
collisions and excessive broadcasts are common on Ethernet networks. To address the issue, virtual LAN
(VLAN) was introduced to break a LAN down into separate VLANs. VLANs are isolated from each other
at Layer 2. A VLAN is a bridging domain, and all broadcast traffic is contained within it.
For hosts of different VLANs to communicate, you must use a router or Layer 3 switch to perform Layer 3
forwarding. To achieve this, VLAN interfaces are used. VLAN interfaces are virtual interfaces used for
Layer 3 communication between different VLANs. They do not exist as physical entities on devices. For
each VLAN, you can create one VLAN interface. You can configure VLAN interfaces to forward traffic at
the network layer.
For more information about VLANs and VLAN interfaces, see H3C MSR Series Routers (V5) Layer
2—LAN Switching Configuration Guide.
Step Remarks
1. Creating a VLAN and its VLAN interface. Required.
2. Configuring VLAN member ports. Required.
Step Remarks
1. Creating a VLAN and its VLAN
Required.
interface.
62
Step Remarks
Optional.
Configure an IP address and MAC address for a VLAN
interface. Select whether to enable the DHCP server function for
2. Configuring parameters for a VLAN a VLAN interface. If yes, configure the related parameters.
interface.
You can also configure the DHCP server function in Advanced >
DHCP Setup. For more information, see "Configuring DHCP." This
chapter only describes the DHCP server configuration in the LAN
Setup module.
Item Description
VLAN Create And Remove Set the operation type to Create or Remove.
Enter the ID of the VLAN (or VLAN interface) to be created or removed. You can
VLAN IDs
create or remove multiple VLANs at a time.
Create VLAN Interface Create a VLAN interface when you create a VLAN.
63
Item Description
Only Remove VLAN
Remove the VLAN interface of a VLAN without removing the VLAN.
Interface
Item Description
VLAN ID Select the ID of the VLAN that you want to assign ports to or remove ports from.
64
Figure 39 VLAN interface setup page
Item Description
VLAN ID Select the ID of the VLAN interface you want to configure.
IP Address
Set the VLAN interface's IP address and subnet mask.
Subnet Mask
65
Item Description
Set the MAC address of the VLAN interface:
• Use the MAC address of the device—Use the default MAC address of the VLAN
interface, which is displayed in the following brackets.
MAC Address
• Use the customized MAC address—Manually set the MAC address of the VLAN
interface. When you select this option, you must enter a MAC address in the text
box below.
Set an extended DHCP address pool used for dynamic IP address allocation. The IP
address range is defined by a start IP address and an end IP address.
Start IP Address If an extended address pool is configured on the port that receives the DHCP request
packet, the server allocates an IP address in the extended address pool to the client,
End IP Address
regardless of whether a common address pool (static binding or dynamic allocation)
is also configured on the port. If no IP address is available in the pool, the server will
not be able to allocate an IP address to the client.
Set the gateway IP address allocated to the DHCP clients from the DHCP address
pool.
Gateway IP Address When DHCP clients access servers or hosts on other network segments, their data
needs to be forwarded through the gateway. After specifying a gateway IP address,
the server sends the gateway IP address to the clients along with the IP addresses
allocated to them.
Assign an IP address in the address pool to the DNS server allocated to the DHCP
clients on the local network segment. DNS Server 1 has a higher preference than DNS
DNS Server 1 Server 2.
DNS Server 2 To enable DHCP clients to access hosts on the Internet by domain names, the DHCP
server needs to specify the local DNS server's IP address when assigning IP addresses
to these DHCP clients.
Set the IP addresses that are not to be automatically assigned in the DHCP address
pool.
Do not assign an IP address that is already assigned (gateway IP address or FTP server
Reserved IP Address
IP address for example) to another client. Otherwise, IP address conflict will occur.
After you specify an IP address configured in a static binding as not to be auto
assigned, this address can still be assigned to the client in the static binding.
Configuration guidelines
When you configure VLANs, follow these guidelines:
• VLAN 1 is the default VLAN, which can neither be created nor removed manually.
• Some VLANs are reserved for special purposes. You can neither create nor remove them manually.
• You cannot directly remove protocol-reserved VLANs, voice VLANs, management VLANs, or
dynamically learned VLANs. To remove them, you must remove relevant configurations first.
66
Wireless configuration overview
The device allows you to perform the following configuration in the Web interface:
• Configuring wireless access service
• Displaying wireless access service
• Client mode
• Configuring data transmit rates
• Displaying radio
• Configuring the blacklist and white list functions
• To configure user isolation
• Configuring wireless QoS
• Setting a district code
• Channel busy test
After these configurations, you can build an integrated, stable, secure, effective wireless network.
Overview
Wireless Local Area Network (WLAN) is popular nowadays. Compared with wired LANs, WLANs are
easier and cheaper to implement because only one or several access points (APs) can provide wireless
access for an entire building or area. A WLAN does not necessarily mean that everything is wireless. The
servers and backbones still reside on wired networks. WLANs mainly provide the following services:
• Authentication and encryption to secure wireless access.
• Wireless access and mobility to free users from the restrictions of wires and cables.
Task Remarks
Required.
Configuring wireless service Allows you to create a wireless service and configure
its attributes.
Optional.
Allows you configure a router to access the WLAN as
Client mode a client.
If a router acts as an AP, this configuration is not
required.
Optional.
Configuring radios Allows you configure radio rates to adjust the
capabilities of wireless devices.
67
Task Remarks
Optional.
Configuring WLAN security Allows you to control client access to improve
wireless security.
Optional.
Configuring WLAN QoS Allows you to configure WLAN QoS to make full use
of wireless resources.
Optional.
For more information about WLAN user access, see WLAN Configuration Guide in H3C MSR Series
Routers Configuration Guides (V5).
68
Figure 41 Creating a wireless service
Item Description
Radio Unit Radio ID, 1 or 2.
69
Figure 42 Configuring clear type wireless service
Item Description
Wireless Service Display the selected Service Set Identifier (SSID).
Default VLAN By default, the default VLAN of all ports is VLAN 1. After you set
the new default VLAN, VLAN 1 is the ID of the VLAN whose
packets are to be sent untagged.
IMPORTANT:
SSID HIDE
• If the advertising of the SSID in beacon frames is disabled, the
SSID must be configured for the clients to associate with the
device.
• Disabling the advertising of the SSID in beacon frames does
little good to wireless security. Allowing the advertising of the
SSID in beacon frames enables a client to discover an AP more
easily.
70
Figure 43 Configuring advanced settings for a clear type wireless service
Item Description
Maximum number of clients of an SSID to be associated with the same
radio of the AP.
Client Max Users IMPORTANT:
When the number of clients of an SSID to be associated with the same radio
of the AP reaches the maximum, the SSID is automatically hidden.
Web interface management right of online clients.
• Disable—Disables the Web interface management right of online
Management Right
clients.
• Enable—Enables the Web interface management right of online clients.
Item Description
Authentication
For the clear type wireless service, select Open-System only.
Type
71
Item Description
• mac-authentication—Performs MAC address authentication on users.
• mac-else-userlogin-secure—This mode is the combination of the mac-authentication and
userlogin-secure modes, with MAC authentication having a higher priority. Upon
receiving a non-802.1X frame, a port in this mode performs only MAC authentication;
upon receiving an 802.1X frame, the port performs MAC authentication and then, if
MAC authentication fails, 802.1X authentication.
• mac-else-userlogin-secure-ext—This mode is similar to the mac-else-userlogin-secure
mode, except that it supports multiple 802.1X and MAC authentication users on the port.
• userlogin-secure—In this mode, port-based 802.1X authentication is performed for users;
multiple 802.1X authenticated users can access the port, but only one user can be online.
• userlogin-secure-or-mac—This mode is the combination of the userlogin-secure and
mac-authentication modes, with 802.1X authentication having a higher priority. For a
wireless user, 802.1X authentication is performed first. If 802.1X authentication fails,
MAC authentication is performed.
• userlogin-secure-or-mac-ext—This mode is similar to the userlogin-secure-or-mac mode,
except that it supports multiple 802.1X and MAC authentication users on the port.
Port Mode • userlogin-secure-ext—In this mode, a port performs 802.1X authentication on users in
macbased mode and supports multiple 802.1X users.
IMPORTANT:
There are multiple security modes. To remember them easily, follow these rules to understand
part of the port security modes:
• userLogin indicates port-based 802.1X authentication.
• mac indicates MAC address authentication.
• The authentication mode before Else is used preferentially. If the authentication fails, the
authentication after Else may be used depending on the protocol type of the packets to
be authenticated.
• The authentication mode before Or and that after Or have the same priority. The device
determines the authentication mode according to the protocol type of the packets to be
authenticated. For wireless users, the 802.1X authentication mode is used preferentially.
• userLogin together with Secure indicates MAC-based 802.1X authentication.
• A security mode with Ext allows multiple 802.1X users to pass the authentication. A
security mode without Ext allows only one 802.1X user to pass the authentication.
Max User Maximum number of users that can be connected to the network through a specific port.
72
Figure 44 Configuring MAC authentication
Item Description
Port Mode mac-authentication: MAC-based authentication is performed on access users.
Max User Control the maximum number of users allowed to access the network through the port.
2. Configure userlogin-secure/userlogin-secure-ext:
73
Figure 45 Configuring userlogin-secure/userlogin-secure-ext port security (userlogin-secure is taken
for example)
Item Description
• userlogin-secure—Perform port-based 802.1X authentication for access
users. In this mode, multiple 802.1X authenticated users can access the
Port Mode port, but only one user can be online.
• userlogin-secure-ext—Perform MAC-based 802.1X authentication for
access users. In this mode, the port supports multiple 802.1X users.
Control the maximum number of users allowed to access the network through
Max User
the port.
74
Item Description
• Enable—Enable the multicast trigger function of 802.1X to send multicast
trigger messages to the clients periodically for initiating authentication. By
default, the multicast trigger function is enabled.
• Disable—Disable the 802.1X multicast trigger function.
75
Table 46 Configuration items
Item Description
• mac-else-userlogin-secure—This mode is the combination of the
mac-authentication and userlogin-secure modes, with MAC authentication
having a higher priority. Upon receiving a non-802.1X frame, a port in this mode
performs only MAC authentication. Upon receiving an 802.1X frame, the port
performs MAC authentication and then, if MAC authentication fails, 802.1X
authentication.
• mac-else-userlogin-secure-ext—This mode is similar to the
mac-else-userlogin-secure mode, except that it supports multiple 802.1X and
Port Mode MAC authentication users on the port.
• userlogin-secure-or-mac—This mode is the combination of the userlogin-secure
and mac-authentication modes, with 802.1X authentication having a higher
priority. For a wireless user, 802.1X authentication is performed first. If 802.1X
authentication fails, MAC authentication is performed.
• userlogin-secure-or-mac-ext—This mode is similar to the
userlogin-secure-or-mac mode, except that it supports multiple 802.1X and MAC
authentication users on the port.
Control the maximum number of users allowed to access the network through the
Max User
port.
Select an existing domain from the list. After a mandatory domain is configured, all
802.1X users accessing the port are forced to use the mandatory domain for
authentication, authorization, and accounting.
Mandatory Domain
The default domain is system. To create a domain, select Authentication > AAA from
the navigation tree, click the Domain Setup tab, and type a new domain name in the
Domain Name field.
• EAP—Use EAP. With EAP authentication, the authenticator encapsulates 802.1X
user information in the EAP attributes of RADIUS packets and sends the packets
to the RADIUS server for authentication. It does not need to repackage the EAP
Authentication Method packets into standard RADIUS packets for authentication.
• CHAP—Use CHAP. By default, CHAP is used. CHAP transmits only usernames
but not passwords over the network. Therefore this method is safer.
• PAP—Use PAP. PAP transmits passwords in plain text.
• Enable—Enable the online user handshake function so that the device can
periodically send handshake messages to a user to check whether the user is
Handshake online. By default, the function is enabled.
• Disable—Disable the online user handshake function.
• Enable—Enable the multicast trigger function of 802.1X to send multicast trigger
messages to the clients periodically for initiating authentication. By default, the
multicast trigger function is enabled.
• Disable—Disable the 802.1X multicast trigger function.
76
Item Description
Select an existing domain from the list.
The default domain is system. To create a domain, select Authentication > AAA from
the navigation tree, click the Domain Setup tab, and type a new domain name in the
Domain Name field.
Domain • The selected domain name applies to only the current wireless service, and all
clients accessing the wireless service use this domain for authentication,
authorization, and accounting.
• Do not delete a domain name in use. Otherwise, the clients that access the
wireless service are logged out.
See Table 41 for the configuration items of basic configuration of crypto type wireless service.
77
Figure 48 Configuring advanced settings for crypto type wireless service
Item Description
Maximum number of clients of an SSID to be associated with the same radio of
the AP.
Client Max Users IMPORTANT:
When the number of clients of an SSID to be associated with the same radio of the
AP reaches the maximum, the SSID is automatically hidden.
PTK Life Time Set the PTK lifetime. A PTK is generated through a four-way handshake.
78
Item Description
Enable refreshing the GTK when some client goes offline.
GTK User Down Status
By default, the GTK is not refreshed when a client goes off-line.
Item Description
Link authentication method, which can be:
• Open-System—No authentication. With this authentication mode enabled, all the
clients will pass the authentication.
Authentication • Shared-Key—The two parties must have the same shared key configured for this
Type authentication mode. You can select this option only when WEP encryption mode is
used.
• Open-System and Shared-Key—You can select both open-system and shared-key
authentication.
79
Item Description
• wep40—WEP40 key option.
WEP • wep104—WEP104 key option.
• wep128—WEP128 key option.
Configure the key index, which can be:
• 1—Key index 1.
• 2—Key index 2.
• 3—Key index 3.
Key ID
• 4—Key index 4.
There are 4 static keys in WEP. The key index can be 1, 2, 3 or 4. The key corresponding
to the specified key index will be used for encrypting and decrypting broadcast and
multicast frames.
Key length.
• For wep40, the key is a string of 5 alphanumeric characters or a 10-digit hexadecimal
number.
Key Length • For wep104, the key is a string of 13 alphanumeric characters or a 26-digit
hexadecimal number.
• For wep128, the key is a string of 16 alphanumeric characters or a 32-digit
hexadecimal number.
80
Figure 50 Configuring mac and psk port security
Item Description
mac and psk: MAC-based authentication must be performed on access users first.
If MAC-based authentication succeeds, an access user has to use the
Port Mode
pre-configured PSK to negotiate with the device. Access to the port is allowed
only after the negotiation succeeds.
Control the maximum number of users allowed to access the network through the
Max User
port.
2. Configure psk:
81
Figure 51 Configuring psk port security
Item Description
psk: An access user must use the pre-shared key (PSK) that is pre-configured
Port Mode to negotiate with the device. The access to the port is allowed only after the
negotiation succeeds.
Control the maximum number of users allowed to access the network through
Max User
the port.
• pass-phrase—Enter a PSK in the form of a character string. Enter a string
that can be displayed and is of 8 to 63 characters.
Preshared Key
• raw-key—Enter a PSK in the form of a hexadecimal number. Enter a valid
64-bit hexadecimal number.
3. Configure userlogin-secure-ext:
Perform the configurations as shown in Configure userlogin-secure/userlogin-secure-ext.
82
Security parameter dependencies
In a clear-type wireless service or crypto-type wireless service, the security parameter dependencies are
described in Table 51.
Table 51 Security parameter dependencies
WEP
Service Authenticat Encryption
Security IE encryption Port mode
type ion mode type
/key ID
mac-authentication
mac-else-userlogin-secure
mac-else-userlogin-secure-ext
Open-Syste
Clear Unavailable Unavailable Unavailable userlogin-secure
m
userlogin-secure-ext
userlogin-secure-or-mac
userlogin-secure-or-mac-ext
WEP
encryption is mac and psk
available
Selected Required psk
The key ID
can be 1, 2, userlogin-secure-ext
Open-Syste 3, or 4
m WEP
encryption is
required
Unselected Unavailable mac-authentication
The key ID
can be 1, 2,
3 or 4
WEP
encryption is
required
Crypto Shared-Key Unavailable Unavailable mac-authentication
The key ID
can be 1, 2,
3 or 4
WEP
encryption is mac and psk
required
Selected Required psk
The key ID
can be 2, 3 userlogin-secure-ext
Open-Syste or 4
m and
Shared-Key WEP
encryption is
required
Unselected Unavailable mac-authentication
The key ID
can be 1, 2,
3 or 4
83
Displaying wireless access service
Displaying wireless service
Select Interface Setup > Wireless > Summary from the navigation tree and click the name of the specified
WLAN service to view the detailed information, statistics, or connection history.
Field Description
Service Template Number Current service template number.
The detailed information about WLAN service (crypto type) is as shown in Figure 54. For the description
of the fields in the detailed information, see Table 53.
84
Figure 54 Displaying detailed information about WLAN service (crypto type)
Field Description
Service Template Number Current service template number.
GTK Rekey Method GTK rekey method configured: packet based or time based.
85
Displaying wireless service statistics
Figure 55 Displaying wireless service statistics
Displaying client
Displaying client detailed information
Select Interface Setup > Wireless > Summary from the navigation tree, and click the Client tab to enter
the Client page. Then click the Detail Information tab on the page, and click the name of the specified
client to view the detailed information of the client.
The detailed information about a client is as shown in Figure 57. For the description of the fields in the
client detailed information, see Table 55.
86
Figure 57 Displaying client
Field Description
Field Description
MAC address MAC address of the client.
87
Field Description
State State of the client such as running.
Time for which the client has been associated with the
Up Time
device.
Field Description
Refresh Refresh the current page.
Add the selected client to the static blacklist, which you can
Add to Blacklist display by selecting Security > Filter from the navigation
tree.
Reset Statistic Delete all items in the list or clear all statistics.
88
Displaying client statistics
Select Interface Setup > Wireless > Summary from the navigation tree, and then click the Client tab to
enter the Client page, click the Statistic Information tab on the page, and click the name of the specified
client to view the statistics of the client.
The statistics of a client is as shown in Figure 58. For the description of the fields in the client statistics,
see Table 57.
Figure 58 Displaying client statistics
Field Description
AP Name Name of the associated access point.
89
Displaying RF ping information
Radio Frequency Ping (RF Ping) is a ping function performed on wireless links. This function enables you
to get the connection information between the AP and its associated clients, such as signal strength,
packet re-transmission attempts, and round trip time (RTT).
Select Summary > Client from the navigation tree to enter the Client page, click the Link Test Information
tab on the page, and click the name of the specified client to view the link test information of the client.
Figure 59 Viewing link test information
Field Description
• Rate number for a non-802.11n client.
No./MCS
• MCS value for an 802.11n client.
Rate (Mbps) Rate at which the radio interface sends wireless ping frames.
TxCnt Number of wireless ping frames that the radio interface sent.
RxCnt Number of wireless ping frames that the radio interface received from the client.
Received signal strength indication. This value indicates the client signal strength
RSSI
detected by the AP.
90
Wireless access service configuration examples
Wireless service configuration example
Network requirement
As shown in Figure 60, enable the wireless function on the device to enable the client to access the
internal network resources at any time. More specifically:
• The device provides plain-text wireless access service with SSID service1.
• 802.11g is adopted.
Figure 60 Network diagram
IP network SSID:sevice1
Router
Client
Configuration procedure
1. Configure a wireless service:
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Add to enter the
page for creating a wireless service, as shown in Figure 61:
Figure 61 Creating a wireless service
91
Figure 62 Enabling the wireless service
Configuration guidelines
Follow these guidelines when you configure a wireless service:
• Select a correct district code.
• Make sure the radio unit is enabled.
92
Figure 64 Network diagram
SSID:research
VLAN:2 Client:0040-96b3-8a77
IP network
Router
SSID:office
VLAN:3
Client:0014-6c8a-43ff
Configuration procedure
1. Configure a wireless service named research.
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Create to enter the
page for creating a wireless service.
• Configure the name of the wireless service as research.
• Select the wireless service type crypto.
• Click Apply.
# After the wireless service is created, the system is automatically navigated to the wireless service page,
where you can perform the VLAN settings (before this operation, select Network > VLAN and create
VLAN 2 first).
Figure 65 Setting the VLANs
93
• Select the wireless service type clear.
• Click Apply.
# After the wireless service is created, the system is automatically navigated to the wireless service page,
where you can configure the VLANs (first select Network > VLAN from the navigation tree, and create
VLAN 3).
Figure 66 Setting the VLANs
Configuration procedure
1. Configure a wireless service:
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Add to enter the
page for creating a wireless service, as shown in Figure 68:
94
Figure 68 Creating a wireless service
95
Figure 70 Enabling the wireless service
Configuration procedure
1. Configure a wireless service
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Add to enter the
page for creating a wireless service, as shown in Figure 72:
96
Figure 72 Creating a wireless service
97
Select Interface Setup > Wireless > Access Service from the navigation tree to enter the page for enabling
a wireless service, as shown in Figure 74:
Figure 74 Enabling the wireless service
• Add a local user in the MAC Address box. 00-14-6c-8a-43-ff is used in this example.
• Click Add.
5. Enable 802.11g radio (By default, 802.11g radio is enabled. Therefore, this step is optional. )
Select Interface Setup > Wireless > Radio from the navigation tree to enter the Radio page. Make sure
802.11g is enabled.
98
Figure 76 Network diagram
Configuration procedure
1. Configure wireless service
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Create to enter the
page for creating a wireless service, as shown in Figure 77:
Figure 77 Creating a wireless service
99
Figure 78 Configuring security settings
100
Log in to IMC. Select the Service tab, and then select Access Service > Access Device from the navigation
tree to enter the access device configuration page. Click Add on the page to enter the configuration
page as shown in Figure 80:
• Input expert as the Shared Key.
• Add ports 1812, and 1813 for Authentication Port and Accounting Port.
• Select LAN Access Service for Service Type.
• Select H3C for Access Device Type.
• Select or manually add the access device with the IP address 10.18.1.1.
Figure 80 Adding access device
# Add service.
Select the Service tab, and then select Access Service > Service Configuration from the navigation tree to
enter the add service page. Then click Add on the page to enter the following configuration page. Set the
service name as mac, and keep the default values for other parameters.
Figure 81 Adding service
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to enter the user
page. Then, click Add on the page to enter the page as shown in Figure 82.
101
• Enter username 00-14-6c-8a-43-ff.
• Set the account name and password both as 00-14-6c-8a-43-ff.
• Select the service mac.
Figure 82 Adding account
# Add service.
102
Select the Service tab, and then select User Access Manager > Service Configuration from the navigation
tree to enter the add service page. Then click Add on the page to enter the following configuration page.
Set the service name as mac, and keep the default values for other parameters.
Figure 84 Adding service
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to enter the user
page. Then, click Add on the page to enter the page as shown in Figure 85.
• Enter username 00146c8a43ff.
• Set the account name and password both as 00146c8a43ff.
• Select the service mac.
Figure 85 Adding account
103
Remote 802.1X authentication configuration example
Network requirements
Use IMC as a RADIUS server for AAA. On the RADIUS server, configure the client’s username as user,
password as dot1x, and shared key as expert. The IP address of the RADIUS server is 10.18.1.88.
On the device, configure the shared key as expert, and configure the device to remove the domain name
of a username before sending it to the RADIUS server. The IP address of the device is 10.18.1.1.
Figure 86 Network diagram
Configuration procedure
1. Configure wireless service
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Add to enter the
page for creating a wireless service, as shown in Figure 87:
Figure 87 Creating a wireless service
104
Figure 88 Configuring security settings
105
• Select LAN Access Service for Service Type.
• Select H3C for Access Device Type.
• Select or manually add the access device with the IP address 10.18.1.1.
Figure 89 Adding access device
# Add a service.
Select the Service tab, and then select Access Service > Service Configuration from the navigation tree to
enter the add service page. Then click Add on the page to enter the following configuration page.
• Set the service name as dot1x.
• Set the Certificate Type to EAP-PEAP AuthN and the Certificate Sub Type to MS-CHAPV2 AuthN.
106
Figure 90 Adding a service
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to enter the user
page. Then, click Add on the page to enter the page shown in Figure 91.
• Enter username user.
• Set the account name as user and password as dot1x.
• Select the service dot1x.
Figure 91 Adding account
107
The following takes the IMC (the IMC versions are IMC PLAT 5.0 and IMC UAM 5.0) as an example to
illustrate the basic configurations of the RADIUS server.
# Add an access device.
Log in to IMC. Select the Service tab, and then select User Access Manager > Access Device
Management from the navigation tree to enter the access device configuration page. Click Add on the
page to enter the configuration page as shown in Figure 92:
• Input 12345678 as the Shared Key. keep the default values for other parameters.
• Select or manually add the access device with the IP address 10.18.1.1.
Figure 92 Adding access device
# Add service.
Select the Service tab, and then select User Access Manager > Service Configuration from the navigation
tree to enter the add service page. Then click Add on the page to enter the following configuration page.
Set the service name as dot1x, select EAP-PEAP AuthN as the Certificate Type, and MS-CHAPV2 AuthN
as the Certificate Sub-Type.
Figure 93 Adding service
108
# Add an account.
Select the User tab, and then select User > All Access Users from the navigation tree to enter the user
page. Then, click Add on the page to enter the page as shown in Figure 94.
• Enter username user.
• Set the account name user and password dot1x.
• Select the service dot1x.
Figure 94 Adding account
IP network SSID:11nservice
Router
Client
Configuration procedure
1. Configure a wireless service
# Create a wireless service.
Select Interface Setup > Wireless > Access Service from the navigation tree, and click Add to enter the
page for creating a wireless service, as shown in Figure 96:
109
Figure 96 Creating a wireless service
Configuration guidelines
When you configure 802.11n, follow these guidelines:
• Select Interface Setup > Wireless > Radio from the navigation tree, select the radio unit to be
configured, and click the corresponding icon to enter the radio configuration page, where you
110
can modify the 802.11n-related parameters, including Bandwidth Mode, A-MSDU, A-MPDU, Short
GI, and Client 802.11n Only (permitting only 802.11n users to access the wireless network).
• Make sure 802.11n(2.4GHZ) is enabled.
• Select Interface Setup > Wireless > Radio from the navigation tree to modify the 802.11n rate.
Client mode
The client mode means that a router operating accesses the wireless network as a client. Multiple hosts
or printers in the wired network can access the wireless network through the router.
Figure 98 Client mode
111
NOTE:
• Support for radio mode types depends on your device model.
• You cannot enable an access service or WDS service on a radio interface with the client mode enabled.
• To modify the radio mode, select Radio > Radio from the navigation tree, click the icon of the target
radio, and change the radio mode in the Radio Mode option.
• If the 802.11(2.4GHz) client mode is used, the client can scan 802.11(2.4GHz) wireless services.
With the client mode enabled, you can check the existing wireless services in the wireless service list.
Figure 100 Checking the wireless service list
112
Table 59 Configuration items
Item Description
Specify the network authentication mode, which can be:
• Open System—Open system authentication, namely, no
authentication
AuthMode • Shared Key—Shared key authentication, which requires the
client and the device to be configured with the same shared
key.
• RSN+PSK—PSK authentication
Set the data encryption mode, which can be:
• Clear—No encryption
CipherSuite
• WEP—WEP encryption
• TKIP/CCMP—TKIP/CCMP encryption
Password Configure the WEP key
There are four static keys in WEP. Their key indexes are 1, 2, 3,
KeyID and 4. The key corresponding to the specified key index will be
used for encrypting and decrypting frames.
2. Method II
You can also enter a wireless service to specify the wireless service to be connected on the page
displayed after clicking the Connect icon of the wireless service.
Figure 102 Associating the specified wireless service
Enter the specified wireless service in the Wireless Service Name field, and click Connect. Then the
dialog box in Figure 101 appears. Set the options on the dialog box according to the specified wireless
service type.
Displaying statistics
Select Interface Setup > Wireless Service > Client Mode from the navigation tree and click Statistic
Information to enter the page shown in Figure 103.
Figure 103 Displaying statistics
113
Client mode configuration example
Network requirements
As shown in Figure 104, the router accesses the wireless network as a client. The Ethernet interface of the
router connects to multiple hosts or printers in the wired network, and thus the wired network is connected
to the wireless network through the router.
• The AP accesses the wired LAN, and the router accesses the AP as a client.
• The router accesses the wireless service psk by passing the RSN(CCMP)+PSK authentication.
• Client with MAC address 0014-6c8a-43ff also accesses the wireless service psk.
Figure 104 Network diagram
Internet
Gateway
AP
PSK PSK
Client Client
PSK
Router
PC Printer Client
Configuration procedure
1. Enable the client mode
Select Interface Setup > Wireless Service > Client Mode from the navigation tree and click Connect Setup
to enter the page shown in Figure 105.
114
Figure 105 Enabling the client mode
Select the option corresponding to 802.11g and click Enable. With the client mode enabled, you can
check the existing wireless services in the wireless service list.
Figure 106 Checking the wireless service list
115
Verifying the configuration
On the AP shown in Figure 104, select Interface Setup > Wireless Service > Summary > Client from the
navigation tree to enter the page shown in Figure 108, where you can check that the router is online.
Figure 108 Making sure the workgroup bridge is online
• You can see that the client with MAC address 0014-6c8a-43ff and the router with MAC address
000f-e2333-5510 have been successfully associated with the AP.
• The wired devices on the right (such as printers and PCs) can access the wireless network through
the router.
Configuration guidelines
As shown in Figure 109, if the router uses two radio interfaces at the same time, the client connecting to
radio 2 can access the AP through the router.
Figure 109 Network diagram
Client
2
dio
Gateway AP Ra
Internet Radio1
Ra
dio
2
Client
Configuring radios
802.11b/g operates in 2.4 GHz band, 802.11a in 5 GHz band, and 802.11n in both 2.4 GHz and 5
GHz bands. Each band can be divided into multiple channels for wireless communication. You can
configure and adjust the channels to achieve optimal performance.
To configure a radio, select Interface Setup > Wireless > Radio from the navigation tree to enter the Radio
page, select the desired AP, and click the icon to enter the page for AP radio setup page, as shown
in Figure 110:
116
Figure 110 Configuring radio
Item Description
Radio Unit Selected radios.
Maximum radio transmission power, which varies with country codes, channels,
Transmit Power radio modes and antenna types. If you adopt the 802.11n mode, the maximum
transmit power of the radio also depends on the bandwidth mode.
Specify the working channel of the radio, which varies with radio types and country
codes.
auto: The working channel is automatically selected. If you select this mode, the AP
Channel checks the channel quality in the WLAN network, and selects the channel of the best
quality as its working channel.
If you modify the working channel configuration, the transmit power will be
automatically adjusted.
IMPORTANT:
802.11n
The option is available only when the device supports 802.11n.
802.11n can bond two adjacent 20-MHz channels together to form a 40-MHz
channel. During data forwarding, the two 20-MHz channels can work separately
with one acting as the primary channel and the other acting as the secondary
channel or work together as a 40-MHz channel. This provides a simple way of
doubling the data rate.
By default, the channel bandwidth of the 802.11n radio (5 GHz) is 40 MHz, and
bandwidth mode that of the 802.11n radio (2.4GHz) is 20 MHz.
IMPORTANT:
• If the channel bandwidth of the radio is set to 40 MHz, a 40 MHz channel is used
as the working channel. If no 40 MHz channel is available, a 20 MHz channel is
used. For the specifications, see IEEE P802.11n D2.00.
• If you modify the bandwidth mode configuration, the transmit power will be
automatically adjusted.
If you select the client dot11n-only option, non-802.11n clients are prohibited from
client dot11n-only access. If you want to provide access for all 802.11a/b/g clients, disable this
function.
117
Item Description
Selecting the A-MSDU option enables A-MSDU.
Multiple MSDUs can be aggregated into a single A-MSDU. This reduces the MAC
header overhead, improving MAC layer forwarding efficiency.
A-MSDU Only A-MSDUs can be received.
IMPORTANT:
When 802.11n radios are used in a mesh WLAN, make sure that they have the same
A-MSDU configuration.
Selecting the A-MPDU option enables A-MPDU.
802.11n introduces the A-MPDU frame format. By using only one PHY header, each
A-MPDU can accommodate multiple Message Protocol Data Units (MPDUs) which
have their PHY headers removed. This reduces the overhead in transmission and the
A-MPDU number of ACK frames to be used, and thus improves network throughput.
IMPORTANT:
When 802.11n radios are used in a mesh WLAN, make sure that they have the same
A-MSDU configuration.
Selecting the short GI option enables short GI.
Delays may occur during receiving radio signals due to factors like multi-path
reception. Therefore, a subsequently sent frame may interfere with a previously sent
short GI frame. The GI function is used to avoid such interference. It increases the throughput
by 10 percent.
The short GI function is independent of bandwidth and thus supports both 20MHz
and 40MHz bandwidths.
118
Table 61 Configuration items
Item Description
Preamble is a pattern of bits at the beginning of a frame so that the receiver
can sync up and be ready for the real data. There are two different kinds of
preambles:
• Short preamble. A short preamble improves network performance.
Preamble Therefore, this option is always selected.
• Long preamble. A long preamble ensures compatibility between access
point and some legacy client devices. Therefore, you can select this option
to make legacy client devices support short preamble.
802.11a/802.11n (5 GHz) do not support this configuration.
Adaptive Noise Immunity (ANI). After the ANI function is enabled, the device
automatically adjusts the noise immunity level according to the surrounding
ANI signal environment to eliminate RF interference.
• Enable—Enables ANI.
• Disable—Disables ANI.
Client Max Count Maximum number of clients that can be associated with one radio.
Interval for sending beacon frames. Beacon frames are transmitted at a regular
Beacon Interval interval to allow mobile clients to join the network. Beacon frames are used for
a client to identify nearby APs or network control devices.
Request to send (RTS) threshold length. If a frame is larger than this value, the
RTS mechanism will be used.
RTS is used to avoid data collisions in a WLAN.
A smaller RTS threshold causes RTS packets to be sent more often, thus
consuming more available bandwidth. However, the more often RTS packets
RTS Threshold are sent, the quicker the system can recover from interference or collisions.
In a high-density WLAN, you can decrease the RTS threshold by a rational
value to reduce collisions in the network.
IMPORTANT:
The RTS mechanism occupies bandwidth. Therefore, this mechanism applies only
to data frames larger than the RTS threshold.
Number of beacon intervals between delivery traffic indication message
DTIM Period (DTIM) transmissions. The device sends buffered broadcast/multicast frames
when the DTIM counter reaches 0.
119
Item Description
Number of retransmission attempts for unicast frames larger than the RTS
Long Retry Threshold
threshold.
Number of retransmission attempts for unicast frames smaller than the RTS
Short Retry Threshold
threshold if no acknowledgment is received for it.
Max Receive Duration Interval for which a frame received by a device can stay in the buffer memory.
Item Description
Configure rates (in Mbps) for 802.11a.
By default:
• Mandatory rates—6, 12, and 24.
802.11a • Supported rates—9, 18, 36, 48, and 54.
• Multicast rate—Automatically selected from the mandatory rates. The
transmission rate of multicasts in a BSS is selected from the mandatory rates
supported by all the clients.
120
Item Description
Configure rates (in Mbps) for 802.11b.
By default:
• Mandatory rates—1 and 2.
802.11b • Supported rates—5.5 and 11.
• Multicast rate—Automatically selected from the mandatory rates. The
transmission rate of multicasts in a BSS is selected from the mandatory rates
supported by all the clients.
Item Description
Set the maximum MCS index for 802.11n mandatory rates.
121
For more information about MCS, see WLAN Configuration Guide in H3C MSR Series Routers
Configuration Guides (V5).
Make the MCS configuration the same on all APs in mesh configuration.
Displaying radio
Displaying WLAN services bound to a radio
Select Interface Setup > Wireless > Summary from the navigation tree, click the Radio tab, click the
specified radio unit, and select the Wireless Service tab to view the WLAN services bound to the radio.
Figure 114 Displaying WLAN services bound to the radio
The Noise Floor item in the table indicates various random electromagnetic waves during the wireless
communication. For the environment with a high noise floor, you can improve the signal-to-noise ratio
(SNR) by increasing the transmit power or reducing the noise floor.
122
Figure 115 Displaying detailed radio information
Field Description
WLAN-Radio1/0 current state: UP State of the radio interface.
: 0 duplicates, 3785 FCS errors • Number of discarded packets, number of discarded bytes.
• Number of duplicate frames, number of FCS errors.
: 0 decryption errors
• Number of encryption errors.
123
Field Description
Output packet statistics of the interface:
Output: 3436 packets, 492500 bytes • Number of packets, number of bytes.
: 3116 unicasts, 449506 bytes • Number of unicast packets, number of bytes of unicast
packets.
: 320 multicasts/broadcasts, 42994
bytes • Number of multicasts/broadcast packets, number of bytes of
multicasts/broadcast packets.
: 0 fragmented
• Number of fragmented packets.
: 948 discarded, 100690 bytes
• Number of discarded packets, number of discarded bytes.
: 0 failed RTS, 1331 failed ACK
• Number of failed RTS packets, number of failed ACK
: 4394 transmit retries, 1107 multiple packets.
transmit retries • Number of retransmitted frames, number of transmission
retries
124
Configuring WLAN security
When it comes to security, a WLAN is inherently weaker than a wired LAN because all the wireless
devices use the air as the transmission media, which means that the data transmitted by one device can
be received by any other device within the coverage of the WLAN. To improve WLAN security, you can
use white and black lists and user isolation to control user access and behavior.
125
Figure 116 Configuring dynamic blacklist
Item Description
• Enable—Enables dynamic blacklist.
• Disable—Disables dynamic blacklist.
Dynamic Blacklist IMPORTANT:
Before enabling the dynamic blacklist function, select the Flood Attack Detect option
in the WIDS Setup page.
Configure the lifetime of the entries in the blacklist. When the lifetime of an entry
Lifetime
expires, the entry is removed from the blacklist.
At present, these attacks can be detected through a dynamic blacklist: Assoc-Flood, Reassoc-Flood,
Disassoc-Flood, ProbeReq-Flood, Action-Flood, Auth-Flood, Deauth-Flood and NullData-Flood.
126
Table 66 Configuration items
Item Description
You can configure a static blacklist in the following two ways:
Select the MAC Address option, and then add a MAC address to the static black
MAC Address
list.
Select Current Connect If you select the option, the table below lists the current existing clients. Select the
Client options of the clients to add their MAC addresses to the static blacklist.
Item Description
You can configure a white list in the following two ways:
MAC Address Select the MAC Address option and then add a MAC address to the white list.
Select Current Connect If you select the option, the table below lists the current existing clients. Select the
Client boxes of the clients to add their MAC addresses to the white list.
127
Figure 119 Network diagram
Item Description
• Enable—Enables user isolation on the AP to isolate the clients associated with it
at Layer 2.
User Isolate
• Disable—Disables the user isolation.
By default, wireless user isolation is disabled.
128
Configuring WLAN QoS
An 802.11 network offers wireless access based on the carrier sense multiple access with collision
avoidance (CSMA/CA) channel contention. All clients accessing the WLAN have equal channel
contention opportunities, and all applications carried on the WLAN use the same channel contention
parameters. A live WLAN, however, is required to provide differentiated access services to address
diversified requirements of applications for bandwidth, delay, and jitter.
To provide applications with QoS services, IEEE developed 802.11e for the 802.11-based WLAN
architecture.
While IEEE 802.11e was being standardized, Wi-Fi Alliance defined the Wi-Fi Multimedia (WMM)
standard to allow QoS provision devices of different vendors to interoperate. WMM makes a WLAN
network capable of providing QoS services.
For more information about the WLAN QoS terminology and the WMM protocol, see WLAN
Configuration Guide in H3C MSR Series Routers Configuration Guides (V5).
Select the box in front of the radio unit to be configured, and click Enable. By default, wireless QoS is
enabled.
The WMM protocol is the foundation of the 802.11n protocol. Therefore, when the radio operates in
802.11n (5 GHz) or 802.11n (2.4 GHz) radio mode, you must enable WMM. Otherwise, the associated
802.11n clients may fail to communicate.
129
Figure 122 Enabling Wireless QoS
Find the desired radio in the AP list, and click the icon in the Operation column to enter the page for
setting SVP mapping, as shown in Figure 123.
Figure 123 Setting the SVP mapping AC
Item Description
Radio Selected radio.
Select the SVP Mapping option, and then select the mapping AC to be used by
the SVP service:
• AC-VO.
SVP Mapping • AC-VI.
• AC-BE.
• AC-BK.
SVP mapping is applicable to only non-WMM client access.
130
Figure 124 Setting CAC admission policy
Item Description
Users-based admission policy, namely, maximum number of clients allowed to
be connected. A client is counted only once, even if it is using both AC-VO and
Client Number AC-VI.
By default, the users-based admission policy applies, with the maximum
number of users being 20.
Item Description
Radio Selected radio.
131
Item Description
TXOP Limit Transmission opportunity limit used by the device.
If you select the box before No ACK, the No ACK policy is used by the device.
No ACK
By default, the normal ACK policy is used by the device.
AC-BE 0 3 4 6
AC-VI 94 1 3 4
AC-VO 47 1 2 3
Item Description
Radio Selected radio.
132
Item Description
ECWmax Exponent form of CWmax used by clients.
Enable CAC.
• Enable—Enables CAC.
CAC • Disable—Disables CAC.
AC-VO and AC-VI support CAC, which is disabled by default. This item is not
available for AC-BE or AC-BK, because they do not support CAC.
AC-BE 0 3 4 10
AC-VI 94 2 3 4
AC-VO 47 2 2 3
133
Figure 127 Displaying radio statistics
Field Description
Radio interface WLAN radio interface.
Radio chip QoS mode Radio chip’s support for the QoS mode.
Radio chip max AIFSN Maximum AIFSN allowed by the radio chip.
Radio chip max ECWmin Maximum ECWmin allowed by the radio chip.
Radio chip max TXOPLimit Maximum TXOPLimit allowed by the radio chip.
Radio chip max ECWmax Maximum ECWmax allowed by the radio chip.
134
Field Description
Response policy adopted for CAC-disabled ACs.
CAC-Free's AC Request Policy Response Success indicates that the response is
successful.
SVP packet mapped AC number Number of the AC to which SVP packets are mapped.
ECWmin ––.
ECWmax ––.
AIFSN ––.
TXOPLimit ––.
135
Figure 128 Displaying client statistics
Field Description
MAC address MAC address of the client.
AC Access category.
Assoc State APSD attribute of the four ACs when a client accesses the AP.
136
Setting rate limiting
The WLAN provides limited bandwidth for each device. As the bandwidth is shared by wireless clients
attached to the device, aggressive use of bandwidth by a client will affect other clients. To ensure fair use
of bandwidth, you can rate limit traffic of clients in either of the following two approaches:
• Configure the total bandwidth shared by all clients in the same BSS. This is called dynamic mode.
The rate limit of a client is the configured total rate/the number of online clients. For example, if the
configure total rate is 10 Mbps and five clients are online, the rate of each client is 2 Mbps.
• Configure the maximum bandwidth that can be used by each client in the BSS. This is called static
mode. For example, if the configured rate is 1 Mbps, the rate limit of each user online is 1 Mbps.
When the set rate limit multiplied by the number of access clients exceeds the available bandwidth
provided by the device, no clients can get the guaranteed bandwidth.
Select Interface Setup > Wireless > Wireless QoS from the navigation tree on the left, select the Client
Rate Limit tab, and click Add to enter the page for setting rate limiting, as shown in Figure 129.
Figure 129 Setting rate limiting
Item Description
Wireless Service Existing wireless service.
Inbound or outbound.
• Inbound—From clients to the device.
Direction • Outbound—From the device to clients.
• Both—Includes inbound (from clients to the device) and outbound
(from the device to clients).
137
Wireless QoS configuration example
CAC service configuration example
Network requirements
As shown in Figure 130, an AP with WMM enabled accesses the Ethernet. Enable CAC for the AC-VO
and AC-VI queues of the clients of the fat AP. Use the user number-based admission policy to limit the
number of access users to 10, so that the clients using high-priority queues (including the AC-VO and
AC-VI queues) can be guaranteed of enough bandwidth.
Figure 130 Network diagram
Configuration procedure
1. Configure the access service
For related configurations, see "Wireless access service configuration examples." You can strictly
follow the steps in the related configuration example to configure the wireless service.
2. Configure wireless QoS:
# Select Interface Setup > Wireless > Wireless QoS from the navigation tree, and select the QoS
Service tab to enter the page shown in Figure 131. Make sure WMM is enabled.
Figure 131 Enabling wireless QoS
# Select the radio unit to be configured in the list and click the corresponding icon in the
Operation column to enter the page for configuring wireless QoS. In the Client EDCA list, select the
priority type (AC_VO is taken for example here) to be modified, and click the corresponding
icon in the Operation column to enter the page for setting client EDCA parameters.
Figure 132 Enabling CAC
138
• Click Apply.
# Enable CAC for AC_VI in the same way.
# Select Interface Setup > Wireless > Wireless QoS from the navigation tree, select the QoS Service tab,
find the radio unit to be configured in the list, and click the corresponding icon in the Operation
column to enter the page for configuring wireless QoS.
Figure 133 Setting CAC client number
Configuration procedure
1. Configure the access service:
For the configuration procedure, see "Wireless access service configuration examples." You can
strictly follow the related configuration example to configure the wireless service.
139
2. Configure static rate limiting:
Select Interface Setup > Wireless > Wireless QoS from the navigation tree, click Client Rate Limit,
and click Add to enter the page for configuring rate limit settings for clients, as shown in Figure
135.
Figure 135 Configuring static rate limiting
Configuration procedure
1. Configure the wireless service
For the configuration procedure, see "Wireless access service configuration examples." You can
strictly follow the related configuration example to configure the wireless service.
140
2. Configure dynamic rate limiting
Select Interface Setup > Wireless > Wireless QoS from the navigation tree, click Client Rate Limit,
and click Add to enter the page for configuring rate limit settings for clients, as shown in Figure
137.
Figure 137 Configuring dynamic rate limiting
141
Configuring advanced settings
Radio frequencies for countries and regions vary based on country regulations. A district code
determines characteristics such as frequency range, channel, and transmit power level. Configure the
valid country code or area code for a WLAN device to meet the specific country regulations.
Item Description
Select a district code.
District Code Configure the valid district code for a WLAN device to
meet the country regulations.
If the list is grayed out, the setting is preconfigured to meet the requirements of the target market and is
locked. It cannot be changed.
Support for district code depends on your device model.
142
Figure 139 Configuring channel busy test
Click the icon of a target AP to enter channel busy testing page, as shown in Figure 140.
Figure 140 Testing busy rate of channels
Item Description
Radio Unit Display the radio unit, which takes the value of 1 or 2.
143
Managing 3G
You can connect a router to a 3G modem via the USB interface on the MPU of the router. After connected
to an external UIM card, the 3G modem can access the wireless network provided by China Telecom
and carry out 3G wireless communications.
The router supports 3G modems provided by different venders. As a peripheral, the 3G modem is not a
part of the router. However, you can maintain and manage the 3G modem through the Web interface
of the router.
144
Table 80 3G modem information
Item Description
State of the 3G modem:
• Normal—A 3G modem is connected to the router.
3G Modem State
• Absent or unrecognized modem—No 3G modem is connected to the router or
the modem cannot be recognized.
Item Description
State of the UIM card:
• Absent.
• Being initialized.
• Fault.
UIM Card
• Destructed.
State
• PIN code protection is disabled.
• PIN code protection is enabled. Enter the PIN code for authentication.
• PIN code protection is enabled, and the PIN code has passed the authentication.
• The PIN code has been blocked. Enter the PUK code to unblock it.
Item Description
Mobile Network 3G network where the UIM card resides.
Select 3G > PIN Code Management from the navigation tree to enter the PIN code management page.
The PIN code allows you to perform different operations depending on the UIM card status.
When the PIN code protection is disabled for the UIM card
Figure 143 shows the PIN code management page when the PIN code protection for the UIM card is
disabled. To enable the PIN code protection, enter the PIN code and click Apply. A PIN code contains
4 to 8 digits.
Figure 143 PIN code management page II
When the UIM card has passed the PIN code authentication
Figure 145 shows the PIN code management page in the case that the UIM card has passed the PIN
code authentication. You can do the following operations:
146
• In the Disable PIN Code Protection field, correctly enter the PIN code and click Apply to disable the
PIN code protection for the UIM card.
• In the PIN Code Modification field, correctly enter the current PIN code and the new PIN code twice,
and then click Apply to modify the current PIN code.
Figure 145 PIN code management page IV
When the PUK code needs to be entered to unblock the PIN code of the UIM card
Figure 146 shows the PIN code management page in the case that the PIN code of the UIM card has
been locked and the PUK code needs to be entered.
To unblock the PIN code of the UIM card and set a new PIN code, enter the PUK code correctly and the
new PIN code twice, and then click Apply.
Figure 146 PIN code management page V
147
Configuring NAT
Overview
Network Address Translation (NAT) provides a way of translating an IP address to another IP address for
a packet. In practice, NAT is primarily used to allow private hosts to access public networks. With NAT,
a few public IP addresses are used to translate a large number of internal IP addresses. This effectively
solving the IP address depletion problem.
For more information about NAT, see the Layer 3—IP Services Configuration Guide in H3C MSR Series
Routers Configuration Guide (V5).
Required.
Configuring an internal server You can configure an internal server by mapping a public IP
address and port number to the private IP address and port
number of the internal server.
Optional.
Enabling application layer protocol check Enable NAT to check specified application layer protocols.
By default, all application layer protocols are checked by NAT.
Optional.
Configuring connection limit
Limit the number of connections from a source IP address.
148
Figure 147 Configuring dynamic NAT
Item Description
Interface Specify an interface on which the NAT policy is to be enabled.
Specify the start and the end IP addresses for the NAT address pool.
The start IP address must be lower than the end IP address. If the end IP address and
the start IP address are the same, you specify only one IP address.
IMPORTANT:
Start IP Address
• Only one translation mode can be selected for the same address pool.
End IP Address
• The maximum number of IP addresses contained in an address pool depends on
the device model.
• NAT address pools used by some device models cannot be those used by other
address translation policies, IP addresses of interfaces with Easy IP enabled, or
external IP addresses of internal servers.
149
Configuring a DMZ host
Creating a DMZ host
1. From the navigation tree, select NAT Configuration > NAT Configuration.
2. Click the DMZ HOST tab.
The DMZ host configuration page appears.
Figure 148 Creating a DMZ host
Item Description
Host IP Address Specify the internal IP address of a DMZ host.
150
Figure 149 Enabling DMZ host on an interface
151
Figure 150 Configuring an internal server
Item Description
Interface Specify an interface on which the NAT policy is to be enabled.
Protocol Specify the type of the protocol carried by IP, which can be TCP or UDP.
Host IP Address Specify the internal IP address for the internal server.
152
Item Description
Specify internal port number for the internal server.
From the list, you can:
• Select Other and then enter a port number. If you enter 0, all types of services are
Host Port provided. That is, only a static binding between the external IP address and the
internal IP address is created.
• Select a service and the corresponding port number is provided. You cannot modify
the port number displayed.
Item Description
Enable/disable checking the specified application layer protocols, including DNS, FTP,
PPTP, NBT, ILS, H.323, and SIP.
Protocol Type
IMPORTANT:
Support for the protocol types depends on the device model.
153
Figure 152 Configuring connection limit
Item Description
Enable connection limit Enable or disable connection limit.
Set the maximum number of connections that can be initiated from a source IP
Max Connections
address.
154
2. Configure dynamic NAT on Ethernet 0/2:
a. Select NAT Configuration > NAT Configuration to enter the dynamic NAT configuration page,
as shown in Figure 154.
b. Select Ethernet0/2 from the Interface list.
c. Select PAT from the Translation Mode list.
d. Enter 202.38.1.2 in the Start IP Address filed.
e. Enter 202.38.1.3 in the End IP Address filed.
f. Click Apply.
Figure 154 Configuring dynamic NAT
155
Figure 155 Configuring connection limit
156
Figure 157 Configuring the FTP server
157
Figure 158 Configuring Web server 1
158
Figure 159 Configuring Web server 2
159
Configuring access control
Access control allows you to control access to the Internet from the LAN by setting the time range, IP
addresses of computers in the LAN, port range, and protocol type. All data packets matching these
criteria will be denied access to the Internet.
You can configure up to ten access control policies. They are matched in ascending order of sequence
number. The comparison stops immediately after the system finds one match.
The ten access control policies correspond to ACL 3980 through 3989, respectively, in ascending order
of sequence number. Modifying these ACLs may impact the corresponding access control policies.
Access control is effective only to the outgoing direction of WAN interfaces.
Configuration procedure
Select Security Setup > Access from the navigation tree, and then click the Access Control tab.
Figure 160 Access control
160
Table 88 Configuration items
Item Description
Set the time range of a day for the rule to IMPORTANT:
Begin-End Time take effect. The start time must be earlier
Set both types of time ranges or set neither
than the end time.
of them. To set neither of them, make sure
the Begin-End Time is 00:00 - 00:00 and
Select the days of a week for the rule to no days of a week are selected. Setting
Week
take effect. neither of them means it takes effect all the
time.
Specify to control accesses based on the protocol used for data transmission.
Protocol Three options are available: TCP, UDP, and IP.
For which services use which protocols, see Table 89.
Configure the IP address range of computers. To control a single IP address, enter the
Source IP Address
address in the two fields.
Telnet TCP 23
TFTP UDP 69
Web TCP 80
161
Figure 161 Network diagram
Configuration procedure
# Configure an access control policy to prohibit Host A to Host C from accessing the Internet during work
time.
• Select Security Setup > Access from the navigation tree.
Figure 162 Configure an access control policy
162
Configuring URL filtering
The URL filtering function allows you to deny access to certain Internet webpages from the LAN by setting
keywords and URL addresses.
The URL filtering function applies to only the outbound direction of WAN interfaces.
Configuration procedure
Select Security Setup > URL Filter from the navigation tree to enter the page as shown in Figure 163. Then,
click Add to enter the URL filtering configuration page, as shown in Figure 164.
Figure 163 URL filtering entries
163
Figure 164 URL filtering configuration page
Item Description
Set the URL addresses to be filtered. You IMPORTANT:
URL
can enter a regular expression.
The URL and keyword are in OR relation.
Set the keywords to be filtered. You can When both are configured, the system
Keyword
enter a regular expression. generates two URL filtering conditions.
Import If the Import filter list file box is selected, you can import filtering rules from a file.
filter list File Name Specify the name and path of the file in the local host from which you obtain the file.
file For description of the content format of filter list files, see Figure 164.
164
Figure 165 Network diagram
Configuration procedure
# Configure the URL filtering function.
• Select Security Setup > URL Filter from the navigation tree. Click Add and then perform the
following configurations, as shown in Figure 166.
Figure 166 Configure the URL filtering function
• Select the box before URL and then enter www.webflt.com in the field.
• Click Apply.
165
Configuring MAC address filtering
Use MAC address filtering to match MAC addresses of hosts accessing the network through the device,
and deny or permit hosts with matched MAC addresses to access the network through the device.
MAC address filtering is only applicable to the outgoing direction of Layer 3 Ethernet interfaces and
dialer interfaces.
Item Description
Select a MAC address filtering type:
• Disable MAC address filtering.
• Permit access to the Internet—Enables MAC address filtering to permit only the hosts whose
MAC addresses are on the MAC address list below to access the network through the device.
filtering type • Deny access to the Internet—Enables MAC address filtering to deny the hosts whose MAC
addresses are on the MAC address list below from accessing the network through the device.
IMPORTANT:
A MAC address list appears at the lower part of the page after you select Permit access to the
Internet or Deny access to the Internet.
166
Figure 168 MAC address filtering (permit access to the Internet)
Item Description
Use the customized MAC address Enter the MAC addresses to be filtered or select them from the learned
Use the learned MAC addresses MAC addresses list.
If you select Permit access to the Internet or Deny access to the Internet as the filtering type, the selected
filtering type will take effect as long as you add the MAC addresses for this type, no matter whether or
not you click Apply at the filtering type configuration area on the MAC Address Filtering page.
167
MAC address filtering configuration example
Network requirements
As shown in Figure 170, internal users access the Internet through Router. Configure the MAC address
filtering function to deny users whose MAC addresses are 000d-88f8-0dd7 and 000d-88f7-b8d6 from
accessing the Internet.
Figure 170 Network diagram
Internet
Eth0/1
Router
000d-88f8-0dd7 000d-88f7-b8d6
192.168.1.17 192.168.1.18
Configuration procedure
# Configure the MAC address filtering function.
• Select Security Setup > MAC Address Filtering from the navigation tree and then perform the
following configurations, as shown in Figure 171.
Figure 171 Select MAC address filtering type
168
Figure 172 Specifying the MAC addresses to be denied access to the Internet
169
Configuring attack protection
You can enable the blacklist function, add a blacklist entry manually, view blacklist entries, and configure
intrusion detection in the Web interface.
Overview
Attack protection is an important network security feature. It can determine whether received packets are
attack packets according to the packet contents and behaviors and, if detecting an attack, take measures
to deal with the attack. Protection measures include logging the event, dropping packets, updating the
session status, and blacklisting the source IP address.
Blacklist function
The blacklist function is an attack protection measure that filters packets by source IP address. Compared
with ACL packet filtering, blacklist filtering is simpler in matching packets. Therefore, it filer packets at a
high speed. Blacklist filtering is very effective in filtering packets from certain IP addresses.
One outstanding benefit of the blacklist function is that it allows the device to add and delete blacklist
entries dynamically. This is done by working in conjunction with the scanning attack protection function.
When the device detects a scanning attack according to the packet behavior, it adds the IP address of
the attacker to the blacklist. Therefore, packets from the IP address will be filtered. Blacklist entries added
dynamically will be aged in a specific period of time.
The blacklist function also allows you to add and delete blacklist entries manually. Blacklist entries added
manually can be permanent blacklist entries or non-permanent blacklist entries. A permanent entry will
always exist in the blacklist unless you delete it manually. You can configure the aging time of a
non-permanent entry. After the timer expires, the device automatically deletes the blacklist entry, allowing
packets from the corresponding IP address to pass.
170
Table 93 Types of single-packet attacks
A LAND attacker forges large amounts of TCP SYN packets with both the source
address and destination address being the IP address of the target, causing the target
LAND to send SYN ACK messages to itself and establish half-open connections as a result.
In this way, the attacker may deplete the half-open connection resources of the target,
making it unable to work normally.
A WinNuke attacker sends Out-of-Band (OOB) data packets to the NetBIOS port
(139) of a target running a Windows system. The pointer fields of these attack packets
WinNuke are overlapped, resulting in NetBIOS fragment overlaps. This will cause the target
host that has established TCP connections with other hosts to crash when it processes
these NetBIOS fragments.
Different operating systems process abnormal TCP flags differently. The attacker
sends TCP packets with abnormal TCP flags to the target host to probe its operating
TCP Flag
system. If the operating system cannot process such packets properly, the host will
crash down.
Upon receiving an ICMP unreachable packet, some systems conclude that the
destination is unreachable and drop all subsequent packets destined for the
ICMP Unreachable
destination. By sending ICMP unreachable packets, an attacker can cut off the
connection between the target host and the network.
The Tracert program usually sends UDP packets with a large destination port number
and an increasing TTL (starting from 1). The TTL of a packet is decreased by 1 when
Tracert the packet passes each router. Upon receiving a packet with a TTL of 0, a router sends
an ICMP time exceeded message back to the source IP address of the packet. A
Tracert attacker exploits the Tracert program to figure out the network topology.
A Smurf attacker sends ICMP echo requests to the broadcast address of the target
Smurf network. As a result, all hosts on the target network will reply to the requests, causing
the network congested and hosts on the target network unable to provide services.
A Source Route attacker probes the network structure through the Source Route option
Source Route
in IP packets.
A Route Record attacker probes the network structure through the Record Route option
Route Record
in IP packets.
For some hosts and devices, large ICMP packets will cause memory allocation error
Large ICMP and thus crash down the protocol stack. An attacker can make a target crash down by
sending large ICMP packets to it.
The single-packet attack protection function takes effect to only incoming packets. It analyzes the
characteristics of incoming packets to determine whether the packets are offensive and, if they are
offensive, logs the events and discards the packets. For example, if the length of an ICMP packet reaches
or exceeds 4000 bytes, the device considers the packet a large ICMP attack packet, outputs a warning
log, and discards the packet.
171
Protection against scanning attacks
Scanning attackers usually use some scanning tools to scan host addresses and ports in a network, so as
to find possible targets and the services enabled on the targets and figure out the network topology,
preparing for further attacks to the target hosts.
The scanning attack protection function takes effect to only incoming packets. It monitors the rate at which
an IP address initiates connections to destination systems. If the rate reaches or exceeds 4000
connections per second, it logs the event, adds the IP address to the blacklist, and discards subsequent
packets from the IP address.
172
Step Remarks
You can add blacklist entries manually, or enable the blacklist function
globally, configure the scanning attack protection function, and
enable the blacklist function for scanning attack protection to allow the
device to add the IP addresses of detected scanning attackers to the
blacklist automatically. For configuration of scanning attack
3. Adding a blacklist entry manually protection, see "Configuring intrusion detection."
By default, no blacklist entry exists.
IMPORTANT:
Modifying an automatically added entry will change the type of the
entry to Manual.
4. Viewing blacklist entries Optional.
173
Figure 174 Add a blacklist entry
Item Description
Specify the IP address to be added to the blacklist. This IP address cannot be a
IP Address broadcast address, a class D address, a class E address, 127.0.0.0/8, or
255.0.0.0/8.
Configure the entry as a non-permanent entry and specify the hold time of the
Hold Time
blacklist entry.
Field Description
IP Address IP address of the blacklist entry.
The way in which the blacklist entry was added, Manual or Automatic.
• Manual: The entry was added manually or has been modified after being
added automatically.
Add Method • Automatic: The entry was added automatically by the scanning attack
protection function.
IMPORTANT:
Modifying an automatically added entry will change the type of the entry to Manual.
Start Time The time when the blacklist entry was added.
Hold Time Duration for which the blacklist entry will be held in the blacklist.
Number of packets matching the blacklist entry and therefore dropped by the
Dropped Count
device.
174
policy and then select the specific attack protection functions to be enabled. Then, click Apply to finish the
configuration.
Figure 175 Intrusion detection configuration page
175
Figure 177 Add an intrusion detection policy
176
Figure 178 Network diagram
Configuration procedure
# Configure IP addresses for the interfaces. (Details not shown.)
# Enable the blacklist function.
• Select Security Setup > Attack Defend > Blacklist from the navigation tree, and then perform the
following configurations, as shown in Figure 179.
Figure 179 Enabling the blacklist function
177
Figure 180 Adding a blacklist entry for Host D
178
Figure 182 Configuring intrusion detection
179
• Router provides scanning attack protection and automatically adds detected attackers to the
blacklist on interface Ethernet 0/2, the interface connecting the Internet.
• Router provides Land attack protection and Smurf attack protection on Ethernet 0/2.
Figure 183 Network diagram
Configuration procedure
# Configure IP addresses for the interfaces. (Details not shown.)
# Enable the blacklist function.
• Select Security Setup > Attack Defend > Blacklist from the navigation tree, and then perform the
following configurations, as shown in Figure 184.
Figure 184 Enabling the blacklist function
180
Figure 185 Adding a blacklist entry for Host D
181
Figure 187 Configuring intrusion detection
182
Configuring application control
You can load applications, configure a custom application, and enable application control in the Web
interface.
Application control allows you to control which applications and protocols users can access on the
Internet by specifying the destination IP address, protocol, operation type, and port. Application control
can be based on a group of users or all users in a LAN. This chapter describes the application control
based on all users. For application control based on user group, see "Configuring user groups."
The application control function applies to only the outbound direction of WAN interfaces.
Required.
3. Enabling application control Enable application control for specified applications or protocols
globally.
Loading applications
Select Security Setup > Application Control from the navigation tree, and then select the Load
Application tab to enter the page for loading applications, as shown in Figure 188.
• To load an application control file from the device, select From Device, select the application control
file, and then click Apply.
• To load an application control file from the local host to the device, select From Local, click Browse
to find the file, and then click Apply.
After the file is loaded to the device successfully, all the loaded applications will be displayed at the
lower part of the page.
183
Figure 188 Loading applications
184
Table 96 Configuration items
Item Description
Application Name Specify the name for the custom application.
Specify the protocol to be used for transferring packets, including TCP, UDP, and All.
Protocol
All means all IP carried protocols.
185
Application control configuration example
Network requirements
As shown in Figure 192, internal users access the Internet through Router. Configure application control
on Router, so that no user can use MSN.
Figure 192 Network diagram
Configuration procedure
# Load the application control file (assume that signature file p2p_default.mtd, which can prevent using
of MSN, is stored on the device).
• Select Security Setup > Application Control from the navigation tree, and then select the Load
Application tab and perform the following configurations, as shown in Figure 193.
Figure 193 Loading the application signature file
• Select the From Device option, and select file p2p_default from the list.
• Click Apply. Figure 194 shows the loaded applications.
186
Figure 194 Loaded applications
187
Web page redirection configuration
Overview
With web page redirection configured on an interface, a user accessing a web page through the
interface for the first time is forcibly led to a specified web page. That is, the web access request of the
user is redirected to the specified URL. After that, the user can access network resources normally. If the
user sends a web access request after a specified time interval, the specified web page is displayed
again.
This feature is applicable to scenarios where a hotel or carrier wants to push an advertisement web page
periodically to users.
Select Advanced > Redirection from the navigation tree to enter the page shown in Figure 196. The web
page redirection configuration information is displayed on the page. Click Add to enter the configuration
page shown in Figure 197.
Figure 196 Redirection page
188
Figure 197 Redirection URL configuration page
Item Description
Interface Select an interface on which web page redirection is to be enabled.
Type the address of the web page to be displayed, that is, the URL to which the web
Redirection URL
access request is redirected. For example, http://192.0.0.1.
Interval Type the time interval at which web page redirection is triggered.
189
Configuring routes
The term "router" in this chapter refers to both routers and Layer 3 switches. This chapter mainly describes
IPv4 route configuration.
You can perform the following route configurations through the Web interface:
• Creat a static route.
• Display the active route table.
Overview
Upon receiving a packet, a router determines the optimal route based on the destination address and
forwards the packet to the next router in the path. When the packet reaches the last router, it then
forwards the packet to the destination host.
Routing provides the path information that guides the forwarding of packets.
A router selects optimal routes from the routing table, and sends them to the forwarding information base
(FIB) table to guide packet forwarding. Each router maintains a routing table and a FIB table.
You can manually configure routes. Such routes are called static routes.
For more information about the routing table and static routes, see Layer 3—IP Routing Configuration
Guide in H3C MSR Series Routers Configuration Guide (V5).
Configuring routes
Creating an IPv4 static route
1. Select Advanced > Route Setup from the navigation tree.
2. Click the Create tab.
The page for configuring static routes appears.
190
Figure 198 Static route configuration page
Item Description
Destination IP Address Enter the destination IP address of the static route, in dotted decimal notation.
Enter a preference value for the static route. The smaller the number, the higher
the preference.
Preference For example, specifying the same preference for multiple static routes to the
same destination enables load sharing on the routes, while specifying different
preferences enables route backup.
Next Hop Enter the next hop IP address of the static route, in dotted decimal notation.
191
Displaying the active route table
Select Advanced > Route Setup from the navigation tree to display the Summary tab.
Figure 199 Active route table
Field Description
Destination IP Address Destination IP address of the route.
Routing protocol that discovered the route, including static route, direct
Protocol
route, and various dynamic routing protocols.
Output interface of the route. Packets destined for the destination IP address
Interface
are forwarded out of the interface.
192
Figure 200 Network diagram
Configuration considerations
1. Configure a default route with Router B as the next hop on Router A.
2. On Router B, configure one static route with Router A as the next hop and the other with Router C
as the next hop.
3. Configure a default route with Router B as the next hop on Router C.
Configuration procedure
1. Configure the IP addresses of the interfaces. (Details not shown.)
2. Configure a default route on Router A:
a. Select Advanced > Route Setup from the navigation tree of Router A.
b. Click the Create tab.
c. Enter 0.0.0.0 for Destination IP Address, 0 for Mask, and 1.1.4.2 for Next Hop.
d. Click Apply.
The newly created static route is listed at the lower part of the page.
3. Configure two static routes on Router B:
a. Select Advanced > Route Setup from the navigation tree of Router B.
193
b. Click the Create tab.
c. Enter 1.1.2.0 for Destination IP Address, 24 for Mask, and 1.1.4.1 for Next Hop.
d. Click Apply.
e. Enter 1.1.3.0 for Destination IP Address, 24 for Mask, and 1.1.5.6 for Next Hop.
f. Click Apply.
The newly created static route is listed at the lower part of the page.
4. Configure a default route on Router C:
a. Select Advanced > Route Setup from the navigation tree or Router C.
b. Click the Create tab.
c. Enter 0.0.0.0 for Destination IP Address, 0 for Mask, and 0 for Mask.
d. Click Apply.
The newly created static route is listed at the lower part of the page.
5. Configure the IP addresses of the hosts and configure the default gateways of Host A, Host B, and
Host C as 1.1.2.3, 1.1.6.1, and 1.1.3.1. (Details not shown.)
6. Verify the configuration:
# Display the active route table.
From the navigation tree of Router A, Router B, and Router C, select Advanced > Route Setup to
display the Summary tab. Verify that the newly created static routes are displayed in the active
route table.
# Ping Host A from Host B (assuming both hosts run Windows XP).
C:\Documents and Settings\Administrator>ping 1.1.2.2
Trace complete.
194
Configuration guidelines
When you configure a static route, follow these guidelines:
• If you do not specify the preference, the default preference is used. Reconfiguration of the default
preference applies only to newly created static routes. The Web interface does not support
configuration of the default preference.
• If you specify the next hop address first and then configure it as the IP address of a local interface,
such as an Ethernet interface and VLAN interface, the static route does not take effect.
• When you specify the output interface, note the following:
If Null 0 or a loopback interface is specified as the output interface, there is no need to
configure the next hop.
If a point-to-point interface is specified as the output interface, you do not need to specify the
next hop, and there is no need to change the configuration after the peer address has changed.
For example, a PPP interface obtains the peer's IP address through PPP negotiation. Therefore,
you only need to specify it as the output interface.
If the output interface is an NBMA or P2MP interface, which supports point-to-multipoint
networks, the IP address-to-link layer address mapping must be established. H3C recommends
specifying the next hop when you configure it as the output interface.
If you want to specify a broadcast interface (such as an Ethernet interface, virtual template, or
VLAN interface) as the output interface, which can have multiple next hops, you must specify
the next hop at the same time.
195
Configuring user-based load sharing
You can configure user-based load sharing through the Web interface.
Overview
A routing protocol can have multiple equal-cost routes to the same destination. These routes have the
same preference, and are all used to accomplish load sharing if no route with a higher preference is
available.
The device supports user-based load sharing based on the user information (source IP addresses) of
packets.
196
Table 100 Configuration items
Item Description
Interface Name of the interface where user-based load sharing will be configured.
Status of
Set whether to enable user-based load sharing on the interface.
user-based-sharing
Bandwidth The load ratio of each interface is calculated based on the bandwidth of each
interface. For example, if the bandwidth of Ethernet 0/0 is set to 200 kbps, and that
of Ethernet 0/1 is set to 100 kbps, then the load ratio is 2:1.
197
Configuring traffic ordering
You can do the following to configure traffic ordering on the Web interface:
• Setting the traffic ordering interval
• Specifying the traffic ordering mode
• Displaying internal interface traffic ordering statistics
• Displaying external interface traffic ordering statistics
Overview
When multiple packet flows (classified by their source addresses) are received or sent by a device, you
can configure IP traffic ordering on the device to collect statistics of the flows in the inbound/outbound
direction, and then rank the statistics. The network administrator can use the traffic ordering statistics to
analyze the network usage for network management.
You can specify an interface as an external or internal interface to collect traffic statistics:
• An internal interface collects both inbound and outbound traffic statistics, including the following:
Total traffic statistics
Total inbound/outbound traffic statistics
Inbound/outbound TCP packet statistics
Inbound/outbound UDP packet statistics
Inbound/outbound ICMP packet statistics
• An external interface collects only the total inbound traffic statistics.
Required.
Specify an interface as an internal or external interface to
2. Specifying the traffic ordering mode.
collect traffic statistics.
By default, an interface does not collect traffic statistics.
3. Displaying internal interface traffic
Optional.
ordering statistics.
You can view the traffic ordering statistics of internal or
4. Displaying external interface traffic
external interfaces.
ordering statistics.
198
Setting the traffic ordering interval
Select Advanced > Traffic Ordering from the navigation tree to enter the default configuration page. You
can set the interval for collecting traffic statistics in the lower part of the page.
Figure 204 Traffic ordering configuration page
199
Select one item from the Arrange in list, enter a number in the Number of entries displayed field, and
then click Refresh to display the list as needed.
Figure 205 Internal interface traffic ordering statistics page
200
Configuring DNS
Overview
Domain Name System (DNS) is a distributed database that provides TCP/IP applications with the
mappings between host names and IP addresses. With DNS, you can use easy-to-remember host names
in some applications and let the DNS server translate them into correct IP addresses.
For more information about DNS, see Layer 3—IP Services Configuration Guide in H3C MSR Series
Routers Configuration Guide (V5).
DNS provides the following functions:
• Dynamic domain name resolution—Implemented by querying the DNS server.
• DNS proxy—Forwards DNS requests and replies between the DNS client and DNS server.
Required.
Specifying a DNS server Not specified by default.
You can specify up to six DNS servers.
Optional.
A suffix is used when the name to be resolved is incomplete. The
system can supply the missing part. For example, a user can
configure com as the suffix for aabbcc.com. The user only needs
Configuring a domain name suffix to enter aabbcc to obtain the IP address of aabbcc.com because
the system adds the suffix and delimiter before passing the name
to the DNS server.
Not configured by default.
You can configure up to ten DNS suffixes.
Optional.
Clear the dynamic IPv4 domain name cache.
The DNS client stores latest mappings between domain names
Clearing the dynamic domain name cache and IP addresses in the dynamic domain name cache. The DNS
client searches the cache for a repeated query rather than sends
a request to the DNS server. The mappings are aged out from the
cache after a certain time. You can also manually clear the
cache.
201
Configuring DNS proxy
Task Remarks
Required.
Enabling DNS proxy Enable DNS proxy on the device.
Disabled by default.
Required.
Specifying a DNS server Not specified by default.
You can specify up to six DNS servers.
202
3. Click Apply.
Item Description
DNS Server IP Address Enter the IP address of a DNS server.
203
Table 102 Configuration items
Item Description
DNS Domain Name Suffix Configure a domain name suffix.
Router B
DNS client 4.1.1.1/24
DNS server
2.1.1.1/24
Router A
DNS proxy
2.1.1.2/24 1.1.1.1/24
IP network
3.1.1.1/24
host.com
Host
Before performing the following configuration, make sure the device and the host are routable to each
other, and the IP addresses of the interfaces are configured as shown in Figure 210.
This configuration may vary with different DNS servers. The following configuration is performed on a PC
running Windows server 2000.
204
Figure 211 Creating a zone
205
Figure 213 Adding a mapping between domain name and IP address
206
Figure 215 Specifying a DNS server address
207
Figure 217 Specifying the DNS server address
208
Configuring DDNS
Overview
Although DNS allows you to access nodes in networks using their domain names, it provides only the
static mappings between domain names and IP addresses. When you use the domain name to access
a node whose IP address has changed, your access fails because DNS leads you to the IP address that
is no longer where the node resides.
Dynamic Domain Name System (DDNS) can dynamically update the mappings between domain names
and IP addresses for DNS servers to direct you to the latest IP address corresponding to a domain name.
DDNS can only dynamically update the mappings between domain names and IPv4 addresses but not
IPv6 addresses.
Figure 219 DDNS networking application
As shown in Figure 219, DDNS works on the client-server model comprising the DDNS client and the
DDNS server.
• DDNS client—A device that needs to update the mapping between the domain name and the IP
address dynamically on a DNS server. An Internet user usually uses the domain name to access an
application layer server such as an HTTP and FTP server. When its IP address changes, the
application layer server runs as a DDNS client that sends a request to the DDNS server for updating
the mapping between the domain name and the IP address.
• DDNS server—Informs the DNS server of latest mappings. When receiving the mapping update
request from a DDNS client, the DDNS server tells the DNS server to re-map between the domain
name and IP address of the DDNS client. Therefore, the Internet users can use the same domain
name to access the DDNS client even if the IP address of the DDNS client has changed.
The DDNS update process does not have a unified standard and depends on the DDNS server that the
DDNS client contacts. The well-known DDNS service providers include www.3322.org, www.oray.cn
(also known as the PeanutHull server), and www.dyndns.com.
The device can act as a DDNS client to dynamically update the latest mapping between its domain name
and IP address on the DNS server through a DDNS server at www.3322.org or www.oray.cn for
example.
209
Configuration prerequisites
• Visit the website of a DDNS service provider, register an account, and apply for a domain name for
the DDNS client.
• Specify the primary IP address of the interface and make sure the DDNS server and the interface
can reach each other.
• Configure static or dynamic domain name resolution to translate the domain name of the DDNS
server into its IP address.
Configuration procedure
1. From the navigation tree, select Advanced > DNS Setup > DDNS Configuration to enter the DDNS
page, as shown in Figure 220.
2. Click Add.
Figure 220 Configuring DDNS page
Item Description
Domain Name Specify the DDNS entry name, which is the only identifier of the DDNS entry.
210
Item Description
Server Provider Select the DDNS server provider, which can be 3322.org or PeanutHull.
Specify the server name of the DDNS server for domain name resolution.
IMPORTANT:
After the server provider is selected, the DDNS server name appears
Server Name automatically. For example, if the server provider is 3322.org, the server name is
members.3322.org. If the server provider is PeanutHull, the server name is
phservice2.oray.net. Use the default server name for the server provider
3322.org. The server provider PeanutHull can use phservice2.oray.net,
phddns60.oray.net, client.oray.net, or ph031.oray.net as the server name.
Server
Settings Specify the interval for sending DDNS update requests after DDNS update is
enabled.
IMPORTANT:
• A DDNS update request is immediately initiated when the primary IP
Interval address of the interface changes or the link state of the interface changes
from down to up, no matter whether the interval is reached.
• If you specify the interval as 0, your device does not periodically initiate any
DDNS update request, but initiates a DDNS update request when the
primary IP address of the interface is changed or the link state of the interface
changes from down to up.
Account Username Specify the username used for logging in to the DDNS server.
Settings Password Specify the password used for logging in to the DDNS server.
211
Figure 222 Network diagram
212
h. Click Apply.
After the preceding configuration is completed, Router notifies the DNS server of its new domain
name-to-IP address mapping through the DDNS server provided by www.3322.org whenever its
IP address changes. Therefore, Router can always provide Web service at whatever.3322.org.
213
Configuring DHCP
Introduction to DHCP
The Dynamic Host Configuration Protocol (DHCP) provides a framework to assign configuration
information to network devices.
DHCP uses the client/server model. Figure 224 shows a typical DHCP application.
Figure 224 A typical DHCP application
A DHCP client can obtain an IP address and other configuration parameters from a DHCP server on
another subnet through a DHCP relay agent, as shown in Figure 225.
Figure 225 A typical DHCP relay agent application
For more information about DHCP, see Layer 3—IP Services Configuration Guide in H3C MSR Series
Routers Configuration Guide (V5).
214
Recommended configuration procedure
Configuring the DHCP server
Task Remarks
Required.
Enabling DHCP Enable DHCP globally.
Disabled by default.
Optional.
For detailed configuration, see "Configuring DHCP interface setup."
Enabled by default.
Configuring the DHCP server on an
IMPORTANT:
interface
The DHCP server configuration is supported only on a Layer 3 Ethernet
interface (or subinterface), virtual Ethernet interface, VLAN interface,
Layer 3 aggregate interface, serial interface, ATM interface,
MP-group interface, or loopback interface.
Required.
Configuring a static address pool for the
DHCP server An address pool can be either static or dynamic, but not both.
IMPORTANT:
When a DHCP client tries to obtain an IP address through a DHCP
Configuring a dynamic address pool for relay agent, an IP address pool on the same network segment as the
the DHCP server DHCP relay agent interface must be configured. Otherwise, the DHCP
client fails to obtain an IP address.
Optional.
Exclude IP addresses from automatic allocation in the DHCP address
pool.
To avoid address conflicts, the DHCP server excludes IP addresses
Configuring IP addresses excluded from used by the gateway or FTP server from dynamic allocation.
dynamic allocation By default, all IP addresses in the address pool, except the IP address
of the DHCP server, can be assigned automatically.
IMPORTANT:
If a static bound IP address is excluded from automatic allocation, it is
still assignable to the bound user.
215
Task Remarks
Required.
To improve reliability, you can specify several DHCP servers as a
Configuring a DHCP server group group on the DHCP relay agent and correlate a relay agent interface
with the server group. When the interface receives DHCP requests
from clients, the relay agent forwards them to all the DHCP servers of
the group.
Required.
For the detailed configuration, see "Configuring DHCP interface
setup."
By default, the interface works as DHCP server.
IMPORTANT:
Configure the DHCP relay agent on the
current interface and correlate it with • At present, the DHCP relay agent configuration is supported only
the DHCP server group. on a Layer 3 Ethernet interface (or subinterface), virtual Ethernet
interface, VLAN interface, Layer 3 aggregate interface, or serial
interface.
• If the DHCP relay agent is enabled on an Ethernet subinterface, a
packet received from a client on this interface must contain a VLAN
tag, and the VLAN tag must be consistent with the VLAN ID of the
subinterface. Otherwise, the packet is discarded.
Enabling DHCP
Select Advanced > DHCP Setup from the navigation tree to enter the default DHCP Enable page as shown
in Figure 226.
216
Figure 226 DHCP Enable
Item Description
DHCP Enable or disable DHCP globally.
Item Description
Interface Select an interface to be configured.
217
Item Description
Correlate the relay agent interface with a DHCP server group.
DHCP server group You can correlate a DHCP server group with multiple interfaces. Make sure that
you have already added DHCP server groups for selection.
218
Figure 228 Static address pool setup for the DHCP server
5. Configure the static address pool for the DHCP server as described in Table 106.
6. Click Apply.
Table 106 Configuration items
Item Description
Pool Name Name of the static DHCP address pool.
Address Allocation
Specify the static address allocation mode for the DHCP address pool.
Mode: Static Binding
219
Item Description
IP address and its subnet mask of the static binding. A natural mask is adopted if no
IP Address subnet mask is specified.
IMPORTANT:
Subnet Mask It cannot be the IP address of the DHCP server interface. Otherwise, IP address conflicts
may occur, and the client cannot obtain the IP address.
MAC Address A client's MAC address of the static binding.
Gateway IP Address DHCP clients that want to access hosts outside the local subnet needs a gateway to
forward data. After specifying a gateway in the address pool, the DHCP server
assigns the gateway address along with an IP address to a client.
Standby DNS Server Specify a standby DNS server for the DHCP client.
220
Figure 229 Dynamic address pool setup for the DHCP server
5. Configure the dynamic address pool for the DHCP server as described in Table 107.
6. Click Apply.
Table 107 Configuration items
Item Description
Pool Name Name of the dynamic DHCP address pool.
221
Item Description
IMPORTANT:
Subnet Mask Make sure the IP address is on the same network segment as the IP address of
the DHCP server interface or the DHCP relay agent interface to avoid wrong IP
address allocation.
Specify the lease for IP addresses to be assigned.
NOTE:
Lease Duration • If the lease has an end time specified later than the year 2106, the system
considers it an expired lease.
• The lease duration does not have the inherit attribute.
Specify a domain name suffix for the DHCP client.
Domain Name After specifying a domain name in the address pool, the DHCP server assigns
the domain name along with an IP address to a client.
Primary DNS Server In order for clients to access the Internet using a domain name, the DHCP
server assigns the specified DNS server address along with an IP address to
a client.
Standby DNS Server Specify a standby DNS server for the DHCP client.
222
Figure 230 IP address excluded from dynamic allocation setup
Item Description
Start IP Address Specify the lowest IP address excluded from dynamic allocation.
End IP Address The end IP address must not be lower than the start IP address. A higher end IP
address and a lower start IP address specify an IP address range while two identical
IP addresses specify a single IP address.
223
Figure 231 DHCP server group setup
Item Description
DHCP server group ID.
Group ID
You can create at most 20 DHCP server groups.
Specifies the DHCP server IP addresses for the DHCP server group.
224
DHCP configuration example without DHCP relay agent
Network requirements
The DHCP server (Router A) assigns IP addresses to clients on subnet 10.1.1.0/24, which is subnetted into
10.1.1.0/25 and 10.1.1.128/25.
The IP addresses of Ethernet 0/1 and Ethernet 0/2 on Router A are 10.1.1.1/25 and 10.1.1.129/25
respectively.
In subnet 10.1.1.0/25, the lease is ten days and twelve hours, the domain name suffix is aabbcc.com, the
DNS server address is 10.1.1.2/25, and the gateway address is 10.1.1.126/25.
In subnet 10.1.1.128/25, the lease is five days, the domain name suffix is aabbcc.com, the DNS server
address is 10.1.1.2/25, and the gateway address is 10.1.1.254/25.
Subnets 10.1.1.0/25 and 10.1.1.128/25 have the same domain name suffix and DNS server address.
Therefore, the domain name suffix and DNS server address must be configured only for subnet
10.1.1.0/24. Subnet 10.1.1.0/25 and 10.1.1.128/25 can inherit the configuration of subnet 10.1.1.0/24.
Router B (DHCP client) obtains a static IP address, DNS server address, and gateway address from
Router A (DHCP server).
Figure 232 DHCP network without a DHCP relay agent
225
Figure 233 Enabling DHCP
226
Figure 234 DHCP static address pool configuration
b. Select the Server option in the Type field and expand the Assignable IP Addresses node.
c. Enter pool-static in the Pool Name field and select the Static Binding option in the Address
Allocation Mode field.
d. Enter 10.1.1.5 in the IP Address field and select the Subnet Mask box, and then enter
255.255.255.128.
e. Enter 000f-e200-0002 in the MAC Address field and select the Gateway IP Address box, and
then enter 10.1.1.126.
f. Select the Primary DNS Server box, and then enter 10.1.1.2.
g. Click Apply.
5. Configure DHCP address pool 0 (including the address range, client domain name suffix and DNS
server address):
227
Figure 235 DHCP address pool 0 configuration
228
Figure 236 DHCP address pool 1 configuration
229
Figure 237 DHCP address pool 2 configuration
230
Figure 238 Excluding IP addresses from dynamic allocation
b. Enter 10.1.1.2 in the Start IP Address field, enter 10.1.1.2 in the End IP Address field, click
Apply, enter 10.1.1.126 in the Start IP Address field, as shown in Figure 238, enter
10.1.1.126 in the End IP Address field, click Apply, enter 10.1.1.254 in the Start IP Address
field, as shown in Figure 238, and enter 10.1.1.254 in the End IP Address field.
c. Click Apply.
231
Figure 239 Enabling the DHCP client on interface Ethernet 0/1
232
Figure 240 Network diagram
233
Figure 242 DHCP server group creating
234
2. Enable DHCP:
a. Select Advanced > DHCP Setup from the navigation tree of Router B
b. Enter the default DHCP Enable tab, as shown in Figure 244.
235
Figure 245 Dynamic DHCP address pool configuration
b. Select the Server option in the Type field and expand the Assignable IP Addresses node.
c. Enter pool1 in the Pool Name field and select the Dynamic Allocation option in the Address
Allocation Mode field.
d. Enter 10.10.1.0 in the IP Address field, select the Subnet Mask box, and then enter
255.255.255.0.
e. Set the Lease Duration to 7 days, 0 hours, and 0 minutes.
f. Select the Domain Name box, and then enter aabbcc.com.
g. Select the Gateway IP Address box, and then enter 10.10.1.126.
h. Select the Primary DNS Server box, and then enter 10.10.1.2.
i. Click Apply.
5. Exclude IP addresses from dynamic allocation (DNS server and gateway addresses):
a. Expand the Forbidden IP Addresses node, as shown in Figure 246.
236
Figure 246 IP address excluded from dynamic allocation configuration
237
Figure 247 Enabling the DHCP client on interface Ethernet 0/1
Configuration guidelines
1. If multiple VLAN interfaces sharing one MAC address request IP addresses using DHCP, the DHCP
server cannot be a Windows 2000 server or a Windows 2003 server.
2. To remove a DHCP server group that is associated with multiple interfaces, cancel the associations
first.
238
Configuring ACLs
Overview
An access control list (ACL) is a set of rules (or permit or deny statements) for identifying traffic based on
criteria such as source IP address, destination IP address, and port number.
ACLs are essentially used for packet filtering. A packet filter drops packets that match a deny rule and
permits packets that match a permit rule. ACLs are also widely used by many modules (for example, QoS
and IP routing) for traffic identification.
IPv4 ACLs fall into the following categories, as shown in Table 110.
Table 110 IPv4 ACL categories
Ethernet frame Layer 2 header fields, such as source and destination MAC
4000 to 4999
header ACLs addresses, 802.1p priority, and link layer protocol type
For more information about IPv4 ACL, see H3C MSR Series Routers (V5) ACL and QoS Configuration
Guide.
239
Adding an IPv4 ACL
Select Advanced > QoS Setup > ACL IPv4 from the navigation tree and then select the Add tab to enter
the IPv4 ACL configuration page.
Figure 248 The page for adding an IPv4 ACL
Item Description
Set the number of the IPv4 ACL you want to configure. The value range for the ACL number
ACL Number
is 2000 to 2999.
240
Figure 249 The page for configuring an basic IPv4 ACL
Item Description
Select the basic IPv4 ACL for which you want to configure rules.
ACL
ACLs available for selection are basic IPv4 ACLs.
Select the Rule ID box, and enter a number for the rule.
If you do not specify the rule number, the system will assign one automatically.
Rule ID
If the rule number you specify already exists, the following operations modify the
configuration of the rule.
Select the action to be taken on the IPv4 packets matching the rule:
Action • Permit—Allows matched packets to pass.
• Deny—Drops matched packets.
Select this box to apply the rule only to non-first fragments.
Check Fragment
If you do not select this box, the rule applies to all fragments and non-fragments.
Check Logging A log entry contains the ACL rule number, action on the matched packets, protocol
that IP carries, source/destination address, source/destination port number, and
number of matched packets.
Source IP Address Select the Source IP Address box, and enter a source IPv4 address and source
241
Item Description
Source Wildcard wildcard, in dotted decimal notation.
Select the time range during which the rule takes effect.
Time Range The time ranges available for selection must have been created at the CLI on the
router.
242
Figure 250 The page for configuring an advanced IPv4 ACL
243
Table 113 Configuration items
Item Description
Select the advanced IPv4 ACL for which you want to configure
rules.
You can use command line interface to create advanced IPv4
ACL ACLs. For more information, see H3C MSR Series Routers (V5)
ACL and QoS Configuration Guide. Also, when you configure
advanced bandwidth limit and advanced bandwidth
guarantee, the system automatically creates advanced IPv4
ACLs. For more information, see "Configuring QoS."
Select the Rule ID box, and enter a number for the rule.
If you do not specify the rule number, the system assigns one
Rule ID automatically.
If the rule number you specify already exists, the following
operations modify the configuration of the rule.
Source IP Address Select the Source IP Address box, and enter a source IPv4
Source Wildcard address and source wildcard, in dotted decimal notation.
IP Address Filter
Destination IP Address Select the Source IP Address box and enter a source IP address
Destination Wildcard and source wildcard, in dotted decimal notation.
Protocol If you select 1 ICMP, you can configure the ICMP message type
and code. If you select 6 TCP or 17 UDP, you can configure the
TCP or UDP specific items.
ICMP Type These items are available only when you select 1 ICMP from the
Protocol list.
ICMP Type
If you select Other from the ICMP Message list, you must enter
ICMP Code values in the ICMP Type and ICMP Code fields. Otherwise, the
two fields will take the default values, which cannot be changed.
244
Item Description
Select this box to make the rule match packets used for
establishing and maintaining TCP connections.
TCP Connection These items are available only when you select 6 TCP from the
Established Protocol list.
A rule with this item configured matches TCP connection packets
with the ACK or RST flag.
Source Select the operators and, enter the source port numbers and
destination port numbers as required.
TCP/UDP Port These items are available only when you select 6 TCP or 17 UDP
from the Protocol list.
Different operators have different configuration requirements for
the port number fields:
Destination • Not Check—The following port number fields cannot be
configured.
• Range—The following port number fields must be configured
to define a port range.
• Other values—The first port number field must be configured
and the second must not.
Time Range Select the time range during which the rule takes effect.
245
Figure 251 The page for configuring a rule for an Ethernet frame header ACL
Item Description
Select the Ethernet frame header IPv4 ACL for which you want to configure
rules.
ACL You can use command line interface to create Ethernet frame header IPv4
ACLs. For more information, see H3C MSR Series Routers (V5) ACL and
QoS Configuration Guide.
Select the Rule ID box, and enter a number for the rule.
If you do not specify the rule number, the system will assign one
Rule ID automatically.
If the rule number you specify already exists, the following operations
modify the configuration of the rule.
246
Item Description
Select the action to be performed for IPv4 packets matching the rule:
Action • Permit—Allows matched packets to pass.
• Deny—Drops matched packets.
Source MAC
Address Select the Source MAC Address box, and enter a source MAC address and
wildcard.
MAC Source Mask
Address
Filter Destination MAC
Address Select the Destination MAC Address box, and enter a destination MAC
address and wildcard.
Destination Mask
LSAP Type Select the LSAP Type box, and specify the DSAP and SSAP fields in the LLC
encapsulation by configuring the following items:
Time Range Select the time range during which the rule takes effect.
Configuration guidelines
When you configure an ACL, follow these guidelines:
• You cannot create a rule with or modify a rule to have the same permit/deny statement as an
existing rule in the ACL.
• You can only modify the existing rules of an ACL that uses the match order of config. When you
modify a rule of such an ACL, you may choose to change just some of the settings, in which case
the other settings remain the same.
247
Configuring QoS
Overview
Quality of Service (QoS) is a concept concerning service demand and supply. It reflects the ability to
meet customer needs. Generally, QoS focuses on improving services under certain conditions rather than
grading services precisely.
In an Internet, QoS evaluates the ability of the network to forward packets of different services. You can
base the evaluation on different criteria because the network may provide various services. Generally,
QoS refers to the ability to provide improved service by solving the core issues such as delay, jitter, and
packet loss ratio in the packet forwarding process.
Through the Web interface, you can configure the following QoS features:
• Subnet limit
• Advanced limit
• Advanced queue
Subnet limit
Subnet limit enables you to regulate the specification of traffic entering or leaving a device based on
source/destination IP address. Packets conforming to the specification can pass through, and packets
exceeding the specification are dropped. In this way, the network resources are protected.
Advanced limit
Similar to subnet limit, advanced limit also implements traffic policing at the IP layer. They differ in that:
• Advanced limit can classify traffic based on time range, packet precedence, protocol type, and
port number, and provide more granular services.
• In addition to permitting traffic conforming to the specification to pass through, advanced limit can
also set IP precedence, differentiated service code point (DSCP) value, and 802.1p priority for
packets as required.
For more information about IP precedence, DSCP values, and 802.1p priority, see "Appendix Packet
priorities."
Advanced queue
Advanced queue offers the following functions:
• Interface bandwidth limit—Uses token buckets for traffic control and limits the rate of transmitting
packets (including critical packets) on an interface. When limiting the rate of all packets on an
248
interface, interface bandwidth limit is a better approach than subnet limit and advanced limit. This
is because working at the IP layer the latter two functions do not take effect on packets not
processed by the IP layer.
• Bandwidth guarantee—When congestion occurs to a port, class-based queuing (CBQ) classifies
packets into different classes according to user-defined match criteria and assigns these classes to
their queues. Before assigning packets to a queue, CBQ performs bandwidth restriction check.
When being dequeued, packets are scheduled by WFQ.
Advanced queue applies to only outgoing packets of interfaces.
249
Table 115 Configuration items
Item Description
Start Address
Set the address range of the subnet where rate limit is to be performed.
End Address
250
Figure 255 Advanced limit setting
251
Table 116 Configuration items
Item Description
Description Configure a description for the advanced limit policy for management sake.
Specify the type of priority to be re-marked for packets conforming to the specification
and allowed to pass through:
• None—Does not re-marks any priority of packets.
Remark Type • 802.1p—Re-marks the 802.1p priority of packets and specifies the 802.1p priority
value.
• IP—Re-marks the IP precedence of packets and specifies the IP precedence value.
• DSCP—Re-marks the DSCP of packets and specifies the DSCP value.
Define a rule to match packets based on their IP addresses.
Add multiple IP addresses/masks to the field. Click Add or Delete to add or delete IP
addresses/masks to/from the field.
IP Address/Mask • When you specify the direction Download, the source IP address of packets is
matched.
• When you specify the direction Upload, the destination IP address of packets is
matched.
Inbound Interface Define a rule to match packets received on the specified interface.
Set the time range when the advanced limit policy takes effect. The begin-end time
Time Range
and days of the week are required to set.
Custom Type Define a rule to match packets based on self-defined protocol types.
Source Port You should select the transport layer protocol type and set the source service port
range and destination service port range.
Destination Port
252
Configuring advanced queue
To use the advanced queue function on tunnel interfaces, sub-interfaces, or VT and dialer interfaces with
PPPoE, PPPoA, PPPoEoA, or PPPoFR at the data link layer, you must configure interface bandwidth for
these interfaces.
Item Description
Interface Name Select the interface to be configured.
253
Item Description
Set the average traffic rate allowed for the interface.
H3C recommends that you configure the interface bandwidth to be smaller than
the actual available bandwidth of a physical interface or logical link.
If you have specified the interface bandwidth, the maximum interface bandwidth
used for bandwidth check when CBQ enqueues packets is 1000000 kbps. If you
have not specified the interface bandwidth, the maximum interface bandwidth
varies by interface type following these rules:
Interface Bandwidth • If the interface is a physical one, the actual baudrate or rate applies.
• If the interface is T1/E1, MFR or any other type of logical serial interface
formed by timeslots or multiple links, the total bandwidth of all member
channels/links applies.
• If the interface is a template interface, such as a VT interface, a dialer
interface, a BRI interface, or a PRI interface, 1000000 kbps applies.
• If the interface is a virtual interface of any other type, a tunnel interface for
example, 0 kbps applies.
254
Figure 257 Creating a bandwidth guarantee policy
255
Table 118 Configuration items
Item Description
Description Configure a description for the bandwidth guarantee policy for management sake.
Inbound Interface Define a rule to match packets received on the specified interface.
Set the time range when the bandwidth guarantee policy takes effect. The begin-end
Time Range
time and days of the week are required to set.
Custom Type Define a rule to match packets based on self-defined protocol types.
Source Port Select the transport layer protocol type and set the service source port range and
destination port range.
Destination Port
256
QoS configuration examples
Subnet limit configuration example
Network requirements
As shown in Figure 258, limit the rate of packets leaving Ethernet 1/1 of Router.
Perform per-IP rate limiting for traffic sourced from Host A through Host Z, which are on the network
segments 2.1.1.1 through 2.1.1.100, with the per-IP limit being 5 kbps.
Figure 258 Network diagram
Configuration procedure
# Configure the bandwidth limit settings for the network segment.
• Select Advance > QoS Setup > Subnet Limit from the navigation tree, and click Add on the
displayed page.
Figure 259 Configuring subnet limit
257
• Enter 2.1.1.100 in the End Address field.
• Select interface Ethernet 1/1.
• Enter 5 in the CIR field.
• Select Per IP in the Type list.
• Select Upload from the Direction list.
• Click Apply.
Configuration procedure
1. Configure Router A:
# Perform AF for traffic with DSCP fields AF11 and AF21.
• Select Advance > QoS Setup > Advanced Queue from the navigation tree, and click Add on the
displayed page.
258
Figure 261 Configuring assured forwarding
259
Figure 262 Configuring expedited forwarding
260
Appendix Packet priorities
IP precedence and DSCP values
Figure 263 DS field and ToS field
As shown in Figure 263, the ToS field of the IP header contains eight bits: the first three bits (0 to 2)
represent IP precedence from 0 to 7. According to RFC 2474, the ToS field of the IP header is redefined
as the differentiated services (DS) field, where a differentiated service code point (DSCP) value is
represented by the first six bits (0 to 5) and is in the range 0 to 63. The remaining two bits (6 and 7) are
reserved.
Table 119 Description on IP precedence
1 001 priority
2 010 immediate
3 011 flash
4 100 flash-override
5 101 critical
6 110 internet
7 111 network
10 001010 af11
12 001100 af12
14 001110 af13
18 010010 af21
20 010100 af22
22 010110 af23
26 011010 af31
261
DSCP value (decimal) DSCP value (binary) Keyword
28 011100 af32
30 011110 af33
34 100010 af41
36 100100 af42
38 100110 af43
8 001000 cs1
16 010000 cs2
24 011000 cs3
32 100000 cs4
40 101000 cs5
48 110000 cs6
56 111000 cs7
0 000000 be(default)
802.1p priority
802.1p priority lies in the Layer 2 packet header and is applicable to occasions where Layer 3 header
analysis is not needed and QoS must be assured at Layer 2.
Figure 264 An Ethernet frame with an 802.1q tag header
As shown in Figure 264, the 4-byte 802.1q tag header consists of the TPID (two bytes in length), whose
value is 0x8100, and the TCI (two bytes in length). Figure 265 shows the format of the 802.1q tag header.
The priority in the 802.1q tag header is called "802.1p priority," because its use is defined in IEEE
802.1p.
Figure 265 801.1q tag header
262
Table 121 Description on 802.1p priority
1 001 background
2 010 spare
3 011 excellent-effort
4 100 controlled-load
5 101 video
6 110 voice
7 111 network-management
263
Configuring SNMP
Overview
The Simple Network Management Protocol (SNMP) is an Internet standard protocol widely used for a
management station to access and operate the devices on a network, regardless of their vendors,
physical characteristics and interconnect technologies.
The SNMP framework comprises the following elements:
• SNMP manager—Works on an NMS to monitor and manage the SNMP-capable devices in the
network.
• SNMP agent—Works on a managed device to receive and handle requests from the NMS, and
send traps to the NMS when some events, such as interface state change, occur.
H3C supports SNMPv1, SNMPv2c, and SNMPv3. An NMS and an SNMP agent must use the same
SNMP version to communicate with each other.
• SNMPv1—Uses community names for authentication. To access an SNMP agent, an NMS must use
the same community name as set on the SNMP agent. If the community name used by the NMS is
different from the community name set on the agent, the NMS cannot establish an SNMP session to
access the agent or receive traps and notifications from the agent.
• SNMPv2c—Uses community names for authentication. SNMPv2c is compatible with SNMPv1, but
supports more operation modes, data types, and error codes.
• SNMPv3—Uses a user-based security model (USM) to secure SNMP communication. You can
configure authentication and privacy mechanisms to authenticate and encrypt SNMP packets for
integrity, authenticity, and confidentiality.
For more information about SNMP, see H3C MSR Series Routers Network Management and Monitoring
Configuration Guide.
264
Task Remarks
Required.
The SNMP agent function is disabled by default.
Enabling the SNMP agent function
IMPORTANT:
If SNMP the agent function is disabled, all SNMP agent-related
configurations are removed.
Optional.
Configuring an SNMP view After creating SNMP views, you can specify an SNMP view for
an SNMP group to limit the MIB objects that can be accessed by
the SNMP group.
Optional.
Allows you to configure that the agent can send SNMP traps to
Configuring SNMP trap function the NMS, and configure information about the target host of the
SNMP traps.
By default, an agent is allowed to send SNMP traps to the NMS.
Configuring SNMPv3
Task Remarks
Required.
The SNMP agent function is disabled by default.
Enabling the SNMP agent function
IMPORTANT:
If the SNMP agent function is disabled, all SNMP agent-related
configurations are removed.
Optional.
Configuring an SNMP view After creating SNMP views, you can specify an SNMP view for
an SNMP group to limit the MIB objects that can be accessed by
the SNMP group.
Required.
After creating an SNMP group, you can add SNMP users to the
Configuring an SNMP group group when creating the users. Therefore, you can realize
centralized management of users in the group through the
management of the group.
Required.
Configuring an SNMP user Before creating an SNMP user, you need to create the SNMP
group to which the user belongs.
Optional.
Allows you to configure that the agent can send SNMP traps to
Configuring SNMP trap function the NMS, and configure information about the target host of the
SNMP traps
By default, an agent is allowed to send SNMP traps to the NMS.
265
Enabling the SNMP agent function
1. Select Advanced > SNMP from the navigation tree to enter the SNMP configuration page, as
shown in Figure 266.
On the upper part of the page, you can select to enable or disable the SNMP agent function and
configure parameters such as SNMP version.
On the lower part of the page, you can view the SNMP statistics, which helps you understand the
running status of the SNMP after your configuration.
Figure 266 Setup tab
266
Table 122 Configuration items
Item Description
SNMP Specify to enable or disable the SNMP agent function.
Local Engine ID The validity of a user after it is created depends on the engine ID of the SNMP agent. If
the engine ID when the user is created is not identical to the current engine ID, the user
is invalid.
Maximum Packet
Configure the maximum size of an SNMP packet that the agent can receive or send.
Size
Set a character string to describe the contact information for system maintenance.
Contact If the device is faulty, the maintainer can contact the manufacture factory according to
contact information for the device.
Location Set a character string to describe the physical location of the device.
267
Figure 268 Creating an SNMP view (1)
Table 123 describes the configuration items for creating an SNMP view. After configuring the parameters
of a rule, click Add to add the rule into the list box at the lower part of the page. After configuring all rules,
click Apply to create an SNMP view. The view will not be created if you click Cancel.
Table 123 Configuration items
Item Description
View Name Set the SNMP view name.
Set the MIB subtree OID (such as 1.4.5.3.1) or name (such as system).
MIB Subtree OID MIB subtree OID identifies the position of a node in the MIB tree, and it can
uniquely identify a MIB subtree.
Click the icon corresponding to the specified view on the page as shown in Figure 267. The Add rule
for the view ViewDefault window appears as shown in Figure 270. After configuring the parameters,
click Apply to add the rule for the view. Table 123 describes the configuration items for creating an
SNMP view.
268
Figure 270 Adding rules to an SNMP view
You can also click the icon corresponding to the specified view on the page as shown in Figure 267,
and then you can enter the page to modify the view.
269
Table 124 Configuration items
Item Description
Community Name Set the SNMP community name.
270
Figure 274 Creating an SNMP group
Item Description
Group Name Set the SNMP group name.
Select the security level for the SNMP group. The available security levels are:
• NoAuth/NoPriv—No authentication no privacy.
• Auth/NoPriv—Authentication without privacy.
Security Level
• Auth/Priv—Authentication and privacy.
IMPORTANT:
The security level for an existing SNMP group cannot be modified.
Read View Select the read view of the SNMP group.
Select the notify view of the SNMP group, that is, the view that can send trap messages.
Notify View
If no notify view is configured, the agent does not send traps to the NMS.
Associate a basic ACL with the group to restrict the source IP address of SNMP packets,
ACL that is, you can configure to allow or prohibit SNMP packets with a specific source IP
address, so as to restrict the intercommunication between the NMS and the agent.
271
Figure 275 SNMP user
1. Click Add to enter the Add SNMP User page, as shown in Figure 276.
Figure 276 Creating an SNMP user
Item Description
User Name Set the SNMP user name.
Select the security level for the SNMP group. The available security
levels are:
Security Level • NoAuth/NoPriv—No authentication no privacy.
• Auth/NoPriv—Authentication without privacy.
• Auth/Priv—Authentication and privacy.
272
Item Description
Select an SNMP group to which the user belongs:
• When the security level is NoAuth/NoPriv, you can select an
SNMP group with no authentication no privacy.
Group Name
• When the security level is Auth/NoPriv, you can select an
SNMP group with no authentication no privacy or
authentication without privacy.
• When the security level is Auth/Priv, you can select an SNMP
group of any security level.
Authentication Password Set the authentication password when the security level is
Auth/NoPriv or Auth/Priv.
Confirm Authentication Password The confirm authentication password must be the same with the
authentication password.
Privacy Password Set the privacy password when the security level is Auth/Priv.
The confirm privacy password must be the same with the privacy
Confirm Privacy Password
password.
Associate a basic ACL with the user to restrict the source IP address
of SNMP packets, that is, you can configure to allow or prohibit
ACL SNMP packets with a specific source IP address, so as to allow or
prohibit the specified NMS to access the agent by using this user
name.
273
Figure 277 Traps configuration
2. Click Add to enter the Add Trap Target Host page, as shown in Figure 278.
Figure 278 Adding a target host of SNMP traps
Item Description
Set the destination IP address.
Destination IP Address Select the IP address type: IPv4/domain name or IPv6, and then type
the corresponding IP address or domain name in the field according
to the IP address type.
274
Item Description
Set UDP port number.
IMPORTANT:
The default port number is 162, which is the SNMP-specified port used
UDP Port
for receiving traps on the NMS. Generally (such as using IMC or MIB
Browser as the NMS), you can use the default port number. To change
this parameter to another value, make sure the configuration is the
same with that on the NMS.
Select the security model, the SNMP version.
275
SNMPv1/v2c configuration example
Network requirements
As shown in Figure 280, the NMS at 1.1.1.2/24 uses SNMPv1 or SNMPv2c to manage the SNMP agent
at 1.1.1.1/24, and the agent automatically sends traps to report events to the NMS.
Figure 280 Network diagram
276
Figure 282 Configuring SNMP community named public
277
Figure 284 Enabling Agent to send SNMP traps
278
Configuring the NMS
The configuration on NMS must be consistent with that on the agent. Otherwise, you cannot perform
corresponding operations.
1. Configure the SNMP version for the NMS as v1 or v2c.
2. Create a read-only community and name it public.
3. Create a read and write community and name it private.
For more information about configuring the NMS, see the NMS manual.
279
Figure 287 Enabling SNMP
280
Figure 289 Adding a view named view1
281
Figure 291 Configuring an SNMP group
282
c. Select Auth/Pri from the Security Level list.
d. Select group1 (Auth/Priv) from the Group Name list.
e. Select MD5 from the Authentication Mode list.
f. Type authkey in the Authentication Password and Confirm Authentication Password fields.
g. Select DES56 from the Privacy Mode list.
h. Type prikey in the Privacy Password and Confirm Privacy Password fields.
i. Click Apply.
5. Enable Agent to send SNMP traps:
a. Click the Trap tab and perform the following configuration as shown in Figure 293.
283
Figure 294 Adding target hosts of SNMP traps
284
Configuring bridging
Through the Web interface, you can configure the following transparent bridging functions:
• Enabling a bridge set
• Adding an interface to a bridge set
Overview
Bridging overview
A bridge is a store-and-forward device that connects and transfers traffic between LAN segments at the
data-link layer. In some small-sized networks, especially those with dispersed distribution of users, the use
of bridges can reduce the network maintenance costs without requiring the end users to perform special
configurations on the devices.
In applications, the following major kinds of bridging technologies apply: transparent bridging,
source-route bridging (SRB), translational bridging, and source-route translational bridging (SR/TLB).
The devices support only transparent bridging.
Transparent bridging bridges LAN segments of the same physical media type, primarily in Ethernet
environments. A transparent bridging device keeps a bridge table, which contains mappings between
destination MAC addresses and outbound interfaces.
For more information about transparent bridging, see Layer 2—WAN Configuration Guide in H3C MSR
Series Routers Configuration Guides (V5).
285
Figure 295 Host A sends an Ethernet frame to Host B on LAN 1
MAC address: 00e0.fcbb. bbbb
MAC address: 00e0.fcaa.aaaa
Host A Host B
LAN segment 1
Bridge interface 1
Bridge
Bridge interface 2
LAN segment 2
Host C Host D
As the bridge receives the Ethernet frame on bridging interface 1, it determines that Host A is attached
to bridging interface 1 and creates a mapping between the MAC address of Host A and bridging
interface 1 in its bridge table, as shown in Figure 296.
Figure 296 The bridge determines that Host A is attached to interface 1
When Host B responds to Host B, the bridge also hears the Ethernet frame from Host B. As the frame is
received on bridging interface 1, the bridge determines that Host B is also attached to bridging interface
1, and creates a mapping between the MAC address of Host B and bridging interface 1 in its bridge
table, as shown in Figure 297.
286
Figure 297 The bridge determines that Host B is also attached to interface 1
MAC address: 00e0.fcaa.aaaa MAC address: 00e0.fcbb.bbbb
Host A Host B
LAN segment 2
Host C Host D
Finally, the bridge obtains all the MAC-interface mappings (assume that all hosts are in use), as shown
in Figure 298.
Figure 298 The final bridge table
MAC address: 00e0.fcaa.aaaa MAC address: 00e0.fcbb.bbbb
Host A Host B
Host C Host D
287
Figure 299 Forwarding
MAC address: 00e0. fcaa.aaaa MAC address: 00e0.fcbb.bbbb
Host A Host B
• When Host A sends an Ethernet frame to Host B, as Host B is on the same LAN segment with Host
A, the bridge filters the Ethernet frame instead of forwarding it, as shown in Figure 300.
Figure 300 Filtering
• When Host A sends an Ethernet frame to Host C, if the bridge does not find a MAC-to-interface
mapping about Host C in its bridge table, the bridge forwards the Ethernet frame to all interfaces
except the interface on which the frame was received, as shown in Figure 301.
288
Figure 301 The proper MAC-to-interface mapping is not found in the bridge table
When a bridge receives a broadcast or multicast frame, it forwards the frame to all interfaces other than
the receiving interface.
VLAN transparency
VLAN transparency enables a bridge to forward VLAN-tagged packets without processing their VLAN
tags. If your device does not support VLAN tags, enable VLAN transparency on any interfaces that may
receive VLAN-tagged packets to avoid dropping of VLAN tags.
Configuring bridging
Recommended basic bridging configuration procedure
Step Remarks
Required.
1. Enabling a bridge set
No bridge set is enabled by default.
289
Figure 302 Global config
Item Remarks
Bridge Group id Set the ID of the bridge set you want to enable.
290
Figure 303 Configuring interface
Item Remarks
Interface Select the interface you want to configure.
Bridge Group Set the ID of the bridge set to which you want add the interface.
291
Figure 304 Network diagram
Eth1/1 Eth1/1
Trunk Trunk
Eth1/1 Eth1/1
Eth1/2 Eth1/2
Router A Router B
Configuration procedure
1. Configure Router A:
# Enable bridge set 2.
a. Select Advanced > Bridge from the navigation tree to enter the Global config page.
292
Figure 306 Assigning Ethernet 1/1 to bridge set 2 and enable VLAN transparency
293
d. Select Enable from the VLAN Transmit list.
e. Click Apply.
2. Configure Router B:
Configure Router B in the same way as you configured Router A.
294
Configuring user groups
You can add hosts in a LAN to a user group and perform access control, application control, bandwidth
control, and packet filtering on a per user group basis.
• Access control—Allows you to deny access from hosts during specific time ranges. All data packets
matching these criteria will be denied access to the Internet.
• Application control—Allows you to restrict access to a specific application or protocol (such as
Telnet, DNS, SIP, and HTTP) on the Internet from users in a user group. You can perform application
control based on a user group or all users. For more information about application control, see
"Configuring application control."
• Bandwidth control—Allows you to control the bandwidth consumption based on user group. It
evaluates traffic with token buckets and drops unqualified packets.
• Packet filtering—Allows you to filter packets that match specific criteria such as the protocol,
destination IP address, source port, and destination port on a per user group basis.
Task Remarks
Required.
Configuring a user group
By default, no user groups are configured.
Required.
Configuring a user Add users to the user group.
By default, a user group has no users.
Optional.
If a WAN interface is added or a non-WAN interface becomes a
WAN interface after the user or user group is configured, you must
Synchronizing user group synchronize the user group configuration to the WAN interface.
configuration for wan interfaces
IMPORTANT:
Make sure at least one user group exists in the system before
synchronization.
295
Configuring a user group
Select Advanced > Security > Usergroup from the navigation tree. The group configuration page
appears, as shown in Figure 308.
Figure 308 User group configuration
Item Description
Set the name of the group to be added.
User Group Name The group name is a character string beginning with letters. The string cannot contain
any question mark (?) or space.
Configuring a user
Select Advanced > Security > Usergroup from the navigation tree, and then select the User tab to enter
the page as shown Figure 309.
296
Figure 309 User configuration
Item Description
Please select a user group Select the group to which you want to add users.
297
Figure 310 Access control configuration
Item Description
Select a user group for access control.
Please select a user group When there is more than one user group, the option all is available. Selecting
all means that the access control configuration applies to all the user groups.
Days
Set the time range in which access to the Internet is denied.
Time
298
Figure 311 Application control
Item Description
Select a user group for application control.
Please select a user
group When there is more than one user group, the option all is available. Selecting all
means that the application control configuration applies to all the user groups.
Select the applications and protocols to be controlled. There are three types of
applications for you to select:
• Loaded Applications—Applications contained in the loaded signature file. To load
Please select
a signature file, select Security > Application Control.
applications to deny
• Predefined Applications—Predefined applications.
• Custom Applications—To customize applications, select Security > Application
Control.
299
Figure 312 Bandwidth control configuration
Item Description
Set the user group for bandwidth control configuration.
Please select a user
group When there are more than one user group, the option all is available. Selecting all
means that the bandwidth control configuration applies to all the user groups.
CIR Set the committed information rate (CIR), that is, the permitted average rate of traffic.
Set the committed burst size (CBS). CBS is the token bucket capacity, that is, the
maximum traffic size that is permitted in each burst.
The CBS value must be greater than the maximum packet size.
CBS
IMPORTANT:
By default, the CBS is the number of bytes transmitted in 500 ms at the rate of CIR. If the
number exceeds the value range, the allowed maximum or minimum value is adopted.
300
Figure 313 Packet filtering configuration
Item Description
Select a user group to which packet filtering is applied.
Please select a user group When there is more than one user group, the option all is available.
Selecting all means that the packet filtering configuration applies to all the
user groups.
Destination IP Address
Set the destination IP address and wildcard mask.
Destination Wildcard
301
Item Description
configurable.
Port • If you select NotCheck as the operator, port numbers will not be checked
and no ports need to be specified.
• If you select Range as the operator, you must specify both start and end
ports to define a port range.
ToPort
• If you select other option as the operator, only a start port needs to be
specified.
302
Figure 315 Network diagram
Creating user groups staff (for common users) and manager (for the manager)
1. Select Advanced > Security > Usergroup to enter the group configuration page. Perform the
configurations as shown in Figure 316.
Figure 316 Creating user groups staff and manager
303
Figure 317 Adding users to user group staff
304
Figure 318 Configuration progress dialog box
305
Figure 320 Configuring access control for user group staff
Loading the application control file (assume the signature file is stored on the device)
1. Select Security Setup > Application Control from the navigation tree, and then select the Load
Application tab.
306
Figure 321 Loading the application control file
307
Configuring bandwidth control for user groups staff and manager
1. Select Advanced > Security > Band Width, and then perform the configurations as shown in Figure
323.
Figure 323 Configuring bandwidth control to user groups staff and manager
308
Figure 324 Configuring packet filtering for user group staff
309
Configuring MSTP
Introduction to STP
STP was developed based on the 802.1d standard of IEEE to eliminate loops at the data link layer in a
LAN. Devices running this protocol detect loops in the network by exchanging information with one
another and eliminate loops by selectively blocking certain ports to prune the loop structure into a
loop-free tree structure. This avoids proliferation and infinite cycling of packets that would occur in a loop
network and prevents decreased performance of network devices caused by duplicate packets received.
In the narrow sense, STP refers to the IEEE 802.1d STP. In the broad sense, STP refers to the IEEE 802.1d
STP and various improved spanning tree protocols derived from that protocol.
310
Root port
On a non-root bridge, the port nearest to the root bridge is the root port. The root port is responsible for
communication with the root bridge. Each non-root bridge has one and only one root port. The root
bridge has no root port.
Device responsible for forwarding BPDUs Port through which the designated bridge
For a LAN
to this LAN segment. forwards BPDUs to this LAN segment.
As shown in Figure 325, AP1 and AP2, BP1 and BP2, and CP1 and CP2 are ports on Device A, Device
B, and Device C, respectively.
• If Device A forwards BPDUs to Device B through AP1, the designated bridge for Device B is Device
A, and the designated port of Device B is port AP1 on Device A.
• Two devices are connected to the LAN: Device B and Device C. If Device B forwards BPDUs to the
LAN, the designated bridge for the LAN is Device B, and the designated port for the LAN is the port
BP2 on Device B.
Figure 325 Designated bridges and designated ports
Path cost
Path cost is a reference value used for link selection in STP. By calculating path costs, STP selects relatively
robust links and blocks redundant links, and finally prunes the network into a loop-free tree.
311
• Root bridge ID—Consisting of the priority and MAC address of the root bridge.
• Root path cost—Cost of the shortest path to the root bridge.
• Designated bridge ID—Consisting of the priority and MAC address of the designated bridge.
• Designated port ID—Designated port priority plus port name.
• Message age—Age of the configuration BPDU while it propagates in the network.
• Max age—Maximum age of the configuration BPDU can be maintained on a device.
• Hello time—Configuration BPDU interval.
• Forward delay—Delay used by STP bridges to transit the state of the root and designated ports to
forwarding.
For simplicity, the descriptions and examples in this document involve only the following fields in the
configuration BPDUs:
• Root bridge ID (represented by device priority)
• Root path cost (related to the rate of the link connecting the port)
• Designated bridge ID (represented by device priority)
• Designated port ID (represented by port name)
Step Actions
Upon receiving a configuration BPDU on a port, the device performs the following:
• If the received configuration BPDU has a lower priority than that of the configuration BPDU
generated by the port, the device discards the received configuration BPDU and does not
1 process the configuration BPDU of this port.
• If the received configuration BPDU has a higher priority than that of the configuration BPDU
generated by the port, the device replaces the content of the configuration BPDU generated
by the port with the content of the received configuration BPDU.
The device compares the configuration BPDUs of all the ports and chooses the optimum
2
configuration BPDU.
312
3. Selection of the root bridge.
Initially, each STP-enabled device on the network assumes itself to be the root bridge, with the root
bridge ID being its own device ID. By exchanging configuration BPDUs, the devices compare their
root bridge IDs to elect the device with the smallest root bridge ID as the root bridge.
4. Select the root port and designated ports on a non-root device.
Table 139 Selection of the root port and designated ports
Step Description
A non-root device regards the port on which it received the optimum configuration BPDU as
1
the root port.
Based on the configuration BPDU and the path cost of the root port, the device calculates a
designated port configuration BPDU for each of the rest ports.
• The root bridge ID is replaced with that of the configuration BPDU of the root port.
2 • The root path cost is replaced with that of the configuration BPDU of the root port plus the
path cost of the root port.
• The designated bridge ID is replaced with the ID of this device.
• The designated port ID is replaced with the ID of this port.
The device compares the calculated configuration BPDU with the configuration BPDU on the
port of which the port role is to be defined, and acts depending on the comparison result:
• If the calculated configuration BPDU is superior, the device considers this port as the
designated port, and replaces the configuration BPDU on the port with the calculated
3
configuration BPDU, which will be sent out periodically.
• If the configuration BPDU on the port is superior, the device blocks this port without
updating its configuration BPDU. The blocked port can receive BPDUs but cannot send
BPDUs or forward data.
When the network topology is stable, only the root port and designated ports forward traffic, and other
ports are all in the blocked state—they receive BPDUs but do not forward BPDUs or user traffic.
A tree-shape topology forms upon successful election of the root bridge, the root port on each non-root
bridge and the designated ports.
313
Figure 326 The STP algorithm
314
BPDU of port after
Device Comparison process
comparison
• Port BP1 receives the configuration BPDU of Device A {0, 0, 0,
AP1}. Device B finds that the received configuration BPDU is
superior to the configuration BPDU of the local port {1, 0, 1,
BP1}, and updates the configuration BPDU of BP1. BP1: {0, 0, 0, AP1}
• Port BP2 receives the configuration BPDU of Device C {2, 0, 2, BP2: {1, 0, 1, BP2}
CP2}. Device B finds that the configuration BPDU of the local
port {1, 0, 1, BP2} is superior to the received configuration
BPDU, and discards the received configuration BPDU.
• Device B compares the configuration BPDUs of all its ports, and
determines that the configuration BPDU of BP1 is the optimum
Device B configuration BPDU. Then, it uses BP1 as the root port, the
configuration BPDUs of which will not be changed.
• Based on the configuration BPDU of BP1 and the path cost of Root port BP1:
the root port (5), Device B calculates a designated port
{0, 0, 0, AP1}
configuration BPDU for BP2 {0, 5, 1, BP2}.
Designated port BP2:
• Device B compares the calculated configuration BPDU {0, 5, 1,
BP2} with the configuration BPDU of BP2. If the calculated BPDU {0, 5, 1, BP2}
is superior, BP2 will act as the designated port, and the
configuration BPDU on this port will be replaced with the
calculated configuration BPDU, which will be sent out
periodically.
• Port CP1 receives the configuration BPDU of Device A {0, 0, 0,
AP2}. Device C finds that the received configuration BPDU is
superior to the configuration BPDU of the local port {2, 0, 2,
CP1}, and updates the configuration BPDU of CP1.
CP1: {0, 0, 0, AP2}
• Port CP2 receives the configuration BPDU of port BP2 of Device
CP2: {1, 0, 1, BP2}
B {1, 0, 1, BP2} before the configuration BPDU is updated.
Device C finds that the received configuration BPDU is superior
to the configuration BPDU of the local port {2, 0, 2, CP2}, and
updates the configuration BPDU of CP2.
After comparison:
• The configuration BPDU of CP1 is elected as the optimum
configuration BPDU, so CP1 is identified as the root port, the Root port CP1:
Device C configuration BPDUs of which will not be changed. {0, 0, 0, AP2}
• Device C compares the calculated designated port
Designated port CP2:
configuration BPDU {0, 10, 2, CP2} with the configuration
BPDU of CP2, and CP2 becomes the designated port, and the {0, 10, 2, CP2}
configuration BPDU of this port will be replaced with the
calculated configuration BPDU.
• Then, port CP2 receives the updated configuration BPDU of
Device B {0, 5, 1, BP2}. Because the received configuration
BPDU is superior to its own configuration BPDU, Device C
CP1: {0, 0, 0, AP2}
launches a BPDU update process.
CP2: {0, 5, 1, BP2}
• At the same time, port CP1 receives periodic configuration
BPDUs from Device A. Device C does not launch an update
process after comparison.
315
BPDU of port after
Device Comparison process
comparison
After comparison:
• Because the root path cost of CP2 (9) (root path cost of the
BPDU (5) plus path cost corresponding to CP2 (4)) is smaller
than the root path cost of CP1 (10) (root path cost of the BPDU
(0) + path cost corresponding to CP2 (10)), the BPDU of CP2 is Blocked port CP2:
elected as the optimum BPDU, and CP2 is elected as the root {0, 0, 0, AP2}
port, the messages of which will not be changed.
Root port CP2:
• After comparison between the configuration BPDU of CP1 and
the calculated designated port configuration BPDU, port CP1 is {0, 5, 1, BP2}
blocked, with the configuration BPDU of the port unchanged,
and the port will not receive data from Device A until a
spanning tree calculation process is triggered by a new event,
for example, the link from Device B to Device C going down.
After the comparison processes described in Table 141, a spanning tree with Device A as the root bridge
is established as shown in Figure 327.
Figure 327 The final calculated spanning tree
316
However, the newly calculated configuration BPDU will not be propagated throughout the network
immediately, so the old root ports and designated ports that have not detected the topology change
continue forwarding data along the old path. If the new root ports and designated ports begin to
forward data as soon as they are elected, a temporary loop may occur.
STP timers
STP calculation involves the following timers:
• Forward delay—The delay time for device state transition. A path failure can cause spanning tree
re-calculation to adapt the spanning tree structure to the change. However, the resulting new
configuration BPDU cannot propagate throughout the network immediately. If the newly elected
root ports and designated ports start to forward data right away, a temporary loop is likely to occur.
For this reason, as a mechanism for state transition in STP, the newly elected root ports or
designated ports require twice the forward delay time before transiting to the forwarding state to
make sure the new configuration BPDU has propagated throughout the network.
• Hello time—The time interval at which a device sends hello packets to the surrounding devices to
make sure the paths are fault free.
• Max age—A parameter used to determine whether a configuration BPDU held by the device has
expired. A configuration BPDU beyond the max age will be discarded.
Introduction to RSTP
Developed based on the 802.1w standard of IEEE, RSTP is an optimized version of STP. It achieves rapid
network convergence by allowing a newly elected root port or designated port to enter the forwarding
state much quicker under certain conditions than in STP.
In RSTP, a newly elected root port can enter the forwarding state rapidly if this condition is met: the old
root port on the device has stopped forwarding data and the upstream designated port has started
forwarding data.
In RSTP, a newly elected designated port can enter the forwarding state rapidly if this condition is met:
the designated port is an edge port or a port connected to a point-to-point link. If the designated port is
an edge port, it can enter the forwarding state directly. If the designated port is connected to a
point-to-point link, it can enter the forwarding state immediately after the device undergoes handshake
with the downstream device and gets a response.
Introduction to MSTP
Why MSTP
STP and RSTP limitations
STP does not support rapid state transition of ports. A newly elected root port or designated port must
wait twice the forward delay time before transiting to the forwarding state, even if it is a port on a
point-to-point link or an edge port, which directly connects to a user terminal rather than to another
device or a shared LAN segment.
Although RSTP supports rapid network convergence, it has the same drawback as STP—All bridges
within a LAN share the same spanning tree, so redundant links cannot be blocked based on VLAN, and
the packets of all VLANs are forwarded along the same spanning tree.
317
Features of MSTP
Developed based on IEEE 802.1s, MSTP overcomes the limitations of STP and RSTP. In addition to the
support for rapid network convergence, it also allows data flows of different VLANs to be forwarded
along separate paths, providing a better load sharing mechanism for redundant links.
MSTP includes the following features:
• MSTP supports mapping VLANs to MST instances (MSTIs) by means of a VLAN-to-instance
mapping table. MSTP can reduce communication overheads and resource usage by mapping
multiple VLANs to one MSTI.
• MSTP divides a switched network into multiple regions, each containing multiple spanning trees
that are independent of one another.
• MSTP prunes a loop network into a loop-free tree, avoiding proliferation and endless cycling of
packets in a loop network. In addition, it provides multiple redundant paths for data forwarding,
supporting load balancing of VLAN data.
• MSTP is compatible with STP and RSTP.
Assume that all devices in Figure 328 are running MSTP. This section explains some basic concepts of
MSTP.
318
MST region
A multiple spanning tree region (MST region) consists of multiple devices in a switched network and the
network segments among them. These devices have the following characteristics:
• All are MSTP-enabled.
• They have the same region name.
• They have the same VLAN-to-instance mapping configuration.
• They have the same MSTP revision level configuration.
• They are physically linked with one another.
For example, all the devices in region A0 in Figure 328 have the same MST region configuration.
• The same region name.
• The same VLAN-to-instance mapping configuration (VLAN 1 is mapped to MSTI 1, VLAN 2 to MSTI
2, and the rest to the common and internal spanning tree (CIST or MSTI 0).
• The same MSTP revision level (not shown in the figure).
Multiple MST regions can exist in a switched network. You can assign multiple devices to the same MST
region.
IST
An internal spanning tree (IST) is a spanning tree that runs in an MST region.
ISTs in all MST regions and the common spanning tree (CST) jointly constitute the common and internal
spanning tree (CIST) of the entire network. An IST is a section of the CIST in an MST region.
In Figure 328, for example, the CIST has a section in each MST region, and this section is the IST in the
respective MST region.
CST
The CST is a single spanning tree that connects all MST regions in a switched network. If you regard each
MST region as a "device," the CST is a spanning tree calculated by these devices through STP or RSTP.
CSTs are indicated by red lines in Figure 328.
CIST
Jointly constituted by ISTs and the CST, the CIST is a single spanning tree that connects all devices in a
switched network.
In Figure 328, for example, the ISTs in all MST regions plus the inter-region CST constitute the CIST of the
entire network.
MSTI
Multiple spanning trees can be generated in an MST region through MSTP, one spanning tree being
independent of another. Each spanning tree is called a multiple spanning tree instance (MSTI).
In Figure 328, for example, multiple MSTIs can exist in each MST region, each MSTI corresponding to the
specified VLANs.
319
Regional root bridge
The root bridge of the IST or an MSTI within an MST region is the regional root bridge of the IST or the
MSTI. Based on the topology, different spanning trees in an MST region may have different regional
roots.
For example, in region D0 in Figure 328, the regional root of MSTI 1 is device B, and that of MSTI 2 is
device C.
Boundary port
A boundary port is a port that connects an MST region to another MST region, or to a single
spanning-tree region running STP, or to a single spanning-tree region running RSTP. It is at the boundary
of an MST region.
During MSTP calculation, the role of a boundary port in an MSTI must be consistent with its role in the
CIST. However, this is not true with master ports. A master port on MSTIs is a root port on the CIST. For
example, in Figure 328, if a device in region A0 is interconnected to the first port of a device in region
D0 and the common root bridge of the entire switched network is located in region A0, the first port of
that device in region D0 is the boundary port of region D0.
Roles of ports
MSTP calculation involves the following port roles: root port, designated port, master port, boundary port,
alternate port, and backup port.
• Root port—Port responsible for forwarding data to the root bridge.
• Designated port—Port responsible for forwarding data to the downstream network segment or
device.
• Master port—Port on the shortest path from the current region to the common root bridge,
connecting the MST region to the common root bridge. If the region is seen as a node, the master
port is the root port of the region on the CST. The master port is a root port on IST/CIST and still a
master port on the other MSTIs.
• Alternate port—Standby port for the root port and the master port. When the root port or master
port is blocked, the alternate port becomes the new root port or master port.
• Backup port—Backup port of a designated port. When the designated port is blocked, the backup
port becomes a new designated port and starts forwarding data without delay. A loop occurs when
two ports of the same MSTP device are interconnected. The device will block either of the two ports,
and the backup port is the port to be blocked.
A port can play different roles in different MSTIs.
320
Figure 329 Port roles
Connecting to the common
root bridge
Boundary port
B C
Port 6
Port 5
Backup port
D
Designated port
Port 3 Port 4
In Figure 329, devices A, B, C, and D constitute an MST region. Port 1 and port 2 of device A are
connected to the common root bridge, port 5 and port 6 of device C form a loop, and port 3 and port
4 of Device D are connected downstream to the other MST regions.
Port states
In MSTP, a port may be in one of the following states:
• Forwarding—The port learns MAC addresses and forwards user traffic.
• Learning—The port learns MAC addresses but does not forward user traffic.
• Discarding—The port does not learn MAC addresses or forwards user traffic.
A port can have different port states in different MSTIs. A port state is not exclusively associated with a
port role. Table 142 lists the port states supported by each port role. ("√" indicates that the port state is
available for the corresponding port role and "—" indicates that the port state is not available for the
corresponding port role.)
Table 142 Ports states supported by different port roles
Port role
Port state Root port/master Designated
Boundary port Alternate port Backup port
port port
Forwarding √ √ √ — —
Learning √ √ √ — —
Discarding √ √ √ √ √
321
How MSTP works
MSTP divides an entire Layer 2 network into multiple MST regions, which are interconnected by a
calculated CST. Inside an MST region, multiple spanning trees are calculated, each being an MSTI
(Among these MSTIs, MSTI 0 is called the CIST). Similar to RSTP, MSTP uses configuration BPDUs to
calculate spanning trees. The only difference between the two protocols is that an MSTP BPDU carries the
MSTP configuration on the device from which this BPDU is sent.
CIST calculation
The calculation of a CIST tree is also the process of configuration BPDU comparison. During this process,
the device with the highest priority is elected as the root bridge of the CIST. MSTP generates an IST within
each MST region through calculation, and, at the same time, MSTP regards each MST region as a single
device and generates a CST among these MST regions through calculation. The CST and ISTs constitute
the CIST of the entire network.
MSTI calculation
Within an MST region, MSTP generates different MSTIs for different VLANs based on the
VLAN-to-instance mappings. MSTP performs a separate calculation process, which is similar to spanning
tree calculation in STP/RSTP, for each spanning tree. For more information, see "How STP works."
In MSTP, a VLAN packet is forwarded along the following paths:
• Within an MST region, the packet is forwarded along the corresponding MSTI.
• Between two MST regions, the packet is forwarded along the CST.
322
Step Remarks
Optional.
1. Configuring an MST Configure the MST region-related parameters and VLAN-to-instance mappings.
region.
By default, the MST region-related parameters adopt the default values, and all
VLANs in an MST region are mapped to MSTI 0.
Required.
2. Configuring MSTP
Enable MSTP globally and configure MSTP parameters.
globally.
By default, MSTP is disabled globally. All MSTP parameters have default values.
Optional.
3. Configuring MSTP on Enable MSTP on a port and configure MSTP parameters.
a port.
By default, MSTP is enabled on a port, and all MSTP parameters adopt the
default values.
Click Modify to enter the MSTP region configuration page, as shown in Figure 331.
Figure 331 Modifying an MST region
323
Table 143 Configuration items
Item Description
MST region name.
Region Name
The MST region name is the bridge MAC address of the device by default.
Manual (Instance ID and Manually add VLAN-to-instance mappings. Click Apply to add a VLAN-to-instance
VLAN ID) mapping entry to the list.
Set the modulo value based on which 4094 VLANs are automatically mapped to the
corresponding MSTIs.
Modulo With the modulo value set, each VLAN is mapped to the MSTI whose ID is (VLAN ID
– 1) %modulo + 1, where (VLAN ID – 1) %modulo is the modulo operation for (VLAN
ID – 1). If the modulo value is 15, for example, VLAN 1 will be mapped to MSTI 1,
VLAN 2 to MSTI 2, VLAN 15 to MSTI 15, VLAN 16 to MSTI 1, and so on.
Activate Validate the VLAN-to- instance mappings, the region name, and the revision level.
324
Figure 332 Configuring MSTP globally
Item Description
Enable or disable STP globally:
• Enable—Enable STP globally.
Enable STP Globally
• Disable—Disable STP globally.
Other MSTP configurations can take effect only after you enable STP globally.
325
Item Description
Set the STP operating mode:
• STP mode—All ports of the device send out STP BPDUs.
• RSTP mode—All ports of the device send out RSTP BPDUs. If the device detects
that it is connected to a legacy STP device, the port connecting to the legacy STP
Mode
device will automatically migrate to STP-compatible mode.
• MSTP—All ports of the device send out MSTP BPDUs. If the device detects that it
is connected to a legacy STP device, the port connecting to the legacy STP
device will automatically migrate to STP-compatible mode.
Set the maximum number of hops in an MST region to restrict the region size.
Max Hops
The setting can take effect only when it is configured on the regional root bridge.
Specify the standard for path cost calculation. It can be Legacy, IEEE
Path Cost Standard
802.1D-1998, or IEEE 802.1T.
Any two stations in a switched network are interconnected through a specific path
composed of a series of devices. The bridge diameter (or the network diameter) is
the number of devices on the path composed of the most devices.
After you set the network diameter, you cannot set the timers. Instead, the device
automatically calculates the forward delay, hello time, and max age.
Bridge Diameter
When you configure the bridge diameter, follow these guidelines:
• The network diameter applies to only the CIST. It takes effect only after you
configure it on the root bridge. Each MST region is regarded as a device.
• After you set the network diameter, you cannot set the timers. Instead, the device
calculates the forward delay, hello time, and max age automatically.
326
Item Description
Set the timers:
• Forward Delay—Set the delay for the root and designated ports to transit to the
forwarding state. The length of the forward delay time is related to the network
diameter of the switched network. The larger the network diameter is, the longer
the forward delay time should be. If the forward delay setting is too small,
temporary redundant paths may be introduced. If the forward delay setting is
too big, it may take a long time for the network to converge. H3C recommends
that you use the default setting.
• Hello Time—Set the interval at which the device sends hello packets to the
surrounding devices to make sure the paths are fault-free. An appropriate hello
time setting enables the device to timely detect link failures on the network
without using excessive network resources. If the hello time is set too long, the
device will take packet loss as a link failure and trigger a new spanning tree
calculation process. If the hello time is set too short, the device will send
Timers repeated configuration BPDUs frequently. This adds to the device burden and
wastes network resources. H3C recommends that you use the default setting.
• Max Age—Set the maximum length of time a configuration BPDU can be held
by the device. If the max age time setting is too small, the network devices will
frequently launch spanning tree calculations and may take network congestion
as a link failure. If the max age setting is too large, the network may fail to timely
detect link failures and fail to timely launch spanning tree calculations, reducing
the auto-sensing capability of the network. H3C recommends that you use the
default setting.
When you configure timers, follow these guidelines:
• The settings of hello time, forward delay and max age must meet a certain
formula. Otherwise, the network topology will not be stable. H3C recommends
you to set the network diameter, and then have the device automatically
calculate the forward delay, hello time, and max age.
• The bridge diameter cannot be configured together with the timers.
• Instance ID—Set the ID of the MSTI to be configured.
• Root Type—Set the role of the device in the MSTI:
Not Set—The device role is not configured.
Primary—Configure the device as the root bridge.
Instance Secondary—Configure the device as a secondary root bridge.
• Bridge Priority—Set the bridge priority of the device, which is one of the factors
determining whether the device can be elected as the root bridge.
After specifying the current device as the primary root bridge or a secondary root
bridge, you cannot change the priority of the device.
327
Configuring MSTP on a port
Select Advanced > MSTP > Port from the navigation tree to enter the MSTP Port Configuration page, as
shown in Figure 333.
Figure 333 MSTP configuration of a port (1)
Click the icon for a port to enter the MSTP Port Configuration page of the port, as shown in Figure
334.
Figure 334 MSTP configuration of a port (2)
Item Description
Port Number Select the port you want to configure.
328
Item Description
Set the type of protection enabled on the port:
Protection Type • Not Set—No protection is enabled on the port.
• Edged Port, Root Protection, Loop Protection—For more information, see Table 146.
Specify whether the port is connected to a point-to-point link:
• Auto—Automatically detects whether the link type of the port is point-to-point.
Point to Point
• Force False—Specifies that the link type for the port is not point-to-point link.
• Force True—Specifies that the link type for the port is point-to-point link.
Configure the maximum number of MSTP packets that can be sent during each Hello interval.
Transmit Limit The larger the transmit limit is, the more network resources will be occupied. H3C
recommends you to use the default value.
In a switched network, if a port on an MSTP device connects to an STP device, this port will
automatically migrate to the STP-compatible mode. However, after the STP device is
removed, whether the port on the MSTP device can migrate automatically to the MSTP mode
mCheck depends on which of the following parameter is selected:
• Enable—Performs mCheck. The port automatically migrates back to the MSTP mode.
• Disable—Does not perform mCheck. The port does not automatically migrate back to the
MSTP mode.
• Instance ID—Set the MSTI ID.
• Port Priority—Set the priority of the port in the current MSTI. The priority of a port is an
Instance
import factor in determining whether the port can be elected as the root port.
• Path Cost—Select to calculate the path cost automatically or set the path cost manually.
329
MSTP configuration example
Network requirements
As shown in Figure 335, all routers on the network are in the same MST region. Router A and Router B
work on the distribution layer. Router C and Router D work on the access layer.
Configure MSTP so that packets of different VLANs are forwarded along different instances: packets of
VLAN 10 along MSTI 1, those of VLAN 30 along MSTI 3, those of VLAN 40 along MSTI 4, and those of
VLAN 20 along MSTI 0.
VLAN 10 and VLAN 30 are terminated on the distribution layer routers, and VLAN 40 is terminated on
the access layer routers, so the root bridges of MSTI 1 and MSTI 3 are Router A and Router B, respectively,
and the root bridge of MSTI 4 is Router C.
Figure 335 Network diagram
"Permit:" next to a link in the figure is followed by the VLANs the packets of which are permitted to pass
this link.
Configuration procedure
1. Configure VLANs and VLAN member ports (Details not shown.):
Create VLAN 10, VLAN 20, and VLAN 30 on Router A and Router B, respectively.
Create VLAN 10, VLAN 20, and VLAN 40 on Router C.
Create VLAN 20, VLAN 30, and VLAN 40 on Router D.
Configure the ports on these routers as hybrid ports and assign them to related VLANs.
Configure the security zones to which the combinations of these ports and their permitted
VLANs belong.
2. Configure Router A:
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1,
MSTI 3, and MSTI 4, respectively, and configure the revision level of the MST region as 0:
a. Log in to Router A. Select Advanced > MSTP > Region from the navigation tree, click Modify,
and then make the following configurations on the page shown in Figure 336.
330
Figure 336 Configuring an MST region on Router A
331
Figure 337 Configuring global MSTP parameters on Router A
332
# Enable MSTP globally and configure the current device as the root bridge of MSTI 4:
a. Select Advanced > MSTP > Global from the navigation tree, and make the following
configurations on the page similar to that shown in Figure 337.
b. Select Enable from the Enable STP Globally list.
c. Select MSTP from the Mode list.
d. Select the box in front of Instance.
e. Set the Instance ID field to 4.
f. Set the Root Type field to Primary.
g. Click Apply to submit the settings.
5. Configure Router D:
# Create an MST region named example, map VLAN 10, VLAN 30, and VLAN 40 to MSTI 1,
MSTI 3, and MSTI 4, respectively, and configure the revision level of the MST region as 0. The
procedure here is the same as that of configuring an MST region on Router A.
# Enable MSTP globally:
a. Select Advanced > MSTP > Global from the navigation tree, and make the following
configurations on the page similar to that shown in Figure 337.
b. Select Enable from the Enable STP Globally list.
c. Select MSTP from the Mode list.
d. Click Apply to submit the settings.
333
MSTID Port Role STP State Protection
0 Ethernet0/1 DESI FORWARDING NONE
0 Ethernet0/2 ROOT FORWARDING NONE
0 Ethernet0/3 DESI FORWARDING NONE
1 Ethernet0/1 ROOT FORWARDING NONE
1 Ethernet0/2 ALTE DISCARDING NONE
4 Ethernet0/3 DESI FORWARDING NONE
Based on the above information, draw the MSTI corresponding to each VLAN, as shown in Figure 338.
Figure 338 MSTIs corresponding to different VLANs
Configuration guidelines
Follow these guidelines when you configure MSTP:
• Two or more MSTP-enabled devices belong to the same MST region only if they are configured with
the same format selector (0 by default, not configurable), MST region name, VLAN-to-instance
mapping entries in the MST region, and MST region revision level, and they are interconnected
through physical links.
334
• After specifying the current device as the root bridge or a secondary root bridge, you cannot
change the priority of the device.
• If two or more devices with the same bridge priority have been designated to be root bridges of the
same spanning tree instance, MSTP will select the device with the lowest MAC address as the root
bridge.
• The values of forward delay, hello time, and max age are interdependent. Inappropriate settings of
these values may cause network flapping. H3C recommends you to set the network diameter and
let the device automatically set an optimal hello time, forward delay, and max age. The settings of
hello time, forward delay and max age must meet the following formulae:
2 × (forward delay – 1 second) ƒ max age
Max age ƒ 2 × (hello time + 1 second)
• If the device is not enabled with BPDU guard, when an edge port receives a BPDU from another port,
it transits into a non-edge port. To restore its port role as an edge port, you must restart the port.
• Configure ports that are directly connected to terminals as edge ports and enable BPDU guard for
them. In this way, these ports can rapidly transit to the forwarding state, and network security can
be ensured.
335
Configuring RADIUS
Overview
Remote Authentication Dial-In User Service (RADIUS) protocol is a distributed information interaction
protocol that uses a client/server model to implement AAA. It can protect networks against unauthorized
access and is often used in network environments that require both high security and remote user access.
RADIUS uses UDP port 1812 for authentication and UDP port 1813 for accounting.
RADIUS was originally designed for dial-in user access. With the addition of new access methods,
RADIUS has been extended to support additional access methods, including Ethernet and ADSL.
RADIUS provides access authentication, authorization, and accounting services. The accounting function
collects and records network resource usage information.
For more information about RADIUS and AAA, see H3C MSR Series Routers Configuration Guides (V5).
2. Click Add.
336
Figure 340 RADIUS scheme configuration page
Item Description
Scheme Name Enter a name for the RADIUS scheme.
Configure the common parameters for the RADIUS scheme, including the server
type, the username format, and the shared keys for authentication and accounting
Common Configuration
packets. For more information about common configuration, see "Configuring
common parameters."
337
Figure 341 Common configuration
Item Description
Select the type of the RADIUS servers supported by the device, which can be:
• Standard—Standard RADIUS servers. The RADIUS client and RADIUS
server communicate by using the standard RADIUS protocol and packet
Server Type format defined in RFC 2865/2866 or later.
• Extended—Extended RADIUS servers, usually running on CAMS or IMC.
The RADIUS client and the RADIUS server communicate by using the
proprietary RADIUS protocol and packet format.
338
Item Description
Select the format of usernames to be sent to the RADIUS server, including
Original format, With domain name, and Without domain name.
Typically, a username is in the format of userid@isp-name, of which isp-name
Username Format is used by the device to determine the ISP domain for the user. If a RADIUS
server (such as a RADIUS server of some early version) does not accept a
username that contains an ISP domain name, you can configure the device to
remove the domain name of a username before sending it to the RADIUS
server.
Set the shared key for authenticating RADIUS authentication packets and that
for authenticating RADIUS accounting packets.
The RADIUS client and the RADIUS server use MD5 to encrypt RADIUS
Authentication Key packets. They verify packets through the specified shared key. The client and
Confirm Authentication Key the server can receive and respond to packets from each other only when
they use the same shared key.
Accounting Key
Confirm Accounting Key IMPORTANT:
The shared keys configured in the common configuration part are used only
when no corresponding shared keys are configured in the RADIUS server
configuration part.
Set the time to wait before the device restores an unreachable RADIUS server
to active state.
If the primary server is unreachable due to temporary interruption on the
network interface or the busy server, you can set the quiet time to 0 so that
Quiet Time authentication and accounting requests for other users are still sent to the
primary server for processing. When the quiet time is 0, if the server being
used is unreachable, the device keeps the server in the active state, and
sends the request to the next server in the active state. In this way, subsequent
authentication or accounting requests may still be sent to the server.
IMPORTANT:
The server response timeout time multiplied by the maximum number of
RADIUS packet transmission attempts must not exceed 75.
Set the interval for sending real-time accounting information to the RADIUS
accounting server. The interval must be a multiple of 3.
Different real-time accounting intervals impose different performance
Realtime Accounting Interval requirements on the NAS and the RADIUS server. A shorter interval helps
achieve higher accounting precision but requires higher performance. Use a
longer interval when a large number of users (1000 or more) exist. For more
information about the recommended real-time accounting intervals, see
"Configuration guidelines."
339
Item Description
Set the maximum number of attempts for sending a real-time accounting
Realtime Accounting Attempts
request.
Specify the unit for data flows sent to the RADIUS server, which can be byte,
Unit for Data Flows
kilo-byte, mega-byte, or giga-byte.
Specify the unit for data packets sent to the RADIUS server, which can be
Unit for Packets
one-packet, kilo-packet, mega-packet, or giga-packet.
VPN This setting is effective to all RADIUS authentication servers and accounting
servers configured in the RADIUS scheme, but the VPN individually specified
for a RADIUS authentication or accounting server takes priority.
Security Policy Server Specify the IP address of the security policy server.
Specify the source IP address for the device to use in RADIUS packets sent to
the RADIUS server.
RADIUS Packet Source IP H3C recommends using a loopback interface address instead of a physical
interface address as the source IP address. If the physical interface is down,
the response packets from the server cannot reach the device.
Buffer stop-accounting packets Enable or disable buffering of stop-accounting requests for which no
responses are received, and set the maximum number of attempts for
Stop-Accounting Attempts sending stop-accounting requests.
Enable or disable the accounting-on feature, and set the interval and the
maximum number of attempts for sending accounting-on packets.
The accounting-on feature enables a device to send accounting-on packets to
Send accounting-on packets RADIUS servers after it reboots, making the servers forcedly log out users
Accounting-On Interval who logged in through the device before the reboot.
340
Figure 342 RADIUS server configuration
Item Description
Select the type of the RADIUS server to be configured. Possible values include
Server Type primary authentication server, primary accounting server, secondary
authentication server, and secondary accounting server.
Specify the shared key for communication with the RADIUS server.
Key
If no shared key is specified, the shared key specified in the common configuration
Confirm Key
part is used.
341
• Add an account on the RADIUS server, with the username and password being hello@bbb and abc.
If the user passes authentication, it is assigned a privilege level of 3.
Figure 343 Network diagram
342
a. Select User Management > User for Device Management from the navigation tree.
b. Click Add in the right pane.
c. Enter hello@bbb as the username.
d. Enter abc for the password and confirm the password.
e. Select Telnet as the service type.
f. Enter 3 for the EXEC privilege level.
This parameter identifies the privilege level of the Telnet user after login. The value is 0 by
default.
g. Enter 192.168.1.0 for the start IP address of the hosts and 192.168.1.255 as the end IP
address of the host.
h. Click Add.
i. Click OK.
Figure 345 Adding a user account
343
j. Click OK.
Figure 346 Adding an access device
344
Figure 347 Adding an account for device management
345
Figure 348 RADIUS authentication server configuration page
e. To add the primary accounting server, click Add again in the RADIUS Server Configuration
area. select Primary Accounting as the server type, enter 10.1.1.1 as the IP address, enter
1813 as the port, enter expert as the key, enter expert to confirm the key, and click Apply.
The RADIUS scheme configuration page refreshes and the added servers appear in the server
list.
Figure 349 RADIUS accounting server configuration page
f. Click Apply.
346
Figure 350 RADIUS scheme configuration page
347
Verifying the configuration
After the configuration, the user can Telnet to the router and use the configured account (username
hello@bbb and password abc) to enter the user interface of the router, and access all the commands of
level 0 through level 3.
Configuration guidelines
When you configure the RADIUS client, follow these guidelines:
• Accounting for FTP users is not supported.
• If you remove the accounting server used for online users, the router cannot send real-time
accounting requests and stop-accounting messages for the users to the server, and the
stop-accounting messages are not buffered locally.
• The status of RADIUS servers, blocked or active, determines which servers the device will
communicate with or turn to when the current servers are not available. In practice, you can specify
one primary RADIUS server and multiple secondary RADIUS servers, with the secondary servers
that function as the backup of the primary servers. Generally, the device chooses servers based on
these rules:
When the primary server is in the active state, the device communicates with the primary server.
If the primary server fails, the device changes the state of the primary server to blocked, starts
a quiet timer for the server, and turns to a secondary server in the active state (a secondary
server configured earlier has a higher priority). If the secondary server is unreachable, the
device changes the state of the secondary server to blocked, starts a quiet timer for the server,
and continues to check the next secondary server in the active state. This search process
continues until the device finds an available secondary server or has checked all secondary
servers in the active state. If the quiet timer of a server expires or an authentication or
accounting response is received from the server, the status of the server changes back to active
automatically, but the device does not check the server again during the authentication or
accounting process. If no server is found reachable during one search process, the device
considers the authentication or accounting attempt a failure.
Once the accounting process of a user starts, the device keeps sending the user's real-time
accounting requests and stop-accounting requests to the same accounting server. If you remove
the accounting server, real-time accounting requests and stop-accounting requests for the user
cannot be delivered to the server any more.
If you remove an authentication or accounting server in use, the communication of the device
with the server will soon time out, and the device will look for a server in the active state by
checking any primary server first and then the secondary servers in the order they are
configured.
When the primary server and secondary servers are all in the blocked state, the device
communicates with the primary server. If the primary server is available, its statues changes to
active. Otherwise, its status remains to be blocked.
If one server is in the active state but all the others are in the blocked state, the device only tries
to communicate with the server in the active state, even if the server is unavailable.
After receiving an authentication/accounting response from a server, the device changes the
status of the server identified by the source IP address of the response to active if the current
status of the server is blocked.
• Set a proper real-time accounting interval based on the number of users.
348
Table 150 Recommended real-time accounting intervals
100 to 499 6
500 to 999 12
≥1000 ≥15
349
Configuring login control
The login control feature allows you to control Web or Telnet logins by IP address and login type.
Configuration procedure
1. Select Advanced > Access from the navigation tree.
The login control configuration page appears. The upper part of the page allows you to configure
login control rules, and the lower part displays existing login control rules.
You can also delete existing rules.
Figure 351 Login control configuration
2. To add a login control rule, configure the rule as described in Table 151 and click Apply.
3. To delete a login control rule, select the rule from the rule list and click Delete.
Table 151 Configuration items
Item Description
Login Type Select the login type to be restricted, Telnet, Web, or both.
IMPORTANT:
• Exclude the management IP segment from login control. Otherwise, you cannot log
Wildcard in to the device.
• Do not set the wildcard to 255.255.255.255. Otherwise, no user can log in to the
device.
350
Login control configuration example
Network requirements
As shown in Figure 352, configure login control rules so Host A cannot Telnet to Router, and Host B
cannot access Router through the Web.
Figure 352 Network diagram
351
5. Click Apply.
A dialog box appears, asking you whether you want to continue your operation.
6. Click OK.
A configuration progress dialog box appears, as shown in Figure 354.
Figure 354 Configuration progress dialog box
352
Figure 355 Configuring a login control rule so Host B cannot access Router through the Web
353
Configuring ARP
Overview
The Address Resolution Protocol (ARP) is used to resolve an IP address into a physical address, such as
an Ethernet MAC address.
In an Ethernet LAN, a device uses ARP to resolve the IP address of the next hop to the corresponding
MAC address.
For more information about ARP, see Layer 3—IP Services Configuration Guide in H3C MSR Series
Routers Configuration Guide (V5).
Gratuitous ARP
Gratuitous ARP packets
In a gratuitous ARP packet, the sender IP address and the target IP address are the IP address of the
sending device, the sender MAC address is the MAC address of the sending device, and the target MAC
address is the broadcast address ff:ff:ff:ff:ff:ff.
A device sends a gratuitous ARP packet for either of the following purposes:
• Determine whether its IP address is already used by another device. If the IP address is already used,
the device is informed of the conflict by an ARP reply.
• Inform other devices of a change of its MAC address.
354
Creating a static ARP entry
1. From the navigation tree, select Advanced > ARP Management > ARP Table.
The ARP Table configuration page as shown in Figure 356 appears.
2. Click Add.
The New Static ARP Entry page appears.
Figure 357 Adding a static ARP entry
Item Description
IP Address Enter an IP address for the static ARP entry.
MAC Address Enter a MAC address for the static ARP entry.
Enter a VLAN ID and specify a port for the static ARP entry.
VLAN ID
IMPORTANT:
Advanced The VLAN ID must be the ID of the VLAN that has already been created, and the port
Options Port must belong to the VLAN. The corresponding VLAN interface must have been
created.
VPN
Enter the name of the VPN instance to which the static ARP entry belongs.
Instance
355
Enabling learning of dynamic ARP entries
From the navigation tree, select Advanced > ARP Management > Dynamic Entry to enter the
configuration page, as shown in Figure 358.
Figure 358 Dynamic entry management
• To disable all the listed interfaces from learning dynamic ARP entries, click Disable all.
• To disable specific interfaces from learning dynamic ARP entries, select target interfaces and click
Disable selected.
• To allow all the listed interfaces to learn dynamic ARP entries, click Enable all.
• To allow specific interfaces to learn dynamic ARP entries, select target interfaces and click Enable
selected.
• Click the icon of an interface to enter the configuration page as shown in Figure 359, and
specify the maximum number of dynamic ARP entries that this interface can learn.
If you enter 0, the interface is disabled from learning dynamic ARP entries.
Figure 359 Modifying an interface
If you enable an interface to learn dynamic ARP entries on the dynamic entry management page, the
number of dynamic ARP entries that the interface can learn restores the default.
356
Configuring gratuitous ARP
From the navigation tree, select Advanced > ARP Management > Gratuitous ARP to enter the page, as
shown in Figure 360.
Figure 360 Configuring gratuitous ARP
Item Description
Disable learning of ARP entries according to
Disable gratuitous ARP packets learning function
gratuitous ARP packets.
357
Configuring static ARP
1. Create VLAN 10 and VLAN-interface 10:
a. From the navigation tree, select Interface Setup > LAN Interface Setup to enter the default VLAN
Setup page.
b. Select the Create option, as shown in Figure 362.
c. Enter 10 for VLAN IDs.
d. Select the Create VLAN Interface box.
e. Click Apply.
358
Figure 363 Adding Ethernet 0/1 to VLAN 10
359
Figure 365 Configuring the IP address of VLAN-interface 10
360
Figure 366 Creating a static ARP entry
361
Configuring ARP attack defense
Overview
ARP is easy to implement, but it provides no security mechanism. Therefore, it is prone to network attacks.
ARP attacks and viruses threaten LAN security. The device can provide the following features to detect
and prevent such attacks.
362
Figure 368 Send Gratuitous ARP configuration page
Item Description
Select one or more interfaces on which gratuitous ARP packets are sent out periodically,
and set the interval at which gratuitous ARP packets are sent.
To enable an interface to send out gratuitous ARP packets periodically, select the
interface from the Standby Interface list box and click <<. To disable an interface from
periodic sending of gratuitous ARP packets, select the interface from the Sending
Interface list box and click >>.
IMPORTANT:
• You can enable periodic sending of gratuitous ARP packets on a maximum of 1024
Sending Interface interfaces.
• This feature takes effect only when the link of the enabled interface goes up and an
IP address has been assigned to the interface.
• If you change the interval for sending gratuitous ARP packets, the configuration is
effective at the next sending interval.
• The frequency of sending gratuitous ARP packets may be much lower than is
expected if this function is enabled on multiple interfaces, or each interface is
configured with multiple secondary IP addresses, or a small sending interval is
configured in the preceding cases.
• Do not configure this feature on an interface belonging to a VRRP group.
From the navigation tree, select Advanced > ARP Anti-Attack > Scan to enter the page shown in Figure
369.
363
Figure 369 ARP Scan configuration page
Item Description
Interface Specify the interface on which ARP automatic scanning is to be performed.
IMPORTANT:
• You must specify both the start IP address and the end IP address. Otherwise,
specify neither of them.
End IP Address
• Start and end IP addresses must be on the same network segment as the
primary IP address or a specific manually configured secondary IP address of
the interface. The end IP address must be higher than or equal to the start IP
address.
After the preceding configuration is complete, click Scan to start an ARP automatic scan.
To stop an ongoing scan, click Interrupt.
After the scanning is complete, a prompt Scanning is complete appears. You can view the generated
dynamic ARP entries by selecting Advanced > ARP Anti-Attack > Fixed ARP from the navigation tree.
364
The number of static ARP entries changed from dynamic ARP entries is restricted by the number of static
ARP entries that the device supports. As a result, the device may fail to change all dynamic ARP entries
into static.
Suppose that the number of dynamic ARP entries is D and that of the existing static ARP entries is S.
When the dynamic ARP entries are changed into static, new dynamic ARP entries may be created
(suppose the number is M) and some of the dynamic ARP entries may be aged out (suppose the number
is N). After the process is complete, the number of static ARP entries is D + S + M – N.
From the navigation tree, select Advanced > ARP Anti-Attack > Fix to enter the page shown in Figure 370.
The page displays all dynamic ARP entries and static ARP entries (including manually configured and
changed by the fixed ARP feature).
Figure 370 Fixed ARP configuration page
• To change all dynamic ARP entries into static, click Fix All. This operation does not affect existing
static ARP entries.
• To remove all static ARP entries, click Del All Fixed. This operation does not affect dynamic ARP
entries.
• To change a specific dynamic ARP entry into static, select the ARP entry and click Fix. This operation
does not take effect if you select a static ARP entry.
• To remove a specific static ARP entry, select the ARP entry and click Del Fixed. This operation does
not take effect if you select a dynamic ARP entry.
365
Configuring IPsec VPN
You can perform the following IPsec VPN configurations in the Web interface:
• Configure an IPsec connection.
• Display IPsec VPN monitoring information.
Overview
IP Security (IPsec) is a security framework defined by the IETF for securing IP communications. It is a Layer
3 VPN technology that transmits data in a secure tunnel established between two endpoints.
IPsec provides the following security services in insecure network environments:
• Confidentiality—The sender encrypts packets before transmitting them over the Internet, protecting
the packets from being eavesdropped en route.
• Data integrity—The receiver verifies the packets received from the sender to ensure they are not
tampered with during transmission.
• Data origin authentication—The receiver verifies the authenticity of the sender.
• Anti-replay—The receiver examines packets and drops outdated and duplicate packets.
IPsec delivers these benefits:
• Reduced key negotiation overheads and simplified maintenance by supporting the IKE protocol.
IKE provides automatic key negotiation and automatic IPsec SA setup and maintenance.
• Good compatibility. You can apply IPsec to all IP-based application systems and services without
modifying them.
• Encryption on a per-packet rather than per-flow basis. Per-packet encryption allows for flexibility
and greatly enhances IP security.
IKE is built on a framework defined by ISAKMP. It provides automatic key negotiation and SA
establishment services for IPsec, simplifying the application, management, configuration and
maintenance of IPsec dramatically.
Instead of transmitting keys directly across a network, IKE peers transmit keying materials between them,
and calculate shared keys respectively. Even if a third party captures all exchanged data for calculating
the keys, it cannot calculate the keys.
For more information about IPsec and IKE, see Security Configuration Guide in H3C MSR Series Routers
Configuration Guides (V5).
366
Step Remarks
Optional.
Displays configuration and status information of IPsec connections, and
2. Displaying IPsec VPN
information of IPsec tunnels.
monitoring information
Allows you to delete tunnels that are set up with configuration of an IPsec
connection, and delete all ISAKMP SAs of all IPsec connections.
367
3. Perform basic connection configurations as described in Table 156.
Table 156 Configuration items
Item Description
IPsec Connection Name Enter a name for the IPsec connection.
Enter the address of the remote gateway, which can be an IP address or a host
name.
The IP address can be a host IP address or an IP address range. If the local end is the
initiator of IKE negotiation, it can have only one remote IP address and its remote IP
Remote Gateway address must match the local IP address configured on its peer. If the local end is the
Address/Hostname responder of IKE negotiation, it can have more than one remote IP address and one
of its remote IP addresses must match the local IP address configured on its peer.
The remote host name uniquely identifies the remote gateway in the netowrk, and
can be resolved into an IP address by the DNS server. The local end can be the
initiator of IKE negotiation when the host name is specified.
368
Item Description
Select the local ID type for IKE configured here is identical to the
negotiation phase 1. Options include: local gateway ID configured on its
peer.
• IP Address—Uses an IP address as
the ID in IKE negotiation. • In main mode, only the ID type of IP
address can be used in IKE
• FQDN—Uses an FQDN type as the
negotiation and SA establishment.
ID in IKE negotiation. If this option is
selected, enter a name without any
Local ID Type at sign (@) for the local security
gateway, for example, foo.bar.com.
• User FQDN—Uses a user FQDN
type as the ID in IKE negotiation. If
this option is selected, enter a name
string with an at sign (@) for the local
security gateway, for example,
test@foo.bar.com.
Selector Select a method to identify the traffic to be protected by IPsec. Options include:
IMPORTANT:
• To make sure SAs can be set up, configure the source address/wildcard on one
peer as the destination address/wildcard on the other, and the destination
Destination
address/wildcard on one peer as the source address/wildcard on the other. If
Address/Wildcard
you do not configure the parameters this way, SAs can be set up only when the IP
addresses configured on one peer are subsets of those configured on the other
and the peer with the narrower address range initiates SA negotiation.
• If the data range is designated by the remote gateway, the local peer cannot
initiate a negotiation.
Enable or disable IPsec RRI. When enabling IPsec RRI, you can specify a next hop
and change the preference of the static routes.
After an outbound IPsec SA is created, IPsec RRI automatically creates a static route
to the peer private network. You do not have to manually configure the static route.
IMPORTANT:
Reverse Route Injection • If you enable IPsec RRI and do not configure the static route, the SA negotiation
must be initiated by the remote gateway.
• IPsec RRI creates static routes when IPsec SAs are set up, and delete the static
routes when the IPsec SAs are deleted.
• To view the static routes created by IPsec RRI, select Advanced > Route Setup
[Summary] from the navigation tree.
369
Item Description
Change the preference of the static routes.
Change the route preference for equal-cost multipath (ECMP) routing or route
Priority backup. If multiple routes to the same destination have the same preference, traffic is
balanced among them. If multiple routes to the same destination have different
preference values, the route with the highest preference forwards traffic and all other
routes are backup routes.
Item Description
Phase 1
370
Item Description
Select the IKE negotiation mode in phase 1, which can be main or aggressive.
IMPORTANT:
• If the IP address of one end of an IPsec tunnel is obtained dynamically, the IKE
Exchange Mode negotiation mode must be aggressive. In this case, SAs can be established as long
as the username and password are correct.
• An IKE peer uses its configured IKE negotiation mode when it is the negotiation
initiator. A negotiation responder uses the IKE negotiation mode of the initiator.
Select the authentication algorithm for ESP when you select ESP or AH-ESP for Security
Protocol.
ESP Authentication You can select MD5 or SHA1, or select NULL so that ESP performs no authentication.
Algorithm
IMPORTANT:
The ESP authentication algorithm and ESP encryption algorithm cannot be null at the
same time.
371
Item Description
Select the encryption algorithm for ESP when you select ESP or AH-ESP for Security
Protocol. Options include:
• 3DES—Uses the 3DES algorithm and 168-bit key for encryption.
• DES—Uses the DES algorithm and 56-bit key for encryption.
• AES128—Uses the AES algorithm and 128-bit key for encryption.
• AES192—Uses the AES algorithm and 192-bit key for encryption.
ESP Encryption • AES256—Uses the AES algorithm and 256-bit key for encryption.
Algorithm • NULL—Performs no encryption.
IMPORTANT:
• Higher security means more complex implementation and lower speed. DES is
enough to meet general requirements. Use 3DES when high confidentiality and
security are required.
• The ESP authentication algorithm and ESP encryption algorithm cannot be null at
the same time.
IMPORTANT:
• DH Group14, DH Group5, DH Group2, and DH Group1 are in the descending
order of security and calculation time.
• When IPsec uses an IPsec connection with PFS configured to initiate negotiation, an
additional key exchange is performed in phase 2 for higher security.
• Two peers must use the same Diffie-Hellman group. Otherwise, negotiation fails.
Enter the IPsec SA lifetime, which can be time-based or traffic-based.
SA Lifetime IMPORTANT:
When negotiating to set up IPsec SAs, IKE uses the smaller one between the lifetime set
locally and the lifetime proposed by the peer.
Enables or disables IKE DPD.
DPD irregularly detects dead IKE peers. When the local end sends an IPsec packet,
DPD checks the time the last IPsec packet was received from the peer. If the time
DPD exceeds the DPD interval, it sends a DPD hello to the peer. If the local end receives no
DPD acknowledgement within the DPD packet retransmission interval, it retransmits the
DPD hello. If the local end still receives no DPD acknowledgement after having made
the maximum number of retransmission attempts (two by default), it considers the peer
already dead, and clears the IKE SA and the IPsec SAs based on the IKE SA.
DPD Query Enter the interval after which DPD is triggered if no IPsec protected packets is received
Triggering Interval from the peer.
372
Item Description
DPD Packet
Enter the interval after which DPD packet retransmission will occur if no DPD response
Retransmission
is received.
Interval
Field Description
Status of an IPsec connection. Possible values include:
• Connected.
Connection Status
• Disconnected.
• Unconfigured—The IPsec connection is disabled.
373
Field Description
The most recent error, if any. Possible values include:
• ERROR_NONE—No error occurred.
• ERROR_QM_FSM_ERROR—State machine error.
• ERROR_PHASEI_FAIL—Error occurred in phase 1.
• ERROR_PHASEI_PROPOSAL_UNMATCHED—No matching security proposal in
phase 1.
Last Connection Error
• ERROR_PHASEII_PROPOSAL_UNMATCHED—No matching security proposal in
phase 2.
• ERROR_NAT_TRAVERSAL_ERROR—NAT traversal error.
• ERROR_PHASEII_FAIL—Error occurred in phase 2.
• ERROR_INVALID_SPI—SPI error.
• ERROR_UNKNOWN—Unknown error.
Field Description
Characteristics of the IPsec protected traffic, including the source
Characteristics of Traffic address/wildcard, destination address/wildcard, protocol, source port, and
destination port.
SPI Inbound and outbound SPIs, and the security protocols used.
Configuring Router A
1. Assign IP addresses to the interfaces. (Details not shown.)
2. Configure an IPsec connection:
a. Select VPN > IPsec VPN from the navigation tree.
b. Click Add.
374
The IPsec connection configuration page appears.
c. Enter map1 as the IPsec connection name.
d. Select interface Ethernet0/1.
e. Enter 2.2.3.1 as the remote gateway IP address.
f. Select the Pre-Shared-Key box, and then enter abcde in both the Key and Confirm Key fields.
g. In the Selector area, select Characteristics of Traffic as the selector type.
h. Specify 10.1.1.0/0.0.0.255 as the source address/wildcard. Specify 10.1.2.0/0.0.0.255
as the destination address/wildcard.
i. Select Enable for RRI. Enter 2.2.2.2 as the next hop.
j. Click Apply.
Figure 376 Adding an IPsec connection
Configuring Router B
1. Assign IP addresses to the interfaces. (Details not shown.)
2. Configure a static route to Host A:
a. Select Advanced > Route Setup from the navigation tree.
b. Click the Create tab.
The page as shown in Figure 377 appears.
c. Enter 10.1.1.0 as the destination IP address.
d. Enter 24 as the mask.
e. Select Interface and then select Ethernet0/1 as the interface.
375
f. Click Apply.
Figure 377 Configuring a static route to Host A
Configuration guidelines
When you configure IPsec, follow these guidelines:
• Typically, IKE uses UDP port 500 for communication, and AH and ESP use the protocol numbers 51
and 50 respectively. Make sure flows of these protocols are not denied on the interfaces with IKE or
IPsec configured.
• If you enable both IPsec and QoS on an interface, traffic of an IPsec SA may be put into different
queues by QoS, causing some packets to be sent out of order. As IPsec performs anti-replay
operation, packets outside the anti-replay window in the inbound direction may be discarded,
resulting in packet loss. When using IPsec together with QoS, make sure the characteristics of traffic
in IPsec are the same as traffic classification in QoS.
376
Configuring L2TP
A VPDN is a VPN that utilizes the dial-up function of public networks such as ISDN or PSTN networks to
provide access services for enterprises, small ISPs, and telecommuters. VPDN provides an economical
and effective, point-to-point way for remote users to connect to their private LANs.
Layer 2 Tunneling Protocol (L2TP) is the most widely-used VPDN tunneling protocol. Figure 378 shows a
typical VPDN built by using L2TP.
Figure 378 VPDN built by using L2TP
377
Enabling L2TP
1. Select VPN > L2TP > L2TP Config from the navigation tree to enter the L2TP configuration page, as
shown in Figure 379.
2. On the upper part of the page, select the box before Enable L2TP.
3. Click Apply.
Figure 379 L2TP configuration page
378
Figure 380 Adding an L2TP group
Item Description
L2TP Group Name Specify the name of the L2TP group.
379
Item Description
Tunnel Authentication Enable or disable L2TP tunnel authentication in the group. If you
enable tunnel authentication, you need to set the authentication
password.
Either the LAC or LNS end can initiate a tunnel authentication
request. If tunnel authentication is enabled on one end, the tunnel
can be established successfully only if the other end is also
enabled with tunnel authentication, and the two ends are
configured with the same authentication passwords. If tunnel
authentication is disabled on both ends, authentication passwords
do not take effect.
Authentication Password
IMPORTANT:
• Typically, you must enable tunnel authentication on both ends
of the tunnel for security. You can disable tunnel authentication
if you want to test the network connectivity or let the local end
receive connections initiated by unknown peers.
• To change the tunnel authentication password, do so after
tearing down the tunnel. Otherwise, your change does not take
effect.
Select the authentication method for PPP users on the local end.
Authentication
Method You can select PAP or CHAP. If you do not select an authentication
method, no authentication will be performed.
Specify the ISP domain for PPP user authentication. You can:
• Click Add to enter the page for adding an ISP domain, as
shown in Figure 381. For information about the configuration
items, see Table 161.
PPP • Select an ISP domain and click Modify to enter the ISP domain
Authentication modification page. For information about the configuration
Configuration items, see Table 161.
ISP Domain • Select an ISP domain and click Delete to delete the ISP domain.
If you specify an ISP domain, the specified domain is used for
authentication, and IP addresses must be assigned from the
address pool configured in the specified domain.
If you do not specify any ISP domain, the system checks whether
the domain information is carried in a username. If yes, the
domain is used for authentication; otherwise, the default domain
(system by default) is used for authentication.
PPP Server IP/Mask Specify the IP address and mask of the local end.
380
Item Description
Specify whether to force the peer end to use the IP address
Assign Address
assigned by the local end. If you enable this function, the peer end
Forcibly
is not allowed to use its locally configured IP address.
Flow Control The L2TP tunnel flow control function is for control of data packets
in transmission. The flow control function helps in buffering and
adjusting the received out-of-order data packets.
381
Item Description
Configure user authentication on an LNS.
An LNS may be configured to authenticate a user who has passed
authentication on the LAC to increase security. In this case, an
L2TP tunnel can be set up only when both of the authentications
Mandatory CHAP succeed. An LNS can authenticate users the following ways:
• Mandatory CHAP authentication—A VPN user who depends
on a NAS to initiate tunneling requests is authenticated twice,
once when accessing the NAS and once on the LNS by using
CHAP.
• LCP re-negotiation—A PPP user who depends on a NAS to
initiate tunneling requests first performs PPP negotiation with
the NAS. If the negotiation succeeds, the NAS initiates an L2TP
tunneling request and sends the user authentication information
to the LNS. The LNS then determines whether the user is valid
according to the user authentication information received.
Under some circumstances (when authentication and
accounting are required on the LNS for example), another
round of LCP negotiation is required between the LNS and the
user. In this case, the user authentication information from the
NAS will be neglected.
• Proxy authentication—If neither LCP re-negotiation nor
mandatory CHAP authentication is configured, an LNS
performs proxy authentication of users. In this case, the LAC
sends to the LNS all authentication information from users and
the authentication mode configured on the LAC itself.
IMPORTANT:
• Among these three authentication methods, LCP re-negotiation
has the highest priority. If both LCP re-negotiation and
Mandatory LCP mandatory CHAP authentication are configured, the LNS uses
LCP re-negotiation and the PPP authentication method
configured in the L2TP group.
• With LCP re-negotiation, if no PPP authentication method is
configured in the L2TP group, the LNS will not re-authenticate
users. It will assign public addresses to the PPP users
immediately. In other words, the users are authenticated only
once at the LAC end.
• Some PPP clients may not support re-authentication, in which
case LNS side CHAP authentication will fail.
• When the LNS uses proxy authentication and the user
authentication information received from the LAC is valid, if the
authentication method configured in the L2TP group is PAP, the
proxy authentication succeeds and a session can be
established for the user. If the authentication method configured
in the L2TP group is CHAP but that configured on the LAC is
PAP, the proxy authentication fails and no session can be set
up. This is because the level of CHAP authentication, which is
required by the LNS, is higher than that of PAP authentication,
which the LAC provides.
382
Figure 381 Adding an ISP domain
Item Description
ISP Domain Specify the name of the ISP domain.
383
Item Description
Specify whether to enable the accounting optional function.
For an online user, with the accounting optional function disabled, if no
Accounting accounting server is available or communication with the current accounting
Optional server fails, the user will be disconnected. However, with the accounting
optional function enabled, the user can still use the network resources in such
case, but the system will not send the accounting information of the user to the
accounting server any more.
Specify the maximum number of users the ISP domain can accommodate. If
you do not specify the maximum number, the system will not limit the number
of users of the ISP domain.
Max. Number of Users
Because users may compete for resources, setting a proper limit on the
number of users of an ISP domain helps guarantee performance for the users
of the ISP domain.
Item Description
ISP Domain Select the ISP domain for the IP address pool to be created.
384
Item Description
Start IP Specify the start IP address and end IP address of the IP address pool.
The number of addresses between the start IP address and end IP address
End IP must not exceed 1024. If you specify only the start IP address, the IP address
pool will contain only one IP address, namely, the start IP address.
Field Description
Local Tunnel ID Local ID of the tunnel.
385
Figure 384 Network diagram
386
Figure 385 Adding a local user
2. Enable L2TP:
a. Select VPN > L2TP > L2TP Config from the navigation tree.
The L2TP configuration page appears, as shown in Figure 386.
b. Select the box before Enable L2TP.
c. Click Apply.
Figure 386 Enabling L2TP
387
Figure 387 Selecting local authentication for VPN users
388
d. Select Disable from the Tunnel Authentication list.
e. Enter 192.168.0.1/255.255.255.0 as the PPP server IP/mask.
f. Select pool1 from the User Address list.
g. Select Enable from the Assign Address Forcibly list.
h. Click Apply.
389
Configuring GRE
You can configure GRE over IPv4 tunnels through the Web interface.
Overview
Generic Routing Encapsulation (GRE) is a protocol designed for encapsulating and carrying the packets
of one network layer protocol (for example, IP or IPX) over another network layer protocol (for example,
IP). GRE is a tunneling technology and serves as a Layer 3 tunneling protocol.
A GRE tunnel is a virtual point-to-point connection for transferring encapsulated packets. Packets are
encapsulated at one end of the tunnel and de-encapsulated at the other end. Figure 391 depicts the
encapsulation and de-encapsulation processes.
Figure 391 X protocol networks interconnected through the GRE tunnel
For more information about GRE, see Layer 3—IP Services Configuration Guide in H3C MSR Series
Routers Configuration Guides (V5).
Optional.
Each end of the tunnel must have a route (static or dynamic) through the
2. Configure a route through
tunnel to the other end, so that GRE encapsulated packets can be forwarded
the tunnel.
normally.
For more information about route configuration, see "Configuring routes."
390
2. Click Add to add a GRE tunnel, as shown in Figure 393.
Figure 392 GRE tunnel configuration page
Item Description
Tunnel Interface Specify the number of the tunnel interface.
IP/Mask IMPORTANT:
When configuring a static route on the tunnel interface, note that the destination IP
address of the static route must not be in the subnet of the tunnel interface.
Specify the source IP address and destination IP address for the tunnel interface.
Tunnel Source
For the tunnel source address, you can input an IP address or select an interface. In
IP/Interface
the latter case, the primary IP address of the interface will be used as the tunnel
source address.
IMPORTANT:
Tunnel Destination IP The source address and destination address of a tunnel uniquely identify a path. They
must be configured at both ends of the tunnel and the source address at one end must
be the destination address at the other end and vice versa.
391
Item Description
Specify the key for the GRE tunnel interface. This configuration is to prevent the
tunnel ends from servicing or receiving packets from other places.
GRE Key
IMPORTANT:
The two ends of a tunnel must have the same key or have no key at the same time.
GRE Packet Checksum Enable or disable the GRE packet checksum function.
Keepalive Interval Specify the interval between sending the keepalive packets and the maximum
number of transmission attempts.
Number of Retries The two configuration items are available when you select Enable for the GRE
keepalive function.
Before the configuration, make sure Router A and Router B can reach each other.
Configuring Router A
1. Configure an IPv4 address for interface Ethernet 0/0:
a. Select Interface Setup > WAN Interface Setup from the navigation tree of Router A.
392
Figure 395 Configuring interface Ethernet 0/0
2. Configure an IP address for interface Ethernet 0/1, the physical interface of the tunnel:
a. Click the icon for interface Ethernet 0/1.
b. Select Manual for Connect Mode.
c. Enter IP address 1.1.1.1.
d. Select IP mask 24 (255.255.255.0).
e. Click Apply.
393
Figure 396 Configuring interface Ethernet 0/1
394
Figure 397 Setting up a GRE tunnel
Configuring Router B
1. Configure an IPv4 address for interface Ethernet 0/0:
a. Select Interface Setup > WAN Interface Setup from the navigation tree.
b. Click the icon for interface Ethernet 0/0 and then perform the configurations shown
in Figure 399.
395
c. Select Manual for Connect Mode.
d. Enter IP address 10.1.3.1.
e. Select IP mask 24 (255.255.255.0).
f. Click Confirm.
Figure 399 Configuring interface Ethernet 0/0
2. Configure an IP address for interface Ethernet 0/1, the physical interface of the tunnel:
a. Click the icon for interface Ethernet 0/1 and then perform the configurations shown
in Figure 400.
b. Select Manual for Connect Mode.
c. Enter IP address 2.2.2.2.
d. Select IP mask 24 (255.255.255.0).
e. Click Confirm.
396
Figure 400 Configuring interface Ethernet 0/1
397
Figure 401 Setting up a GRE tunnel
398
d. Click Start.
e. View the result of the ping operation in the Summary area.
399
SSL VPN overview
SSL VPN is a VPN technology based on SSL. It works between the transport layer and the application
layer. Using the certificate-based identity authentication, data encryption, and integrity verification
mechanisms that SSL provides, SSL VPN can establish secure connections for communications at the
application layer.
SSL VPN has been widely used for secure, remote Web-based access. For example, it can allow remote
users to access the corporate network securely. Figure 404 shows a typical SSL VPN network. On the SSL
VPN gateway, you can create resources to represent the resources on the servers in the internal network.
To access an internal server, a remote user first needs to establish an HTTPS connection with the SSL VPN
gateway and then select the resources to be accessed. The SSL VPN gateway forwards the resource
access request to the internal server. In the SSL VPN deployed network, the SSL VPN gateway establishes
an SSL connection to a remote user. By authenticating the user before allowing the user to access an
internal server, it protects the internal servers.
Figure 404 Network diagram for SSL VPN configuration
400
5. The SSL VPN gateway resolves the request, interacts with the corresponding server, and then
forwards the server's reply to the user.
Simple deployment
SSL has been integrated into most browsers, such as IE. Almost every PC installed with a browser
supports SSL. To access Web-based resources, users only need to launch a browser that supports SSL.
When a user tries to access TCP-based or IP-based resources, the SSL VPN client software runs
automatically, without requiring any manual intervention.
401
Configuring SSL VPN gateway
To perform the configurations described in this chapter, log in to the Web interface of the router. The
default login address is http://192.168.1.1, username is admin, and password is admin.
Required.
Configure a resource group and add resources to the
5. Configuring a resource group resource group.
By default, resource groups named autohome and autostart
exist.
Required.
Configure local SSL VPN users—users that need to pass
6. Configuring local users local authentication to log in to the SSL VPN system.
By default, a local user named guest (without a password)
exists, in denied state.
Required.
Configure a user group, add local users to the user group,
and select the resource groups that the user group can
access.
7. Configuring a user group By default, a user group named Guests exists, and no users
and resource groups are assigned for it.
IMPORTANT:
You can also add a local user to existing user groups when
creating the local user.
Optional.
8. Viewing user information View the online user information and the history user
information, and log out online users.
Optional.
9. Performing basic configurations for the SSL
VPN domain Configure the basic domain policy, caching policy, bulletin
information for an SSL VPN domain.
402
Step Remarks
Optional.
Configure authentication methods and authentication
parameters for an SSL VPN domain.
10. Configuring authentication policies
IMPORTANT:
Local authentication is always enabled. To use other
authentication methods, you must manually enable them.
Optional.
Configure the check items and protected resources for a
security policy. Only user hosts that pass the security
11. Configuring a security policy policy's check can access the configured resources.
IMPORTANT:
To perform security check for user hosts, you must also
enable security check in the domain policy.
Optional.
12. Customizing the SSL VPN user interface
Customize service interfaces for SSL VPN users.
Item Description
Enable SSL VPN Select the box before this item to enable the SSL VPN service.
Specify the port for providing the SSL VPN service. The default port number is
Port
443.
PKI Domain Select a PKI domain for the SSL VPN service.
403
Configuring Web proxy server resources
Typically, Web servers provide services in webpages. Users can get desired information by clicking the
links on the pages. On the Internet, information exchanged between Web servers and users is
transmitted in plain text. The HTTP data may be intercepted in transit. SSL VPN provides secure
connections for users to access Web servers, and can prevent illegal users from accessing the protected
Web servers.
1. Select VPN > SSL VPN > Resource Management > Web Proxy from the navigation tree. A page
that lists the Web proxy server resources appears.
Figure 406 Web proxy server resources list
2. Click Add to enter the page for adding a Web proxy server resource.
Figure 407 Adding a Web proxy server resource
Item Description
Enter a name for the Web proxy server source.
Resource Name The resource name must be unique in the SSL VPN system. Resources are
uniquely identified by their names.
404
Item Description
Specify the Website address for providing Web services. It must start with http://
and end with /, for example, http://www.domain.com/web1/.
Website Address The website address can be an IP address or a domain name. If you specify a
domain name, make sure that you configure domain name resolution on
Advanced > DNS Setup > DNS Configuration.
Specify the home page to be displayed after an SSL VPN user logs in. For
Default Page
example, index.htm.
405
Table 167 Configuration items
Item Description
Select this box to allow IP access to the resource.
If you select this item, you must configure an IP network resource for a website
and associate the IP network resource with the relevant users. When such a user
Use IP network accesses the website from the SSL VPN Web interface, the system logs the user in
automatically to the website through the IP network resource.
If you do not select this item, users access the resource through the Web proxy
server.
• When you select the IP network mode, this item specifies the path that the
system submits during single login. If you leave this field blank, the system uses
the address that is specified in the Website Address field.
Login Request Path
• When the IP network mode is not selected, this item specifies the relative path
of the Web proxy website. If you leave this field blank, the SSL VPN system
uses the default page specified in the Default Page field.
Username Parameter Specify the username parameter name that the system submits during automatic
Name login.
Specify the password parameter name that the system submits during automatic
Password Parameter Name
login.
Specify the other parameters for the system to submit during automatic login.
Other parameters To add a parameter other than the username and password, click Add, enter the
parameter name and parameter value on the popup page and click Apply.
406
Configuring a remote access service resource
The remote access service includes remote character terminal services (such as Telnet and SSH) and
traditional terminal services (such as IBM3270). These services each simulate a server's terminal window
on a local host through which you can control a remote host as if you were sitting before it. Between the
local and remote hosts, data is transmitted in plain text over the Internet. To ensure the security of data
transmission, SSL VPN uses the SSL encryption technology to encrypt service data.
1. Select VPN > SSL VPN > Resource Management > TCP Application from the navigation tree.
The Remote Access Service page appears.
Figure 409 Remote access service resource list
2. Click Add to enter the page for adding a remote access service.
Figure 410 Adding a remote access service
Item Description
Enter a name for the remote access service resource.
The resource name must be unique in the SSL VPN system. Resources are uniquely
identified by their names.
Resource Name
IMPORTANT:
If you do not configure the command for Command, H3C recommends including the
resource type, local address, and local port in the resource name so that users can view
the desired information after they log in to the SSL VPN system.
Specify the host name or IP address of the remote host that provides the remote access
Remote Host
service.
407
Item Description
Remote Port Specify the port number that the remote host uses for the remote access service.
Local Host Specify a loopback address or a character string that represents a loopback address.
Specify the port number that the local host uses for the remote access service. H3C
Local Port
recommends using a port number greater than 1024 that is rarely used.
3. Click Add to enter the page for adding a desktop sharing service.
Figure 412 Adding a desktop sharing service resource
408
4. Configure the desktop sharing service as described in Table 169.
5. Click Apply.
Table 169 Configuration items
Item Description
Enter a name for the desktop sharing service resource.
The resource name must be unique in the SSL VPN system. Resources are uniquely
identified by their names.
Resource Name
IMPORTANT:
If you do not configure the command for Command, H3C recommends including the
resource type, local address, and local port in the resource name so that users can view
the desired information after they log in to the SSL VPN system.
Specify the host name or IP address of the remote host that provides the desktop sharing
Remote Host
service.
Remote Port Specify the port number that the remote host uses for the desktop sharing service.
Local Host Specify a loopback address or a character string that represents a loopback address.
Specify the port number that the local host uses for the remote access service. H3C
Local Port
recommends using a port number greater than 1024 that is rarely used.
409
Figure 414 Adding an email service resource
Item Description
Enter a name for the email service resource.
The resource name must be unique in the SSL VPN system. Resources are uniquely
identified by their names.
Resource Name
IMPORTANT:
If you do not configure the command for Command, H3C recommends including the
resource type, local address, and local port in the resource name so that users can view
the desired information after they log in to the SSL VPN system.
Service Type Select an email service type, which can be POP3, IMAP, or SMTP.
Remote Host Enter the host name or IP address of the email server.
Remote Port Enter the service port number of the email server.
Local Address Enter a loopback address or a character string that represents a loopback address.
Enter the local port number. It must be the default port number for the email service of
Local Port
the specified type.
410
Figure 415 Notes services
Item Description
Enter a name for the Notes service resource.
The resource name must be unique in the SSL VPN system. Resources are uniquely
identified by their names.
Resource Name
IMPORTANT:
If you do not configure the command for Command, H3C recommends including the
resource type, local address, and local port in the resource name so that users can view
the desired information after they log in to the SSL VPN system.
Remote Host Enter the host name or IP address of the Notes mail server.
Remote Port Enter the service port number of the Notes mail server.
411
Configuring a common TCP service resource
The common TCP service of SSL VPN is designed to support various client/server applications. It is
widely used to access client/server TCP applications other than the previously mentioned ones.
Generally, you can configure all network ports that are possibly used by applications in common TCP
services. To access an application provided by a common TCP service, a user only needs to configure the
corresponding IP address and port number listed on the common TCP service page as the access
address and port number for the application.
1. Select VPN > SSL VPN > Resource Management > TCP Application from the navigation tree.
2. Click the TCP Service tab to view existing TCP services.
Figure 417 TCP services
3. Click Add to enter the page for adding a common TCP service.
Figure 418 Adding a TCP service resource
Item Description
Enter a name for the common TCP service resource.
The resource name must be unique in the SSL VPN system. Resources are uniquely
identified by their names.
Resource Name
IMPORTANT:
If you do not configure the command for Command, H3C recommends including the
resource type, local address, and local port in the resource name so that users can view
the desired information after they log in to the SSL VPN system.
412
Item Description
Service Type Enter the type for the TCP service.
Enter the host name or IP address of the remote host that provides the common TCP
Remote Host
service.
Remote Port Enter the port number that the remote host uses for the common TCP service.
Local Host Enter a loopback address or a character string that represents a loopback address.
Local Port Enter the port number that the local host uses for the common TCP service.
Required.
2. Configuring host resources Configure the host resources that users can access from the IP networks list
of the SSL VPN interface.
Optional.
3. Configuring a user-IP Configure user-IP bindings. After a user is bound with an IP address, when
binding the user accesses IP network resource, the system does not assign a virtual
network adapter IP address to the user from the global IP pool but assigns
the bound IP address to the user.
Optional.
4. Configuring a predefined With a predefined domain name configured, the gateway sends the
domain name mapping between the predefined domain name and the IP address to
clients. When accessing this domain, a client directly uses the
corresponding IP address, eliminating the requirement for DNS resolution.
413
Figure 419 Global configuration page
Item Description
Start IP Specify the IP address pool from which the gateway assigns IP addresses for clients'
End IP virtual network adapters.
Subnet Mask Enter the subnet mask to be assigned to a client's virtual network adapter.
Set an idle timeout for client connections. If the gateway does not receive any packet
Timeout
from a client during this period, the gateway disconnects the client.
WINS Server IP Enter the WINS server IP addresses to be assigned to clients' virtual network adapters.
DNS Server IP Enter the DNS server IP addresses to be assigned to clients' virtual network adapters.
Allow clients to
Select this item to allow IP access between online users.
intercommunicate
Permit only access to Select this item to allow online users to access only the VPN.
VPN If you do not select this item, online users can access both the VPN and the Internet.
414
Figure 420 Host configuration
415
6. Add a network service that the host resource provides for users, as described in Table 174.
Table 174 Configuration items
Item Description
Destination IP Enter the destination address of the network service.
Protocol Specify the protocol type of the network service, which can be IP, TCP, or UDP.
IMPORTANT:
Description If you have configured the system to show network services by description, H3C
recommends that you include the network services' network information (subnet IP/mask)
in the description so that users can view desired information after they log in to the SSL
VPN system.
7. Click Apply to add the network service to the network service list.
8. Repeat steps 5 to 7 to add multiple network resources.
9. Click the Add button under the shortcuts list to enter the page for adding a network service shortcut.
Figure 423 Adding a network service shortcut
10. Enter a name for the shortcut and specify the Windows command of the shortcut.
11. Click Apply to add the shortcut to the shortcut list.
12. Repeat steps 9 to 11 to add multiple shortcuts.
13. Click Apply at the bottom of the Add Host Resource page.
416
3. Click Add to enter the page for adding a user-IP binding.
Figure 425 Adding a user-IP binding
Item Description
Specify the username to be bound with an IP address. The username must contain the
Username
domain name. For example, aaa@local.
3. Click Add to enter the page for adding a predefined domain name
417
Figure 427 Adding a predefined domain name
Item Description
Domain Name Enter a domain name to be issued to clients.
Specify an IP address for the domain name when the IP setting method is Static.
IP
When the IP setting method is Dynamic, this IP setting does not take effect.
418
Figure 429 Adding a resource group
Item Description
Resource Group Name Enter a name for the resource group.
Selected Resources
Specify resources for the resource group.
Available Resources
419
Configuring local users
Configure SSL VPN users for local authentication in the following methods:
• Configure local users one by one in the SSL VPN system. In this method, you can configure all
parameters for a user at the same time, including the user name, password, the certificate and MAC
addresses to be bound, public account settings, user status, and user groups.
• Write the information of the users into a text file, and then import the users to the SSL VPN system.
Users imported in this method only contain the username and password information, with the user
status being Permitted. You can configure more parameters for an imported user by modifying the
user's information.
420
Figure 431 Adding a local user
Item Description
Username Enter a name for the local user.
Password Specify a password for the local user and enter the password again to confirm the
Confirm Password password.
Specify a certificate sequence number for the local user. The certificate number will be
Certificate SN
used for identity authentication of the local user.
421
Item Description
Select this item to set the local user account as a public account. A public account can
Enable public be concurrently used by multiple users to log in to the SSL VPN system.
account If you do not select this item, only one user can use the local user account to log in to the
SSL VPN system at a time.
Max Number of Set the maximum number of concurrent users that can log in to the SSL VPN system by
Users using the public account.
User Status Select a user status, which can be Permitted, Permitted When Valid, and Denied.
Expiry Date Set the expiry date for the user when the user status is set to Permitted When Valid.
Select this item to enable MAC address learning. To implement the two
functions, you must also
With this function enabled, when a user uses this user
enable the MAC address
account to log in, the SSL VPN system automatically learns
Enable MAC binding function in the
the MAC address of the user host and records the MAC
domain policy (see
address learning address for the account. The SSL VPN can record up to
"Configuring the domain
three MAC addresses for an account. The recorded MAC
policy").
addresses are still effective after you disable the MAC
address learning function.
Selected User
Groups
Specify the user groups to which the local user belongs.
Available User
Groups
422
Figure 432 Batch import of local users
423
Figure 434 Adding a user group
Item Description
User Group Name Enter a name for the user group.
Selected Resource Groups Select resource groups for the user group. Users in the user group will be able to
Available Resources access the resources in the selected resource groups.
424
Viewing user information
Viewing online user information
1. Select VPN > SSL VPN > User Management > User Information from the navigation tree.
The Online Users tab appears, displaying the information of the current online users.
Figure 435 Online users
To log out a user, you can also click the icon for the user.
425
Figure 436 History information
426
Table 181 Configuration items
Item Description
Select this item to enable security check.
With security check enabled, the SSL VPN system checks a user host based on the
security policy and determines whether to allow the user to access resources according
Enable security check to the check result.
IMPORTANT:
To implement user host security check, you must also configure the security policy. See
"Configuring a security policy."
Select this item to use verification codes.
Use verification code After you select this item, users must enter the correct verification codes to log in to the
SSL VPN system.
Select the default authentication method used on the SSL VPN login page.
Default IMPORTANT:
Authentication
To specify an authentication method other than local authentication as the default
Method
authentication method, you must also enable the authentication method (see
"Configuring authentication policies").
Certificate's Select the certificate field to be used as the username when the authentication mode is
Username Field certificate. Options include the Common-Name filed and the Email-Address field.
Set a timeout for the verification code displayed on the SSL VPN login page. If a user
Verify Code Timeout does not enter the displayed verification code in this period, the verification code
becomes invalid. The user can refresh the login page to get a new verification code.
427
Configuring the caching policy
1. Select VPN > SSL VPN > Domain Management > Basic Configuration from the navigation tree.
2. Click the Caching Policy tab. The caching policy configuration page appears, as shown in Figure
438.
3. Select the operations to be done on a user host when the user logs out, including:
Clear cached webpages.
Clear cookies.
Clear downloaded programs. Downloaded programs refer to the SSL VPN client software that
was automatically downloaded and run when the users logged in to the SSL VPN system.
Clear configuration files. Configuration files refer to the configuration file that was
automatically saved when a user changed the settings of the SSL VPN client software, if any.
4. Click Apply.
Figure 438 Caching policy
Configuring a bulletin
1. Select VPN > SSL VPN > Domain Management > Basic Configuration from the navigation tree.
2. Click the Bulletin Management tab.
The bulletin management page appears.
Figure 439 Bulletin management
428
Figure 440 Adding a bulletin
Item Description
Title Enter a name for the bulletin.
429
• Password—Authenticates only a user's password.
• Password+Certificate—Authenticates a user's password and client certificate.
• Certificate—Authenticates only a user's client certificate.
RADIUS authentication supports only two authentication policies: password and password+certificate.
430
Figure 442 RADIUS authentication
Item Description
Enable RADIUS
Select this item to enable RADIUS authentication.
authentication
Enable RADIUS
Select this item to enable RADIUS accounting.
accounting
Upload virtual With this item selected, the system uploads the IP address of the client's virtual network
address adapter to the RADIUS server after RADIUS accounting succeeds.
431
Figure 443 LDAP authentication
Item Description
Enable LDAP
Select this item to enable LDAP authentication.
authentication
Server Port Specify the TCP port number used by the LDAP server.
User Group Attribute Specify the name of the user group attribute configured on the LDAP server.
Specify conditions to Select this option to query user DN by specified conditions, including the administrator
query user DN DN, password, search base DN, and search template.
Enter a user DN that has the administrator rights, which include the right to view the
Admin DN
login user information.
Password Enter a user password that has the administrator right and enter the password again to
Confirm Password confirm the password.
Use a template to
Select this option to query the user DN by a template.
query user DN
User DN template Specify the user DN template to be used to query the user DN.
432
Configuring AD authentication
Active Directory (AD) is a directory service provided by Windows 2000 Server and later versions. It
saves information of objects on a network and allows administrators and users to query the information.
AD uses structured data storage, which is the basis of the directory information logical structure. The SSL
VPN system can cooperate with the existing AD server of an enterprise seamlessly to provide AD
authentication for users in the enterprise.
For successful AD authentication of a user, you must also configure the user information on the AD
authentication server, create user groups, and add the user to the user groups. Make sure that the user
groups configured on the authentication server exist on the SSL VPN gateway. Otherwise, the user cannot
log in. The number of user groups that the gateway supports for a user has a limit. Make sure the number
of user groups specified for a user on the authentication server is equal to or less than the limit.
1. Select VPN > SSL VPN > Domain Management > Authentication Policy from the navigation tree.
2. Click the AD Authentication tab. The LDAP authentication configuration page appears.
Figure 444 AD authentication
Item Description
Enable AD
Select this item to enable AD authentication.
authentication
AD Server IP You can specify four AD servers at most. When one server fails, the system uses another
server to authenticate users. The system selects the specified servers in the configuration
order of the servers. The first configured server has the highest priority.
Server Recovery Time Set the interval at which the system checks whether the failed AD server recovers.
Set an administrator account. It must be a user account that has the directory search
Admin Username
right in the User directory in the AD domain.
433
Item Description
Password Set a password for the administrator account, and enter the password again to confirm
Confirm Password the password.
Set the username format used to log in to the AD server. Options include Without the
Username Format
AD domain name, With the AD domain name, and Login name.
Item Description
Enable combined
Select this item to enable combined authentication.
authentication
First-Time Authentication
Select an authentication method as the first-time authentication method.
Method
Second-Time Authentication
Select an authentication method as the second-time authentication method.
Method
With this item selected, the system provides the login page and asks a user
for a password again after the user passes the first authentication. If you do
not select this item, the system automatically uses the password for the first
Ask password again on the authentication for the second authentication.
second authentication
IMPORTANT:
This function takes effect only when you enable full customization of the user
interface and the customized user interface can provide a login page twice.
434
Configuring a security policy
Insecure user hosts may bring potential security threats to the internal network. You can configure security
policies for the SSL VPN system so that when a user logs in, the SSL VPN system checks the user host's
operating systems, browsers, antivirus software, firewall software, files and processes, and determines
which resources to provide for the user according to the check result.
A security policy defines multiple check categories, each of which contains multiple check rules. To pass
the check of a category, a host must satisfy at least one rule of the category. To pass the check of a
security policy, a host must satisfy all categories of the policy.
1. Select VPN > SSL VPN > Domain Management > Security Policy from the navigation tree. The
security policy list page appears.
Figure 446 Security policies
435
3. Configure the security policy as describe in Table 187.
4. Click Apply.
Table 187 Configuration items
Item Description
Name Enter a name for the security policy.
Set a level for the security policy. A larger number means a higher level.
If multiple security policies are defined, the system first uses the security policy with the
highest priority to check the user host. If the host does not satisfy the security policy, the
Level system uses the security policy with the second highest priority, and so forth until the
host satisfies a security policy or fails security check. The resources that the user can
access are those defined in the security policy that the user first passes. Therefore, when
you configure security policies, specify more resources for a security policy that has a
higher level.
Policy Configuration To pass the check of a category, a host needs to satisfy at least one rule of the category.
To pass the check of a security policy, a host must satisfy all categories of the policy.
Click the expansion button before a category to view the rule information. Click the
Add button to add a rule for the category. For more information about rule
configuration, see Table 188.
Specify the resources that can be accessed by user hosts that satisfy the security policy.
Resource You can select All Web Proxies, All TCP Applications, and all IP Networks. To select
Configuration specific Web proxies, TCP applications, or IP networks, click the corresponding
expansion button.
Item Description
Rule Name Enter a name for the operating system rule.
Specify the operating system type. A user host must run the specified type of
Type
operating system to pass security check.
Operating
System Specify the operating system version. The operating system of a user host must
Version
satisfy the version requirement to pass security check.
Specify the operating system patches. The operating system of a user host must
Patch
have the specified patches installed to pass security check.
436
Item Description
Set an operator for the browser version check.
• >=: A user host must use the specified version or a later version.
• >: A user host must use a version later than the specified version.
Operator
• =: A user host must use the specified version.
• <=: A user host must use the specified version or an earlier version.
• <: A user host must use a version earlier than the specified version.
Version IMPORTANT:
An IE browser version must be a floating point number with up to two digits after
the radix point.
Specify the browser patches. The browser of a user host must have the
Patch
specified patches installed to pass security check.
Specify the antivirus software type. A user host must use the specified type of
Type
antivirus software to pass security check.
Set an operator for antivirus software version check and virus definitions
version check.
• >=: The antivirus software and its virus definitions must be of the specified
version or a later version.
• >: The antivirus software and its virus definitions must have a version later
Antivirus than the specified version.
Operator
Software • =: The antivirus software and its virus definitions must be of the specified
version.
• <=: The antivirus software and its virus definitions must be of the specified
version or an earlier version.
• <: The antivirus software and its virus definitions must have a version earlier
than the specified version.
Virus Definitions
Specify the virus definitions version.
Version
Specify the firewall type. A user host must use the specified type of firewall to
Type
pass security check.
437
Item Description
Rule Name Enter a name for the file rule.
File Specify the files. A user host must have the specified files to pass security
File Name
check.
438
Customizing the SSL VPN user interface
The SSL VPN system allows you to customize the user interface partially or fully as desired:
• Partial customization—You can use the webpage files provided by the system and edit some
contents in the files as needed, including the login page title, login page welcome information,
login page logo, service page banner information, service page logo, and service page
background. For the locations of the information items, see the red boxes in Figure 448 and Figure
449.
• Full customization—You can edit a webpage file of your own to provide a fully customized user
access interface.
Figure 448 Customizable information on the login page
439
Figure 449 Customizable information on the service page
440
Configuring the login page logo
1. Select VPN > SSL VPN > Page Customization > Partial Customization from the navigation tree.
2. Click the Login Page Logo tab to enter the page shown in Figure 451.
3. Click Browse to select a local picture file.
4. Set whether to directly overwrite the file with the same name on the device.
5. Click Apply to upload the picture file to the SSL VPN system and use it as the logo picture on the
login page.
Figure 451 Specifying a login page logo picture
441
Figure 453 Specifying a service page background picture
Item Description
Enable full customization Select this item to enable the full customization function.
Enter the directory where the customized page files are saved on the SSL
Directory
VPN gateway.
Page File Enter the name of the customized login page file.
442
User access to SSL VPN
This chapter introduces user access to the SSL VPN service interface provided by the system. It is not
suitable for user access to a fully customized SSL VPN service interface.
After you finish configurations on the SSL VPN gateway, remote users can establish HTTPS connections
to the SSL VPN gateway, and access resources through the user service interface provided by the SSL
VPN gateway.
3. On the login page, enter the username and password, select an authentication method.
4. Click Login to enter the SSL VPN service interface, as shown in Figure 456. If you have specified
TCP applications or IP network resources for the user, the system automatically runs the SSL VPN
client software for the user, as shown in Figure 457.
IMPORTANT:
If you have enabled verification code authentication, the login page also provides the verification code
and the user must enter the correct the verification code to log in.
443
Figure 456 SSL VPN service interface
444
• Clicking a resource name under Websites to access the website.
• Clicking a resource name under TCP Applications to run the command you configured for the
resource (if any), or performing configurations according to the information provided by the
resource name and then access the resource. For example, a user can configure the Outlook email
receiving and sending servers according to the email resource name, logs in by using the username
and password, and then uses the email service.
• For an IP network resource, the user can access any host in any accessible network segment and
can click a shortcut name to execute the corresponding command of the shortcut.
445
Changing the login password
To change the login password, a user needs to perform the following configurations:
1. Click the Configure button in the upper right corner of the SSL VPN service interface to enter the
page shown in Figure 459.
2. Enter the new password, and confirm the new password.
3. Click Apply.
When the user logs in again, the user must enter the new password.
Figure 459 Changing login password
446
SSL VPN configuration example
Network requirements
As shown in Figure 460, request a certificate and enable SSL VPN service on the SSL VPN gateway so
that users can use HTTPS to log in to the SSL VPN gateway to access the internal resources of the
corporate network.
In this configuration example:
• In this example, the CA runs the Windows Server and the SCEP plugin is required on the CA.
• The IP address of the SSL VPN gateway is 10.1.1.1/24. The IP address of the CA is 10.2.1.1/24, and
the name of the CA is CA server. The CA is used to issue certificates to the SSL VPN gateway and
remote users.
• Perform RADIUS authentication for SSL VPN users. The IP address of the RADIUS server (a
CAMS/IMC server) is 10.153.10.131/24. After passing authentication, an SSL VPN user can access
the internal technology website whose IP address is 10.153.1.223, all hosts on subnet
10.153.2.0/24, and the security sever whose IP address is 10.153.2.25 through the FTP shortcut.
• Configure a public account named usera. Specify that only one user can use the public account to
log in at a time. Configure local authentication for the public account and authorize a user who logs
in by using the public account to access the shared desktop provided by internal host
10.153.70.120.
• Specify the default authentication method as RADIUS for the SSL VPN domain and enable
verification code authentication.
Figure 460 Network diagram
Host
Remote user
10.1.1.1/24
Internet
Device
SSL VPN gateway
Internal servers
10.2.1.1/24
CA
Configuration prerequisites
• The SSL VPN gateway, the CA, and the hosts used by remote users can reach each other.
• The CA is enabled with the CA service and can issue certificates to the SSL VPN gateway and the
hosts.
• The RADIUS server is properly configured to provide normal authentication function for users. In this
example, you need to configure the shared key as expert, configure the user account and user
group information, and add users to user group user_gr2.
447
Configuration procedure
Configuring the SSL VPN service
1. Configure a PKI entity named en:
a. Select Certificate Management > Entity from the navigation tree.
b. Click Add to enter the PKI configuration page, as shown in Figure 461.
c. Enter the PKI entity name en.
d. Enter common name http-server for the entity.
e. Click Apply.
448
Figure 462 Configuring a PKI domain named sslvpn
449
Figure 464 Retrieving the CA certificate to the local device
You can view the retrieved CA certificate and the local certificate on the certificate management page.
450
Figure 466 Certificate management page
6. Enable SSL VPN, and configure a port and a PKI domain for the SSL VPN service:
a. Select VPN > SSL VPN > Service Management from the navigation tree.
b. Select the box before Enable SSL VPN.
c. Set the port number to 443.
d. Select sslvpn as the PKI domain.
e. Click Apply.
451
d. Enter the website address http://10.153.1.223/.
e. Click Apply.
2. Configure a resource named desktop for the desktop sharing service provided by host
10.153.70.120:
a. Select VPN > SSL VPN > Resource Management > TCP Application from the navigation tree.
b. Click the Desktop Sharing Service tab.
c. Click Add.
The desktop sharing service configuration page appears, as shown in Figure 469.
d. Enter the resource name desktop, enter the remote host address 10.153.70.120, set the remote
port for the server to 3389, enter the local host address 127.0.0.2, set the local port for the
service to 20000, and enter the command line mstsc /v 127.0.0.2:20000.
e. Click Apply.
452
Figure 469 Configuring a desktop sharing service resource
4. Configure a host resource named sec_srv for hosts in subnet 10.153.2.0/24 in IP network mode:
a. Select VPN > SSL VPN > Resource Management > IP Network from the navigation tree.
b. Click the Host Configuration tab.
453
c. Click Add to enter the host resource configuration page.
d. Enter the resource name sec_srv.
e. Click the Add button under the Network Services list.
f. On the page that appears, as shown in Figure 471, enter the destination IP address
10.153.2.0, enter the subnet mask 24, select IP as the protocol type, specify the description
information as 10.153.2.0/24, and click Apply.
The network service is added to the host resource.
g. Click the Add button under the Shortcuts list.
h. On the page that appears, as shown in Figure 472, enter the shortcut name ftp_security-server
and the shortcut command ftp 10.153.2.25, and click Apply.
The shortcut is added to the host resource. Now, the host resource configuration page is as
shown Figure 473.
i. Click Apply.
Figure 471 Adding a network service to the host resource
454
Figure 473 Configuring a host resource
6. Configure resource group res_gr2, and add resources tech and sec_srv to it:
a. On the resource group list page, click Add.
455
b. Enter the resource group name res_gr2.
c. Select resources tech and sec_srv on the Available Resources list and click the << button to add
them to the Selected Resources list.
d. Click Apply.
456
Figure 476 Adding local user usera
2. Configure user group user_gr1, assign resource group res_gr1 to the user group and add local
user usera to the user group:
a. Select VPN > SSL VPN > User Management > User Group from the navigation tree to enter the
user group list page.
b. Click Add.
The user group configuration page appears, as shown in Figure 477.
c. Enter the user group name user_gr1.
d. Select res_gr1 on the Available Resource Groups list and click << to add it to the Selected
Resource Groups list.
e. Select usera on the Available Local Users list and click << to add the user to the Selected Local
Users list.
f. Click Apply.
457
Figure 477 Configuring user group user_gr1
3. Configure user group user_gr2, and assign resource group res_gr2 to the user group:
a. On the user group list page, click Add.
b. Enter the user group name user_gr2.
c. Select res_gr2 on the Available Resource Groups list and click << to add it to the Selected
Resource Groups list.
d. Click Apply.
458
Figure 478 Configuring user group user_gr2
459
Figure 479 Configuring the domain policy
460
Figure 481 Configuring RADIUS scheme named system
461
Figure 483 SSL VPN login page
Select Local from the Auth Mode list. Use the public account usera to log in. You can see the resource
desktop, as shown in Figure 484. Clicking the resource name, you can access the shared desktop of the
specified host, as shown in Figure 485.
Figure 484 Resource that the public account usera can access
462
Figure 485 Access the desktop sharing resource
Assume that a user named userb is configured and added to user group user_gr2 on the RADIUS server.
Use this user account and the default authentication method RADIUS to log in. You can see website tech,
subnet resource 10.153.2.0/24, and a shortcut to the security server, as shown in Figure 486. Click tech
to access the technology website. Click shortcut ftp_security-server to access the security server through
FTP, as shown in Figure 487.
463
Figure 486 Resources that a non-public account can access
464
Managing certificates
Overview
Public Key Infrastructure (PKI) offers an infrastructure for securing network services. PKI, also called
asymmetric key infrastructure, uses a pair of keys (one private and one public) for data encryption and
decryption. Data encrypted with the public key can be decrypted only with the private key, and vice
versa.
PKI uses digital certificates to distribute and employ public keys, and provides network communication
and e-commerce with security services such as user authentication, data confidentiality, and data
integrity.
H3C's PKI system provides certificate management for IPsec, SSL, and WAPI.
The PKI technology can satisfy the security requirements of online transactions. As an infrastructure, PKI
has a wide range of applications. Here are some application examples:
• VPN—A VPN is a private data communication network built on the public communication
infrastructure. A VPN can leverage network layer security protocols (for example, IPsec) in
conjunction with PKI-based encryption and digital signature technologies to achieve confidentiality.
• Secure email—Emails require confidentiality, integrity, authentication, and non-repudiation. PKI
can address these needs. A common secure email protocol is S/MIME, which is based on PKI and
allows for transfer of encrypted mails with signature.
• Web security—For Web security, two peers can establish an SSL connection first for transparent
and secure communications at the application layer. With PKI, SSL enables encrypted
communications between a browser and a server. Both the communication parties can verify the
identity of each other through digital certificates. For more information about PKI, see Security
Configuration Guide.
465
Step Remarks
Required.
Create a PKI entity and configure the identity information.
A certificate is the binding of a public key and the identity information of an
1. Creating a PKI entity entity, where the distinguished name (DN) shows the identity information of
the entity. A CA identifies a certificate applicant uniquely by an entity DN.
The DN settings of an entity must be compliant to the CA certificate issue
policy. Otherwise, the certificate request might be rejected. You must know
the policy to determine which entity parameters are mandatory or optional.
Required.
Create a PKI domain, setting the certificate request mode to Manual.
2. Creating a PKI domain Before requesting a PKI certificate, an entity needs to be configured with
some enrollment information, which is called a PKI domain.
A PKI domain is intended only for convenience of reference by other
applications like IKE and SSL, and has only local significance.
Required.
Generate a local RSA key pair.
By default, no local RSA key pair exists.
Generating an RSA key pair is an important step in certificate request. The
3. Generating an RSA key key pair includes a public key and a private key. The private key is kept by
pair the user, and the public key is transferred to the CA along with some other
information.
IMPORTANT:
If a local certificate already exists, you must remove the certificate before
generating a new key pair, so as to keep the consistency between the key pair
and the local certificate.
Required.
Certificate retrieval serves the following purposes:
• Locally store the certificates associated with the local security domain for
improved query efficiency and reduced query count,
4. Retrieving the CA
• Prepare for certificate verification.
certificate IMPORTANT:
If a local CA certificate already exists, you cannot perform the CA certificate
retrieval operation. This restriction avoids possible mismatch between
certificates and registration information resulting from relevant changes. To
retrieve the CA certificate, you must remove the CA certificate and local
certificate first.
466
Step Remarks
Required.
When requesting a certificate, an entity introduces itself to the CA by
providing its identity information and public key, which will be the major
components of the certificate.
A certificate request can be submitted to a CA in online mode or offline
mode.
• In online mode, if the request is granted, the local certificate will be
5. Requesting a local retrieved to the local system automatically.
certificate • In offline mode, you must retrieve the local certificate by an out-of-band
means.
IMPORTANT:
If a local certificate already exists, you cannot perform the local certificate
retrieval operation. This restriction avoids inconsistency between the certificate
and the registration information due to configuration changes. To retrieve a
new local certificate, you must remove the CA certificate and local certificate
first.
Optional.
If the certificate to be retrieved contains an RSA key pair, you must destroy
6. Destroying the RSA key pair the existing RSA key pair. Otherwise, you cannot retrieved the certificate.
Destroying the existing RSA key pair also destroys the corresponding local
certificate.
467
Task Remarks
Required.
Create a PKI domain, setting the certificate request mode to Auto.
2. Creating a PKI domain Before requesting a PKI certificate, an entity needs to be configured with
some enrollment information, which is called a PKI domain.
A PKI domain is intended only for convenience of reference by other
applications like IKE and SSL, and has only local significance.
Optional.
If the certificate to be retrieved contains an RSA key pair, you must destroy
3. Destroying the RSA key pair the existing RSA key pair. Otherwise, the certificate cannot be retrieved.
Destroying the existing RSA key pair also destroys the corresponding local
certificate.
Optional.
Retrieve an existing certificate and display its contents.
IMPORTANT:
• Before retrieving a local certificate in online mode, be sure to complete
4. Retrieving and displaying a
LDAP server configuration.
certificate
• If a CA certificate already exists, you cannot retrieve another CA
certificate. This restriction avoids inconsistency between the certificate
and the registration information due to configuration changes. To retrieve
a new CA certificate, remove the existing CA certificate and local
certificate first.
2. Click Add.
468
Figure 489 Create a PKI entity
Item Description
Entity Name Enter the name for the PKI entity.
FQDN An FQDN is a unique identifier of an entity on the network. It consists of a host name and
a domain name and can be resolved to an IP address. For example, www.whatever.com
is an FQDN, where www indicates the host name and whatever.com the domain name.
Country/Region
Enter the country or region code for the entity.
Code
469
Figure 490 PKI domains
2. Click Add.
Figure 491 Creating a PKI domain
Item Description
Domain Name Enter the name for the PKI domain.
470
Item Description
Select the local PKI entity.
When submitting a certificate request to a CA, an entity needs to show its identity
Entity Name
information.
Available PKI entities are those that have been configured.
IMPORTANT:
• In offline mode, this item is optional. In other modes, this item is required.
• This item does not support domain name resolution.
LDAP IP Enter the IP address, port number, and version of the LDAP server.
Port An LDAP server is usually deployed to store certificates and CRLs. If this is the case, you
must configure the IP address of the LDAP server..
Version
Request Mode Select the online certificate request mode, which can be auto or manual.
Password Set a password for certificate revocation and re-enter it for confirmation.
Confirm Password The two boxes are available only when the certificate request mode is set to Auto..
Fingerprint Hash After receiving the root certificate of the CA, an entity needs to verify the fingerprint of the
root certificate, namely, the hash value of the root certificate content. This hash value is
unique to every certificate. If the fingerprint of the root certificate does not match the one
configured for the PKI domain, the entity will reject the root certificate.
• If you specify MD5 as the hash algorithm, enter an MD5 fingerprint. The fingerprint
must a string of 32 characters in hexadecimal notation.
• If you specify SHA1 as the hash algorithm, enter an SHA1 fingerprint. The fingerprint
must a string of 40 characters in hexadecimal notation.
• If you do not specify the fingerprint hash, do not enter any fingerprint. The entity will
Fingerprint not verify the CA root certificate, and you yourself must make sure the CA server is
trusted.
IMPORTANT:
The fingerprint must be configured if you specify the certificate request mode as Auto. If you
specify the certificate request mode as Manual, you can leave the fingerprint settings null. If
you do not configure the fingerprint, the entity will not verify the CA root certificate and you
yourself must make sure the CA server is trusted.
471
Item Description
Set the polling interval and attempt limit for querying the certificate request status.
Polling Count
After an entity makes a certificate request, the CA might need a long period of time if it
verifies the certificate request in manual mode. During this period, the applicant needs to
Polling Interval query the status of the request periodically to get the certificate as soon as possible after
the certificate is signed.
Enable CRL
Select this box to specify that CRL checking is required during certificate verification.
Checking
Enter the CRL update period, that is, the interval at which the PKI entity downloads the
latest CRLs.
This item is available after you click the Enable CRL Checking box.
CRL Update Period By default, the CRL update period depends on the next update field in the CRL file.
IMPORTANT:
The manually configured CRL update period takes precedent over that specified in the CRL
file.
Enter the URL of the CRL distribution point. The URL can be an IP address or a domain
name.
CRL URL This item is available after you click the Enable CRL Checking box.
When the URL of the CRL distribution point is not set, you should acquire the CA
certificate and a local certificate, and then acquire a CRL through SCEP.
472
Figure 493 Generating an RSA key pair
473
4. Click Apply.
Table 192 Configuration items
Item Description
Domain Name Select the PKI domain for the certificate.
Certificate Type Select the type of the certificate to be retrieved, which can be CA or local.
Enable Offline Select this box to retrieve a certificate in offline mode (that is, by an out-of-band means
Mode like FTP, disk, or email).
Get File From Specify the path and name of the certificate file to import if you enable offline mode:
Device • If the certificate file is saved on the device, select Get File From Device and then specify
the path and name of the file on the device. If no file is specified, the system, by
default, gets the file domain-name_ca.cer (for the CA certificate) or
Get File From PC domain-name_local.cer (for the local certificate) under the root directory of the device.
• If the certificate file is saved on a local PC, Select Get File From PC and then specify the
path and name of the file and specify the partition that saves the file..
If offline mode is enabled, enter the password for protecting the private key, which was
Password
specified when the certificate was exported.
After retrieving a certificate, click View Cert for the certificate from the PKI certificates list to display the
contents of the certificate.
Figure 496 Displaying certificate information
474
Requesting a local certificate
1. From the navigation tree, select Certificate Management > Certificate.
2. Click Request Cert.
Figure 497 Requesting a certificate
Item Description
Domain Name Select the PKI domain for the certificate.
Select this box to request a certificate in offline mode, that is, by an out-of-band means
like FTP, disk, or email.
Enable Offline If you cannot request a certificate from the CA through the SCEP protocol, you can enable
Mode the offline mode. In this case, after clicking Apply, the offline certificate request
information page appears, as shown in Figure 498. Submit the information to the CA to
request a local certificate.
4. Click Apply.
If you request the certificate in online mode, the system displays "Certificate request has been
submitted." Click OK to confirm. If you request the certificate in offline mode, the system displays
the offline certificate request information. You can submit the information to the CA by an
out-of-band means.
Figure 498 Offline certificate request information
475
Retrieving and displaying a CRL
1. From the navigation tree, select Certificate Management > CRL.
Figure 499 CRLs
476
• The router retrieves CRLs for certificate verification.
Figure 501 Network diagram
477
c. Enter aaa as the PKI entity name, enter router as the common name, and click Apply.
Figure 502 Creating a PKI entity
478
3. Generate an RSA key pair:
a. From the navigation tree, select Certificate Management > Certificate.
b. Click Create Key.
c. Enter 1024 as the key length, and click Apply.
Figure 504 Generating an RSA key pair
479
c. Select torsa as the PKI domain, select Password and then enter "challenge-word" as the
password, and click Apply.
The system displays "Certificate request has been submitted."
d. Click OK to confirm.
480
2. Configure extended attributes:
After configuring the basic attributes, configure the parameters on the Jurisdiction Configuration
page of the CA server. This includes selecting the proper extension profiles, enabling the SCEP
autovetting function, and adding the IP address list for SCEP autovetting.
3. Configure the CRL publishing behavior:
After completing the configuration, perform CRL related configurations.
In this example, select the local CRL publishing mode of HTTP and set the HTTP URL to
http://4.4.4.133:447/myca.crl.
After the configuration, make sure the system clock of the router is synchronous to that of the CA,
so that the router can request certificates and retrieve CRLs properly.
481
e. In the advanced configuration area, click the Enable CRL Checking box, and enter
http://4.4.4.133:447/myca.crl as the CRL URL.
f. Click Apply.
The system displays "Fingerprint of the root certificate not specified. No root certificate
validation will occur. Continue?"
g. Click OK to confirm.
482
4. Retrieve the CA certificate:
a. From the navigation tree, select Certificate Management > Certificate.
b. Click Retrieve Cert.
c. Select torsa as the PKI domain, select CA as the certificate type, and click Apply.
Figure 511 Retrieving the CA certificate
483
a. From the navigation tree, sfter retrieving a local certificate, select Certificate Management >
CRL.
b. Click Retrieve CRL of the PKI domain of torsa.
484
Figure 514 Network diagram
Configuring Router A
1. Create a PKI entity:
a. From the navigation tree, select Certificate Management > Entity.
b. Click Add.
c. Enter en as the PKI entity name, enter router-a as the common name, enter 2.2.2.1 as the IP
address of the entity, and click Apply.
485
Figure 515 Creating a PKI entity
486
Figure 516 Creating a PKI domain
487
Figure 518 Retrieving the CA certificate
488
Figure 520 Configuring an IPsec connection
Configuring Router B
The configuration pages for Router B are similar to those of Router A. (Details not shown)
1. Create a PKI entity:
a. From the navigation tree, select Certificate Management > Entity.
b. Click Add.
c. Enter en as the PKI entity name, enter router-b as the common name, and enter 3.3.3.1 as the
IP address of the entity.
d. Click Apply.
2. Create a PKI domain:
a. From the navigation tree, select Certificate Management > Domain.
b. Click Add.
The configuration page appears.
c. In the upper area of the page, enter 1 as the PKI domain name, enter CA2 as the CA identifier,
select en as the local entity, select RA as the authority for certificate request, enter
http://2.1.1.100/certsrv/mscep/mscep.dll as the URL for certificate request (the RA URL given
here is just an example. Configure the RA URL as required), enter 2.1.1.102 as the IP address
of the LDAP server and 389 as the port number, select 2 as the version number, and select
Manual as the certificate request mode.
d. Click the expansion button before Advanced Configuration to display the advanced
configuration items.
e. In the advanced configuration area, click the Enable CRL Checking box and enter
ldap://2.1.1.102 as the URL for CRLs.
f. Click Apply.
489
The system displays "Fingerprint of the root certificate not specified. No root certificate
validation will occur. Continue?"
g. Click OK to confirm.
3. Generate an RSA key pair:
a. From the navigation tree, select Certificate Management > Certificate.
b. Click Create Key.
c. Click Apply to generate an RSA key pair.
4. Retrieve the CA certificate:
a. From the navigation tree, select Certificate Management > Certificate.
b. Click Retrieve Cert.
c. Select 1 as the PKI domain, select CA as the certificate type, and click Apply.
5. Request a local certificate:
a. From the navigation tree, select Certificate Management > Certificate.
b. Click Request Cert.
c. Select 1 as the PKI domain, and click Apply.
The system displays "Certificate request has been submitted."
d. Click OK to confirm.
6. Add an IPsec connection:
a. From the navigation tree, select VPN > IPsec VPN.
b. Click Add.
c. Enter con as the IPsec connection name, select Ethernet0/2 as the gateway interface, enter
2.2.2.1 as the remote gateway IP address, select Certificate as the authentication method, and
select CN=router-b for the certificate, select Characteristics of Traffic as the selector type, enter
10.1.1.0/0.0.0.255 as the source IP address/wildcard, and enter 11.1.1.0/0.0.0.255 as the
destination IP address/wildcard.
d. Click Apply.
Configuration guidelines
When you configure PKI, follow these guidelines:
• Make sure the clocks of entities and the CA are synchronous. Otherwise, the validity period of
certificates will be abnormal.
• The Windows 2000 CA server has some restrictions on the data length of a certificate request. If the
PKI entity identity information in a certificate request goes beyond a certain limit, the server will not
respond to the certificate request.
• The SCEP plug-in is required when you use the Windows Server as the CA. In this case, specify RA
as the authority for certificate request when you configure the PKI domain.
• The SCEP plug-in is not required when you use the RSA Keon software as the CA. In this case,
specify CA as the authority for certificate request when you configure the PKI domain.
490
Managing the system
Besides the following methods, the Web management interface allows you to click the button on
the right of the title area to fast save the configuration.
Saving the configuration takes a period of time.
The system does not support the operation of saving configuration of two or more consecutive users. If
such a case occurs, the system prompts the latter users to try later.
When you save the current configuration on a distributed device, the standby main processing unit (MPU)
does not save the .xml configuration file. To ensure the synchronization between the active MPU and the
standby MPU, copy this file to the standby MPU.
To save the configuration:
1. Select System Management > Configuration from the navigation tree.
The save configuration page appears.
Figure 521 Saving the configuration
491
To save the current configuration to both the configuration file to be used at the next startup and
the factory default configuration file, click Save As Factory-Default Settings.
Backing up configuration
Configuration file backup allows you to:
• View the configuration file for next startup (including .cfg and .xml files).
• Back up the configuration file for next startup (including .cfg and .xml files) to the PC of the current
user.
To back up the configuration:
1. Select System Management > Configuration from the navigation tree.
2. Click the Backup tab.
The page for configuring file backup appears.
Figure 523 Configuration file backup page
492
When you click the upper Backup button in this figure, a file download dialog box appears.
You can select to view the .cfg file or to save the file locally.
When you click the lower Backup button in this figure, a file download dialog box appears.
You can select to view the .xml file or to save the file locally.
Restoring configuration
Configuration restoration allows you to:
• Upload the .cfg file on the host of the current user to the device for the next startup.
• Upload the .xml file on the host of the current user to the device for the next startup, and delete the
previous .xml configuration file that was used for the next startup.
To restore the configuration:
1. Select System Management > Configuration from the navigation tree.
2. Click the Restore tab.
The restoring configuration file page appears.
Figure 524 Restoring configuration file page
493
• Fast restoration—Transfers files from the device where the files are backed up to the local device
through a USB port. In addition, the system allows you to choose whether to specify the startup file
or configuration file to be restored as the main startup file or configuration file of the device.
The storage medium of a device has many types, such as flash cards, CF cards, and so on. The storage
medium type used by the device depends on the device model.
To backup and restore device files through the USB port:
1. Select System Management > Configuration from the navigation tree.
2. Click Backup and Restore.
The backup and restoration page appears.
Figure 525 Backing up and restoring device files through the USB port
494
Rebooting the device
CAUTION:
Before rebooting the device, save the configuration. Otherwise, all unsaved configuration will be lost after
reboot. After the device reboots, you need to re-log in to the Web interface.
Managing services
This module provides six types of services: FTP, Telnet, SSH, SFTP, HTTP and HTTPS. You can enable or
disable the services as needed. In this way, the performance and security of the system can be enhanced,
thus secure management of the device can be achieved.
This module also provides the function to modify HTTP and HTTPS port numbers, and the function to
associate the FTP, HTTP, or HTTPS service with an ACL, reducing attacks of illegal users on these services.
The description of the services is as follows:
• FTP service—Transfers files between server and client over a TCP/IP network.
• Telnet service—Provides remote login and virtual terminal functions on the network.
• SSH service—Offers an approach to securely logging in to a remote device. By encryption and
strong authentication, it protects devices against attacks such as IP spoofing and plain text
password interception.
495
• SFTP service—Uses the SSH connection to provide secure data transfer. The device can serve as the
SFTP server, allowing a remote user to log in to the SFTP server for secure file management and
transfer. The device can also serve as an SFTP client, enabling a user to log in from the device to a
remote device for secure file transfer. It is a new feature in SSH2.0.
• HTTP service—Transfers Web page information across the Internet. It is an application-layer
protocol in the TCP/IP protocol suite. You can log in to the device by using the HTTP protocol with
HTTP service enabled, accessing and controlling the device with Web-based network
management.
• HTTPS service—Secures data transmission through SSL as follows:
Uses the SSL protocol to ensure the legal clients to access the device securely and prohibit the
illegal clients.
Encrypts the data exchanged between the HTTPS client and the device to ensure the data
security and integrity, realizing the security management of the device.
Defines certificate attribute-based access control policy for the device to control the access right
of the client to further avoid attacks from illegal clients.
To manage services:
1. Select System Management> Service Management from the navigation tree.
The service management configuration page appears.
2. Configure the service management as described in Table 194.
3. Click Apply.
Figure 527 Service management
Item Description
Enable FTP Specify whether to enable the FTP service.
service. The FTP service is disabled by default.
FTP Associate the FTP service with an ACL. Only the clients that pass the ACL
filtering are permitted to use the FTP service.
ACL.
You can view this configuration item by clicking the expanding button in
front of FTP.
496
Item Description
Enable SSH Specify whether to enable the SSH service.
SSH
service. The SSH service is disabled by default.
Configure the local certificate for the HTTPS service. The list displays the
certificate subjects. The optional certificates are configured on the VPN >
Certificate Management page. For more information, see "Managing
Certificate. certificates."
IMPORTANT:
If no certificate is specified, HTTPS generates a self-signed certificate.
HTTPS Set the port number for HTTPS service.
You can view this configuration item by clicking the expanding button in
Port Number. front of HTTPS.
IMPORTANT:
When you modify a port, make sure the port is not used by other service.
Associate the HTTPS service with an ACL. Only the clients that pass the ACL
filtering are permitted to use the HTTPS service.
ACL.
You can view this configuration item by clicking the expanding button in
front of HTTPS.
Managing users
This module provides the following functions:
• Create a local user, and set the password, access level, and service type for the user.
• Set the super password for switching the current Web user access level to the management level
• Switch the current Web user access level to the management level.
497
Creating a user
1. Select System Management > Users from the navigation tree.
2. Click the Create User tab.
The page for creating local users appears.
3. Create the user as described in Table 195.
4. Click Apply.
Figure 528 Creating a user
Item Description
Username Set the username for a user.
Set the access level for a user. Therefore, users of different levels can perform different
operations. Ranging from low to high, Web user levels are as follows:
• Visitor—Users of this level can use the network diagnostic tools ping and trace route.
They can neither access the device data nor configure the device.
• Monitor—Users of this level can only access the device data but cannot configure the
device.
Access Level • Configure—Users of this level can access data from the device and configure the
device, but they cannot upgrade the host software, add/delete users, modify users, or
backup/restore the application file.
• Management—Users of this level can perform any operations for the device.
IMPORTANT:
Only the Web, FTP, and Telnet users support the access level setting.
Password Set the password for a user.
Enter the same password again. Otherwise, the system prompts that the two passwords
Confirm Password
entered are not consistent when you apply the configuration.
498
Item Description
Set the service type, including Web, FTP, Telnet, Terminal (users logging in to the device
Service through the console port, AUX port, and Asyn port) and PPP services. You must select at
least one of them.
Item Description
Set the operation type:
Create/Remove • Create—Configure or modify the super password.
• Remove—Remove the current super password.
Password Set the password for a user to switch to the management level.
Enter the same password again. Otherwise, the system prompts that the two passwords
Confirm Password
entered are not consistent when you apply the configuration.
499
The access level switchover of a user is valid for the current login only. The access level configured for the
user is not changed. When the user re-logs in to the Web interface, the access level of the user is still the
original level.
To switch the user access level to the management level:
1. Select System Management > Users from the navigation tree.
2. Click the Switch to Management tab.
The access level switching page appears.
3. Enter the super password.
4. Click Login.
Figure 530 Access level switching page
500
Figure 531 System time configuration page
Item Description
NTP Server 1. Enable clock automatic synchronization with an NTP server. You can
specify two NTP servers by entering their IP addresses. NTP Server 1 is the
primary and NTP Server 2 is the secondary.
IMPORTANT:
• With automatic synchronization configured, the device periodically
Automatic synchronizes its time with the NTP server. If the synchronization fails, the
Synchronizat system uses the manually configured time. After the synchronization
ion NTP Server 2. recovers, the system uses the synchronized time.
• The IP address of an NTP server is a host address, and cannot be a
broadcast or a multicast address, or the IP address of the local clock.
• If the system time of the NTP server is ahead of the system time of the
device, and the difference between them exceeds the Web idle time
specified on the device, all online Web users are logged out because of
timeout.
501
Figure 532 Calendar page
Item Description
Time Zone Set the time zone for the system.
502
Item Description
Adjust the system clock for daylight saving time changes, which means adding one
hour to the current system time.
Click Adjust clock for daylight saving time changes to expand the option, as shown
in Figure 534. You can configure the daylight saving time changes in the following
ways:
Adjust clock for • Specify that the daylight saving time starts on a specific date and ends on a specific
daylight saving time date. The time range must be greater than one day and smaller than one year. For
changes example, configure the daylight saving time to start on August 1st, 2006 at
06:00:00 a.m., and end on September 1st, 2006 at 06:00:00 a.m.
• Specify that the daylight saving time starts and ends on the corresponding specified
days every year. The time range must be greater than one day and smaller than one
year. For example, configure the daylight saving time to start on the first Monday in
August at 06:00:00 a.m., and end on the last Sunday in September at 06:00:00
a.m.
Configuring TR-069
TR-069 protocol is a technology specification initiated and developed by the DSL Forum. It defines the
general frame, message format, management method, and data model for the management and
configuration of home network devices in the next-generation network.
TR-069 is mainly applied to DSL access networks. In a DSL access network, user devices are large in
number and deployed separately usually in the customer premise. Therefore device management and
maintenance is hard to perform. TR-069 is designed to solve the problem by the idea of remote central
management of the Customer Premises Equipment (CPE) through an Auto-Configuration Server (ACS).
503
TR-069 network framework
Figure 535 Network diagram
Auto-configuration
When a CPE logs in to an ACS, the ACS can automatically apply some configurations to the CPE to
perform auto configuration of the CPE. Auto-configurable parameters supported by the device include,
but are not limited to the following:
• Configuration file (ConfigFile)
504
• ACS address (URL)
• ACS username (Username)
• ACS password (Password)
• Inform message auto sending flag (PeriodicInformEnable)
• Inform message auto sending interval (PeriodicInformInterval)
• Inform message auto sending time (PeriodicInformTime)
• CPE username (ConnectionRequestUsername)
• CPE password (ConnectionRequestPassword)
505
• CPE address
• CPE username
• CPE password
For the TR-069 mechanism, see Network Management and Monitoring Configuration Guide in H3C
MSR Series Routers Configuration Guide (V5).
Configuration procedure
The TR-069 parameters of CPE can be configured automatically through ACS remote management, and
also can be configured manually through Web, which is described in detail in this section.
To configure TR-069 manually:
1. Select System Management > TR-069 from the navigation tree.
The TR-069 configuration page appears.
2. Configure TR-069 as described in Table 199.
3. Click Apply.
Figure 536 TR-069 configuration page
Item Description
Enable or disable TR-069.
TR-069
TR-069 configurations can take effect only after you enable TR-069.
URL. Configure the URL used by a CPE to initiate a connection to the ACS.
Username. Configure the username used by a CPE to initiate a connection to the ACS.
ACS Configure the password used by a CPE to initiate a connection to the ACS.
Password. You can specify a username without a password that is used in the authentication.
If so, the configuration on the ACS and that on the CPE must be the same.
Configure the username used by the CPE to authenticate the connection sent from
CPE Username.
the ACS.
506
Item Description
Configure the password used by the CPE to authenticate the connection sent from
the ACS.
Password.
You can specify a username without a password that is used in the authentication.
If so, the configuration on the ACS and that on the CPE must be the same.
Sending
Enable or disable CPE's periodical sending of Inform messages.
Inform.
Set the CPE connection interface. The CPE sends inform packets carrying the IP
CPE Interface. address of this interface to make the ACS establish a connection with the CPE using
this IP address.
Configuration guidelines
TR-069 configuration through ACS is of higher priority than that through Web. You cannot use a
configuration mode to modify parameters configured through a configuration mode with a higher
priority.
To remove the configuration of a parameter, select the parameter, clear the value you entered, and click
Apply.
Upgrading software
CAUTION:
Software upgrade takes a period of time. During software upgrade, do not perform any operation on the
Web interface. Otherwise, software upgrade may be interrupted.
A system software image, also known as the "boot file", is an application file used to boot the device. A
main system software image is used to boot a device and a backup system software image is used to
boot a device only when the main system software image is unavailable.
Software upgrade allows you to get a target application file from the current host and set the file as the
system software image ( or as the main or backup system software image on the devices that support
main/backup system software image) to be used at the next boot.
507
Figure 537 Software upgrade configuration page
Item Description
Specify the filename of the local application file, which must be suffixed with
the .app or .bin extension.
File
IMPORTANT:
The filename is main.bin when the file is saved on the device.
Reboot after the upgrading Specify whether to reboot the device to make the upgraded software take
finished effect after the application file is uploaded.
508
Table 201 Configuration items
Item Description
Specify the filename of the local application file, which must be suffixed with
File
the .app or .bin extension.
Specify the type of the system software image for the next boot:
File Type • Main.
• Backup.
If a file with same name Specify whether to overwrite the file with the same name.
already exists, overwrite If you do not select the option, when a file with the same name exists, the system
it without any prompt prompts "The file has existed.", and you cannot perform the upgrade operation.
Reboot after the Specify whether to reboot the device to make the upgraded software take effect
upgrading finished after the application file is uploaded.
509
Configuring SNMP (lite version)
Overview
The Simple Network Management Protocol (SNMP) is an Internet standard protocol widely used for a
management station to access and operate the devices on a network, regardless of their vendors,
physical characteristics and interconnect technologies.
The SNMP framework comprises the following elements:
• SNMP manager—Works on a network management system (NMS) to monitor and manage the
SNMP-capable devices in the network.
• SNMP agent—Works on a managed device to receive and handle requests from the NMS, and
send traps to the NMS when some events, such as interface state change, occur.
H3C supports SNMPv1, SNMPv2c, and SNMPv3. An NMS and an SNMP agent must use the same
SNMP version to communicate with each other.
• SNMPv1—Uses community names for authentication. To access an SNMP agent, an NMS must use
the same community name as set on the SNMP agent. If the community name used by the NMS is
different from the community name set on the agent, the NMS cannot establish an SNMP session to
access the agent or receive traps and notifications from the agent.
• SNMPv2c—Uses community names for authentication. SNMPv2c is compatible with SNMPv1, but
supports more operation modes, data types, and error codes.
• SNMPv3—Uses a user-based security model (USM) to secure SNMP communication. You can
configure authentication and privacy mechanisms to authenticate and encrypt SNMP packets for
integrity, authenticity, and confidentiality.
For more information about the SNMP protocol, see H3C MSR Series Routers Network Management and
Monitoring Configuration Guide.
510
Figure 539 SNMP page
Item Description
Specify to enable or disable the SNMP agent.
SNMP IMPORTANT:
If the SNMP agent function is disabled, all SNMP agent-related configurations will
be removed.
Set the SNMP version run by the system.
SNMP Version The option SNMPv1 & v2 represents SNMPv1 and SNMPv2c.
The SNMP version on the agent must be the same as that running on the NMS.
Device Location Set a character string to describe the physical location of the device.
511
Item Description
Set the SNMP security username when you select the SNMP version SNMPv3.
Security Username
The security name on the agent must be the same as that on the NMS.
Set the authentication password when you select the SNMP version SNMPv3.
The authentication password on the agent must be the same as that on the NMS.
Authentication Password
The authentication mode on the agent is MD5, and the authentication mode on
the NMS must be MD5.
Set the privacy password when the SNMP version is selected as SNMPv3.
The privacy password on the agent must be the same as that on the NMS.
Privacy Password
The privacy mode on the agent is DES56, and the privacy mode on the NMS
must be DES56.
When the SNMP version is SNMPv1 & v2 set the read-only password with which
Read Password the NMS can perform only read operation to the agent.
The read password on the agent must be the same as that on the NMS.
When the SNMP version is SNMPv1 & v2, set the read and write password with
Read & Write Password which the NMS can perform both read and write operations to the agent.
The read and write password on the agent must be the same as that on the NMS.
• When the SNMP version is SNMPv1 & v2, set the authentication password
with which the agent can send traps to the NMS. The trap password on the
agent must be the same as that on the NMS. The trap password is usually the
Trap Password same with either the read password or the read & write password.
• The trap password defaults to the security username and is not configurable
when the SNMP version is SNMPv3.
512
Configuring the SNMP agent
1. Select System Management > SNMP from the navigation tree, and then perform configuration as
shown in Figure 541.
Figure 541 Configuring the SNMP agent
513
SNMPv3 configuration example
Network requirements
As shown in Figure 542, the NMS (1.1.1.2/24) uses SNMPv3 to monitor and manage the interface status
of the agent (1.1.1.1/24), and the agent automatically sends traps to report events to the NMS.
The NMS and the agent perform authentication when they set up an SNMP session. The authentication
algorithm is MD5 and the authentication key is authkey. The NMS and the agent also encrypt the SNMP
packets between them by using the DES algorithm and the privacy key prikey.
Figure 542 Network diagram
514
Configuring the SNMP NMS
The configuration on the NMS must be consistent with that on the agent. Otherwise, you cannot perform
corresponding operations.
1. Specify the SNMP version for the NMS as v3.
2. Create an SNMP user user1.
3. Enable both authentication and privacy functions
4. Use MD5 for authentication and DES56 for encryption.
5. Set the authentication key to authkey and the privacy key to prikey.
For more information about configuring the NMS, see the NMS manual.
515
Configuring syslogs
System logs record network and device information, including running status and configuration changes.
With system log information, network administrators can find network or security problems, and take
corresponding actions against them.
The system sends system logs to the following destinations:
• Console
• Monitor terminal, a terminal that has logged in to the device through the AUX, VTY, or TTY user
interface
• Log buffer
• Log host
• Web interface
Displaying syslogs
1. Select Other > Syslog from the navigation tree.
The syslog display page appears, as shown in Figure 544.
516
Figure 544 Syslog display page
Item Description
Time/Date Displays the time/date when the system log was generated.
517
Item Description
Displays the severity level of the system log. The information is classified into eight
levels by severity:
• Emergency—The system is unusable.
• Alert—Action must be taken immediately.
• Critical—Critical condition.
Level
• Error—Error condition.
• Warning—Warning condition.
• Notification—Normal but significant condition.
• Information—Informational messages.
• Debug—Debug-level messages.
518
Table 204 Loghost configuration items
Item Description
IPv4/Domain
Set the IPv4 address or domain name of the log host.
Loghost IP/Domain
IPv6
Set the IPv6 address of the log host.
Loghost IP
Item Description
Buffer Capacity Set the number of logs that can be stored in the log buffer.
519
Using diagnostic tools
This chapter describes how to use the ping and traceroute facilities.
Traceroute
By using the traceroute facility, you can trace Layer 3 devices involved in delivering a packet from source
to destination.
You can traceroute the IP address or the host name of a device. If the target host name cannot be resolved,
a prompt appears.
A traceroute operation involves the following steps:
1. The source device sends a packet with a Time to Live (TTL) value of 1 to the destination device.
2. The first hop device responds with an ICMP TTL-expired message to the source. In this way, the
source device can get the address of the first Layer 3 device.
3. The source device sends a packet with a TTL value of 2 to the destination device.
4. The second hop responds with an ICMP TTL-expired message.
5. The above process continues until the ultimate destination device is reached. The destination
device responds with an ICMP port-unreachable message because the packet from the source has
an unreachable port number. In this way, the source device can get the addresses of all Layer 3
devices on the path.
Ping
You can ping the IP address or the host name of a device.
If the host name cannot be resolved, a prompt appears. If the source device does not receive an ICMP
echo reply within the timeout time, it displays a prompt and ping statistics. If the source device receives
ICMP echo replies within the timeout time, it displays the number of bytes for each echo reply, the
message sequence number, Time to Live (TTL), the response time, and ping statistics. Ping statistics
include number of packets sent, number of echo reply messages received, percentage of messages not
received, and the minimum, average, and maximum response time.
A ping operation involves the following steps:
1. The source device sends ICMP echo requests to the destination device.
2. The destination device responds by sending ICMP echo replies to the source device after receiving
the ICMP echo requests.
3. The source device displays related statistics after receiving the replies.
Traceroute operation
The Web interface does not support IPv6 traceroute.
Before executing a traceroute operation, execute the ip ttl-expires enable command on intermediate
devices to enable the sending of ICMP timeout packets, and execute the ip unreachables enable
command on the destination device to enable the sending of ICMP destination unreachable packets.
520
To perform a traceroute operation:
1. Log in to the Web interface, and select Other > Diagnostic Tools from the navigation tree to enter
the traceroute operation page, as shown in Figure 547.
2. Enter the destination IP address or host name.
3. Click Start.
You can see the result in the Summary box.
Figure 547 Traceroute configuration page
Ping operation
The Web interface does not support IPv6 ping.
To perform a ping operation:
1. Select Other > Diagnostic Tools from the navigation tree.
2. Click the Ping tab, as shown in 3.
3. Enter the destination IP address or host name.
4. Click Start.
You can see the result in the Summary box.
521
Figure 548 Ping configuration page
522
Configuring WiNet
The Wisdom Network (WiNet) technology helps you centrally manage a large number of scattered
network devices by using a small number of public IP addresses.
WiNet has the following benefits:
• Integration—WiNet is integrated in network devices as a function without needing any dedicated
management device.
• Easy to deploy—To build a WiNet, you only need to select a management device to complete
network configurations.
• Low cost—No additional software is needed.
• User-friendly GUI—Facilitates operations and management.
• Plug-and-play—Displays a device in the network topology once it is connected to the network and
allows you to perform corresponding operations.
• Easy and quick deployment of security authentication—Allows you to configure a RADIUS server on
the administrator device through simple Web configuration and to configure interfaces of member
devices for security authentication through the administrator device.
Devices in a WiNet are classified into three roles.
• Administrator—Refers to the device serving as the WiNet management device. In a WiNet, only
the administrator is configured with a public IP address. You only need to specify one administrator
in each WiNet to configure, manage, and monitor other devices. The administrator collects
information to discover and add candidates.
• Member—Refers to a device managed by the administrator.
• Candidate—Refers to a WiNet-capable device that has not been added to the WiNet but its
topology information has been collected by the administrator.
Figure 549 Network diagram
Configuring WiNet
Enabling WiNet
To build a WiNet, configure a candidate as the administrator and configure WiNet on it.
523
1. Select WiNet from the navigation tree.
When WiNet is disabled, a dialog box Only the WiNet administrator supports the function
appears.
2. Click OK to enter the Setup page, as shown in Figure 550.
3. Configure WiNet, as shown in Table 206.
Figure 550 WiNet setup page
Item Description
WiNet Name Enter a WiNet name.
Enter a management VLAN ID in the WiNet. You can enter an existing static
VLAN only.
The management VLAN is used by WiNet packets for communication. It
actually defines the WiNet management range and delivers the following
functions:
Management VLAN • Isolates WiNet management packets from other packets.
• Enables internal communication between the administrator, members, and
candidates.
WiNet management requires that the management VLAN traffic be permitted
on the administrator’s ports (including cascade ports if there is any) connected
to members, candidates, and the external network.
IP Pool (Administrator IP) Enter an IP address and select a network mask for the administrator. After that,
each WiNet member is assigned an IP address on the same subnet as the
Mask of IP Pool administrator.
After a WiNet is built, you cannot configure items on the Setup page, and the Build WiNet button
changes to Close WiNet. To delete the WiNet, click the Close WiNet button.
524
To customize the background image, click Browse, locate the image you want to use, and click Upload.
To remove the customized background image, click Clear.
Managing WiNet
To manage WiNet members, make sure the port that connects your host to the administrator permits
packets of the management VLAN. Select WiNet from the navigation tree to enter the default WiNet
Management page.
Figure 551 WiNet management page
525
6. After the authentication center starts up, the Open AuthN Center button changes to Close AuthN
Center. Click the Close AuthN Center to remove the RADIUS server and the guest user.
7. Drag the icon of a specific device in the WiNet topology and place it to a position as needed. If
the browser is configured to accept cookies, the latest position information of each device is stored
after you click Network Snapshot.
8. Double-click a device on the WiNet topology map to show details about the device, including the
hostname, MAC address, device model, IP address, version, number of hops, and WiNet
information, as shown in Figure 552.
Figure 552 Device details
9. View the WiNet topology information, including the role of each device and connection status
between devices. The connection status can be:
Normal link—Indicates a connection existing in the baseline topology and the current
topology.
New link—Indicates a connection not existing in the baseline topology but in the current
topology.
Blocked loops—Indicate connections blocked by STP. If a normal link is blocked, it is displayed
as a black broken line; if a new link is blocked, it is displayed as a blue broken line.
Down link—Indicates a connection existing in the baseline topology but not in the current
topology.
10. Click a device in the topology diagram to view its panel diagram. You can manage the device as
follows:
NOTE:
Support for displaying of the device panel, device renaming, and Layer 2 portal authentication on
interfaces depends on the device model.
a. Click Rename Device and enter a new system name for the device.
526
Figure 553 Rename a device
b. Select one or multiple Layer 2 Ethernet interfaces on the panel diagram of the device, and click
Port Guard to enable Layer 2 portal authentication on the interfaces.
CAUTION:
You cannot enable Layer 2 portal authentication on an interface that connects to a member/candidate
device, connects to an external network, or connects to the console terminal.
c. If a member is selected, click Manage Device to log in to the Web interface for configuring the
member. You can configure and manage the member through the Web interface. The
username and password are required before you can log in to the member. If the current user
and password are consistent with those of the member, you can directly log in to the member.
d. If a member is selected, click Initialize to restore the configuration to factory defaults and restart
the member.
e. If a member is selected, click Reboot to restart the member.
527
Figure 555 Add a user
Item Description
Username Enter the name of the user.
VLAN IMPORTANT:
If the access device does not support authorized VLANs, users with the authorized
VLAN ID specified cannot pass authentication.
Enter an authorized ACL number for the user.
ACL IMPORTANT:
If the access device does not support authorized ACL properties, users with the
authorized ACL specified cannot pass authentication.
Set the time when the user becomes invalid, in the format of
HH:MM:SS-YYYY/MM/DD.
Expire Time
A user whose system time is later than the preset expire time cannot pass
authentication.
528
Batch importing and exporting RADIUS users
Select WiNet from the navigation tree, and click the User Management tab to enter the page as shown
in Figure 554.
1. Click Export and click Save in the dialog box that appears.
2. Set the local path and file name for saving the exported files.
3. Click Save to export all the RADIUS user information in the files to the local host.
4. Click Import.
The page for importing files appears.
5. Click Browse to locate the local xml files to be imported.
6. Click Apply to import the user information in the files to the device.
Figure 556 Import files
Because the guest password is automatically updated at 24:00 every day, the guest administrator must
re-obtain the password.
To customize a portal authentication page on a member, reference the variable szPTGuestPWD (for
saving guest password) in pt_private.js in the authentication passed page, and use the JS mode to
529
display the password, for example, <script type="text/javascript">if (szPTGuestPWD !="")
document.write("Guest password is " + szPTGuestPWD);</script>.
Configuration procedure
1. Configure Device A and Device C:
# Configure Ethernet 0/1 on each device to permit VLAN 10 traffic. (Details not shown.)
2. Configure Device B:
# Create VLAN 10 and VLAN-interface 10.
a. Select Interface Setup > LAN Interface Setup from the navigation tree to enter the default VLAN
Setup page.
530
Figure 559 Creating VLAN 10 and VLAN-interface 10
531
a. On the VLAN Setup page, select 10 in the VLAN Config field.
b. Select Ethernet0/1, Ethernet0/2, and Ethernet0/3 from the list.
c. Click Add.
The configuration progress dialog box appears.
Figure 561 Configuration progress dialog box
532
Figure 562 Specifying an IP address for VLAN-interface 10
533
Figure 563 Enabling WiNet
534
Figure 564 WiNet topology diagram
535
Figure 565 Network diagram
Configuration procedure
1. Establish a WiNet
See "WiNet establishment configuration example."
2. Configure WiNet-based RADIUS authentication
# Specify a RADIUS user.
a. Log in to Device B through Ethernet 0/1.
b. Select WiNet from the navigation tree on Device B.
c. Click the User Management tab.
d. Click Add.
e. Enter client for Username, client_password for Password, and client_password for Confirm
Password, and select Common User for User-type.
f. Click Apply.
# Set up a RADIUS server.
536
Figure 567 Setting up a RADIUS server
537
Figure 568 Enabling Layer 2 portal authentication on Ethernet 0/2 of Device A
538
Configuration wizard
Overview
The configuration wizard helps you establish a basic call, and configure local numbers and connection
properties.
Selecting a country
In the wizard homepage, click Start to access the country selection page, as shown in Figure 570.
539
Figure 570 Country selection page
Item Description
Call Progress Tone
Configure the device to play the call progress tones of a specified country or region.
Country Mode
Item Description
Line Specify the FXS voice subscriber lines.
540
Configuring connection properties
After you finish the local number configuration, click Next to access the connection property
configuration page, as shown in Figure 572.
Figure 572 Connection property configuration page
Item Description
Specify the address of the main registrar. It can be an IP address or a
Main Registrar Address
domain name.
Main Registrar Port Number Specify the port number of the main registrar.
Backup Registrar Port Number Specify the port number of the backup registrar.
Proxy Server Port Number Specify the port number of the proxy server.
541
Local number and call route
The local number and call route parts contain basic settings, fax and modem, call services, and
advanced settings pages.
Basic settings
To implement a basic voice call, complete local number and call route configurations.
• Local number configuration includes setting a local telephone number and authentication
information used for registration.
• Call route configuration includes setting a destination telephone number and call route type. You
can select either SIP routing or trunk routing as the call route type. SIP routing includes proxy server
mode, IP routing mode, and binding server group mode.
For more information about basic settings of local number and call route, see Basic settings.
Call services
Call services contains various new functions on the basis of voice basic call to meet the application
requirements of VoIP users.
For more information about call services configuration, see Call services.
Some call services require the involvement of a voice server. For how to configure the voice server, see
"Configuring SIP connections."
Advanced settings
The advanced settings include the following parts:
• Coding parameters—This part includes the configuration of codec priorities and packet assembly
intervals. The voice codec affects the voice bandwidth and voice quality. You must select a proper
codec according to the actual network. The packet assembly interval depends on the network
bandwidth and network architecture, and affects codec delay time.
• Others—This part includes the configuration of number selection priority, dial prefix, called number
sending mode, DTMF transmission mode, DSCP field value, and so on.
542
Basic settings
Call route
Call route configuration includes setting a destination telephone number and call route type. The call
route type can be either SIP routing or trunk routing.
SIP routing
SIP routing includes proxy server mode, IP routing mode, and binding server group mode. If you select
IP routing, the called parties can be found through static IP addresses or domain names. Figure 573
shows the network diagram for IP routing mode.
Figure 573 Network diagram for IP routing mode
Figure 574 shows the network diagram for proxy server and binding server group modes, which require
the involvement of a SIP server.
Figure 574 Network diagram for proxy server and binding server group modes
Trunk routing
You can connect devices to the PBX on the PSTN network through FXO, E&M, VE1, VT1, and BSV trunk
lines. Among them, VE1 and VT1 trunk routing enables the device to provide more voice communication
channels. Therefore, it greatly increases device usage and broadens the service range.
543
See Configuring trunking mode calling for the configuration example of using the trunking routing as the
call route type.
Basic settings
Configuring a local number
Select Voice Management > Local Number from the navigation tree, and click Add to access the page for
creating a local number, as shown in Figure 575.
Figure 575 Local number configuration page
Item Description
Number ID Enter a local number ID in the range of 1 to 9999.
This list displays all FXS voice subscriber lines. Select a voice subscriber line to be
Bound Line
bound with the local number.
544
Item Description
Specify the authentication information used for handshake authentication between the
Cnonce Name
registrar and the SIP UA.
Specify the realm name used for handshake authentication between the registrar and
SIP UA.
IMPORTANT:
Realm Name
If you configure a realm name on the SIP UA, make sure it is the same as that configured
on the registrar. Otherwise, the SIP UA fails the authentication due to mismatch. If no
realm name is configured on a SIP UA, the SIP UA performs no realm name match and
considers that the realm name configured on the registrar is trusted.
Status Enable or disable the local number.
IMPORTANT:
• If it is necessary to configure authentication information for a local number, the same authentication
information is recommended for the same telephone number.
• In the case of authentication, it is forbidden to modify the authentication information after the register
function is enabled because this operation may result in registration update failures.
545
Figure 576 Call route configuration page
Item Description
Call Route ID Enter a call route ID in the range of 10000 to 19999.
Destination
Enter the called telephone number.
Number
546
Item Description
Select one of the following transport layer protocols.
Transport Layer • UDP.
Protocol for Call • TCP.
Route • TLS.
By default, UDP is selected.
• SIP—Specifies the SIP scheme.
URL Scheme for
• SIPS—Specifies the SIPS scheme.
Call Route
By default, the SIP scheme is selected.
• Enable. After you select the Enable option, you can configure the authentication
related options.
• Disable.
Register Function
IMPORTANT:
The trunk routing mode supports register function. Authentication related options and their
meanings are the same as those of local number and therefore are not included here.
Status Enable or disable the call route.
Configuring Router A
# Create a local number.
Select Voice Management > Local Number from the navigation tree, and then click Add to access the
page for creating a local number.
547
Figure 578 Creating local number 1111
548
Figure 579 Creating call route 2222
Configuring Router B
1. Select Voice Management > Local Number from the navigation tree, and then click Add to access
the page for creating a local number.
549
Figure 580 Creating local number 2222
550
Figure 581 Creating call route 1111
Configuring direct calling for SIP UAs through the SIP protocol
(configuring domain name)
Network requirements
As shown in Figure 582, acting as SIP UAs, Router A and Router B can first query destination addresses
through a DNS server and then make calls using the SIP protocol.
Figure 582 Network diagram
551
IMPORTANT:
Before the following configurations, you need to configure domain name resolution. For more information
about DNS, see "Configuring DNS."
Configuring Router A
# Create a local number.
Select Voice Management > Local Number from the navigation tree, and then click Add to access the
page for creating a local number.
Figure 583 Creating local number 1111
552
Figure 584 Creating call route 2222
Configuring Router B
1. Select Voice Management > Local Number from the navigation tree, and then click Add to access
the page for creating a local number.
553
Figure 585 Creating local number 2222
554
Figure 586 Creating call route 1111
555
Figure 587 Network diagram
Configuring Router A
# Create a local number.
1. Select Voice Management > Local Number from the navigation tree, and then click Add to access
the page for creating a local number.
Figure 588 Creating local number 1111
556
Figure 589 Creating call route 2222
557
Figure 590 Configuring registration information
Configuring Router B
1. Select Voice Management > Local Number from the navigation tree, and then click Add to access
the page for creating a local number.
558
Figure 591 Creating local number 2222
559
Figure 592 Creating call route 1111
560
Figure 593 Configuring registration information
561
Configuring trunking mode calling
Network requirements
As shown in Figure 594, Router A and Router B are connected through an FXO trunk line. It is required
that Telephone 1111 can call telephone 2222.
Figure 594 Network diagram
Configuring Router A
# Create a local number.
1. Select Voice Management > Local Number from the navigation tree, and then click Add to access
the page for creating a local number.
Figure 595 Creating local number 1111
562
Figure 596 Creating call route 2222
563
Figure 597 Configuring number sending mode
14. Select Send All Digits of a Called Number for Called Number Sending Mode.
15. Click Apply.
Configuring Router B
1. Select Voice Management > Local Number from the navigation tree, and then click Add to access
the page for creating a local number.
Figure 598 Creating local number 2222
564
6. Click Apply.
565
Fax and modem
Traditional fax machines transmit and receive faxes over PSTN. As time passes, fax has gained wide
applications owing to its advantages such as various information, high transmission speed, and simple
operations. By far, G3 fax machines are dominant in the fax communications. A G3 fax machine adopts
the signal digitizing technology. Image signals are digitized and compressed internally, converted into
analog signals through a modem, and finally transmitted into the PSTN switch through common
subscriber lines.
FoIP means sending and receiving faxes over the Internet. Devices can provide the FoIP function after the
FoIP feature is added on the basis of the VoIP function. Because the FoIP is the Internet-based fax service,
users spend low cost for sending national and international faxes.
The network diagram for FoIP is similar to that for VoIP. You just replace the IP phone with a fax machine
to implement the fax function. As long as you can use IP phones, you can use the fax function. Therefore,
the fax function is very simple. The following figure shows the FoIP system structure.
Figure 599 FoIP system structure
Fax flow
In FoIP, the call setup, handshake, rate training, packet transfer, and call release are always in real time.
From the perspective of users, FoIP has no difference from faxing over PSTN.
Signals that a G3 fax machine receives and sends are modulated analog signals. Therefore the router
processes fax signals in a different way it processes telephone signals. The router needs to perform A/D
566
or D/A conversion for fax signals (that is, the router demodulates analog signals from PSTN into digital
signals, or modulates digital signals from the IP network into analog signals), but does not need to
compress fax signals.
A real-time fax process consists of five phases:
1. Fax call setup phase. This phase is similar to the process of a telephone call setup. The difference
is that the fax tones identifying the sending/receiving terminals are included.
2. Prior-messaging phase. During this phase, fax faculty negotiation and training are performed.
3. Messaging phase. During this phase, fax packets are transmitted in accordance with the T.4
procedure, and packet transmission is controlled (including packets synchronization, error
detection and correction, and line monitoring).
4. Post-messaging phase. During this phase, control operations such as packet authentication,
messaging completion, and multi-page continuous transmission are performed.
5. Fax call release phase. During this phase, the fax call is released.
Pass-through fax
The fax pass-through technology was developed primarily for the purpose of compressing and
transmitting T.30 fax packets that cannot be demodulated through packet switched networks. With this
technology, the devices on two sides can directly communicate over a transparent IP link, and the voice
gateways do not distinguish fax calls from voice calls. After detecting a fax tone in an established VoIP
call, the voice gateway checks whether the voice codec protocol is G.711. If not, the voice gateway
switches the codec to G.711. Then fax data is transmitted as voice data in the pass-through mode.
In the pass-through mode, fax information is in the format of uncompressed G.711 codes and is
encapsulated in RTP packets between gateways, and a fixed bandwidth of 64 Kbps is occupied.
Although the packet redundancy mechanism can reduce the packet loss ratio, the pass-through mode is
subject to factors such as packet loss ratio, jitter, and delay. Therefore, it is necessary to ensure
synchronization of the clocks on both sides. Fax pass-through is called voice band data (VBD) by ITU-T.
That is, fax or modem signals are transmitted over a voice channel using a proper coding method. So far,
the codecs supported are only G.711 A-law and G.711 μ-law. In addition, when the fax pass-through
function is enabled, the voice activity detection (VAD) function must be disabled to avoid fax failures.
You can implement the fax pass-through function on the voice gateway in two ways:
• Configure the fax to operate in pass-through mode on both sides.
• Negotiate the codec as G.711 and disable fax forwarding. Then, disable the VAD function to avoid
fax failures. This method is used for the voice gateway to interwork with other devices in the
pass-through mode.
567
pass-through function, which can help remote PSTN users to log in to internal network devices through
dialup.
Item Description
• Enable. The fax parameters can be configured only when the fax function is enabled.
Fax Function
• Disable.
568
Item Description
Configure the protocol used for fax communication with other devices.
• T.38—With this protocol, a fax connection can be set up quickly.
• Standard T.38—It supports H.323 and SIP.
Configure the fax pass-through mode.
Fax Protocol • G.711 A-law.
• G.711 μ-law.
The pass-through mode is subject to such factors as loss of packet, jitter, and delay, so the
clocks on both communication sides must be kept synchronized. Only G.711 A-law and
G.711 μ−law are supported, and the VAD function should be disabled.
IMPORTANT:
If an option other than the default option is adopted, the maximum rate is negotiated first in
accordance with the corresponding fax protocol.
569
Item Description
Specify the fax training mode, which can be:
• Local—Indicates that the gateways participate in the rate training between fax
terminals. In the local training mode, rate training is performed between fax terminals
and gateways, respectively, and then the receiving gateway sends the training result of
Fax Training the receiving fax terminal to the transmitting gateway. The transmitting gateway
Mode finalizes the packet transmission rate by comparing the received training result with its
own training result.
• Point-to-Point—Indicates that the gateways do not participate in the rate training
between two fax terminals. In this mode, rate training is performed between two fax
terminals and is transparent to the gateways.
When rate training is carried on between fax terminals, the transmitting terminal transmits
"zero-filled" TCF data (the filling time per packet is 1.5±10% seconds) to the receiving fax
terminal, and the receiving fax terminal decides whether the current rate is acceptable
according to the received TCF data.
When the percentage of all-ones or all-zeros TCF data to the total number of TCP data is
Local Training less than the local training threshold, the current rate training succeeds. Otherwise, the
Threshold in current rate training fails and you must drop the rate for a local training operation again.
Percentage
By default, the threshold is 10.
IMPORTANT:
When the local training mode is adopted, use this option to configure the threshold in
percentage. When the point-to-point training mode is adopted, the gateway does not
participate in rate training and the threshold of local training is not applicable.
In common fax applications, the participating fax terminals negotiate with the standard
faculty (such as V.17 and V.29 rate) by default. It means that they do not send each other
non-standard facilities (NSF) message frames. In some cases such as encrypted fax, both
fax terminals adopt a nonstandard faculty (NSF) to negotiate.
Signal At the start of negotiation, both terminals first exchange NSF message frames, and then
Transmission negotiate the subsequent fax faculty for communication. NSF messages are standard T.30
Mode of Fax messages and carry private information.
Faculty To use a nonstandard faculty for negotiation, the following conditions must be satisfied:
6. Fax terminals must support nonstandard transmission mode.
7. The transmission mode must be set to a nonstandard mode in the POTS and VoIP
entities for both fax terminals.
By default, a standard faculty mode is adopted for fax faculty transmission.
Usually, the default transmit energy level of the gateway carrier is acceptable. If the fax
cannot be set up yet on the premise that other configurations are correct, you can try to
Transmit Energy adjust the transmit energy level of the gateway carrier (that is, transmit energy level
Level of a attenuation). A greater level indicates greater energy. A smaller level indicates greater
Gateway Carrier attenuation.
By default, the transmit energy level of the gateway carrier is –15 dBm.
570
Item Description
As defined in ITU-T, the ECM is required for a half duplex and fax message transmission
using the half-duplex and half-modulation system of ITU-T V.34 protocol. Besides, the G3
fax terminals working in full duplex mode are required to support half-duplex mode, that is,
ECM.
The fax machines using ECM can correct errors, provide the automatic repeat request
(ARQ) function, and transmit fax packets in the format of HDLC frames. On the contrary,
the fax machines using non-ECM cannot correct errors and they transmit fax packets in the
format of binary strings.
ECM Fax
• Enable—Enable ECM for fax.
• Disable—Disable ECM for fax.
By default, ECM is disabled.
ECM can be adopted only if fax machines on both sides support ECM and the gateways
are configured with ECM.
You must enable ECM mode for the local numbers and call routes corresponding to the fax
sender and receiver in the ECM mode.
Implements the CNG fax switchover is mainly used to implement the fax mailbox service
through communication with the VCX. When the local fax machine A originates a fax call
to the peer fax machine B, if B is busy or is unattended, A can send the originated fax to
CNG Fax the fax mailbox of the VCX. With CNG fax switchover enabled, the voice gateway can
Switchover switch to the fax mode once it receives a CNG from A.
Function • Enable.
• Disable.
The function is disabled by default.
Configure the codec type and switching mode for SIP modem pass-through function.
• Standard G.711 A-law—Adopt G.711 A-law as the codec type and use Re-Invite
switching for SIP modem pass-through.
Codec Type and
• Standard G.711 μ-law—Adopt G.711 μ-law as the codec type and use Re-Invite
Switching Mode
switching for SIP modem pass-through.
for SIP Modem
Pass-through • NTE Compatible G.711 A-law—Adopt G.711 A-law as the codec type and use
NTE-compatible switching for SIP modem pass-through.
• NTE Compatible G.711 μ-law—Adopt G.711 μ-law as the codec type and use
NTE-compatible switching for SIP modem pass-through.
Configure the value of NTE payload type for the NTE-compatible switching mode.
This option is configurable only when NTE Compatible G.711 A-law or NTE Compatible
NTE Payload
G.711 μ-law is selected from the Codec Type and Switching Mode for SIP Modem
Type Field
Pass-through list.
By default, the value of the NTE payload type is 100.
571
Figure 601 Call route fax and modem configuration page
For call route fax and modem configuration items, see Table 213 for details.
572
Call services
More and more VoIP-based services are demanded as voice application environments expand. On basis
of basic calls, new features are implemented to meet different application requirements of VoIP
subscribers.
Call waiting
When subscriber C calls subscriber A who is already engaged in a call with subscriber B, the call is not
be rejected if call waiting is enabled. Just like a normal call, subscriber C hears ringback tones, while
subscriber A hears call waiting tones that remind that a call is waiting on the line.
Subscriber A can answer the new call by pressing the flash hook or hanging up to end the call with
subscriber B. In the former case, subscriber B is held. In the latter case, subscriber A is immediately
alerted and can pick up the phone to answer the call originated by subscriber C (the waiting call).
Call hold
If subscriber A in a conversation with subscriber B presses the flash hook, the media session of subscriber
B is temporarily cut through and is held (in the silent state or listening to the waiting tones). The system
plays silent tones or dial tones to subscriber A, depending on the configuration. (The system first plays
dial tones and waits for the subscriber to dial. If the subscriber fails to dial within a period of time, the
system stops playing dial tones and the line stays on hold.). Subscriber A can resume the call with
subscriber B by pressing the flash hook again.
After pressing the flash hook, subscriber A hears dial tones and can initiate a new call. The setup flow
for the new call is completely the same as the one for ordinary calls.
Call forwarding
After receiving a session request, the called party cannot answer the call for some reason. In this case,
the called party notifies in a response the calling party of the forwarded-to number so that the calling
party can re-initiate a session request to the new destination. This is call forwarding.
The system supports four different types of call forwarding:
• Call forwarding unconditional—With this feature enabled on a voice subscriber line, incoming
calls are forwarded to the predetermined destination, no matter whether the voice subscriber line is
available.
• Call forwarding busy—With this feature enabled on a voice subscriber line, an incoming call is
forwarded to the predetermined destination when the voice subscriber line is busy.
• Call forwarding no reply—With this feature enabled on a voice subscriber line, an incoming call is
forwarded to the predetermined destination when the voice subscriber line is not answered within
a period of time, which is configured by specifying Max Duration of Playing Ringback Tones on the
FXS, FXS or E&M line configuration page and defaults to 60 seconds.
• Call forwarding unavailable—With this feature enabled on a voice subscriber line, an incoming
call is forwarded to the predetermined destination when the voice subscriber line is shut down.
573
Call transfer
Subscriber A (originator) and subscriber B (recipient) are in a conversation. Subscriber A presses the
flash hook and the call is put on hold. Subscriber A dials another number to originate a call to subscriber
C (final recipient). After Subscriber A hangs up, the call between subscriber B and subscriber C is
established. This is call transfer.
To perfect the call transfer feature, the device supports the call recovery function after the call transfer fails,
that is, if subscriber C in the previous example is in a conversation with another subscriber and cannot
establish a conversation with subscriber B, the call between subscriber A and subscriber B is recovered.
Call backup
After initiating a call to the called party, the calling party is unable to receive a response. In this case, if
there is another link (PSTN link or VoIP link) to the called party, the calling party re-initiates a call to the
called party over the new route. This is call backup.
The system supports two types of call backup:
• A PSTN link or VoIP link backs up a PSTN link.
• A PSTN link backs up a VoIP link.
Hunt group
Multiple voice subscriber lines are configured with the same called number to form a hunt group. If the
voice subscriber line with the first priority is unavailable when a call setup request to the called party is
received, the call is still established through another voice subscriber line in the hunt group.
Call barring
Call barring includes incoming call barring and outgoing call barring.
Incoming call barring usually refers to the DND service. When incoming call barring is enabled on a
voice subscribe line, calls originated to the attached phone fails.
When outgoing call barring is enabled on a voice subscriber line, calls originated from the attached
phone will fail, too.
Three-party conference
When subscriber A has a call with subscriber B and holds a call with subscriber C, A can make C join
the current conversation to implement a three-party conference.
During a three-party conference, a passive participant can initiate a new call to create another
conversation. In this way, conference chaining is implemented, and each conference initiator serves as
a conference bridge.
574
Silent monitor and barge in services
Silent monitor service—Allows a supervisor to monitor active calls without being heard.
Barge in service—Allows a supervisor to participate in a monitored call to implement three-party
conference. For example, suppose subscribers A and B are in a conversation and subscriber C is the
supervisor. If C wants to join the conversation, it sends a request to A. If A permits, the three-party
conference can be held. In this example, C is called the active participant of the conference, A is the
voice mixer, and B is the original participant of the conversation.
Silent monitor and barge in services can be considered as the extensions of three-party conference. To
distinguish them from traditional three-party conference, these two services are called three-party
conference in active participation mode.
575
• O if the terminating PBX fails to obtain the calling number (for example, the originating PBX end
does not send it)
A message in the MDMF contains the following information:
• Date and time when the voice call occurs (MM DD hh:mm)
• Calling number and calling name if CID is enabled on the device
• Two Ps for the calling number and the calling name, respectively, if CID is disabled on the device
• O if the terminating PBX fails to obtain the calling number (for example, the originating PBX end
does not send it)
• O if the terminating PBX fails to obtain the calling name (for example, the originating PBX end does
not send it)
The FXS voice subscriber line sends the calling identity information to the called telephone. The calling
identity information is sent to the called telephone through FSK) modulation between first and second
rings. Therefore, the called user must pick up the telephone after the second ring to be sure that the
calling identity information is sent and received correctly. Otherwise, the calling identity information may
fail to be displayed.
576
Figure 602 Call services configuration page
Item Description
The Forwarded-to Number for Call Forwarding no Reply—Enter the forwarded-to
number for call forwarding no reply.
The Forwarded-to Number for Call Forwarding Busy—Enter the forwarded-to number
for call forwarding busy.
Call Forwarding
Call Forwarding Unconditional—Enter the forwarded-to number for forwarding
unconditional.
The Forwarded-to Number for Call Forwarding Unavailable—Enter the forwarded-to
number for call forwarding unavailable.
After call waiting is enabled, configure the following parameters according to your
needs:
• Number of Call Waiting Tone Play Times.
• Number of Tones Played at One Time.
Call Waiting
• Interval for Playing Call Waiting Tones.
By default, two call waiting tones are played once, and if the value of Number of
Tones in a Call Waiting Tone is greater than 1, the Interval for Playing Call Waiting
Tones is 15 seconds.
Three-Party The three-party conference function depends on the call hold function. Therefore, you
Conference must enable the call hold function before configuring three-party conference.
Monitor and Barge In Enable or disable the silent-monitor and barge in services.
577
Configuring other voice functions
Select Voice Management > Local Number from the navigation tree, and then click the icon of the
local number to be configured to access the call services configuration page as shown in Figure 603.
Figure 603 Call services configuration page
Item Description
Set the calling name, a string of case-sensitive characters including numbers 0 through 9,
letters A through Z or a through z, underlines (_), hyphens (-),dots (.), exclamation point
(!), percent sign (%), asterisk (*), plus sign (+), grave accent (`), single quotation mark ('),
and tilde (~).
Calling Name
By default, no calling name is configured.
The calling name in the calling identity information can only be transmitted in MDMF
format. Therefore, if the calling information delivery is enabled, you must select the
Complex Delivery option in the Calling Information Delivery area.
578
Item Description
• Enable.
Incoming Call
• Disable.
Barring
By default, incoming call barring is disabled.
Password for
Set a password to lock your telephone when you do not want others to use your
Outgoing Call
telephone.
Barring
Door Opening Enable the door opening control service and set a password for
Password. opening the door and the door open duration before the door control
relay locks the door.
By default, the door opening service is disabled.
Enable calling party control and set the on-hook delay time of the called party. If the
On-hook Delay delay time is set to 0, this indicates that the call party control is disabled.
Time of the Called
Party By default, calling party control is disabled, that is, the on-hook delay of the called party
is set to 0.
Processing Priority
When the Line is Specify the processing sequence of services when the line is busy.
Busy
579
Configuring call services of a call route
Select Voice Management > Call Route from the navigation tree, and then click the icon of the call
route to be configured to access the call route call services configuration page as shown in Figure 604.
After completing the trunk configuration of a call route, you can configure the call services of the call
route. The SIP call route does not support call services configuration.
Support for options provided on the call services page of a call route depends on the selected trunk route
line. Only the FXO trunks support the Calling Number Delivery and Calling Identity Delivery functions.
Figure 604 Call services configuration page
Item Description
After call waiting is enabled, configure the following parameters according to your
needs:
• Number of Call Waiting Tone Play Times.
• Number of Tones Played at One Time.
Call Waiting
• Interval for Playing Call Waiting Tones.
By default, the number of call waiting tone play times is one, and the number of call wait
tones played at one time is 2, and if the value of Number of Tones Played at One Time
is greater than 1, the Interval for Playing Call Waiting Tones is 15 seconds.
• Enable.
Incoming Call
• Disable.
Barring
By default, incoming call barring is disabled.
Password for
Set a password to lock your telephone when you do not want others to use your
Outgoing Call
telephone.
Barring
580
Item Description
• Enable.
• Disable.
By default, hunt group function is disabled.
Hunt Group
IMPORTANT:
To use the hunt group feature, you must select the Enable option of all call routes involved
in this service.
Configure the private line auto ring-down (PLAR) function. The number is an E.164
Hotline Numbers
telephone number of the terminating end.
Eth1/2 Eth1/1
1000 10.1.1.2/24 20.1.1.1/24 3000
Telephone A Telephone C
2000
Telephone B
Configuration procedure
Before performing the following configuration, make sure Router A, Router B and Router C are reachable
to each other.
1. Complete basic voice call configurations.
Complete basic voice call configurations on Router A, Router B, and Router C.
2. Configure call waiting.
Configure call waiting on Router A.
a. Select Voice Management > Local Number from the navigation tree, click the icon of local
number 1000 in the local number list to access the call services configuration page.
581
Figure 606 Configuring call waiting
582
Figure 607 Network diagram
Router A Router B Router C
Eth1/1 Eth1/1
10.1.1.1/24 20.1.1.2/24
Eth1/2 Eth1/1
1000 10.1.1.2/24 20.1.1.1/24 3000
Telephone A Telephone C
2000
Telephone B
Configuration procedure
Before performing the following configuration, make sure Router A, Router B and Router C are reachable
to each other.
1. Complete basic voice call configurations: complete basic voice call configurations on Router A,
Router B, and Router C.
2. Configure call forwarding:
Configure call forwarding on Router B.
a. Select Voice Management > Local Number from the navigation tree, click the icon of local
number 2000 in the local number list to access the call services configuration page.
b. Enter 3000 for The Forwarded-to Number for Call Forwarding Busy.
c. Click Apply.
Figure 608 Configuring call forwarding
583
Verifying the configuration
Place a call from Telephone A to Telephone B. Router B forwards the call to Telephone C when Telephone
B is busy. Finally, Telephone A and Telephone C start a conversation
Eth1/2 Eth1/1
1000 10.1.1.2/24 20.1.1.1/24 3000
Telephone A Telephone C
2000
Telephone B
Configuration procedure
Before performing the following configuration, make sure that Router A, Router B and Router C are
reachable to each other.
1. Complete basic voice call configurations: complete basic voice call configurations on Router A,
Router B, and Router C.
2. Configure call transfer:
# Configure call hold and call transfer on Router A.
a. Select Voice Management > Local Number from the navigation tree, click the icon of local
number 1000 in the local number list to access the call services configuration page.
b. Select Enable for Call Hold.
c. Select Enable for Call Transfer.
d. Click Apply.
584
Figure 610 Configuring call transfer
585
Figure 611 Network diagram
Configuration procedure
Before performing the following configuration, make sure that Router A, Router B and Router C are
routable to each other.
1. Complete basic voice call configurations: complete basic voice call configurations on Router A,
Router B, and Router C.
2. Configure hunt group:
# Configure a number selection priority for Telephone A2 on Router A. Keep the default priority 0
(the highest priority) for Telephone A1.
a. Select Voice Management > Local Number from the navigation tree, click the icon of local
number 1000 in the local number list to access the advanced settings configuration page.
586
Figure 612 Configuring number selection priority of Telephone A2
587
Figure 613 Configuring hunt group
Perform the same configuration for the local number 1000 of Telephone A2. The configuration procedure
is not included here.
588
Figure 614 Network diagram
Router A Router B Router C
Eth1/0 Eth1/0
10.1.1.1/24 20.1.1.2/24
Eth1/0 Eth1/1
1000 10.1.1.2/24 20.1.1.1/24 3000
Telephone A Telephone C
2000
Telephone B
Configuration procedure
Before performing the following configuration, make sure that Router A, Router B and Router C are
routable to each other.
1. Complete basic voice call configurations: complete basic voice call configurations on Router A,
Router B, and Router C.
2. Configure three-party conference.
# Enable call hold on Router A and Router C.
a. Select Voice Management > Local Number from the navigation tree, click the icon of the
local number to be configured to access the call services configuration page.
Figure 615 Configuring call hold
589
c. Select Voice Management > Local Number from the navigation tree, click the icon of local
number 2000 in the local number list to access the call services configuration page.
Figure 616 Configuring call hold
590
Figure 617 Network diagram
591
Figure 619 Silent monitor and barge in feature configuration page (1)
2. Click Assign External Phones to specify that number 3000 has the authority to monitor number
1000. After this configuration, the page as shown in Figure 620 appears.
Figure 620 Silent monitor and barge in feature configuration page (2)
After the previous configuration, Telephone C with the number 3000 can monitor and barge in the
conversations of Telephone A with the number 1000.
Configure Router A
# Configure a local number and call routes.
1. Configure a local number: specify the local number ID as 1000 and the number as 1000, and
bind the number to line line 1/0 on the local number configuration page.
2. Configure the call route to Router B: specify the call route ID as 2000, the destination number as
3000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
3. Configure the call route to Router C: specify the call route ID as 3000, the destination number as
3000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
4. Configure SIP registration: enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to access the connection properties configuration page, and configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
# Enable the feature service and the silent-monitor and barge-in function.
5. Select Voice Management > Local Number from the navigation tree, and click the icon of local
number 1000 to access the call services page as shown in Figure 621.
592
Figure 621 Enabling the feature service and the silent monitor and barge in function
Configure Router B
# Configure a local number and call routes.
593
1. Configure a local number: specify the local number ID as 2000 and the number as 2000, and
bind the number to line line 1/0 on the local number configuration page.
2. Configure the call route to Router A: specify the call route ID as 1000, the destination number as
1000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
3. Configure the call route to Router C: specify the call route ID as 3000, the destination number as
3000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
4. Configure SIP registration: enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to access the connection properties configuration page, then configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
Configure Router C
# Configure a local number and call routes.
1. Configure a local number: specify the local number ID as 3000 and the number as 3000, and
bind the number to line line 1/0 on the local number configuration page.
2. Configure the call route to Router A: specify the call route ID as 1000, the destination number as
1000, and the call route type as SIP, and use a SIP proxy server to complete calls on the call route
configuration page.
3. Configure the call route to Router B: specify the call route ID as 2000, the destination number as
2000, and the call route type as SIP, and use a proxy server to complete calls on the call route
configuration page.
4. Configure SIP registration: enable register function of the server on the connection properties
configuration page. Select Voice Management > Call Connection > SIP Connection from the
navigation tree to access the connection properties configuration page, then configure the IP
addresses of both the main registrar and the proxy server as 100.1.1.101.
# Configure the DTMF transmission mode as out-of-band transmission.
5. Select Voice Management > Call Route from the navigation tree and click the icon of call route
1000 to access the advanced settings page as shown in Figure 622.
Figure 622 Configuring DTMF transmission mode
594
6. Select RFC2833 for DTMF Transmission Mode.
7. Click Apply.
# Enable the feature service.
8. Select Voice Management > Local Number from the navigation tree, and click the icon of local
number 3000 to access the call services page as shown in Figure 623.
Figure 623 Enabling the feature service
595
Advanced settings
Actual network bandwidth is related to packet assembly interval and network structure. The longer the
packet assembly interval, the closer the network bandwidth is to the media stream bandwidth. More
headers consume more bandwidth. A longer packet assembly interval results in a longer fixed coding
latency.
The following tables show the relevant packet assembly parameters without IPHC, including packet
assembly interval, bytes coded in a time unit, and network bandwidth. Therefore, you can choose a
suitable codec algorithm according to idle and busy status of the line and network situations more
conveniently.
596
Table 218 G.711 algorithm (A-law and μ-law)
G.711 algorithm (A-law and μ-law): media stream bandwidth 64 kbps, minimum packet assembly interval 10
ms.
G.723 r63 algorithm: media stream bandwidth 6.3 kbps, minimum packet assembly interval 30 ms.
G.723 r53 algorithm: media stream bandwidth 5.3 kbps, minimum packet assembly interval 30 ms.
597
Packet Bytes coded Packet Network Packet length Network
Coding
assembly in a time length (IP) bandwidth (IP+PPP) bandwidth
latency
interval unit (bytes) (IP) (bytes) (IP+PPP)
30 ms 60 100 26.7 kbps 106 28.3 kbps 30 ms
G.726 r16 algorithm: media stream bandwidth 16 kbps, minimum packet assembly interval 10 ms.
G.726 r24 algorithm: media stream bandwidth 24 kbps, minimum packet assembly interval 10 ms.
G.726 r32 algorithm: media stream bandwidth 32 kbps, minimum packet assembly interval 10 ms.
598
Table 224 G.726 r40 algorithm
G.726 r40 algorithm: media stream bandwidth 40 kbps, minimum packet assembly interval 10 ms.
G.729 algorithm: media stream bandwidth 8 kbps, minimum packet assembly interval 10 ms.
599
NOTE:
• The packet assembly interval is the duration to encapsulate information into a voice packet.
• Bytes coded in a time unit = packet assembly interval × media stream bandwidth.
• Packet length (IP) = IP header + RTP header + UDP header + voice information length = 20+12+8+data.
• Packet length (IP+PPP) = PPP header + IP header + RTP header + UDP header + voice information length
= 6+20+12+8+data.
• Network bandwidth = Bandwidth of the media stream × packet length/bytes coded in a time unit.
Because IPHC compression is affected significantly by network stability, it cannot achieve high efficiency
unless the line is of high quality, the network is very stable, and packet loss does not occur or seldom
occurs. When the network is unstable, IPHC efficiency drops drastically. With best IPHC performance,
the IP (RTP) header can be compressed to 2 bytes. If the PPP header is compressed at the same time, a
great deal of media stream bandwidth can be saved. The following table shows the best IPHC
compression efficiency of codec algorithms with a packet assembly interval of 30 milliseconds.
Table 226 Compression efficiency of IPHC+PPP header
Other parameters
Other parameters are some optional parameters, such as number selection priority, dial prefix, called
number sending mode, and DTMF transmission mode. For the description of these parameters,
see Configuring other parameters of a local number and Configuring other parameters for a call route.
600
Figure 624 Configuring coding parameters of the local number
Item Description
Specify a codec Specify the codecs and their priority levels. The available
Codec with the First Priority with the first codes are:
priority. • g711alaw—G.711 A-law codec (defining the pulse code
Specify a codec modulation technology), requiring a bandwidth of 64
Codec with the Second kbps, usually adopted in Europe.
with the second
Priority
priority. • g711ulaw—G.711μ-law codec, requiring a bandwidth of
64 kbps, usually adopted in North America and Japan.
Specify a codec
Codec with the Third • g723r53—G.723.1 Annex A codec, requiring a
with the third
Priority bandwidth of 5.3 kbps.
priority.
• g723r63—G.723.1 Annex A codec, requiring a
bandwidth of 6.3 kbps.
• g726r16—G.726 Annex A codec. It uses the ADPCM
technology, requiring a bandwidth of 16 kbps.
• g726r24—G.726 Annex A codec. It uses ADPCM,
requiring a bandwidth of 24 kbps.
• g726r32—G.726 Annex A codec. It uses ADPCM,
requiring a bandwidth of 32 kbps.
Specify a codec • g726r40—G.726 Annex A codec. It uses ADPCM,
Codec with the Lowest
with the lowest requiring a bandwidth of 40 kbps.
Priority
priority.
• g729a—G.729 Annex A codec (a simplified version of
G.729), requiring a bandwidth of 8 kbps.
• g729br8—G.729 Annex B (the voice compression
technology using conjugate algebraic-code-excited
linear-prediction), requiring a bandwidth of 8 kbps.
• g729r8—G.729 (the voice compression technology
using conjugate algebraic-code-excited
linear-prediction), requiring a bandwidth of 8 kbps.
601
Item Description
Packet Assembly Interval of
Specify the packet assembly interval for g726r16 codec.
G726r16
Two communication parties can communicate normally only if they share some identical
coding/decoding algorithms. If the codec algorithm between two connected devices is inconsistent, or
the two devices share no common coding/decoding algorithms, the calling fails.
Item Description
Set the priority of the local number. The smaller the value, the higher
Number Selection Priority
the priority.
Configure a dial prefix for the local number. For a trunk type call
Dial Prefix
route, the dial prefix is added to the called number to be sent out.
602
Item Description
Send a Truncated
Send a truncated called number.
Called Number
In-band
Specify the in-band SIP DTMF transmission mode.
Transmission
DTMF Out-of-band
Specify the out-of-band SIP DTMF transmission mode.
Transmission Transmission
Mode
Adopt DTMF named telephone event (NTE) transmission mode.
RFC2833 When you adopt this transmission mode, you can configure the
payload type field in RTP packets.
Set the DSCP value in the ToS field in the IP packets that carry the
Pre-defined
DSCP Field Value RTP stream.
603
Figure 626 Configuring coding parameters of the call route
For coding parameters configuration items of the call route, see Table 228.
For the configuration items of other parameters of the call route, see Table 228 and Table 229.
Table 229 Configuration items
Item Description
Call Route Selection Priority Set the priority of the call route. The smaller the value, the higher the priority.
• Enable.
The Local End Plays
• Disable.
Ringback Tone
By default, the remote end instead of the local end plays ringback tones.
604
Advanced settings configuration example
Configuring out-of-band DTMF transmission mode for SIP
Network requirements
Two routers work as SIP UAs. After establishing a call connection, the calling and called parties adopt
DTMF SIP out-of-band transmission to make the transmission of DTMF digits more reliable.
Figure 628 Network diagram
Configuration procedure
1. Configure voice basic calling settings.
For detailed configuration, see Configuring direct calling for SIP UAs through the SIP protocol
(configuring static IP address).
2. Configure out-of-band DTMF transmission mode for SIP.
# Configure the out-of-band DTMF transmission mode on Router A for the call route.
a. Select Voice Management > Call Route from the navigation tree, find call route 2222 in the list,
and click its icon to access its advanced settings page.
b. Select Out-of-band Transmission for DTMF Transmission Mode.
c. Click Apply.
Figure 629 Configuring out-of-band DTMF transmission mode
# Configure out-of-band DTMF transmission mode on Router B for the local number.
a. Select Voice Management > Local Number from the navigation tree, find local number 2222
in the list, and click its icon to access the advanced settings page.
605
b. Select Out-of-band Transmission for DTMF Transmission Mode.
c. Click Apply.
Figure 630 Configure out-of-band DTMF transmission mode
606
SIP-to-SIP connections
Item Description
If the SIP trunk device does not support the codec capability sets
supported by the calling and called parties, you can select the
Enable option to enable codec transparent transfer on the SIP trunk
Codec Transparent device. The SIP trunk device transparently transfers codec capability
sets between two parties. The calling and called parties complete
the codec negotiation.
By default, the Disable option is selected.
607
Item Description
In the scenario where the SIP trunk device controls the results of
media capability negotiation, if the SIP trunk device cannot find a
common codec for two parties during negotiation, the two parties
fail to establish a call. In this case, you can select the Enable option
to enable codec transcoding on the SIP trunk device.
With this function enabled, the SIP trunk device uses its own codec
capability set to negotiate with the calling and called parties
respectively. If the negotiated codecs with the two parties do not
match, the SIP trunk device transcodes the media flows passing
Codec Transcoding through it.
By default, the Disable option is selected.
IMPORTANT:
The codec transcoding feature does not take effect in any of the
following cases:
• Codec transcoding is enabled, but no DSP resources are
available for codec transcoding.
• Codec transparent transfer is enabled.
• Media flow-around is enabled.
Select the media flow mode:
• Around—Enable the media packets to pass directly between two
SIP endpoints, without the intervention of the SIP trunk device.
Media Flow Mode The media packets flow around the SIP trunk device.
• Relay—Specify the SIP trunk device to act as the RTP trunk proxy
to forward the media packets.
By default, the Relay option is selected.
• Enable—Enable delayed offer to early offer (DO-EO) conversion
on the SIP trunk device.
Delayed Offer to Early Offer
• Disable—Disable the DO-EO conversion on the SIP trunk device.
By default, the Disable option is selected.
608
Figure 632 Configuring signal process
Item Description
• Remote process—The SIP trunk device transparently transfers the
SIP messages carrying call forwarding information to the
endpoints, and the endpoints perform the call forwarding.
Call-forwarding Signal
• Local process—The SIP trunk device processes the SIP messages
carrying call forwarding information locally.
By default, the Remote option is selected.
• Remote process—The SIP trunk device transparently transfers the
SIP messages carrying call transfer information to the endpoints,
and the endpoints perform the call transfer.
Call-transfer Signal
• Local process—The SIP trunk device processes the SIP messages
carrying call transfer information locally.
By default, the Remote option is selected.
• Remote process—If the session timer mechanism is initiated by
the calling party, and the called party also supports this
mechanism, you can select this option to enable the called party
to process the session update information. Otherwise, the session
timer mechanism only works between the calling party and the
Mid-call Signal SIP trunk device. The interval for sending session update requests
is negotiated by endpoints. For more information, see RFC 4028.
• Local process—The SIP trunk device processes the update
messages rather than transparently pass them to the peer end.
By default, the Local option is selected.
609
Configuring dial plans
More requirements on dial plans arise with the wide application of VoIP. A desired dial plan should be
flexible, reasonable, and operable. Also it should be able to help a voice gateway to manage numbers
in a unified way, making number management more convenient and reasonable.
The dial plan process on the calling side differs from that on the called side. The following discusses these
two dial plan processes, respectively.
1. The voice gateway on the calling side replaces the calling and called numbers according to the
number substitution rule on the receiving line.
2. The voice gateway performs global number substitution.
3. The gateway selects proper numbers based on the local number or on call route selection priority
rules and replaces the calling and called numbers.
4. The gateway initiates a call to the called side and sends the calling and called numbers.
610
On the called side
Figure 634 shows the dial plan operation process on the called side.
Figure 634 Flow chart for dial plan operation process on the called side
1. After receiving a voice call (the called number), the voice gateway on the called side performs
global calling/called number substitution.
2. The voice gateway on the called side selects proper local numbers or call routes based on the local
number or call route selection priority rules. Number substitution may also be involved during the
local number or call route selection. If the called party is a local number, the gateway directly
connects the line. If the called party is a PSTN subscriber, the gateway initiates a call and sends the
calling and called numbers to the PSTN. The PBX in the PSTN connects the call.
Regular expression
You will use some regular expressions frequently when you configure number substitution rules. Regular
expressions are a powerful and flexible tool for pattern matching and substitution. They are not restricted
to a language or system, and have been widely accepted.
When using a regular expression, you must construct a matching pattern according to certain rules, and
then compare the matching pattern with the target object. The simplest regular expressions do not
contain any meta-character. For example, you can specify a regular expression hello, which only
matches the string hello.
To help you construct matching patterns flexibly, regular expressions support some special characters,
called meta-characters, which define the way other characters appear in the target object.
Table 232 Meta-characters
Meta-character Meaning
0-9 Digits 0 through 9.
611
Meta-character Meaning
# and * Each indicates a valid digit.
Wildcard, which can match any valid digit. For example, 555…. can match any number
.
beginning with 555 and ending in four additional characters.
Hyphen (connecting element), used to connect two numbers (The smaller comes before
-
the larger) to indicate a range of numbers, for example, 1-9 inclusive.
Delimits a range for matching. It can be used together with signs such as !, %, and +. For
[]
example, [235-9] indicates one number of 2, 3, and 5 through 9.
Indicates a sub-expression. For example, (086) indicates the character string 086. It is
() usually used together with signs such as !, %, and +. For example, (086)!010 can match
two character strings 010 and 086010.
A control character, indicating that the sub-expression before it appears once or does not
!
appear. For example, (010)!12345678 can match 12345678 and 01012345678.
A control character, indicating that the sub-expression before it appears one or more
times. However, if a calling number starts with the plus sign, the sign itself does not have
+ special meanings, and only indicates that the following is an effective number and the
whole number is E.164-compliant. For example, 9876(54)+ can match 987654,
98765454, 9876545454, and so on, and +110022 is an E.164-compliant number.
A control character, indicating that the sub-expression before it appears multiple times or
% does not appear. For example, 9876(54)% can match 9876, 987654, 98765454,
9876545454, and so on.
The sub-expression (one digit or digit string) before a control character such as !, +, and % can appear
for the times indicated by the control character. For example, (100)+ can match 100, 100100,
100100100, and so on. Once any number of them is matched, the match is considered an exact match.
In the longest match mode, the voice gateway ignore subsequent digits dialed by the subscriber after an
exact match.
For the case that the gateway needs to wait for subscribers to continue dialing after an exact match, refer
to the T mode.
The characters (\) and (|) are mainly used in regular expressions and cannot be used as common
characters. The character (\) is an escape character. If you want a control character to represent itself,
you need to add the escape character (\) before it. For example, (\+) represents the character (+) itself
because (+) is a control character in regular expressions. The character (|) means that the current
character (string) is the character (string) on either the left or the right. For example, 0860108888|T
means that the current character string is either 0860108888 or T.
T mode: If the character T is in the number set in a local number or call route, it means that the voice
gateway should wait for more digits until the number exceeds the maximum length or the dial timer
expires.
If a number starts with the plus sign (+), you must know what happens when you use it on a trunk: The
E&M, R2, and LGS signaling uses DTMF, and as the plus sign (+) does not have a corresponding audio,
the number cannot be transmitted to the called side successfully. While the DSS1 signaling uses ISDN,
the above problem does not exist. Therefore, you should avoid using a number that cannot be identified
by the signaling itself. Otherwise, the call will fail.
612
Dial plan functions
Number match
Dial terminator
In areas where variable-length numbers are used, you can specify a character as the dial terminator so
that the voice gateway can dial out the number before the dialing interval expires. The dial terminator
identifies the end of a dialing process, and a call connection is established based on the received digits
when the dial terminator is received. The voice gateway does not wait for further digits even if the longest
match mode has been globally configured.
Maximum number of local numbers or call routes found before a search process stops
This function enables you to define the maximum number of qualified local numbers or call routes to be
found before a search process stops. Even if the number of local numbers or call routes meeting call
requirements is greater than the defined maximum number, the system matches against the local numbers
or call routes that are found in the search according to the configured maximum number.
613
Entity type selection priority rules
You can configure the priorities for different types of entities. When multiple local numbers or call routes
are qualified for a call connection, the system selects a suitable local number or call route whose entity
type has the highest priority.
Call control
Call authority control
To configure call authority control, assign subscriber numbers to a number group, and then bind the
group, which has authorities configured, to a local number or call route.
When a subscriber originates a call that matches the local number or call route that has bound with a
number group, the system compares the calling number with each number in the number group. If a
match is found, the calling is permitted. Otherwise, the system finds the next matching local number or
call route until the calling is permitted or denied. For related configurations of this function,
see Configuring a number group.
Maximum-call-connection set
You can limit the total call connections for local numbers or call routes according to the network scale to
control communication traffic. You can bind a local number or call route to a maximum-call-connection
set. After that, the number of call connections of the local number or call route is restricted.
Number substitution
A number substitution rule list defines some number substitution methods. It can be used wherever
number substitution is necessary. There is no limitation on where and how many times it is used. Therefore,
a number substitution rule list may be bound globally and bound to different local numbers/call routes
and lines.
The characteristics of global calling/called number substitution or calling/called number substitution on
local numbers/call routes and lines are as follows:
614
• Global number substitution—The voice gateway substitutes calling and called numbers of all
incoming and outgoing calls according to the number substitution rules configured in dial program
view. Multiple number substitution rule lists can be bound for global calling and called number
substitution of incoming and outgoing calls. If there is no match in the first number substitution rule
list, the voice gateway matches against other number substitution rule lists.
• Number substitution on local numbers or call routes—The voice gateway substitutes the calling and
called numbers based on the number substitution rule lists bound to local numbers or call routes.
• Number substitution on a specific line—The voice gateway substitutes the calling and called
numbers of incoming calls based on the number substitution rules configured on the receiving line.
Item Description
Configure a special character as the dial terminator for length-variable
telephone numbers.
If you set the argument character to # or *, and if the first character of the
Dial Terminator configured local number or call route is the same as the argument
character (# or *), the device takes this first character as a common
number rather than a dial terminator.
By default, no dial terminator is configured.
Max Count of Numbers Found Set the maximum number of local numbers or call routes found before a
before Search Stops search process stops.
615
Item Description
• Longest Number Match—Matches the longest number.
Number Match Mode • Shortest Number Match—Matches the shortest number.
By default, the shortest-number match mode is adopted.
• Specify service first.
Number Match Policy
• Specify number first.
Select Based on Voice Entity Type Select the Enable option, the sequence of the voice entities in the Selection
Sequence box determines the match order, and you can click the Up and
Down buttons to move a voice entity.
Selection Sequence By default, entities are not selected by type.
The Web interface does not support the configuration of VoFR entities.
First Rule in the Match Order • Exact match—The more digits of a digit string are matched from left to
right, the higher the precision is. The system stops using the rule once
Second Rule in the Match Order a digit cannot be matched uniquely.
• Priority—Number priorities are divided into 11 levels numbered from
0 to 10. The smaller the value is, the higher the priority is. That means
level 0 has the highest priority.
• Random selection—The system selects at random a number from a set
of qualified numbers. After the random selection rule is applied, there
are no number selection conflicts. The random selection rule can only
serve as a rule with the lowest priority or serve as a unique rule
separately.
Third Rule in the Match Order
• Longest idle time—The longer the voice entity is idle, the higher the
priority is.
You can select one to three rules to form a sequence. The voice gateway
first selects a number according to the first rule. If the voice gateway fails
to decide which number should be selected according to the first rule, it
applies the second rule, and so on.
By default, the match order of rules for the number selection is exact
match-> priority-> random selection.
616
Figure 2 Number group page
b. Click Add.
The number group configuration page appears.
Figure 2 Number group configuration page
Item Description
Group ID Specify the ID of the number group.
Numbers in the Group Specify the input subscriber numbers to be added into the group in the
Add field. You can add a number by clicking Add.
617
Figure 3 Local number binding page
Item Description
• Permit the calls from the number group.
Binding Mode
• Deny the calls from the number group.
A local number can be bound to multiple number groups in the same binding mode, that is, a local
number can either permit or deny the calls from bound number groups.
3. Bind call routes to the call number group:
Click Not Bound in the Call Routes Bound column on the Number Group tab page to access the call
route binding page.
The configuration of call route binding is similar to that of local number binding, and is not shown.
A call route can be bound to multiple number groups in the same binding mode, that is, a call route
can either permit or deny the calls from bound number groups.
4. Bind IVR numbers to the call number group:
Click Not Bound in the IVR Numbers Bound column on the Number Group tab page to access the
IVR number binding page.
The configuration of IVR number binding is similar to that of local number binding. Therefore, it is
not included here.
618
Figure 2 Max-call-connection set page
c. Click Add to access the Max-Call-Connection Set Configuration page as shown in Figure 3.
Figure 3 Max-call-connection set configuration page
Item Description
Connection Set ID Specify the ID of the max-call-connection set.
e. Click the box in front of the ID column, and then click Apply to complete local number binding.
3. Bind call routes to a max-call-connection set:
Click Not Bound in the Call Routes Bound column to access the call route binding page.
The configuration of call route binding is similar to that of local number binding, and is not shown.
4. Bind IVR numbers to a max-call-connection set:
Click Not Bound in the IVR Numbers Bound column to access the IVR number binding page.
619
The configuration of IVR number binding is similar to that of local number binding. Therefore, it is
not included here.
620
Table 234 Configuration items
Item Description
Number Substitution Rule
Specify the ID of the number substitution rule list.
List ID
• End-Only—Reserve the digits to which all ending dots (.) in the input number
correspond.
• Left-to-Right—Reserve from left to right the digits to which the dots in the
input number correspond.
• Right-to-Left—Reserve from right to left the digits to which the dots in the
input number correspond.
Dot Match Rule By default, the dot match rule is End-Only.
The dots here are virtual match digits. Virtual match digits refer to those
matching the variable part such as ., +, %, !, and [] in a regular expression. For
example, when 1255 is matched with the regular expression 1[234]55, the
virtual match digit is 2, when matched with the regular expression 125+, the
virtual match digit is 5, and matched with the regular expression 1..5, the virtual
match digits are 25.
Input Number Type Specify the types of the input number and output number involved in number
Output Number Type substitution.
Set the preferred number substitution rule of the current number substitution rule
list.
In a voice call, the system first uses the preferred number substitution rule for
number substitution. If this rule fails to apply or is not configured, it tries to apply
Applied First (only one rule all other rules in order until one or none of them applies.
can be applied first)
During a number substitution process, there may be multiple rules, but only one
of them can be set as the preferred one. Moreover, the latest configuration
overwrites the previous one.
By default, this function is disabled.
621
3. Bind a number substitution list to global, local numbers, call routes, or lines:
Click Not Bound in the Global Binding, Local Numbers Bound, Call Routes Bound, or Bound Line
column to access the corresponding binding page.
The configurations of these bindings are similar to that of local number binding in call control.
Therefore is not included here.
Configuration procedure
1. Shortest number match
a. Configure Router A:
# Add a local number: specify the number ID as 1000, the number as 10001234$, and the
bound line as line 1/0 on the local number configuration page.
# Add a call route: specify the call route ID as 2000, the destination number as 20001234$,
and the destination address as 1.1.1.2 on the call route configuration page.
# Add a call route: and specify the call route ID as 2001, the destination number as
200012341234$, and the destination address as 1.1.1.2 on the call route configuration
page.
b. Configure Router B:
# Add a local number: specify the number ID as 2000, the number as 20001234$, and the
bound line as 1/0 on the local number configuration page.
# Add a local number: specify the number ID as 2001, the number as 200012341234$, and
the bound line as 1/1 on the local number configuration page.
When you dial number 20001234 at Telephone A, the number 20001234 matches call route
2000, and Telephone B is alerted because the device adopts the shortest match mode by default.
622
2. Longest number match
a. Configure Router A: select Voice Management > Dial Plan > Number Match from the
navigation tree to access the number match configuration page, as shown in Figure 639.
Figure 639 Number match mode configuration page
623
Figure 640 Dial terminator configuration page
After you dial 20001234# at Telephone A, the number immediately matches call route 2000 and
Telephone B is alerted.
Configuring Router A
1. Add a local number:
Specify the number ID as 1000, the number as 10001234$, and the bound line as 1/0 on the
local number configuration page.
2. Add a call route:
Specify the call route ID as 2000, the destination number as 20001234$, and the destination
address as 1.1.1.2 on the call route configuration page.
3. Configure call route selection priority:
a. Select Voice Management > Call Route from the navigation tree to access the call route list
page.
b. Find the call route with the ID of 2000 in the list, and click its corresponding icon to access
the advanced setting page.
c. Select 10 from the Call Route Selection Priority list.
d. Click Apply.
624
Figure 642 Call route selection priority configuration page
625
Specify the call route ID as 2002, the destination number as 2000....$, and the destination
address as 1.1.1.2 on the call route configuration page.
Configuring Router B
# Add a local number: specify the number ID as 2000, the number as 20001234$, and the bound line
as 1/0 on the local number configuration page.
2. Select Exact Match from the First Rule in the Match Order list.
3. Select Priority from the Second Rule in the Match Order list.
4. Select Random Selection from the Third Rule in the Match Order list.
5. Click Apply.
After you dial number 20001234 at Telephone A, the number matches call route 2000.
626
Figure 645 Match order of number selection rules configuration page
2. Select Priority from the First Rule in the Match Order list.
3. Select Exact Match from the Second Rule in the Match Order list.
4. Select Random Selection from the Third Rule in the Match Order list.
5. Click Apply.
After you dial number 20001234 at Telephone A, the number matches call route 2002.
2. Select Random Selection from the First Rule in the Match Order list.
3. Click Apply.
627
After you dial number 20001234 at Telephone A, the number matches call route 2000, 2001, or 2002
at random.
Configuring Router A
1. Select Voice Management > Digital Link Management from the navigation tree to access the digital
link list page.
2. Find the digital link VE1 5/0 in the list, click its corresponding icon to access the E1
parameters configuration page.
628
Figure 648 E1 parameters configuration page
629
Configuring Router B
Select Voice Management > Digital Link Management from the navigation tree to access the digital link
list page. Find the digital link VE1 5/0 in the list, click its corresponding icon to access the E1
parameters configuration page.
Figure 649 E1 parameters configuration page
630
Figure 650 Entity type selection priority rule configuration page (1)
• Configure the order of the voice entities in the Selection Sequence box: the first is VOIP, the second
is POTS, the third is VoFR, and the last is IVR.
• Click Apply.
After you dial 20001234 at Telephone A, the number will match call route 2000 (VoIP entity).
• Configure the order of the voice entities in the Selection Sequence box: the first is POTS , the second
is VOIP, the third is VoFR, and the last is IVR.
• Click Apply.
After you dial 20001234 at Telephone A, the number will match call route 1001 (POTS entity).
631
Configuring call authority control
Network requirements
As shown in Figure 652, Router A, Router B, and Router C are located at place A, place B, and place C,
respectively. They are all connected to the SIP server to allow subscribers to make SIP calls. When VoIP
links fail for some reason, PSTN links that provide backup for VoIP links can be automatically brought up.
It is required that subscribers whose telephone numbers beginning with 1100 at place A can originate
calls to place B while subscribers whose telephone number beginning with 1200 can originate calls to
both place B and place C.
Figure 652 Network diagram
Place A Place B
110000
Router B
2100
1100..
PBX
110099 Router A
2200
IP PSTN’s
central office
120000 PBX
Router C
1200.. 3100
PSTN’s
central office
120099 PBX
SIP server
3200
PSTN’s
Place C
central office
Configuring Router A
# Configure two number groups.
Configure Router A. Select Voice Management > Dial Plan > Call Authority Control from the navigation
tree, and then click Add to access the number group configuration page.
Figure 653 Number group configuration page
632
2. Type 1100.. for Numbers in the Group.
3. Click Add to add numbers into the group.
4. Click Apply.
Enter the number group configuration page again to add another number group:
5. Type 2 for Group ID.
6. Type 1200.. for Numbers in the Group.
7. Click Add to add numbers into the group.
8. Click Apply.
# Add a call route for place B: specify the call route ID as 2000, the destination number as 2..., and use
a proxy server for SIP routing on the call route configuration page.
# Crete a call route for place C: specify the call route ID as 3000, the destination number as 3...,and use
a proxy server for SIP routing on the call route configuration page.
# Add a call route for place B: specify the call route ID as 2100, the destination number as 2…, and trunk
route line as 5/0:15 on the call route configuration page. In addition, you need to select the Send All
Digits of a Called Number option in the Called Number Sending Mode area when you configure the
advanced settings of this call route.
# Add a call route 3… for place C: specify the call route ID as 3100, the destination number as 3..., and
the trunk route line as 5/1:15 on the call route configuration page. In addition, you need to select the
Send All Digits of a Called Number option in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
# Bind a call route to number group 1 to allow that subscribers whose telephone numbers beginning with
1100 at place A can originate calls to place B.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree to access the
page as shown in Figure 654.
Figure 654 Binding call route configuration page (I)
Click Not Bound in the Call Routes Bound column to access the call route binding page of number group
1.
633
Figure 655 Call route binding page (1)
9. Select Permit the calls from the number group for Binding Mode.
10. Select the box of call route 2100.
11. Click Apply.
# Bind a call route to the number group 2 to allow that subscribers whose telephone number beginning
with 1200 can originate calls to both place B and place C.
Select Voice Management > Dial Plan > Call Authority Control from the navigation tree to access the
page as shown in Figure 656.
Figure 656 Binding call route configuration page (2)
Click Not Bound in the Call Routes Bound column to access the call route binding page of number group
2.
634
Figure 657 Call route binding page (II)
12. Select Permit the calls from the number group for Binding Mode.
13. Select the checkboxes of call routes 2100 and 3100.
14. Click Apply.
Configuring Router B
Add a call route:
1. Specify the call route ID as 2100, the destination number as 2…, and the trunk route line as
1/0:15 on the call route configuration page.
2. Select the Send All Digits of a Called Number option in the Called Number Sending Mode area
when you configure the advanced settings of this call route.
Configuring Router C
Add a call route:
1. Specify its call route ID as 3100, the destination number as 3..., and the trunk route line as 1/0:15
on the call route configuration page.
2. Select the Send All Digits of a Called Number option in the Called Number Sending Mode area
when you configure the advanced settings of this call route.
635
at place A, and the caller ID displayed on the terminal at place A is 0211234, that is, the area code
of place B + telephone number of the financial department at place B.
Figure 658 Network diagram
Place B Place A
Market Dept. 3366 Market Dept. 6788
Configuration considerations
The PBX (calling side) at place B changes the called number to an intermediate number.
The PBX (called side) at place A changes the received intermediate number to a local number before
initiating the call.
The following configuration supports dial plan–based calls from place B to place A only.
Configuring Router B
# Set the IP address of the Ethernet interface to 2.2.2.2.
# Add a call route for place A: specify the call route ID as 10, the destination number as 010…., the call
route type as SIP, the SIP routing as IP routing, and the destination address as 1.1.1.1 on the call route
configuration page.
# Add a call route: specify the call route ID as 100, the destination number as ...., and the trunk route
line as 1/0 on the call route configuration page. In addition, you need to select the Send All Digits of a
Called Number option in the Called Number Sending Mode area when you configure the advanced
settings of this call route; you also need to select the Enable option in the Hunt Group area when you
configure the call services of this call route.
# Add a call route: specify the call route ID as 101, the destination number as ...., and the trunk route
line as 1/1 on the call route configuration page. In addition, you need to select the Send All Digits of a
Called Number option in the Called Number Sending Mode area when you configure the advanced
settings of this call route; you also need to select the Enable option in the Hunt Group area when you
configure the call services of this call route.
# Add a number substitution rule list for called numbers of outgoing calls.
Select Voice Management > Dial Plan > Number Substitution from the navigation tree, click Add to
access the number substitution configuration page.
636
Figure 659 Number substitution configuration page (1)
637
Figure 660 Number substitution configuration page (2)
• Select Apply Call Routing Binding Rule to Called Numbers for Binding Mode.
• Select call route 10.
• Click Apply.
# Enter the call route binding page of number substitution list 21102.
638
Figure 662 Call routing binding page of number substitution list 21102
• Select Apply Call Routing Binding Rule to Calling Numbers for Binding Mode.
• Select call route 10.
• Click Apply.
Configuring Router A
# Set the IP address of the Ethernet interface to 1.1.1.1.
# Add a call route: specify the call route ID as 1010, the destination number as …., and the trunk route
line as FXO line 1/0 on the call route configuration page. In addition, you need to select the Send All
Digits of a Called Number option in the Called Number Sending Mode area when you configure the
advanced settings of this call route; you also need to select the Enable option in the Hunt Group area
when you configure the call services of this call route.
# Add a call route: specify the call route ID as 2010, the destination number as ...., and to the trunk route
line as FXO line 1/1 on the call route configuration page. In addition, you need to select the Send All
Digits of a Called Number option in the Called Number Sending Mode area when you configure the
advanced settings of this call route; you also need to select the Enable option in the Hunt Group area
when you configure the call services of this call route.
# Add number substitution rule list 101 for called numbers of incoming calls.
Select Voice Management > Dial Plan > Number Substitution from the navigation tree, and click Add to
access the number substitution configuration page.
639
Figure 663 Number substitution configuration page (3)
640
Figure 664 Number substitution configuration page (4)
641
Figure 666 Global binding page of number substitution list 102
642
Call connection
Introduction to SIP
The Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify,
and terminate multimedia sessions such as IP phone calls, multimedia session and multimedia
conferences. It is the core component in the multimedia data and control architecture of the IETF (RFC
3261).
SIP is responsible for signaling control in IP networks and communication with soft switch platforms. The
intent is to build a next generation value-added service platform to deliver better value-added services to
telecom carriers, banks, and financial organizations.
SIP is used for initiating sessions. It sets up and terminates a multimedia session involving a group of
participants and dynamically adjusts and modifies session characteristics such as required session
bandwidth, media type (voice, video, or data), media encoding/decoding format, and
multicast/unicast. SIP is based on text encoding, and it is constructed by taking the mature protocol HTTP
as a model. Easy to extend and implement, it is suitable for implementing Internet-based multimedia
conference systems.
Terminology
Multimedia session
According to RFC2327, a multimedia session is a set of multimedia senders and receivers and the data
streams flowing from senders to receivers. A multimedia conference is an example of a multimedia
session.
A session is identified by a set of username, session ID, network type, address type, and address.
User agent
A user agent (UA), or a SIP endpoint, is a SIP-enabled multimedia session endpoint. Usually, a
SIP-enabled router serves as a SIP UA.
There are two types of UAs: user agent client (UAC) and user agent server (UAS). To make a call, a SIP
endpoint needs to process the SIP request as a UAS and initiate the SIP request as a UAC.
A UAC is a device that initiates a session request. It can be a calling SIP endpoint or a proxy server
forwarding a request to a called endpoint for example.
A UAS is a device that generates a response to a SIP request. It can be a called SIP endpoint or a proxy
server receiving a request from a calling endpoint for example.
Proxy server
A proxy server is a device that forwards session requests to a called UA on behalf of a calling UA (a SIP
endpoint), and responds to the calling UA on behalf of the called UA.
When the proxy server receives a request from a calling UA, it first requests its location server for
information on called UA location and call policies of calling UA and called UA. If the location
information of the called UA is available and the calling UA is allowed to make the call, the proxy server
then forwards the request to the called UA.
643
Redirect server
A redirect server sends a new connection address to a requesting client.
For example, when it receives a request from a calling UA, the redirect server searches for the location
information of the called UA and returns the location information to the UA. This location can be that of
the called UA or another proxy server, to which the UA can initiate the session request again. The
subsequent procedure is the same as that for calling a called UA directly or for calling a proxy server.
Location server
A location server is a device that provides UA information to proxy and redirect servers. It retains UA
information received by a registrar. The location server and registrar can locate on the same server as
two logical components or locate on different devices.
Registrar
A registrar receives Uas' registrations. The registration information (for example, the local telephone
number) is usually stored on the location server for future retrieval. The location server and the registrar
are both logical components and are usually co-located.
Features
The following are the features delivered by SIP:
• Open standards. It can accommodate new functions, products, and services introduced by different
service providers.
• Flexible configuration. It accommodates a wide range of dialup, wire, and wireless devices, allows
highly flexible configurations, and can work with other systems.
• Scalable system. The system allows expansion as enterprises grow.
• Support to remote users. With SIP, an enterprise network can extend to all its users, wherever they
are.
644
• Consistent communication method. Management becomes easier as the result of consistency in
dialup mode and system access method used by branches, SOHOs, and traveling personnel.
• Quick launch. The system can be updated quickly to accommodate new branches and personnel,
and changes resulting from job rotation or relocation.
• Easy to install and maintain. Nonprofessional individuals can install and maintain SIP systems.
SIP messages
SIP messages, falling into SIP request messages and SIP response messages, are encoded in text mode.
SIP request messages include INVITE, ACK, OPTIONS, BYE, CANCEL, and REGISTER. RFC 3261 defines
the following six request messages:
• INVITE—Used to invite a user to join a call.
• ACK—Used to acknowledge the response to a request.
• OPTIONS—Used to query for the capabilities.
• BYE—Used to release an established call.
• CANCEL—Used to give up a call attempt.
• REGISTER—Used to register with the SIP registrar.
SIP response messages, used to respond to SIP requests, indicate the status of a call or registration,
succeeded or failed. Response messages are distinguished by status codes. Each status code is a 3-digit
integer, where the first digit defines the class of a response, and the last two digits describe the response
message in more detail.
Table 235 Status codes of response messages
400–499 Request contains bad syntax, and therefore cannot be processed. Client error
500–599 Request cannot be processed due to UAS or server error. Server error
SIP fundamentals
Registration
In a complete SIP system, all SIP endpoints working as UAs should register with SIP registrars, providing
information such as location, session capabilities, and call policy.
Typically, a SIP UA sends its registrar a REGISTER request at startup or in response to an administratively
registration operation, carrying all the information that must be recorded. Upon receipt of the request, the
registrar sends back a response notifying receipt of the request, and a 200 OK (SUCCESS) message if
the registration is accepted. The following figure shows the message exchange.
645
Figure 667 Message exchange for a UA to register with a Registrar
Call setup
SIP operates in the Client/Server mode and sets up calls through communication between UA and proxy
server.
Figure 668 Network diagram
In the previous figure, Telephone A wants to call Telephone B, and Router A and Router B work as SIP
endpoints (UAs).
The following is the procedure for connecting a call from Telephone A to Telephone B:
1. Telephone A sends the number of Telephone B.
2. Upon receipt of the call, Router A sends a session request (INVITE) to the proxy server.
3. The proxy server consults its database for information corresponding to the number of Telephone
B. If such information is available, it forwards the request to Router B.
4. Router B, after receiving the request, responds to the proxy server and makes Telephone B ring if
Telephone B is available.
5. The proxy server forwards the response to Router A. The response discussed here includes two
provisional response messages (100 Trying and 180 Ringing) and one success response (200
OK).
Figure 669 shows the complete call setup procedure.
646
Figure 669 Call setup procedures involving a proxy server
This is a simplified scenario where only one proxy server is involved and no registrar is present. however,
a complex scenario may involve multiple proxy servers and registrars.
Call redirection
When a SIP redirect server receives a session request, it sends back a response indicating the address of
the called SIP endpoint instead of forwarding the request. The calling and called endpoints therefore can
send request and response to each other directly. See Figure 670.
647
Figure 670 Call redirection procedure for UAs
Internet
Redirect Server
INVITE
100 Trying
ACK
INVITE
100 Trying
200 OK
ACK
This is a common application. Fundamentally, a redirect server can respond with the address of a proxy
server as well. The subsequent call procedures are the same as the call procedures involving proxy
servers.
SIP security
This section provides information on signaling encryption, media flow encryption, and TLS-SRTP
combinations.
648
Signaling encryption
TLS runs over TCP and provides a complete set of authentication and encryption solutions for application
layer protocols. When you establish a TLS connection, both sides must authenticate each other by using
their own digital certificates. They can communicate with each other only after passing authentication.
SIP messages are encrypted during SIP over TLS transmissions to prevent your data from being sniffed
and increases the security of voice communications.
When you use SRTP to encrypt RTP/RTCP packets, the encryption engine, if enabled, encrypts and
authenticates RTP/RTCP packets. If the encryption engine is disabled, the CPU encrypts and
authenticates RTP/RTCP packets. For more information about the encryption engine, see Security
Configuration Guide in H3C MSR Series Routers Configuration Guides (V5).
SRTP is available only for SIP calls. SIP trunk devices do not support SRTP. For information about SIP trunk,
see "Configuring SIP trunk."
649
TLS-SRTP combinations
TLS protects control signaling, and SRTP encrypts and authenticates voice media flows. You can use them
separately or together. The following table shows four combinations of TLS and SRTP.
Table 237 TLS-SRTP combinations
650
Configuring SIP connections
Item Description
• Enable—Select the option to enable the SIP registrar.
Registrar State
• Disable—Select the option to disable the SIP registrar.
651
Item Description
• UDP—Apply the UDP transport layer protocol when the device registers to the
main registrar.
• TCP—Apply the TCP transport layer protocol when the device registers to the
Main Registrar Transport main registrar.
Layer Protocol
• TLS—Apply the TLS transport layer protocol when the device registers to the
main registrar.
By default, the UDP protocol is applied.
• SIP—Apply the SIP scheme as the URL scheme when the device registers to the
main registrar.
Main Registrar URL
• SIPS—Apply the SIPS scheme as the URL scheme when the device registers to
Scheme
the main registrar.
By default, the SIP scheme is applied.
Main Registrar Address Specify the IP address or domain name of the main registrar.
Backup Registrar Address Specify the IP address or domain name of the backup registrar.
Authentication
Information Field for Specify the authentication information field used for handshake authentication
Handshake between the registrar and the SIP UA.
Authentication
652
Configuring proxy server
Select Voice Management > Call Connection > SIP Connection from the navigation tree to access the
proxy server configuration page, as shown in Figure 672.
Figure 672 Proxy server configuration page
Item Description
Select a server group from the list as the proxy server. You can add a server group
Use Server Group on the page that can be accessed by selecting Voice Management > Call
Connection > SIP Server Group Management from the navigation tree.
• UDP—Apply the UDP transport layer protocol when the device initiates a call.
Transport Layer Protocol • TCP—Apply the TCP transport layer protocol when the device initiates a call.
for SIP Calls • TLS—Apply the TLS transport layer protocol when the device initiates a call.
By default, the UDP protocol is applied.
• SIP—Specify the SIP scheme as the URL scheme.
URL Scheme • SIPS—Specify the SIPS scheme as the URL scheme.
By default, the SIP scheme is applied.
Proxy Server Address Specify the IP address or a domain name of the proxy server.
Proxy Server Port Number Specify the port number of the proxy server.
653
source of SIP signaling and media streams to avoid manual IP address configuration, and therefore
help network management.
Source IP address binding is supported on the Layer 3 Ethernet interface, GigabitEthernet interface, or
dialer interface.
For information about DHCP, see Layer 3—IP Services Configuration Guide in H3C MSR Series Routers
Configuration Guides (V5).
Item Description
Configure media stream binding mode or disable media stream binding.
Media Stream Binding • None—Disable media stream binding.
Mode • IPv4 Address Binding—Bind the media stream to a static IPv4 address.
• Interface Binding—Bind the media stream to an interface.
IPv4 Address Bound with If you select IPv4 Address Binding as the media stream binding mode, you must
the Media Stream enter the IPv4 address to be bound in this field.
If you select Interface Binding as the media stream binding mode, you must specify
Interface Bound with the
the interface to be bound from the list. Only the Layer 3 Ethernet interface, GE
Media Stream
interface, and dialer interface are supported.
Configure the signaling stream binding mode or disable signaling stream binding.
Signaling Stream Binding • None—Disable signaling stream binding.
Mode • IPv4 Address Binding—Bind the signaling stream to an IPv4 address.
• Interface Binding—Bind the signaling stream to an interface.
IPv4 Address Bound with If you select IPv4 Address Binding as the signaling stream binding mode, you must
the Signaling Stream enter the IPv4 address to be bound in this field.
If you select Interface Binding as the signaling stream binding mode, you must
Interface Bound with the
specify the interface to be bound from the list. Only Layer 3 Ethernet interfaces, GE
Signaling Stream
interfaces, and dialer interfaces are supported.
654
Table 241 Application of the source address binding settings in different states
The source IP address binding settings do not take effect, and the
The bound interface or the interface
original sending mode of the signaling streams or media streams is
whose IP address is bound has been
restored. After the interface is up, the source IP address binding
shut down
settings take effect immediately.
The bound hot-swappable interface Cancels the source IP address binding settings. They are restored the
have been disconnected next time the interface is connected.
The physical layer or link layer of the The source IP address binding settings never take effect and the
corresponding interface is down gateway automatically gets an IP address to send packets.
655
Table 242 Configuration items
Item Description
• UDP—Specify UDP as the transport layer protocol for incoming SIP calls and
enables UDP listening port 5060.
• TCP—Specify TCP as the transport layer protocol for incoming SIP calls and
enables TCP listening port 5060.
• TLS—Specify TLS as the transport layer protocol for incoming SIP calls and
enables TLS listening port 5061. If you select this option, you must select a
certificate from the Certificate list.
SIP Listening Transport By default, both the UDP and TCP listening ports are enabled, and the TLS listening
Layer Protocol port is disabled.
Configure this item in either of the following scenarios:
• If the device is the call receiver, you must enable the listening port of the
transport layer protocol used by the incoming calls.
• If TCP or TLS is selected as the transport layer protocol when the device initiates
a call, you must specify it as the SIP listening transport layer protocol in this item.
Otherwise, no register request can be initiated.
Resetting the setting for this item deletes the currently established connections.
Item Description
• RTP—Specify the Real-time Transport Protocol (RTP) as the media flow protocol
for SIP calls.
• SRTP—Specify the Secure Real-time Transport Protocol (SRTP) as the media flow
protocol for SIP calls.
By default, the RTP protocol is applied.
Media Protocol When both the RTP and SRTP protocols are specified as the media flow protocols
for SIP calls:
• If the device is the call initiator, both two media flow protocols are carried in the
INVITE message for the receiver to select.
• If the device is the call receiver, the SRTP protocol is first used for media flow
negotiation. If the negotiation fails, the RTP protocol is used.
656
Configuring caller identity and privacy
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Session Properties tab to access the caller identity and privacy configuration page, as shown in Figure
676.
Figure 676 Caller identity and privacy configuration page
Item Description
657
Configuring SIP session refresh
Introduction to SIP session refresh
In a high-volume traffic environment, if a BYE message gets lost for a session, the call proxy server will not
know that the session has ended. Therefore, it still maintains the state information for the call, which
wastes resources of the server. To solve this problem, the RFC 4082 defines a session timer mechanism
for SIP sessions: the UA sends periodic re-INVITE or UPDATE requests (called session refresh requests) to
notify the proxy server about the current state of the session. The interval for sending session refresh
requests is determined through the negotiation of both sides.
Two new header fields are added to the session refresh requests:
• Session-Expires—Conveys the maximum session duration, that is, if no refresh request is received
during this time, the session is considered ended.
• Min-SE—Conveys the minimum session duration, which is used to avoid frequent refresh requests
from occupying network bandwidth.
Item Description
• Enable—Enable SIP session refresh.
• Disable—Disable SIP session refresh.
SIP Session Refresh
You can configure Session Expiration and Min Session Refresh Interval only after
the SIP session refresh function is enabled.
Configuring compatibility
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the
Session Properties tab to access the compatibility configuration page as shown in Figure 678.
658
Figure 678 Compatibility configuration page
Item Description
The devices of some vendors do not strictly follow the SIP protocol. To interoperate with such devices, you must
configure the SIP compatibility options.
• Enable—Configure the device to use the address (IP address or DNS domain
name) in the To header field as the address in the From header field when
Use the address in the To sending a SIP request.
header field as the
• Disable—Do not use the address in the To header field as the address in the
address in the From
From header field. That is, the From header field contains the source address
header field
and the To header field contains the destination address.
By default, the SIP compatibility function is disabled.
659
Item Description
UAC Product Version Specify the product version of the UAC.
Item Description
Specify the address hiding function enables the SIP trunk device to replace the
endpoints' addresses carried in SIP messages with the addresses of the
corresponding egress interfaces.
Address hiding • Enable—Enable the address hiding function.
• Disable—Disable the address hiding function.
By default, the Disable option is selected.
3. Specify the proxy server used for outbound calls as described in Table 248.
660
Table 248 Configuration items
Item Description
Address Specify the IP address or domain name of the proxy server.
Item Description
Set the interval for the local number or SIP trunk account to re-register with the
Re-registration Interval
registrar after a registration failure.
Set the registration expiration time. A local number or an SIP trunk account expires
Registration Expiration
after it has registered with the registrar for a specified period of time, which is the
Time
registration expiration interval.
661
Item Description
Registration Percentage To ensure the validity of registration information of a local number or an SIP trunk
account on the registrar, the local number or SIP trunk account must re-register with
the registrar at a specified time before the registration expiration interval is
reached. You can set the registration percentage or lead time before registration to
set the time when the local number or SIP trunk account re-registers with the
registrar.
• Time is registration expiration interval multiplied by expiration percentage.
When the time is reached, the local number or SIP trunk account re-registers
Lead Time Before with the registrar.
Registration • Time is registration expiration interval minus lead time before expiration. When
the time is reached, the local number or SIP trunk account re-registers with the
registrar.
You can configure both timers. In this case, the actual re-registration time is
decided by the timer that expires first. In other words, the local number or SIP trunk
account tries to re-register with the registrar when any one of the two timers
expires.
• Parking—The SIP trunk device sends the OPTIONS or REGISTER message to the
current server. When the current server is not available, the SIP trunk device
selects the member server with the second highest priority in the SIP server
group as the current server even if the original current server recovers. Before the
parking mode is applied, you must set OPTIONS or REGISTER as the keep-alive
mode on the page that can be accessed by selecting Voice Management > Call
Connection > SIP Server Group Management from the navigation tree.
• Homing—The SIP trunk device sends the OPTIONS messages to both the
current server and the member server with the second highest priority in the SIP
Redundancy Mode server group. When the current server is not available, the SIP trunk device
selects the member server with the second highest priority as the current server.
Once the original current server recovers or a server with a higher priority than
the current server is available in the SIP server group, the SIP trunk device selects
the original current server or the server with the highest priority as the current
server. Before the homing mode is applied, you must set OPTIONS as the
keep-alive mode on the page that can be accessed by selecting Voice
Management > Call Connection > SIP Server Group Management from the
navigation tree.
By default, parking mode is applied.
• Enable—Configure the Contact header fields of the REGISTER messages to
contain the dt parameter. This option is used when the device communicates
with a VCX device.
Carry VCX Authentication
• Disable—Configure the Contact header fields of the REGISTER messages not to
Information
contain the dt parameter.
By default, the Contact header fields of the REGISTER messages do not contain the
dt parameter.
662
Item Description
Fuzzy telephone number registration refers to the use of a wildcard (including the
dot . and the character T), rather than a standard E.164 number in the match
template of a POTS entity.
After enabling fuzzy telephone number registration, the voice gateway (router)
retains dots and substitutes asterisks (*) for Ts when sending REGISTER messages.
Fuzzy Telephone Number • Enable—Enable fuzzy telephone number registration.
Registration • Disable—Disable fuzzy telephone number registration.
By default, the function is disabled.
IMPORTANT:
To use the fuzzy telephone number registration function, make sure the registrar and
the location server also support the function.
663
Table 250 Configuration items
Item Description
• UDP—Specify UDP as the transport layer protocol to be used during the
subscription.
• TCP—Specify TCP as the transport layer protocol to be used during the
Transport Layer Protocol subscription.
• TLS—Specify TLS as the transport layer protocol to be used during the
subscription.
By default, UDP is adopted.
• SIP—Specify SIP as the URL scheme to be used during subscription.
URL Scheme • SIPS—Specify SIPS as the URL scheme to be used during subscription.
By default, SIP is adopted.
Specify the voice mailbox server address, which can be either an IP address or a
Server Address
domain name.
Port Number Specify the port number of the voice mailbox server.
Generally, the voice gateway sends a SUBSCRIBE to the server, and receives a NOTIFY from the server
if the subscription is successful, and gets the status of the voice mailbox afterwards.
664
Table 251 Configuration items
Item Description
TCP Connection Set the aging time for TCP connections. If the idle time of an established TCP
Aging Time connection reaches the specified aging time, the connection will be closed.
TLS Connection Aging Set the aging time for TLS connections. If the idle time of an established TLS connection
Time reaches the specified aging time, the connection will be closed.
You can enter the SIP status code into the corresponding SIP Status Code (400-699) field. Because the
PSTN release cause code 16 corresponds to a SIP request message, instead of a SIP status code, you can
configure no SIP status code for 16.
Click Load Default Value to restore the default mappings between PSTN release cause codes and SIP
status codes.
665
Configuring SIP status code mappings
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click the SIP
Status Code Mapping tab to access the page as shown in Figure 685.
Figure 685 SIP status code mapping configuration page
You can select the values in the PSTN Release Cause Code fields. You can also click Load Default Value
to restore the default mappings between PSTN release cause codes and SIP status codes.
666
Figure 686 Network diagram
Configuration procedure
1. Configure basic voice calls: configure a local number and the call route to Router B.
Configure a local number: specify the local number ID as 1111 and the number as 1111, and
bind the number to line line 1/0 on the local number configuration page.
Configure the call route to Router B: specify the call route ID as 2222, the destination number
as 2222, the call route type as SIP, the SIP routing as IP routing, and the destination address as
192.168.2.2 on the call route configuration page.
2. Configure caller identity and privacy:
# Disable the sending of calling information on Route A
Select Voice Management > Local Number from the navigation tree, and then click the
corresponding icon to access the call services configuration page as shown in Figure 687.
Figure 687 Configuring call services of the calling party
667
Figure 688 Configuring caller identity presentation restriction mode
Configuration procedure
1. Configure basic voice calls, see "Configure basic voice calls: configure a local number and the
call route to Router B."
2. Specify SRTP as the media flow protocol for SIP calls:
# Specify SRTP as the media flow protocol for SIP calls on Router A and Router B.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click
the Session Properties tab to access the media security configuration page as shown in Figure
690.
Figure 690 Configuring media security
668
Verifying the configuration
SIP calls use the SRTP protocol to encrypt and authenticate media flows, and call conversations are well
protected.
Configuration procedure
1. Configure basic voice calls, see "Configure basic voice calls: configure a local number and the
call route to Router B."
2. Specify the transport layer protocol:
# Specify TCP as the transport layer protocol for outgoing calls on Router A.
Select Voice Management > Call Connection > SIP Connection from the navigation tree, and click
the Session Properties tab to access the transport layer protocol configuration page as shown
in Figure 692.
Figure 692 Specifying transport layer protocol for outgoing calls
669
Figure 693 Specifying listening transport layer protocol
Configuration procedure
The certification authority (CA) server runs RSA Keon in this configuration example.
CAUTION:
To make sure the certificate on the device can be used, be sure that the device system time falls within the
validity time of the certificate.
670
Figure 695 Specifying transport layer protocol for outgoing calls
671
Managing SIP server groups
A SIP server group is used to manage the registrar and call servers. A SIP server group can be configured
with up to five member servers. An index represents the priority of a member server in the SIP server
group. The smaller the index value, the higher the priority. The currently used SIP server is called the
current server. Each server in the SIP server group can be the current server, but there is only one current
server at a time.
Item Description
Server Group ID Specify the ID of the SIP server group.
Specify the name of a SIP server group identifies the SIP server group. The domain
name of the carrier server is usually used as the name of a SIP server group. If the
name of a SIP server group is not configured, the host name specified on the
account management page (which can be accessed by selecting Voice
Server Group Name
Management > SIP Trunk Management > Account Management from the
navigation tree) is used to identify the group, if any. Otherwise, the IP address or
domain name of the current server in the SIP server group is used to identify the
group.
For more configuration examples of SIP server group, see "Configuring SIP trunk."
672
2. Click Add.
The page for configuring a server group appears.
Figure 698 Configuring real-time switching
Item Description
Enable or disable the real-time switching function. When the real-time switching
function is enabled:
• If the SIP trunk device receives no response message or receives response
message 408 or 5XX (excluding 502, 504, 505, and 513) after sending a
registration request to the SIP server, the SIP trunk device tries to connect to the
member server with the second highest priority value in the SIP server group,
Real-Time Switching and so on, until it successfully connects to a SIP server or have tried all the
servers in the group.
• If the SIP trunk device receives no response message or receives response
message 403, 408 or 5XX (excluding 502, 504, 505, and 513) after initiating
a call, the SIP trunk device tries to connect to the member server with the second
highest priority value in the SIP server group, and so on, until it successfully
connects to a SIP server or have tried all the servers in the group.
673
Table 254 Configuration items
Item Description
The keep-alive function is used to detect whether the SIP servers in a SIP server
group are reachable. The SIP trunk device selects a server according to the detect
result and the redundancy mode. If the keep-alive function is disabled, the SIP trunk
device always uses the server with the highest priority in the SIP server group.
• Disabled—Disable the keep-alive function.
• Options—The SIP trunk device periodically sends OPTIONS messages to detect
Keep-Alive Mode the servers. If the SIP trunk device receives response message 408 or 5XX
(excluding 502, 504, 505, and 513) from a SIP server after sending an
OPTIONS message, it considers the SIP server unreachable.
• Register—The REGISTER message can be used to detect the SIP servers. If the
SIP trunk device receives response message 408 or 5XX (excluding 502, 504,
505, and 513) from a SIP server after sending a REGISTER message, it
considers the SIP server unreachable.
Interval for Sending Set the interval for sending OPTIONS messages to the SIP servers when the
OPTIONS Messages keep-alive mode is set to Options.
Item Description
Configure source address binding mode for media streams.
Media Stream Binding • None—Disable source address binding.
Mode • IPv4 Address Binding—Specify a static IPv4 address as the source address.
• Interface Binding—Specify the IP address of an interface as the source address.
674
Item Description
IPv4 Address Bound with If you select IPv4 Address Binding as the media stream binding mode, you must
the Media Stream type the IPv4 address to be bound in this field.
If you select Interface Binding as the media stream binding mode, you need to
Interface Bound with the
specify the interface to be bound from the list. Only the Layer 3 Ethernet interface,
Media Stream
GE interface, and dialer interface are supported.
If you select Interface Binding as the signaling stream binding mode, you must
Interface Bound with the
specify the interface to be bound from the list. Only Layer 3 Ethernet interfaces, GE
Signaling Stream
interfaces, and dialer interfaces are supported.
The following table describes how source address binding works upon different conditions:
Condition Result
• A new source address binding for media does not take effect
for ongoing SIP media sessions but takes effect for
Configure a source address binding when subsequent SIP media sessions.
ongoing calls exist.
• A new source address binding for signal takes effect
immediately for all SIP signaling sessions.
The source IP address binding becomes invalid and will not work
The bound source interface or the interface
until the interface is up. During the shutdown period, the
whose IP address is set as the source
gateway automatically gets a source IP address for sent
address is shut down.
signaling or media flows.
675
The page for configuring a server group appears.
Figure 701 Configuring server information management
Item Description
Set server ID. A SIP server group can be configured with up to five member servers.
Server ID A server ID represents the priority of the server in the SIP server group. The smaller
the ID, the higher the priority.
• UDP—Specify UDP as the transport layer protocol for the connections between
the SIP trunk device and the SIP server.
• TCP—Specify TCP as the transport layer protocol for the connections between
Transport Layer Protocol the SIP trunk device and the SIP server.
• TLS—Specify TLS as the transport layer protocol for the connections between the
SIP trunk device and the SIP server.
By default, the UDP protocol is adopted.
• SIP—Specify the SIP scheme as the URL scheme.
URL Scheme • SIPS—Specify the SIPS scheme as the URL scheme.
By default, the SIP URL scheme is adopted.
Server Address Specify the IPv4 address or domain name of the SIP server.
676
Configuring SIP trunk
As shown in Figure 702, on a typical telephone network, internal calls of the enterprise are made through
the internal PBX, and external calls are placed over a PSTN trunk.
Figure 702 Typical telephone network
With the development of IP technology, many enterprises deploy SIP-based IP-PBX networks as shown
in Figure 703. Internal calls of the enterprise are made by using the SIP protocol, and external calls are
still placed over a PSTN trunk. The problem is that the enterprises have to maintain both the SIP network
and PSTN trunk. This increases the difficulty of network management.
Figure 703 SIP+PSTN network
As more enterprise IP-PBX networks run SIP and more Internet Telephone Service Providers (ITSPs) use SIP
to provide basic voice communication structures, enterprises urgently need a technology that uses SIP to
connect the enterprise IP-PBX network to the ITSP. This is necessary to have network that is entirely
IP-based. This technology is called SIP trunk. A typical SIP trunk network is shown in Figure 704.
The SIP trunk function can be embedded into the voice gateway or the firewall deployed at the edge of
an enterprise private network. The device providing the SIP trunk function is called the SIP trunk device,
or the SIP trunk gateway.
677
Figure 704 All IP-based network
SIP server
Features
SIP trunk has the following features:
1. Only one secure and QoS guaranteed SIP trunk link is required between a SIP trunk device and the
ITSP. The SIP trunk link can carry multiple concurrent calls, and the carrier only authenticates the
link instead of each SIP call carried on this link.
2. The internal calls of the enterprise are placed by the enterprise IP-PBX. The outbound calls of the
enterprise are forwarded by the SIP trunk device to the ITSP, and are finally routed to the PSTN by
the device in the ITSP. Enterprises do not need to maintain the PSTN trunk. Consequently, they save
the costs of hardware and maintenance.
3. By setting destination addresses, the enterprise can select to connect to multiple ITSPs, to make full
use of the ITSPs all over the world, and save call costs.
4. With the SIP trunk device deployed, the entire network can use the SIP protocol to better support
IP communication services, like voice, conference, and instant messaging.
5. A SIP trunk device differs from a SIP proxy server. The SIP trunk device initiates a new call request
to the ITSP on behalf of the user after receiving a call request from the user, and both the user and
the ITSP communicate only with the SIP trunk device. During the forwarding process, the SIP trunk
device forwards both signaling messages and RTP media messages.
Typical applications
The SIP trunk device is deployed between the enterprise IP-PBX and the ITSP. All internal calls are placed
by the enterprise IP-PBX. All outbound calls are forwarded by the SIP trunk device to the ITSP through the
SIP trunk link. Figure 705 shows a typical SIP trunk network.
678
Figure 705 SIP trunk network diagram
Configuring a SIP
server group Enabling the real-time switching, Required if there are multiple servers
keep-alive, and redundancy function in a SIP server group.
679
Task Remarks
Configuring a call route for inbound calls Required.
Item Description
Enable the SIP trunk function before you can use other SIP trunk functions. H3C
recommends you to not use a device enabled with the SIP trunk function as a SIP
UA.
SIP Trunk Function • Enable.
• Disable.
By default, the SIP trunk function is disabled.
680
Configuring a SIP trunk account
Configuring a SIP trunk account
A SIP trunk account contains information allocated to users by the carrier, including authentication
username, authentication password, host name, host username, and the associated SIP server group.
Select Voice Management > SIP Trunk Management > Account Management from the navigation tree,
and click Add. The following page appears.
Figure 707 Configuring a SIP trunk account
Item Description
Account ID Enter a SIP trunk account ID.
Select the SIP server group used by the SIP trunk account for registration. SIP server group
SIP Server Group can be configured in Voice Management > Call Connection > SIP Server Group
for Registration Management.
By default, a SIP trunk account has no SIP server group specified for registration.
Set the registration aging time. If you do not configure this item, the system uses the
Registration
registration aging time configured in Voice Management > Call Connection > SIP
Aging Time
Connection.
Host Username Enter the host username allocated by the ITSP to the SIP trunk account.
Host Name Enter the host name allocated by the ITSP to the SIP trunk account.
681
Item Description
• Enable.
• Disable.
By default, the SIP trunk account is enabled.
Account Status
Disabling a SIP trunk account that is already involved in a connection does not delete the
connection. In other words, the disable configuration takes effect to the next call that uses
this account.
• Enable.
• Disable.
Registration
By default, the registration function of the SIP trunk account is disabled.
Function
To perform registration, you must provide the host username or associate the account with
a SIP server group.
Authentication
Enter the authentication username for the SIP trunk account.
Username
Authentication
Enter the authentication password for the SIP trunk account.
Password
682
Figure 708 Configuring a call route
Item Description
Call Route ID Enter a call route ID.
Bound Account Select a SIP trunk account to be bound to the voice entity.
Use a SIP proxy server to complete calling. If you select this option, you must
Proxy
configure the proxy server beforehand in Voice Management > Call
Server.
Connection > SIP Connection.
Destinati
on
Address Enter the destination address and port number of the called
party.
Port
Number
683
Item Description
Bind to
Server Select a server group. You can create a SIP server group in Voice
server
Group Management > Call Connection > SIP Server Management.
group.
• Enable.
Status
• Disable.
Item Description
You can control call route selection by configuring the prefix of source host name, prefix of destination host
name, or the source IP address as the call match rules. If you select several call match rules, only the calls that
match all rules are permitted.
684
Item Description
• Specify the prefix of a source host name as a call match rule. The specified source
host name prefix is used to match against the source host names of calls. If the
INVITE message received by the SIP trunk device carries the Remote-Party-ID
header, the source host name is abstracted from this header field. If the INVITE
message received by the SIP trunk device carries the Privacy header, the source
host name is abstracted from the P-Asserted-Identity or P-Preferred-Identity header
Match a Source Host field. If the INVITE message received by the SIP trunk device does not carry any of
Name Prefix the previously mentioned three header fields, the host name in the From header
field of the INVITE message is used as the source host name.
• Specify the prefix of a source host name consists of 1 to 31 characters, which are
not case-sensitive and can include letters, digits, underlines (_), hyphens (-),
asterisk (*), and dots (.). An asterisk represents a character string of any length,
for example, t*m can match the source host names tom, tim, and so on.
• Specify the prefix of a destination host name as a call match rule. The specified
destination host name prefix is used to match against the destination host names
of calls. The host name in the To header field of an INVITE message received by
the SIP trunk device is used as the destination host name.
Match a Destination
• Specify the prefix of a destination host name consists of 1 to 31 characters, which
Host Name Prefix
are not case-sensitive and can include letters, digits, underlines (_), hyphens (-),
asterisk (*), and dots (.). An asterisk represents a character string of any length,
for example, b*y can match the destination host names boy, boundary, and so
on.
Server
Specify the index of a SIP server group as a call match rule.
Group.
685
Configuring other parameters
Other parameters of the call route of a SIP trunk account are the same as those of a call route. For more
information about other parameters, see "Advanced settings."
Item Description
If the SIP trunk device does not support the codec capability sets
supported by the calling and called parties, you can select the
Enable option to enable codec transparent transfer on the SIP trunk
Codec Transparent device. The SIP trunk device transparently transfers codec capability
sets between two parties. The calling and called parties complete
the codec negotiation.
By default, the Disable option is selected.
686
Item Description
In the scenario where the SIP trunk device controls the results of
media capability negotiation, if the SIP trunk device cannot find a
common codec for two parties during negotiation, the two parties
will fail to establish a call. In this case, you can select the Enable
option to enable codec transcoding on the SIP trunk device.
With this function enabled, the SIP trunk device uses its own codec
capability set to negotiate with the calling and called parties
respectively. If the negotiated codecs with the two parties do not
match, the SIP trunk device transcodes the media flows passing
Codec Transcoding through it.
By default, the Disable option is selected.
IMPORTANT:
The codec transcoding feature does not take effect in any of the
following cases:
• Codec transcoding is enabled, but no DSP resources are
available for codec transcoding.
• Codec transparent transfer is enabled.
• Media flow-around is enabled.
Select the media flow mode:
• Around—Enable the media packets to pass directly between two
SIP endpoints, without the intervention of the SIP trunk device.
Media Flow Mode The media packets flow around the SIP trunk device.
• Relay—Specify the SIP trunk device to act as the RTP trunk proxy
to forward the media packets.
By default, the Relay option is selected.
• Enable—Enable delayed offer to early offer (DO-EO) conversion
on the SIP trunk device.
Delayed Offer to Early Offer
• Disable—Disable the DO-EO conversion on the SIP trunk device.
By default, the Disable option is selected.
687
Figure 711 Configuring signal process
Item Description
• Remote process—The SIP trunk device transparently transfers the
SIP messages carrying call forwarding information to the
endpoints, and the endpoints perform the call forwarding.
Call-forwarding Signal
• Local process—The SIP trunk device processes the SIP messages
carrying call forwarding information locally.
By default, the Remote option is selected.
• Remote process—The SIP trunk device transparently transfers the
SIP messages carrying call transfer information to the endpoints,
and the endpoints perform the call transfer.
Call-transfer Signal
• Local process—The SIP trunk device processes the SIP messages
carrying call transfer information locally.
By default, the Remote option is selected.
• Remote process—If the session timer mechanism is initiated by
the calling party, and the called party also supports this
mechanism, you can select this option to enable the called party
to process the session update information. Otherwise, the session
timer mechanism only works between the calling party and the
Mid-call Signal SIP trunk device. The interval for sending session update requests
is negotiated by endpoints. For more information, see RFC 4028.
• Local process—The SIP trunk device processes the update
messages rather than transparently pass them to the peer end.
By default, the Local option is selected.
688
SIP trunk configuration examples
Configuring a SIP server group with only one member server
Network requirements
The enterprise private network has a SIP trunk device. Router A is a private network device, and Router
B is a public network device. Configure a SIP server group with only one member server so that all calls
between the private network and public network are made through the SIP trunk device.
Figure 712 Network diagram
Configuring Router A
# Configure a local call number.
1. Select Voice Management > Local Number from the navigation tree and click Add.
689
Figure 713 Configuring a local number
690
11. Click Apply.
691
6. Enter 1 for Server ID.
7. Enter 10.1.1.2 for Server Address.
8. Click Add the Server.
9. Click Apply.
# Create SIP trunk account 1 with the host username 2000, and associate the account with SIP server
group 1.
10. Select Voice Management > SIP Trunk Management > Account Management from the navigation
tree, and click Add.
Figure 717 Configuring a SIP trunk account
692
Figure 718 Configuring a call route for the SIP trunk account
693
25. Enter 2000 for Destination Number.
26. Select IP Routing for SIP Route Type.
27. Enter 1.1.1.1 for Destination Address.
28. Click Apply.
Configuring Router B
# Configure a local call number.
1. Select Voice Management > Local Number from the navigation tree and click Add.
Figure 720 Configuring a local number
694
7. Enter 2000 for Call Route ID.
8. Enter 2000 for Destination Number.
9. Select SIP for Call Route Type.
10. Select Proxy Server for SIP Routing.
11. Click Apply.
# Configure the IPv4 address of the registrar as 10.1.1.2 and enable the registrar.
12. Select Voice Management > Call Connection > SIP Connection from the navigation tree and click
the Connection Properties tab.
Figure 722 Configuring connection properties
695
Figure 723 Network diagram
ITSP-A
SIP server
10.1.1.3/24
1.1.1.1/24 1.1.1.2/24
2.1.1.1/24 2.1.1.2/24
IP
SIP trunk Router B
1000
2000 Router A SIP trunk device
SIP server
10.1.1.2/24
Configuration procedure
# Enable the SIP trunk function. (Details not shown.)
# Create SIP server group 1. Add two SIP servers into the server group: the IP addresses are 10.1.1.2 and
10.1.1.3, and the server with the address 10.1.1.2 has a higher priority value. Enable the real-time
switching function of SIP server group 1. Set the keep-alive mode for SIP server group 1 to Options.
1. Select Voice Management > Call Connection > SIP Server Group Management from the
navigation tree and click Add.
696
Figure 724 Configuring server group
697
Figure 725 Advanced settings
698
Figure 726 Network diagram
Configuration procedure
# Configurations on the SIP trunk device and on other devices are the same as those described in
"Configuring Router A " ,"Configuring the SIP trunk device" and "Configuring Router B."
# Configure Router A2: Configure a local number 2001 and a call route to Router B. For the
configuration procedure, see "Configuring Router A."
# Configure Router B: Configure a call route to Router A2. For configuration procedure, see "Configuring
Router B."
# Configure the SIP trunk device: Select Voice Management > Call Route from the navigation tree and
click Add to configure the call route for calls from the number 1000 to 2001. Enter the 3.3.3.1 (the IP
address of the interface on Router A2) as the Destination Number.
# Configure call match rules on the SIP trunk device: specify that calls with source IP address 1.1.1.1 are
permitted.
1. Select Voice Management > SIP Trunk Management > Call Route from the navigation tree, and
click the icon of the call route to be configured to access the advanced settings configuration
page.
Figure 727 Advanced settings
699
2. Select IPv4 Address from the Match a Source Address list.
3. Enter 1.1.1.1 for IPv4 Address.
4. Click Apply.
700
Managing data links
This section provides information about data link management and configuration.
Overview
Introduction to E1 and T1
Plesiochronous digital hierarchy (PDH) includes two major communications systems: ITU-T E1 system and
ANSI T1 system. The E1 system is dominant in European and some non-Europe countries. The T1 system
is dominant in USA, Canada and Japan.
E1 and T1 use the same sampling frequency (8 kHz), PCM frame length (125 μs), bits per code (8 bits)
and timeslot bit rate (64 kbps). They differ in these aspects:
• E1 adopts A law coding/decoding of 13-segment but T1 adopts μ law coding/decoding of
15-segment.
• Each PCM primary frame of E1 contains 32 timeslots but that of T1 contains 24 timeslots. Each
PCM primary frame of E1 contains 256 bits but that of T1 contains 193 bits. Therefore, E1 provides
2.048 Mbps bandwidth and T1 provides 1.544 Mbps bandwidth.
E1/T1 voice transmission allows a router to provide more channels of voice communication, greatly
improving router use and broadening service range.
701
E1 and T1 interfaces
E1 interface
An E1 interface is logically divided into timeslots (TSs) with TS16 being a signaling channel.
On E1 interfaces, you may create PRI groups or TS sets.
You may use an E1 interface as an ISDN PRI or CE1 interface:
1. As an ISDN PRI interface, the E1 interface adopts DSS1 or QSIG signaling. As TS0 is used to
transfer synchronization information and TS16 is used as a D channel to transfer signaling, you
may arbitrarily bind any timeslot other than TS0 and TS16 as a logical interface, which is
equivalent to an ISDN PRI interface.
2. As a CE1 interface with a signaling channel, the E1 interface can adopt R2 signaling, digital E&M
signaling, or digital LGS signaling.
• When R2 signaling is adopted, every 32 timeslots form a primary frame (PCM30 for example),
where TS0 is used for frame synchronization, TS16 for digital line signaling, and other 30 timeslots
for voice transmission. Every 16 primary frames form one multiframe. In each multiframe, TS0 in
even primary frames conveys frame alignment signal (FAS) and TS0 in odd primary frames conveys
non–FAS (NFAS) about link status information. NFAS provides control signaling for primary rate
multiplexing. In the first primary frame, frame 0, the high-order four bits in TS16 convey multiframe
FAS (MFAS) and the lower-order four bits convey non-multiframe FAS (NMFAS). TS16 in each of
other 15 primary frames conveys line status information for two timeslots. For example, TS16 in
frame 1 conveys the digital line signaling status of TS1 and TS17 while that in frame 2 conveys the
digital line signaling status of TS2 and TS18, and so on.
• When digital E&M signaling is adopted, the E1 interface functions as a digital E&M interface. On
the interface, timeslot division and functions are the same as those with R2 signaling.
• When digital LGS signaling is adopted, the E1 interface functions as a digital FXO or FXS interface.
On the interface, timeslot division and functions are the same as those with R2 signaling.
After you create a TS set and configure signaling on an E1 voice interface card, the system can
automatically create the voice subscriber line for the TS set.
After TSs of an E1 interface are bound to form a PRI group, the system will automatically generate the
corresponding voice subscriber line.
The Web interface supports only the PRI trunk signaling.
T1 interface
A T1 interface can be physically divided into 24 timeslots numbered TS1 through TS24.
You may use a T1 interface as an ISDN PRI interface. The interface adopts DSS1 or QSIG signaling. On
the interface, except TS24 used as D channel for signaling, you may arbitrarily bundle other timeslots
into an interface logically equivalent to an ISDN PRI interface.
In addition to DSS1 and QSIG signaling, T1 interfaces support R2 signaling, digital E&M signaling, and
LGS signaling. Configured with digital E&M signaling, a T1 interface is used as a digital E&M interface.
With digital LGS signaling, a digital FXO or FXS interface.
Like E1 voice interface cards, T1 voice interface cards also have the features of voice subscriber lines.
The Web interface supports only the PRI trunk signaling.
702
Features of E1 and T1
E1 and T1 are characterized by the following:
• Signaling modes
• Fax function
• Protocols and standards
Signaling modes
E1/T1 interfaces support these types of signaling:
• DSS1/QSIG user signaling, adopted on the D channel between ISDN user and network interface
(UNI). It has a data link layer protocol and a Layer 3 protocol used for basic call control.
• ITU-T R2 signaling, which falls into digital line signaling and interregister signaling. Digital line
signaling is transmitted in TS16 (ABCD bits) of E1 trunk. It conveys status information about E1
trunks to describe whether the trunks are occupied, released, or blocked. Interregister signaling
conveys information about address, language and discriminating digits for internal calls, echo
suppressor, caller properties and callee properties in multi-frequency compelled approach (forward
and backward) in each timeslot.
• Digital E&M signaling, similar to R2 signaling. It transmits E (recEive) and M (transMit) call control
signals similar to analog E&M signaling in TS16, alignment signals in TS0, and voice signals in
other timeslots. In digital E&M signaling, when an E1 trunk detects and sends connection signaling,
it looks at the signal in TS16. Digital E&M signaling provides three start modes, immediate, wink,
and delay, to adapt to different devices for more reliable connection.
• Digital LGS. Digital loop start signaling is used between telephones and switches to identify the
off-hook/on-hook state, while ground-start signaling is used between switches. They differ in that
the two parties in conversation must check grounding state before closing the line in the ground-start
approach.
Fax function
The fax function is available on E1/T1 voice interfaces to set up fax channels and transmit/receive fax
data.
Line coding
HDB3, AMI B8ZS, AMI
format
703
Generally, a BSV interface is used to connect an ISDN digital telephone. Also, it can be used as a trunk
interface connecting to a PBX digital trunk. If it cooperates with an FXS or FXO interface, a BSV interface
can realize flexible routing policies for voice callings.
Item Description
Bound Timeslot
Specify the timeslots to be bundled.
Number
• CRC4—Perform cyclic redundancy check (CRC).
Frame Check Mode
• NO_CRC4—Do not perform CRC.
• HDB3—The line coding format is high-density bipolar 3 (HDB3).
Line Coding
• AMI—The line coding format is alternate mark inversion (AMI).
704
Item Description
• Internal—Set the internal crystal oscillator time division multiplexing (TDM) clock
as the TDM clock source on the E1 interface. After that, the E1 interface obtains
clock from the crystal oscillator on the main board. If it fails to do that, the
interface obtains clock from the crystal oscillator on its E1 card. Because SIC
cards are not available with crystal oscillator clocks, E1 interfaces on SIC cards
can only obtain clock from the main board. The internal clock source is also called
master clock mode in some features.
• Line—Set the line TDM clock as the TDM clock source on the E1 interface. After
that, the E1 interface obtains clock from the remote device through the line. The
line clock source is also called slave clock mode in some features.
• Line primary—Set the E1 interface to preferably use the line TDM clock as the
TDM clock source. After that, the E1 interface always attempts to use the line TDM
clock before any other clock sources.
By default, the TDM clock source for an E1 interface is the internal clock.
When digital voice E1 interfaces perform TDM timeslot interchange, it is important
TDM Clock Source for them to achieve clock synchronization to prevent frame slips and bit errors.
Depending on your configurations on E1 interfaces at the CLI, the system adopts
different clocking approaches. When there is a subcard VCPM on the main board,
the clock distribution principle is as follows:
• If the line keyword is specified for all interfaces, the clock on the interface with the
lowest number is adopted. In case the interface goes down, the clock on the
interface with the second lowest number is adopted.
• If line primary is specified for interface X and line or internal is specified for other
interfaces, the clock on interface X is adopted.
• If line is specified for interface X and internal is specified for other interfaces, the
clock on interface X is adopted.
• Normally, you cannot set the clock source for all interfaces in a system as internal
to prevent frame slips and bit errors. You can do this however if the remote E1
interfaces adopt the line clock source.
When there is no VCPM on the main board, the configuration of each MIM/FIC is
independent but only one interface can be set as line primary.
• Enable—Enable the E1 interface.
Status
• Disable—Disable the E1 interface.
If you select the PRI Trunk Signaling option, the page as shown in Figure 730 appears.
705
Figure 730 E1 parameters configuration page (2)
You are not allowed to configure the following parameters on an ISDN interface if there is still a call on
it:
• ISDN Overlap-Sending
• Switch to ACTIVE State Without Receiving a Connect-Ack Message
• Carry High Layer Compatibility Information
• Carry Low Layer Compatibility Information
• ISDN Call Reference Length
These parameters can take effect only if it is configured when there is no call on the interface.
Alternatively you can manually disable the ISDN interface, configure the parameters, and then enable
the interface again. The operations, however, will lead to the disconnection of calls existing on the
interface.
Table 265 Configuration items
Item Description
ISDN Parameters Configuration
706
Item Description
Set the ISDN protocol to be run on an ISDN interface, including DSS1, QSIG,
ISDN Protocol Type and ETSI.
By default, an ISDN interface runs DSS1.
Set the ISDN working mode, which can be network side mode or user side
ISDN Working Mode mode.
By default, an ISDN interface operates in user side mode.
ISDN Overlap-Sending • Enable—Set the ISDN interface to send the called number in overlap
mode. In this mode, the digits of each called number are sent separately
and the maximum number of the digits sent each time can be set.
707
Item Description
• Enable for outgoing direction—Configure the ISDN protocol to switch to
the ACTIVE state after receiving a Connect message without having to
send a Connect-Ack message.
• Enable for incoming direction—Configure the ISDN protocol to switch to
the ACTIVE state to start Connect and voice service communications after
sending a Connect message without having to wait for a Connect-Ack
message.
• Enable for bidirectional directions—Configure the ISDN protocol to switch
to the ACTIVE state after receiving or sending a Connect message without
having to wait for or send a Connect-Ack message.
• Disable (default)—Configure the ISDN protocol not to ignore the
Connect-Ack messages, that is, the ISDN protocol must wait for the
Connect-Ack message in response to the Connect message before it can
switch to the ACTIVE state to start data and voice service communications.
Switch to ACTIVE State
Without Receiving or Sending By default, in the event that the device is communicating with an ISDN switch:
a Connect-Ack Message • The ISDN protocol must wait for the Connect-Ack message in response to
the Connect message before it can switch to the ACTIVE state to start data
and voice service communications.
• After the ISDN protocol receives a Connect message, it needs to send a
Connect-Ack message in response.
IMPORTANT:
• In the event that the device is communicating with an ISDN switch, its
settings must be the same as those on the switch.
• You are not allowed to configure this list on an ISDN interface if there is still
a call on it. Configuration of this list can take effect only if it is configured
when there is no call on the interface. Alternatively, you can manually
disable the interface, configure this list, and then enable the interface.
However, the operations lead to the disconnection of the calls existing on
the interface.
• Enable— Configure ISDN to carry the higher layer compatibility (HLC)
information element in Setup messages when placing voice calls.
Carry High Layer • Disable—Disable ISDN from carrying the HLC information element in the
Compatibility Information Setup messages when placing voice calls.
By default, the HLC information element is carried in Setup messages when
ISDN places voice calls.
• Enable—Configure ISDN to carry the lower layer compatibility (LLC)
information element in Setup messages when placing voice calls.
Carry Low Layer Compatibility • Disable—Disable ISDN from carrying the LLC information element in the
Information Setup messages when placing voice calls.
By default, the LLC information element is carried in Setup messages when
ISDN places voice calls.
708
Item Description
• Enable for outgoing direction—Configure the ISDN protocol to send Setup
messages without the Sending-Complete Information Element when
placing a call.
• Enable for incoming direction—Configure the ISDN protocol to ignore the
Sending-Complete Information Element in Setup messages when receiving
a call.
• Enable for bidirectional directions—Configure the ISDN protocol to ignore
Ignore the Sending-Complete the Sending-Complete Information Element in Setup messages when
Information Element in Setup receiving a call, and to send Setup messages without the
Messages Sending-Complete Information Element when placing a call.
• Disable (default)—Configure ISDN not to ignore the Sending-Complete
Information Element in Setup messages. During data exchange between
the device and an ISDN switch, for an incoming call, if a Setup message
does not contain the Sending-Complete Information Element, the number is
not received completely. For an outgoing call, a Setup message containing
the Sending-Complete Information Element indicates that the number is
sent completely.
ISDN Sliding Window Size Set the sliding window size on an ISDN BRI interface.
ISDN T302 Timer Duration Configure the duration of the ISDN protocol Layer 3 timer T302.
Set the length of the call reference used when a call is placed on an ISDN
interface.
The call reference is equal to the sequence number that the protocol assigns to
each call. It is one or two bytes in length and can be used cyclically.
ISDN Call Reference Length When the device receives a call from a remote device, it can automatically
identify the length of the call reference. However, some devices on the
network do not have this capability. In the event that the device is required to
place calls to such a device connected to it, you must configure the device to
use the same call reference length configured on the connected device.
709
Table 266 Configuration items
Item Description
Physical Parameters Configuration
Bound Timeslot
Specify the timeslots to be bundled.
Number
• ESF—Perform extended super frame (ESF).
Frame Check Mode
• SF—Perform super frame (SF).
• B8ZS—The line coding format is bipolar 8 zero substitution (B8ZS).
Line Coding
• AMI—The line coding format is alternate mark inversion (AMI).
• Internal—Set the internal crystal oscillator TDM clock as the TDM clock source on
the T1 interface. After that, the T1 interface obtains clock from the crystal oscillator
on the main board. If it fails to do that, the interface obtains clock from the crystal
oscillator on its T1 card. Because SIC cards are not available with crystal
oscillator clocks, T1 interfaces on SIC cards can only obtain clock from the main
board. The internal clock source is also called master clock mode in some
features.
• Line—Set the line TDM clock as the TDM clock source on the T1 interface. After
that, the T1 interface obtains clock from the remote device through the line. The
line clock source is called as slave clock mode in some features.
• Line primary—Set the T1 interface to preferably use the line TDM clock as the
TDM clock source. After that, the T1 interface always attempts to use the line TDM
clock prior to any other clock sources.
By default, the TDM clock source for a T1 interface is the internal clock.
When digital voice T1 interfaces perform TDM timeslot interchange, it is important
TDM Clock Source for them to achieve clock synchronization to prevent frame slips and bit errors.
Depending on your configurations on T1 interfaces at the CLI, the system adopts
different clocking approaches. When there is a subcard VCPM on the main board,
the clock distribution principle is as follows:
• If the line keyword is specified for all interfaces, the clock on the interface with the
lowest number is adopted. In case the interface goes down, the clock on the
interface with the next second number is adopted.
• If line primary is specified for interface X and line or internal is specified for other
interfaces, the clock on interface X is adopted.
• If line is specified for interface X and internal is specified for other interfaces, the
clock on interface X is adopted.
• Normally, you cannot set the clock source for all interfaces in a system as internal
to prevent frame slips and bit errors. You can do this however if the remote T1
interfaces adopt the line clock source.
When there is no VCPM on the main board, the configuration of each MIM/FIC is
independent but only one interface can be set as line primary.
• Enable—Enable the T1 interface.
Status
• Disable—Disable the T1 interface.
If you select the PRI Trunk Signaling option, the page as shown in Figure 732 appears.
710
Figure 732 T1 parameters configuration page (2)
ISDN protocol types supported by VT1 are DSS1, ATT, ANSI, ETSI, NTT, QSIG, NI2, and 5ESS. Table
265 describes the ISDN parameters configuration items.
711
Figure 733 BSV parameters configuration page
Item Description
Set the ISDN protocol to be run on an ISDN interface, including DSS1, ANSI,
ISDN Protocol Type NI, NTT, and ETSI.
By default, an ISDN interface runs DSS1.
Set the ISDN working mode, which can be network side mode or user side
ISDN Working Mode mode.
By default, an ISDN interface operates in user side mode.
712
Item Description
Configure local ISDN B channel management.
• Disable—Local ISDN B channel management is disabled and is in the
charge of ISDN switch.
• Common management—The device operates in local B channel
management mode to select available B channels for calls. However, the
ISDN switch still has a higher priority in B channel selection. If a locally
selected B channel is different from that selected by the ISDN switch, the
one indicated by the ISDN switch is used for communication.
• Forced management—The device operates in forced local B channel
management mode. In this mode, the device indicates in the Channel ID
information element of a call Setup message that the local B channel is
ISDN Timeslot Management
mandatory and unchangeable. If the ISDN switch indicates a B channel
different from the local one, the call fails.
By default, the local ISDN B channel management is not enabled but is in the
charge of ISDN switch.
It is very important to put appropriate control on the B channels used for calls
in process, especially in PRI mode. Proper channel management can improve
call efficiency and reduce call loss. Normally, the centralized B channel
management provided by exchanges can work well. For this reason, you are
recommended to adopt the management function provided by exchanges in
most cases, despite that the ISDN module can provide the channel
management function as well.
ISDN Overlap-Sending • Enable—Set the ISDN interface to send the called number in overlap
mode. In this mode, the digits of each called number are sent separately
and the maximum number of the digits sent each time can be set.
713
Item Description
• Enable for outgoing direction—Configure the ISDN protocol to switch to
the ACTIVE state after receiving a Connect message without having to send
a Connect-Ack message.
• Enable for incoming direction—Configure the ISDN protocol to switch to
the ACTIVE state to start Connect and voice service communications after
sending a Connect message without having to wait for a Connect-Ack
message.
• Enable for bidirectional directions—Configure the ISDN protocol to switch
to the ACTIVE state after receiving or sending a Connect message without
having to wait for or send a Connect-Ack message.
• Disable (default)—Configure the ISDN protocol not to ignore the
Connect-Ack messages, that is, the ISDN protocol must wait for the
Connect-Ack message in response to the Connect message before it can
switch to the ACTIVE state to start data and voice service communications.
Switch to ACTIVE State
Without Receiving a By default, in the event that the device is communicating with an ISDN switch:
Connect-Ack Message • The ISDN protocol must wait for the Connect-Ack message in response to
the Connect message before it can switch to the ACTIVE state to start data
and voice service communications.
• After the ISDN protocol receives a Connect message, it needs to send a
Connect-Ack message in response.
IMPORTANT:
• In the event that the device is communicating with an ISDN switch, its
settings must be the same as those on the switch.
• You are not allowed to configure this list on an ISDN interface if there is still
a call on it. Configuration of this list can take effect only if it is configured
when there is no call on the interface. Alternatively, you can manually
disable the interface, configure this list, and then enable the interface.
However, the operations lead to the disconnection of the call existing on
the interface.
• Enable—Configure ISDN to carry the HLC information element in Setup
messages when placing voice calls.
Carry High Layer • Disable—Disable ISDN from carrying the HLC information element in the
Compatibility Information Setup messages when placing voice calls.
By default, the HLC information element is carried in Setup messages when
ISDN places voice calls.
• Enable—Configure ISDN to carry the LLC information element in Setup
messages when placing voice calls.
Carry Low Layer Compatibility • Disable—Disable ISDN from carrying the LLC information element in the
Information Setup messages when placing voice calls.
By default, LLC information element is carried in Setup messages when ISND
places voice calls.
714
Item Description
• Enable for outgoing direction—Configure the ISDN protocol to send Setup
messages without the Sending-Complete Information Element when
placing a call.
• Enable for incoming direction—Configure the ISDN protocol to ignore the
Sending-Complete Information Element in Setup messages when receiving
a call.
• Enable for bidirectional directions—Configure the ISDN protocol to ignore
the Sending-Complete Information Element in Setup messages when
Ignore the Sending-Complete receiving a call, and to send Setup messages without the
Information Element in Setup Sending-Complete Information Element when placing a call.
Messages • Disable (default)—Configure the ISDN not to ignore the Sending-Complete
Information Element in Setup messages. When the data exchange
performed between the device and an ISDN switch, for an incoming call,
the device checks the received Setup messages for the Sending-Complete
Information Element to determine whether or not the number is received
completely. If a Setup message does contain the Sending-Complete
Information Element, the number is not received completely. For outgoing
calls, a Setup message containing the Sending-Complete Information
Element indicates that the number is sent completely.
ISDN Sliding Window Size Set the sliding window size on an ISDN BRI interface.
ISDN T302 Timer Duration Configure the duration of the ISDN protocol Layer 3 timer T302.
715
Item Description
Set length of the call reference used when a call is placed on an ISDN
interface.
The call reference is equal to the sequence number that the protocol assigns to
each call. It is one or two bytes in length and can be used cyclically.
ISDN Call Reference Length When the device receives a call from a remote device, it can automatically
identify the length of the call reference. However, some devices on the
network do not have this capability. In the event that the device is required to
place calls to such a device connected to it, you must configure the device to
use the same call reference length configured on the connected device.
716
Figure 735 Network diagram
Configuration procedure
1. Configure Router A:
# Configure an ISDN PRI group.
Select Voice Management > Digital Link Management from the navigation tree, and then click the
icon of E1 1/1 to access the E1 parameters configuration page.
Figure 736 E1 parameters configuration page
a. Select the PRI Trunk Signaling option. For other options, use the default settings.
b. Click Apply.
# Configure local numbers and call routes.
c. Configure a local number in the local number configuration page: The number ID is 1003, the
number is 0101003, and the bound line is 3/0.
d. Configure a call route in the call route configuration page: The call route ID is 1001, the
destination number is 0101001, and the trunk route line is 1/1:15. In addition, to select the
Send All Digits of a Called Number option in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
e. Configure a call route in the call route configuration page: The call route ID is 1002, the
destination number is 0101002, and the trunk route line is 1/1:15. In addition, select the
Send All Digits of a Called Number option in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
f. Configure a call route in the call route configuration page: The call route ID is 0755, the
destination number is 0755...., and the call route type is SIP, the SIP routing type is IP routing,
and the destination address is 2.2.2.2.
717
2. Configure Router B.
# Configure an ISDN PRI group.
Select Voice Management > Digital Link Management from the navigation tree, and then click the
icon of E1 1/1 to access the E1 parameters configuration page.
Figure 737 E1 parameters configuration page
a. Select the PRI Trunk Signaling option. For other options, use the default settings.
b. Click Apply.
# Configure call routes.
c. Configure a call route in the call route configuration page: The call route ID is 2001, the
destination number is 07552001, and the trunk route line is 1/1:15. In addition, select the
Send All Digits of a Called Number option in the Called Number Sending Mode area if you
configure the advanced settings of this call route.
d. Configure a call route in the call route configuration page: The call route ID is 2002, the
destination number is 07552002, and the trunk route line is 1/1:15. In addition, select the
Send All Digits of a Called Number option in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
e. Configure a call route in the call route configuration page: The call route ID is 010, the
destination number is 010...., the call route type is SIP, the SIP routing mode is IP routing, and
the destination address is 1.1.1.1.
718
Managing lines
This section provides information on managing and configuring various types of subscriber lines.
719
Figure 738 Immediate start mode
• Delay start—In this mode, the caller first picks up the phone to seize the trunk line, and the called
side (such as the peer PBX) also enters the off-hook state in response to the off-hook action of the
caller. The called side (PBX) will be in the off-hook state until it is ready for receiving the address
information. After it is ready, it will enter the on-hook state and this interval is the so-called dial
delay. The calling side sends the address information, and the called side (PBX) connects the call to
the callee. Therefore, the two parties can begin the communication.
Figure 739 Delay start mode
• Wink start—In this mode, the caller first picks up the phone to seize the trunk line, and the called
side (such as the peer PBX) is in the on-hook state until receiving a connection signal from the calling
side. Then, the called side will send a wink signal to make an acknowledgement and enter the
ready state. Upon receiving the wink signal, the calling side begins to send the address information
and the called side connects the call to the callee. Therefore, the two parties can begin the
communication.
Figure 740 Wink start mode
720
One-to-one binding between FXS and FXO voice
subscriber lines
The one-to-one binding between FXS voice subscriber lines and FXO voice subscriber lines improves the
reliability of voice solutions. For industry-specific users, highly reliable communication over FXS voice
subscriber lines is required. That is, dedicated FXO voice subscriber lines can be used for communication
over PSTN when the IP network is unavailable. The one-to-one binding between FXS voice subscriber
lines and FXO voice subscriber lines can meet this requirement.
The one-to-one binding between FXS voice subscriber lines and FXO voice subscriber lines provides the
following functions:
• Dedicated FXO voice subscriber lines—The dedicated FXO voice subscriber lines can be used only
for the bound FXS voice subscriber lines and PSTN-originated calls received over dedicated FXO
voice subscriber lines are directly connected to the bound FXS voice subscriber lines.
• Consistent state between bound FXS and FXO voice subscriber lines—The on-hook/off-hook state
of the bound FXS and FXO voice subscriber lines is consistent. If an FXO subscriber line receives a
PSTN-originated call when the corresponding FXS voice subscriber line goes off-hook, the calling
party will hear busy tones.
721
Symptom Parameters adjusted Effect
There are loud environment Increase the maximum Too large amplitude may make noises
noises. amplitude of comfortable noises. uncomfortable.
A user hears his or her voice Enlarge the control factor of Too high a control factor leads to audio
when speaking. mixed proportion of noises. discontinuity.
722
Figure 742 FXS line configuration page
Item Description
Basic Configurations
Specify the maximum interval for the user to dial the next digit.
Max Interval for Dialing the This timer will restart each time the user dials a digit and will work in this way until
Next Digit all the digits of the number are dialed. If the timer expires before the dialing is
completed, the user will be prompted to hook up and the call is terminated.
Specify the maximum interval in seconds between off-hook and dialing the first
Max Interval between digit.
Off-hook and Dialing the
First Digit Upon the expiration of the timer, the user will be prompted to hook up and the call
is terminated.
723
Item Description
• Enable.
Status
• Disable.
Advanced Settings
Lower Limit for Hookflash Specify the time range for the duration of an on-hook condition that will be
Detection detected as a hookflash. That is, if an on-hook condition that lasts for a period
Upper Limit for Hookflash that falls within the hookflash duration range (that is, the period is longer than the
Detection lower limit and shorter than the upper limit) is considered a hookflash.
724
Configuring an FXO voice subscriber line
Select Voice Management > Line Management from the navigation tree, and then click the icon of
the FXO line to be configured to access the FXO line configuration page, as show in Figure 743.
Figure 743 FXO line configuration page
Item Description
Basic Configurations
725
Item Description
Specify the maximum interval for the user to dial the next digit.
Max Interval for Dialing the This timer restarts each time the user dials a digit and will work in this way until
Next Digit all the digits of the number are dialed. If the timer expires before the dialing is
completed, the user will be prompted to hook up and the call is terminated.
Specify the maximum interval in seconds between off-hook and dialing the first
Max Interval between digit.
Off-hook and Dialing the
First Digit Upon the expiration of the timer, the user will be prompted to hook up and the
call is terminated.
Bind an FXS voice subscriber line to the FXO voice subscriber line. This list is
available only when you select the Delay Off-hook option in the Off-hook Mode
area.
Binding FXS Line To keep the consistent off-hook/on-hook state between the bound FXS and FXO
lines, the specified FXS line must be the one to which the dedicated line number
points. In addition, only the bound FXS line is allowed to originate calls to the
FXO line by restricting incoming calls.
• Delay Ring.
• Immediate Ring.
Ring Mode You can select the Delay Ring option to quicken ringing synchronization
between the FXO voice subscriber line and its bound FXS voice subscriber line.
However, for the telephone supporting calling identification display, the calling
number will be displayed after the second ringing tone.
In some countries, PBXs do not play busy tones, or the busy tones played by
them only last for a short period of time. When noise is present on a
transmission link, the configuration of silence threshold and silence duration for
automatic on-hook cannot solve the problem that the resource of the FXO
interface cannot be released. In this case, you can specify the duration before a
Duration before a Forced forced on-hook to solve the problem.
On-hook No duration is configured by default.
IMPORTANT:
Once the duration before a forced on-hook is configured, the call will be
automatically disconnected when the duration expires, even if the call is currently
going on.
Configure the dial delay time.
Dial Delay Time
By default, the dial delay is 1 second.
726
Item Description
Set the silence threshold. Silence detection-based automatic
If the amplitude of voice signals from the on-hook prevents the case that the
switch is smaller than this value, the resource of the FXO interface
system regards the voice signals as cannot be released owing to busy
VAD Threshold
silence. Normally, the signal amplitude tone detection failure when the
on the links without traffic is in the range busy tone parameters provided by
of 2 to 5. the connected PBX are special.
By default, the silence threshold is 20. When the signal values of two
successive sampling points are less
Set the silence duration for automatic
than the silence detection
on-hook.
threshold, the system considers that
Upon expiration of this duration, the the line goes into the silent state. If
On-hook Duration for VAD system performs on-hook automatically. the line stays in the silent state
By default, the silence duration for longer than the silence duration for
automatic on-hook is 7,200 seconds (that automatic on-hook, the system will
is, 2 hours). automatically disconnect the call.
727
Item Description
Generate some comfortable background noise to replace the toneless intervals
during a conversation. If no comfortable noise is generated, the toneless
intervals will make both parties in conversation feel uncomfortable.
Comfortable Noise Function • Enable.
• Disable.
By default, the comfortable noise function is enabled.
728
Figure 744 E&M line configuration page
Item Description
Basic Configurations
Cable Type When you configure the cable type, make sure the cable type is the
same as that of the peer device. Otherwise, only unidirectional
voice service is available.
The configuration will be applied to all E&M interfaces of the card.
729
Item Description
Specify the types 1, 2, 3, and 5 are the four signal types (that is,
types I, II, III, and V) of the analog E&M subscriber line.
When you configure the signal type, make sure the signal type is the
Signal Type
same as that of the peer device.
The configuration will be applied to all analog E&M lines in the
corresponding slot.
Specify the maximum interval for the user to dial the next digit.
This timer will restart each time the user dials a digit and will work in
Max Interval for Dialing the Next Digit this way until all the digits of the number are dialed. If the timer
expires before the dialing is completed, the user will be prompted to
hook up and the call is terminated.
Max Duration the System Waits for the Specify the maximum duration for the system to wait for the first digit
First Digit of a number.
Delay Time
before the Calling
Immediate Party Sends Specify the delay time before the calling party sends DTMF signals
Start DTMF Signals in in the immediate start mode.
Immediate Start
Mode
Delay Signal
Duration in Delay Specify the delay signal duration in the delay start mode.
Start Mode
Delay Delay Time
Start before the Called
Specify the delay time from when the called party detects a seizure
Party Sends a
signal to when it sends a delay signal in the delay start mode.
Delay Signal in
Delay Start Mode
Start
Mode Delay Time
before the Called
Specify the delay time from when the called party receives a seizure
Party Sends a
signal to when it sends a wink signal in the wink start mode.
Wink Signal in
Wink Start Mode
Duration of a
Wink Signal
Wink Specify the time duration the called party sends wink signals in the
Send by the
Start wink start mode.
Called Party in
Wink Start Mode
730
Item Description
When the voice signals on the
line attenuate to a relatively IMPORTANT:
Input Gain on the Voice Interface
great extent, increase the voice
input gain value. Gain adjustment may lead to a
call failure. H3C recommends
When a relatively small voice that you do not adjust the gain. If
signal power is needed on the necessary, do it with the
Output Gain on the Voice Interface
output line, increase the voice guidance of technical personnel.
output gain value.
Configure the output gain of the SLIC chip. The bottom layer tunes
SLIC Chip Output Gain the signal gain through the SLIC chip.
By default, the output gain of the SLIC chip is 0.8 dB.
731
Figure 745 ISDN line configuration page
Item Description
Description Description of the ISDN line.
732
Item Description
Set the DTMF detection sensitivity level.
DTMF Detection Sensitivity • Low—In this mode, the reliability is high, but DTMF tones may fail to be
Level detected.
• High—In this mode, the reliability is low and detection errors may occur.
• Enable.
Status
• Disable.
Item Description
Line Description Specify the description of the paging line.
When a relatively small voice signal power is needed on the output line, increase the
voice output gain value.
Voice Interface Output
Gain IMPORTANT:
Gain adjustment may lead to call failures. H3C recommends that you do not adjust the
gain. If necessary, do it with the guidance of technical personnel.
• Enable.
• Disable.
Silent Mode By default, the silent mode is disabled.
IMPORTANT:
If the silent mode is enabled on an audio interface, the interface cannot transmit data.
733
Item Description
Set the value of the audio input gain, in the range of -24.0 to 12.0 with a step of 1.
When a relatively small voice signal power is needed on the output line, increase the
voice output gain value.
Voice Output Gain
IMPORTANT:
Gain adjustment may lead to call failures. H3C recommends that you do not adjust the
gain. If necessary, do it with the guidance of technical personnel.
Item Description
Line Description Specify the description of the MoH line.
When a relatively small voice signal power is needed on the output line, increase the
voice output gain value.
Voice Interface Output
Gain IMPORTANT:
Gain adjustment may lead to call failures. H3C recommends that you do not adjust the
gain. If necessary, do it with the guidance of technical personnel.
• Enable.
• Disable.
Silent Mode By default, the silent mode is disabled.
IMPORTANT:
If the silent mode is enabled on an audio interface, the interface cannot transmit data.
Set the value of the audio input gain, ranging from of -19.5 to 41.5 with a step of 2.
When a relatively small voice signal power is needed on the output line, increase the
voice output gain value.
Voice Output Gain
IMPORTANT:
Gain adjustment may lead to call failures. H3C recommends that you do not adjust the
gain. If necessary, do it with the guidance of technical personnel.
734
Line management configuration examples
Configuring an FXO voice subscriber line
Network requirements
As shown in Figure 748, the FXO voice subscriber line connected to Router B operates in PLAR mode, and
the default remote phone number is 010-1001.
Dialing the number 0755-2003 on phone 0755-2001 connects to Router B. Because Router B operates
in private-line mode (that is, the hotline mode), it requests connection to the preset remote number
010-1001 at Router A.
Figure 748 Network diagram
Configuring Router A
# Create a call route and local number.
1. Configure a call route in the call route configuration page: The call route ID is 0755, the
destination number is 0755...., and the destination address is 2.2.2.2.
2. Create a local number in the local number configuration page: The number ID is 1001, the
number is 0101001, and the bound line is 1/0.
Configuring Router B
# Create call routes.
1. Create a call route in the call route configuration page: The call route ID is 010, the destination
number is 010….., and the destination address is 1.1.1.1.
2. Create a call route in the call route configuration page: The call route ID is 2001, the destination
number is 07552001, the call route type is Trunk, and the trunk route line is 1/0. In addition,
select the Send All Digits of a Called Number option in the Called Number Sending Mode area
when you configure the advanced settings of this call route.
# Configure the hotline number
3. Select Voice Management > Call Route from the navigation tree, and then click the icon of call
route 2001 to access the call services configuration page.
735
Figure 749 Hotline number configuration page
736
Figure 750 Network diagram
Configuration considerations
• Configure one-to-one binding between FXS and FXO voice subscriber lines.
• When the IP network is available, the VoIP entity is preferably used to make calls over the IP
network.
• When the IP network is unavailable, the POTS entity is used to make calls through the bound FXO
voice subscriber line over the PSTN.
Configuration procedure
Router A and Router B are routable to each other.
The configuration of interface IP addresses is not shown.
1. Configure Router A:
# Configure a local number and two call routes.
• Configure a call route in the call route configuration page: The call route ID is 210, the destination
number is 210…., and the destination address is 192.168.0.76.
• Configure a local number in the local number configuration page: The number ID is 0101001, the
number is 0101001, and the bound line is 3/0.
• Configure the backup call route 211 for the FXO line in the call route configuration page: The
destination address is .T, call route type is Trunk, and the trunk route line is 4/0. In addition, select
the Send All Digits of a Called Number option in the Called Number Sending Mode area when you
configure the advanced settings of this call route.
# Configure call authority control.
a. Select Voice Management > Dial Plan > Call Authority Control from the navigation tree, and
then click Add to access the permitted call number group configuration page.
737
Figure 751 Permitted call number group configuration page
a. Select the Permit the calls from the number group option.
b. Select call route 211.
c. Click Apply.
# Configure the hotline number.
d. Select Voice Management > Call Route from the navigation tree, and then click the icon of
call route 211 to access the call services configuration page.
738
Figure 753 Hotline number configuration page
739
Figure 755 Entity type selection sequence configuration page
740
a. Type 1 in the Group ID field.
b. Type 2101002 in the Numbers in the Group field and click Add.
c. Click Apply.
d. Select Voice Management > Dial Plan > Call Authority Control from the navigation tree, and
then click Not Bound to access the call route binding page of permitted call number group 1.
Figure 757 211 Call route binding page
a. Select the Permit the calls from the number group option.
b. Select call route 211.
c. Click Apply.
# Configure the hotline number.
d. Select Voice Management > Call Route from the navigation tree, and then click the icon of
call route 211 to access the call services configuration page.
Figure 758 Hotline number configuration page
741
Figure 759 FXO line delay off-hook binding configuration page
742
Verifying the configuration
In the case that the IP network is unavailable, calls can be made over PSTN.
743
Configuring SIP local survival
IP phones have been deployed throughout the headquarters and branches of many enterprises and
organizations. Typically, a voice server is deployed at the headquarters to control calls originated by IP
phones at branches.
The local survival feature enables the voice router at a branch to automatically detect the reachability to
the headquarter voice server, and process calls originated by attached IP phones when the headquaters
voice server is unreachable. The headquarters voice server will take over call services from the branch
voice router when the failure is removed.
Figure 761 shows a typical network diagram for the local survival feature.
Figure 761 Network diagram for the local survival feature
Branch A
WAN
Branch C
744
Configuring SIP local survival
Service configuration
Select Voice Management > SIP Local Survival > Service Configuration from the navigation tree to
access the page as shown in Figure 762.
Figure 762 Configuring service
Item Description
• Enable—Enable the local SIP server.
Server Running State • Disable—Disable the local SIP server.
By default, the local SIP server is disabled.
Enter the IP address of the local server, which can be a local interface's IP address,
or a loopback address such as 127.0.0.1. The IP address of a local interface is
IP Address Bound to the recommended because a loopback address cannot accept registrations from
Server remote users.
When the local SIP server is enabled, the IP address of the local server must be
provided.
Port Bound to the Server Enter the port number of the local SIP server.
745
Item Description
• Alone—The local SIP server in alone mode acts as a small voice server.
• Alive—The local SIP server in alive mode supports the local survival feature.
That is, when the communication with the remote server fails, the local SIP
server accepts registrations and calls; when the communication resumes, the
Server Operation Mode
remote server accepts registrations and calls again and the local SIP server
rejects registrations and calls. In the alive mode, Options messages will
periodically be sent to the remote server.
By default, the local SIP server operates in alone mode.
Remote Server Port Enter the port number of the remote SIP server.
User management
Select Voice Management > SIP Local Survival > User Management from the navigation tree, and click
Add to access the page as shown in Figure 763.
Figure 763 Configuring user
Item Description
User ID Enter the ID of a user to be registered.
746
Trusted nodes
Select Voice Management > SIP Local Survival > Trusted Nodes from the navigation tree to access the
page as shown in Figure 764.
Figure 764 Configuring a trusted node
Item Description
Enter the IP address of the trusted node. A trusted node can directly originate calls without
IP address By default, no trusted node is being authenticated by the local SIP server. You do
configured. not need to configure user information for the number
of the trusted node.
Enter the port number of the trusted Up to eight trusted nodes can be configured.
Port Whether a trusted node is reachable is determined by
node.
its IP address rather than its port number.
Call-out route
The local SIP server uses a static routing table to forward outgoing calls. If the called number of a call
matches a static route, the local SIP server forwards the call to the specified destination. The called
number does not need to register on the local SIP server. For example, as an external number, 5552000
does not need to register on the local SIP server. Configure a static route entry with the area prefix of 333
and called number of 5552000 on the local SIP server. Upon receiving a call from local number 1000
to external number 5552000, the local SIP server adds the area prefix 333 to the calling number, and
forwards the call to the destination specified in the static route entry.
Select Voice Management > SIP Local Survival > Call-Out Route from the navigation tree, and click Add
to access the page as shown in Figure 765.
747
Figure 765 Configuring a call-out route
Item Description
ID Enter the ID of the call-out route.
Destination Number Enter the destination number prefix and length. Suppose the destination number
Prefix prefix is 4100, and the number length is 6. This configuration matches destination
numbers that are 6-digit long and start with 4100.
Number length A dot can be used after a number to represent a character. This configuration does
not support other characters.
Destination IP address
Enter the destination IP address and port number.
Port Number
Area Prefix Enter the area prefix added before the calling numbers of outgoing calls.
Area prefix
When the local SIP server is connected to the extranet, external users can originate calls to internal users
registered with the local SIP server. For calls from external users to internal users, the local SIP server
removes the configured area prefix from each called number to converts it to an internal short number.
For example, if an external user dials number 01050009999, the local SIP server checks whether any
area prefix matches the called number. If the area prefix 0105000 is available, the local SIP server
removes the prefix 0105000 from the called number and sends the call to 9999.
Select Voice Management > SIP Local Survival > Area Prefix from the navigation tree to access the page
as shown in Figure 766.
Figure 766 Configuring a call-in number prefix
748
You can configure up to eight call-in number prefixes. The local SIP server adopts longest match to deal
with a called number.
Item Description
Rule Set ID Enter the ID of the call rule set.
Rule
749
Figure 768 Applying the call rule set
Item Description
Rule Set ID Displays the call rule set ID.
• Enable—Applies the call rule set to all registered users.
Applied Globally
• Disable—Specifies that the call rule set does not apply to any registered users.
• In the Available register users field, select registered users and click << to add
them to Register users bound to the rule set.
Register users bound to
• In the Register users bound to the rule set field, select registered users and
the rule set
click >> to unbind them.
Users in the Available register users field are added in User management.
750
Figure 769 Network diagram
Configuring Router C
# Configure the router to operate in the alone mode.
1. Select Voice Management > SIP Local Survival > Service Configuration from the navigation tree to
access the following page.
Figure 770 Configuring alone mode
751
Figure 771 Configuring a user
Configuring Router A
1. Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the username is 1000, and the password is 1000.
2. Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5000, the routing type is SIP, and the SIP routing method is proxy server.
3. Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar’s IP address as 2.1.1.2.
Configuring Router B
1. Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the username is 5000, and the password is 5000.
2. Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the SIP routing method is proxy server.
3. Configure SIP registration in the connection properties configuration page: Enable registration,
and configure the main registrar’s IP address as 2.1.1.2.
752
Configuring local SIP server to operate in alive mode
Network requirements
Router A and Router B carry out call services through the remote voice server VCX. Configure the local
SIP server on Router A to operate in alive mode, so that calls can be originated or received through
Router A when the VCX fails. When the VCX recovers, it will take over call services again.
Figure 772 Network diagram
Configuring Router A
# Configure the IP address of Ethernet 1/1 as 1.1.1.2, and the IP address of the sub interface as 2.1.1.2.
(Details not shown.)
# Configure the local SIP server to operate in alive mode.
1. Select Voice Management > SIP Local Survival > Service Configuration from the navigation tree to
access the following page.
Figure 773 Configuring alive mode
753
5. Enter 3.1.1.1 for Remote Server IP Address.
6. Click Apply.
# Configure user 1000.
7. Select Voice Management > SIP Local Survival > User Management from the navigation tree, and
click Add to access the following page.
Figure 774 Configuring a user
Configuring Router A
1. Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, and the bound line is line2/0.
2. Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5000, the routing type is SIP, and the SIP routing method is proxy server.
3. Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar’s IP address as 3.1.1.2, and the backup registrar’s IP address as
2.1.1.2.
Configuring Router B
1. Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, and the bound line is line2/0.
2. Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the SIP routing method is proxy server.
3. Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar’s IP address as 3.1.1.2, and the backup registrar’s IP address as
2.1.1.2
754
Verifying the configuration
• When the VCX fails, the local SIP server on Router A starts to accept registrations from phones,
which then can call each other through Router A. Select Voice Management > States and Statistics >
Local Survival Service States from the navigation tree. You can find that numbers 1000 and 5000
have been registered with the local SIP server on Router A.
• When the VCX recovers, Router A disables the local SIP server, and the phones register with the
VCX again.
755
Figure 776 Configuring alone mode
756
# Configure call rule set 0.
12. Select Voice Management > SIP Local Survival > Call Authority Control from the navigation tree,
and click Add to access the following page.
Figure 778 Configuring call rule set 0
757
Figure 779 Applying call rule set 0
758
21. Add a rule as shown in Figure 780.
22. Click Apply.
# Apply call rule set 2.
23. Select Voice Management > SIP Local Survival > Call Authority Control from the navigation tree,
and click the icon of call rule set 2 to access the following page.
Figure 781 Applying call rule set 2
24. Click 5000 in Available register users, and then click << to add it to Register users bound to the
rule set.
25. Click Apply.
Configuring Router A
1. Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the user name is 1000, and the password is 1000.
2. Configure a local number in the local number configuration page: The ID is 1111, the number is
1111, the bound line is line2/1, the user name is 1111, and the password is 1111.
3. Configure a call route to Router B in the call route configuration page: The ID is 5000, the
destination number is 5…, the routing type is SIP, and the SIP routing method is proxy server.
4. Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar’s IP address as 2.1.1.2.
Configuring Router B
1. Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the user name is 5000, and the password is 5000.
759
2. Configure a local number in the local number configuration page: The ID is 5555, the number is
5555, the bound line is line2/1, the user name is 5555, and the password is 5555.
3. Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1…, the routing type is SIP, and the SIP routing method is proxy server.
4. Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar’s IP address as 2.1.1.2.
760
Figure 783 Configuring alone mode
761
Figure 785 Configuring an area prefix
Configuring Router A
1. Configure a local number in the local number configuration page: The ID is 55661000, the
number is 55661000, and the bound line is line2/0.
2. Configure a call route to Router B in the call route configuration page: The ID is 88995000, the
destination number is 88995000, the routing type is SIP, and the destination address is 2.1.1.2.
Configuring Router B
1. Configure a local number in the local number configuration page: The ID is 5000, the number is
5000, the bound line is line2/0, the user name is 5000, and the password is 5000.
2. Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar’s IP address as 2.1.1.2.
762
Verifying the configuration
• Select Voice Management > States and Statistics > Local Survival Service States from the
navigation tree. You can find that number 5000 has been registered with the local SIP server on
Router C.
• Place a call from phone 55661000 to phone 88995000. The local SIP server on Router C removes
the area prefix 8899 from the called number, and alerts internal phone 5000. Pick up phone 5000.
The call is established.
763
4. Select Alone for Server Operation Mode.
5. Click Apply.
# Configure a call-out route
6. Select Voice Management > SIP Local Survival > Call-Out Route from the navigation tree, and click
Add to access the following page.
Figure 789 Configuring a call-out route
764
Configuring Router A
1. Configure a local number in the local number configuration page: The ID is 1000, the number is
1000, the bound line is line2/0, the user name is 1000, and the password is 1000.
2. Configure a call route to Router B in the call route configuration page: The ID is 55665000, the
destination number is 55665000, the routing type is SIP, and the routing method is proxy server.
Configuring Router B
1. Configure a local number in the local number configuration page: The ID is 55665000, the
number is 55665000, and the bound line is line2/0.
2. Configure a call route to Router A in the call route configuration page: The ID is 1000, the
destination number is 1000, the routing type is SIP, and the routing method is proxy server.
3. Configure SIP registration in the connection properties configuration page: Enable SIP registration,
and configure the main registrar’s IP address as 2.1.1.2.
765
Configuring IVR
Overview
Interactive voice response (IVR) is used in voice communications. You can use the IVR system to customize
interactive operations and humanize other services. If a subscriber dials an IVR access number, the IVR
system plays the prerecorded voice telling the subscriber what to do. For example, it might tell the
subscriber to dial a number.
Advantages
A conventional interactive voice system uses fixed audio files and operations. IVR enables you to
customize your own interactive system by adding, modifying, and removing audio files. IVR has the
following advantages.
Various codecs
The IVR system supports four codecs for voice prompts: G.711alaw, G.711ulaw, G.723r5, and G.729r8.
Each kind of codec has its advantages and disadvantages: G.711alaw and G.711ulaw provide high
quality of voice, while requiring greater memory space; G.723r53 and G.729r8 provide relatively low
quality of voice, while requiring less memory space.
Customizable process
You can customize the interactive process easily. For example, configure custom IVR access numbers,
voice prompts, and combinations of keys and voice prompts.
766
Successive jumping
The IVR process can realize successive jumping at most eight times from node to node.
Configuring IVR
Uploading media resource files
Select Voice Management > IVR Services > Media Resources Management from the navigation tree to
access the following page.
Figure 791 Media file list
767
You can click to save the media resource file to a specified directory.
Click Add. The following page appears.
Figure 792 Configuring media resource
Item Description
Media Resource ID Set a media resource ID.
Rename Media Resource Type a name for the media resource file.
Upload Media Resource Upload media resource files for g729r8, g711alaw, g711ulaw, and g723r53.
768
Figure 794 Modifying a media resource
Item Description
Media resource ID Set a media resource ID.
769
Table 284 Configuration items
Item Description
Input Error Processing Method
Max Count of Input Errors Enter the maximum number of input errors.
• Enable.
Play Voice Prompts for
• Disable.
Input Errors
Not enabled by default.
Select a voice prompt file. You can configure voice prompt files in Voice
Voice Prompts
Management > IVR Services > Media Resources Management.
Select a voice prompt file. You can configure voice prompt files in Voice
Voice Prompts
Management > IVR Services > Media Resources Management.
770
Figure 796 Configuring a call node
Item Description
Node ID Enter a node ID.
771
Item Description
• Enable.
• Disable.
Disabled by default.
Input Method
• Terminate the call.
• Jump to a specified node.
Input Error Processing
• Return to the previous node.
Method
By default, the node uses the input error processing method configured in the
global key policy.
Specify the node to which the subscriber is directed when the number of input
Specify A Node
errors reaches the maximum.
Max Count of Input Errors Specify the maximum number of input errors.
• Enable.
Play Voice Prompts for
• Disable.
Input Errors
Not enabled by default.
Select a voice prompt file. Voice prompt files can be configured in Voice
Voice Prompts
Management > IVR Services > Media Resources Management.
Specify the node to which the subscriber is directed when the number of input
Specify A Node
timeouts reaches the maximum.
Select a voice prompt file. You can configure voice prompt files in Voice
Voice Prompts
Management > IVR Services > Media Resources Management.
772
Item Description
Secondary-Call
• Match the terminator of the numbers.
• Match the length of the numbers.
Number Match Mode • Match the local number and route.
Either the number match mode or the extension secondary call must be configured
at least.
Extension Secondary-Call
Extension Number Associate the extension number with the corresponding number. You can click
Add a Rule to configure a rule for executing the secondary call.
Corresponding Number
By default, no extension secondary call is configured.
773
Figure 797 Configuring a jump node
774
Table 286 Configuration items
Item Description
Node ID Enter a node ID.
775
Table 287 Configuration items
Item Description
Node ID Enter a node ID.
Item Description
Number ID Enter a number ID in the range of 30000 to 39999.
776
Item Description
Number Enter the access number.
Bind a node in the list to the access number. You can configure the nodes in Voice
Bind to Menu
Management > IVR Services > Advanced Settings.
IMPORTANT:
Realm Name
The realm name must be consistent with that configured on the server. Otherwise,
authentication will fail. If no realm name is configured, the device trusts the realm
name from the server.
• Enable—Enables the access number.
Status
• Disable—Disables the access number.
777
IVR configuration examples
Configure a secondary call on a call node (match the
terminator of numbers)
Network requirements
As shown in Figure 801, configure an IVR access number and call node functions on Router B to meet the
following requirements.
• After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav.
• The subscriber dials 50# at Telephone A to originate a secondary call and then Telephone B1 rings.
• If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
• If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Figure 801 Network diagram
50
Telephone B1
Eth1/1 Eth1/1
1.1.1.1/24 1.1.1.2/24
500
Telephone B2
Configuring Router A
# Configure a local number and call route.
1. Configure a local number in the local number configuration page: The number ID is 100, the
number is 100, and the bound line is line 1/0.
2. Configure a route to Router B in the call route configuration page: The route ID is 300; the
destination number is 300, the SIP routing method is IP routing, the destination IP address is
1.1.1.2, and the DTMF transmission mode is out-of-band.
Configuring Router B
# Configure local numbers in the local number configuration page:
• Local number 500: The number ID is 500, the number is 500, and the bound line is line 1/0.
• Local number 50: The number ID is 50, the number is 50, and the bound line is line 1/1.
# Upload g729r8 media resource files.
Select Voice Management > IVR Services > Media Resources Management from the navigation tree to
access the following page.
778
Figure 802 Uploading a media resource file
779
Figure 803 Configuring the global key policy
5. Select Enable for Play Voice Prompts for Input Errors, and select input_error from the Voice
Prompts list.
6. Type 4 for Max Count of Input Timeouts, and 5 for Timeout Time; select Enable for Play Voice
Prompts for Input Timeout; select timeout from the Voice Prompts list.
7. Click Apply.
Configure the call node to achieve the following:
8. The subscriber dials the number 300 at Telephone A, and hears the voice prompts of audio file
welcome.wav. After that, the subscriber dials 50# at Telephone A, and Telephone B1 rings.
9. Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Call Node tab, and click Add to access the following page.
780
Figure 804 Configuring a call node
781
Figure 805 Configuring an access number
782
Figure 806 Network diagram
50
Telephone B1
Eth1/1 Eth1/1
1.1.1.1/24 1.1.1.2/24
500
Telephone B2
Configuration procedure
1. Configure Router A: see 0.
2. Configure Router B:
# Configure the call node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Call Node tab, and click Add to access the following page.
783
Figure 807 Configuring the call node
784
Telephone B2 rings.
50
Telephone B1
Eth1/1 Eth1/1
1.1.1.1/24 1.1.1.2/24
500
Telephone B2
Configuration procedure
1. Configure Router A: see 0.
2. Configure Router B:
# Configure a call node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Call Node tab, and click Add to access the following page.
785
Figure 809 Configuring a call node
786
Configure an extension secondary call on a call node
Network requirements
As shown in Figure 810, configure an IVR access number and call node functions on Router B to meet the
following requirements.
• After the subscriber dials 300 (the IVR access number) from Telephone A, Router B plays the audio
file welcome.wav. Then the subscriber dials 0, and Router B makes an extension secondary call so
that Telephone B rings.
• If the subscriber dials a wrong number at Telephone A, Router B plays the audio file
input_error.wav.
• If no number is dialed at Telephone A within the timeout time, Router B plays the audio file
timeout.wav.
Figure 810 Network diagram
Configuration procedure
1. Configure Router A: See 0.
2. Configure Router B:
# Configure a call node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Call Node tab, and click Add to access the following page.
787
Figure 811 Configuring a call node
788
f. Click Apply.
For other settings, see 0.
Configuration procedure
1. Configure Router A: see 0.
2. Configure Router B:
# Configure a jump node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Jump Node tab, and click Add to access the following page.
789
Figure 813 Configuring a jump node
790
a. Type 10 for Node ID.
b. Type play-welcome for Description.
c. Select Enable for Play Voice Prompts; select welcome from the Voice Prompts list.
d. Select Terminate the call for Key#.
e. Click Apply.
Configuration procedure
1. Configure Router A: see 0.
2. Configure Router B:
# Configure a service node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Service Node tab, and click Add to access the following page.
791
Figure 815 Configuring a service node
792
Figure 816 Configuring an access number
793
Configuration procedure
1. Configure Router A: see 0.
2. Configure Router B:
# Configure a servcie node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Service Node tab, and click Add to access the following page.
Figure 818 Configuring a service node
794
Figure 819 Configuring an access number
795
Figure 820 Network diagram
Configuration procedure
1. Configure Router A: see 0.
2. Configure Router B:
# Configure a local number in the local number configuration page.
The number ID is 500, the number is 500, and the bound line is line 1/0.
# Upload a g729r8 media resource file.
Select Voice Management > IVR Services > Media Resources Management from the navigation
tree to access the following page.
Figure 821 Uploading a g729r8 media resource file
796
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, and select
the Global Key Policy tab.
Figure 822 Configuring the global key policy
a. Select Enable for Play Voice Prompts for Input Errors, and select input_error from the Voice
Prompts list.
b. Enter 4 for Max Count of Input Timeouts, and 5 for Timeout Time; select Enable for Play Voice
Prompts for Input Timeout; select timeout from the Voice Prompts list.
c. Click Apply.
# Configure a call node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Call Node tab, and click Add to access the following page.
797
Figure 823 Configuring a call node
798
e. Click Apply.
# Configure a service node.
Select Voice Management > IVR Services > Advanced Settings from the navigation tree, select the
Configure Service Node tab, and click Add to access the following page.
Figure 824 Configuring a service node
799
Figure 825 Configuring a jump node
800
c. Select Enable for both Play Voice Prompts and Mandatory Play.
d. Select welcome from the Voice Prompts list.
e. Select Jump to a specified node from the Key* list, and reject-all from its Specify a node list.
f. Select Jump to a specified node from the Key# list, and play-all from its Specify a node list.
g. Click Apply.
# Configure an access number.
Select Voice Management > IVR Services > Access Number Management from the navigation tree,
and click Add to access the following page.
Figure 826 Configuring an access number
801
Create a menu
Select Voice Management > IVR Services > Processing Methods Customization from the navigation tree,
and click Add to create a menu. The following describes settings for different types of menus, including
jump, terminate the call, enter the next menu, return to the previous menu, dial immediately, and
secondary call.
Item Description
Menu Node ID Enter a menu ID.
802
Item Description
Select Jump.
Menu Type
By default, Jump is selected.
803
Figure 828 Configuring a Terminate the call menu
Item Description
Menu Node ID Enter a menu ID.
Play Voice Prompts When the User Enters Select an audio file.
the Menu No audio file is selected by default.
Item Description
Menu Node ID Enter a menu ID.
Play Voice Prompts When the User Enters the Select an audio file.
Menu No audio file is selected by default.
804
Item Description
Jump to the next menu Select the target menu.
Item Description
Menu Node ID Enter a menu ID.
805
Table 293 Configuration items
Item Description
Menu Node ID Enter a menu ID.
806
Table 294 Configuration items
Item Description
Menu Node ID Enter a menu ID.
Select Secondary-call.
Menu Type
By default, Jump is selected.
Select an audio file. Voice prompt files can be configured in Voice Management >
Input Error Prompts
IVR Services > Media Resources Management.
Select an audio file. Voice prompt files can be configured in Voice Management >
Timeout Prompts
IVR Services > Media Resources Management.
Match Number
Enter the number terminator.
Terminator
Extension number Enter an extension number and the corresponding number, and click Add to
associate them.
Corresponding number
By default, no extension secondary call is configured.
807
Bind an access number
After configuring a menu, click Next to access the following page.
Figure 833 Binding an access number
Select the box of the target access number, and click Apply.
NOTE:
To perform any operation to the previous page, you must close the Customize IVR Services page first.
Otherwise, you will get errors.
808
Add a submenu
Select Add A New Node from the Jump to submenu list of Key 0. Click OK on the popup dialog box to
access the following page.
Figure 835 Adding a submenu
You can configure the type of the new menu as jump, terminate the call, enter the next menu, return to the
previous menu, dial immediately, or secondary-call. For information about the menu configuration,
see Create a menu.
NOTE:
If new settings are made on the page, click Apply to save them first before you select Add a new menu.
Otherwise, the new settings may get lost.
Delete a menu
Enter the Customize IVR Services page, click the target menu, and click Delete the menu. On the popup
page, click OK.
If you delete a menu that is referenced by another menu, the operation deletes the reference relation in
the menu but not the menu.
If you delete a menu that is referenced within itself, the delete operation deletes both the reference
relation and the menu.
809
When a user dials the access number 300, the system plays the audio file Hello.wav. Then, the
following events occur:
If the user dials 0, the system jumps to the marketing and sales department menu.
If the user dials 1, the system jumps to the telecom product sales department menu.
If the user dials 2, the system jumps to the government product sales department menu. If the
user dials #, the system terminates the call.
2. Marketing and sales department menu
This menu plays the audio file Welcome1.wav. Then, the following events occur:
If the user dials 0, the system dials the number 500 to call the attendant.
If the user dials 1, the system jumps to the major financial customer department menu.
If the user dials 2, the system jumps to the carrier customer department menu.
If the user dials 3, the system jumps to the SME department menu.
If the user dials *, the system returns to the previous menu.
3. Telecom product sales department menu
This menu plays the audio file Welcome2.wav. Then, the following events occur:
If the user dials 0, the system dials the number 500 to call the attendant.
If the user dials 1, the system plays the audio file that introduces product A.
If the user dials 2, the system plays the audio file that introduces product B.
If the user dials 3, the system plays the audio file that introduces product C.
If the user dials *, the system returns to the previous menu.
4. Government production sales department
This menu plays the audio file Welcome3.wav. Then, the following events occur:
If the user dials 0, the system dials the number 500 to call the attendant.
If the user dials 1, the system plays the audio file that introduces product D.
If the user dials 2, the system plays the audio file that introduces product E.
If the user dials 3, the system plays the audio file that introduces product F.
If the user dials *, the system returns the previous menu.
Configuration procedure
1. Upload media resource files:
# Upload a media resource file.
Select Voice Management > IVR Services > Media Resources Management from the navigation
tree to access the following page.
810
Figure 836 Configuring media resource
811
Select Voice Management > IVR Services > Access Number Management from the navigation tree,
and click Add to access the following page.
Figure 838 Configuring an access number
812
Figure 840 Binding the access number
Select the box of the access number 300, and click Apply.
3. Configure the voice menu system:
# Enter the Customize IVR Services page.
Select Voice Management > IVR Services > Processing Methods Customization from the navigation
tree to access the page shown in Figure 841. Click the icon of the menu to access the
Customize IVR Services page shown in Figure 842.
Figure 841 Menu list
813
# Add submenus for the marketing and sales department, telecom product sales department, and
government product sales department.
Select the voice menu system of Company A from the navigation tree to access the following page.
Figure 843 Voice menu system of Company A
a. Select Add A New Node from the Jump to submenu list of key 0.
b. Click OK on the popup dialog box to access the following page.
Figure 844 Creating a submenu for the marketing and sales department
814
Figure 845 Adding a submenu for the telecom product sales department
Figure 846 Adding a submenu for the government product sales department
815
Figure 848 Marketing and sales department submenu
a. Select Jump from the Operation list, and Add A New Node from the Jump to submenu list for
key 0.
b. Click OK on the popup dialog box to access the following page.
816
Figure 850 Marketing and sales department submenu
a. Select Return to the previous node from the Operation list of key *.
b. Click Apply.
After the configuration, the marketing and sales department submenu is as shown in Figure 850
4. Configure the telecom product sales department submenu:
a. Select Telecom Product Sales Dept from the navigation tree.
817
a. Select Jump from the Operation list, and Attendant from the Jump to submenu list of key 0.
b. Select Jump from the Operation list, and Add A New Node from the Jump to submenu list of
key 1.
c. Click OK on the popup dialog box to access the following page.
Figure 852 Adding a submenu
a. Select Return to the previous node from the Operation list of key *.
b. Click Apply.
818
After the configuration, the telecom product sales department submenu is as shown in Figure 853.
5. Configure the government product sales department submenu:
Select Government Product Sales Dept from the navigation tree. Configure the submenu as shown
in Figure 854. The configuration procedure is identical with the configuration of the telecom
product sales department submenu.
Figure 854 Government product sales department submenu
After all the configuration, the Customize IVR Services page is as shown in Figure 854.
819
Advanced configuration
Global configuration
Select Voice Management > Advanced Configuration > Global Configuration from the navigation tree to
access the global configuration page, as shown in Figure 855.
Figure 855 Global configuration page
Item Description
• Silent—The calling party does not play any tones to the called party during call
hold.
Tone Playing Mode for
• Playing music—The calling party plays the specified tones to the called party
Call Hold
during call hold.
By default, the tone playing mode is the silent mode.
Select the media resource if you select the Playing Music option. You can upload
Media Resource media resource files in Voice Management > IVR Services > Media Resources
Management.
Call Progress Tones Configure the device to play the call progress tones of a specified country or region.
Country Mode By default, the call progress tones of China are specified.
820
Item Description
Specify the backup rule:
• Strict—One of the following three conditions will trigger strict call backup:
The device does not receive any reply from the peer after sending out a call
request.
The device fails to initiate a call to the IP network side.
Backup Rule
The device fails to register on the voice server.
• Loose—Loose call backup is triggered if any of the above mentioned three
conditions or the following condition happens: the device receives a reject reply
(with a number from 3xx to 6xx except 300, 301, 302, 305, 401, 407, and 422)
after sending a call request.
Specify the time duration in seconds for switching from the current VoIP link to
Call Backup Switch
another VoIP link or a PSTN link (that is, the call backup switching time) in case of a
Time
VoIP call failure.
Batch configuration
Local number
Creating numbers in batch
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Create Numbers in Batch link in the Local Number area to access the page for creating
numbers in batch, as shown in Figure 856.
821
Figure 856 Creating numbers in batch
Item Description
Specify the start number, and then a serial of consecutive numbers starting with the start
number will be bound to the selected voice subscriber lines. For example, if you specify
Start Number
the start number as 3000 and select lines 3/0 and line 3/1, then line 3/0 is bound to
number 3000, and line 3/1 is bound to number 3001.
Set the register username and password in one of the following ways:
• Username and Password are the Same as Number.
Register Mode • No Username and No Password.
• Username and Password are Specified Uniformly: If you select this option, you need
to set the username and password.
822
Figure 857 Local number fax and Modem configuration page
Item Description
Configure the protocol used for fax communication with other devices.
• T.38—Use T.38 fax protocol. With this protocol, a fax connection can be set up
quickly.
• Standard T.38—Use the standard T38 protocol of H323 or SIP. The fax negotiation
mode depends on the protocol used (H323 or SIP).
Enable ECM fax. As defined in ITU-T, the ECM is required by the half-duplex and
half-modulation system running ITU-T V.34 protocol for fax message transmission.
Besides, the G3 fax terminals working in full duplex mode are required to support
half-duplex mode, that is, ECM.
The fax machines using ECM can correct errors, provide the ARQ function, and
transmit fax packets in the format of HDLC frames. On the contrary, the fax machines
using non-ECM cannot correct errors and they transmit fax packets in the format of
ECM Fax binary strings.
• Enable—Enable ECM.
• Disable—Disable ECM.
By default, ECM is disabled.
To use ECM, fax machines on both sides and the gateway must support ECM.
You must enable ECM mode for the local numbers and call routes corresponding to the
fax sender and receiver in the ECM mode.
823
Item Description
Enable CNG fax switchover function. The CNG fax switchover is used to implement the
fax mailbox service through communication with the VCX. When the local fax machine
A originates a fax call to the peer fax machine B, if B is busy or is unattended, A can
send the fax call to the fax mailbox of the VCX. With CNG fax switchover enabled, the
CNG Fax Switchover
voice gateway can switch to the fax mode once it receives a CNG from A.
Function
• Enable.
• Disable.
The function is disabled by default.
Configure the codec type and switching mode for SIP Modem pass-through function.
• Standard G.711 A-law—Adopt G.711 A-law as the codec type and use Re-Invite
switching for SIP Modem pass-through.
Codec Type and
• Standard G.711 μ-law—Adopt the G.711 μ-law codec type and Re-Invite switching
Switching mode for
mode.
SIP Modem
Pass-through • NTE Compatible G.711 A-law—Adopt the G.711 A-law codec type and
NTE-compatible switching mode.
• NTE Compatible G.711 μ-law—Adopt the G.711 μ-law codec type and
NTE-compatible switching mode.
Configure the value of NTE payload type for the NTE-compatible switching mode.
This option is configurable only when NTE Compatible G.711 A-law or NTE Compatible
NET Payload Type
G.711 μ-law is selected in the Codec Type and Switching Mode for SIP Modem
Field
Pass-through list.
By default, the value of the NTE payload type is 100.
Select the checkboxes of specific local numbers and then click the Apply to Selected
Select the Number(s) Number(s) button to apply the above fax and Modem settings to the selected local
numbers.
Call services
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Call Services link in the Local Number area to access the local number call services
configuration page, as shown in Figure 858.
824
Figure 858 Call services configuration page
Item Description
Configure call forwarding:
• Enable.
• Disable.
By default, call forwarding is disabled.
After you enable a call forwarding, enter the corresponding forwarded-to number:
Call Forwarding • The Forwarded-to Number for Call Forwarding no Reply—Enter the forwarded-to
number.
• The Forwarded-to Number for Call Forwarding Busy—Enter the forwarded-to
number.
• The Forwarding Unconditional—Enter the forwarded-to number.
• The Forwarded-to Number for Call Forwarding Unavailable—Enter the
forwarded-to number.
825
Item Description
Configure call hold:
• Enable.
• Disable.
By default, call hold is disabled.
Call Hold After call hold is enabled, set the Max Time Length the Held Party Can Wait parameter
as needed.
IMPORTANT:
The Max Time Length the Held Party Can Wait is only applied to the held party of a call,
that is, the receiver of call hold.
Configure call transfer:
• Enable.
• Disable.
Call Transfer By default, call transfer is disabled.
Call hold must be enabled before you can configure call transfer.
After call transfer is enabled, you can set the Call Transfer Start Delay parameter as
needed.
826
Item Description
Configure MWI:
• Enable.
• Disable.
Message Waiting By default, MWI is disabled.
Indicator
IMPORTANT:
Generally, the voice gateway sends a SUBSCRIBE to the server, and receives a NOTIFY
from the server if the subscription is successful, and gets the status of the voice mailbox
afterwards.
Processing Priority
When the Line is Specify the processing sequence of services when the line is busy.
Busy
Select the boxes of desired local numbers, and then click the Apply to Selected
Select the Number(s)
Number(s) button to apply the above call services settings to the selected local numbers.
Advanced settings
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Advanced Settings link in the Local Number area to access the local number advanced
settings page, as shown in Figure 859.
Figure 859 Local number advanced settings page
827
Table 299 Configuration items
Item Description
Codec with the First Priority.
Codec with the Second Priority.
Codecs and Priorities
Codec with the Third Priority.
Codec with the Lowest Priority.
Number Selection
Set the priority of the local number. The smaller the value, the higher the priority.
Priority
Configure a dial prefix for the local number. For a trunk type call route, the dial prefix
is added to the called number to be sent out.
Dial Prefix • Enable.
• Disable—Remove the configured dial prefix.
If you select to enable the function, you must enter the dial prefix.
Configure VAD. The VAD discriminates between silence and speech on a voice
connection according to their energies. VAD reduces the bandwidth requirements of a
voice connection by not generating traffic during periods of silence in an active voice
connection. Speech signals are generated and transmitted only when an active voice
segment is detected. Researches show that VAD can save the transmission bandwidth
VAD
by 50%.
• Enable.
• Disable.
By default, VAD is disabled.
Select the boxes of desired local numbers, and then click the Apply to Selected
Select the Number(s)
Number(s) button to apply the above advanced settings to the selected local numbers.
Call route
Fax and Modem
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Fax and Modem link in the Call Route area to access the call route fax and modem
configuration page, as shown in Figure 860.
828
Figure 860 Call route fax and Modem configuration page
Item Description
Specify the protocol used for fax communication with other devices.
• T.38—Use T.38 fax protocol. With this protocol, a fax connection can be set up
quickly.
• Standard T.38— Use the standard T38 protocol of H323 or SIP. The fax negotiation
mode depends on the protocol used (H323 or SIP).
As defined in ITU-T, the error correction mode (ECM) is required by the half-duplex and
half-modulation system running ITU-T V.34 protocol for fax message transmission.
Besides, the G3 fax terminals working in full duplex mode are required to support
half-duplex mode, namely, ECM.
The fax machines using ECM can correct errors, provide the automatic repeat request
(ARQ) function, and transmit fax packets in the format of HDLC frames. On the
contrary, the fax machines using non-ECM cannot correct errors and they transmit fax
packets in the format of binary strings.
ECM Fax
• Enable—Enable ECM for fax.
• Disable—Disable ECM for fax.
By default, ECM fax is disabled.
ECM can work only if fax machines on both sides support ECM and the gateway is
configured with ECM.
You must enable ECM mode for the local numbers and call routes corresponding to the
fax sender and receiver in the ECM mode.
829
Item Description
CNG fax switchover is used to implement the fax mailbox service through
communication with the VCX. When the local fax machine A originates a fax call to the
peer fax machine B, if B is busy or is unattended, A can send fax call to the fax mailbox
of the VCX. With CNG fax switchover enabled, the voice gateway can switch to the fax
CNG Fax Switchover
mode once it receives a CNG from A.
Function
• Enable.
• Disable.
The function is disabled by default.
Configure the codec type and switching mode for SIP Modem pass-through function.
• Standard G.711 A-law—Adopt the G.711 A-law codec type and Re-Invite switching
mode.
Codec Type and
• Standard G.711 μ-law—Adopt the G.711 μ-law codec type and Re-Invite switching
Switching mode for
mode.
SIP Modem
Pass-through • NTE Compatible G.711 A-law—Adopt the G.711 A-law codec type and
NTE-compatible switching mode.
• NTE Compatible G.711 μ-law—Adopt the G.711 μ-law codec type and
NTE-compatible switching mode.
Configure the value of the NTE payload type for the NTE-compatible switching mode.
This option is configurable only when NTE Compatible G.711 A-law or NTE Compatible
NET Payload Type
G.711 μ-law is selected in the Codec Type and Switching Mode for SIP Modem
Field
Pass-through list.
By default, the value of the NTE payload type is 100.
Select the boxes of call routes, and then click the Apply to Selected Route(s) button to
Select the Route(s)
apply the above fax and Modem settings to the selected call routes.
Advanced settings
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the Advanced Settings link in the Call Route area to access the call route advanced settings
page, as shown in Figure 861.
Figure 861 Call route advanced settings page
830
Table 301 Configuration items
Item Description
Codec with the First Priority.
Codec with the Second Priority.
Codecs and Priorities
Codec with the Third Priority.
Codec with the Lowest Priority.
Route Selection
Set the priority of the call route. The smaller the value, the higher the priority.
Priority
The VAD discriminates between silence and speech on a voice connection according
to their energies. VAD reduces the bandwidth requirements of a voice connection by
not generating traffic during periods of silence in an active voice connection. Speech
signals are generated and transmitted only when an active voice segment is detected.
VAD Researches show that VAD can save the transmission bandwidth by 50%.
• Enable.
• Disable.
By default, VAD is disabled.
Select the boxes of desired call routes, and then click the Apply to Selected Route(s)
Select the Route(s)
button to apply the above advanced settings to the selected call routes.
Line management
FXS line configuration
Select Voice Management > Advanced Configuration > Batch Configuration from the navigation tree,
and then click the FXS Line Configuration link in the Line Management area to access the FXS line
configuration page, as shown in Figure 862.
831
Figure 862 FXS line configuration page
Item Description
Specify the maximum interval for the user to dial the next digit.
Max Interval for
Dialing the Next This timer will restart each time the user dials a digit and will work in this way until all
Digit the digits of the number are dialed. If the timer expires before the dialing is completed,
the user will be prompted to hang up and the call is terminated.
Max Interval Specify the maximum interval in seconds between off-hook and dialing the first digit.
between Off-hook
and Dialing the First Upon the expiration of the timer, the user will be prompted to hang up and the call is
Digit terminated.
832
Item Description
Select the boxes of desire lines, and then click the Apply to Selected Line(s) button to
Select the Line(s)
apply the above settings to the selected FXS lines.
Item Description
Specify the maximum interval for the user to dial the next digit.
Max Interval for
Dialing the Next This timer will restart each time the user dials a digit and will work in this way until all
Digit the digits of the number are dialed. If the timer expires before the dialing is completed,
the user will be prompted to hang up and the call is terminated.
Max Interval Specify the maximum interval in seconds between off-hook and dialing the first digit.
between Off-hook
and Dialing the First Upon the expiration of the timer, the user will be prompted to hang up and the call is
Digit terminated.
833
Item Description
When the voice signals on the line
Input Gain on the IMPORTANT:
attenuate to a relatively great extent,
Voice Interface
increases the voice input gain value. Gain adjustment may lead to call failures.
You are not recommended to adjust the
When a relatively small voice signal
Output Gain on the gain. If necessary, do it with the guidance
power is needed on the output line,
Voice Interface of technical personnel.
increases the voice output gain value.
Item Description
Specify the maximum interval for the user to dial the next digit.
Max Interval for
Dialing the Next This timer will restart each time the user dials a digit and will work in this way until all
Digit the digits of the number are dialed. If the timer expires before the dialing is completed,
the user will be prompted to hang up and the call is terminated.
834
Item Description
When the voice signals on the line
Input Gain on the IMPORTANT:
attenuate to a relatively great extent,
Voice Interface
increases the voice input gain value. Gain adjustment may lead to call failures.
You are not recommended to adjust the
When a relatively small voice signal
Output Gain on the gain. If necessary, do it with the guidance
power is needed on the output line,
Voice Interface of technical personnel.
increases the voice output gain value.
Select the boxes of desired lines, and then click the Apply to Selected Line(s) button to
Select the Line(s)
apply the above settings to the selected E&M lines.
Item Description
When the voice signals on the line
Input Gain on the
attenuate to a relatively great extent, IMPORTANT:
Voice Interface
increases the voice input gain.
Gain adjustment may lead to call failures.
When a relatively small voice signal You are not recommended to adjust the
Output Gain on the power is needed on the output line, gain. If necessary, do it with the guidance
Voice Interface increases the voice output attenuation of technical personnel.
value.
Select the boxes of desired line, and then click the Apply to Selected Line(s) button to
Select the Line(s)
apply the above settings to the selected ISDN lines.
835
Figure 866 Creating users in batches
Item Description
Specify the telephone number of the first For example, if you specify the start
Start Number
user to be registered. number as 2000 and set the register
user quantity to 5, the device
Specify the number of users to be automatically generates five registered
Register User Quantity users with telephone numbers from
registered.
2000 to 2004.
Registration Mode • Username and password are the same as the number.
• Username and password are specified uniformly—If you select this option, you
must specify the authentication username and authentication password.
Authentication
Enter the name of the user for authentication.
Username
Authentication
Enter the password of the user for authentication.
Password
836
States and statistics
Line states
Use this page to view information about all voice subscriber lines.
Select Voice Management > States and Statistics > Line States from the navigation tree. The Line State
Information page appears.
Figure 867 Line state information page
Field Description
Name Voice subscriber line name.
837
Field Description
• Physical Down—Voice subscriber line is physically down, possibly because no
physical link is present or the link has failed.
Subscriber Line Status
• UP—Voice subscriber line is administratively down.
• Shutdown—Voice subscriber line is up both administratively and physically.
838
Figure 869 ISDN line details
Click a timeslot (TS) link to view the details about the TS.
Figure 870 Timeslot details
Call statistics
The following pages display call statistics.
• Active Call Summary page—Displays statistics about ongoing calls.
• History Call Summary page—Displays statistics about ended calls.
839
Displaying active call summary
Select Voice Management > States and Statistics > Call Statistics from the navigation tree. The Active Call
Summary page appears.
Figure 871 Active call summary page
Field Description
Call type.
Type
Only Speech and Fax are supported.
Call status:
• Unknown—The call status is unknown.
Status • Connecting—A connection attempt (outgoing call) is being made.
• Connected—A connection attempt (incoming call) is being made.
• Active—The call is active.
840
SIP UA states
The following pages show SIP UA states:
• TCP Connection Information page—Displays information about all TCP-based call connections.
• TLS Connection Information page—Displays information about all TLS-based call connections.
• Number Register Status page—Displays number register information when you use SIP servers to
manage SIP calls.
• Number Subscriber Status pages—Displays the subscription status information of MWI when MWI
is in use.
Field Description
Connection ID Call connection ID, automatically generated by the system.
Connection state:
• Idle.
Connection State
• Connecting.
• Established.
841
Figure 874 TLS connection information
Connection status
Displaying number register status
Select Voice Management > Sates and Statistics > SIP UA States from the navigation tree and click the
Number Register Status tab.
Figure 875 Number register status
Field Description
Number Registered phone number.
Address of the registrar, in the format of IP address plus port number or domain
Registrar
name.
Remaining aging time of a number, that is, the remaining time before the next
Remaining Aging Time (Sec)
registration.
842
Displaying number subscription status
Select Voice Management > Sates and Statistics > SIP UA States from the navigation tree and click the
Number Subscription Status tab.
Figure 876 Number subscription status
Field Description
Number Phone number.
MWI server address, in the format of IP address plus port number or domain
Subscription Server
name.
Remaining aging time of the subscription, that is, the remaining time before
Remaining Aging Time (Sec)
the next subscription.
843
Table 312 Field description
Field Description
Server operation mode:
Server Operation Mode • Alone.
• Alive.
Server running state:
Server Status • Enabled.
• Disabled.
User ID User ID.
Field Description
Aging Time SIP trunk account aging time.
844
Displaying dynamic contact states
Select Voice Management > States and Statistics > SIP Trunk Account States from the navigation tree.
The page for displaying dynamic contact states appears.
Figure 879 Dynamic contact states
Field Description
Telephone number, which could be one of the following types:
• Roaming user registration number that is temporarily saved on the device.
Number • Roaming user subscription number that is temporarily saved on the device.
• Called number of a forwarded call carried in a received 3xx message.
• Destination number of a transferred call carried in a received REFER message.
Remaining
Aging Time Remaining aging time of the contact address, in seconds.
(Sec)
845
Figure 880 Server group information
This page shows the configuration information of group servers. For how to configure group servers, see
"Managing SIP server groups."
IVR information
The following pages show IVR information:
• IVR Call States page—Display information about ongoing IVR calls.
• IVR Play States page—Displays information about ongoing IVR playing.
Field Description
Corresponding Access Number IVR access number corresponding to the called number.
Current state:
• Idle—Node is idle.
State • Playing a media file.
• Waiting for input—Node is waiting for the input of the subscriber.
• Calling—Node is calling a number.
846
Displaying IVR play states
Select Voice Management > States and Statistics > IVR Information from the navigation tree. The IVR
Play States page appears.
Figure 882 IVR play states
Field Description
Play Count Play times of the media file.
• Playing.
Play State
• Not playing.
• PSTN—Called party is from PSTN.
Play Type
• IP—IP address of the peer media.
847
Index
ABCDEFGHILMNOPQRSTUVW
A Configuration guidelines,348
Configuration guidelines,490
Access control configuration example,161
Configuration guidelines,247
Accessing SSL VPN resources,444
Configuration prerequisites,447
Adding an IPv4 ACL,240
Configuration prerequisites,210
Adding an L2TP group,378
Configuration procedure,350
Advanced settings,542
Configuration procedure,160
Advanced settings configuration example,605
Configuration procedure,163
Advantages,766
Configuration procedure,448
Advantages of SSL VPN,401
Configuration procedure,210
Appendix Packet priorities,261
Configuration task list,67
Application control configuration example,186
Configuring a call route for inbound calls,688
Attack protection configuration examples,176
Configuring a call route for outbound calls,682
B Configuring a CE1/PRI interface,55
Basic service setup,539 Configuring a cellular interface,59
Basic settings,542 Configuring a CT1/PRI interface,58
Basic settings,544 Configuring a DHCP server group,223
Batch configuration,821 Configuring a DMZ host,150
Blacklist and white list,125 Configuring a domain name suffix,203
Bridging configuration example,291 Configuring a dynamic address pool for the DHCP
server,220
C
Configuring a GRE over IPv4 tunnel,390
Call services,542 Configuring a RADIUS scheme,336
Call services configuration examples,581 Configuring a resource group,418
Call statistics,839 Configuring a rule for a basic IPv4 ACL,240
Changing the login password,446 Configuring a rule for an advanced IPv4 ACL,242
Channel busy test,142 Configuring a rule for an Ethernet frame header
Clearing the dynamic domain name cache,203 ACL,245
Client mode configuration example,114 Configuring a security policy,435
Client-initiated VPN configuration example,385 Configuring a static address pool for the DHCP
Common Web interface elements,19 server,218
Configuration examples of local number and call Configuring a user group,423
route,547 Configuring a VLAN and its VLAN interface,62
Configuration guidelines,238 Configuring access number management,776
Configuration guidelines,376 Configuring advanced limit,250
Configuration guidelines,66 Configuring advanced queue,253
Configuration guidelines,195 Configuring advanced settings,660
Configuration guidelines,334 Configuring advanced settings of a call route,603
Configuration guidelines,23 Configuring advanced settings of a local number,600
848
Configuring an ADSL/G.SHDSL interface,52 Configuring the blacklist and white list functions,125
Configuring an Ethernet interface or subinterface,47 Configuring the blacklist function,172
Configuring an internal server,151 Configuring the global key policy,769
Configuring an IPsec connection,367 Configuring the MAC address filtering type,166
Configuring an MST region,323 Configuring the MAC addresses to be filtered,166
Configuring an SA interface,50 Configuring the SSL VPN service,403
Configuring ARP automatic scanning,363 Configuring TR-069,503
Configuring authentication policies,429 Configuring user isolation,127
Configuring basic services,34 Configuring user-based load sharing,196
Configuring bridging,289 Configuring web page redirection,188
Configuring call release cause code mapping,665 Configuring Web proxy server resources,404
Configuring call services of a call route,580 Configuring WiNet,523
Configuring call services of a local number,576 Configuring wireless access service,68
Configuring connection limit,153 Configuring wireless QoS,129
Configuring connection properties,651 Connection status,842
Configuring data transmit rates,120 Creating a PKI domain,469
Configuring DHCP interface setup,217 Creating a PKI entity,468
Configuring dial plan,615 Creating a static ARP entry,355
Configuring digital link management,704 Customizing IVR services,801
Configuring dynamic NAT,148 Customizing the SSL VPN user interface,439
Configuring fax and modem,568 D
Configuring fixed ARP,364
DDNS configuration example,211
Configuring gratuitous ARP,357
Destroying the RSA key pair,473
Configuring intrusion detection,174
DHCP configuration examples,224
Configuring IP addresses excluded from dynamic
Dial plan configuration examples,622
allocation,222
Dial plan functions,613
Configuring IP network resources,413
Dial plan process,610
Configuring IVR,767
Displaying 3G wireless card state,30
Configuring IVR nodes,770
Displaying ARP entries,354
Configuring local users,420
Displaying broadband connection information,30
Configuring media parameters for SIP-to-SIP
connections,607 Displaying device information,30
Configuring MSTP globally,324 Displaying external interface traffic ordering
statistics,200
Configuring MSTP on a port,328
Displaying internal interface traffic ordering
Configuring periodic sending of gratuitous ARP
statistics,199
packets,362
Displaying IPsec VPN monitoring information,373
Configuring routes,190
Displaying L2TP tunnel information,385
Configuring session properties,653
Displaying LAN information,32
Configuring signaling parameters for SIP-to-SIP
connections,608 Displaying radio,122
Configuring SIP local survival,745 Displaying recent system logs,33
Configuring SIP trunk,679 Displaying service information,33
Configuring subnet limit,249 Displaying syslogs,516
Configuring system time,500 Displaying wireless access service,84
Configuring TCP application resources,406 Displaying WLAN information,32
849
Domain name resolution configuration example,204 Logging in to the SSL VPN service interface,443
E Logging in to the Web interface,1
Logging out of the Web interface,2
E&M subscriber line,719
Login control configuration example,351
E1 voice DSS1 signaling configuration example,716
Echo adjustment function,721 M
Enabling application layer protocol check,153 MAC address filtering configuration example,168
Enabling DHCP,216 Managing integrated services,33
Enabling DNS proxy,202 Managing services,495
Enabling dynamic domain name resolution,202 Managing the 3G modem,144
Enabling L2TP,378 Managing the configuration,491
Enabling learning of dynamic ARP entries,356 Managing users,497
Enabling the client mode,111 Managing Web-based NM through CLI,23
Enabling the SNMP agent function,510 MSTP configuration example,330
F N
Fax and modem,542 NAT configuration examples,154
FXO voice subscriber line,719 Network requirements,447
FXS voice subscriber line,719 O
G One-to-one binding between FXS and FXO voice
Generating an RSA key pair,472 subscriber lines,721
Getting help information,445 Overview,766
Global configuration,820 Overview,465
GRE over IPv4 tunnel configuration example,392 Overview,209
Overview,285
H
Overview,264
How SSL VPN works,400
Overview,239
I Overview,362
Introduction to advanced settings,596 Overview,248
Introduction to basic settings,543 Overview,148
Introduction to DHCP,214 Overview,201
Introduction to MSTP,317 Overview,190
Introduction to RSTP,317 Overview,196
Introduction to SIP,643 Overview,354
Introduction to STP,310 Overview,198
Introduction to the Web interface,2 Overview,390
Introduction to the Web-based NM functions,5 Overview,170
IPsec VPN configuration example,374 Overview,336
IVR configuration examples,778 Overview,366
IVR information,846 Overview,188
Overview,701
L
Overview,510
Line management configuration,722 Overview,62
Line management configuration examples,735 Overview,67
Line states,837 Overview,539
Local survival service states,843
850
P SIP modem pass-through function,567
Performing basic configurations for the SSL VPN SIP security,648
domain,426 SIP trunk account states,844
Ping,520 SIP trunk configuration examples,689
Ping operation,521 SIP UA states,841
PKI configuration examples,476 SNMP agent configuration task list,264
SNMP configuration examples,512
Q
SNMPv1/v2c configuration example,276
QoS configuration examples,257
SNMPv3 configuration example,279
R Specifying a DNS server,203
RADIUS configuration example,341 Specifying the traffic ordering mode,199
Rebooting the device,495 Static ARP configuration example,357
Recommended configuration procedure,198 Static route configuration example,192
Recommended configuration procedure,366 Support for SIP extensions,650
Recommended configuration procedure,201 Support for transport layer protocols,648
Recommended configuration procedure,183 T
Recommended configuration procedure,148
Traceroute,520
Recommended configuration procedure,402
Traceroute operation,520
Recommended configuration procedure,465
Troubleshooting Web browser,24
Recommended configuration procedure,215
U
Recommended IPv4 ACL configuration procedure,239
Recommended MSTP configuration procedure,322 Upgrading software,507
Regular expression,611 URL filtering configuration example,164
Removing ARP entries,355 User group configuration example,302
Requesting a local certificate,475 User group configuration task list,295
Retrieving and displaying a certificate,473 User level,5
Retrieving and displaying a CRL,476 V
S Verifying the configuration,461
Server group information,845 Viewing the general information and statistics of an
Setting a district code,142 interface,61
Setting buffer capacity and refresh interval,519 Viewing user information,425
Setting the log host,518 W
Setting the traffic ordering interval,199 WiNet configuration example,530
SIP connection configuration examples,666 Wireless access service configuration examples,91
SIP local survival configuration examples,750 Wireless QoS configuration example,138
851